1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/http/http_stream_factory_impl_job.h"
10 #include "base/bind.h"
11 #include "base/bind_helpers.h"
12 #include "base/logging.h"
13 #include "base/stl_util.h"
14 #include "base/strings/string_util.h"
15 #include "base/strings/stringprintf.h"
16 #include "base/values.h"
17 #include "build/build_config.h"
18 #include "net/base/connection_type_histograms.h"
19 #include "net/base/net_log.h"
20 #include "net/base/net_util.h"
21 #include "net/http/http_basic_stream.h"
22 #include "net/http/http_network_session.h"
23 #include "net/http/http_pipelined_connection.h"
24 #include "net/http/http_pipelined_host.h"
25 #include "net/http/http_pipelined_host_pool.h"
26 #include "net/http/http_pipelined_stream.h"
27 #include "net/http/http_proxy_client_socket.h"
28 #include "net/http/http_proxy_client_socket_pool.h"
29 #include "net/http/http_request_info.h"
30 #include "net/http/http_server_properties.h"
31 #include "net/http/http_stream_factory.h"
32 #include "net/http/http_stream_factory_impl_request.h"
33 #include "net/quic/quic_http_stream.h"
34 #include "net/socket/client_socket_handle.h"
35 #include "net/socket/client_socket_pool.h"
36 #include "net/socket/client_socket_pool_manager.h"
37 #include "net/socket/socks_client_socket_pool.h"
38 #include "net/socket/ssl_client_socket.h"
39 #include "net/socket/ssl_client_socket_pool.h"
40 #include "net/spdy/spdy_http_stream.h"
41 #include "net/spdy/spdy_session.h"
42 #include "net/spdy/spdy_session_pool.h"
43 #include "net/ssl/ssl_cert_request_info.h"
47 // Returns parameters associated with the start of a HTTP stream job.
48 base::Value
* NetLogHttpStreamJobCallback(const GURL
* original_url
,
50 RequestPriority priority
,
51 NetLog::LogLevel
/* log_level */) {
52 base::DictionaryValue
* dict
= new base::DictionaryValue();
53 dict
->SetString("original_url", original_url
->GetOrigin().spec());
54 dict
->SetString("url", url
->GetOrigin().spec());
55 dict
->SetString("priority", RequestPriorityToString(priority
));
59 // Returns parameters associated with the Proto (with NPN negotiation) of a HTTP
61 base::Value
* NetLogHttpStreamProtoCallback(
62 const SSLClientSocket::NextProtoStatus status
,
63 const std::string
* proto
,
64 const std::string
* server_protos
,
65 NetLog::LogLevel
/* log_level */) {
66 base::DictionaryValue
* dict
= new base::DictionaryValue();
68 dict
->SetString("next_proto_status",
69 SSLClientSocket::NextProtoStatusToString(status
));
70 dict
->SetString("proto", *proto
);
71 dict
->SetString("server_protos",
72 SSLClientSocket::ServerProtosToString(*server_protos
));
76 HttpStreamFactoryImpl::Job::Job(HttpStreamFactoryImpl
* stream_factory
,
77 HttpNetworkSession
* session
,
78 const HttpRequestInfo
& request_info
,
79 RequestPriority priority
,
80 const SSLConfig
& server_ssl_config
,
81 const SSLConfig
& proxy_ssl_config
,
84 request_info_(request_info
),
86 server_ssl_config_(server_ssl_config
),
87 proxy_ssl_config_(proxy_ssl_config
),
88 net_log_(BoundNetLog::Make(net_log
, NetLog::SOURCE_HTTP_STREAM_JOB
)),
89 io_callback_(base::Bind(&Job::OnIOComplete
, base::Unretained(this))),
90 connection_(new ClientSocketHandle
),
92 stream_factory_(stream_factory
),
93 next_state_(STATE_NONE
),
100 quic_request_(session_
->quic_stream_factory()),
101 force_spdy_always_(HttpStreamFactory::force_spdy_always()),
102 force_spdy_over_ssl_(HttpStreamFactory::force_spdy_over_ssl()),
103 spdy_certificate_error_(OK
),
104 establishing_tunnel_(false),
105 was_npn_negotiated_(false),
106 protocol_negotiated_(kProtoUnknown
),
108 spdy_session_direct_(false),
109 existing_available_pipeline_(false),
111 DCHECK(stream_factory
);
115 HttpStreamFactoryImpl::Job::~Job() {
116 net_log_
.EndEvent(NetLog::TYPE_HTTP_STREAM_JOB
);
118 // When we're in a partially constructed state, waiting for the user to
119 // provide certificate handling information or authentication, we can't reuse
120 // this stream at all.
121 if (next_state_
== STATE_WAITING_USER_ACTION
) {
122 connection_
->socket()->Disconnect();
127 session_
->proxy_service()->CancelPacRequest(pac_request_
);
129 // The stream could be in a partial state. It is not reusable.
130 if (stream_
.get() && next_state_
!= STATE_DONE
)
131 stream_
->Close(true /* not reusable */);
134 void HttpStreamFactoryImpl::Job::Start(Request
* request
) {
140 int HttpStreamFactoryImpl::Job::Preconnect(int num_streams
) {
141 DCHECK_GT(num_streams
, 0);
142 HostPortPair origin_server
=
143 HostPortPair(request_info_
.url
.HostNoBrackets(),
144 request_info_
.url
.EffectiveIntPort());
145 base::WeakPtr
<HttpServerProperties
> http_server_properties
=
146 session_
->http_server_properties();
147 if (http_server_properties
&&
148 http_server_properties
->SupportsSpdy(origin_server
)) {
151 num_streams_
= num_streams
;
153 return StartInternal();
156 int HttpStreamFactoryImpl::Job::RestartTunnelWithProxyAuth(
157 const AuthCredentials
& credentials
) {
158 DCHECK(establishing_tunnel_
);
159 next_state_
= STATE_RESTART_TUNNEL_AUTH
;
164 LoadState
HttpStreamFactoryImpl::Job::GetLoadState() const {
165 switch (next_state_
) {
166 case STATE_RESOLVE_PROXY_COMPLETE
:
167 return session_
->proxy_service()->GetLoadState(pac_request_
);
168 case STATE_INIT_CONNECTION_COMPLETE
:
169 case STATE_CREATE_STREAM_COMPLETE
:
170 return using_quic_
? LOAD_STATE_CONNECTING
: connection_
->GetLoadState();
172 return LOAD_STATE_IDLE
;
176 void HttpStreamFactoryImpl::Job::MarkAsAlternate(
177 const GURL
& original_url
,
178 PortAlternateProtocolPair alternate
) {
179 DCHECK(!original_url_
.get());
180 original_url_
.reset(new GURL(original_url
));
181 if (alternate
.protocol
== QUIC
) {
182 DCHECK(session_
->params().enable_quic
);
187 void HttpStreamFactoryImpl::Job::WaitFor(Job
* job
) {
188 DCHECK_EQ(STATE_NONE
, next_state_
);
189 DCHECK_EQ(STATE_NONE
, job
->next_state_
);
190 DCHECK(!blocking_job_
);
191 DCHECK(!job
->waiting_job_
);
193 job
->waiting_job_
= this;
196 void HttpStreamFactoryImpl::Job::Resume(Job
* job
) {
197 DCHECK_EQ(blocking_job_
, job
);
198 blocking_job_
= NULL
;
200 // We know we're blocked if the next_state_ is STATE_WAIT_FOR_JOB_COMPLETE.
202 if (next_state_
== STATE_WAIT_FOR_JOB_COMPLETE
) {
203 base::MessageLoop::current()->PostTask(
205 base::Bind(&HttpStreamFactoryImpl::Job::OnIOComplete
,
206 ptr_factory_
.GetWeakPtr(), OK
));
210 void HttpStreamFactoryImpl::Job::Orphan(const Request
* request
) {
211 DCHECK_EQ(request_
, request
);
214 // We've been orphaned, but there's a job we're blocked on. Don't bother
215 // racing, just cancel ourself.
216 DCHECK(blocking_job_
->waiting_job_
);
217 blocking_job_
->waiting_job_
= NULL
;
218 blocking_job_
= NULL
;
219 if (stream_factory_
->for_websockets_
&&
220 connection_
&& connection_
->socket())
221 connection_
->socket()->Disconnect();
222 stream_factory_
->OnOrphanedJobComplete(this);
223 } else if (stream_factory_
->for_websockets_
) {
224 // We cancel this job because a WebSocketHandshakeStream can't be created
225 // without a WebSocketHandshakeStreamBase::CreateHelper which is stored in
226 // the Request class and isn't accessible from this job.
227 if (connection_
&& connection_
->socket())
228 connection_
->socket()->Disconnect();
229 stream_factory_
->OnOrphanedJobComplete(this);
233 void HttpStreamFactoryImpl::Job::SetPriority(RequestPriority priority
) {
234 priority_
= priority
;
235 // TODO(akalin): Propagate this to |connection_| and maybe the
239 bool HttpStreamFactoryImpl::Job::was_npn_negotiated() const {
240 return was_npn_negotiated_
;
243 NextProto
HttpStreamFactoryImpl::Job::protocol_negotiated() const {
244 return protocol_negotiated_
;
247 bool HttpStreamFactoryImpl::Job::using_spdy() const {
251 const SSLConfig
& HttpStreamFactoryImpl::Job::server_ssl_config() const {
252 return server_ssl_config_
;
255 const SSLConfig
& HttpStreamFactoryImpl::Job::proxy_ssl_config() const {
256 return proxy_ssl_config_
;
259 const ProxyInfo
& HttpStreamFactoryImpl::Job::proxy_info() const {
263 void HttpStreamFactoryImpl::Job::GetSSLInfo() {
265 DCHECK(!establishing_tunnel_
);
266 DCHECK(connection_
.get() && connection_
->socket());
267 SSLClientSocket
* ssl_socket
=
268 static_cast<SSLClientSocket
*>(connection_
->socket());
269 ssl_socket
->GetSSLInfo(&ssl_info_
);
272 SpdySessionKey
HttpStreamFactoryImpl::Job::GetSpdySessionKey() const {
273 // In the case that we're using an HTTPS proxy for an HTTP url,
274 // we look for a SPDY session *to* the proxy, instead of to the
276 PrivacyMode privacy_mode
= request_info_
.privacy_mode
;
277 if (IsHttpsProxyAndHttpUrl()) {
278 return SpdySessionKey(proxy_info_
.proxy_server().host_port_pair(),
279 ProxyServer::Direct(),
282 return SpdySessionKey(origin_
,
283 proxy_info_
.proxy_server(),
288 bool HttpStreamFactoryImpl::Job::CanUseExistingSpdySession() const {
289 // We need to make sure that if a spdy session was created for
290 // https://somehost/ that we don't use that session for http://somehost:443/.
291 // The only time we can use an existing session is if the request URL is
292 // https (the normal case) or if we're connection to a SPDY proxy, or
293 // if we're running with force_spdy_always_. crbug.com/133176
294 // TODO(ricea): Add "wss" back to this list when SPDY WebSocket support is
296 return request_info_
.url
.SchemeIs("https") ||
297 proxy_info_
.proxy_server().is_https() ||
301 void HttpStreamFactoryImpl::Job::OnStreamReadyCallback() {
302 DCHECK(stream_
.get());
303 DCHECK(!IsPreconnecting());
304 DCHECK(!stream_factory_
->for_websockets_
);
306 stream_factory_
->OnOrphanedJobComplete(this);
308 request_
->Complete(was_npn_negotiated(),
309 protocol_negotiated(),
312 request_
->OnStreamReady(this, server_ssl_config_
, proxy_info_
,
315 // |this| may be deleted after this call.
318 void HttpStreamFactoryImpl::Job::OnWebSocketHandshakeStreamReadyCallback() {
319 DCHECK(websocket_stream_
);
320 DCHECK(!IsPreconnecting());
321 DCHECK(stream_factory_
->for_websockets_
);
322 // An orphaned WebSocket job will be closed immediately and
324 DCHECK(!IsOrphaned());
325 request_
->Complete(was_npn_negotiated(),
326 protocol_negotiated(),
329 request_
->OnWebSocketHandshakeStreamReady(this,
332 websocket_stream_
.release());
333 // |this| may be deleted after this call.
336 void HttpStreamFactoryImpl::Job::OnNewSpdySessionReadyCallback() {
337 DCHECK(stream_
.get());
338 DCHECK(!IsPreconnecting());
339 DCHECK(using_spdy());
340 // Note: an event loop iteration has passed, so |new_spdy_session_| may be
341 // NULL at this point if the SpdySession closed immediately after creation.
342 base::WeakPtr
<SpdySession
> spdy_session
= new_spdy_session_
;
343 new_spdy_session_
.reset();
346 stream_factory_
->OnNewSpdySessionReady(
347 spdy_session
, spdy_session_direct_
, server_ssl_config_
, proxy_info_
,
348 was_npn_negotiated(), protocol_negotiated(), using_spdy(), net_log_
);
350 stream_factory_
->OnOrphanedJobComplete(this);
352 request_
->OnNewSpdySessionReady(
353 this, stream_
.Pass(), spdy_session
, spdy_session_direct_
);
355 // |this| may be deleted after this call.
358 void HttpStreamFactoryImpl::Job::OnStreamFailedCallback(int result
) {
359 DCHECK(!IsPreconnecting());
361 stream_factory_
->OnOrphanedJobComplete(this);
363 request_
->OnStreamFailed(this, result
, server_ssl_config_
);
364 // |this| may be deleted after this call.
367 void HttpStreamFactoryImpl::Job::OnCertificateErrorCallback(
368 int result
, const SSLInfo
& ssl_info
) {
369 DCHECK(!IsPreconnecting());
371 stream_factory_
->OnOrphanedJobComplete(this);
373 request_
->OnCertificateError(this, result
, server_ssl_config_
, ssl_info
);
374 // |this| may be deleted after this call.
377 void HttpStreamFactoryImpl::Job::OnNeedsProxyAuthCallback(
378 const HttpResponseInfo
& response
,
379 HttpAuthController
* auth_controller
) {
380 DCHECK(!IsPreconnecting());
382 stream_factory_
->OnOrphanedJobComplete(this);
384 request_
->OnNeedsProxyAuth(
385 this, response
, server_ssl_config_
, proxy_info_
, auth_controller
);
386 // |this| may be deleted after this call.
389 void HttpStreamFactoryImpl::Job::OnNeedsClientAuthCallback(
390 SSLCertRequestInfo
* cert_info
) {
391 DCHECK(!IsPreconnecting());
393 stream_factory_
->OnOrphanedJobComplete(this);
395 request_
->OnNeedsClientAuth(this, server_ssl_config_
, cert_info
);
396 // |this| may be deleted after this call.
399 void HttpStreamFactoryImpl::Job::OnHttpsProxyTunnelResponseCallback(
400 const HttpResponseInfo
& response_info
,
401 HttpStream
* stream
) {
402 DCHECK(!IsPreconnecting());
404 stream_factory_
->OnOrphanedJobComplete(this);
406 request_
->OnHttpsProxyTunnelResponse(
407 this, response_info
, server_ssl_config_
, proxy_info_
, stream
);
408 // |this| may be deleted after this call.
411 void HttpStreamFactoryImpl::Job::OnPreconnectsComplete() {
413 if (new_spdy_session_
.get()) {
414 stream_factory_
->OnNewSpdySessionReady(new_spdy_session_
,
415 spdy_session_direct_
,
418 was_npn_negotiated(),
419 protocol_negotiated(),
423 stream_factory_
->OnPreconnectsComplete(this);
424 // |this| may be deleted after this call.
428 int HttpStreamFactoryImpl::Job::OnHostResolution(
429 SpdySessionPool
* spdy_session_pool
,
430 const SpdySessionKey
& spdy_session_key
,
431 const AddressList
& addresses
,
432 const BoundNetLog
& net_log
) {
433 // It is OK to dereference spdy_session_pool, because the
434 // ClientSocketPoolManager will be destroyed in the same callback that
435 // destroys the SpdySessionPool.
437 spdy_session_pool
->FindAvailableSession(spdy_session_key
, net_log
) ?
438 ERR_SPDY_SESSION_ALREADY_EXISTS
: OK
;
441 void HttpStreamFactoryImpl::Job::OnIOComplete(int result
) {
445 int HttpStreamFactoryImpl::Job::RunLoop(int result
) {
446 result
= DoLoop(result
);
448 if (result
== ERR_IO_PENDING
)
451 // If there was an error, we should have already resumed the |waiting_job_|,
453 DCHECK(result
== OK
|| waiting_job_
== NULL
);
455 if (IsPreconnecting()) {
456 base::MessageLoop::current()->PostTask(
458 base::Bind(&HttpStreamFactoryImpl::Job::OnPreconnectsComplete
,
459 ptr_factory_
.GetWeakPtr()));
460 return ERR_IO_PENDING
;
463 if (IsCertificateError(result
)) {
464 // Retrieve SSL information from the socket.
467 next_state_
= STATE_WAITING_USER_ACTION
;
468 base::MessageLoop::current()->PostTask(
470 base::Bind(&HttpStreamFactoryImpl::Job::OnCertificateErrorCallback
,
471 ptr_factory_
.GetWeakPtr(), result
, ssl_info_
));
472 return ERR_IO_PENDING
;
476 case ERR_PROXY_AUTH_REQUESTED
: {
477 DCHECK(connection_
.get());
478 DCHECK(connection_
->socket());
479 DCHECK(establishing_tunnel_
);
481 next_state_
= STATE_WAITING_USER_ACTION
;
482 ProxyClientSocket
* proxy_socket
=
483 static_cast<ProxyClientSocket
*>(connection_
->socket());
484 base::MessageLoop::current()->PostTask(
486 base::Bind(&Job::OnNeedsProxyAuthCallback
, ptr_factory_
.GetWeakPtr(),
487 *proxy_socket
->GetConnectResponseInfo(),
488 proxy_socket
->GetAuthController()));
489 return ERR_IO_PENDING
;
492 case ERR_SSL_CLIENT_AUTH_CERT_NEEDED
:
493 base::MessageLoop::current()->PostTask(
495 base::Bind(&Job::OnNeedsClientAuthCallback
, ptr_factory_
.GetWeakPtr(),
496 connection_
->ssl_error_response_info().cert_request_info
));
497 return ERR_IO_PENDING
;
499 case ERR_HTTPS_PROXY_TUNNEL_RESPONSE
: {
500 DCHECK(connection_
.get());
501 DCHECK(connection_
->socket());
502 DCHECK(establishing_tunnel_
);
504 ProxyClientSocket
* proxy_socket
=
505 static_cast<ProxyClientSocket
*>(connection_
->socket());
506 base::MessageLoop::current()->PostTask(
508 base::Bind(&Job::OnHttpsProxyTunnelResponseCallback
,
509 ptr_factory_
.GetWeakPtr(),
510 *proxy_socket
->GetConnectResponseInfo(),
511 proxy_socket
->CreateConnectResponseStream()));
512 return ERR_IO_PENDING
;
516 next_state_
= STATE_DONE
;
517 if (new_spdy_session_
.get()) {
518 base::MessageLoop::current()->PostTask(
520 base::Bind(&Job::OnNewSpdySessionReadyCallback
,
521 ptr_factory_
.GetWeakPtr()));
522 } else if (stream_factory_
->for_websockets_
) {
523 DCHECK(websocket_stream_
);
524 base::MessageLoop::current()->PostTask(
526 base::Bind(&Job::OnWebSocketHandshakeStreamReadyCallback
,
527 ptr_factory_
.GetWeakPtr()));
529 DCHECK(stream_
.get());
530 base::MessageLoop::current()->PostTask(
532 base::Bind(&Job::OnStreamReadyCallback
, ptr_factory_
.GetWeakPtr()));
534 return ERR_IO_PENDING
;
537 base::MessageLoop::current()->PostTask(
539 base::Bind(&Job::OnStreamFailedCallback
, ptr_factory_
.GetWeakPtr(),
541 return ERR_IO_PENDING
;
545 int HttpStreamFactoryImpl::Job::DoLoop(int result
) {
546 DCHECK_NE(next_state_
, STATE_NONE
);
549 State state
= next_state_
;
550 next_state_
= STATE_NONE
;
556 case STATE_RESOLVE_PROXY
:
558 rv
= DoResolveProxy();
560 case STATE_RESOLVE_PROXY_COMPLETE
:
561 rv
= DoResolveProxyComplete(rv
);
563 case STATE_WAIT_FOR_JOB
:
567 case STATE_WAIT_FOR_JOB_COMPLETE
:
568 rv
= DoWaitForJobComplete(rv
);
570 case STATE_INIT_CONNECTION
:
572 rv
= DoInitConnection();
574 case STATE_INIT_CONNECTION_COMPLETE
:
575 rv
= DoInitConnectionComplete(rv
);
577 case STATE_WAITING_USER_ACTION
:
578 rv
= DoWaitingUserAction(rv
);
580 case STATE_RESTART_TUNNEL_AUTH
:
582 rv
= DoRestartTunnelAuth();
584 case STATE_RESTART_TUNNEL_AUTH_COMPLETE
:
585 rv
= DoRestartTunnelAuthComplete(rv
);
587 case STATE_CREATE_STREAM
:
589 rv
= DoCreateStream();
591 case STATE_CREATE_STREAM_COMPLETE
:
592 rv
= DoCreateStreamComplete(rv
);
595 NOTREACHED() << "bad state";
599 } while (rv
!= ERR_IO_PENDING
&& next_state_
!= STATE_NONE
);
603 int HttpStreamFactoryImpl::Job::StartInternal() {
604 CHECK_EQ(STATE_NONE
, next_state_
);
605 next_state_
= STATE_START
;
606 int rv
= RunLoop(OK
);
607 DCHECK_EQ(ERR_IO_PENDING
, rv
);
611 int HttpStreamFactoryImpl::Job::DoStart() {
612 int port
= request_info_
.url
.EffectiveIntPort();
613 origin_
= HostPortPair(request_info_
.url
.HostNoBrackets(), port
);
614 origin_url_
= stream_factory_
->ApplyHostMappingRules(
615 request_info_
.url
, &origin_
);
616 http_pipelining_key_
.reset(new HttpPipelinedHost::Key(origin_
));
618 net_log_
.BeginEvent(NetLog::TYPE_HTTP_STREAM_JOB
,
619 base::Bind(&NetLogHttpStreamJobCallback
,
620 &request_info_
.url
, &origin_url_
,
623 // Don't connect to restricted ports.
624 bool is_port_allowed
= IsPortAllowedByDefault(port
);
625 if (request_info_
.url
.SchemeIs("ftp")) {
626 // Never share connection with other jobs for FTP requests.
627 DCHECK(!waiting_job_
);
629 is_port_allowed
= IsPortAllowedByFtp(port
);
631 if (!is_port_allowed
&& !IsPortAllowedByOverride(port
)) {
633 waiting_job_
->Resume(this);
636 return ERR_UNSAFE_PORT
;
639 next_state_
= STATE_RESOLVE_PROXY
;
643 int HttpStreamFactoryImpl::Job::DoResolveProxy() {
644 DCHECK(!pac_request_
);
646 next_state_
= STATE_RESOLVE_PROXY_COMPLETE
;
648 if (request_info_
.load_flags
& LOAD_BYPASS_PROXY
) {
649 proxy_info_
.UseDirect();
653 return session_
->proxy_service()->ResolveProxy(
654 request_info_
.url
, &proxy_info_
, io_callback_
, &pac_request_
, net_log_
);
657 int HttpStreamFactoryImpl::Job::DoResolveProxyComplete(int result
) {
661 // Remove unsupported proxies from the list.
662 proxy_info_
.RemoveProxiesWithoutScheme(
663 ProxyServer::SCHEME_DIRECT
| ProxyServer::SCHEME_QUIC
|
664 ProxyServer::SCHEME_HTTP
| ProxyServer::SCHEME_HTTPS
|
665 ProxyServer::SCHEME_SOCKS4
| ProxyServer::SCHEME_SOCKS5
);
667 if (proxy_info_
.is_empty()) {
668 // No proxies/direct to choose from. This happens when we don't support
669 // any of the proxies in the returned list.
670 result
= ERR_NO_SUPPORTED_PROXIES
;
671 } else if (using_quic_
&&
672 (!proxy_info_
.is_quic() && !proxy_info_
.is_direct())) {
673 // QUIC can not be spoken to non-QUIC proxies. This error should not be
674 // user visible, because the non-alternate job should be resumed.
675 result
= ERR_NO_SUPPORTED_PROXIES
;
681 waiting_job_
->Resume(this);
688 next_state_
= STATE_WAIT_FOR_JOB
;
690 next_state_
= STATE_INIT_CONNECTION
;
694 bool HttpStreamFactoryImpl::Job::ShouldForceSpdySSL() const {
695 bool rv
= force_spdy_always_
&& force_spdy_over_ssl_
;
696 return rv
&& !HttpStreamFactory::HasSpdyExclusion(origin_
);
699 bool HttpStreamFactoryImpl::Job::ShouldForceSpdyWithoutSSL() const {
700 bool rv
= force_spdy_always_
&& !force_spdy_over_ssl_
;
701 return rv
&& !HttpStreamFactory::HasSpdyExclusion(origin_
);
704 bool HttpStreamFactoryImpl::Job::ShouldForceQuic() const {
705 return session_
->params().enable_quic
&&
706 session_
->params().origin_to_force_quic_on
.Equals(origin_
) &&
707 proxy_info_
.is_direct();
710 int HttpStreamFactoryImpl::Job::DoWaitForJob() {
711 DCHECK(blocking_job_
);
712 next_state_
= STATE_WAIT_FOR_JOB_COMPLETE
;
713 return ERR_IO_PENDING
;
716 int HttpStreamFactoryImpl::Job::DoWaitForJobComplete(int result
) {
717 DCHECK(!blocking_job_
);
718 DCHECK_EQ(OK
, result
);
719 next_state_
= STATE_INIT_CONNECTION
;
723 int HttpStreamFactoryImpl::Job::DoInitConnection() {
724 DCHECK(!blocking_job_
);
725 DCHECK(!connection_
->is_initialized());
726 DCHECK(proxy_info_
.proxy_server().is_valid());
727 next_state_
= STATE_INIT_CONNECTION_COMPLETE
;
729 using_ssl_
= request_info_
.url
.SchemeIs("https") ||
730 request_info_
.url
.SchemeIs("wss") || ShouldForceSpdySSL();
733 if (ShouldForceQuic())
736 if (proxy_info_
.is_quic())
740 DCHECK(session_
->params().enable_quic
);
741 if (proxy_info_
.is_quic() && !request_info_
.url
.SchemeIs("http")) {
743 // TODO(rch): support QUIC proxies for HTTPS urls.
744 return ERR_NOT_IMPLEMENTED
;
746 HostPortPair destination
= proxy_info_
.is_quic() ?
747 proxy_info_
.proxy_server().host_port_pair() : origin_
;
748 next_state_
= STATE_INIT_CONNECTION_COMPLETE
;
749 bool secure_quic
= using_ssl_
|| proxy_info_
.is_quic();
750 int rv
= quic_request_
.Request(
751 destination
, secure_quic
, request_info_
.privacy_mode
,
752 request_info_
.method
, net_log_
, io_callback_
);
754 // OK, there's no available QUIC session. Let |waiting_job_| resume
757 waiting_job_
->Resume(this);
764 // Check first if we have a spdy session for this group. If so, then go
765 // straight to using that.
766 SpdySessionKey spdy_session_key
= GetSpdySessionKey();
767 base::WeakPtr
<SpdySession
> spdy_session
=
768 session_
->spdy_session_pool()->FindAvailableSession(
769 spdy_session_key
, net_log_
);
770 if (spdy_session
&& CanUseExistingSpdySession()) {
771 // If we're preconnecting, but we already have a SpdySession, we don't
772 // actually need to preconnect any sockets, so we're done.
773 if (IsPreconnecting())
776 next_state_
= STATE_CREATE_STREAM
;
777 existing_spdy_session_
= spdy_session
;
779 } else if (request_
&& (using_ssl_
|| ShouldForceSpdyWithoutSSL())) {
780 // Update the spdy session key for the request that launched this job.
781 request_
->SetSpdySessionKey(spdy_session_key
);
782 } else if (IsRequestEligibleForPipelining()) {
783 // TODO(simonjam): With pipelining, we might be better off using fewer
784 // connections and thus should make fewer preconnections. Explore
785 // preconnecting fewer than the requested num_connections.
787 // Separate note: A forced pipeline is always available if one exists for
788 // this key. This is different than normal pipelines, which may be
789 // unavailable or unusable. So, there is no need to worry about a race
790 // between when a pipeline becomes available and when this job blocks.
791 existing_available_pipeline_
= stream_factory_
->http_pipelined_host_pool_
.
792 IsExistingPipelineAvailableForKey(*http_pipelining_key_
.get());
793 if (existing_available_pipeline_
) {
796 bool was_new_key
= request_
->SetHttpPipeliningKey(
797 *http_pipelining_key_
.get());
798 if (!was_new_key
&& session_
->force_http_pipelining()) {
799 return ERR_IO_PENDING
;
804 // OK, there's no available SPDY session. Let |waiting_job_| resume if it's
808 waiting_job_
->Resume(this);
812 if (proxy_info_
.is_http() || proxy_info_
.is_https())
813 establishing_tunnel_
= using_ssl_
;
815 bool want_spdy_over_npn
= original_url_
!= NULL
;
817 if (proxy_info_
.is_https()) {
818 InitSSLConfig(proxy_info_
.proxy_server().host_port_pair(),
820 true /* is a proxy server */);
821 // Disable revocation checking for HTTPS proxies since the revocation
822 // requests are probably going to need to go through the proxy too.
823 proxy_ssl_config_
.rev_checking_enabled
= false;
826 InitSSLConfig(origin_
, &server_ssl_config_
,
827 false /* not a proxy server */);
830 if (IsPreconnecting()) {
831 DCHECK(!stream_factory_
->for_websockets_
);
832 return PreconnectSocketsForHttpRequest(
834 request_info_
.extra_headers
,
835 request_info_
.load_flags
,
839 ShouldForceSpdySSL(),
843 request_info_
.privacy_mode
,
847 // If we can't use a SPDY session, don't both checking for one after
848 // the hostname is resolved.
849 OnHostResolutionCallback resolution_callback
= CanUseExistingSpdySession() ?
850 base::Bind(&Job::OnHostResolution
, session_
->spdy_session_pool(),
851 GetSpdySessionKey()) :
852 OnHostResolutionCallback();
853 if (stream_factory_
->for_websockets_
) {
854 // TODO(ricea): Re-enable NPN when WebSockets over SPDY is supported.
855 SSLConfig websocket_server_ssl_config
= server_ssl_config_
;
856 websocket_server_ssl_config
.next_protos
.clear();
857 return InitSocketHandleForWebSocketRequest(
858 origin_url_
, request_info_
.extra_headers
, request_info_
.load_flags
,
859 priority_
, session_
, proxy_info_
, ShouldForceSpdySSL(),
860 want_spdy_over_npn
, websocket_server_ssl_config
, proxy_ssl_config_
,
861 request_info_
.privacy_mode
, net_log_
,
862 connection_
.get(), resolution_callback
, io_callback_
);
864 return InitSocketHandleForHttpRequest(
865 origin_url_
, request_info_
.extra_headers
, request_info_
.load_flags
,
866 priority_
, session_
, proxy_info_
, ShouldForceSpdySSL(),
867 want_spdy_over_npn
, server_ssl_config_
, proxy_ssl_config_
,
868 request_info_
.privacy_mode
, net_log_
,
869 connection_
.get(), resolution_callback
, io_callback_
);
873 int HttpStreamFactoryImpl::Job::DoInitConnectionComplete(int result
) {
874 if (IsPreconnecting()) {
877 DCHECK_EQ(OK
, result
);
881 if (result
== ERR_SPDY_SESSION_ALREADY_EXISTS
) {
882 // We found a SPDY connection after resolving the host. This is
883 // probably an IP pooled connection.
884 SpdySessionKey spdy_session_key
= GetSpdySessionKey();
885 existing_spdy_session_
=
886 session_
->spdy_session_pool()->FindAvailableSession(
887 spdy_session_key
, net_log_
);
888 if (existing_spdy_session_
) {
890 next_state_
= STATE_CREATE_STREAM
;
892 // It is possible that the spdy session no longer exists.
893 ReturnToStateInitConnection(true /* close connection */);
898 // TODO(willchan): Make this a bit more exact. Maybe there are recoverable
899 // errors, such as ignoring certificate errors for Alternate-Protocol.
900 if (result
< 0 && waiting_job_
) {
901 waiting_job_
->Resume(this);
905 if (result
< 0 && session_
->force_http_pipelining()) {
906 stream_factory_
->AbortPipelinedRequestsWithKey(
907 this, *http_pipelining_key_
.get(), result
, server_ssl_config_
);
910 // |result| may be the result of any of the stacked pools. The following
911 // logic is used when determining how to interpret an error.
913 // and connection_->socket() != NULL, then the SSL handshake ran and it
914 // is a potentially recoverable error.
915 // and connection_->socket == NULL and connection_->is_ssl_error() is true,
916 // then the SSL handshake ran with an unrecoverable error.
917 // otherwise, the error came from one of the other pools.
918 bool ssl_started
= using_ssl_
&& (result
== OK
|| connection_
->socket() ||
919 connection_
->is_ssl_error());
921 if (ssl_started
&& (result
== OK
|| IsCertificateError(result
))) {
922 if (using_quic_
&& result
== OK
) {
923 was_npn_negotiated_
= true;
924 NextProto protocol_negotiated
=
925 SSLClientSocket::NextProtoFromString("quic/1+spdy/3");
926 protocol_negotiated_
= protocol_negotiated
;
928 SSLClientSocket
* ssl_socket
=
929 static_cast<SSLClientSocket
*>(connection_
->socket());
930 if (ssl_socket
->WasNpnNegotiated()) {
931 was_npn_negotiated_
= true;
933 std::string server_protos
;
934 SSLClientSocket::NextProtoStatus status
=
935 ssl_socket
->GetNextProto(&proto
, &server_protos
);
936 NextProto protocol_negotiated
=
937 SSLClientSocket::NextProtoFromString(proto
);
938 protocol_negotiated_
= protocol_negotiated
;
940 NetLog::TYPE_HTTP_STREAM_REQUEST_PROTO
,
941 base::Bind(&NetLogHttpStreamProtoCallback
,
942 status
, &proto
, &server_protos
));
943 if (ssl_socket
->was_spdy_negotiated())
946 if (ShouldForceSpdySSL())
949 } else if (proxy_info_
.is_https() && connection_
->socket() &&
951 ProxyClientSocket
* proxy_socket
=
952 static_cast<ProxyClientSocket
*>(connection_
->socket());
953 if (proxy_socket
->IsUsingSpdy()) {
954 was_npn_negotiated_
= true;
955 protocol_negotiated_
= proxy_socket
->GetProtocolNegotiated();
960 // We may be using spdy without SSL
961 if (ShouldForceSpdyWithoutSSL())
964 if (result
== ERR_PROXY_AUTH_REQUESTED
||
965 result
== ERR_HTTPS_PROXY_TUNNEL_RESPONSE
) {
966 DCHECK(!ssl_started
);
967 // Other state (i.e. |using_ssl_|) suggests that |connection_| will have an
968 // SSL socket, but there was an error before that could happen. This
969 // puts the in progress HttpProxy socket into |connection_| in order to
970 // complete the auth (or read the response body). The tunnel restart code
971 // is careful to remove it before returning control to the rest of this
973 connection_
.reset(connection_
->release_pending_http_proxy_connection());
977 if (!ssl_started
&& result
< 0 && original_url_
.get()) {
978 // Mark the alternate protocol as broken and fallback.
979 session_
->http_server_properties()->SetBrokenAlternateProtocol(
980 HostPortPair::FromURL(*original_url_
));
987 stream_
= quic_request_
.ReleaseStream();
988 next_state_
= STATE_NONE
;
992 if (result
< 0 && !ssl_started
)
993 return ReconsiderProxyAfterError(result
);
994 establishing_tunnel_
= false;
996 if (connection_
->socket()) {
997 LogHttpConnectedMetrics(*connection_
);
999 // We officially have a new connection. Record the type.
1000 if (!connection_
->is_reused()) {
1001 ConnectionType type
= using_spdy_
? CONNECTION_SPDY
: CONNECTION_HTTP
;
1002 UpdateConnectionTypeHistograms(type
);
1006 // Handle SSL errors below.
1008 DCHECK(ssl_started
);
1009 if (IsCertificateError(result
)) {
1010 if (using_spdy_
&& original_url_
.get() &&
1011 original_url_
->SchemeIs("http")) {
1012 // We ignore certificate errors for http over spdy.
1013 spdy_certificate_error_
= result
;
1016 result
= HandleCertificateError(result
);
1017 if (result
== OK
&& !connection_
->socket()->IsConnectedAndIdle()) {
1018 ReturnToStateInitConnection(true /* close connection */);
1027 next_state_
= STATE_CREATE_STREAM
;
1031 int HttpStreamFactoryImpl::Job::DoWaitingUserAction(int result
) {
1032 // This state indicates that the stream request is in a partially
1033 // completed state, and we've called back to the delegate for more
1036 // We're always waiting here for the delegate to call us back.
1037 return ERR_IO_PENDING
;
1040 int HttpStreamFactoryImpl::Job::DoCreateStream() {
1041 DCHECK(connection_
->socket() || existing_spdy_session_
.get() ||
1042 existing_available_pipeline_
|| using_quic_
);
1044 next_state_
= STATE_CREATE_STREAM_COMPLETE
;
1046 // We only set the socket motivation if we're the first to use
1047 // this socket. Is there a race for two SPDY requests? We really
1048 // need to plumb this through to the connect level.
1049 if (connection_
->socket() && !connection_
->is_reused())
1050 SetSocketMotivation();
1053 // We may get ftp scheme when fetching ftp resources through proxy.
1054 bool using_proxy
= (proxy_info_
.is_http() || proxy_info_
.is_https()) &&
1055 (request_info_
.url
.SchemeIs("http") ||
1056 request_info_
.url
.SchemeIs("ftp"));
1057 if (stream_factory_
->http_pipelined_host_pool_
.
1058 IsExistingPipelineAvailableForKey(*http_pipelining_key_
.get())) {
1059 DCHECK(!stream_factory_
->for_websockets_
);
1060 stream_
.reset(stream_factory_
->http_pipelined_host_pool_
.
1061 CreateStreamOnExistingPipeline(
1062 *http_pipelining_key_
.get()));
1063 CHECK(stream_
.get());
1064 } else if (stream_factory_
->for_websockets_
) {
1066 DCHECK(request_
->websocket_handshake_stream_create_helper());
1067 websocket_stream_
.reset(
1068 request_
->websocket_handshake_stream_create_helper()
1069 ->CreateBasicStream(connection_
.Pass(), using_proxy
));
1070 } else if (!using_proxy
&& IsRequestEligibleForPipelining()) {
1071 // TODO(simonjam): Support proxies.
1073 stream_factory_
->http_pipelined_host_pool_
.CreateStreamOnNewPipeline(
1074 *http_pipelining_key_
.get(),
1075 connection_
.release(),
1079 was_npn_negotiated_
,
1080 protocol_negotiated_
));
1081 CHECK(stream_
.get());
1083 stream_
.reset(new HttpBasicStream(connection_
.release(), using_proxy
));
1088 CHECK(!stream_
.get());
1091 const ProxyServer
& proxy_server
= proxy_info_
.proxy_server();
1092 PrivacyMode privacy_mode
= request_info_
.privacy_mode
;
1093 SpdySessionKey
spdy_session_key(origin_
, proxy_server
, privacy_mode
);
1094 if (IsHttpsProxyAndHttpUrl()) {
1095 // If we don't have a direct SPDY session, and we're using an HTTPS
1096 // proxy, then we might have a SPDY session to the proxy.
1097 // We never use privacy mode for connection to proxy server.
1098 spdy_session_key
= SpdySessionKey(proxy_server
.host_port_pair(),
1099 ProxyServer::Direct(),
1100 PRIVACY_MODE_DISABLED
);
1104 base::WeakPtr
<SpdySession
> spdy_session
;
1105 if (existing_spdy_session_
.get()) {
1106 // We picked up an existing session, so we don't need our socket.
1107 if (connection_
->socket())
1108 connection_
->socket()->Disconnect();
1109 connection_
->Reset();
1110 std::swap(spdy_session
, existing_spdy_session_
);
1112 SpdySessionPool
* spdy_pool
= session_
->spdy_session_pool();
1113 spdy_session
= spdy_pool
->FindAvailableSession(spdy_session_key
, net_log_
);
1114 if (!spdy_session
) {
1116 spdy_pool
->CreateAvailableSessionFromSocket(spdy_session_key
,
1119 spdy_certificate_error_
,
1121 const HostPortPair
& host_port_pair
= spdy_session_key
.host_port_pair();
1122 base::WeakPtr
<HttpServerProperties
> http_server_properties
=
1123 session_
->http_server_properties();
1124 if (http_server_properties
)
1125 http_server_properties
->SetSupportsSpdy(host_port_pair
, true);
1126 spdy_session_direct_
= direct
;
1128 // Create a SpdyHttpStream attached to the session;
1129 // OnNewSpdySessionReadyCallback is not called until an event loop
1130 // iteration later, so if the SpdySession is closed between then, allow
1131 // reuse state from the underlying socket, sampled by SpdyHttpStream,
1132 // bubble up to the request.
1133 bool use_relative_url
= direct
|| request_info_
.url
.SchemeIs("https");
1134 stream_
.reset(new SpdyHttpStream(new_spdy_session_
, use_relative_url
));
1141 return ERR_CONNECTION_CLOSED
;
1143 // TODO(willchan): Delete this code, because eventually, the
1144 // HttpStreamFactoryImpl will be creating all the SpdyHttpStreams, since it
1145 // will know when SpdySessions become available.
1147 if (stream_factory_
->for_websockets_
) {
1148 // TODO(ricea): Restore this code when WebSockets over SPDY is implemented.
1151 bool use_relative_url
= direct
|| request_info_
.url
.SchemeIs("https");
1152 stream_
.reset(new SpdyHttpStream(spdy_session
, use_relative_url
));
1157 int HttpStreamFactoryImpl::Job::DoCreateStreamComplete(int result
) {
1161 session_
->proxy_service()->ReportSuccess(proxy_info_
);
1162 next_state_
= STATE_NONE
;
1166 int HttpStreamFactoryImpl::Job::DoRestartTunnelAuth() {
1167 next_state_
= STATE_RESTART_TUNNEL_AUTH_COMPLETE
;
1168 ProxyClientSocket
* proxy_socket
=
1169 static_cast<ProxyClientSocket
*>(connection_
->socket());
1170 return proxy_socket
->RestartWithAuth(io_callback_
);
1173 int HttpStreamFactoryImpl::Job::DoRestartTunnelAuthComplete(int result
) {
1174 if (result
== ERR_PROXY_AUTH_REQUESTED
)
1178 // Now that we've got the HttpProxyClientSocket connected. We have
1179 // to release it as an idle socket into the pool and start the connection
1180 // process from the beginning. Trying to pass it in with the
1181 // SSLSocketParams might cause a deadlock since params are dispatched
1182 // interchangeably. This request won't necessarily get this http proxy
1183 // socket, but there will be forward progress.
1184 establishing_tunnel_
= false;
1185 ReturnToStateInitConnection(false /* do not close connection */);
1189 return ReconsiderProxyAfterError(result
);
1192 void HttpStreamFactoryImpl::Job::ReturnToStateInitConnection(
1193 bool close_connection
) {
1194 if (close_connection
&& connection_
->socket())
1195 connection_
->socket()->Disconnect();
1196 connection_
->Reset();
1199 request_
->RemoveRequestFromSpdySessionRequestMap();
1200 request_
->RemoveRequestFromHttpPipeliningRequestMap();
1203 next_state_
= STATE_INIT_CONNECTION
;
1206 void HttpStreamFactoryImpl::Job::SetSocketMotivation() {
1207 if (request_info_
.motivation
== HttpRequestInfo::PRECONNECT_MOTIVATED
)
1208 connection_
->socket()->SetSubresourceSpeculation();
1209 else if (request_info_
.motivation
== HttpRequestInfo::OMNIBOX_MOTIVATED
)
1210 connection_
->socket()->SetOmniboxSpeculation();
1211 // TODO(mbelshe): Add other motivations (like EARLY_LOAD_MOTIVATED).
1214 bool HttpStreamFactoryImpl::Job::IsHttpsProxyAndHttpUrl() const {
1215 if (!proxy_info_
.is_https())
1217 if (original_url_
.get()) {
1218 // We currently only support Alternate-Protocol where the original scheme
1220 DCHECK(original_url_
->SchemeIs("http"));
1221 return original_url_
->SchemeIs("http");
1223 return request_info_
.url
.SchemeIs("http");
1226 // Sets several fields of ssl_config for the given origin_server based on the
1227 // proxy info and other factors.
1228 void HttpStreamFactoryImpl::Job::InitSSLConfig(
1229 const HostPortPair
& origin_server
,
1230 SSLConfig
* ssl_config
,
1231 bool is_proxy
) const {
1232 if (proxy_info_
.is_https() && ssl_config
->send_client_cert
) {
1233 // When connecting through an HTTPS proxy, disable TLS False Start so
1234 // that client authentication errors can be distinguished between those
1235 // originating from the proxy server (ERR_PROXY_CONNECTION_FAILED) and
1236 // those originating from the endpoint (ERR_SSL_PROTOCOL_ERROR /
1237 // ERR_BAD_SSL_CLIENT_AUTH_CERT).
1238 // TODO(rch): This assumes that the HTTPS proxy will only request a
1239 // client certificate during the initial handshake.
1240 // http://crbug.com/59292
1241 ssl_config
->false_start_enabled
= false;
1245 FALLBACK_NONE
= 0, // SSL version fallback did not occur.
1246 FALLBACK_SSL3
= 1, // Fell back to SSL 3.0.
1247 FALLBACK_TLS1
= 2, // Fell back to TLS 1.0.
1248 FALLBACK_TLS1_1
= 3, // Fell back to TLS 1.1.
1252 int fallback
= FALLBACK_NONE
;
1253 if (ssl_config
->version_fallback
) {
1254 switch (ssl_config
->version_max
) {
1255 case SSL_PROTOCOL_VERSION_SSL3
:
1256 fallback
= FALLBACK_SSL3
;
1258 case SSL_PROTOCOL_VERSION_TLS1
:
1259 fallback
= FALLBACK_TLS1
;
1261 case SSL_PROTOCOL_VERSION_TLS1_1
:
1262 fallback
= FALLBACK_TLS1_1
;
1266 UMA_HISTOGRAM_ENUMERATION("Net.ConnectionUsedSSLVersionFallback",
1267 fallback
, FALLBACK_MAX
);
1269 // We also wish to measure the amount of fallback connections for a host that
1270 // we know implements TLS up to 1.2. Ideally there would be no fallback here
1271 // but high numbers of SSLv3 would suggest that SSLv3 fallback is being
1272 // caused by network middleware rather than buggy HTTPS servers.
1273 const std::string
& host
= origin_server
.host();
1275 host
.size() >= 10 &&
1276 host
.compare(host
.size() - 10, 10, "google.com") == 0 &&
1277 (host
.size() == 10 || host
[host
.size()-11] == '.')) {
1278 UMA_HISTOGRAM_ENUMERATION("Net.GoogleConnectionUsedSSLVersionFallback",
1279 fallback
, FALLBACK_MAX
);
1282 if (request_info_
.load_flags
& LOAD_VERIFY_EV_CERT
)
1283 ssl_config
->verify_ev_cert
= true;
1285 // Disable Channel ID if privacy mode is enabled.
1286 if (request_info_
.privacy_mode
== PRIVACY_MODE_ENABLED
)
1287 ssl_config
->channel_id_enabled
= false;
1291 int HttpStreamFactoryImpl::Job::ReconsiderProxyAfterError(int error
) {
1292 DCHECK(!pac_request_
);
1294 // A failure to resolve the hostname or any error related to establishing a
1295 // TCP connection could be grounds for trying a new proxy configuration.
1297 // Why do this when a hostname cannot be resolved? Some URLs only make sense
1298 // to proxy servers. The hostname in those URLs might fail to resolve if we
1299 // are still using a non-proxy config. We need to check if a proxy config
1300 // now exists that corresponds to a proxy server that could load the URL.
1303 case ERR_PROXY_CONNECTION_FAILED
:
1304 case ERR_NAME_NOT_RESOLVED
:
1305 case ERR_INTERNET_DISCONNECTED
:
1306 case ERR_ADDRESS_UNREACHABLE
:
1307 case ERR_CONNECTION_CLOSED
:
1308 case ERR_CONNECTION_TIMED_OUT
:
1309 case ERR_CONNECTION_RESET
:
1310 case ERR_CONNECTION_REFUSED
:
1311 case ERR_CONNECTION_ABORTED
:
1313 case ERR_TUNNEL_CONNECTION_FAILED
:
1314 case ERR_SOCKS_CONNECTION_FAILED
:
1315 // This can happen in the case of trying to talk to a proxy using SSL, and
1316 // ending up talking to a captive portal that supports SSL instead.
1317 case ERR_PROXY_CERTIFICATE_INVALID
:
1318 // This can happen when trying to talk SSL to a non-SSL server (Like a
1320 case ERR_SSL_PROTOCOL_ERROR
:
1322 case ERR_SOCKS_CONNECTION_HOST_UNREACHABLE
:
1323 // Remap the SOCKS-specific "host unreachable" error to a more
1324 // generic error code (this way consumers like the link doctor
1325 // know to substitute their error page).
1327 // Note that if the host resolving was done by the SOCKS5 proxy, we can't
1328 // differentiate between a proxy-side "host not found" versus a proxy-side
1329 // "address unreachable" error, and will report both of these failures as
1330 // ERR_ADDRESS_UNREACHABLE.
1331 return ERR_ADDRESS_UNREACHABLE
;
1336 if (request_info_
.load_flags
& LOAD_BYPASS_PROXY
) {
1340 if (proxy_info_
.is_https() && proxy_ssl_config_
.send_client_cert
) {
1341 session_
->ssl_client_auth_cache()->Remove(
1342 proxy_info_
.proxy_server().host_port_pair());
1345 int rv
= session_
->proxy_service()->ReconsiderProxyAfterError(
1346 request_info_
.url
, &proxy_info_
, io_callback_
, &pac_request_
, net_log_
);
1347 if (rv
== OK
|| rv
== ERR_IO_PENDING
) {
1348 // If the error was during connection setup, there is no socket to
1350 if (connection_
->socket())
1351 connection_
->socket()->Disconnect();
1352 connection_
->Reset();
1354 request_
->RemoveRequestFromSpdySessionRequestMap();
1355 request_
->RemoveRequestFromHttpPipeliningRequestMap();
1357 next_state_
= STATE_RESOLVE_PROXY_COMPLETE
;
1359 // If ReconsiderProxyAfterError() failed synchronously, it means
1360 // there was nothing left to fall-back to, so fail the transaction
1361 // with the last connection error we got.
1362 // TODO(eroman): This is a confusing contract, make it more obvious.
1369 int HttpStreamFactoryImpl::Job::HandleCertificateError(int error
) {
1371 DCHECK(IsCertificateError(error
));
1373 SSLClientSocket
* ssl_socket
=
1374 static_cast<SSLClientSocket
*>(connection_
->socket());
1375 ssl_socket
->GetSSLInfo(&ssl_info_
);
1377 // Add the bad certificate to the set of allowed certificates in the
1378 // SSL config object. This data structure will be consulted after calling
1379 // RestartIgnoringLastError(). And the user will be asked interactively
1380 // before RestartIgnoringLastError() is ever called.
1381 SSLConfig::CertAndStatus bad_cert
;
1383 // |ssl_info_.cert| may be NULL if we failed to create
1384 // X509Certificate for whatever reason, but normally it shouldn't
1385 // happen, unless this code is used inside sandbox.
1386 if (ssl_info_
.cert
.get() == NULL
||
1387 !X509Certificate::GetDEREncoded(ssl_info_
.cert
->os_cert_handle(),
1388 &bad_cert
.der_cert
)) {
1391 bad_cert
.cert_status
= ssl_info_
.cert_status
;
1392 server_ssl_config_
.allowed_bad_certs
.push_back(bad_cert
);
1394 int load_flags
= request_info_
.load_flags
;
1395 if (session_
->params().ignore_certificate_errors
)
1396 load_flags
|= LOAD_IGNORE_ALL_CERT_ERRORS
;
1397 if (ssl_socket
->IgnoreCertError(error
, load_flags
))
1402 void HttpStreamFactoryImpl::Job::SwitchToSpdyMode() {
1403 if (HttpStreamFactory::spdy_enabled())
1408 void HttpStreamFactoryImpl::Job::LogHttpConnectedMetrics(
1409 const ClientSocketHandle
& handle
) {
1410 UMA_HISTOGRAM_ENUMERATION("Net.HttpSocketType", handle
.reuse_type(),
1411 ClientSocketHandle::NUM_TYPES
);
1413 switch (handle
.reuse_type()) {
1414 case ClientSocketHandle::UNUSED
:
1415 UMA_HISTOGRAM_CUSTOM_TIMES("Net.HttpConnectionLatency",
1416 handle
.setup_time(),
1417 base::TimeDelta::FromMilliseconds(1),
1418 base::TimeDelta::FromMinutes(10),
1421 case ClientSocketHandle::UNUSED_IDLE
:
1422 UMA_HISTOGRAM_CUSTOM_TIMES("Net.SocketIdleTimeBeforeNextUse_UnusedSocket",
1424 base::TimeDelta::FromMilliseconds(1),
1425 base::TimeDelta::FromMinutes(6),
1428 case ClientSocketHandle::REUSED_IDLE
:
1429 UMA_HISTOGRAM_CUSTOM_TIMES("Net.SocketIdleTimeBeforeNextUse_ReusedSocket",
1431 base::TimeDelta::FromMilliseconds(1),
1432 base::TimeDelta::FromMinutes(6),
1441 bool HttpStreamFactoryImpl::Job::IsPreconnecting() const {
1442 DCHECK_GE(num_streams_
, 0);
1443 return num_streams_
> 0;
1446 bool HttpStreamFactoryImpl::Job::IsOrphaned() const {
1447 return !IsPreconnecting() && !request_
;
1450 bool HttpStreamFactoryImpl::Job::IsRequestEligibleForPipelining() {
1451 if (IsPreconnecting() || !request_
) {
1454 if (stream_factory_
->for_websockets_
) {
1457 if (session_
->force_http_pipelining()) {
1460 if (!session_
->params().http_pipelining_enabled
) {
1466 if (request_info_
.method
!= "GET" && request_info_
.method
!= "HEAD") {
1469 if (request_info_
.load_flags
&
1470 (net::LOAD_MAIN_FRAME
| net::LOAD_SUB_FRAME
| net::LOAD_PREFETCH
|
1471 net::LOAD_IS_DOWNLOAD
)) {
1472 // Avoid pipelining resources that may be streamed for a long time.
1475 return stream_factory_
->http_pipelined_host_pool_
.IsKeyEligibleForPipelining(
1476 *http_pipelining_key_
.get());