diff options
Diffstat (limited to 'jingle/notifier/base/proxy_resolving_client_socket.cc')
-rw-r--r-- | jingle/notifier/base/proxy_resolving_client_socket.cc | 392 |
1 files changed, 0 insertions, 392 deletions
diff --git a/jingle/notifier/base/proxy_resolving_client_socket.cc b/jingle/notifier/base/proxy_resolving_client_socket.cc deleted file mode 100644 index eb14d56..0000000 --- a/jingle/notifier/base/proxy_resolving_client_socket.cc +++ /dev/null @@ -1,392 +0,0 @@ -// Copyright (c) 2012 The Chromium Authors. All rights reserved. -// Use of this source code is governed by a BSD-style license that can be -// found in the LICENSE file. - -#include "jingle/notifier/base/proxy_resolving_client_socket.h" - -#include "base/basictypes.h" -#include "base/bind.h" -#include "base/bind_helpers.h" -#include "base/compiler_specific.h" -#include "base/logging.h" -#include "googleurl/src/gurl.h" -#include "net/base/io_buffer.h" -#include "net/base/net_errors.h" -#include "net/http/http_network_session.h" -#include "net/socket/client_socket_handle.h" -#include "net/socket/client_socket_pool_manager.h" -#include "net/url_request/url_request_context.h" -#include "net/url_request/url_request_context_getter.h" - -namespace notifier { - -ProxyResolvingClientSocket::ProxyResolvingClientSocket( - net::ClientSocketFactory* socket_factory, - const scoped_refptr<net::URLRequestContextGetter>& request_context_getter, - const net::SSLConfig& ssl_config, - const net::HostPortPair& dest_host_port_pair) - : ALLOW_THIS_IN_INITIALIZER_LIST(proxy_resolve_callback_( - base::Bind(&ProxyResolvingClientSocket::ProcessProxyResolveDone, - base::Unretained(this)))), - ALLOW_THIS_IN_INITIALIZER_LIST(connect_callback_( - base::Bind(&ProxyResolvingClientSocket::ProcessConnectDone, - base::Unretained(this)))), - ssl_config_(ssl_config), - pac_request_(NULL), - dest_host_port_pair_(dest_host_port_pair), - tried_direct_connect_fallback_(false), - bound_net_log_( - net::BoundNetLog::Make( - request_context_getter->GetURLRequestContext()->net_log(), - net::NetLog::SOURCE_SOCKET)), - ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)) { - DCHECK(request_context_getter); - net::URLRequestContext* request_context = - request_context_getter->GetURLRequestContext(); - DCHECK(request_context); - DCHECK(!dest_host_port_pair_.host().empty()); - DCHECK_GT(dest_host_port_pair_.port(), 0); - net::HttpNetworkSession::Params session_params; - session_params.client_socket_factory = socket_factory; - session_params.host_resolver = request_context->host_resolver(); - session_params.cert_verifier = request_context->cert_verifier(); - // TODO(rkn): This is NULL because ServerBoundCertService is not thread safe. - session_params.server_bound_cert_service = NULL; - // transport_security_state is NULL because it's not thread safe. - session_params.transport_security_state = NULL; - session_params.proxy_service = request_context->proxy_service(); - session_params.ssl_config_service = request_context->ssl_config_service(); - session_params.http_auth_handler_factory = - request_context->http_auth_handler_factory(); - session_params.network_delegate = request_context->network_delegate(); - session_params.http_server_properties = - request_context->http_server_properties(); - session_params.net_log = request_context->net_log(); - network_session_ = new net::HttpNetworkSession(session_params); -} - -ProxyResolvingClientSocket::~ProxyResolvingClientSocket() { - Disconnect(); -} - -int ProxyResolvingClientSocket::Read(net::IOBuffer* buf, int buf_len, - const net::CompletionCallback& callback) { - if (transport_.get() && transport_->socket()) - return transport_->socket()->Read(buf, buf_len, callback); - NOTREACHED(); - return net::ERR_SOCKET_NOT_CONNECTED; -} - -int ProxyResolvingClientSocket::Write( - net::IOBuffer* buf, - int buf_len, - const net::CompletionCallback& callback) { - if (transport_.get() && transport_->socket()) - return transport_->socket()->Write(buf, buf_len, callback); - NOTREACHED(); - return net::ERR_SOCKET_NOT_CONNECTED; -} - -bool ProxyResolvingClientSocket::SetReceiveBufferSize(int32 size) { - if (transport_.get() && transport_->socket()) - return transport_->socket()->SetReceiveBufferSize(size); - NOTREACHED(); - return false; -} - -bool ProxyResolvingClientSocket::SetSendBufferSize(int32 size) { - if (transport_.get() && transport_->socket()) - return transport_->socket()->SetSendBufferSize(size); - NOTREACHED(); - return false; -} - -int ProxyResolvingClientSocket::Connect( - const net::CompletionCallback& callback) { - DCHECK(user_connect_callback_.is_null()); - - tried_direct_connect_fallback_ = false; - - // First we try and resolve the proxy. - GURL url("http://" + dest_host_port_pair_.ToString()); - DCHECK(url.is_valid()); - int status = network_session_->proxy_service()->ResolveProxy( - url, - &proxy_info_, - proxy_resolve_callback_, - &pac_request_, - bound_net_log_); - if (status != net::ERR_IO_PENDING) { - // We defer execution of ProcessProxyResolveDone instead of calling it - // directly here for simplicity. From the caller's point of view, - // the connect always happens asynchronously. - MessageLoop* message_loop = MessageLoop::current(); - CHECK(message_loop); - message_loop->PostTask( - FROM_HERE, - base::Bind(&ProxyResolvingClientSocket::ProcessProxyResolveDone, - weak_factory_.GetWeakPtr(), status)); - } - user_connect_callback_ = callback; - return net::ERR_IO_PENDING; -} - -void ProxyResolvingClientSocket::RunUserConnectCallback(int status) { - DCHECK_LE(status, net::OK); - net::CompletionCallback user_connect_callback = user_connect_callback_; - user_connect_callback_.Reset(); - user_connect_callback.Run(status); -} - -// Always runs asynchronously. -void ProxyResolvingClientSocket::ProcessProxyResolveDone(int status) { - pac_request_ = NULL; - - DCHECK_NE(status, net::ERR_IO_PENDING); - if (status == net::OK) { - // Remove unsupported proxies from the list. - proxy_info_.RemoveProxiesWithoutScheme( - net::ProxyServer::SCHEME_DIRECT | - net::ProxyServer::SCHEME_HTTP | net::ProxyServer::SCHEME_HTTPS | - net::ProxyServer::SCHEME_SOCKS4 | net::ProxyServer::SCHEME_SOCKS5); - - if (proxy_info_.is_empty()) { - // No proxies/direct to choose from. This happens when we don't support - // any of the proxies in the returned list. - status = net::ERR_NO_SUPPORTED_PROXIES; - } - } - - // Since we are faking the URL, it is possible that no proxies match our URL. - // Try falling back to a direct connection if we have not tried that before. - if (status != net::OK) { - if (!tried_direct_connect_fallback_) { - tried_direct_connect_fallback_ = true; - proxy_info_.UseDirect(); - } else { - CloseTransportSocket(); - RunUserConnectCallback(status); - return; - } - } - - transport_.reset(new net::ClientSocketHandle); - // Now that we have resolved the proxy, we need to connect. - status = net::InitSocketHandleForRawConnect( - dest_host_port_pair_, network_session_.get(), proxy_info_, ssl_config_, - ssl_config_, bound_net_log_, transport_.get(), connect_callback_); - if (status != net::ERR_IO_PENDING) { - // Since this method is always called asynchronously. it is OK to call - // ProcessConnectDone synchronously. - ProcessConnectDone(status); - } -} - -void ProxyResolvingClientSocket::ProcessConnectDone(int status) { - if (status != net::OK) { - // If the connection fails, try another proxy. - status = ReconsiderProxyAfterError(status); - // ReconsiderProxyAfterError either returns an error (in which case it is - // not reconsidering a proxy) or returns ERR_IO_PENDING if it is considering - // another proxy. - DCHECK_NE(status, net::OK); - if (status == net::ERR_IO_PENDING) - // Proxy reconsideration pending. Return. - return; - CloseTransportSocket(); - } else { - ReportSuccessfulProxyConnection(); - } - RunUserConnectCallback(status); -} - -// TODO(sanjeevr): This has largely been copied from -// HttpStreamFactoryImpl::Job::ReconsiderProxyAfterError. This should be -// refactored into some common place. -// This method reconsiders the proxy on certain errors. If it does reconsider -// a proxy it always returns ERR_IO_PENDING and posts a call to -// ProcessProxyResolveDone with the result of the reconsideration. -int ProxyResolvingClientSocket::ReconsiderProxyAfterError(int error) { - DCHECK(!pac_request_); - DCHECK_NE(error, net::OK); - DCHECK_NE(error, net::ERR_IO_PENDING); - // A failure to resolve the hostname or any error related to establishing a - // TCP connection could be grounds for trying a new proxy configuration. - // - // Why do this when a hostname cannot be resolved? Some URLs only make sense - // to proxy servers. The hostname in those URLs might fail to resolve if we - // are still using a non-proxy config. We need to check if a proxy config - // now exists that corresponds to a proxy server that could load the URL. - // - switch (error) { - case net::ERR_PROXY_CONNECTION_FAILED: - case net::ERR_NAME_NOT_RESOLVED: - case net::ERR_INTERNET_DISCONNECTED: - case net::ERR_ADDRESS_UNREACHABLE: - case net::ERR_CONNECTION_CLOSED: - case net::ERR_CONNECTION_RESET: - case net::ERR_CONNECTION_REFUSED: - case net::ERR_CONNECTION_ABORTED: - case net::ERR_TIMED_OUT: - case net::ERR_TUNNEL_CONNECTION_FAILED: - case net::ERR_SOCKS_CONNECTION_FAILED: - break; - case net::ERR_SOCKS_CONNECTION_HOST_UNREACHABLE: - // Remap the SOCKS-specific "host unreachable" error to a more - // generic error code (this way consumers like the link doctor - // know to substitute their error page). - // - // Note that if the host resolving was done by the SOCSK5 proxy, we can't - // differentiate between a proxy-side "host not found" versus a proxy-side - // "address unreachable" error, and will report both of these failures as - // ERR_ADDRESS_UNREACHABLE. - return net::ERR_ADDRESS_UNREACHABLE; - default: - return error; - } - - if (proxy_info_.is_https() && ssl_config_.send_client_cert) { - network_session_->ssl_client_auth_cache()->Remove( - proxy_info_.proxy_server().host_port_pair().ToString()); - } - - GURL url("http://" + dest_host_port_pair_.ToString()); - int rv = network_session_->proxy_service()->ReconsiderProxyAfterError( - url, &proxy_info_, proxy_resolve_callback_, &pac_request_, - bound_net_log_); - if (rv == net::OK || rv == net::ERR_IO_PENDING) { - CloseTransportSocket(); - } else { - // If ReconsiderProxyAfterError() failed synchronously, it means - // there was nothing left to fall-back to, so fail the transaction - // with the last connection error we got. - rv = error; - } - - // We either have new proxy info or there was an error in falling back. - // In both cases we want to post ProcessProxyResolveDone (in the error case - // we might still want to fall back a direct connection). - if (rv != net::ERR_IO_PENDING) { - MessageLoop* message_loop = MessageLoop::current(); - CHECK(message_loop); - message_loop->PostTask( - FROM_HERE, - base::Bind(&ProxyResolvingClientSocket::ProcessProxyResolveDone, - weak_factory_.GetWeakPtr(), rv)); - // Since we potentially have another try to go (trying the direct connect) - // set the return code code to ERR_IO_PENDING. - rv = net::ERR_IO_PENDING; - } - return rv; -} - -void ProxyResolvingClientSocket::ReportSuccessfulProxyConnection() { - network_session_->proxy_service()->ReportSuccess(proxy_info_); -} - -void ProxyResolvingClientSocket::Disconnect() { - CloseTransportSocket(); - if (pac_request_) - network_session_->proxy_service()->CancelPacRequest(pac_request_); - user_connect_callback_.Reset(); -} - -bool ProxyResolvingClientSocket::IsConnected() const { - if (!transport_.get() || !transport_->socket()) - return false; - return transport_->socket()->IsConnected(); -} - -bool ProxyResolvingClientSocket::IsConnectedAndIdle() const { - if (!transport_.get() || !transport_->socket()) - return false; - return transport_->socket()->IsConnectedAndIdle(); -} - -int ProxyResolvingClientSocket::GetPeerAddress( - net::IPEndPoint* address) const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->GetPeerAddress(address); - NOTREACHED(); - return net::ERR_SOCKET_NOT_CONNECTED; -} - -int ProxyResolvingClientSocket::GetLocalAddress( - net::IPEndPoint* address) const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->GetLocalAddress(address); - NOTREACHED(); - return net::ERR_SOCKET_NOT_CONNECTED; -} - -const net::BoundNetLog& ProxyResolvingClientSocket::NetLog() const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->NetLog(); - NOTREACHED(); - return bound_net_log_; -} - -void ProxyResolvingClientSocket::SetSubresourceSpeculation() { - if (transport_.get() && transport_->socket()) - transport_->socket()->SetSubresourceSpeculation(); - else - NOTREACHED(); -} - -void ProxyResolvingClientSocket::SetOmniboxSpeculation() { - if (transport_.get() && transport_->socket()) - transport_->socket()->SetOmniboxSpeculation(); - else - NOTREACHED(); -} - -bool ProxyResolvingClientSocket::WasEverUsed() const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->WasEverUsed(); - NOTREACHED(); - return false; -} - -bool ProxyResolvingClientSocket::UsingTCPFastOpen() const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->UsingTCPFastOpen(); - NOTREACHED(); - return false; -} - -int64 ProxyResolvingClientSocket::NumBytesRead() const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->NumBytesRead(); - NOTREACHED(); - return -1; -} - -base::TimeDelta ProxyResolvingClientSocket::GetConnectTimeMicros() const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->GetConnectTimeMicros(); - NOTREACHED(); - return base::TimeDelta::FromMicroseconds(-1); -} - -bool ProxyResolvingClientSocket::WasNpnNegotiated() const { - return false; -} - -net::NextProto ProxyResolvingClientSocket::GetNegotiatedProtocol() const { - if (transport_.get() && transport_->socket()) - return transport_->socket()->GetNegotiatedProtocol(); - NOTREACHED(); - return net::kProtoUnknown; -} - -bool ProxyResolvingClientSocket::GetSSLInfo(net::SSLInfo* ssl_info) { - return false; -} - -void ProxyResolvingClientSocket::CloseTransportSocket() { - if (transport_.get() && transport_->socket()) - transport_->socket()->Disconnect(); - transport_.reset(); -} - -} // namespace notifier |