// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/http/http_stream_factory_impl.h" #include "base/string_number_conversions.h" #include "base/stl_util.h" #include "googleurl/src/gurl.h" #include "net/base/net_log.h" #include "net/base/net_util.h" #include "net/http/http_network_session.h" #include "net/http/http_pipelined_connection.h" #include "net/http/http_pipelined_host.h" #include "net/http/http_pipelined_stream.h" #include "net/http/http_server_properties.h" #include "net/http/http_stream_factory_impl_job.h" #include "net/http/http_stream_factory_impl_request.h" #include "net/spdy/spdy_http_stream.h" namespace net { namespace { GURL UpgradeUrlToHttps(const GURL& original_url, int port) { GURL::Replacements replacements; // new_sheme and new_port need to be in scope here because GURL::Replacements // references the memory contained by them directly. const std::string new_scheme = "https"; const std::string new_port = base::IntToString(port); replacements.SetSchemeStr(new_scheme); replacements.SetPortStr(new_port); return original_url.ReplaceComponents(replacements); } } // namespace HttpStreamFactoryImpl::HttpStreamFactoryImpl(HttpNetworkSession* session) : session_(session), http_pipelined_host_pool_(this, NULL, session_->http_server_properties(), session_->force_http_pipelining()) {} HttpStreamFactoryImpl::~HttpStreamFactoryImpl() { DCHECK(request_map_.empty()); DCHECK(spdy_session_request_map_.empty()); DCHECK(http_pipelining_request_map_.empty()); std::set tmp_job_set; tmp_job_set.swap(orphaned_job_set_); STLDeleteContainerPointers(tmp_job_set.begin(), tmp_job_set.end()); DCHECK(orphaned_job_set_.empty()); tmp_job_set.clear(); tmp_job_set.swap(preconnect_job_set_); STLDeleteContainerPointers(tmp_job_set.begin(), tmp_job_set.end()); DCHECK(preconnect_job_set_.empty()); } HttpStreamRequest* HttpStreamFactoryImpl::RequestStream( const HttpRequestInfo& request_info, const SSLConfig& server_ssl_config, const SSLConfig& proxy_ssl_config, HttpStreamRequest::Delegate* delegate, const BoundNetLog& net_log) { Request* request = new Request(request_info.url, this, delegate, net_log); GURL alternate_url; bool has_alternate_protocol = GetAlternateProtocolRequestFor(request_info.url, &alternate_url); Job* alternate_job = NULL; if (has_alternate_protocol) { HttpRequestInfo alternate_request_info = request_info; alternate_request_info.url = alternate_url; alternate_job = new Job(this, session_, alternate_request_info, server_ssl_config, proxy_ssl_config, net_log.net_log()); request->AttachJob(alternate_job); alternate_job->MarkAsAlternate(request_info.url); } Job* job = new Job(this, session_, request_info, server_ssl_config, proxy_ssl_config, net_log.net_log()); request->AttachJob(job); if (alternate_job) { job->WaitFor(alternate_job); // Make sure to wait until we call WaitFor(), before starting // |alternate_job|, otherwise |alternate_job| will not notify |job| // appropriately. alternate_job->Start(request); } // Even if |alternate_job| has already finished, it won't have notified the // request yet, since we defer that to the next iteration of the MessageLoop, // so starting |job| is always safe. job->Start(request); return request; } void HttpStreamFactoryImpl::PreconnectStreams( int num_streams, const HttpRequestInfo& request_info, const SSLConfig& server_ssl_config, const SSLConfig& proxy_ssl_config) { GURL alternate_url; bool has_alternate_protocol = GetAlternateProtocolRequestFor(request_info.url, &alternate_url); Job* job = NULL; if (has_alternate_protocol) { HttpRequestInfo alternate_request_info = request_info; alternate_request_info.url = alternate_url; job = new Job(this, session_, alternate_request_info, server_ssl_config, proxy_ssl_config, session_->net_log()); job->MarkAsAlternate(request_info.url); } else { job = new Job(this, session_, request_info, server_ssl_config, proxy_ssl_config, session_->net_log()); } preconnect_job_set_.insert(job); job->Preconnect(num_streams); } void HttpStreamFactoryImpl::AddTLSIntolerantServer(const HostPortPair& server) { tls_intolerant_servers_.insert(server); } bool HttpStreamFactoryImpl::IsTLSIntolerantServer( const HostPortPair& server) const { return ContainsKey(tls_intolerant_servers_, server); } base::Value* HttpStreamFactoryImpl::PipelineInfoToValue() const { return http_pipelined_host_pool_.PipelineInfoToValue(); } bool HttpStreamFactoryImpl::GetAlternateProtocolRequestFor( const GURL& original_url, GURL* alternate_url) const { if (!spdy_enabled()) return false; if (!use_alternate_protocols()) return false; HostPortPair origin = HostPortPair(original_url.HostNoBrackets(), original_url.EffectiveIntPort()); const HttpServerProperties& http_server_properties = *session_->http_server_properties(); if (!http_server_properties.HasAlternateProtocol(origin)) return false; PortAlternateProtocolPair alternate = http_server_properties.GetAlternateProtocol(origin); if (alternate.protocol == ALTERNATE_PROTOCOL_BROKEN) return false; DCHECK_LE(NPN_SPDY_1, alternate.protocol); DCHECK_GT(NUM_ALTERNATE_PROTOCOLS, alternate.protocol); if (alternate.protocol < NPN_SPDY_2) return false; // Some shared unix systems may have user home directories (like // http://foo.com/~mike) which allow users to emit headers. This is a bad // idea already, but with Alternate-Protocol, it provides the ability for a // single user on a multi-user system to hijack the alternate protocol. // These systems also enforce ports <1024 as restricted ports. So don't // allow protocol upgrades to user-controllable ports. const int kUnrestrictedPort = 1024; if (alternate.port >= kUnrestrictedPort && origin.port() < kUnrestrictedPort) return false; origin.set_port(alternate.port); if (HttpStreamFactory::HasSpdyExclusion(origin)) return false; *alternate_url = UpgradeUrlToHttps(original_url, alternate.port); return true; } void HttpStreamFactoryImpl::OrphanJob(Job* job, const Request* request) { DCHECK(ContainsKey(request_map_, job)); DCHECK_EQ(request_map_[job], request); DCHECK(!ContainsKey(orphaned_job_set_, job)); request_map_.erase(job); orphaned_job_set_.insert(job); job->Orphan(request); } void HttpStreamFactoryImpl::OnSpdySessionReady( scoped_refptr spdy_session, bool direct, const SSLConfig& used_ssl_config, const ProxyInfo& used_proxy_info, bool was_npn_negotiated, NextProto protocol_negotiated, bool using_spdy, const BoundNetLog& net_log) { const HostPortProxyPair& spdy_session_key = spdy_session->host_port_proxy_pair(); while (!spdy_session->IsClosed()) { // Each iteration may empty out the RequestSet for |spdy_session_key_ in // |spdy_session_request_map_|. So each time, check for RequestSet and use // the first one. // // TODO(willchan): If it's important, switch RequestSet out for a FIFO // pqueue (Order by priority first, then FIFO within same priority). Unclear // that it matters here. if (!ContainsKey(spdy_session_request_map_, spdy_session_key)) break; Request* request = *spdy_session_request_map_[spdy_session_key].begin(); request->Complete(was_npn_negotiated, protocol_negotiated, using_spdy, net_log); bool use_relative_url = direct || request->url().SchemeIs("https"); request->OnStreamReady(NULL, used_ssl_config, used_proxy_info, new SpdyHttpStream(spdy_session, use_relative_url)); } // TODO(mbelshe): Alert other valid requests. } void HttpStreamFactoryImpl::OnOrphanedJobComplete(const Job* job) { orphaned_job_set_.erase(job); delete job; } void HttpStreamFactoryImpl::OnPreconnectsComplete(const Job* job) { preconnect_job_set_.erase(job); delete job; OnPreconnectsCompleteInternal(); } void HttpStreamFactoryImpl::OnHttpPipelinedHostHasAdditionalCapacity( HttpPipelinedHost* host) { while (ContainsKey(http_pipelining_request_map_, host->GetKey())) { HttpPipelinedStream* stream = http_pipelined_host_pool_.CreateStreamOnExistingPipeline( host->GetKey()); if (!stream) { break; } Request* request = *http_pipelining_request_map_[host->GetKey()].begin(); request->Complete(stream->was_npn_negotiated(), stream->protocol_negotiated(), false, // not using_spdy stream->net_log()); request->OnStreamReady(NULL, stream->used_ssl_config(), stream->used_proxy_info(), stream); } } void HttpStreamFactoryImpl::AbortPipelinedRequestsWithKey( const Job* job, const HttpPipelinedHost::Key& key, int status, const SSLConfig& used_ssl_config) { RequestVector requests_to_fail = http_pipelining_request_map_[key]; for (RequestVector::const_iterator it = requests_to_fail.begin(); it != requests_to_fail.end(); ++it) { Request* request = *it; if (request == request_map_[job]) { continue; } request->OnStreamFailed(NULL, status, used_ssl_config); } } } // namespace net