1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/http/http_stream_factory_impl.h"
6
7 #include <string>
8
9 #include "base/stl_util.h"
10 #include "base/strings/string_number_conversions.h"
11 #include "net/base/net_log.h"
12 #include "net/base/net_util.h"
13 #include "net/http/http_network_session.h"
14 #include "net/http/http_pipelined_connection.h"
15 #include "net/http/http_pipelined_host.h"
16 #include "net/http/http_pipelined_stream.h"
17 #include "net/http/http_server_properties.h"
18 #include "net/http/http_stream_factory_impl_job.h"
19 #include "net/http/http_stream_factory_impl_request.h"
20 #include "net/spdy/spdy_http_stream.h"
21 #include "url/gurl.h"
22
23 namespace net {
24
25 namespace {
26
27 const PortAlternateProtocolPair kNoAlternateProtocol = {
28 0, UNINITIALIZED_ALTERNATE_PROTOCOL
29 };
30
UpgradeUrlToHttps(const GURL & original_url,int port)31 GURL UpgradeUrlToHttps(const GURL& original_url, int port) {
32 GURL::Replacements replacements;
33 // new_sheme and new_port need to be in scope here because GURL::Replacements
34 // references the memory contained by them directly.
35 const std::string new_scheme = "https";
36 const std::string new_port = base::IntToString(port);
37 replacements.SetSchemeStr(new_scheme);
38 replacements.SetPortStr(new_port);
39 return original_url.ReplaceComponents(replacements);
40 }
41
42 } // namespace
43
HttpStreamFactoryImpl(HttpNetworkSession * session,bool for_websockets)44 HttpStreamFactoryImpl::HttpStreamFactoryImpl(HttpNetworkSession* session,
45 bool for_websockets)
46 : session_(session),
47 http_pipelined_host_pool_(this, NULL,
48 session_->http_server_properties(),
49 session_->force_http_pipelining()),
50 for_websockets_(for_websockets) {}
51
~HttpStreamFactoryImpl()52 HttpStreamFactoryImpl::~HttpStreamFactoryImpl() {
53 DCHECK(request_map_.empty());
54 DCHECK(spdy_session_request_map_.empty());
55 DCHECK(http_pipelining_request_map_.empty());
56
57 std::set<const Job*> tmp_job_set;
58 tmp_job_set.swap(orphaned_job_set_);
59 STLDeleteContainerPointers(tmp_job_set.begin(), tmp_job_set.end());
60 DCHECK(orphaned_job_set_.empty());
61
62 tmp_job_set.clear();
63 tmp_job_set.swap(preconnect_job_set_);
64 STLDeleteContainerPointers(tmp_job_set.begin(), tmp_job_set.end());
65 DCHECK(preconnect_job_set_.empty());
66 }
67
RequestStream(const HttpRequestInfo & request_info,RequestPriority priority,const SSLConfig & server_ssl_config,const SSLConfig & proxy_ssl_config,HttpStreamRequest::Delegate * delegate,const BoundNetLog & net_log)68 HttpStreamRequest* HttpStreamFactoryImpl::RequestStream(
69 const HttpRequestInfo& request_info,
70 RequestPriority priority,
71 const SSLConfig& server_ssl_config,
72 const SSLConfig& proxy_ssl_config,
73 HttpStreamRequest::Delegate* delegate,
74 const BoundNetLog& net_log) {
75 DCHECK(!for_websockets_);
76 return RequestStreamInternal(request_info,
77 priority,
78 server_ssl_config,
79 proxy_ssl_config,
80 delegate,
81 NULL,
82 net_log);
83 }
84
RequestWebSocketHandshakeStream(const HttpRequestInfo & request_info,RequestPriority priority,const SSLConfig & server_ssl_config,const SSLConfig & proxy_ssl_config,HttpStreamRequest::Delegate * delegate,WebSocketHandshakeStreamBase::CreateHelper * create_helper,const BoundNetLog & net_log)85 HttpStreamRequest* HttpStreamFactoryImpl::RequestWebSocketHandshakeStream(
86 const HttpRequestInfo& request_info,
87 RequestPriority priority,
88 const SSLConfig& server_ssl_config,
89 const SSLConfig& proxy_ssl_config,
90 HttpStreamRequest::Delegate* delegate,
91 WebSocketHandshakeStreamBase::CreateHelper* create_helper,
92 const BoundNetLog& net_log) {
93 DCHECK(for_websockets_);
94 DCHECK(create_helper);
95 return RequestStreamInternal(request_info,
96 priority,
97 server_ssl_config,
98 proxy_ssl_config,
99 delegate,
100 create_helper,
101 net_log);
102 }
103
RequestStreamInternal(const HttpRequestInfo & request_info,RequestPriority priority,const SSLConfig & server_ssl_config,const SSLConfig & proxy_ssl_config,HttpStreamRequest::Delegate * delegate,WebSocketHandshakeStreamBase::CreateHelper * websocket_handshake_stream_create_helper,const BoundNetLog & net_log)104 HttpStreamRequest* HttpStreamFactoryImpl::RequestStreamInternal(
105 const HttpRequestInfo& request_info,
106 RequestPriority priority,
107 const SSLConfig& server_ssl_config,
108 const SSLConfig& proxy_ssl_config,
109 HttpStreamRequest::Delegate* delegate,
110 WebSocketHandshakeStreamBase::CreateHelper*
111 websocket_handshake_stream_create_helper,
112 const BoundNetLog& net_log) {
113 Request* request = new Request(request_info.url,
114 this,
115 delegate,
116 websocket_handshake_stream_create_helper,
117 net_log);
118
119 GURL alternate_url;
120 PortAlternateProtocolPair alternate =
121 GetAlternateProtocolRequestFor(request_info.url, &alternate_url);
122 Job* alternate_job = NULL;
123 if (alternate.protocol != UNINITIALIZED_ALTERNATE_PROTOCOL) {
124 // Never share connection with other jobs for FTP requests.
125 DCHECK(!request_info.url.SchemeIs("ftp"));
126
127 HttpRequestInfo alternate_request_info = request_info;
128 alternate_request_info.url = alternate_url;
129 alternate_job =
130 new Job(this, session_, alternate_request_info, priority,
131 server_ssl_config, proxy_ssl_config, net_log.net_log());
132 request->AttachJob(alternate_job);
133 alternate_job->MarkAsAlternate(request_info.url, alternate);
134 }
135
136 Job* job = new Job(this, session_, request_info, priority,
137 server_ssl_config, proxy_ssl_config, net_log.net_log());
138 request->AttachJob(job);
139 if (alternate_job) {
140 // Never share connection with other jobs for FTP requests.
141 DCHECK(!request_info.url.SchemeIs("ftp"));
142
143 job->WaitFor(alternate_job);
144 // Make sure to wait until we call WaitFor(), before starting
145 // |alternate_job|, otherwise |alternate_job| will not notify |job|
146 // appropriately.
147 alternate_job->Start(request);
148 }
149 // Even if |alternate_job| has already finished, it won't have notified the
150 // request yet, since we defer that to the next iteration of the MessageLoop,
151 // so starting |job| is always safe.
152 job->Start(request);
153 return request;
154 }
155
PreconnectStreams(int num_streams,const HttpRequestInfo & request_info,RequestPriority priority,const SSLConfig & server_ssl_config,const SSLConfig & proxy_ssl_config)156 void HttpStreamFactoryImpl::PreconnectStreams(
157 int num_streams,
158 const HttpRequestInfo& request_info,
159 RequestPriority priority,
160 const SSLConfig& server_ssl_config,
161 const SSLConfig& proxy_ssl_config) {
162 DCHECK(!for_websockets_);
163 GURL alternate_url;
164 PortAlternateProtocolPair alternate =
165 GetAlternateProtocolRequestFor(request_info.url, &alternate_url);
166 Job* job = NULL;
167 if (alternate.protocol != UNINITIALIZED_ALTERNATE_PROTOCOL) {
168 HttpRequestInfo alternate_request_info = request_info;
169 alternate_request_info.url = alternate_url;
170 job = new Job(this, session_, alternate_request_info, priority,
171 server_ssl_config, proxy_ssl_config, session_->net_log());
172 job->MarkAsAlternate(request_info.url, alternate);
173 } else {
174 job = new Job(this, session_, request_info, priority,
175 server_ssl_config, proxy_ssl_config, session_->net_log());
176 }
177 preconnect_job_set_.insert(job);
178 job->Preconnect(num_streams);
179 }
180
PipelineInfoToValue() const181 base::Value* HttpStreamFactoryImpl::PipelineInfoToValue() const {
182 return http_pipelined_host_pool_.PipelineInfoToValue();
183 }
184
GetHostMappingRules() const185 const HostMappingRules* HttpStreamFactoryImpl::GetHostMappingRules() const {
186 return session_->params().host_mapping_rules;
187 }
188
GetAlternateProtocolRequestFor(const GURL & original_url,GURL * alternate_url) const189 PortAlternateProtocolPair HttpStreamFactoryImpl::GetAlternateProtocolRequestFor(
190 const GURL& original_url,
191 GURL* alternate_url) const {
192 if (!use_alternate_protocols())
193 return kNoAlternateProtocol;
194
195 if (original_url.SchemeIs("ftp"))
196 return kNoAlternateProtocol;
197
198 HostPortPair origin = HostPortPair(original_url.HostNoBrackets(),
199 original_url.EffectiveIntPort());
200
201 const HttpServerProperties& http_server_properties =
202 *session_->http_server_properties();
203 if (!http_server_properties.HasAlternateProtocol(origin))
204 return kNoAlternateProtocol;
205
206 PortAlternateProtocolPair alternate =
207 http_server_properties.GetAlternateProtocol(origin);
208 if (alternate.protocol == ALTERNATE_PROTOCOL_BROKEN)
209 return kNoAlternateProtocol;
210
211 if (!IsAlternateProtocolValid(alternate.protocol)) {
212 NOTREACHED();
213 return kNoAlternateProtocol;
214 }
215
216 // Some shared unix systems may have user home directories (like
217 // http://foo.com/~mike) which allow users to emit headers. This is a bad
218 // idea already, but with Alternate-Protocol, it provides the ability for a
219 // single user on a multi-user system to hijack the alternate protocol.
220 // These systems also enforce ports <1024 as restricted ports. So don't
221 // allow protocol upgrades to user-controllable ports.
222 const int kUnrestrictedPort = 1024;
223 if (!session_->params().enable_user_alternate_protocol_ports &&
224 (alternate.port >= kUnrestrictedPort &&
225 origin.port() < kUnrestrictedPort))
226 return kNoAlternateProtocol;
227
228 origin.set_port(alternate.port);
229 if (alternate.protocol >= NPN_SPDY_MINIMUM_VERSION &&
230 alternate.protocol <= NPN_SPDY_MAXIMUM_VERSION) {
231 if (!spdy_enabled())
232 return kNoAlternateProtocol;
233
234 if (HttpStreamFactory::HasSpdyExclusion(origin))
235 return kNoAlternateProtocol;
236
237 *alternate_url = UpgradeUrlToHttps(original_url, alternate.port);
238 } else {
239 DCHECK_EQ(QUIC, alternate.protocol);
240 if (!session_->params().enable_quic ||
241 !(original_url.SchemeIs("http") ||
242 session_->params().enable_quic_https)) {
243 return kNoAlternateProtocol;
244 }
245 // TODO(rch): Figure out how to make QUIC iteract with PAC
246 // scripts. By not re-writing the URL, we will query the PAC script
247 // for the proxy to use to reach the original URL via TCP. But
248 // the alternate request will be going via UDP to a different port.
249 *alternate_url = original_url;
250 }
251 return alternate;
252 }
253
OrphanJob(Job * job,const Request * request)254 void HttpStreamFactoryImpl::OrphanJob(Job* job, const Request* request) {
255 DCHECK(ContainsKey(request_map_, job));
256 DCHECK_EQ(request_map_[job], request);
257 DCHECK(!ContainsKey(orphaned_job_set_, job));
258
259 request_map_.erase(job);
260
261 orphaned_job_set_.insert(job);
262 job->Orphan(request);
263 }
264
OnNewSpdySessionReady(const base::WeakPtr<SpdySession> & spdy_session,bool direct,const SSLConfig & used_ssl_config,const ProxyInfo & used_proxy_info,bool was_npn_negotiated,NextProto protocol_negotiated,bool using_spdy,const BoundNetLog & net_log)265 void HttpStreamFactoryImpl::OnNewSpdySessionReady(
266 const base::WeakPtr<SpdySession>& spdy_session,
267 bool direct,
268 const SSLConfig& used_ssl_config,
269 const ProxyInfo& used_proxy_info,
270 bool was_npn_negotiated,
271 NextProto protocol_negotiated,
272 bool using_spdy,
273 const BoundNetLog& net_log) {
274 while (true) {
275 if (!spdy_session)
276 break;
277 const SpdySessionKey& spdy_session_key = spdy_session->spdy_session_key();
278 // Each iteration may empty out the RequestSet for |spdy_session_key| in
279 // |spdy_session_request_map_|. So each time, check for RequestSet and use
280 // the first one.
281 //
282 // TODO(willchan): If it's important, switch RequestSet out for a FIFO
283 // queue (Order by priority first, then FIFO within same priority). Unclear
284 // that it matters here.
285 if (!ContainsKey(spdy_session_request_map_, spdy_session_key))
286 break;
287 Request* request = *spdy_session_request_map_[spdy_session_key].begin();
288 request->Complete(was_npn_negotiated,
289 protocol_negotiated,
290 using_spdy,
291 net_log);
292 if (for_websockets_) {
293 WebSocketHandshakeStreamBase::CreateHelper* create_helper =
294 request->websocket_handshake_stream_create_helper();
295 DCHECK(create_helper);
296 bool use_relative_url = direct || request->url().SchemeIs("wss");
297 request->OnWebSocketHandshakeStreamReady(
298 NULL,
299 used_ssl_config,
300 used_proxy_info,
301 create_helper->CreateSpdyStream(spdy_session, use_relative_url));
302 } else {
303 bool use_relative_url = direct || request->url().SchemeIs("https");
304 request->OnStreamReady(
305 NULL,
306 used_ssl_config,
307 used_proxy_info,
308 new SpdyHttpStream(spdy_session, use_relative_url));
309 }
310 }
311 // TODO(mbelshe): Alert other valid requests.
312 }
313
OnOrphanedJobComplete(const Job * job)314 void HttpStreamFactoryImpl::OnOrphanedJobComplete(const Job* job) {
315 orphaned_job_set_.erase(job);
316 delete job;
317 }
318
OnPreconnectsComplete(const Job * job)319 void HttpStreamFactoryImpl::OnPreconnectsComplete(const Job* job) {
320 preconnect_job_set_.erase(job);
321 delete job;
322 OnPreconnectsCompleteInternal();
323 }
324
OnHttpPipelinedHostHasAdditionalCapacity(HttpPipelinedHost * host)325 void HttpStreamFactoryImpl::OnHttpPipelinedHostHasAdditionalCapacity(
326 HttpPipelinedHost* host) {
327 while (ContainsKey(http_pipelining_request_map_, host->GetKey())) {
328 HttpPipelinedStream* stream =
329 http_pipelined_host_pool_.CreateStreamOnExistingPipeline(
330 host->GetKey());
331 if (!stream) {
332 break;
333 }
334
335 Request* request = *http_pipelining_request_map_[host->GetKey()].begin();
336 request->Complete(stream->was_npn_negotiated(),
337 stream->protocol_negotiated(),
338 false, // not using_spdy
339 stream->net_log());
340 request->OnStreamReady(NULL,
341 stream->used_ssl_config(),
342 stream->used_proxy_info(),
343 stream);
344 }
345 }
346
AbortPipelinedRequestsWithKey(const Job * job,const HttpPipelinedHost::Key & key,int status,const SSLConfig & used_ssl_config)347 void HttpStreamFactoryImpl::AbortPipelinedRequestsWithKey(
348 const Job* job, const HttpPipelinedHost::Key& key, int status,
349 const SSLConfig& used_ssl_config) {
350 RequestVector requests_to_fail = http_pipelining_request_map_[key];
351 for (RequestVector::const_iterator it = requests_to_fail.begin();
352 it != requests_to_fail.end(); ++it) {
353 Request* request = *it;
354 if (request == request_map_[job]) {
355 continue;
356 }
357 request->OnStreamFailed(NULL, status, used_ssl_config);
358 }
359 }
360
361 } // namespace net
362