blob: cd95f6ef2ee892f388f6290d41d601d5627eccf0 [file] [log] [blame]
[email protected]448d4ca52012-03-04 04:12:231// Copyright (c) 2012 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit586acc5fe2008-07-26 22:42:524
5#ifndef NET_HTTP_HTTP_NETWORK_TRANSACTION_H_
6#define NET_HTTP_HTTP_NETWORK_TRANSACTION_H_
7
sclittlefb249892015-09-10 21:33:228#include <stdint.h>
9
danakj1fd259a02016-04-16 03:17:0910#include <memory>
[email protected]96d570e42008-08-05 22:43:0411#include <string>
12
[email protected]8822f382010-07-30 21:49:0313#include "base/gtest_prod_util.h"
Avi Drissman13fc8932015-12-20 04:40:4614#include "base/macros.h"
[email protected]3b63f8f42011-03-28 01:54:1515#include "base/memory/ref_counted.h"
[email protected]66e96c42013-06-28 15:20:3116#include "base/time/time.h"
nharperb7441ef2016-01-25 23:54:1417#include "crypto/ec_private_key.h"
Bence Béky046f8c82018-06-12 02:26:0418#include "net/base/completion_once_callback.h"
Bence Béky61f756c2018-04-25 14:17:5319#include "net/base/completion_repeating_callback.h"
zhongyi48704c182015-12-07 07:52:0220#include "net/base/net_error_details.h"
bnc81c46c1f2016-10-04 16:25:5921#include "net/base/net_export.h"
[email protected]8e6441ca2010-08-19 05:56:3822#include "net/base/request_priority.h"
[email protected]c3b35c22008-09-27 03:19:4223#include "net/http/http_auth.h"
[email protected]b94f92d2010-10-27 16:45:2024#include "net/http/http_request_headers.h"
initial.commit586acc5fe2008-07-26 22:42:5225#include "net/http/http_response_info.h"
[email protected]102e27c2011-02-23 01:01:3126#include "net/http/http_stream_factory.h"
Bence Béky6b44abf2018-04-11 10:32:5127#include "net/http/http_stream_request.h"
initial.commit586acc5fe2008-07-26 22:42:5228#include "net/http/http_transaction.h"
mikecironef22f9812016-10-04 03:40:1929#include "net/log/net_log_with_source.h"
Lily Houghtonffe89daa02018-03-09 18:30:0330#include "net/proxy_resolution/proxy_resolution_service.h"
ttuttle1f2d7e92015-04-28 16:17:4731#include "net/socket/connection_attempts.h"
nharperb7441ef2016-01-25 23:54:1432#include "net/ssl/channel_id_service.h"
[email protected]536fd0b2013-03-14 17:41:5733#include "net/ssl/ssl_config_service.h"
[email protected]831e4a32013-11-14 02:14:4434#include "net/websockets/websocket_handshake_stream_base.h"
initial.commit586acc5fe2008-07-26 22:42:5235
nharperb7441ef2016-01-25 23:54:1436namespace crypto {
37class ECPrivateKey;
38}
39
initial.commit586acc5fe2008-07-26 22:42:5240namespace net {
41
xunjieli5749218c2016-03-22 16:43:0642class BidirectionalStreamImpl;
[email protected]8e6441ca2010-08-19 05:56:3843class HttpAuthController;
initial.commit586acc5fe2008-07-26 22:42:5244class HttpNetworkSession;
yhiranoa7e05bb2014-11-06 05:40:3945class HttpStream;
[email protected]8e6441ca2010-08-19 05:56:3846class IOBuffer;
[email protected]597a1ab2014-06-26 08:12:2747class ProxyInfo;
svaldez7872fd02015-11-19 21:10:5448class SSLPrivateKey;
[email protected]82918cc2010-08-25 17:24:5049struct HttpRequestInfo;
initial.commit586acc5fe2008-07-26 22:42:5250
[email protected]172da1b2011-08-12 15:52:2651class NET_EXPORT_PRIVATE HttpNetworkTransaction
52 : public HttpTransaction,
Helen Lib495c3802018-03-30 13:46:0953 public HttpStreamRequest::Delegate {
initial.commit586acc5fe2008-07-26 22:42:5254 public:
[email protected]262eec82013-03-19 21:01:3655 HttpNetworkTransaction(RequestPriority priority,
56 HttpNetworkSession* session);
initial.commit586acc5fe2008-07-26 22:42:5257
dchengb03027d2014-10-21 12:00:2058 ~HttpNetworkTransaction() override;
[email protected]af4876d2008-10-21 23:10:5759
initial.commit586acc5fe2008-07-26 22:42:5260 // HttpTransaction methods:
dchengb03027d2014-10-21 12:00:2061 int Start(const HttpRequestInfo* request_info,
Bence Béky046f8c82018-06-12 02:26:0462 CompletionOnceCallback callback,
tfarina42834112016-09-22 13:38:2063 const NetLogWithSource& net_log) override;
Bence Béky046f8c82018-06-12 02:26:0464 int RestartIgnoringLastError(CompletionOnceCallback callback) override;
mattm436ccfe2017-06-19 20:24:0865 int RestartWithCertificate(scoped_refptr<X509Certificate> client_cert,
66 scoped_refptr<SSLPrivateKey> client_private_key,
Bence Béky046f8c82018-06-12 02:26:0467 CompletionOnceCallback callback) override;
dchengb03027d2014-10-21 12:00:2068 int RestartWithAuth(const AuthCredentials& credentials,
Bence Béky046f8c82018-06-12 02:26:0469 CompletionOnceCallback callback) override;
dchengb03027d2014-10-21 12:00:2070 bool IsReadyToRestartForAuth() override;
[email protected]0757e7702009-03-27 04:00:2271
dchengb03027d2014-10-21 12:00:2072 int Read(IOBuffer* buf,
73 int buf_len,
Bence Béky046f8c82018-06-12 02:26:0474 CompletionOnceCallback callback) override;
dchengb03027d2014-10-21 12:00:2075 void StopCaching() override;
76 bool GetFullRequestHeaders(HttpRequestHeaders* headers) const override;
sclittle4de1bab92015-09-22 21:28:2477 int64_t GetTotalReceivedBytes() const override;
sclittlefb249892015-09-10 21:33:2278 int64_t GetTotalSentBytes() const override;
dchengb03027d2014-10-21 12:00:2079 void DoneReading() override;
80 const HttpResponseInfo* GetResponseInfo() const override;
81 LoadState GetLoadState() const override;
dchengb03027d2014-10-21 12:00:2082 void SetQuicServerInfo(QuicServerInfo* quic_server_info) override;
83 bool GetLoadTimingInfo(LoadTimingInfo* load_timing_info) const override;
ttuttled9dbc652015-09-29 20:00:5984 bool GetRemoteEndpoint(IPEndPoint* endpoint) const override;
zhongyi48704c182015-12-07 07:52:0285 void PopulateNetErrorDetails(NetErrorDetails* details) const override;
dchengb03027d2014-10-21 12:00:2086 void SetPriority(RequestPriority priority) override;
87 void SetWebSocketHandshakeStreamCreateHelper(
mostynbba063d6032014-10-09 11:01:1388 WebSocketHandshakeStreamBase::CreateHelper* create_helper) override;
dchengb03027d2014-10-21 12:00:2089 void SetBeforeNetworkStartCallback(
mostynbba063d6032014-10-09 11:01:1390 const BeforeNetworkStartCallback& callback) override;
ryansturm49a8cb12016-06-15 16:51:0991 void SetBeforeHeadersSentCallback(
92 const BeforeHeadersSentCallback& callback) override;
Andrey Kosyakov2e893e62017-08-31 17:00:5293 void SetRequestHeadersCallback(RequestHeadersCallback callback) override;
94 void SetResponseHeadersCallback(ResponseHeadersCallback callback) override;
Andrey Kosyakov83a6eee2017-08-14 19:20:0495
dchengb03027d2014-10-21 12:00:2096 int ResumeNetworkStart() override;
initial.commit586acc5fe2008-07-26 22:42:5297
[email protected]102e27c2011-02-23 01:01:3198 // HttpStreamRequest::Delegate methods:
dchengb03027d2014-10-21 12:00:2099 void OnStreamReady(const SSLConfig& used_ssl_config,
100 const ProxyInfo& used_proxy_info,
bnc5029f4632017-06-08 16:19:00101 std::unique_ptr<HttpStream> stream) override;
102 void OnBidirectionalStreamImplReady(
103 const SSLConfig& used_ssl_config,
104 const ProxyInfo& used_proxy_info,
105 std::unique_ptr<BidirectionalStreamImpl> stream) override;
dchengb03027d2014-10-21 12:00:20106 void OnWebSocketHandshakeStreamReady(
[email protected]3732cea2013-06-21 06:50:50107 const SSLConfig& used_ssl_config,
108 const ProxyInfo& used_proxy_info,
bnc5029f4632017-06-08 16:19:00109 std::unique_ptr<WebSocketHandshakeStreamBase> stream) override;
Ryan Hamilton75f197262017-08-17 14:00:07110 void OnStreamFailed(int status,
111 const NetErrorDetails& net_error_details,
112 const SSLConfig& used_ssl_config) override;
dchengb03027d2014-10-21 12:00:20113 void OnCertificateError(int status,
114 const SSLConfig& used_ssl_config,
115 const SSLInfo& ssl_info) override;
116 void OnNeedsProxyAuth(const HttpResponseInfo& response_info,
117 const SSLConfig& used_ssl_config,
118 const ProxyInfo& used_proxy_info,
119 HttpAuthController* auth_controller) override;
120 void OnNeedsClientAuth(const SSLConfig& used_ssl_config,
121 SSLCertRequestInfo* cert_info) override;
122 void OnHttpsProxyTunnelResponse(const HttpResponseInfo& response_info,
[email protected]102e27c2011-02-23 01:01:31123 const SSLConfig& used_ssl_config,
dchengb03027d2014-10-21 12:00:20124 const ProxyInfo& used_proxy_info,
Bence Béky6d05ebd2017-05-16 00:09:01125 std::unique_ptr<HttpStream> stream) override;
[email protected]8e6441ca2010-08-19 05:56:38126
zhongyi48704c182015-12-07 07:52:02127 void OnQuicBroken() override;
ttuttle1f2d7e92015-04-28 16:17:47128 void GetConnectionAttempts(ConnectionAttempts* out) const override;
129
initial.commit586acc5fe2008-07-26 22:42:52130 private:
bnc1f61cdf2016-11-28 18:03:45131 FRIEND_TEST_ALL_PREFIXES(HttpNetworkTransactionTest, ResetStateForRestart);
Bence Béky2fcf4fa2018-04-06 20:06:01132 FRIEND_TEST_ALL_PREFIXES(HttpNetworkTransactionTest,
133 CreateWebSocketHandshakeStream);
Nick Harper1e5757d42018-05-02 23:08:57134 FRIEND_TEST_ALL_PREFIXES(HttpNetworkTransactionSSLTest, ChannelID);
bnc1f61cdf2016-11-28 18:03:45135 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, WindowUpdateReceived);
136 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, WindowUpdateSent);
137 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, WindowUpdateOverflow);
138 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, FlowControlStallResume);
[email protected]513963e2013-06-15 01:53:04139 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest,
[email protected]ca6459f862012-04-11 19:43:20140 FlowControlStallResumeAfterSettings);
[email protected]513963e2013-06-15 01:53:04141 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest,
[email protected]ca6459f862012-04-11 19:43:20142 FlowControlNegativeSendWindowSize);
[email protected]89ceba9a2009-03-21 03:46:06143
[email protected]d207a5f2009-06-04 05:28:40144 enum State {
[email protected]1826a402014-01-08 15:40:48145 STATE_NOTIFY_BEFORE_CREATE_STREAM,
[email protected]82918cc2010-08-25 17:24:50146 STATE_CREATE_STREAM,
147 STATE_CREATE_STREAM_COMPLETE,
[email protected]351ab642010-08-05 16:55:31148 STATE_INIT_STREAM,
149 STATE_INIT_STREAM_COMPLETE,
[email protected]044de0642010-06-17 10:42:15150 STATE_GENERATE_PROXY_AUTH_TOKEN,
151 STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE,
152 STATE_GENERATE_SERVER_AUTH_TOKEN,
153 STATE_GENERATE_SERVER_AUTH_TOKEN_COMPLETE,
nharperd6e65822016-03-30 23:05:48154 STATE_GET_PROVIDED_TOKEN_BINDING_KEY,
155 STATE_GET_PROVIDED_TOKEN_BINDING_KEY_COMPLETE,
156 STATE_GET_REFERRED_TOKEN_BINDING_KEY,
157 STATE_GET_REFERRED_TOKEN_BINDING_KEY_COMPLETE,
[email protected]daddea62012-09-19 05:51:13158 STATE_INIT_REQUEST_BODY,
159 STATE_INIT_REQUEST_BODY_COMPLETE,
[email protected]4875ba12011-03-30 22:31:51160 STATE_BUILD_REQUEST,
161 STATE_BUILD_REQUEST_COMPLETE,
[email protected]0877e3d2009-10-17 22:29:57162 STATE_SEND_REQUEST,
163 STATE_SEND_REQUEST_COMPLETE,
[email protected]d207a5f2009-06-04 05:28:40164 STATE_READ_HEADERS,
165 STATE_READ_HEADERS_COMPLETE,
166 STATE_READ_BODY,
167 STATE_READ_BODY_COMPLETE,
168 STATE_DRAIN_BODY_FOR_AUTH_RESTART,
169 STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE,
170 STATE_NONE
171 };
172
Adam Ricecb76ac62015-02-20 05:33:25173 bool IsSecureRequest() const;
nharperb7441ef2016-01-25 23:54:14174 bool IsTokenBindingEnabled() const;
175 void RecordTokenBindingSupport() const;
[email protected]564b4912010-03-09 16:30:42176
Adam Rice425cf122015-01-19 06:18:24177 // Returns true if the request is using an HTTP(S) proxy without being
178 // tunneled via the CONNECT method.
179 bool UsingHttpProxyWithoutTunnel() const;
180
initial.commit586acc5fe2008-07-26 22:42:52181 void DoCallback(int result);
182 void OnIOComplete(int result);
183
184 // Runs the state transition loop.
185 int DoLoop(int result);
186
187 // Each of these methods corresponds to a State value. Those with an input
188 // argument receive the result from the previous state. If a method returns
189 // ERR_IO_PENDING, then the result from OnIOComplete will be passed to the
190 // next state method as the result arg.
[email protected]1826a402014-01-08 15:40:48191 int DoNotifyBeforeCreateStream();
[email protected]82918cc2010-08-25 17:24:50192 int DoCreateStream();
193 int DoCreateStreamComplete(int result);
[email protected]351ab642010-08-05 16:55:31194 int DoInitStream();
195 int DoInitStreamComplete(int result);
[email protected]044de0642010-06-17 10:42:15196 int DoGenerateProxyAuthToken();
197 int DoGenerateProxyAuthTokenComplete(int result);
198 int DoGenerateServerAuthToken();
199 int DoGenerateServerAuthTokenComplete(int result);
nharperd6e65822016-03-30 23:05:48200 int DoGetProvidedTokenBindingKey();
201 int DoGetProvidedTokenBindingKeyComplete(int result);
202 int DoGetReferredTokenBindingKey();
203 int DoGetReferredTokenBindingKeyComplete(int result);
[email protected]daddea62012-09-19 05:51:13204 int DoInitRequestBody();
205 int DoInitRequestBodyComplete(int result);
[email protected]4875ba12011-03-30 22:31:51206 int DoBuildRequest();
207 int DoBuildRequestComplete(int result);
[email protected]0877e3d2009-10-17 22:29:57208 int DoSendRequest();
209 int DoSendRequestComplete(int result);
initial.commit586acc5fe2008-07-26 22:42:52210 int DoReadHeaders();
211 int DoReadHeadersComplete(int result);
212 int DoReadBody();
213 int DoReadBodyComplete(int result);
[email protected]2d2697f92009-02-18 21:00:32214 int DoDrainBodyForAuthRestart();
215 int DoDrainBodyForAuthRestartComplete(int result);
initial.commit586acc5fe2008-07-26 22:42:52216
nharperb7441ef2016-01-25 23:54:14217 int BuildRequestHeaders(bool using_http_proxy_without_tunnel);
218 int BuildTokenBindingHeader(std::string* out);
[email protected]2979a492011-04-06 00:29:14219
[email protected]9f9f86c2009-03-12 22:32:42220 // Writes a log message to help debugging in the field when we block a proxy
221 // response to a CONNECT request.
[email protected]af89ba62009-03-16 20:26:38222 void LogBlockedTunnelResponse(int response_code) const;
[email protected]9f9f86c2009-03-12 22:32:42223
[email protected]0b45559b2009-06-12 21:45:11224 // Called to handle a client certificate request.
[email protected]5e363962009-06-19 19:57:01225 int HandleCertificateRequest(int error);
[email protected]0b45559b2009-06-12 21:45:11226
bncfacdd852015-01-09 19:22:54227 // Called wherever ERR_HTTP_1_1_REQUIRED or
228 // ERR_PROXY_HTTP_1_1_REQUIRED has to be handled.
229 int HandleHttp11Required(int error);
230
David Benjamin76a40ad2018-02-24 22:22:08231 // Called to possibly handle a client authentication error. Sets next_state_
[email protected]bd0b6772011-01-11 19:59:30232 // and returns OK if recovering from the error. Otherwise, the same error
233 // code is returned.
David Benjamin76a40ad2018-02-24 22:22:08234 int HandleSSLClientAuthError(int error);
[email protected]bd0b6772011-01-11 19:59:30235
initial.commit586acc5fe2008-07-26 22:42:52236 // Called to possibly recover from the given error. Sets next_state_ and
237 // returns OK if recovering from the error. Otherwise, the same error code
238 // is returned.
239 int HandleIOError(int error);
240
[email protected]0877e3d2009-10-17 22:29:57241 // Gets the response headers from the HttpStream.
242 HttpResponseHeaders* GetResponseHeaders() const;
243
[email protected]a34f61ee2014-03-18 20:59:49244 // Called when the socket is unexpectedly closed. Returns true if the request
245 // should be resent in case of a socket reuse/close race.
246 bool ShouldResendRequest() const;
[email protected]1c773ea12009-04-28 19:58:42247
Biljith Jayan45a41722017-08-16 18:43:14248 // Returns true if there have already been |kMaxRetryAttempts| retries for
249 // HTTP2 or QUIC network errors, and no further retries should be attempted.
250 bool HasExceededMaxRetries() const;
251
David Benjamin83ddfb32018-03-30 01:07:52252 // Increments the number of restarts and returns true if the restart may
253 // proceed.
254 bool CheckMaxRestarts();
255
[email protected]1c773ea12009-04-28 19:58:42256 // Resets the connection and the request headers for resend. Called when
257 // ShouldResendRequest() is true.
258 void ResetConnectionAndRequestForResend();
[email protected]2a5c76b2008-09-25 22:15:16259
[email protected]f9ee6b52008-11-08 06:46:23260 // Sets up the state machine to restart the transaction with auth.
261 void PrepareForAuthRestart(HttpAuth::Target target);
262
[email protected]2d2697f92009-02-18 21:00:32263 // Called when we don't need to drain the response body or have drained it.
264 // Resets |connection_| unless |keep_alive| is true, then calls
265 // ResetStateForRestart. Sets |next_state_| appropriately.
266 void DidDrainBodyForAuthRestart(bool keep_alive);
267
[email protected]f9ee6b52008-11-08 06:46:23268 // Resets the members of the transaction so it can be restarted.
[email protected]c3b35c22008-09-27 03:19:42269 void ResetStateForRestart();
270
[email protected]697ef4c2010-10-14 16:38:58271 // Resets the members of the transaction, except |stream_|, which needs
272 // to be maintained for multi-round auth.
273 void ResetStateForAuthRestart();
274
zhongyica364fbb2015-12-12 03:39:12275 // Caches network error details from the stream if available
276 // and resets the stream.
277 void CacheNetErrorDetailsAndResetStream();
278
[email protected]1c773ea12009-04-28 19:58:42279 // Returns true if we should try to add a Proxy-Authorization header
280 bool ShouldApplyProxyAuth() const;
[email protected]c3b35c22008-09-27 03:19:42281
[email protected]1c773ea12009-04-28 19:58:42282 // Returns true if we should try to add an Authorization header.
283 bool ShouldApplyServerAuth() const;
284
[email protected]f9ee6b52008-11-08 06:46:23285 // Handles HTTP status code 401 or 407.
[email protected]0757e7702009-03-27 04:00:22286 // HandleAuthChallenge() returns a network error code, or OK on success.
287 // May update |pending_auth_target_| or |response_.auth_challenge|.
[email protected]e772db3f2010-07-12 18:11:13288 int HandleAuthChallenge();
[email protected]f9ee6b52008-11-08 06:46:23289
[email protected]8e6441ca2010-08-19 05:56:38290 // Returns true if we have auth credentials for the given target.
291 bool HaveAuth(HttpAuth::Target target) const;
[email protected]c3b35c22008-09-27 03:19:42292
[email protected]228404f2010-06-24 04:31:41293 // Get the {scheme, host, path, port} for the authentication target
294 GURL AuthURL(HttpAuth::Target target) const;
[email protected]044de0642010-06-17 10:42:15295
[email protected]831e4a32013-11-14 02:14:44296 // Returns true if this transaction is for a WebSocket handshake
297 bool ForWebSocketHandshake() const;
298
ttuttle1f2d7e92015-04-28 16:17:47299 void CopyConnectionAttemptsFromStreamRequest();
300
eustasc7d27da2017-04-06 10:33:20301 // Returns true if response "Content-Encoding" headers respect
302 // "Accept-Encoding".
303 bool ContentEncodingsValid() const;
304
[email protected]e772db3f2010-07-12 18:11:13305 scoped_refptr<HttpAuthController>
306 auth_controllers_[HttpAuth::AUTH_NUM_TARGETS];
[email protected]c3b35c22008-09-27 03:19:42307
[email protected]0757e7702009-03-27 04:00:22308 // Whether this transaction is waiting for proxy auth, server auth, or is
309 // not waiting for any auth at all. |pending_auth_target_| is read and
310 // cleared by RestartWithAuth().
311 HttpAuth::Target pending_auth_target_;
312
Bence Béky61f756c2018-04-25 14:17:53313 CompletionRepeatingCallback io_callback_;
Bence Béky046f8c82018-06-12 02:26:04314 CompletionOnceCallback callback_;
initial.commit586acc5fe2008-07-26 22:42:52315
[email protected]3fe8d2f82013-10-17 08:56:07316 HttpNetworkSession* session_;
initial.commit586acc5fe2008-07-26 22:42:52317
tfarina42834112016-09-22 13:38:20318 NetLogWithSource net_log_;
shivanisha0b440852016-10-18 15:48:15319
320 // Reset to null at the start of the Read state machine.
initial.commit586acc5fe2008-07-26 22:42:52321 const HttpRequestInfo* request_;
shivanisha0b440852016-10-18 15:48:15322
323 // The requested URL.
324 GURL url_;
[email protected]262eec82013-03-19 21:01:36325 RequestPriority priority_;
[email protected]a7e41312009-12-16 23:18:14326 HttpResponseInfo response_;
initial.commit586acc5fe2008-07-26 22:42:52327
[email protected]102e27c2011-02-23 01:01:31328 // |proxy_info_| is the ProxyInfo used by the HttpStreamRequest.
[email protected]928fb582008-08-11 15:40:23329 ProxyInfo proxy_info_;
initial.commit586acc5fe2008-07-26 22:42:52330
danakj1fd259a02016-04-16 03:17:09331 std::unique_ptr<HttpStreamRequest> stream_request_;
332 std::unique_ptr<HttpStream> stream_;
[email protected]8e6441ca2010-08-19 05:56:38333
[email protected]0877e3d2009-10-17 22:29:57334 // True if we've validated the headers that the stream parser has returned.
335 bool headers_valid_;
336
Steven Valdezb4ff0412018-01-18 22:39:27337 // True if we can send the request over early data.
338 bool can_send_early_data_;
339
David Benjamin76a40ad2018-02-24 22:22:08340 // True if |server_ssl_config_.client_cert| was looked up from the
341 // SSLClientAuthCache, rather than provided externally by the caller.
342 bool server_ssl_client_cert_was_cached_;
343
David Benjamin5cb91132018-04-06 05:54:49344 // SSL configuration used for the server and proxy, respectively. Note
345 // |server_ssl_config_| may be updated from the HttpStreamFactory, which will
346 // be applied on retry.
347 //
348 // TODO(davidben): Mutating it is weird and relies on HttpStreamFactory
349 // modifications being idempotent. Address this as part of other work to make
350 // sense of SSLConfig (related to https://crbug.com/488043).
[email protected]102957f2011-09-02 17:10:14351 SSLConfig server_ssl_config_;
352 SSLConfig proxy_ssl_config_;
[email protected]c5949a32008-10-08 17:28:23353
nharperd6e65822016-03-30 23:05:48354 // Keys to use for signing message in Token Binding header.
danakj1fd259a02016-04-16 03:17:09355 std::unique_ptr<crypto::ECPrivateKey> provided_token_binding_key_;
356 std::unique_ptr<crypto::ECPrivateKey> referred_token_binding_key_;
nharperd6e65822016-03-30 23:05:48357 // Object to manage lookup of |provided_token_binding_key_| and
358 // |referred_token_binding_key_|.
nharperb7441ef2016-01-25 23:54:14359 ChannelIDService::Request token_binding_request_;
360
[email protected]b94f92d2010-10-27 16:45:20361 HttpRequestHeaders request_headers_;
[email protected]4ddaf2502008-10-23 18:26:19362
[email protected]2d2697f92009-02-18 21:00:32363 // The size in bytes of the buffer we use to drain the response body that
364 // we want to throw away. The response body is typically a small error
365 // page just a few hundred bytes long.
[email protected]81854c42010-09-22 03:39:36366 static const int kDrainBodyBufferSize = 1024;
[email protected]2d2697f92009-02-18 21:00:32367
initial.commit586acc5fe2008-07-26 22:42:52368 // User buffer and length passed to the Read method.
[email protected]9dea9e1f2009-01-29 00:30:47369 scoped_refptr<IOBuffer> read_buf_;
initial.commit586acc5fe2008-07-26 22:42:52370 int read_buf_len_;
371
sclittlefb249892015-09-10 21:33:22372 // Total number of bytes received on all destroyed HttpStreams for this
373 // transaction.
sclittle4de1bab92015-09-22 21:28:24374 int64_t total_received_bytes_;
[email protected]b8015c42013-12-24 15:18:19375
sclittlefb249892015-09-10 21:33:22376 // Total number of bytes sent on all destroyed HttpStreams for this
377 // transaction.
378 int64_t total_sent_bytes_;
379
[email protected]58e32bb2013-01-21 18:23:25380 // When the transaction started / finished sending the request, including
381 // the body, if present.
382 base::TimeTicks send_start_time_;
383 base::TimeTicks send_end_time_;
384
[email protected]d207a5f2009-06-04 05:28:40385 // The next state in the state machine.
initial.commit586acc5fe2008-07-26 22:42:52386 State next_state_;
[email protected]2ff8b312010-04-26 22:20:54387
[email protected]a7ea8832010-07-12 17:54:54388 // True when the tunnel is in the process of being established - we can't
389 // read from the socket until the tunnel is done.
390 bool establishing_tunnel_;
391
bnc8016c1f2017-03-31 02:11:29392 // Enable pooling to a SpdySession with matching IP and certificate
393 // even if the SpdySessionKey is different.
394 bool enable_ip_based_pooling_;
395
bncaccd4962017-04-06 21:00:26396 // Enable using alternative services for the request.
397 bool enable_alternative_services_;
398
rch2f2991c2017-04-13 19:28:17399 // When a request is retried because of errors with the alternative service,
400 // this will store the alternative service used.
401 AlternativeService retried_alternative_service_;
402
[email protected]831e4a32013-11-14 02:14:44403 // The helper object to use to create WebSocketHandshakeStreamBase
404 // objects. Only relevant when establishing a WebSocket connection.
405 WebSocketHandshakeStreamBase::CreateHelper*
406 websocket_handshake_stream_base_create_helper_;
407
[email protected]1826a402014-01-08 15:40:48408 BeforeNetworkStartCallback before_network_start_callback_;
ryansturm49a8cb12016-06-15 16:51:09409 BeforeHeadersSentCallback before_headers_sent_callback_;
Andrey Kosyakov83a6eee2017-08-14 19:20:04410 RequestHeadersCallback request_headers_callback_;
Andrey Kosyakov2e893e62017-08-31 17:00:52411 ResponseHeadersCallback response_headers_callback_;
[email protected]1826a402014-01-08 15:40:48412
ttuttle1f2d7e92015-04-28 16:17:47413 ConnectionAttempts connection_attempts_;
ttuttled9dbc652015-09-29 20:00:59414 IPEndPoint remote_endpoint_;
zhongyica364fbb2015-12-12 03:39:12415 // Network error details for this transaction.
416 NetErrorDetails net_error_details_;
rdsmith1d343be52016-10-21 20:37:50417
Biljith Jayan45a41722017-08-16 18:43:14418 // Number of retries made for network errors like ERR_SPDY_PING_FAILED,
419 // ERR_SPDY_SERVER_REFUSED_STREAM, ERR_QUIC_HANDSHAKE_FAILED and
420 // ERR_QUIC_PROTOCOL_ERROR. Currently we stop after 3 tries
421 // (including the initial request) and fail the request.
422 // This count excludes retries on reused sockets since a well
423 // behaved server may time those out and thus the number
424 // of times we can retry a request on reused sockets is limited.
425 size_t retry_attempts_;
426
David Benjamin83ddfb32018-03-30 01:07:52427 // Number of times the transaction was restarted via a RestartWith* call.
428 size_t num_restarts_;
429
David Benjamin5cb91132018-04-06 05:54:49430 // The net::Error which triggered a TLS 1.3 version interference probe, or OK
431 // if none was triggered.
432 int ssl_version_interference_error_;
433
[email protected]2ff8b312010-04-26 22:20:54434 DISALLOW_COPY_AND_ASSIGN(HttpNetworkTransaction);
initial.commit586acc5fe2008-07-26 22:42:52435};
436
437} // namespace net
438
439#endif // NET_HTTP_HTTP_NETWORK_TRANSACTION_H_