blob: ecc2912b6fde15f281a7286427eae0fd8b79b624 [file] [log] [blame]
[email protected]e92fa7e12012-02-16 23:31:221// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]fe2f62a2010-10-01 03:34:072// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/spdy/spdy_proxy_client_socket.h"
6
7#include <algorithm> // min
dchengc7eeda422015-12-26 03:56:488#include <utility>
[email protected]fe2f62a2010-10-01 03:34:079
[email protected]49639fa2011-12-20 23:22:4110#include "base/bind.h"
11#include "base/bind_helpers.h"
[email protected]aa19cfc2013-05-23 16:41:3812#include "base/callback_helpers.h"
skyostil4891b25b2015-06-11 11:43:4513#include "base/location.h"
[email protected]fe2f62a2010-10-01 03:34:0714#include "base/logging.h"
skyostil4891b25b2015-06-11 11:43:4515#include "base/single_thread_task_runner.h"
[email protected]fc9be5802013-06-11 10:56:5116#include "base/strings/string_util.h"
gabf767595f2016-05-11 18:50:3517#include "base/threading/thread_task_runner_handle.h"
[email protected]f6c63db52013-02-02 00:35:2218#include "base/values.h"
[email protected]fe2f62a2010-10-01 03:34:0719#include "net/base/auth.h"
20#include "net/base/io_buffer.h"
[email protected]fe3b7dc2012-02-03 19:52:0921#include "net/http/http_auth_cache.h"
22#include "net/http/http_auth_handler_factory.h"
rchc5c07de2015-04-08 07:28:1823#include "net/http/http_request_info.h"
[email protected]b104b502010-10-18 20:21:3124#include "net/http/http_response_headers.h"
[email protected]57d2dfa2013-06-24 06:04:1225#include "net/http/proxy_connect_redirect_http_stream.h"
[email protected]fe2f62a2010-10-01 03:34:0726#include "net/spdy/spdy_http_utils.h"
[email protected]f89276a72013-07-12 06:41:5427#include "url/gurl.h"
[email protected]fe2f62a2010-10-01 03:34:0728
29namespace net {
30
31SpdyProxyClientSocket::SpdyProxyClientSocket(
[email protected]d26ff352013-05-13 08:48:2832 const base::WeakPtr<SpdyStream>& spdy_stream,
[email protected]fe2f62a2010-10-01 03:34:0733 const std::string& user_agent,
34 const HostPortPair& endpoint,
[email protected]fe2f62a2010-10-01 03:34:0735 const HostPortPair& proxy_server,
[email protected]f6c63db52013-02-02 00:35:2236 const BoundNetLog& source_net_log,
mmenke2a1781d2015-10-07 19:25:3337 HttpAuthController* auth_controller)
[email protected]49639fa2011-12-20 23:22:4138 : next_state_(STATE_DISCONNECTED),
[email protected]fe2f62a2010-10-01 03:34:0739 spdy_stream_(spdy_stream),
[email protected]fe2f62a2010-10-01 03:34:0740 endpoint_(endpoint),
mmenke2a1781d2015-10-07 19:25:3341 auth_(auth_controller),
rchecd3c552015-04-07 20:53:5442 user_agent_(user_agent),
[email protected]ca690b02013-04-17 10:38:4343 user_buffer_len_(0),
[email protected]fe2f62a2010-10-01 03:34:0744 write_buffer_len_(0),
[email protected]57d2dfa2013-06-24 06:04:1245 was_ever_used_(false),
46 redirect_has_load_timing_info_(false),
[email protected]f6c63db52013-02-02 00:35:2247 net_log_(BoundNetLog::Make(spdy_stream->net_log().net_log(),
[email protected]0a30cf512014-05-27 20:55:1848 NetLog::SOURCE_PROXY_CLIENT_SOCKET)),
[email protected]0a428c22014-06-14 02:26:3749 weak_factory_(this),
50 write_callback_weak_factory_(this) {
[email protected]fe2f62a2010-10-01 03:34:0751 request_.method = "CONNECT";
rchecd3c552015-04-07 20:53:5452 request_.url = GURL("https://" + endpoint.ToString());
[email protected]f6c63db52013-02-02 00:35:2253 net_log_.BeginEvent(NetLog::TYPE_SOCKET_ALIVE,
54 source_net_log.source().ToEventParametersCallback());
55 net_log_.AddEvent(
bncbe32a032015-02-25 17:22:5556 NetLog::TYPE_HTTP2_PROXY_CLIENT_SESSION,
[email protected]f6c63db52013-02-02 00:35:2257 spdy_stream->net_log().source().ToEventParametersCallback());
58
[email protected]fe2f62a2010-10-01 03:34:0759 spdy_stream_->SetDelegate(this);
60 was_ever_used_ = spdy_stream_->WasEverUsed();
61}
62
63SpdyProxyClientSocket::~SpdyProxyClientSocket() {
64 Disconnect();
[email protected]f6c63db52013-02-02 00:35:2265 net_log_.EndEvent(NetLog::TYPE_SOCKET_ALIVE);
[email protected]fe2f62a2010-10-01 03:34:0766}
67
[email protected]be1a48b2011-01-20 00:12:1368const HttpResponseInfo* SpdyProxyClientSocket::GetConnectResponseInfo() const {
[email protected]90499482013-06-01 00:39:5069 return response_.headers.get() ? &response_ : NULL;
[email protected]be1a48b2011-01-20 00:12:1370}
71
[email protected]c0fe941d2012-02-25 00:15:3272const scoped_refptr<HttpAuthController>&
73SpdyProxyClientSocket::GetAuthController() const {
74 return auth_;
75}
76
77int SpdyProxyClientSocket::RestartWithAuth(const CompletionCallback& callback) {
78 // A SPDY Stream can only handle a single request, so the underlying
79 // stream may not be reused and a new SpdyProxyClientSocket must be
80 // created (possibly on top of the same SPDY Session).
81 next_state_ = STATE_DISCONNECTED;
[email protected]0c5fb722012-02-28 11:50:3582 return OK;
[email protected]c0fe941d2012-02-25 00:15:3283}
84
85bool SpdyProxyClientSocket::IsUsingSpdy() const {
86 return true;
87}
88
[email protected]8e3c78cb2012-03-31 03:58:4689NextProto SpdyProxyClientSocket::GetProtocolNegotiated() const {
[email protected]c0fe941d2012-02-25 00:15:3290 // Save the negotiated protocol
91 SSLInfo ssl_info;
92 bool was_npn_negotiated;
[email protected]8e3c78cb2012-03-31 03:58:4693 NextProto protocol_negotiated;
[email protected]c0fe941d2012-02-25 00:15:3294 spdy_stream_->GetSSLInfo(&ssl_info, &was_npn_negotiated,
95 &protocol_negotiated);
96 return protocol_negotiated;
97}
98
[email protected]511f6f52010-12-17 03:58:2999HttpStream* SpdyProxyClientSocket::CreateConnectResponseStream() {
[email protected]57d2dfa2013-06-24 06:04:12100 return new ProxyConnectRedirectHttpStream(
101 redirect_has_load_timing_info_ ? &redirect_load_timing_info_ : NULL);
[email protected]511f6f52010-12-17 03:58:29102}
103
[email protected]fe2f62a2010-10-01 03:34:07104// Sends a SYN_STREAM frame to the proxy with a CONNECT request
105// for the specified endpoint. Waits for the server to send back
106// a SYN_REPLY frame. OK will be returned if the status is 200.
107// ERR_TUNNEL_CONNECTION_FAILED will be returned for any other status.
108// In any of these cases, Read() may be called to retrieve the HTTP
109// response body. Any other return values should be considered fatal.
[email protected]fe3b7dc2012-02-03 19:52:09110// TODO(rch): handle 407 proxy auth requested correctly, perhaps
111// by creating a new stream for the subsequent request.
[email protected]fe2f62a2010-10-01 03:34:07112// TODO(rch): create a more appropriate error code to disambiguate
113// the HTTPS Proxy tunnel failure from an HTTP Proxy tunnel failure.
[email protected]dbf036f2011-12-06 23:33:24114int SpdyProxyClientSocket::Connect(const CompletionCallback& callback) {
[email protected]83039bb2011-12-09 18:43:55115 DCHECK(read_callback_.is_null());
[email protected]d9da5fe2010-10-13 22:37:16116 if (next_state_ == STATE_OPEN)
[email protected]fe2f62a2010-10-01 03:34:07117 return OK;
118
[email protected]d9da5fe2010-10-13 22:37:16119 DCHECK_EQ(STATE_DISCONNECTED, next_state_);
[email protected]fe2f62a2010-10-01 03:34:07120 next_state_ = STATE_GENERATE_AUTH_TOKEN;
121
122 int rv = DoLoop(OK);
123 if (rv == ERR_IO_PENDING)
124 read_callback_ = callback;
125 return rv;
126}
127
128void SpdyProxyClientSocket::Disconnect() {
[email protected]ca690b02013-04-17 10:38:43129 read_buffer_queue_.Clear();
[email protected]d9da5fe2010-10-13 22:37:16130 user_buffer_ = NULL;
[email protected]ca690b02013-04-17 10:38:43131 user_buffer_len_ = 0;
[email protected]dbf036f2011-12-06 23:33:24132 read_callback_.Reset();
[email protected]d9da5fe2010-10-13 22:37:16133
134 write_buffer_len_ = 0;
[email protected]83039bb2011-12-09 18:43:55135 write_callback_.Reset();
[email protected]0a428c22014-06-14 02:26:37136 write_callback_weak_factory_.InvalidateWeakPtrs();
[email protected]d9da5fe2010-10-13 22:37:16137
138 next_state_ = STATE_DISCONNECTED;
139
[email protected]11fbca0b2013-06-02 23:37:21140 if (spdy_stream_.get()) {
[email protected]fe2f62a2010-10-01 03:34:07141 // This will cause OnClose to be invoked, which takes care of
142 // cleaning up all the internal state.
143 spdy_stream_->Cancel();
[email protected]11fbca0b2013-06-02 23:37:21144 DCHECK(!spdy_stream_.get());
[email protected]f6a78292013-03-09 14:36:34145 }
[email protected]fe2f62a2010-10-01 03:34:07146}
147
148bool SpdyProxyClientSocket::IsConnected() const {
[email protected]194c7a92011-12-03 04:54:18149 return next_state_ == STATE_OPEN;
[email protected]fe2f62a2010-10-01 03:34:07150}
151
152bool SpdyProxyClientSocket::IsConnectedAndIdle() const {
[email protected]ca690b02013-04-17 10:38:43153 return IsConnected() && read_buffer_queue_.IsEmpty() &&
[email protected]5ff0ed32014-02-12 17:48:51154 spdy_stream_->IsOpen();
[email protected]fe2f62a2010-10-01 03:34:07155}
156
[email protected]e4be2dd2010-12-14 00:44:39157const BoundNetLog& SpdyProxyClientSocket::NetLog() const {
158 return net_log_;
159}
160
[email protected]fe2f62a2010-10-01 03:34:07161void SpdyProxyClientSocket::SetSubresourceSpeculation() {
162 // TODO(rch): what should this implementation be?
163}
164
165void SpdyProxyClientSocket::SetOmniboxSpeculation() {
166 // TODO(rch): what should this implementation be?
167}
168
169bool SpdyProxyClientSocket::WasEverUsed() const {
[email protected]11fbca0b2013-06-02 23:37:21170 return was_ever_used_ || (spdy_stream_.get() && spdy_stream_->WasEverUsed());
[email protected]fe2f62a2010-10-01 03:34:07171}
172
[email protected]2d88e7d2012-07-19 17:55:17173bool SpdyProxyClientSocket::WasNpnNegotiated() const {
174 return false;
175}
176
[email protected]33661e482012-04-03 16:16:26177NextProto SpdyProxyClientSocket::GetNegotiatedProtocol() const {
178 return kProtoUnknown;
179}
180
[email protected]2d88e7d2012-07-19 17:55:17181bool SpdyProxyClientSocket::GetSSLInfo(SSLInfo* ssl_info) {
182 bool was_npn_negotiated;
183 NextProto protocol_negotiated;
184 return spdy_stream_->GetSSLInfo(ssl_info, &was_npn_negotiated,
185 &protocol_negotiated);
186}
187
ttuttle23fdb7b2015-05-15 01:28:03188void SpdyProxyClientSocket::GetConnectionAttempts(
189 ConnectionAttempts* out) const {
190 out->clear();
191}
192
tbansalf82cc8e2015-10-14 20:05:49193int64_t SpdyProxyClientSocket::GetTotalReceivedBytes() const {
194 NOTIMPLEMENTED();
195 return 0;
196}
197
[email protected]fe2f62a2010-10-01 03:34:07198int SpdyProxyClientSocket::Read(IOBuffer* buf, int buf_len,
[email protected]3f55aa12011-12-07 02:03:33199 const CompletionCallback& callback) {
[email protected]83039bb2011-12-09 18:43:55200 DCHECK(read_callback_.is_null());
[email protected]90499482013-06-01 00:39:50201 DCHECK(!user_buffer_.get());
[email protected]3f55aa12011-12-07 02:03:33202
203 if (next_state_ == STATE_DISCONNECTED)
204 return ERR_SOCKET_NOT_CONNECTED;
205
[email protected]ca690b02013-04-17 10:38:43206 if (next_state_ == STATE_CLOSED && read_buffer_queue_.IsEmpty()) {
[email protected]3f55aa12011-12-07 02:03:33207 return 0;
208 }
209
210 DCHECK(next_state_ == STATE_OPEN || next_state_ == STATE_CLOSED);
211 DCHECK(buf);
[email protected]ca690b02013-04-17 10:38:43212 size_t result = PopulateUserReadBuffer(buf->data(), buf_len);
[email protected]3f55aa12011-12-07 02:03:33213 if (result == 0) {
[email protected]ca690b02013-04-17 10:38:43214 user_buffer_ = buf;
215 user_buffer_len_ = static_cast<size_t>(buf_len);
[email protected]3f55aa12011-12-07 02:03:33216 DCHECK(!callback.is_null());
217 read_callback_ = callback;
218 return ERR_IO_PENDING;
219 }
220 user_buffer_ = NULL;
221 return result;
222}
[email protected]fe2f62a2010-10-01 03:34:07223
[email protected]ca690b02013-04-17 10:38:43224size_t SpdyProxyClientSocket::PopulateUserReadBuffer(char* data, size_t len) {
[email protected]09a8d9172013-04-17 19:23:49225 return read_buffer_queue_.Dequeue(data, len);
[email protected]fe2f62a2010-10-01 03:34:07226}
227
228int SpdyProxyClientSocket::Write(IOBuffer* buf, int buf_len,
[email protected]83039bb2011-12-09 18:43:55229 const CompletionCallback& callback) {
230 DCHECK(write_callback_.is_null());
[email protected]194c7a92011-12-03 04:54:18231 if (next_state_ != STATE_OPEN)
[email protected]d9da5fe2010-10-13 22:37:16232 return ERR_SOCKET_NOT_CONNECTED;
233
[email protected]11fbca0b2013-06-02 23:37:21234 DCHECK(spdy_stream_.get());
[email protected]edbfa8c2013-05-29 00:22:33235 spdy_stream_->SendData(buf, buf_len, MORE_DATA_TO_SEND);
[email protected]aa19cfc2013-05-23 16:41:38236 net_log_.AddByteTransferEvent(NetLog::TYPE_SOCKET_BYTES_SENT,
237 buf_len, buf->data());
238 write_callback_ = callback;
239 write_buffer_len_ = buf_len;
240 return ERR_IO_PENDING;
[email protected]fe2f62a2010-10-01 03:34:07241}
242
Avi Drissman13fc8932015-12-20 04:40:46243int SpdyProxyClientSocket::SetReceiveBufferSize(int32_t size) {
[email protected]3268023f2011-05-05 00:08:10244 // Since this StreamSocket sits on top of a shared SpdySession, it
[email protected]28b96d1c2014-04-09 12:21:15245 // is not safe for callers to change this underlying socket.
246 return ERR_NOT_IMPLEMENTED;
[email protected]fe2f62a2010-10-01 03:34:07247}
248
Avi Drissman13fc8932015-12-20 04:40:46249int SpdyProxyClientSocket::SetSendBufferSize(int32_t size) {
[email protected]3268023f2011-05-05 00:08:10250 // Since this StreamSocket sits on top of a shared SpdySession, it
[email protected]28b96d1c2014-04-09 12:21:15251 // is not safe for callers to change this underlying socket.
252 return ERR_NOT_IMPLEMENTED;
[email protected]fe2f62a2010-10-01 03:34:07253}
254
[email protected]a3528692012-06-08 00:11:42255int SpdyProxyClientSocket::GetPeerAddress(IPEndPoint* address) const {
[email protected]fe2f62a2010-10-01 03:34:07256 if (!IsConnected())
[email protected]88e03fa2010-10-05 03:09:04257 return ERR_SOCKET_NOT_CONNECTED;
[email protected]fe2f62a2010-10-01 03:34:07258 return spdy_stream_->GetPeerAddress(address);
259}
260
[email protected]e7f74da2011-04-19 23:49:35261int SpdyProxyClientSocket::GetLocalAddress(IPEndPoint* address) const {
262 if (!IsConnected())
263 return ERR_SOCKET_NOT_CONNECTED;
264 return spdy_stream_->GetLocalAddress(address);
265}
266
[email protected]4eddbc732012-08-09 05:40:17267void SpdyProxyClientSocket::LogBlockedTunnelResponse() const {
268 ProxyClientSocket::LogBlockedTunnelResponse(
269 response_.headers->response_code(),
[email protected]4eddbc732012-08-09 05:40:17270 /* is_https_proxy = */ true);
271}
272
[email protected]0a428c22014-06-14 02:26:37273void SpdyProxyClientSocket::RunCallback(const CompletionCallback& callback,
274 int result) const {
275 callback.Run(result);
276}
277
[email protected]fe2f62a2010-10-01 03:34:07278void SpdyProxyClientSocket::OnIOComplete(int result) {
[email protected]d9da5fe2010-10-13 22:37:16279 DCHECK_NE(STATE_DISCONNECTED, next_state_);
[email protected]fe2f62a2010-10-01 03:34:07280 int rv = DoLoop(result);
281 if (rv != ERR_IO_PENDING) {
[email protected]83039bb2011-12-09 18:43:55282 CompletionCallback c = read_callback_;
283 read_callback_.Reset();
284 c.Run(rv);
[email protected]fe2f62a2010-10-01 03:34:07285 }
286}
287
288int SpdyProxyClientSocket::DoLoop(int last_io_result) {
[email protected]d9da5fe2010-10-13 22:37:16289 DCHECK_NE(next_state_, STATE_DISCONNECTED);
[email protected]fe2f62a2010-10-01 03:34:07290 int rv = last_io_result;
291 do {
292 State state = next_state_;
[email protected]d9da5fe2010-10-13 22:37:16293 next_state_ = STATE_DISCONNECTED;
[email protected]fe2f62a2010-10-01 03:34:07294 switch (state) {
295 case STATE_GENERATE_AUTH_TOKEN:
296 DCHECK_EQ(OK, rv);
297 rv = DoGenerateAuthToken();
298 break;
299 case STATE_GENERATE_AUTH_TOKEN_COMPLETE:
300 rv = DoGenerateAuthTokenComplete(rv);
301 break;
302 case STATE_SEND_REQUEST:
303 DCHECK_EQ(OK, rv);
[email protected]f6c63db52013-02-02 00:35:22304 net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_TUNNEL_SEND_REQUEST);
[email protected]fe2f62a2010-10-01 03:34:07305 rv = DoSendRequest();
306 break;
307 case STATE_SEND_REQUEST_COMPLETE:
[email protected]d7fd1782011-02-08 19:16:43308 net_log_.EndEventWithNetErrorCode(
309 NetLog::TYPE_HTTP_TRANSACTION_TUNNEL_SEND_REQUEST, rv);
[email protected]fe2f62a2010-10-01 03:34:07310 rv = DoSendRequestComplete(rv);
[email protected]f6c63db52013-02-02 00:35:22311 if (rv >= 0 || rv == ERR_IO_PENDING) {
312 // Emit extra event so can use the same events as
313 // HttpProxyClientSocket.
314 net_log_.BeginEvent(
315 NetLog::TYPE_HTTP_TRANSACTION_TUNNEL_READ_HEADERS);
316 }
[email protected]fe2f62a2010-10-01 03:34:07317 break;
318 case STATE_READ_REPLY_COMPLETE:
319 rv = DoReadReplyComplete(rv);
[email protected]d7fd1782011-02-08 19:16:43320 net_log_.EndEventWithNetErrorCode(
321 NetLog::TYPE_HTTP_TRANSACTION_TUNNEL_READ_HEADERS, rv);
[email protected]fe2f62a2010-10-01 03:34:07322 break;
323 default:
324 NOTREACHED() << "bad state";
325 rv = ERR_UNEXPECTED;
326 break;
327 }
[email protected]d9da5fe2010-10-13 22:37:16328 } while (rv != ERR_IO_PENDING && next_state_ != STATE_DISCONNECTED &&
329 next_state_ != STATE_OPEN);
[email protected]fe2f62a2010-10-01 03:34:07330 return rv;
331}
332
333int SpdyProxyClientSocket::DoGenerateAuthToken() {
334 next_state_ = STATE_GENERATE_AUTH_TOKEN_COMPLETE;
[email protected]49639fa2011-12-20 23:22:41335 return auth_->MaybeGenerateAuthToken(
336 &request_,
[email protected]f6a78292013-03-09 14:36:34337 base::Bind(&SpdyProxyClientSocket::OnIOComplete,
338 weak_factory_.GetWeakPtr()),
[email protected]49639fa2011-12-20 23:22:41339 net_log_);
[email protected]fe2f62a2010-10-01 03:34:07340}
341
342int SpdyProxyClientSocket::DoGenerateAuthTokenComplete(int result) {
343 DCHECK_NE(ERR_IO_PENDING, result);
344 if (result == OK)
345 next_state_ = STATE_SEND_REQUEST;
346 return result;
347}
348
349int SpdyProxyClientSocket::DoSendRequest() {
350 next_state_ = STATE_SEND_REQUEST_COMPLETE;
351
352 // Add Proxy-Authentication header if necessary.
353 HttpRequestHeaders authorization_headers;
354 if (auth_->HaveAuth()) {
355 auth_->AddAuthorizationHeader(&authorization_headers);
356 }
357
358 std::string request_line;
rchecd3c552015-04-07 20:53:54359 BuildTunnelRequest(endpoint_, authorization_headers, user_agent_,
360 &request_line, &request_.extra_headers);
[email protected]3abacd62012-06-10 20:20:32361
362 net_log_.AddEvent(
363 NetLog::TYPE_HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
364 base::Bind(&HttpRequestHeaders::NetLogCallback,
rchecd3c552015-04-07 20:53:54365 base::Unretained(&request_.extra_headers), &request_line));
[email protected]fe2f62a2010-10-01 03:34:07366
bnc1d1d86462016-07-20 16:51:55367 SpdyHeaderBlock headers;
bncbca843ba2016-07-14 13:05:48368 CreateSpdyHeadersFromHttpRequest(request_, request_.extra_headers, true,
bnc1d1d86462016-07-20 16:51:55369 &headers);
[email protected]fe2f62a2010-10-01 03:34:07370
dchengc7eeda422015-12-26 03:56:48371 return spdy_stream_->SendRequestHeaders(std::move(headers),
372 MORE_DATA_TO_SEND);
[email protected]fe2f62a2010-10-01 03:34:07373}
374
375int SpdyProxyClientSocket::DoSendRequestComplete(int result) {
376 if (result < 0)
377 return result;
378
379 // Wait for SYN_REPLY frame from the server
380 next_state_ = STATE_READ_REPLY_COMPLETE;
381 return ERR_IO_PENDING;
382}
383
384int SpdyProxyClientSocket::DoReadReplyComplete(int result) {
385 // We enter this method directly from DoSendRequestComplete, since
386 // we are notified by a callback when the SYN_REPLY frame arrives
387
388 if (result < 0)
389 return result;
390
[email protected]fe2f62a2010-10-01 03:34:07391 // Require the "HTTP/1.x" status line for SSL CONNECT.
bncbe0f6af2015-10-15 17:49:56392 if (response_.headers->GetHttpVersion() < HttpVersion(1, 0))
[email protected]fe2f62a2010-10-01 03:34:07393 return ERR_TUNNEL_CONNECTION_FAILED;
394
[email protected]3abacd62012-06-10 20:20:32395 net_log_.AddEvent(
396 NetLog::TYPE_HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
397 base::Bind(&HttpResponseHeaders::NetLogCallback, response_.headers));
[email protected]fe2f62a2010-10-01 03:34:07398
[email protected]4eddbc732012-08-09 05:40:17399 switch (response_.headers->response_code()) {
400 case 200: // OK
401 next_state_ = STATE_OPEN;
402 return OK;
403
404 case 302: // Found / Moved Temporarily
405 // Try to return a sanitized response so we can follow auth redirects.
406 // If we can't, fail the tunnel connection.
ttuttle7933c112015-01-06 00:55:24407 if (!SanitizeProxyRedirect(&response_)) {
[email protected]4eddbc732012-08-09 05:40:17408 LogBlockedTunnelResponse();
409 return ERR_TUNNEL_CONNECTION_FAILED;
410 }
411
ttuttle7933c112015-01-06 00:55:24412 redirect_has_load_timing_info_ =
413 spdy_stream_->GetLoadTimingInfo(&redirect_load_timing_info_);
414 // Note that this triggers a RST_STREAM_CANCEL.
415 spdy_stream_->DetachDelegate();
416 next_state_ = STATE_DISCONNECTED;
417 return ERR_HTTPS_PROXY_TUNNEL_RESPONSE;
418
[email protected]4eddbc732012-08-09 05:40:17419 case 407: // Proxy Authentication Required
420 next_state_ = STATE_OPEN;
ttuttle7933c112015-01-06 00:55:24421 if (!SanitizeProxyAuth(&response_)) {
422 LogBlockedTunnelResponse();
423 return ERR_TUNNEL_CONNECTION_FAILED;
424 }
[email protected]90499482013-06-01 00:39:50425 return HandleProxyAuthChallenge(auth_.get(), &response_, net_log_);
[email protected]4eddbc732012-08-09 05:40:17426
427 default:
428 // Ignore response to avoid letting the proxy impersonate the target
429 // server. (See http://crbug.com/137891.)
430 LogBlockedTunnelResponse();
431 return ERR_TUNNEL_CONNECTION_FAILED;
[email protected]511f6f52010-12-17 03:58:29432 }
[email protected]fe2f62a2010-10-01 03:34:07433}
434
435// SpdyStream::Delegate methods:
436// Called when SYN frame has been sent.
437// Returns true if no more data to be sent after SYN frame.
[email protected]edbfa8c2013-05-29 00:22:33438void SpdyProxyClientSocket::OnRequestHeadersSent() {
[email protected]fe2f62a2010-10-01 03:34:07439 DCHECK_EQ(next_state_, STATE_SEND_REQUEST_COMPLETE);
440
[email protected]d46715c2013-04-15 00:21:42441 OnIOComplete(OK);
[email protected]fe2f62a2010-10-01 03:34:07442}
443
[email protected]6d116e1a2013-06-24 07:42:15444SpdyResponseHeadersStatus SpdyProxyClientSocket::OnResponseHeadersUpdated(
445 const SpdyHeaderBlock& response_headers) {
[email protected]d08358502010-12-03 22:04:03446 // If we've already received the reply, existing headers are too late.
447 // TODO(mbelshe): figure out a way to make HEADERS frames useful after the
448 // initial response.
449 if (next_state_ != STATE_READ_REPLY_COMPLETE)
[email protected]6d116e1a2013-06-24 07:42:15450 return RESPONSE_HEADERS_ARE_COMPLETE;
[email protected]fe2f62a2010-10-01 03:34:07451
[email protected]d08358502010-12-03 22:04:03452 // Save the response
bncbca843ba2016-07-14 13:05:48453 if (!SpdyHeadersToHttpResponse(response_headers, &response_))
[email protected]6d116e1a2013-06-24 07:42:15454 return RESPONSE_HEADERS_ARE_INCOMPLETE;
[email protected]fe2f62a2010-10-01 03:34:07455
[email protected]6d116e1a2013-06-24 07:42:15456 OnIOComplete(OK);
457 return RESPONSE_HEADERS_ARE_COMPLETE;
[email protected]fe2f62a2010-10-01 03:34:07458}
459
[email protected]ca690b02013-04-17 10:38:43460// Called when data is received or on EOF (if |buffer| is NULL).
danakjaee3e1ec2016-04-16 00:23:18461void SpdyProxyClientSocket::OnDataReceived(std::unique_ptr<SpdyBuffer> buffer) {
[email protected]ca690b02013-04-17 10:38:43462 if (buffer) {
463 net_log_.AddByteTransferEvent(NetLog::TYPE_SOCKET_BYTES_RECEIVED,
464 buffer->GetRemainingSize(),
465 buffer->GetRemainingData());
dchengc7eeda422015-12-26 03:56:48466 read_buffer_queue_.Enqueue(std::move(buffer));
[email protected]ca690b02013-04-17 10:38:43467 } else {
468 net_log_.AddByteTransferEvent(NetLog::TYPE_SOCKET_BYTES_RECEIVED, 0, NULL);
[email protected]fe2f62a2010-10-01 03:34:07469 }
470
[email protected]83039bb2011-12-09 18:43:55471 if (!read_callback_.is_null()) {
[email protected]ca690b02013-04-17 10:38:43472 int rv = PopulateUserReadBuffer(user_buffer_->data(), user_buffer_len_);
[email protected]dbf036f2011-12-06 23:33:24473 CompletionCallback c = read_callback_;
474 read_callback_.Reset();
475 user_buffer_ = NULL;
[email protected]ca690b02013-04-17 10:38:43476 user_buffer_len_ = 0;
[email protected]dbf036f2011-12-06 23:33:24477 c.Run(rv);
[email protected]fe2f62a2010-10-01 03:34:07478 }
479}
480
[email protected]aa19cfc2013-05-23 16:41:38481void SpdyProxyClientSocket::OnDataSent() {
[email protected]83039bb2011-12-09 18:43:55482 DCHECK(!write_callback_.is_null());
[email protected]fe2f62a2010-10-01 03:34:07483
[email protected]aa19cfc2013-05-23 16:41:38484 int rv = write_buffer_len_;
485 write_buffer_len_ = 0;
[email protected]89d4d792014-04-06 16:27:15486
487 // Proxy write callbacks result in deep callback chains. Post to allow the
488 // stream's write callback chain to unwind (see crbug.com/355511).
skyostil4891b25b2015-06-11 11:43:45489 base::ThreadTaskRunnerHandle::Get()->PostTask(
490 FROM_HERE, base::Bind(&SpdyProxyClientSocket::RunCallback,
491 write_callback_weak_factory_.GetWeakPtr(),
tzik2ac7d802016-02-04 01:57:17492 base::ResetAndReturn(&write_callback_), rv));
[email protected]fe2f62a2010-10-01 03:34:07493}
494
xunjieli294da722015-08-11 19:15:02495void SpdyProxyClientSocket::OnTrailers(const SpdyHeaderBlock& trailers) {
496 // |spdy_stream_| is of type SPDY_BIDIRECTIONAL_STREAM, so trailers are
497 // combined with response headers and this method will not be calld.
498 NOTREACHED();
499}
500
[email protected]fe2f62a2010-10-01 03:34:07501void SpdyProxyClientSocket::OnClose(int status) {
[email protected]fe2f62a2010-10-01 03:34:07502 was_ever_used_ = spdy_stream_->WasEverUsed();
[email protected]d26ff352013-05-13 08:48:28503 spdy_stream_.reset();
[email protected]d9da5fe2010-10-13 22:37:16504
505 bool connecting = next_state_ != STATE_DISCONNECTED &&
506 next_state_ < STATE_OPEN;
507 if (next_state_ == STATE_OPEN)
508 next_state_ = STATE_CLOSED;
509 else
510 next_state_ = STATE_DISCONNECTED;
511
[email protected]6af4e412011-11-29 23:39:18512 base::WeakPtr<SpdyProxyClientSocket> weak_ptr = weak_factory_.GetWeakPtr();
[email protected]83039bb2011-12-09 18:43:55513 CompletionCallback write_callback = write_callback_;
514 write_callback_.Reset();
[email protected]d9da5fe2010-10-13 22:37:16515 write_buffer_len_ = 0;
[email protected]d9da5fe2010-10-13 22:37:16516
517 // If we're in the middle of connecting, we need to make sure
518 // we invoke the connect callback.
519 if (connecting) {
[email protected]83039bb2011-12-09 18:43:55520 DCHECK(!read_callback_.is_null());
521 CompletionCallback read_callback = read_callback_;
522 read_callback_.Reset();
523 read_callback.Run(status);
524 } else if (!read_callback_.is_null()) {
[email protected]6af4e412011-11-29 23:39:18525 // If we have a read_callback_, the we need to make sure we call it back.
danakjaee3e1ec2016-04-16 00:23:18526 OnDataReceived(std::unique_ptr<SpdyBuffer>());
[email protected]d9da5fe2010-10-13 22:37:16527 }
[email protected]6af4e412011-11-29 23:39:18528 // This may have been deleted by read_callback_, so check first.
[email protected]11fbca0b2013-06-02 23:37:21529 if (weak_ptr.get() && !write_callback.is_null())
[email protected]83039bb2011-12-09 18:43:55530 write_callback.Run(ERR_CONNECTION_CLOSED);
[email protected]fe2f62a2010-10-01 03:34:07531}
532
[email protected]fe2f62a2010-10-01 03:34:07533} // namespace net