blob: 9f3e95e28eeddfda5b5afccd1797fd09c0fde79d [file] [log] [blame]
[email protected]448d4ca52012-03-04 04:12:231// Copyright (c) 2012 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit586acc5fe2008-07-26 22:42:524
5#ifndef NET_HTTP_HTTP_NETWORK_TRANSACTION_H_
6#define NET_HTTP_HTTP_NETWORK_TRANSACTION_H_
7
sclittlefb249892015-09-10 21:33:228#include <stdint.h>
9
danakj1fd259a02016-04-16 03:17:0910#include <memory>
[email protected]96d570e42008-08-05 22:43:0411#include <string>
12
[email protected]8822f382010-07-30 21:49:0313#include "base/gtest_prod_util.h"
Avi Drissman13fc8932015-12-20 04:40:4614#include "base/macros.h"
[email protected]3b63f8f42011-03-28 01:54:1515#include "base/memory/ref_counted.h"
[email protected]66e96c42013-06-28 15:20:3116#include "base/time/time.h"
nharperb7441ef2016-01-25 23:54:1417#include "crypto/ec_private_key.h"
zhongyi48704c182015-12-07 07:52:0218#include "net/base/net_error_details.h"
bnc81c46c1f2016-10-04 16:25:5919#include "net/base/net_export.h"
[email protected]8e6441ca2010-08-19 05:56:3820#include "net/base/request_priority.h"
[email protected]c3b35c22008-09-27 03:19:4221#include "net/http/http_auth.h"
[email protected]b94f92d2010-10-27 16:45:2022#include "net/http/http_request_headers.h"
initial.commit586acc5fe2008-07-26 22:42:5223#include "net/http/http_response_info.h"
[email protected]102e27c2011-02-23 01:01:3124#include "net/http/http_stream_factory.h"
Bence Béky6b44abf2018-04-11 10:32:5125#include "net/http/http_stream_request.h"
initial.commit586acc5fe2008-07-26 22:42:5226#include "net/http/http_transaction.h"
mikecironef22f9812016-10-04 03:40:1927#include "net/log/net_log_with_source.h"
Lily Houghtonffe89daa02018-03-09 18:30:0328#include "net/proxy_resolution/proxy_resolution_service.h"
ttuttle1f2d7e92015-04-28 16:17:4729#include "net/socket/connection_attempts.h"
nharperb7441ef2016-01-25 23:54:1430#include "net/ssl/channel_id_service.h"
[email protected]536fd0b2013-03-14 17:41:5731#include "net/ssl/ssl_config_service.h"
[email protected]831e4a32013-11-14 02:14:4432#include "net/websockets/websocket_handshake_stream_base.h"
initial.commit586acc5fe2008-07-26 22:42:5233
nharperb7441ef2016-01-25 23:54:1434namespace crypto {
35class ECPrivateKey;
36}
37
initial.commit586acc5fe2008-07-26 22:42:5238namespace net {
39
xunjieli5749218c2016-03-22 16:43:0640class BidirectionalStreamImpl;
[email protected]8e6441ca2010-08-19 05:56:3841class HttpAuthController;
initial.commit586acc5fe2008-07-26 22:42:5242class HttpNetworkSession;
yhiranoa7e05bb2014-11-06 05:40:3943class HttpStream;
[email protected]8e6441ca2010-08-19 05:56:3844class IOBuffer;
[email protected]597a1ab2014-06-26 08:12:2745class ProxyInfo;
svaldez7872fd02015-11-19 21:10:5446class SSLPrivateKey;
[email protected]82918cc2010-08-25 17:24:5047struct HttpRequestInfo;
initial.commit586acc5fe2008-07-26 22:42:5248
[email protected]172da1b2011-08-12 15:52:2649class NET_EXPORT_PRIVATE HttpNetworkTransaction
50 : public HttpTransaction,
Helen Lib495c3802018-03-30 13:46:0951 public HttpStreamRequest::Delegate {
initial.commit586acc5fe2008-07-26 22:42:5252 public:
[email protected]262eec82013-03-19 21:01:3653 HttpNetworkTransaction(RequestPriority priority,
54 HttpNetworkSession* session);
initial.commit586acc5fe2008-07-26 22:42:5255
dchengb03027d2014-10-21 12:00:2056 ~HttpNetworkTransaction() override;
[email protected]af4876d2008-10-21 23:10:5757
initial.commit586acc5fe2008-07-26 22:42:5258 // HttpTransaction methods:
dchengb03027d2014-10-21 12:00:2059 int Start(const HttpRequestInfo* request_info,
60 const CompletionCallback& callback,
tfarina42834112016-09-22 13:38:2061 const NetLogWithSource& net_log) override;
dchengb03027d2014-10-21 12:00:2062 int RestartIgnoringLastError(const CompletionCallback& callback) override;
mattm436ccfe2017-06-19 20:24:0863 int RestartWithCertificate(scoped_refptr<X509Certificate> client_cert,
64 scoped_refptr<SSLPrivateKey> client_private_key,
dchengb03027d2014-10-21 12:00:2065 const CompletionCallback& callback) override;
66 int RestartWithAuth(const AuthCredentials& credentials,
67 const CompletionCallback& callback) override;
68 bool IsReadyToRestartForAuth() override;
[email protected]0757e7702009-03-27 04:00:2269
dchengb03027d2014-10-21 12:00:2070 int Read(IOBuffer* buf,
71 int buf_len,
72 const CompletionCallback& callback) override;
73 void StopCaching() override;
74 bool GetFullRequestHeaders(HttpRequestHeaders* headers) const override;
sclittle4de1bab92015-09-22 21:28:2475 int64_t GetTotalReceivedBytes() const override;
sclittlefb249892015-09-10 21:33:2276 int64_t GetTotalSentBytes() const override;
dchengb03027d2014-10-21 12:00:2077 void DoneReading() override;
78 const HttpResponseInfo* GetResponseInfo() const override;
79 LoadState GetLoadState() const override;
dchengb03027d2014-10-21 12:00:2080 void SetQuicServerInfo(QuicServerInfo* quic_server_info) override;
81 bool GetLoadTimingInfo(LoadTimingInfo* load_timing_info) const override;
ttuttled9dbc652015-09-29 20:00:5982 bool GetRemoteEndpoint(IPEndPoint* endpoint) const override;
zhongyi48704c182015-12-07 07:52:0283 void PopulateNetErrorDetails(NetErrorDetails* details) const override;
dchengb03027d2014-10-21 12:00:2084 void SetPriority(RequestPriority priority) override;
85 void SetWebSocketHandshakeStreamCreateHelper(
mostynbba063d6032014-10-09 11:01:1386 WebSocketHandshakeStreamBase::CreateHelper* create_helper) override;
dchengb03027d2014-10-21 12:00:2087 void SetBeforeNetworkStartCallback(
mostynbba063d6032014-10-09 11:01:1388 const BeforeNetworkStartCallback& callback) override;
ryansturm49a8cb12016-06-15 16:51:0989 void SetBeforeHeadersSentCallback(
90 const BeforeHeadersSentCallback& callback) override;
Andrey Kosyakov2e893e62017-08-31 17:00:5291 void SetRequestHeadersCallback(RequestHeadersCallback callback) override;
92 void SetResponseHeadersCallback(ResponseHeadersCallback callback) override;
Andrey Kosyakov83a6eee2017-08-14 19:20:0493
dchengb03027d2014-10-21 12:00:2094 int ResumeNetworkStart() override;
initial.commit586acc5fe2008-07-26 22:42:5295
[email protected]102e27c2011-02-23 01:01:3196 // HttpStreamRequest::Delegate methods:
dchengb03027d2014-10-21 12:00:2097 void OnStreamReady(const SSLConfig& used_ssl_config,
98 const ProxyInfo& used_proxy_info,
bnc5029f4632017-06-08 16:19:0099 std::unique_ptr<HttpStream> stream) override;
100 void OnBidirectionalStreamImplReady(
101 const SSLConfig& used_ssl_config,
102 const ProxyInfo& used_proxy_info,
103 std::unique_ptr<BidirectionalStreamImpl> stream) override;
dchengb03027d2014-10-21 12:00:20104 void OnWebSocketHandshakeStreamReady(
[email protected]3732cea2013-06-21 06:50:50105 const SSLConfig& used_ssl_config,
106 const ProxyInfo& used_proxy_info,
bnc5029f4632017-06-08 16:19:00107 std::unique_ptr<WebSocketHandshakeStreamBase> stream) override;
Ryan Hamilton75f197262017-08-17 14:00:07108 void OnStreamFailed(int status,
109 const NetErrorDetails& net_error_details,
110 const SSLConfig& used_ssl_config) override;
dchengb03027d2014-10-21 12:00:20111 void OnCertificateError(int status,
112 const SSLConfig& used_ssl_config,
113 const SSLInfo& ssl_info) override;
114 void OnNeedsProxyAuth(const HttpResponseInfo& response_info,
115 const SSLConfig& used_ssl_config,
116 const ProxyInfo& used_proxy_info,
117 HttpAuthController* auth_controller) override;
118 void OnNeedsClientAuth(const SSLConfig& used_ssl_config,
119 SSLCertRequestInfo* cert_info) override;
120 void OnHttpsProxyTunnelResponse(const HttpResponseInfo& response_info,
[email protected]102e27c2011-02-23 01:01:31121 const SSLConfig& used_ssl_config,
dchengb03027d2014-10-21 12:00:20122 const ProxyInfo& used_proxy_info,
Bence Béky6d05ebd2017-05-16 00:09:01123 std::unique_ptr<HttpStream> stream) override;
[email protected]8e6441ca2010-08-19 05:56:38124
zhongyi48704c182015-12-07 07:52:02125 void OnQuicBroken() override;
ttuttle1f2d7e92015-04-28 16:17:47126 void GetConnectionAttempts(ConnectionAttempts* out) const override;
127
initial.commit586acc5fe2008-07-26 22:42:52128 private:
bnc1f61cdf2016-11-28 18:03:45129 FRIEND_TEST_ALL_PREFIXES(HttpNetworkTransactionTest, ResetStateForRestart);
Bence Béky2fcf4fa2018-04-06 20:06:01130 FRIEND_TEST_ALL_PREFIXES(HttpNetworkTransactionTest,
131 CreateWebSocketHandshakeStream);
bnc1f61cdf2016-11-28 18:03:45132 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, WindowUpdateReceived);
133 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, WindowUpdateSent);
134 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, WindowUpdateOverflow);
135 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest, FlowControlStallResume);
[email protected]513963e2013-06-15 01:53:04136 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest,
[email protected]ca6459f862012-04-11 19:43:20137 FlowControlStallResumeAfterSettings);
[email protected]513963e2013-06-15 01:53:04138 FRIEND_TEST_ALL_PREFIXES(SpdyNetworkTransactionTest,
[email protected]ca6459f862012-04-11 19:43:20139 FlowControlNegativeSendWindowSize);
[email protected]89ceba9a2009-03-21 03:46:06140
[email protected]d207a5f2009-06-04 05:28:40141 enum State {
[email protected]1826a402014-01-08 15:40:48142 STATE_NOTIFY_BEFORE_CREATE_STREAM,
[email protected]82918cc2010-08-25 17:24:50143 STATE_CREATE_STREAM,
144 STATE_CREATE_STREAM_COMPLETE,
[email protected]351ab642010-08-05 16:55:31145 STATE_INIT_STREAM,
146 STATE_INIT_STREAM_COMPLETE,
[email protected]044de0642010-06-17 10:42:15147 STATE_GENERATE_PROXY_AUTH_TOKEN,
148 STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE,
149 STATE_GENERATE_SERVER_AUTH_TOKEN,
150 STATE_GENERATE_SERVER_AUTH_TOKEN_COMPLETE,
nharperd6e65822016-03-30 23:05:48151 STATE_GET_PROVIDED_TOKEN_BINDING_KEY,
152 STATE_GET_PROVIDED_TOKEN_BINDING_KEY_COMPLETE,
153 STATE_GET_REFERRED_TOKEN_BINDING_KEY,
154 STATE_GET_REFERRED_TOKEN_BINDING_KEY_COMPLETE,
[email protected]daddea62012-09-19 05:51:13155 STATE_INIT_REQUEST_BODY,
156 STATE_INIT_REQUEST_BODY_COMPLETE,
[email protected]4875ba12011-03-30 22:31:51157 STATE_BUILD_REQUEST,
158 STATE_BUILD_REQUEST_COMPLETE,
[email protected]0877e3d2009-10-17 22:29:57159 STATE_SEND_REQUEST,
160 STATE_SEND_REQUEST_COMPLETE,
[email protected]d207a5f2009-06-04 05:28:40161 STATE_READ_HEADERS,
162 STATE_READ_HEADERS_COMPLETE,
163 STATE_READ_BODY,
164 STATE_READ_BODY_COMPLETE,
165 STATE_DRAIN_BODY_FOR_AUTH_RESTART,
166 STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE,
167 STATE_NONE
168 };
169
Adam Ricecb76ac62015-02-20 05:33:25170 bool IsSecureRequest() const;
nharperb7441ef2016-01-25 23:54:14171 bool IsTokenBindingEnabled() const;
172 void RecordTokenBindingSupport() const;
[email protected]564b4912010-03-09 16:30:42173
Adam Rice425cf122015-01-19 06:18:24174 // Returns true if the request is using an HTTP(S) proxy without being
175 // tunneled via the CONNECT method.
176 bool UsingHttpProxyWithoutTunnel() const;
177
initial.commit586acc5fe2008-07-26 22:42:52178 void DoCallback(int result);
179 void OnIOComplete(int result);
180
181 // Runs the state transition loop.
182 int DoLoop(int result);
183
184 // Each of these methods corresponds to a State value. Those with an input
185 // argument receive the result from the previous state. If a method returns
186 // ERR_IO_PENDING, then the result from OnIOComplete will be passed to the
187 // next state method as the result arg.
[email protected]1826a402014-01-08 15:40:48188 int DoNotifyBeforeCreateStream();
[email protected]82918cc2010-08-25 17:24:50189 int DoCreateStream();
190 int DoCreateStreamComplete(int result);
[email protected]351ab642010-08-05 16:55:31191 int DoInitStream();
192 int DoInitStreamComplete(int result);
[email protected]044de0642010-06-17 10:42:15193 int DoGenerateProxyAuthToken();
194 int DoGenerateProxyAuthTokenComplete(int result);
195 int DoGenerateServerAuthToken();
196 int DoGenerateServerAuthTokenComplete(int result);
nharperd6e65822016-03-30 23:05:48197 int DoGetProvidedTokenBindingKey();
198 int DoGetProvidedTokenBindingKeyComplete(int result);
199 int DoGetReferredTokenBindingKey();
200 int DoGetReferredTokenBindingKeyComplete(int result);
[email protected]daddea62012-09-19 05:51:13201 int DoInitRequestBody();
202 int DoInitRequestBodyComplete(int result);
[email protected]4875ba12011-03-30 22:31:51203 int DoBuildRequest();
204 int DoBuildRequestComplete(int result);
[email protected]0877e3d2009-10-17 22:29:57205 int DoSendRequest();
206 int DoSendRequestComplete(int result);
initial.commit586acc5fe2008-07-26 22:42:52207 int DoReadHeaders();
208 int DoReadHeadersComplete(int result);
209 int DoReadBody();
210 int DoReadBodyComplete(int result);
[email protected]2d2697f92009-02-18 21:00:32211 int DoDrainBodyForAuthRestart();
212 int DoDrainBodyForAuthRestartComplete(int result);
initial.commit586acc5fe2008-07-26 22:42:52213
nharperb7441ef2016-01-25 23:54:14214 int BuildRequestHeaders(bool using_http_proxy_without_tunnel);
215 int BuildTokenBindingHeader(std::string* out);
[email protected]2979a492011-04-06 00:29:14216
[email protected]9f9f86c2009-03-12 22:32:42217 // Writes a log message to help debugging in the field when we block a proxy
218 // response to a CONNECT request.
[email protected]af89ba62009-03-16 20:26:38219 void LogBlockedTunnelResponse(int response_code) const;
[email protected]9f9f86c2009-03-12 22:32:42220
[email protected]0b45559b2009-06-12 21:45:11221 // Called to handle a client certificate request.
[email protected]5e363962009-06-19 19:57:01222 int HandleCertificateRequest(int error);
[email protected]0b45559b2009-06-12 21:45:11223
bncfacdd852015-01-09 19:22:54224 // Called wherever ERR_HTTP_1_1_REQUIRED or
225 // ERR_PROXY_HTTP_1_1_REQUIRED has to be handled.
226 int HandleHttp11Required(int error);
227
David Benjamin76a40ad2018-02-24 22:22:08228 // Called to possibly handle a client authentication error. Sets next_state_
[email protected]bd0b6772011-01-11 19:59:30229 // and returns OK if recovering from the error. Otherwise, the same error
230 // code is returned.
David Benjamin76a40ad2018-02-24 22:22:08231 int HandleSSLClientAuthError(int error);
[email protected]bd0b6772011-01-11 19:59:30232
initial.commit586acc5fe2008-07-26 22:42:52233 // Called to possibly recover from the given error. Sets next_state_ and
234 // returns OK if recovering from the error. Otherwise, the same error code
235 // is returned.
236 int HandleIOError(int error);
237
[email protected]0877e3d2009-10-17 22:29:57238 // Gets the response headers from the HttpStream.
239 HttpResponseHeaders* GetResponseHeaders() const;
240
[email protected]a34f61ee2014-03-18 20:59:49241 // Called when the socket is unexpectedly closed. Returns true if the request
242 // should be resent in case of a socket reuse/close race.
243 bool ShouldResendRequest() const;
[email protected]1c773ea12009-04-28 19:58:42244
Biljith Jayan45a41722017-08-16 18:43:14245 // Returns true if there have already been |kMaxRetryAttempts| retries for
246 // HTTP2 or QUIC network errors, and no further retries should be attempted.
247 bool HasExceededMaxRetries() const;
248
David Benjamin83ddfb32018-03-30 01:07:52249 // Increments the number of restarts and returns true if the restart may
250 // proceed.
251 bool CheckMaxRestarts();
252
[email protected]1c773ea12009-04-28 19:58:42253 // Resets the connection and the request headers for resend. Called when
254 // ShouldResendRequest() is true.
255 void ResetConnectionAndRequestForResend();
[email protected]2a5c76b2008-09-25 22:15:16256
[email protected]f9ee6b52008-11-08 06:46:23257 // Sets up the state machine to restart the transaction with auth.
258 void PrepareForAuthRestart(HttpAuth::Target target);
259
[email protected]2d2697f92009-02-18 21:00:32260 // Called when we don't need to drain the response body or have drained it.
261 // Resets |connection_| unless |keep_alive| is true, then calls
262 // ResetStateForRestart. Sets |next_state_| appropriately.
263 void DidDrainBodyForAuthRestart(bool keep_alive);
264
[email protected]f9ee6b52008-11-08 06:46:23265 // Resets the members of the transaction so it can be restarted.
[email protected]c3b35c22008-09-27 03:19:42266 void ResetStateForRestart();
267
[email protected]697ef4c2010-10-14 16:38:58268 // Resets the members of the transaction, except |stream_|, which needs
269 // to be maintained for multi-round auth.
270 void ResetStateForAuthRestart();
271
zhongyica364fbb2015-12-12 03:39:12272 // Caches network error details from the stream if available
273 // and resets the stream.
274 void CacheNetErrorDetailsAndResetStream();
275
[email protected]1c773ea12009-04-28 19:58:42276 // Returns true if we should try to add a Proxy-Authorization header
277 bool ShouldApplyProxyAuth() const;
[email protected]c3b35c22008-09-27 03:19:42278
[email protected]1c773ea12009-04-28 19:58:42279 // Returns true if we should try to add an Authorization header.
280 bool ShouldApplyServerAuth() const;
281
[email protected]f9ee6b52008-11-08 06:46:23282 // Handles HTTP status code 401 or 407.
[email protected]0757e7702009-03-27 04:00:22283 // HandleAuthChallenge() returns a network error code, or OK on success.
284 // May update |pending_auth_target_| or |response_.auth_challenge|.
[email protected]e772db3f2010-07-12 18:11:13285 int HandleAuthChallenge();
[email protected]f9ee6b52008-11-08 06:46:23286
[email protected]8e6441ca2010-08-19 05:56:38287 // Returns true if we have auth credentials for the given target.
288 bool HaveAuth(HttpAuth::Target target) const;
[email protected]c3b35c22008-09-27 03:19:42289
[email protected]228404f2010-06-24 04:31:41290 // Get the {scheme, host, path, port} for the authentication target
291 GURL AuthURL(HttpAuth::Target target) const;
[email protected]044de0642010-06-17 10:42:15292
[email protected]831e4a32013-11-14 02:14:44293 // Returns true if this transaction is for a WebSocket handshake
294 bool ForWebSocketHandshake() const;
295
ttuttle1f2d7e92015-04-28 16:17:47296 void CopyConnectionAttemptsFromStreamRequest();
297
eustasc7d27da2017-04-06 10:33:20298 // Returns true if response "Content-Encoding" headers respect
299 // "Accept-Encoding".
300 bool ContentEncodingsValid() const;
301
[email protected]e772db3f2010-07-12 18:11:13302 scoped_refptr<HttpAuthController>
303 auth_controllers_[HttpAuth::AUTH_NUM_TARGETS];
[email protected]c3b35c22008-09-27 03:19:42304
[email protected]0757e7702009-03-27 04:00:22305 // Whether this transaction is waiting for proxy auth, server auth, or is
306 // not waiting for any auth at all. |pending_auth_target_| is read and
307 // cleared by RestartWithAuth().
308 HttpAuth::Target pending_auth_target_;
309
[email protected]49639fa2011-12-20 23:22:41310 CompletionCallback io_callback_;
311 CompletionCallback callback_;
initial.commit586acc5fe2008-07-26 22:42:52312
[email protected]3fe8d2f82013-10-17 08:56:07313 HttpNetworkSession* session_;
initial.commit586acc5fe2008-07-26 22:42:52314
tfarina42834112016-09-22 13:38:20315 NetLogWithSource net_log_;
shivanisha0b440852016-10-18 15:48:15316
317 // Reset to null at the start of the Read state machine.
initial.commit586acc5fe2008-07-26 22:42:52318 const HttpRequestInfo* request_;
shivanisha0b440852016-10-18 15:48:15319
320 // The requested URL.
321 GURL url_;
[email protected]262eec82013-03-19 21:01:36322 RequestPriority priority_;
[email protected]a7e41312009-12-16 23:18:14323 HttpResponseInfo response_;
initial.commit586acc5fe2008-07-26 22:42:52324
[email protected]102e27c2011-02-23 01:01:31325 // |proxy_info_| is the ProxyInfo used by the HttpStreamRequest.
[email protected]928fb582008-08-11 15:40:23326 ProxyInfo proxy_info_;
initial.commit586acc5fe2008-07-26 22:42:52327
danakj1fd259a02016-04-16 03:17:09328 std::unique_ptr<HttpStreamRequest> stream_request_;
329 std::unique_ptr<HttpStream> stream_;
[email protected]8e6441ca2010-08-19 05:56:38330
[email protected]0877e3d2009-10-17 22:29:57331 // True if we've validated the headers that the stream parser has returned.
332 bool headers_valid_;
333
Steven Valdezb4ff0412018-01-18 22:39:27334 // True if we can send the request over early data.
335 bool can_send_early_data_;
336
David Benjamin76a40ad2018-02-24 22:22:08337 // True if |server_ssl_config_.client_cert| was looked up from the
338 // SSLClientAuthCache, rather than provided externally by the caller.
339 bool server_ssl_client_cert_was_cached_;
340
David Benjamin5cb91132018-04-06 05:54:49341 // SSL configuration used for the server and proxy, respectively. Note
342 // |server_ssl_config_| may be updated from the HttpStreamFactory, which will
343 // be applied on retry.
344 //
345 // TODO(davidben): Mutating it is weird and relies on HttpStreamFactory
346 // modifications being idempotent. Address this as part of other work to make
347 // sense of SSLConfig (related to https://crbug.com/488043).
[email protected]102957f2011-09-02 17:10:14348 SSLConfig server_ssl_config_;
349 SSLConfig proxy_ssl_config_;
[email protected]c5949a32008-10-08 17:28:23350
nharperd6e65822016-03-30 23:05:48351 // Keys to use for signing message in Token Binding header.
danakj1fd259a02016-04-16 03:17:09352 std::unique_ptr<crypto::ECPrivateKey> provided_token_binding_key_;
353 std::unique_ptr<crypto::ECPrivateKey> referred_token_binding_key_;
nharperd6e65822016-03-30 23:05:48354 // Object to manage lookup of |provided_token_binding_key_| and
355 // |referred_token_binding_key_|.
nharperb7441ef2016-01-25 23:54:14356 ChannelIDService::Request token_binding_request_;
357
[email protected]b94f92d2010-10-27 16:45:20358 HttpRequestHeaders request_headers_;
[email protected]4ddaf2502008-10-23 18:26:19359
[email protected]2d2697f92009-02-18 21:00:32360 // The size in bytes of the buffer we use to drain the response body that
361 // we want to throw away. The response body is typically a small error
362 // page just a few hundred bytes long.
[email protected]81854c42010-09-22 03:39:36363 static const int kDrainBodyBufferSize = 1024;
[email protected]2d2697f92009-02-18 21:00:32364
initial.commit586acc5fe2008-07-26 22:42:52365 // User buffer and length passed to the Read method.
[email protected]9dea9e1f2009-01-29 00:30:47366 scoped_refptr<IOBuffer> read_buf_;
initial.commit586acc5fe2008-07-26 22:42:52367 int read_buf_len_;
368
sclittlefb249892015-09-10 21:33:22369 // Total number of bytes received on all destroyed HttpStreams for this
370 // transaction.
sclittle4de1bab92015-09-22 21:28:24371 int64_t total_received_bytes_;
[email protected]b8015c42013-12-24 15:18:19372
sclittlefb249892015-09-10 21:33:22373 // Total number of bytes sent on all destroyed HttpStreams for this
374 // transaction.
375 int64_t total_sent_bytes_;
376
[email protected]58e32bb2013-01-21 18:23:25377 // When the transaction started / finished sending the request, including
378 // the body, if present.
379 base::TimeTicks send_start_time_;
380 base::TimeTicks send_end_time_;
381
[email protected]d207a5f2009-06-04 05:28:40382 // The next state in the state machine.
initial.commit586acc5fe2008-07-26 22:42:52383 State next_state_;
[email protected]2ff8b312010-04-26 22:20:54384
[email protected]a7ea8832010-07-12 17:54:54385 // True when the tunnel is in the process of being established - we can't
386 // read from the socket until the tunnel is done.
387 bool establishing_tunnel_;
388
bnc8016c1f2017-03-31 02:11:29389 // Enable pooling to a SpdySession with matching IP and certificate
390 // even if the SpdySessionKey is different.
391 bool enable_ip_based_pooling_;
392
bncaccd4962017-04-06 21:00:26393 // Enable using alternative services for the request.
394 bool enable_alternative_services_;
395
rch2f2991c2017-04-13 19:28:17396 // When a request is retried because of errors with the alternative service,
397 // this will store the alternative service used.
398 AlternativeService retried_alternative_service_;
399
[email protected]831e4a32013-11-14 02:14:44400 // The helper object to use to create WebSocketHandshakeStreamBase
401 // objects. Only relevant when establishing a WebSocket connection.
402 WebSocketHandshakeStreamBase::CreateHelper*
403 websocket_handshake_stream_base_create_helper_;
404
[email protected]1826a402014-01-08 15:40:48405 BeforeNetworkStartCallback before_network_start_callback_;
ryansturm49a8cb12016-06-15 16:51:09406 BeforeHeadersSentCallback before_headers_sent_callback_;
Andrey Kosyakov83a6eee2017-08-14 19:20:04407 RequestHeadersCallback request_headers_callback_;
Andrey Kosyakov2e893e62017-08-31 17:00:52408 ResponseHeadersCallback response_headers_callback_;
[email protected]1826a402014-01-08 15:40:48409
ttuttle1f2d7e92015-04-28 16:17:47410 ConnectionAttempts connection_attempts_;
ttuttled9dbc652015-09-29 20:00:59411 IPEndPoint remote_endpoint_;
zhongyica364fbb2015-12-12 03:39:12412 // Network error details for this transaction.
413 NetErrorDetails net_error_details_;
rdsmith1d343be52016-10-21 20:37:50414
Biljith Jayan45a41722017-08-16 18:43:14415 // Number of retries made for network errors like ERR_SPDY_PING_FAILED,
416 // ERR_SPDY_SERVER_REFUSED_STREAM, ERR_QUIC_HANDSHAKE_FAILED and
417 // ERR_QUIC_PROTOCOL_ERROR. Currently we stop after 3 tries
418 // (including the initial request) and fail the request.
419 // This count excludes retries on reused sockets since a well
420 // behaved server may time those out and thus the number
421 // of times we can retry a request on reused sockets is limited.
422 size_t retry_attempts_;
423
David Benjamin83ddfb32018-03-30 01:07:52424 // Number of times the transaction was restarted via a RestartWith* call.
425 size_t num_restarts_;
426
David Benjamin5cb91132018-04-06 05:54:49427 // The net::Error which triggered a TLS 1.3 version interference probe, or OK
428 // if none was triggered.
429 int ssl_version_interference_error_;
430
[email protected]2ff8b312010-04-26 22:20:54431 DISALLOW_COPY_AND_ASSIGN(HttpNetworkTransaction);
initial.commit586acc5fe2008-07-26 22:42:52432};
433
434} // namespace net
435
436#endif // NET_HTTP_HTTP_NETWORK_TRANSACTION_H_