| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/quic/quic_stream_factory.h" |
| |
| #include <set> |
| |
| #include "base/cpu.h" |
| #include "base/message_loop/message_loop.h" |
| #include "base/message_loop/message_loop_proxy.h" |
| #include "base/metrics/histogram.h" |
| #include "base/profiler/scoped_tracker.h" |
| #include "base/rand_util.h" |
| #include "base/stl_util.h" |
| #include "base/strings/string_util.h" |
| #include "base/values.h" |
| #include "net/base/net_errors.h" |
| #include "net/cert/cert_verifier.h" |
| #include "net/dns/host_resolver.h" |
| #include "net/dns/single_request_host_resolver.h" |
| #include "net/http/http_server_properties.h" |
| #include "net/quic/congestion_control/tcp_receiver.h" |
| #include "net/quic/crypto/channel_id_chromium.h" |
| #include "net/quic/crypto/proof_verifier_chromium.h" |
| #include "net/quic/crypto/quic_random.h" |
| #include "net/quic/crypto/quic_server_info.h" |
| #include "net/quic/port_suggester.h" |
| #include "net/quic/quic_client_session.h" |
| #include "net/quic/quic_clock.h" |
| #include "net/quic/quic_connection.h" |
| #include "net/quic/quic_connection_helper.h" |
| #include "net/quic/quic_crypto_client_stream_factory.h" |
| #include "net/quic/quic_default_packet_writer.h" |
| #include "net/quic/quic_http_stream.h" |
| #include "net/quic/quic_protocol.h" |
| #include "net/quic/quic_server_id.h" |
| #include "net/socket/client_socket_factory.h" |
| |
| #if defined(OS_WIN) |
| #include "base/win/windows_version.h" |
| #endif |
| |
| namespace net { |
| |
| namespace { |
| |
| enum CreateSessionFailure { |
| CREATION_ERROR_CONNECTING_SOCKET, |
| CREATION_ERROR_SETTING_RECEIVE_BUFFER, |
| CREATION_ERROR_SETTING_SEND_BUFFER, |
| CREATION_ERROR_MAX |
| }; |
| |
| // When a connection is idle for 30 seconds it will be closed. |
| const int kIdleConnectionTimeoutSeconds = 30; |
| |
| // The initial receive window size for both streams and sessions. |
| const int32 kInitialReceiveWindowSize = 10 * 1024 * 1024; // 10MB |
| |
| // Set the maximum number of undecryptable packets the connection will store. |
| const int32 kMaxUndecryptablePackets = 100; |
| |
| const char kDummyHostname[] = "quic.global.props"; |
| const uint16 kDummyPort = 0; |
| |
| void HistogramCreateSessionFailure(enum CreateSessionFailure error) { |
| UMA_HISTOGRAM_ENUMERATION("Net.QuicSession.CreationError", error, |
| CREATION_ERROR_MAX); |
| } |
| |
| bool IsEcdsaSupported() { |
| #if defined(OS_WIN) |
| if (base::win::GetVersion() < base::win::VERSION_VISTA) |
| return false; |
| #endif |
| |
| return true; |
| } |
| |
| QuicConfig InitializeQuicConfig(const QuicTagVector& connection_options) { |
| QuicConfig config; |
| config.SetIdleConnectionStateLifetime( |
| QuicTime::Delta::FromSeconds(kIdleConnectionTimeoutSeconds), |
| QuicTime::Delta::FromSeconds(kIdleConnectionTimeoutSeconds)); |
| config.SetConnectionOptionsToSend(connection_options); |
| return config; |
| } |
| |
| class DefaultPacketWriterFactory : public QuicConnection::PacketWriterFactory { |
| public: |
| explicit DefaultPacketWriterFactory(DatagramClientSocket* socket) |
| : socket_(socket) {} |
| ~DefaultPacketWriterFactory() override {} |
| |
| QuicPacketWriter* Create(QuicConnection* connection) const override; |
| |
| private: |
| DatagramClientSocket* socket_; |
| }; |
| |
| QuicPacketWriter* DefaultPacketWriterFactory::Create( |
| QuicConnection* connection) const { |
| scoped_ptr<QuicDefaultPacketWriter> writer( |
| new QuicDefaultPacketWriter(socket_)); |
| writer->SetConnection(connection); |
| return writer.release(); |
| } |
| |
| } // namespace |
| |
| QuicStreamFactory::IpAliasKey::IpAliasKey() {} |
| |
| QuicStreamFactory::IpAliasKey::IpAliasKey(IPEndPoint ip_endpoint, |
| bool is_https) |
| : ip_endpoint(ip_endpoint), |
| is_https(is_https) {} |
| |
| QuicStreamFactory::IpAliasKey::~IpAliasKey() {} |
| |
| bool QuicStreamFactory::IpAliasKey::operator<( |
| const QuicStreamFactory::IpAliasKey& other) const { |
| if (!(ip_endpoint == other.ip_endpoint)) { |
| return ip_endpoint < other.ip_endpoint; |
| } |
| return is_https < other.is_https; |
| } |
| |
| bool QuicStreamFactory::IpAliasKey::operator==( |
| const QuicStreamFactory::IpAliasKey& other) const { |
| return is_https == other.is_https && |
| ip_endpoint == other.ip_endpoint; |
| }; |
| |
| // Responsible for creating a new QUIC session to the specified server, and |
| // for notifying any associated requests when complete. |
| class QuicStreamFactory::Job { |
| public: |
| Job(QuicStreamFactory* factory, |
| HostResolver* host_resolver, |
| const HostPortPair& host_port_pair, |
| bool is_https, |
| bool was_alternate_protocol_recently_broken, |
| PrivacyMode privacy_mode, |
| base::StringPiece method, |
| QuicServerInfo* server_info, |
| const BoundNetLog& net_log); |
| |
| // Creates a new job to handle the resumption of for connecting an |
| // existing session. |
| Job(QuicStreamFactory* factory, |
| HostResolver* host_resolver, |
| QuicClientSession* session, |
| QuicServerId server_id); |
| |
| ~Job(); |
| |
| int Run(const CompletionCallback& callback); |
| |
| int DoLoop(int rv); |
| int DoResolveHost(); |
| int DoResolveHostComplete(int rv); |
| int DoLoadServerInfo(); |
| int DoLoadServerInfoComplete(int rv); |
| int DoConnect(); |
| int DoResumeConnect(); |
| int DoConnectComplete(int rv); |
| |
| void OnIOComplete(int rv); |
| |
| void CancelWaitForDataReadyCallback(); |
| |
| CompletionCallback callback() { |
| return callback_; |
| } |
| |
| const QuicServerId server_id() const { |
| return server_id_; |
| } |
| |
| private: |
| enum IoState { |
| STATE_NONE, |
| STATE_RESOLVE_HOST, |
| STATE_RESOLVE_HOST_COMPLETE, |
| STATE_LOAD_SERVER_INFO, |
| STATE_LOAD_SERVER_INFO_COMPLETE, |
| STATE_CONNECT, |
| STATE_RESUME_CONNECT, |
| STATE_CONNECT_COMPLETE, |
| }; |
| IoState io_state_; |
| |
| QuicStreamFactory* factory_; |
| SingleRequestHostResolver host_resolver_; |
| QuicServerId server_id_; |
| bool is_post_; |
| bool was_alternate_protocol_recently_broken_; |
| scoped_ptr<QuicServerInfo> server_info_; |
| const BoundNetLog net_log_; |
| QuicClientSession* session_; |
| CompletionCallback callback_; |
| AddressList address_list_; |
| base::TimeTicks disk_cache_load_start_time_; |
| base::TimeTicks dns_resolution_start_time_; |
| base::WeakPtrFactory<Job> weak_factory_; |
| DISALLOW_COPY_AND_ASSIGN(Job); |
| }; |
| |
| QuicStreamFactory::Job::Job(QuicStreamFactory* factory, |
| HostResolver* host_resolver, |
| const HostPortPair& host_port_pair, |
| bool is_https, |
| bool was_alternate_protocol_recently_broken, |
| PrivacyMode privacy_mode, |
| base::StringPiece method, |
| QuicServerInfo* server_info, |
| const BoundNetLog& net_log) |
| : io_state_(STATE_RESOLVE_HOST), |
| factory_(factory), |
| host_resolver_(host_resolver), |
| server_id_(host_port_pair, is_https, privacy_mode), |
| is_post_(method == "POST"), |
| was_alternate_protocol_recently_broken_( |
| was_alternate_protocol_recently_broken), |
| server_info_(server_info), |
| net_log_(net_log), |
| session_(nullptr), |
| weak_factory_(this) {} |
| |
| QuicStreamFactory::Job::Job(QuicStreamFactory* factory, |
| HostResolver* host_resolver, |
| QuicClientSession* session, |
| QuicServerId server_id) |
| : io_state_(STATE_RESUME_CONNECT), |
| factory_(factory), |
| host_resolver_(host_resolver), // unused |
| server_id_(server_id), |
| is_post_(false), // unused |
| was_alternate_protocol_recently_broken_(false), // unused |
| net_log_(session->net_log()), // unused |
| session_(session), |
| weak_factory_(this) {} |
| |
| QuicStreamFactory::Job::~Job() { |
| } |
| |
| int QuicStreamFactory::Job::Run(const CompletionCallback& callback) { |
| int rv = DoLoop(OK); |
| if (rv == ERR_IO_PENDING) |
| callback_ = callback; |
| |
| return rv > 0 ? OK : rv; |
| } |
| |
| int QuicStreamFactory::Job::DoLoop(int rv) { |
| do { |
| IoState state = io_state_; |
| io_state_ = STATE_NONE; |
| switch (state) { |
| case STATE_RESOLVE_HOST: |
| CHECK_EQ(OK, rv); |
| rv = DoResolveHost(); |
| break; |
| case STATE_RESOLVE_HOST_COMPLETE: |
| rv = DoResolveHostComplete(rv); |
| break; |
| case STATE_LOAD_SERVER_INFO: |
| CHECK_EQ(OK, rv); |
| rv = DoLoadServerInfo(); |
| break; |
| case STATE_LOAD_SERVER_INFO_COMPLETE: |
| rv = DoLoadServerInfoComplete(rv); |
| break; |
| case STATE_CONNECT: |
| CHECK_EQ(OK, rv); |
| rv = DoConnect(); |
| break; |
| case STATE_RESUME_CONNECT: |
| CHECK_EQ(OK, rv); |
| rv = DoResumeConnect(); |
| break; |
| case STATE_CONNECT_COMPLETE: |
| rv = DoConnectComplete(rv); |
| break; |
| default: |
| NOTREACHED() << "io_state_: " << io_state_; |
| break; |
| } |
| } while (io_state_ != STATE_NONE && rv != ERR_IO_PENDING); |
| return rv; |
| } |
| |
| void QuicStreamFactory::Job::OnIOComplete(int rv) { |
| // TODO(vadimt): Remove ScopedTracker below once crbug.com/436634 is fixed. |
| tracked_objects::ScopedTracker tracking_profile( |
| FROM_HERE_WITH_EXPLICIT_FUNCTION( |
| "436634 QuicStreamFactory::Job::OnIOComplete")); |
| |
| rv = DoLoop(rv); |
| |
| if (rv != ERR_IO_PENDING && !callback_.is_null()) { |
| callback_.Run(rv); |
| } |
| } |
| |
| void QuicStreamFactory::Job::CancelWaitForDataReadyCallback() { |
| // If we are waiting for WaitForDataReadyCallback, then cancel the callback. |
| if (io_state_ != STATE_LOAD_SERVER_INFO_COMPLETE) |
| return; |
| server_info_->CancelWaitForDataReadyCallback(); |
| OnIOComplete(OK); |
| } |
| |
| int QuicStreamFactory::Job::DoResolveHost() { |
| // Start loading the data now, and wait for it after we resolve the host. |
| if (server_info_) { |
| server_info_->Start(); |
| } |
| |
| io_state_ = STATE_RESOLVE_HOST_COMPLETE; |
| dns_resolution_start_time_ = base::TimeTicks::Now(); |
| return host_resolver_.Resolve( |
| HostResolver::RequestInfo(server_id_.host_port_pair()), |
| DEFAULT_PRIORITY, |
| &address_list_, |
| base::Bind(&QuicStreamFactory::Job::OnIOComplete, |
| weak_factory_.GetWeakPtr()), |
| net_log_); |
| } |
| |
| int QuicStreamFactory::Job::DoResolveHostComplete(int rv) { |
| UMA_HISTOGRAM_TIMES("Net.QuicSession.HostResolutionTime", |
| base::TimeTicks::Now() - dns_resolution_start_time_); |
| if (rv != OK) |
| return rv; |
| |
| DCHECK(!factory_->HasActiveSession(server_id_)); |
| |
| // Inform the factory of this resolution, which will set up |
| // a session alias, if possible. |
| if (factory_->OnResolution(server_id_, address_list_)) { |
| return OK; |
| } |
| |
| io_state_ = STATE_LOAD_SERVER_INFO; |
| return OK; |
| } |
| |
| int QuicStreamFactory::Job::DoLoadServerInfo() { |
| io_state_ = STATE_LOAD_SERVER_INFO_COMPLETE; |
| |
| if (!server_info_) |
| return OK; |
| |
| // To mitigate the effects of disk cache taking too long to load QUIC server |
| // information, set up a timer to cancel WaitForDataReady's callback. |
| if (factory_->load_server_info_timeout_ms_ > 0) { |
| factory_->task_runner_->PostDelayedTask( |
| FROM_HERE, |
| base::Bind(&QuicStreamFactory::Job::CancelWaitForDataReadyCallback, |
| weak_factory_.GetWeakPtr()), |
| base::TimeDelta::FromMilliseconds( |
| factory_->load_server_info_timeout_ms_)); |
| } |
| |
| disk_cache_load_start_time_ = base::TimeTicks::Now(); |
| return server_info_->WaitForDataReady( |
| base::Bind(&QuicStreamFactory::Job::OnIOComplete, |
| weak_factory_.GetWeakPtr())); |
| } |
| |
| int QuicStreamFactory::Job::DoLoadServerInfoComplete(int rv) { |
| if (server_info_) { |
| UMA_HISTOGRAM_TIMES("Net.QuicServerInfo.DiskCacheWaitForDataReadyTime", |
| base::TimeTicks::Now() - disk_cache_load_start_time_); |
| } |
| |
| if (rv != OK) { |
| server_info_.reset(); |
| } |
| |
| io_state_ = STATE_CONNECT; |
| return OK; |
| } |
| |
| int QuicStreamFactory::Job::DoConnect() { |
| io_state_ = STATE_CONNECT_COMPLETE; |
| |
| int rv = factory_->CreateSession(server_id_, server_info_.Pass(), |
| address_list_, net_log_, &session_); |
| if (rv != OK) { |
| DCHECK(rv != ERR_IO_PENDING); |
| DCHECK(!session_); |
| return rv; |
| } |
| |
| if (!session_->connection()->connected()) { |
| return ERR_CONNECTION_CLOSED; |
| } |
| |
| session_->StartReading(); |
| if (!session_->connection()->connected()) { |
| return ERR_QUIC_PROTOCOL_ERROR; |
| } |
| bool require_confirmation = |
| factory_->require_confirmation() || is_post_ || |
| was_alternate_protocol_recently_broken_; |
| rv = session_->CryptoConnect( |
| require_confirmation, |
| base::Bind(&QuicStreamFactory::Job::OnIOComplete, |
| base::Unretained(this))); |
| return rv; |
| } |
| |
| int QuicStreamFactory::Job::DoResumeConnect() { |
| io_state_ = STATE_CONNECT_COMPLETE; |
| |
| int rv = session_->ResumeCryptoConnect( |
| base::Bind(&QuicStreamFactory::Job::OnIOComplete, |
| base::Unretained(this))); |
| |
| return rv; |
| } |
| |
| int QuicStreamFactory::Job::DoConnectComplete(int rv) { |
| if (rv != OK) |
| return rv; |
| |
| DCHECK(!factory_->HasActiveSession(server_id_)); |
| // There may well now be an active session for this IP. If so, use the |
| // existing session instead. |
| AddressList address(session_->connection()->peer_address()); |
| if (factory_->OnResolution(server_id_, address)) { |
| session_->connection()->SendConnectionClose(QUIC_CONNECTION_IP_POOLED); |
| session_ = nullptr; |
| return OK; |
| } |
| |
| factory_->ActivateSession(server_id_, session_); |
| |
| return OK; |
| } |
| |
| QuicStreamRequest::QuicStreamRequest(QuicStreamFactory* factory) |
| : factory_(factory) {} |
| |
| QuicStreamRequest::~QuicStreamRequest() { |
| if (factory_ && !callback_.is_null()) |
| factory_->CancelRequest(this); |
| } |
| |
| int QuicStreamRequest::Request(const HostPortPair& host_port_pair, |
| bool is_https, |
| PrivacyMode privacy_mode, |
| base::StringPiece method, |
| const BoundNetLog& net_log, |
| const CompletionCallback& callback) { |
| DCHECK(!stream_); |
| DCHECK(callback_.is_null()); |
| DCHECK(factory_); |
| int rv = factory_->Create(host_port_pair, is_https, privacy_mode, method, |
| net_log, this); |
| if (rv == ERR_IO_PENDING) { |
| host_port_pair_ = host_port_pair; |
| is_https_ = is_https; |
| net_log_ = net_log; |
| callback_ = callback; |
| } else { |
| factory_ = nullptr; |
| } |
| if (rv == OK) |
| DCHECK(stream_); |
| return rv; |
| } |
| |
| void QuicStreamRequest::set_stream(scoped_ptr<QuicHttpStream> stream) { |
| DCHECK(stream); |
| stream_ = stream.Pass(); |
| } |
| |
| void QuicStreamRequest::OnRequestComplete(int rv) { |
| factory_ = nullptr; |
| callback_.Run(rv); |
| } |
| |
| scoped_ptr<QuicHttpStream> QuicStreamRequest::ReleaseStream() { |
| DCHECK(stream_); |
| return stream_.Pass(); |
| } |
| |
| QuicStreamFactory::QuicStreamFactory( |
| HostResolver* host_resolver, |
| ClientSocketFactory* client_socket_factory, |
| base::WeakPtr<HttpServerProperties> http_server_properties, |
| CertVerifier* cert_verifier, |
| ChannelIDService* channel_id_service, |
| TransportSecurityState* transport_security_state, |
| QuicCryptoClientStreamFactory* quic_crypto_client_stream_factory, |
| QuicRandom* random_generator, |
| QuicClock* clock, |
| size_t max_packet_length, |
| const std::string& user_agent_id, |
| const QuicVersionVector& supported_versions, |
| bool enable_port_selection, |
| bool always_require_handshake_confirmation, |
| bool disable_connection_pooling, |
| int load_server_info_timeout, |
| const QuicTagVector& connection_options) |
| : require_confirmation_(true), |
| host_resolver_(host_resolver), |
| client_socket_factory_(client_socket_factory), |
| http_server_properties_(http_server_properties), |
| transport_security_state_(transport_security_state), |
| quic_server_info_factory_(nullptr), |
| quic_crypto_client_stream_factory_(quic_crypto_client_stream_factory), |
| random_generator_(random_generator), |
| clock_(clock), |
| max_packet_length_(max_packet_length), |
| config_(InitializeQuicConfig(connection_options)), |
| supported_versions_(supported_versions), |
| enable_port_selection_(enable_port_selection), |
| always_require_handshake_confirmation_( |
| always_require_handshake_confirmation), |
| disable_connection_pooling_(disable_connection_pooling), |
| load_server_info_timeout_ms_(load_server_info_timeout), |
| port_seed_(random_generator_->RandUint64()), |
| check_persisted_supports_quic_(true), |
| task_runner_(nullptr), |
| weak_factory_(this) { |
| DCHECK(transport_security_state_); |
| crypto_config_.set_user_agent_id(user_agent_id); |
| crypto_config_.AddCanonicalSuffix(".c.youtube.com"); |
| crypto_config_.AddCanonicalSuffix(".googlevideo.com"); |
| crypto_config_.SetProofVerifier( |
| new ProofVerifierChromium(cert_verifier, transport_security_state)); |
| crypto_config_.SetChannelIDSource( |
| new ChannelIDSourceChromium(channel_id_service)); |
| base::CPU cpu; |
| if (cpu.has_aesni() && cpu.has_avx()) |
| crypto_config_.PreferAesGcm(); |
| if (!IsEcdsaSupported()) |
| crypto_config_.DisableEcdsa(); |
| } |
| |
| QuicStreamFactory::~QuicStreamFactory() { |
| CloseAllSessions(ERR_ABORTED); |
| while (!all_sessions_.empty()) { |
| delete all_sessions_.begin()->first; |
| all_sessions_.erase(all_sessions_.begin()); |
| } |
| STLDeleteValues(&active_jobs_); |
| } |
| |
| void QuicStreamFactory::set_require_confirmation(bool require_confirmation) { |
| require_confirmation_ = require_confirmation; |
| if (http_server_properties_ && (!(local_address_ == IPEndPoint()))) { |
| // TODO(rtenneti): Delete host_port_pair and persist data in globals. |
| HostPortPair host_port_pair(kDummyHostname, kDummyPort); |
| http_server_properties_->SetSupportsQuic( |
| host_port_pair, !require_confirmation, |
| local_address_.ToStringWithoutPort()); |
| } |
| } |
| |
| int QuicStreamFactory::Create(const HostPortPair& host_port_pair, |
| bool is_https, |
| PrivacyMode privacy_mode, |
| base::StringPiece method, |
| const BoundNetLog& net_log, |
| QuicStreamRequest* request) { |
| QuicServerId server_id(host_port_pair, is_https, privacy_mode); |
| if (HasActiveSession(server_id)) { |
| request->set_stream(CreateIfSessionExists(server_id, net_log)); |
| return OK; |
| } |
| |
| if (HasActiveJob(server_id)) { |
| Job* job = active_jobs_[server_id]; |
| active_requests_[request] = job; |
| job_requests_map_[job].insert(request); |
| return ERR_IO_PENDING; |
| } |
| |
| QuicServerInfo* quic_server_info = nullptr; |
| if (quic_server_info_factory_) { |
| QuicCryptoClientConfig::CachedState* cached = |
| crypto_config_.LookupOrCreate(server_id); |
| DCHECK(cached); |
| if (cached->IsEmpty()) { |
| quic_server_info = quic_server_info_factory_->GetForServer(server_id); |
| } |
| } |
| // TODO(rtenneti): Initialize task_runner_ in the constructor after |
| // WebRequestActionWithThreadsTest.* tests are fixed. |
| if (!task_runner_) |
| task_runner_ = base::MessageLoop::current()->message_loop_proxy().get(); |
| |
| bool was_alternate_protocol_recently_broken = |
| http_server_properties_ && |
| http_server_properties_->WasAlternateProtocolRecentlyBroken( |
| server_id.host_port_pair()); |
| scoped_ptr<Job> job(new Job(this, host_resolver_, host_port_pair, is_https, |
| was_alternate_protocol_recently_broken, |
| privacy_mode, method, quic_server_info, net_log)); |
| int rv = job->Run(base::Bind(&QuicStreamFactory::OnJobComplete, |
| base::Unretained(this), job.get())); |
| |
| if (rv == ERR_IO_PENDING) { |
| active_requests_[request] = job.get(); |
| job_requests_map_[job.get()].insert(request); |
| active_jobs_[server_id] = job.release(); |
| } |
| if (rv == OK) { |
| DCHECK(HasActiveSession(server_id)); |
| request->set_stream(CreateIfSessionExists(server_id, net_log)); |
| } |
| return rv; |
| } |
| |
| bool QuicStreamFactory::OnResolution( |
| const QuicServerId& server_id, |
| const AddressList& address_list) { |
| DCHECK(!HasActiveSession(server_id)); |
| if (disable_connection_pooling_) { |
| return false; |
| } |
| for (size_t i = 0; i < address_list.size(); ++i) { |
| const IPEndPoint& address = address_list[i]; |
| const IpAliasKey ip_alias_key(address, server_id.is_https()); |
| if (!ContainsKey(ip_aliases_, ip_alias_key)) |
| continue; |
| |
| const SessionSet& sessions = ip_aliases_[ip_alias_key]; |
| for (SessionSet::const_iterator i = sessions.begin(); |
| i != sessions.end(); ++i) { |
| QuicClientSession* session = *i; |
| if (!session->CanPool(server_id.host())) |
| continue; |
| active_sessions_[server_id] = session; |
| session_aliases_[session].insert(server_id); |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| void QuicStreamFactory::OnJobComplete(Job* job, int rv) { |
| if (rv == OK) { |
| if (!always_require_handshake_confirmation_) |
| set_require_confirmation(false); |
| |
| // Create all the streams, but do not notify them yet. |
| for (RequestSet::iterator it = job_requests_map_[job].begin(); |
| it != job_requests_map_[job].end() ; ++it) { |
| DCHECK(HasActiveSession(job->server_id())); |
| (*it)->set_stream(CreateIfSessionExists(job->server_id(), |
| (*it)->net_log())); |
| } |
| } |
| while (!job_requests_map_[job].empty()) { |
| RequestSet::iterator it = job_requests_map_[job].begin(); |
| QuicStreamRequest* request = *it; |
| job_requests_map_[job].erase(it); |
| active_requests_.erase(request); |
| // Even though we're invoking callbacks here, we don't need to worry |
| // about |this| being deleted, because the factory is owned by the |
| // profile which can not be deleted via callbacks. |
| request->OnRequestComplete(rv); |
| } |
| active_jobs_.erase(job->server_id()); |
| job_requests_map_.erase(job); |
| delete job; |
| return; |
| } |
| |
| // Returns a newly created QuicHttpStream owned by the caller, if a |
| // matching session already exists. Returns nullptr otherwise. |
| scoped_ptr<QuicHttpStream> QuicStreamFactory::CreateIfSessionExists( |
| const QuicServerId& server_id, |
| const BoundNetLog& net_log) { |
| if (!HasActiveSession(server_id)) { |
| DVLOG(1) << "No active session"; |
| return scoped_ptr<QuicHttpStream>(); |
| } |
| |
| QuicClientSession* session = active_sessions_[server_id]; |
| DCHECK(session); |
| return scoped_ptr<QuicHttpStream>( |
| new QuicHttpStream(session->GetWeakPtr())); |
| } |
| |
| void QuicStreamFactory::OnIdleSession(QuicClientSession* session) { |
| } |
| |
| void QuicStreamFactory::OnSessionGoingAway(QuicClientSession* session) { |
| const AliasSet& aliases = session_aliases_[session]; |
| for (AliasSet::const_iterator it = aliases.begin(); it != aliases.end(); |
| ++it) { |
| DCHECK(active_sessions_.count(*it)); |
| DCHECK_EQ(session, active_sessions_[*it]); |
| // Track sessions which have recently gone away so that we can disable |
| // port suggestions. |
| if (session->goaway_received()) { |
| gone_away_aliases_.insert(*it); |
| } |
| |
| active_sessions_.erase(*it); |
| ProcessGoingAwaySession(session, *it, true); |
| } |
| ProcessGoingAwaySession(session, all_sessions_[session], false); |
| if (!aliases.empty()) { |
| const IpAliasKey ip_alias_key(session->connection()->peer_address(), |
| aliases.begin()->is_https()); |
| ip_aliases_[ip_alias_key].erase(session); |
| if (ip_aliases_[ip_alias_key].empty()) { |
| ip_aliases_.erase(ip_alias_key); |
| } |
| } |
| session_aliases_.erase(session); |
| } |
| |
| void QuicStreamFactory::OnSessionClosed(QuicClientSession* session) { |
| DCHECK_EQ(0u, session->GetNumOpenStreams()); |
| OnSessionGoingAway(session); |
| delete session; |
| all_sessions_.erase(session); |
| } |
| |
| void QuicStreamFactory::OnSessionConnectTimeout( |
| QuicClientSession* session) { |
| const AliasSet& aliases = session_aliases_[session]; |
| for (AliasSet::const_iterator it = aliases.begin(); it != aliases.end(); |
| ++it) { |
| DCHECK(active_sessions_.count(*it)); |
| DCHECK_EQ(session, active_sessions_[*it]); |
| active_sessions_.erase(*it); |
| } |
| |
| if (aliases.empty()) { |
| return; |
| } |
| |
| const IpAliasKey ip_alias_key(session->connection()->peer_address(), |
| aliases.begin()->is_https()); |
| ip_aliases_[ip_alias_key].erase(session); |
| if (ip_aliases_[ip_alias_key].empty()) { |
| ip_aliases_.erase(ip_alias_key); |
| } |
| QuicServerId server_id = *aliases.begin(); |
| session_aliases_.erase(session); |
| Job* job = new Job(this, host_resolver_, session, server_id); |
| active_jobs_[server_id] = job; |
| int rv = job->Run(base::Bind(&QuicStreamFactory::OnJobComplete, |
| base::Unretained(this), job)); |
| DCHECK_EQ(ERR_IO_PENDING, rv); |
| } |
| |
| void QuicStreamFactory::CancelRequest(QuicStreamRequest* request) { |
| DCHECK(ContainsKey(active_requests_, request)); |
| Job* job = active_requests_[request]; |
| job_requests_map_[job].erase(request); |
| active_requests_.erase(request); |
| } |
| |
| void QuicStreamFactory::CloseAllSessions(int error) { |
| while (!active_sessions_.empty()) { |
| size_t initial_size = active_sessions_.size(); |
| active_sessions_.begin()->second->CloseSessionOnError(error); |
| DCHECK_NE(initial_size, active_sessions_.size()); |
| } |
| while (!all_sessions_.empty()) { |
| size_t initial_size = all_sessions_.size(); |
| all_sessions_.begin()->first->CloseSessionOnError(error); |
| DCHECK_NE(initial_size, all_sessions_.size()); |
| } |
| DCHECK(all_sessions_.empty()); |
| } |
| |
| base::Value* QuicStreamFactory::QuicStreamFactoryInfoToValue() const { |
| base::ListValue* list = new base::ListValue(); |
| |
| for (SessionMap::const_iterator it = active_sessions_.begin(); |
| it != active_sessions_.end(); ++it) { |
| const QuicServerId& server_id = it->first; |
| QuicClientSession* session = it->second; |
| const AliasSet& aliases = session_aliases_.find(session)->second; |
| // Only add a session to the list once. |
| if (server_id == *aliases.begin()) { |
| std::set<HostPortPair> hosts; |
| for (AliasSet::const_iterator alias_it = aliases.begin(); |
| alias_it != aliases.end(); ++alias_it) { |
| hosts.insert(alias_it->host_port_pair()); |
| } |
| list->Append(session->GetInfoAsValue(hosts)); |
| } |
| } |
| return list; |
| } |
| |
| void QuicStreamFactory::ClearCachedStatesInCryptoConfig() { |
| crypto_config_.ClearCachedStates(); |
| } |
| |
| void QuicStreamFactory::OnIPAddressChanged() { |
| CloseAllSessions(ERR_NETWORK_CHANGED); |
| set_require_confirmation(true); |
| } |
| |
| void QuicStreamFactory::OnCertAdded(const X509Certificate* cert) { |
| CloseAllSessions(ERR_CERT_DATABASE_CHANGED); |
| } |
| |
| void QuicStreamFactory::OnCACertChanged(const X509Certificate* cert) { |
| // We should flush the sessions if we removed trust from a |
| // cert, because a previously trusted server may have become |
| // untrusted. |
| // |
| // We should not flush the sessions if we added trust to a cert. |
| // |
| // Since the OnCACertChanged method doesn't tell us what |
| // kind of change it is, we have to flush the socket |
| // pools to be safe. |
| CloseAllSessions(ERR_CERT_DATABASE_CHANGED); |
| } |
| |
| bool QuicStreamFactory::HasActiveSession( |
| const QuicServerId& server_id) const { |
| return ContainsKey(active_sessions_, server_id); |
| } |
| |
| int QuicStreamFactory::CreateSession( |
| const QuicServerId& server_id, |
| scoped_ptr<QuicServerInfo> server_info, |
| const AddressList& address_list, |
| const BoundNetLog& net_log, |
| QuicClientSession** session) { |
| bool enable_port_selection = enable_port_selection_; |
| if (enable_port_selection && |
| ContainsKey(gone_away_aliases_, server_id)) { |
| // Disable port selection when the server is going away. |
| // There is no point in trying to return to the same server, if |
| // that server is no longer handling requests. |
| enable_port_selection = false; |
| gone_away_aliases_.erase(server_id); |
| } |
| |
| QuicConnectionId connection_id = random_generator_->RandUint64(); |
| IPEndPoint addr = *address_list.begin(); |
| scoped_refptr<PortSuggester> port_suggester = |
| new PortSuggester(server_id.host_port_pair(), port_seed_); |
| DatagramSocket::BindType bind_type = enable_port_selection ? |
| DatagramSocket::RANDOM_BIND : // Use our callback. |
| DatagramSocket::DEFAULT_BIND; // Use OS to randomize. |
| scoped_ptr<DatagramClientSocket> socket( |
| client_socket_factory_->CreateDatagramClientSocket( |
| bind_type, |
| base::Bind(&PortSuggester::SuggestPort, port_suggester), |
| net_log.net_log(), net_log.source())); |
| int rv = socket->Connect(addr); |
| if (rv != OK) { |
| HistogramCreateSessionFailure(CREATION_ERROR_CONNECTING_SOCKET); |
| return rv; |
| } |
| UMA_HISTOGRAM_COUNTS("Net.QuicEphemeralPortsSuggested", |
| port_suggester->call_count()); |
| if (enable_port_selection) { |
| DCHECK_LE(1u, port_suggester->call_count()); |
| } else { |
| DCHECK_EQ(0u, port_suggester->call_count()); |
| } |
| |
| // We should adaptively set this buffer size, but for now, we'll use a size |
| // that is more than large enough for a full receive window, and yet |
| // does not consume "too much" memory. If we see bursty packet loss, we may |
| // revisit this setting and test for its impact. |
| const int32 kSocketBufferSize = |
| static_cast<int32>(TcpReceiver::kReceiveWindowTCP); |
| rv = socket->SetReceiveBufferSize(kSocketBufferSize); |
| if (rv != OK) { |
| HistogramCreateSessionFailure(CREATION_ERROR_SETTING_RECEIVE_BUFFER); |
| return rv; |
| } |
| // Set a buffer large enough to contain the initial CWND's worth of packet |
| // to work around the problem with CHLO packets being sent out with the |
| // wrong encryption level, when the send buffer is full. |
| rv = socket->SetSendBufferSize(kMaxPacketSize * 20); |
| if (rv != OK) { |
| HistogramCreateSessionFailure(CREATION_ERROR_SETTING_SEND_BUFFER); |
| return rv; |
| } |
| |
| socket->GetLocalAddress(&local_address_); |
| if (check_persisted_supports_quic_ && http_server_properties_) { |
| check_persisted_supports_quic_ = false; |
| // TODO(rtenneti): Delete host_port_pair and persist data in globals. |
| HostPortPair host_port_pair(kDummyHostname, kDummyPort); |
| SupportsQuic supports_quic(true, local_address_.ToStringWithoutPort()); |
| if (http_server_properties_->GetSupportsQuic( |
| host_port_pair).Equals(supports_quic)) { |
| require_confirmation_ = false; |
| } |
| } |
| |
| DefaultPacketWriterFactory packet_writer_factory(socket.get()); |
| |
| if (!helper_.get()) { |
| helper_.reset(new QuicConnectionHelper( |
| base::MessageLoop::current()->message_loop_proxy().get(), |
| clock_.get(), random_generator_)); |
| } |
| |
| QuicConnection* connection = new QuicConnection(connection_id, |
| addr, |
| helper_.get(), |
| packet_writer_factory, |
| true /* owns_writer */, |
| false /* is_server */, |
| server_id.is_https(), |
| supported_versions_); |
| connection->set_max_packet_length(max_packet_length_); |
| |
| InitializeCachedStateInCryptoConfig(server_id, server_info); |
| |
| QuicConfig config = config_; |
| config.set_max_undecryptable_packets(kMaxUndecryptablePackets); |
| config.SetInitialFlowControlWindowToSend(kInitialReceiveWindowSize); |
| config.SetInitialStreamFlowControlWindowToSend(kInitialReceiveWindowSize); |
| config.SetInitialSessionFlowControlWindowToSend(kInitialReceiveWindowSize); |
| if (http_server_properties_) { |
| const HttpServerProperties::NetworkStats* stats = |
| http_server_properties_->GetServerNetworkStats( |
| server_id.host_port_pair()); |
| if (stats != nullptr) { |
| config.SetInitialRoundTripTimeUsToSend( |
| static_cast<uint32>(stats->srtt.InMicroseconds())); |
| } |
| } |
| |
| if (quic_server_info_factory_ && !server_info) { |
| // Start the disk cache loading so that we can persist the newer QUIC server |
| // information and/or inform the disk cache that we have reused |
| // |server_info|. |
| server_info.reset(quic_server_info_factory_->GetForServer(server_id)); |
| server_info->Start(); |
| } |
| |
| *session = new QuicClientSession( |
| connection, socket.Pass(), this, transport_security_state_, |
| server_info.Pass(), config, |
| base::MessageLoop::current()->message_loop_proxy().get(), |
| net_log.net_log()); |
| all_sessions_[*session] = server_id; // owning pointer |
| (*session)->InitializeSession(server_id, &crypto_config_, |
| quic_crypto_client_stream_factory_); |
| bool closed_during_initialize = |
| !ContainsKey(all_sessions_, *session) || |
| !(*session)->connection()->connected(); |
| UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.ClosedDuringInitializeSession", |
| closed_during_initialize); |
| if (closed_during_initialize) { |
| DLOG(DFATAL) << "Session closed during initialize"; |
| *session = nullptr; |
| return ERR_CONNECTION_CLOSED; |
| } |
| return OK; |
| } |
| |
| bool QuicStreamFactory::HasActiveJob(const QuicServerId& key) const { |
| return ContainsKey(active_jobs_, key); |
| } |
| |
| void QuicStreamFactory::ActivateSession( |
| const QuicServerId& server_id, |
| QuicClientSession* session) { |
| DCHECK(!HasActiveSession(server_id)); |
| UMA_HISTOGRAM_COUNTS("Net.QuicActiveSessions", active_sessions_.size()); |
| active_sessions_[server_id] = session; |
| session_aliases_[session].insert(server_id); |
| const IpAliasKey ip_alias_key(session->connection()->peer_address(), |
| server_id.is_https()); |
| DCHECK(!ContainsKey(ip_aliases_[ip_alias_key], session)); |
| ip_aliases_[ip_alias_key].insert(session); |
| } |
| |
| void QuicStreamFactory::InitializeCachedStateInCryptoConfig( |
| const QuicServerId& server_id, |
| const scoped_ptr<QuicServerInfo>& server_info) { |
| // |server_info| will be NULL, if a non-empty server config already exists in |
| // the memory cache. This is a minor optimization to avoid LookupOrCreate. |
| if (!server_info) |
| return; |
| |
| QuicCryptoClientConfig::CachedState* cached = |
| crypto_config_.LookupOrCreate(server_id); |
| if (!cached->IsEmpty()) |
| return; |
| |
| if (http_server_properties_) { |
| if (quic_supported_servers_at_startup_.empty()) { |
| for (const std::pair<net::HostPortPair, net::AlternateProtocolInfo>& |
| key_value : http_server_properties_->alternate_protocol_map()) { |
| if (key_value.second.protocol == QUIC) { |
| quic_supported_servers_at_startup_.insert(key_value.first); |
| } |
| } |
| } |
| |
| // TODO(rtenneti): Delete the following histogram after collecting stats. |
| // If the AlternateProtocolMap contained an entry for this host, check if |
| // the disk cache contained an entry for it. |
| if (ContainsKey(quic_supported_servers_at_startup_, |
| server_id.host_port_pair())) { |
| UMA_HISTOGRAM_BOOLEAN( |
| "Net.QuicServerInfo.ExpectConfigMissingFromDiskCache", |
| server_info->state().server_config.empty()); |
| } |
| } |
| |
| if (!cached->Initialize(server_info->state().server_config, |
| server_info->state().source_address_token, |
| server_info->state().certs, |
| server_info->state().server_config_sig, |
| clock_->WallNow())) |
| return; |
| |
| if (!server_id.is_https()) { |
| // Don't check the certificates for insecure QUIC. |
| cached->SetProofValid(); |
| } |
| } |
| |
| void QuicStreamFactory::ProcessGoingAwaySession( |
| QuicClientSession* session, |
| const QuicServerId& server_id, |
| bool session_was_active) { |
| if (!http_server_properties_) |
| return; |
| |
| const QuicConnectionStats& stats = session->connection()->GetStats(); |
| if (session->IsCryptoHandshakeConfirmed()) { |
| HttpServerProperties::NetworkStats network_stats; |
| network_stats.srtt = base::TimeDelta::FromMicroseconds(stats.srtt_us); |
| network_stats.bandwidth_estimate = stats.estimated_bandwidth; |
| http_server_properties_->SetServerNetworkStats(server_id.host_port_pair(), |
| network_stats); |
| return; |
| } |
| |
| UMA_HISTOGRAM_COUNTS("Net.QuicHandshakeNotConfirmedNumPacketsReceived", |
| stats.packets_received); |
| |
| if (!session_was_active) |
| return; |
| |
| const HostPortPair& server = server_id.host_port_pair(); |
| // Don't try to change the alternate-protocol state, if the |
| // alternate-protocol state is unknown. |
| if (!http_server_properties_->HasAlternateProtocol(server)) |
| return; |
| |
| // TODO(rch): In the special case where the session has received no |
| // packets from the peer, we should consider blacklisting this |
| // differently so that we still race TCP but we don't consider the |
| // session connected until the handshake has been confirmed. |
| HistogramBrokenAlternateProtocolLocation( |
| BROKEN_ALTERNATE_PROTOCOL_LOCATION_QUIC_STREAM_FACTORY); |
| AlternateProtocolInfo alternate = |
| http_server_properties_->GetAlternateProtocol(server); |
| DCHECK_EQ(QUIC, alternate.protocol); |
| |
| // Since the session was active, there's no longer an |
| // HttpStreamFactoryImpl::Job running which can mark it broken, unless the |
| // TCP job also fails. So to avoid not using QUIC when we otherwise could, |
| // we mark it as broken, and then immediately re-enable it. This leaves |
| // QUIC as "recently broken" which means that 0-RTT will be disabled but |
| // we'll still race. |
| http_server_properties_->SetBrokenAlternateProtocol(server); |
| http_server_properties_->ClearAlternateProtocol(server); |
| http_server_properties_->SetAlternateProtocol( |
| server, alternate.port, alternate.protocol, 1); |
| DCHECK_EQ(QUIC, |
| http_server_properties_->GetAlternateProtocol(server).protocol); |
| DCHECK(http_server_properties_->WasAlternateProtocolRecentlyBroken( |
| server)); |
| } |
| |
| } // namespace net |