blob: e88046fba3cb013e9d2bd223abedd099a7678c78 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/http/http_stream_factory.h"
#include "base/logging.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_split.h"
#include "net/base/host_mapping_rules.h"
#include "net/base/host_port_pair.h"
#include "url/gurl.h"
namespace net {
// WARNING: If you modify or add any static flags, you must keep them in sync
// with |ResetStaticSettingsToInit|. This is critical for unit test isolation.
// static
std::vector<std::string>* HttpStreamFactory::next_protos_ = NULL;
// static
bool HttpStreamFactory::enabled_protocols_[NUM_VALID_ALTERNATE_PROTOCOLS];
// static
bool HttpStreamFactory::spdy_enabled_ = true;
// static
bool HttpStreamFactory::use_alternate_protocols_ = false;
// static
bool HttpStreamFactory::force_spdy_over_ssl_ = true;
// static
bool HttpStreamFactory::force_spdy_always_ = false;
// static
std::list<HostPortPair>* HttpStreamFactory::forced_spdy_exclusions_ = NULL;
HttpStreamFactory::~HttpStreamFactory() {}
// static
bool HttpStreamFactory::IsProtocolEnabled(AlternateProtocol protocol) {
DCHECK(IsAlternateProtocolValid(protocol));
return enabled_protocols_[
protocol - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION];
}
// static
void HttpStreamFactory::SetProtocolEnabled(AlternateProtocol protocol) {
DCHECK(IsAlternateProtocolValid(protocol));
enabled_protocols_[
protocol - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION] = true;
}
// static
void HttpStreamFactory::ResetEnabledProtocols() {
for (int i = ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION;
i <= ALTERNATE_PROTOCOL_MAXIMUM_VALID_VERSION; ++i) {
enabled_protocols_[i - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION] = false;
}
}
// static
void HttpStreamFactory::ResetStaticSettingsToInit() {
// WARNING: These must match the initializers above.
delete next_protos_;
delete forced_spdy_exclusions_;
next_protos_ = NULL;
spdy_enabled_ = true;
use_alternate_protocols_ = false;
force_spdy_over_ssl_ = true;
force_spdy_always_ = false;
forced_spdy_exclusions_ = NULL;
ResetEnabledProtocols();
}
void HttpStreamFactory::ProcessAlternateProtocol(
const base::WeakPtr<HttpServerProperties>& http_server_properties,
const std::string& alternate_protocol_str,
const HostPortPair& http_host_port_pair) {
std::vector<std::string> port_protocol_vector;
base::SplitString(alternate_protocol_str, ':', &port_protocol_vector);
if (port_protocol_vector.size() != 2) {
DVLOG(1) << kAlternateProtocolHeader
<< " header has too many tokens: "
<< alternate_protocol_str;
return;
}
int port;
if (!base::StringToInt(port_protocol_vector[0], &port) ||
port <= 0 || port >= 1 << 16) {
DVLOG(1) << kAlternateProtocolHeader
<< " header has unrecognizable port: "
<< port_protocol_vector[0];
return;
}
AlternateProtocol protocol =
AlternateProtocolFromString(port_protocol_vector[1]);
if (IsAlternateProtocolValid(protocol) && !IsProtocolEnabled(protocol)) {
protocol = ALTERNATE_PROTOCOL_BROKEN;
}
if (protocol == ALTERNATE_PROTOCOL_BROKEN) {
DVLOG(1) << kAlternateProtocolHeader
<< " header has unrecognized protocol: "
<< port_protocol_vector[1];
return;
}
HostPortPair host_port(http_host_port_pair);
const HostMappingRules* mapping_rules = GetHostMappingRules();
if (mapping_rules)
mapping_rules->RewriteHost(&host_port);
if (http_server_properties->HasAlternateProtocol(host_port)) {
const PortAlternateProtocolPair existing_alternate =
http_server_properties->GetAlternateProtocol(host_port);
// If we think the alternate protocol is broken, don't change it.
if (existing_alternate.protocol == ALTERNATE_PROTOCOL_BROKEN)
return;
}
http_server_properties->SetAlternateProtocol(host_port, port, protocol);
}
GURL HttpStreamFactory::ApplyHostMappingRules(const GURL& url,
HostPortPair* endpoint) {
const HostMappingRules* mapping_rules = GetHostMappingRules();
if (mapping_rules && mapping_rules->RewriteHost(endpoint)) {
url_canon::Replacements<char> replacements;
const std::string port_str = base::IntToString(endpoint->port());
replacements.SetPort(port_str.c_str(),
url_parse::Component(0, port_str.size()));
replacements.SetHost(endpoint->host().c_str(),
url_parse::Component(0, endpoint->host().size()));
return url.ReplaceComponents(replacements);
}
return url;
}
// static
void HttpStreamFactory::add_forced_spdy_exclusion(const std::string& value) {
HostPortPair pair = HostPortPair::FromURL(GURL(value));
if (!forced_spdy_exclusions_)
forced_spdy_exclusions_ = new std::list<HostPortPair>();
forced_spdy_exclusions_->push_back(pair);
}
// static
bool HttpStreamFactory::HasSpdyExclusion(const HostPortPair& endpoint) {
std::list<HostPortPair>* exclusions = forced_spdy_exclusions_;
if (!exclusions)
return false;
std::list<HostPortPair>::const_iterator it;
for (it = exclusions->begin(); it != exclusions->end(); ++it)
if (it->Equals(endpoint))
return true;
return false;
}
// static
void HttpStreamFactory::EnableNpnHttpOnly() {
// Avoid alternate protocol in this case. Otherwise, browser will try SSL
// and then fallback to http. This introduces extra load.
set_use_alternate_protocols(false);
std::vector<NextProto> next_protos;
next_protos.push_back(kProtoHTTP11);
SetNextProtos(next_protos);
}
// static
void HttpStreamFactory::EnableNpnSpdy3() {
set_use_alternate_protocols(true);
std::vector<NextProto> next_protos;
next_protos.push_back(kProtoHTTP11);
next_protos.push_back(kProtoQUIC1SPDY3);
next_protos.push_back(kProtoSPDY3);
SetNextProtos(next_protos);
}
// static
void HttpStreamFactory::EnableNpnSpdy31() {
set_use_alternate_protocols(true);
std::vector<NextProto> next_protos;
next_protos.push_back(kProtoHTTP11);
next_protos.push_back(kProtoQUIC1SPDY3);
next_protos.push_back(kProtoSPDY3);
next_protos.push_back(kProtoSPDY31);
SetNextProtos(next_protos);
}
// static
void HttpStreamFactory::EnableNpnSpdy31WithSpdy2() {
set_use_alternate_protocols(true);
std::vector<NextProto> next_protos;
next_protos.push_back(kProtoHTTP11);
next_protos.push_back(kProtoQUIC1SPDY3);
next_protos.push_back(kProtoDeprecatedSPDY2);
next_protos.push_back(kProtoSPDY3);
next_protos.push_back(kProtoSPDY31);
SetNextProtos(next_protos);
}
// static
void HttpStreamFactory::EnableNpnSpdy4a2() {
set_use_alternate_protocols(true);
std::vector<NextProto> next_protos;
next_protos.push_back(kProtoHTTP11);
next_protos.push_back(kProtoQUIC1SPDY3);
next_protos.push_back(kProtoSPDY3);
next_protos.push_back(kProtoSPDY31);
next_protos.push_back(kProtoSPDY4a2);
SetNextProtos(next_protos);
}
// static
void HttpStreamFactory::EnableNpnHttp2Draft04() {
set_use_alternate_protocols(true);
std::vector<NextProto> next_protos;
next_protos.push_back(kProtoHTTP11);
next_protos.push_back(kProtoQUIC1SPDY3);
next_protos.push_back(kProtoSPDY3);
next_protos.push_back(kProtoSPDY31);
next_protos.push_back(kProtoSPDY4a2);
next_protos.push_back(kProtoHTTP2Draft04);
SetNextProtos(next_protos);
}
// static
void HttpStreamFactory::SetNextProtos(const std::vector<NextProto>& value) {
if (!next_protos_)
next_protos_ = new std::vector<std::string>;
next_protos_->clear();
ResetEnabledProtocols();
// TODO(rtenneti): bug 116575 - consider combining the NextProto and
// AlternateProtocol.
for (uint32 i = 0; i < value.size(); ++i) {
NextProto proto = value[i];
// Add the protocol to the TLS next protocol list, except for QUIC
// since it uses UDP.
if (proto != kProtoQUIC1SPDY3) {
next_protos_->push_back(SSLClientSocket::NextProtoToString(proto));
}
// Enable the corresponding alternate protocol, except for HTTP
// which has not corresponding alternative.
if (proto != kProtoHTTP11) {
AlternateProtocol alternate = AlternateProtocolFromNextProto(proto);
if (!IsAlternateProtocolValid(alternate)) {
NOTREACHED() << "Invalid next proto: " << proto;
continue;
}
SetProtocolEnabled(alternate);
}
}
}
HttpStreamFactory::HttpStreamFactory() {}
} // namespace net