| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/http/http_stream_factory.h" |
| |
| #include "base/logging.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/string_split.h" |
| #include "net/base/host_mapping_rules.h" |
| #include "net/base/host_port_pair.h" |
| #include "url/gurl.h" |
| |
| namespace net { |
| |
| // WARNING: If you modify or add any static flags, you must keep them in sync |
| // with |ResetStaticSettingsToInit|. This is critical for unit test isolation. |
| |
| // static |
| std::vector<std::string>* HttpStreamFactory::next_protos_ = NULL; |
| // static |
| bool HttpStreamFactory::enabled_protocols_[NUM_VALID_ALTERNATE_PROTOCOLS]; |
| // static |
| bool HttpStreamFactory::spdy_enabled_ = true; |
| // static |
| bool HttpStreamFactory::use_alternate_protocols_ = false; |
| // static |
| bool HttpStreamFactory::force_spdy_over_ssl_ = true; |
| // static |
| bool HttpStreamFactory::force_spdy_always_ = false; |
| // static |
| std::list<HostPortPair>* HttpStreamFactory::forced_spdy_exclusions_ = NULL; |
| |
| HttpStreamFactory::~HttpStreamFactory() {} |
| |
| // static |
| bool HttpStreamFactory::IsProtocolEnabled(AlternateProtocol protocol) { |
| DCHECK(IsAlternateProtocolValid(protocol)); |
| return enabled_protocols_[ |
| protocol - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION]; |
| } |
| |
| // static |
| void HttpStreamFactory::SetProtocolEnabled(AlternateProtocol protocol) { |
| DCHECK(IsAlternateProtocolValid(protocol)); |
| enabled_protocols_[ |
| protocol - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION] = true; |
| } |
| |
| // static |
| void HttpStreamFactory::ResetEnabledProtocols() { |
| for (int i = ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION; |
| i <= ALTERNATE_PROTOCOL_MAXIMUM_VALID_VERSION; ++i) { |
| enabled_protocols_[i - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION] = false; |
| } |
| } |
| |
| // static |
| void HttpStreamFactory::ResetStaticSettingsToInit() { |
| // WARNING: These must match the initializers above. |
| delete next_protos_; |
| delete forced_spdy_exclusions_; |
| next_protos_ = NULL; |
| spdy_enabled_ = true; |
| use_alternate_protocols_ = false; |
| force_spdy_over_ssl_ = true; |
| force_spdy_always_ = false; |
| forced_spdy_exclusions_ = NULL; |
| ResetEnabledProtocols(); |
| } |
| |
| void HttpStreamFactory::ProcessAlternateProtocol( |
| const base::WeakPtr<HttpServerProperties>& http_server_properties, |
| const std::string& alternate_protocol_str, |
| const HostPortPair& http_host_port_pair) { |
| std::vector<std::string> port_protocol_vector; |
| base::SplitString(alternate_protocol_str, ':', &port_protocol_vector); |
| if (port_protocol_vector.size() != 2) { |
| DVLOG(1) << kAlternateProtocolHeader |
| << " header has too many tokens: " |
| << alternate_protocol_str; |
| return; |
| } |
| |
| int port; |
| if (!base::StringToInt(port_protocol_vector[0], &port) || |
| port <= 0 || port >= 1 << 16) { |
| DVLOG(1) << kAlternateProtocolHeader |
| << " header has unrecognizable port: " |
| << port_protocol_vector[0]; |
| return; |
| } |
| |
| AlternateProtocol protocol = |
| AlternateProtocolFromString(port_protocol_vector[1]); |
| if (IsAlternateProtocolValid(protocol) && !IsProtocolEnabled(protocol)) { |
| protocol = ALTERNATE_PROTOCOL_BROKEN; |
| } |
| |
| if (protocol == ALTERNATE_PROTOCOL_BROKEN) { |
| DVLOG(1) << kAlternateProtocolHeader |
| << " header has unrecognized protocol: " |
| << port_protocol_vector[1]; |
| return; |
| } |
| |
| HostPortPair host_port(http_host_port_pair); |
| const HostMappingRules* mapping_rules = GetHostMappingRules(); |
| if (mapping_rules) |
| mapping_rules->RewriteHost(&host_port); |
| |
| if (http_server_properties->HasAlternateProtocol(host_port)) { |
| const PortAlternateProtocolPair existing_alternate = |
| http_server_properties->GetAlternateProtocol(host_port); |
| // If we think the alternate protocol is broken, don't change it. |
| if (existing_alternate.protocol == ALTERNATE_PROTOCOL_BROKEN) |
| return; |
| } |
| |
| http_server_properties->SetAlternateProtocol(host_port, port, protocol); |
| } |
| |
| GURL HttpStreamFactory::ApplyHostMappingRules(const GURL& url, |
| HostPortPair* endpoint) { |
| const HostMappingRules* mapping_rules = GetHostMappingRules(); |
| if (mapping_rules && mapping_rules->RewriteHost(endpoint)) { |
| url_canon::Replacements<char> replacements; |
| const std::string port_str = base::IntToString(endpoint->port()); |
| replacements.SetPort(port_str.c_str(), |
| url_parse::Component(0, port_str.size())); |
| replacements.SetHost(endpoint->host().c_str(), |
| url_parse::Component(0, endpoint->host().size())); |
| return url.ReplaceComponents(replacements); |
| } |
| return url; |
| } |
| |
| // static |
| void HttpStreamFactory::add_forced_spdy_exclusion(const std::string& value) { |
| HostPortPair pair = HostPortPair::FromURL(GURL(value)); |
| if (!forced_spdy_exclusions_) |
| forced_spdy_exclusions_ = new std::list<HostPortPair>(); |
| forced_spdy_exclusions_->push_back(pair); |
| } |
| |
| // static |
| bool HttpStreamFactory::HasSpdyExclusion(const HostPortPair& endpoint) { |
| std::list<HostPortPair>* exclusions = forced_spdy_exclusions_; |
| if (!exclusions) |
| return false; |
| |
| std::list<HostPortPair>::const_iterator it; |
| for (it = exclusions->begin(); it != exclusions->end(); ++it) |
| if (it->Equals(endpoint)) |
| return true; |
| return false; |
| } |
| |
| // static |
| void HttpStreamFactory::EnableNpnHttpOnly() { |
| // Avoid alternate protocol in this case. Otherwise, browser will try SSL |
| // and then fallback to http. This introduces extra load. |
| set_use_alternate_protocols(false); |
| std::vector<NextProto> next_protos; |
| next_protos.push_back(kProtoHTTP11); |
| SetNextProtos(next_protos); |
| } |
| |
| // static |
| void HttpStreamFactory::EnableNpnSpdy3() { |
| set_use_alternate_protocols(true); |
| std::vector<NextProto> next_protos; |
| next_protos.push_back(kProtoHTTP11); |
| next_protos.push_back(kProtoQUIC1SPDY3); |
| next_protos.push_back(kProtoSPDY3); |
| SetNextProtos(next_protos); |
| } |
| |
| // static |
| void HttpStreamFactory::EnableNpnSpdy31() { |
| set_use_alternate_protocols(true); |
| std::vector<NextProto> next_protos; |
| next_protos.push_back(kProtoHTTP11); |
| next_protos.push_back(kProtoQUIC1SPDY3); |
| next_protos.push_back(kProtoSPDY3); |
| next_protos.push_back(kProtoSPDY31); |
| SetNextProtos(next_protos); |
| } |
| |
| // static |
| void HttpStreamFactory::EnableNpnSpdy31WithSpdy2() { |
| set_use_alternate_protocols(true); |
| std::vector<NextProto> next_protos; |
| next_protos.push_back(kProtoHTTP11); |
| next_protos.push_back(kProtoQUIC1SPDY3); |
| next_protos.push_back(kProtoDeprecatedSPDY2); |
| next_protos.push_back(kProtoSPDY3); |
| next_protos.push_back(kProtoSPDY31); |
| SetNextProtos(next_protos); |
| } |
| |
| // static |
| void HttpStreamFactory::EnableNpnSpdy4a2() { |
| set_use_alternate_protocols(true); |
| std::vector<NextProto> next_protos; |
| next_protos.push_back(kProtoHTTP11); |
| next_protos.push_back(kProtoQUIC1SPDY3); |
| next_protos.push_back(kProtoSPDY3); |
| next_protos.push_back(kProtoSPDY31); |
| next_protos.push_back(kProtoSPDY4a2); |
| SetNextProtos(next_protos); |
| } |
| |
| // static |
| void HttpStreamFactory::EnableNpnHttp2Draft04() { |
| set_use_alternate_protocols(true); |
| std::vector<NextProto> next_protos; |
| next_protos.push_back(kProtoHTTP11); |
| next_protos.push_back(kProtoQUIC1SPDY3); |
| next_protos.push_back(kProtoSPDY3); |
| next_protos.push_back(kProtoSPDY31); |
| next_protos.push_back(kProtoSPDY4a2); |
| next_protos.push_back(kProtoHTTP2Draft04); |
| SetNextProtos(next_protos); |
| } |
| |
| // static |
| void HttpStreamFactory::SetNextProtos(const std::vector<NextProto>& value) { |
| if (!next_protos_) |
| next_protos_ = new std::vector<std::string>; |
| |
| next_protos_->clear(); |
| |
| ResetEnabledProtocols(); |
| |
| // TODO(rtenneti): bug 116575 - consider combining the NextProto and |
| // AlternateProtocol. |
| for (uint32 i = 0; i < value.size(); ++i) { |
| NextProto proto = value[i]; |
| // Add the protocol to the TLS next protocol list, except for QUIC |
| // since it uses UDP. |
| if (proto != kProtoQUIC1SPDY3) { |
| next_protos_->push_back(SSLClientSocket::NextProtoToString(proto)); |
| } |
| |
| // Enable the corresponding alternate protocol, except for HTTP |
| // which has not corresponding alternative. |
| if (proto != kProtoHTTP11) { |
| AlternateProtocol alternate = AlternateProtocolFromNextProto(proto); |
| if (!IsAlternateProtocolValid(alternate)) { |
| NOTREACHED() << "Invalid next proto: " << proto; |
| continue; |
| } |
| SetProtocolEnabled(alternate); |
| } |
| } |
| } |
| |
| HttpStreamFactory::HttpStreamFactory() {} |
| |
| } // namespace net |