mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-12-01 01:36:09 +03:00
652 lines
24 KiB
C++
652 lines
24 KiB
C++
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style license that can be
|
||
|
// found in the LICENSE file.
|
||
|
|
||
|
#include "net/url_request/url_request_context_builder.h"
|
||
|
|
||
|
#include <string>
|
||
|
#include <utility>
|
||
|
#include <vector>
|
||
|
|
||
|
#include "base/compiler_specific.h"
|
||
|
#include "base/logging.h"
|
||
|
#include "base/macros.h"
|
||
|
#include "base/message_loop/message_loop.h"
|
||
|
#include "base/single_thread_task_runner.h"
|
||
|
#include "base/strings/string_util.h"
|
||
|
#include "base/task_scheduler/post_task.h"
|
||
|
#include "net/base/cache_type.h"
|
||
|
#include "net/base/net_errors.h"
|
||
|
#include "net/base/network_delegate_impl.h"
|
||
|
#include "net/cert/cert_verifier.h"
|
||
|
#include "net/cert/ct_known_logs.h"
|
||
|
#include "net/cert/ct_log_verifier.h"
|
||
|
#include "net/cert/ct_policy_enforcer.h"
|
||
|
#include "net/cert/ct_verifier.h"
|
||
|
#include "net/cert/multi_log_ct_verifier.h"
|
||
|
#include "net/cookies/cookie_monster.h"
|
||
|
#include "net/dns/host_resolver.h"
|
||
|
#include "net/http/http_auth_handler_factory.h"
|
||
|
#include "net/http/http_cache.h"
|
||
|
#include "net/http/http_network_layer.h"
|
||
|
#include "net/http/http_server_properties_impl.h"
|
||
|
#include "net/http/http_server_properties_manager.h"
|
||
|
#include "net/http/transport_security_persister.h"
|
||
|
#include "net/http/transport_security_state.h"
|
||
|
#include "net/net_features.h"
|
||
|
#include "net/nqe/network_quality_estimator.h"
|
||
|
#include "net/quic/chromium/quic_stream_factory.h"
|
||
|
#include "net/ssl/channel_id_service.h"
|
||
|
#include "net/ssl/default_channel_id_store.h"
|
||
|
#include "net/ssl/ssl_config_service_defaults.h"
|
||
|
#include "net/url_request/data_protocol_handler.h"
|
||
|
#include "net/url_request/static_http_user_agent_settings.h"
|
||
|
#include "net/url_request/url_request_context.h"
|
||
|
#include "net/url_request/url_request_context_storage.h"
|
||
|
#include "net/url_request/url_request_intercepting_job_factory.h"
|
||
|
#include "net/url_request/url_request_interceptor.h"
|
||
|
#include "net/url_request/url_request_job_factory_impl.h"
|
||
|
#include "net/url_request/url_request_throttler_manager.h"
|
||
|
#include "url/url_constants.h"
|
||
|
|
||
|
#if !BUILDFLAG(DISABLE_FILE_SUPPORT)
|
||
|
#include "net/url_request/file_protocol_handler.h" // nogncheck
|
||
|
#endif
|
||
|
|
||
|
#if !BUILDFLAG(DISABLE_FTP_SUPPORT)
|
||
|
#include "net/ftp/ftp_network_layer.h" // nogncheck
|
||
|
#include "net/url_request/ftp_protocol_handler.h" // nogncheck
|
||
|
#endif
|
||
|
|
||
|
#if BUILDFLAG(ENABLE_REPORTING)
|
||
|
#include "net/reporting/reporting_policy.h"
|
||
|
#include "net/reporting/reporting_service.h"
|
||
|
#endif // BUILDFLAG(ENABLE_REPORTING)
|
||
|
|
||
|
namespace net {
|
||
|
|
||
|
namespace {
|
||
|
|
||
|
class BasicNetworkDelegate : public NetworkDelegateImpl {
|
||
|
public:
|
||
|
BasicNetworkDelegate() {}
|
||
|
~BasicNetworkDelegate() override {}
|
||
|
|
||
|
private:
|
||
|
int OnBeforeURLRequest(URLRequest* request,
|
||
|
const CompletionCallback& callback,
|
||
|
GURL* new_url) override {
|
||
|
return OK;
|
||
|
}
|
||
|
|
||
|
int OnBeforeStartTransaction(URLRequest* request,
|
||
|
const CompletionCallback& callback,
|
||
|
HttpRequestHeaders* headers) override {
|
||
|
return OK;
|
||
|
}
|
||
|
|
||
|
void OnStartTransaction(URLRequest* request,
|
||
|
const HttpRequestHeaders& headers) override {}
|
||
|
|
||
|
int OnHeadersReceived(
|
||
|
URLRequest* request,
|
||
|
const CompletionCallback& callback,
|
||
|
const HttpResponseHeaders* original_response_headers,
|
||
|
scoped_refptr<HttpResponseHeaders>* override_response_headers,
|
||
|
GURL* allowed_unsafe_redirect_url) override {
|
||
|
return OK;
|
||
|
}
|
||
|
|
||
|
void OnBeforeRedirect(URLRequest* request,
|
||
|
const GURL& new_location) override {}
|
||
|
|
||
|
void OnResponseStarted(URLRequest* request, int net_error) override {}
|
||
|
|
||
|
void OnCompleted(URLRequest* request, bool started, int net_error) override {}
|
||
|
|
||
|
void OnURLRequestDestroyed(URLRequest* request) override {}
|
||
|
|
||
|
void OnPACScriptError(int line_number, const base::string16& error) override {
|
||
|
}
|
||
|
|
||
|
NetworkDelegate::AuthRequiredResponse OnAuthRequired(
|
||
|
URLRequest* request,
|
||
|
const AuthChallengeInfo& auth_info,
|
||
|
const AuthCallback& callback,
|
||
|
AuthCredentials* credentials) override {
|
||
|
return NetworkDelegate::AUTH_REQUIRED_RESPONSE_NO_ACTION;
|
||
|
}
|
||
|
|
||
|
bool OnCanGetCookies(const URLRequest& request,
|
||
|
const CookieList& cookie_list) override {
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool OnCanSetCookie(const URLRequest& request,
|
||
|
const std::string& cookie_line,
|
||
|
CookieOptions* options) override {
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
bool OnCanAccessFile(const URLRequest& request,
|
||
|
const base::FilePath& original_path,
|
||
|
const base::FilePath& absolute_path) const override {
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
DISALLOW_COPY_AND_ASSIGN(BasicNetworkDelegate);
|
||
|
};
|
||
|
|
||
|
// A URLRequestContext subclass that owns most of its components
|
||
|
// via a UrlRequestContextStorage object. When URLRequestContextBuilder::Build()
|
||
|
// is called, ownership of all URLRequestContext components is passed to the
|
||
|
// ContainerURLRequestContext. Since this cancels requests in its destructor,
|
||
|
// it's not safe to subclass this.
|
||
|
class ContainerURLRequestContext final : public URLRequestContext {
|
||
|
public:
|
||
|
ContainerURLRequestContext() : storage_(this) {}
|
||
|
|
||
|
~ContainerURLRequestContext() override {
|
||
|
#if BUILDFLAG(ENABLE_REPORTING)
|
||
|
// Destroy the ReportingService before the rest of the URLRequestContext, so
|
||
|
// it cancels any pending requests it may have.
|
||
|
storage_.set_reporting_service(nullptr);
|
||
|
#endif // BUILDFLAG(ENABLE_REPORTING)
|
||
|
|
||
|
// Shut down the ProxyService, as it may have pending URLRequests using this
|
||
|
// context. Since this cancels requests, it's not safe to subclass this, as
|
||
|
// some parts of the URLRequestContext may then be torn down before this
|
||
|
// cancels the ProxyService's URLRequests.
|
||
|
proxy_service()->OnShutdown();
|
||
|
|
||
|
AssertNoURLRequests();
|
||
|
}
|
||
|
|
||
|
URLRequestContextStorage* storage() {
|
||
|
return &storage_;
|
||
|
}
|
||
|
|
||
|
void set_transport_security_persister(
|
||
|
std::unique_ptr<TransportSecurityPersister>
|
||
|
transport_security_persister) {
|
||
|
transport_security_persister_ = std::move(transport_security_persister);
|
||
|
}
|
||
|
|
||
|
private:
|
||
|
URLRequestContextStorage storage_;
|
||
|
std::unique_ptr<TransportSecurityPersister> transport_security_persister_;
|
||
|
|
||
|
DISALLOW_COPY_AND_ASSIGN(ContainerURLRequestContext);
|
||
|
};
|
||
|
|
||
|
} // namespace
|
||
|
|
||
|
URLRequestContextBuilder::HttpCacheParams::HttpCacheParams()
|
||
|
: type(IN_MEMORY),
|
||
|
max_size(0) {}
|
||
|
URLRequestContextBuilder::HttpCacheParams::~HttpCacheParams() {}
|
||
|
|
||
|
URLRequestContextBuilder::URLRequestContextBuilder()
|
||
|
: enable_brotli_(false),
|
||
|
network_quality_estimator_(nullptr),
|
||
|
shared_http_user_agent_settings_(nullptr),
|
||
|
data_enabled_(false),
|
||
|
#if !BUILDFLAG(DISABLE_FILE_SUPPORT)
|
||
|
file_enabled_(false),
|
||
|
#endif
|
||
|
#if !BUILDFLAG(DISABLE_FTP_SUPPORT)
|
||
|
ftp_enabled_(false),
|
||
|
#endif
|
||
|
http_cache_enabled_(true),
|
||
|
throttling_enabled_(false),
|
||
|
cookie_store_set_by_client_(false),
|
||
|
transport_security_persister_readonly_(false),
|
||
|
net_log_(nullptr),
|
||
|
shared_host_resolver_(nullptr),
|
||
|
pac_quick_check_enabled_(true),
|
||
|
pac_sanitize_url_policy_(ProxyService::SanitizeUrlPolicy::SAFE),
|
||
|
shared_proxy_delegate_(nullptr),
|
||
|
shared_http_auth_handler_factory_(nullptr),
|
||
|
shared_cert_verifier_(nullptr) {
|
||
|
}
|
||
|
|
||
|
URLRequestContextBuilder::~URLRequestContextBuilder() {}
|
||
|
|
||
|
void URLRequestContextBuilder::SetHttpNetworkSessionComponents(
|
||
|
const URLRequestContext* request_context,
|
||
|
HttpNetworkSession::Context* session_context) {
|
||
|
session_context->host_resolver = request_context->host_resolver();
|
||
|
session_context->cert_verifier = request_context->cert_verifier();
|
||
|
session_context->transport_security_state =
|
||
|
request_context->transport_security_state();
|
||
|
session_context->cert_transparency_verifier =
|
||
|
request_context->cert_transparency_verifier();
|
||
|
session_context->ct_policy_enforcer = request_context->ct_policy_enforcer();
|
||
|
session_context->proxy_service = request_context->proxy_service();
|
||
|
session_context->ssl_config_service = request_context->ssl_config_service();
|
||
|
session_context->http_auth_handler_factory =
|
||
|
request_context->http_auth_handler_factory();
|
||
|
session_context->http_server_properties =
|
||
|
request_context->http_server_properties();
|
||
|
session_context->net_log = request_context->net_log();
|
||
|
session_context->channel_id_service = request_context->channel_id_service();
|
||
|
session_context->network_quality_provider =
|
||
|
request_context->network_quality_estimator();
|
||
|
if (request_context->network_quality_estimator()) {
|
||
|
session_context->socket_performance_watcher_factory =
|
||
|
request_context->network_quality_estimator()
|
||
|
->GetSocketPerformanceWatcherFactory();
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_accept_language(
|
||
|
const std::string& accept_language) {
|
||
|
DCHECK(!shared_http_user_agent_settings_);
|
||
|
accept_language_ = accept_language;
|
||
|
}
|
||
|
void URLRequestContextBuilder::set_user_agent(const std::string& user_agent) {
|
||
|
DCHECK(!shared_http_user_agent_settings_);
|
||
|
user_agent_ = user_agent;
|
||
|
}
|
||
|
void URLRequestContextBuilder::set_shared_http_user_agent_settings(
|
||
|
HttpUserAgentSettings* shared_http_user_agent_settings) {
|
||
|
DCHECK(accept_language_.empty());
|
||
|
DCHECK(user_agent_.empty());
|
||
|
shared_http_user_agent_settings_ = shared_http_user_agent_settings;
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::EnableHttpCache(const HttpCacheParams& params) {
|
||
|
http_cache_enabled_ = true;
|
||
|
http_cache_params_ = params;
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::DisableHttpCache() {
|
||
|
http_cache_enabled_ = false;
|
||
|
http_cache_params_ = HttpCacheParams();
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::SetSpdyAndQuicEnabled(bool spdy_enabled,
|
||
|
bool quic_enabled) {
|
||
|
http_network_session_params_.enable_http2 = spdy_enabled;
|
||
|
http_network_session_params_.enable_quic = quic_enabled;
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_ct_verifier(
|
||
|
std::unique_ptr<CTVerifier> ct_verifier) {
|
||
|
ct_verifier_ = std::move(ct_verifier);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_ct_policy_enforcer(
|
||
|
std::unique_ptr<CTPolicyEnforcer> ct_policy_enforcer) {
|
||
|
ct_policy_enforcer_ = std::move(ct_policy_enforcer);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::SetCertVerifier(
|
||
|
std::unique_ptr<CertVerifier> cert_verifier) {
|
||
|
DCHECK(!shared_cert_verifier_);
|
||
|
cert_verifier_ = std::move(cert_verifier);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_shared_cert_verifier(
|
||
|
CertVerifier* shared_cert_verifier) {
|
||
|
DCHECK(!cert_verifier_);
|
||
|
shared_cert_verifier_ = shared_cert_verifier;
|
||
|
}
|
||
|
|
||
|
#if BUILDFLAG(ENABLE_REPORTING)
|
||
|
void URLRequestContextBuilder::set_reporting_policy(
|
||
|
std::unique_ptr<net::ReportingPolicy> reporting_policy) {
|
||
|
reporting_policy_ = std::move(reporting_policy);
|
||
|
}
|
||
|
#endif // BUILDFLAG(ENABLE_REPORTING)
|
||
|
|
||
|
void URLRequestContextBuilder::SetInterceptors(
|
||
|
std::vector<std::unique_ptr<URLRequestInterceptor>>
|
||
|
url_request_interceptors) {
|
||
|
url_request_interceptors_ = std::move(url_request_interceptors);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_create_intercepting_job_factory(
|
||
|
CreateInterceptingJobFactory create_intercepting_job_factory) {
|
||
|
DCHECK(!create_intercepting_job_factory_);
|
||
|
create_intercepting_job_factory_ = std::move(create_intercepting_job_factory);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::SetCookieAndChannelIdStores(
|
||
|
std::unique_ptr<CookieStore> cookie_store,
|
||
|
std::unique_ptr<ChannelIDService> channel_id_service) {
|
||
|
cookie_store_set_by_client_ = true;
|
||
|
// If |cookie_store| is NULL, |channel_id_service| must be NULL too.
|
||
|
DCHECK(cookie_store || !channel_id_service);
|
||
|
cookie_store_ = std::move(cookie_store);
|
||
|
channel_id_service_ = std::move(channel_id_service);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::SetProtocolHandler(
|
||
|
const std::string& scheme,
|
||
|
std::unique_ptr<URLRequestJobFactory::ProtocolHandler> protocol_handler) {
|
||
|
DCHECK(protocol_handler);
|
||
|
// If a consumer sets a ProtocolHandler and then overwrites it with another,
|
||
|
// it's probably a bug.
|
||
|
DCHECK_EQ(0u, protocol_handlers_.count(scheme));
|
||
|
protocol_handlers_[scheme] = std::move(protocol_handler);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_host_resolver(
|
||
|
std::unique_ptr<HostResolver> host_resolver) {
|
||
|
DCHECK(!shared_host_resolver_);
|
||
|
host_resolver_ = std::move(host_resolver);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_shared_host_resolver(
|
||
|
HostResolver* shared_host_resolver) {
|
||
|
DCHECK(!host_resolver_);
|
||
|
shared_host_resolver_ = shared_host_resolver;
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_proxy_delegate(
|
||
|
std::unique_ptr<ProxyDelegate> proxy_delegate) {
|
||
|
DCHECK(!shared_proxy_delegate_);
|
||
|
proxy_delegate_ = std::move(proxy_delegate);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_shared_proxy_delegate(
|
||
|
ProxyDelegate* shared_proxy_delegate) {
|
||
|
DCHECK(!proxy_delegate_);
|
||
|
shared_proxy_delegate_ = shared_proxy_delegate;
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::SetHttpAuthHandlerFactory(
|
||
|
std::unique_ptr<HttpAuthHandlerFactory> factory) {
|
||
|
DCHECK(!shared_http_auth_handler_factory_);
|
||
|
http_auth_handler_factory_ = std::move(factory);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::set_shared_http_auth_handler_factory(
|
||
|
HttpAuthHandlerFactory* shared_http_auth_handler_factory) {
|
||
|
DCHECK(!http_auth_handler_factory_);
|
||
|
shared_http_auth_handler_factory_ = shared_http_auth_handler_factory;
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::SetHttpServerProperties(
|
||
|
std::unique_ptr<HttpServerProperties> http_server_properties) {
|
||
|
http_server_properties_ = std::move(http_server_properties);
|
||
|
}
|
||
|
|
||
|
void URLRequestContextBuilder::SetCreateHttpTransactionFactoryCallback(
|
||
|
CreateHttpTransactionFactoryCallback
|
||
|
create_http_network_transaction_factory) {
|
||
|
create_http_network_transaction_factory_ =
|
||
|
std::move(create_http_network_transaction_factory);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<URLRequestContext> URLRequestContextBuilder::Build() {
|
||
|
std::unique_ptr<ContainerURLRequestContext> context(
|
||
|
new ContainerURLRequestContext());
|
||
|
URLRequestContextStorage* storage = context->storage();
|
||
|
|
||
|
if (!name_.empty())
|
||
|
context->set_name(name_);
|
||
|
context->set_enable_brotli(enable_brotli_);
|
||
|
context->set_network_quality_estimator(network_quality_estimator_);
|
||
|
|
||
|
if (shared_http_user_agent_settings_) {
|
||
|
context->set_http_user_agent_settings(shared_http_user_agent_settings_);
|
||
|
} else {
|
||
|
storage->set_http_user_agent_settings(
|
||
|
std::make_unique<StaticHttpUserAgentSettings>(accept_language_,
|
||
|
user_agent_));
|
||
|
}
|
||
|
|
||
|
if (!network_delegate_)
|
||
|
network_delegate_.reset(new BasicNetworkDelegate);
|
||
|
storage->set_network_delegate(std::move(network_delegate_));
|
||
|
|
||
|
if (net_log_) {
|
||
|
// Unlike the other builder parameters, |net_log_| is not owned by the
|
||
|
// builder or resulting context.
|
||
|
context->set_net_log(net_log_);
|
||
|
} else {
|
||
|
storage->set_net_log(std::make_unique<NetLog>());
|
||
|
}
|
||
|
|
||
|
if (host_resolver_) {
|
||
|
DCHECK(!shared_host_resolver_);
|
||
|
storage->set_host_resolver(std::move(host_resolver_));
|
||
|
} else if (shared_host_resolver_) {
|
||
|
context->set_host_resolver(shared_host_resolver_);
|
||
|
} else {
|
||
|
storage->set_host_resolver(
|
||
|
HostResolver::CreateDefaultResolver(context->net_log()));
|
||
|
}
|
||
|
|
||
|
if (ssl_config_service_) {
|
||
|
// This takes a raw pointer, but |storage| will hold onto a reference to the
|
||
|
// service.
|
||
|
storage->set_ssl_config_service(ssl_config_service_.get());
|
||
|
} else {
|
||
|
storage->set_ssl_config_service(new SSLConfigServiceDefaults);
|
||
|
}
|
||
|
|
||
|
if (http_auth_handler_factory_) {
|
||
|
DCHECK(!shared_http_auth_handler_factory_);
|
||
|
storage->set_http_auth_handler_factory(
|
||
|
std::move(http_auth_handler_factory_));
|
||
|
} else if (shared_http_auth_handler_factory_) {
|
||
|
context->set_http_auth_handler_factory(shared_http_auth_handler_factory_);
|
||
|
} else {
|
||
|
storage->set_http_auth_handler_factory(
|
||
|
HttpAuthHandlerRegistryFactory::CreateDefault(
|
||
|
context->host_resolver()));
|
||
|
}
|
||
|
|
||
|
if (cookie_store_set_by_client_) {
|
||
|
storage->set_cookie_store(std::move(cookie_store_));
|
||
|
storage->set_channel_id_service(std::move(channel_id_service_));
|
||
|
} else {
|
||
|
std::unique_ptr<CookieStore> cookie_store(new CookieMonster(nullptr));
|
||
|
std::unique_ptr<ChannelIDService> channel_id_service(
|
||
|
new ChannelIDService(new DefaultChannelIDStore(NULL)));
|
||
|
cookie_store->SetChannelIDServiceID(channel_id_service->GetUniqueID());
|
||
|
storage->set_cookie_store(std::move(cookie_store));
|
||
|
storage->set_channel_id_service(std::move(channel_id_service));
|
||
|
}
|
||
|
|
||
|
storage->set_transport_security_state(
|
||
|
std::make_unique<TransportSecurityState>());
|
||
|
if (!transport_security_persister_path_.empty()) {
|
||
|
// Use a low priority because saving this should not block anything
|
||
|
// user-visible. Block shutdown to ensure it does get persisted to disk,
|
||
|
// since it contains security-relevant information.
|
||
|
scoped_refptr<base::SequencedTaskRunner> task_runner(
|
||
|
base::CreateSequencedTaskRunnerWithTraits(
|
||
|
{base::MayBlock(), base::TaskPriority::BACKGROUND,
|
||
|
base::TaskShutdownBehavior::BLOCK_SHUTDOWN}));
|
||
|
|
||
|
context->set_transport_security_persister(
|
||
|
std::make_unique<TransportSecurityPersister>(
|
||
|
context->transport_security_state(),
|
||
|
transport_security_persister_path_, task_runner,
|
||
|
transport_security_persister_readonly_));
|
||
|
}
|
||
|
|
||
|
if (http_server_properties_) {
|
||
|
storage->set_http_server_properties(std::move(http_server_properties_));
|
||
|
} else {
|
||
|
storage->set_http_server_properties(
|
||
|
std::unique_ptr<HttpServerProperties>(new HttpServerPropertiesImpl()));
|
||
|
}
|
||
|
|
||
|
if (cert_verifier_) {
|
||
|
DCHECK(!shared_cert_verifier_);
|
||
|
storage->set_cert_verifier(std::move(cert_verifier_));
|
||
|
} else if (shared_cert_verifier_) {
|
||
|
context->set_cert_verifier(shared_cert_verifier_);
|
||
|
} else {
|
||
|
storage->set_cert_verifier(CertVerifier::CreateDefault());
|
||
|
}
|
||
|
|
||
|
if (ct_verifier_) {
|
||
|
storage->set_cert_transparency_verifier(std::move(ct_verifier_));
|
||
|
} else {
|
||
|
std::unique_ptr<MultiLogCTVerifier> ct_verifier =
|
||
|
std::make_unique<MultiLogCTVerifier>();
|
||
|
ct_verifier->AddLogs(ct::CreateLogVerifiersForKnownLogs());
|
||
|
storage->set_cert_transparency_verifier(std::move(ct_verifier));
|
||
|
}
|
||
|
if (ct_policy_enforcer_) {
|
||
|
storage->set_ct_policy_enforcer(std::move(ct_policy_enforcer_));
|
||
|
} else {
|
||
|
storage->set_ct_policy_enforcer(std::make_unique<CTPolicyEnforcer>());
|
||
|
}
|
||
|
|
||
|
if (throttling_enabled_) {
|
||
|
storage->set_throttler_manager(
|
||
|
std::make_unique<URLRequestThrottlerManager>());
|
||
|
}
|
||
|
|
||
|
if (!proxy_service_) {
|
||
|
#if !defined(OS_LINUX) && !defined(OS_ANDROID)
|
||
|
// TODO(willchan): Switch to using this code when
|
||
|
// ProxyService::CreateSystemProxyConfigService()'s signature doesn't suck.
|
||
|
if (!proxy_config_service_) {
|
||
|
proxy_config_service_ = ProxyService::CreateSystemProxyConfigService(
|
||
|
base::ThreadTaskRunnerHandle::Get().get());
|
||
|
}
|
||
|
#endif // !defined(OS_LINUX) && !defined(OS_ANDROID)
|
||
|
proxy_service_ =
|
||
|
CreateProxyService(std::move(proxy_config_service_), context.get(),
|
||
|
context->host_resolver(),
|
||
|
context->network_delegate(), context->net_log());
|
||
|
proxy_service_->set_quick_check_enabled(pac_quick_check_enabled_);
|
||
|
proxy_service_->set_sanitize_url_policy(pac_sanitize_url_policy_);
|
||
|
}
|
||
|
storage->set_proxy_service(std::move(proxy_service_));
|
||
|
|
||
|
HttpNetworkSession::Context network_session_context;
|
||
|
SetHttpNetworkSessionComponents(context.get(), &network_session_context);
|
||
|
|
||
|
if (proxy_delegate_) {
|
||
|
DCHECK(!shared_proxy_delegate_);
|
||
|
network_session_context.proxy_delegate = proxy_delegate_.get();
|
||
|
storage->set_proxy_delegate(std::move(proxy_delegate_));
|
||
|
} else if (shared_proxy_delegate_) {
|
||
|
network_session_context.proxy_delegate = shared_proxy_delegate_;
|
||
|
}
|
||
|
|
||
|
storage->set_http_network_session(std::make_unique<HttpNetworkSession>(
|
||
|
http_network_session_params_, network_session_context));
|
||
|
|
||
|
std::unique_ptr<HttpTransactionFactory> http_transaction_factory;
|
||
|
if (!create_http_network_transaction_factory_.is_null()) {
|
||
|
http_transaction_factory =
|
||
|
std::move(create_http_network_transaction_factory_)
|
||
|
.Run(storage->http_network_session());
|
||
|
} else {
|
||
|
http_transaction_factory =
|
||
|
std::make_unique<HttpNetworkLayer>(storage->http_network_session());
|
||
|
}
|
||
|
|
||
|
if (http_cache_enabled_) {
|
||
|
std::unique_ptr<HttpCache::BackendFactory> http_cache_backend;
|
||
|
if (http_cache_params_.type != HttpCacheParams::IN_MEMORY) {
|
||
|
// TODO(mmenke): Maybe merge BackendType and HttpCacheParams::Type? The
|
||
|
// first doesn't include in memory, so may require some work.
|
||
|
BackendType backend_type = CACHE_BACKEND_DEFAULT;
|
||
|
switch (http_cache_params_.type) {
|
||
|
case HttpCacheParams::DISK:
|
||
|
backend_type = CACHE_BACKEND_DEFAULT;
|
||
|
break;
|
||
|
case HttpCacheParams::DISK_BLOCKFILE:
|
||
|
backend_type = CACHE_BACKEND_BLOCKFILE;
|
||
|
break;
|
||
|
case HttpCacheParams::DISK_SIMPLE:
|
||
|
backend_type = CACHE_BACKEND_SIMPLE;
|
||
|
break;
|
||
|
case HttpCacheParams::IN_MEMORY:
|
||
|
NOTREACHED();
|
||
|
break;
|
||
|
}
|
||
|
http_cache_backend.reset(new HttpCache::DefaultBackend(
|
||
|
DISK_CACHE, backend_type, http_cache_params_.path,
|
||
|
http_cache_params_.max_size));
|
||
|
} else {
|
||
|
http_cache_backend =
|
||
|
HttpCache::DefaultBackend::InMemory(http_cache_params_.max_size);
|
||
|
}
|
||
|
|
||
|
http_transaction_factory.reset(
|
||
|
new HttpCache(std::move(http_transaction_factory),
|
||
|
std::move(http_cache_backend), true));
|
||
|
}
|
||
|
storage->set_http_transaction_factory(std::move(http_transaction_factory));
|
||
|
|
||
|
URLRequestJobFactoryImpl* job_factory = new URLRequestJobFactoryImpl;
|
||
|
// Adds caller-provided protocol handlers first so that these handlers are
|
||
|
// used over data/file/ftp handlers below.
|
||
|
for (auto& scheme_handler : protocol_handlers_) {
|
||
|
job_factory->SetProtocolHandler(scheme_handler.first,
|
||
|
std::move(scheme_handler.second));
|
||
|
}
|
||
|
protocol_handlers_.clear();
|
||
|
|
||
|
if (data_enabled_)
|
||
|
job_factory->SetProtocolHandler(url::kDataScheme,
|
||
|
std::make_unique<DataProtocolHandler>());
|
||
|
|
||
|
#if !BUILDFLAG(DISABLE_FILE_SUPPORT)
|
||
|
if (file_enabled_) {
|
||
|
job_factory->SetProtocolHandler(
|
||
|
url::kFileScheme,
|
||
|
std::make_unique<FileProtocolHandler>(base::CreateTaskRunnerWithTraits(
|
||
|
{base::MayBlock(), base::TaskPriority::USER_BLOCKING,
|
||
|
base::TaskShutdownBehavior::SKIP_ON_SHUTDOWN})));
|
||
|
}
|
||
|
#endif // !BUILDFLAG(DISABLE_FILE_SUPPORT)
|
||
|
|
||
|
#if !BUILDFLAG(DISABLE_FTP_SUPPORT)
|
||
|
if (ftp_enabled_) {
|
||
|
job_factory->SetProtocolHandler(
|
||
|
url::kFtpScheme, FtpProtocolHandler::Create(context->host_resolver()));
|
||
|
}
|
||
|
#endif // !BUILDFLAG(DISABLE_FTP_SUPPORT)
|
||
|
|
||
|
std::unique_ptr<net::URLRequestJobFactory> top_job_factory(job_factory);
|
||
|
if (!url_request_interceptors_.empty()) {
|
||
|
// Set up interceptors in the reverse order.
|
||
|
|
||
|
for (auto i = url_request_interceptors_.rbegin();
|
||
|
i != url_request_interceptors_.rend(); ++i) {
|
||
|
top_job_factory.reset(new net::URLRequestInterceptingJobFactory(
|
||
|
std::move(top_job_factory), std::move(*i)));
|
||
|
}
|
||
|
url_request_interceptors_.clear();
|
||
|
}
|
||
|
if (create_intercepting_job_factory_) {
|
||
|
top_job_factory = std::move(create_intercepting_job_factory_)
|
||
|
.Run(std::move(top_job_factory));
|
||
|
}
|
||
|
storage->set_job_factory(std::move(top_job_factory));
|
||
|
|
||
|
#if BUILDFLAG(ENABLE_REPORTING)
|
||
|
if (reporting_policy_) {
|
||
|
storage->set_reporting_service(
|
||
|
ReportingService::Create(*reporting_policy_, context.get()));
|
||
|
}
|
||
|
#endif // BUILDFLAG(ENABLE_REPORTING)
|
||
|
|
||
|
return std::move(context);
|
||
|
}
|
||
|
|
||
|
std::unique_ptr<ProxyService> URLRequestContextBuilder::CreateProxyService(
|
||
|
std::unique_ptr<ProxyConfigService> proxy_config_service,
|
||
|
URLRequestContext* url_request_context,
|
||
|
HostResolver* host_resolver,
|
||
|
NetworkDelegate* network_delegate,
|
||
|
NetLog* net_log) {
|
||
|
return ProxyService::CreateUsingSystemProxyResolver(
|
||
|
std::move(proxy_config_service), net_log);
|
||
|
}
|
||
|
|
||
|
} // namespace net
|