mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-28 16:26:10 +03:00
211 lines
7.2 KiB
C++
211 lines
7.2 KiB
C++
|
// Copyright 2018 The Chromium Authors. All rights reserved.
|
||
|
// Copyright 2018 klzgrad <kizdiv@gmail.com>. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style license that can be
|
||
|
// found in the LICENSE file.
|
||
|
|
||
|
#include "net/tools/naive/naive_proxy.h"
|
||
|
|
||
|
#include <utility>
|
||
|
|
||
|
#include "base/bind.h"
|
||
|
#include "base/location.h"
|
||
|
#include "base/logging.h"
|
||
|
#include "base/threading/thread_task_runner_handle.h"
|
||
|
#include "net/base/net_errors.h"
|
||
|
#include "net/http/http_network_session.h"
|
||
|
#include "net/proxy_resolution/proxy_config.h"
|
||
|
#include "net/proxy_resolution/proxy_info.h"
|
||
|
#include "net/proxy_resolution/proxy_list.h"
|
||
|
#include "net/proxy_resolution/proxy_resolution_service.h"
|
||
|
#include "net/socket/client_socket_pool_manager.h"
|
||
|
#include "net/socket/server_socket.h"
|
||
|
#include "net/socket/stream_socket.h"
|
||
|
#include "net/tools/naive/socks5_server_socket.h"
|
||
|
|
||
|
namespace net {
|
||
|
|
||
|
NaiveProxy::NaiveProxy(std::unique_ptr<ServerSocket> listen_socket,
|
||
|
Protocol protocol,
|
||
|
bool use_proxy,
|
||
|
HttpNetworkSession* session,
|
||
|
const NetworkTrafficAnnotationTag& traffic_annotation)
|
||
|
: listen_socket_(std::move(listen_socket)),
|
||
|
protocol_(protocol),
|
||
|
use_proxy_(use_proxy),
|
||
|
session_(session),
|
||
|
net_log_(
|
||
|
NetLogWithSource::Make(session->net_log(), NetLogSourceType::NONE)),
|
||
|
last_id_(0),
|
||
|
traffic_annotation_(traffic_annotation),
|
||
|
weak_ptr_factory_(this) {
|
||
|
DCHECK(listen_socket_);
|
||
|
// Start accepting connections in next run loop in case when delegate is not
|
||
|
// ready to get callbacks.
|
||
|
base::ThreadTaskRunnerHandle::Get()->PostTask(
|
||
|
FROM_HERE, base::BindOnce(&NaiveProxy::DoAcceptLoop,
|
||
|
weak_ptr_factory_.GetWeakPtr()));
|
||
|
}
|
||
|
|
||
|
NaiveProxy::~NaiveProxy() = default;
|
||
|
|
||
|
void NaiveProxy::DoAcceptLoop() {
|
||
|
int result;
|
||
|
do {
|
||
|
result = listen_socket_->Accept(
|
||
|
&accepted_socket_, base::BindRepeating(&NaiveProxy::OnAcceptComplete,
|
||
|
weak_ptr_factory_.GetWeakPtr()));
|
||
|
if (result == ERR_IO_PENDING)
|
||
|
return;
|
||
|
HandleAcceptResult(result);
|
||
|
} while (result == OK);
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::OnAcceptComplete(int result) {
|
||
|
HandleAcceptResult(result);
|
||
|
if (result == OK)
|
||
|
DoAcceptLoop();
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::HandleAcceptResult(int result) {
|
||
|
if (result != OK) {
|
||
|
LOG(ERROR) << "Accept error: rv=" << result;
|
||
|
return;
|
||
|
}
|
||
|
DoConnect();
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::DoConnect() {
|
||
|
std::unique_ptr<StreamSocket> socket;
|
||
|
if (protocol_ == kSocks5) {
|
||
|
socket = std::make_unique<Socks5ServerSocket>(std::move(accepted_socket_));
|
||
|
} else {
|
||
|
return;
|
||
|
}
|
||
|
auto connection_ptr = std::make_unique<NaiveConnection>(
|
||
|
++last_id_, std::move(socket), this, traffic_annotation_);
|
||
|
auto* connection = connection_ptr.get();
|
||
|
connection_by_id_[connection->id()] = std::move(connection_ptr);
|
||
|
int result = connection->Connect(
|
||
|
base::BindRepeating(&NaiveProxy::OnConnectComplete,
|
||
|
weak_ptr_factory_.GetWeakPtr(), connection->id()));
|
||
|
if (result == ERR_IO_PENDING)
|
||
|
return;
|
||
|
HandleConnectResult(connection, result);
|
||
|
}
|
||
|
|
||
|
int NaiveProxy::OnConnectServer(unsigned int connection_id,
|
||
|
const StreamSocket* client_socket,
|
||
|
ClientSocketHandle* server_socket,
|
||
|
CompletionRepeatingCallback callback) {
|
||
|
// Ignores socket limit set by socket pool for this type of socket.
|
||
|
constexpr int request_load_flags = LOAD_IGNORE_LIMITS;
|
||
|
constexpr RequestPriority request_priority = MAXIMUM_PRIORITY;
|
||
|
|
||
|
ProxyInfo proxy_info;
|
||
|
SSLConfig server_ssl_config;
|
||
|
SSLConfig proxy_ssl_config;
|
||
|
|
||
|
if (use_proxy_) {
|
||
|
const auto& proxy_config = session_->proxy_resolution_service()->config();
|
||
|
DCHECK(proxy_config);
|
||
|
const ProxyList& proxy_list =
|
||
|
proxy_config.value().value().proxy_rules().single_proxies;
|
||
|
if (proxy_list.IsEmpty())
|
||
|
return ERR_MANDATORY_PROXY_CONFIGURATION_FAILED;
|
||
|
proxy_info.UseProxyList(proxy_list);
|
||
|
proxy_info.set_traffic_annotation(
|
||
|
net::MutableNetworkTrafficAnnotationTag(traffic_annotation_));
|
||
|
|
||
|
HttpRequestInfo req_info;
|
||
|
session_->GetSSLConfig(req_info, &server_ssl_config, &proxy_ssl_config);
|
||
|
proxy_ssl_config.disable_cert_verification_network_fetches = true;
|
||
|
}
|
||
|
|
||
|
HostPortPair request_endpoint;
|
||
|
if (protocol_ == kSocks5) {
|
||
|
const auto* socket = static_cast<const Socks5ServerSocket*>(client_socket);
|
||
|
request_endpoint = socket->request_endpoint();
|
||
|
}
|
||
|
if (request_endpoint.port() == 0) {
|
||
|
LOG(ERROR) << "Connection " << connection_id << " has invalid upstream";
|
||
|
return ERR_ADDRESS_INVALID;
|
||
|
}
|
||
|
|
||
|
LOG(INFO) << "Connection " << connection_id << " to "
|
||
|
<< request_endpoint.ToString();
|
||
|
|
||
|
return InitSocketHandleForRawConnect(
|
||
|
request_endpoint, session_, request_load_flags, request_priority,
|
||
|
proxy_info, server_ssl_config, proxy_ssl_config, PRIVACY_MODE_DISABLED,
|
||
|
net_log_, server_socket, callback);
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::OnConnectComplete(int connection_id, int result) {
|
||
|
NaiveConnection* connection = FindConnection(connection_id);
|
||
|
if (!connection)
|
||
|
return;
|
||
|
HandleConnectResult(connection, result);
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::HandleConnectResult(NaiveConnection* connection, int result) {
|
||
|
if (result != OK) {
|
||
|
Close(connection->id(), result);
|
||
|
return;
|
||
|
}
|
||
|
DoRun(connection);
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::DoRun(NaiveConnection* connection) {
|
||
|
int result = connection->Run(
|
||
|
base::BindRepeating(&NaiveProxy::OnRunComplete,
|
||
|
weak_ptr_factory_.GetWeakPtr(), connection->id()));
|
||
|
if (result == ERR_IO_PENDING)
|
||
|
return;
|
||
|
HandleRunResult(connection, result);
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::OnRunComplete(int connection_id, int result) {
|
||
|
NaiveConnection* connection = FindConnection(connection_id);
|
||
|
if (!connection)
|
||
|
return;
|
||
|
HandleRunResult(connection, result);
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::HandleRunResult(NaiveConnection* connection, int result) {
|
||
|
Close(connection->id(), result);
|
||
|
}
|
||
|
|
||
|
void NaiveProxy::Close(int connection_id, int reason) {
|
||
|
auto it = connection_by_id_.find(connection_id);
|
||
|
if (it == connection_by_id_.end())
|
||
|
return;
|
||
|
|
||
|
LOG(INFO) << "Connection " << connection_id
|
||
|
<< " closed: " << ErrorToShortString(reason);
|
||
|
|
||
|
// The call stack might have callbacks which still have the pointer of
|
||
|
// connection. Instead of referencing connection with ID all the time,
|
||
|
// destroys the connection in next run loop to make sure any pending
|
||
|
// callbacks in the call stack return.
|
||
|
base::ThreadTaskRunnerHandle::Get()->DeleteSoon(FROM_HERE,
|
||
|
std::move(it->second));
|
||
|
connection_by_id_.erase(it);
|
||
|
}
|
||
|
|
||
|
NaiveConnection* NaiveProxy::FindConnection(int connection_id) {
|
||
|
auto it = connection_by_id_.find(connection_id);
|
||
|
if (it == connection_by_id_.end())
|
||
|
return nullptr;
|
||
|
return it->second.get();
|
||
|
}
|
||
|
|
||
|
// This is called after any delegate callbacks are called to check if Close()
|
||
|
// has been called during callback processing. Using the pointer of connection,
|
||
|
// |connection| is safe here because Close() deletes the connection in next run
|
||
|
// loop.
|
||
|
bool NaiveProxy::HasClosedConnection(NaiveConnection* connection) {
|
||
|
return FindConnection(connection->id()) != connection;
|
||
|
}
|
||
|
|
||
|
} // namespace net
|