mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-12-01 01:36:09 +03:00
1753 lines
66 KiB
C++
1753 lines
66 KiB
C++
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "net/quic/quic_stream_factory.h"
|
|
|
|
#include <algorithm>
|
|
#include <memory>
|
|
#include <tuple>
|
|
#include <utility>
|
|
|
|
#include "base/callback_helpers.h"
|
|
#include "base/location.h"
|
|
#include "base/metrics/field_trial.h"
|
|
#include "base/metrics/histogram_functions.h"
|
|
#include "base/metrics/histogram_macros.h"
|
|
#include "base/single_thread_task_runner.h"
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "base/strings/stringprintf.h"
|
|
#include "base/threading/thread_task_runner_handle.h"
|
|
#include "base/trace_event/memory_allocator_dump.h"
|
|
#include "base/trace_event/memory_usage_estimator.h"
|
|
#include "base/trace_event/process_memory_dump.h"
|
|
#include "base/trace_event/trace_event.h"
|
|
#include "base/values.h"
|
|
#include "crypto/openssl_util.h"
|
|
#include "net/base/ip_address.h"
|
|
#include "net/base/net_errors.h"
|
|
#include "net/base/trace_constants.h"
|
|
#include "net/cert/cert_verifier.h"
|
|
#include "net/cert/ct_verifier.h"
|
|
#include "net/dns/host_resolver.h"
|
|
#include "net/log/net_log.h"
|
|
#include "net/log/net_log_capture_mode.h"
|
|
#include "net/log/net_log_event_type.h"
|
|
#include "net/log/net_log_source_type.h"
|
|
#include "net/quic/crypto/channel_id_chromium.h"
|
|
#include "net/quic/crypto/proof_verifier_chromium.h"
|
|
#include "net/quic/properties_based_quic_server_info.h"
|
|
#include "net/quic/quic_chromium_alarm_factory.h"
|
|
#include "net/quic/quic_chromium_connection_helper.h"
|
|
#include "net/quic/quic_chromium_packet_reader.h"
|
|
#include "net/quic/quic_chromium_packet_writer.h"
|
|
#include "net/quic/quic_crypto_client_stream_factory.h"
|
|
#include "net/quic/quic_http_stream.h"
|
|
#include "net/quic/quic_server_info.h"
|
|
#include "net/socket/client_socket_factory.h"
|
|
#include "net/socket/next_proto.h"
|
|
#include "net/socket/socket_performance_watcher.h"
|
|
#include "net/socket/socket_performance_watcher_factory.h"
|
|
#include "net/socket/udp_client_socket.h"
|
|
#include "net/ssl/token_binding.h"
|
|
#include "net/third_party/quic/core/crypto/proof_verifier.h"
|
|
#include "net/third_party/quic/core/crypto/quic_random.h"
|
|
#include "net/third_party/quic/core/http/quic_client_promised_info.h"
|
|
#include "net/third_party/quic/core/quic_connection.h"
|
|
#include "net/third_party/quic/core/tls_client_handshaker.h"
|
|
#include "net/third_party/quic/platform/api/quic_clock.h"
|
|
#include "net/third_party/quic/platform/api/quic_flags.h"
|
|
#include "third_party/boringssl/src/include/openssl/aead.h"
|
|
#include "url/gurl.h"
|
|
#include "url/url_constants.h"
|
|
|
|
using NetworkHandle = net::NetworkChangeNotifier::NetworkHandle;
|
|
|
|
namespace net {
|
|
|
|
// Returns the estimate of dynamically allocated memory of an IPEndPoint in
|
|
// bytes. Used in tracking IPAliasMap.
|
|
size_t EstimateMemoryUsage(const IPEndPoint& end_point) {
|
|
return 0;
|
|
}
|
|
|
|
namespace {
|
|
|
|
enum CreateSessionFailure {
|
|
CREATION_ERROR_CONNECTING_SOCKET,
|
|
CREATION_ERROR_SETTING_RECEIVE_BUFFER,
|
|
CREATION_ERROR_SETTING_SEND_BUFFER,
|
|
CREATION_ERROR_SETTING_DO_NOT_FRAGMENT,
|
|
CREATION_ERROR_MAX
|
|
};
|
|
|
|
enum InitialRttEstimateSource {
|
|
INITIAL_RTT_DEFAULT,
|
|
INITIAL_RTT_CACHED,
|
|
INITIAL_RTT_2G,
|
|
INITIAL_RTT_3G,
|
|
INITIAL_RTT_SOURCE_MAX,
|
|
};
|
|
|
|
// The maximum receive window sizes for QUIC sessions and streams.
|
|
const int32_t kQuicSessionMaxRecvWindowSize = 15 * 1024 * 1024; // 15 MB
|
|
const int32_t kQuicStreamMaxRecvWindowSize = 6 * 1024 * 1024; // 6 MB
|
|
|
|
// QUIC's socket receive buffer size.
|
|
// We should adaptively set this buffer size, but for now, we'll use a size
|
|
// that seems large enough to receive data at line rate for most connections,
|
|
// and does not consume "too much" memory.
|
|
const int32_t kQuicSocketReceiveBufferSize = 1024 * 1024; // 1MB
|
|
|
|
// Set the maximum number of undecryptable packets the connection will store.
|
|
const int32_t kMaxUndecryptablePackets = 100;
|
|
|
|
std::unique_ptr<base::Value> NetLogQuicStreamFactoryJobCallback(
|
|
const quic::QuicServerId* server_id,
|
|
NetLogCaptureMode capture_mode) {
|
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
|
dict->SetString(
|
|
"server_id",
|
|
"https://" +
|
|
HostPortPair(server_id->host(), server_id->port()).ToString() +
|
|
(server_id->privacy_mode_enabled() ? "/private" : ""));
|
|
return std::move(dict);
|
|
}
|
|
|
|
std::unique_ptr<base::Value> NetLogQuicConnectionMigrationTriggerCallback(
|
|
std::string trigger,
|
|
NetLogCaptureMode capture_mode) {
|
|
std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue());
|
|
dict->SetString("trigger", trigger);
|
|
return std::move(dict);
|
|
}
|
|
|
|
// Helper class that is used to log a connection migration event.
|
|
class ScopedConnectionMigrationEventLog {
|
|
public:
|
|
ScopedConnectionMigrationEventLog(NetLog* net_log, std::string trigger)
|
|
: net_log_(NetLogWithSource::Make(
|
|
net_log,
|
|
NetLogSourceType::QUIC_CONNECTION_MIGRATION)) {
|
|
net_log_.BeginEvent(
|
|
NetLogEventType::QUIC_CONNECTION_MIGRATION_TRIGGERED,
|
|
base::Bind(&NetLogQuicConnectionMigrationTriggerCallback, trigger));
|
|
}
|
|
|
|
~ScopedConnectionMigrationEventLog() {
|
|
net_log_.EndEvent(NetLogEventType::QUIC_CONNECTION_MIGRATION_TRIGGERED);
|
|
}
|
|
|
|
const NetLogWithSource& net_log() { return net_log_; }
|
|
|
|
private:
|
|
const NetLogWithSource net_log_;
|
|
};
|
|
|
|
void HistogramCreateSessionFailure(enum CreateSessionFailure error) {
|
|
UMA_HISTOGRAM_ENUMERATION("Net.QuicSession.CreationError", error,
|
|
CREATION_ERROR_MAX);
|
|
}
|
|
|
|
void LogPlatformNotificationInHistogram(
|
|
enum QuicPlatformNotification notification) {
|
|
UMA_HISTOGRAM_ENUMERATION("Net.QuicSession.PlatformNotification",
|
|
notification, NETWORK_NOTIFICATION_MAX);
|
|
}
|
|
|
|
void SetInitialRttEstimate(base::TimeDelta estimate,
|
|
enum InitialRttEstimateSource source,
|
|
quic::QuicConfig* config) {
|
|
UMA_HISTOGRAM_ENUMERATION("Net.QuicSession.InitialRttEsitmateSource", source,
|
|
INITIAL_RTT_SOURCE_MAX);
|
|
if (estimate != base::TimeDelta())
|
|
config->SetInitialRoundTripTimeUsToSend(estimate.InMicroseconds());
|
|
}
|
|
|
|
quic::QuicConfig InitializeQuicConfig(
|
|
const quic::QuicTagVector& connection_options,
|
|
const quic::QuicTagVector& client_connection_options,
|
|
int idle_connection_timeout_seconds,
|
|
int max_time_before_crypto_handshake_seconds,
|
|
int max_idle_time_before_crypto_handshake_seconds) {
|
|
DCHECK_GT(idle_connection_timeout_seconds, 0);
|
|
quic::QuicConfig config;
|
|
config.SetIdleNetworkTimeout(
|
|
quic::QuicTime::Delta::FromSeconds(idle_connection_timeout_seconds),
|
|
quic::QuicTime::Delta::FromSeconds(idle_connection_timeout_seconds));
|
|
config.set_max_time_before_crypto_handshake(
|
|
quic::QuicTime::Delta::FromSeconds(
|
|
max_time_before_crypto_handshake_seconds));
|
|
config.set_max_idle_time_before_crypto_handshake(
|
|
quic::QuicTime::Delta::FromSeconds(
|
|
max_idle_time_before_crypto_handshake_seconds));
|
|
config.SetConnectionOptionsToSend(connection_options);
|
|
config.SetClientConnectionOptions(client_connection_options);
|
|
return config;
|
|
}
|
|
|
|
// An implementation of quic::QuicCryptoClientConfig::ServerIdFilter that wraps
|
|
// an |origin_filter|.
|
|
class ServerIdOriginFilter
|
|
: public quic::QuicCryptoClientConfig::ServerIdFilter {
|
|
public:
|
|
ServerIdOriginFilter(const base::Callback<bool(const GURL&)> origin_filter)
|
|
: origin_filter_(origin_filter) {}
|
|
|
|
bool Matches(const quic::QuicServerId& server_id) const override {
|
|
if (origin_filter_.is_null())
|
|
return true;
|
|
|
|
GURL url(base::StringPrintf("%s%s%s:%d", url::kHttpsScheme,
|
|
url::kStandardSchemeSeparator,
|
|
server_id.host().c_str(), server_id.port()));
|
|
DCHECK(url.is_valid());
|
|
return origin_filter_.Run(url);
|
|
}
|
|
|
|
private:
|
|
const base::Callback<bool(const GURL&)> origin_filter_;
|
|
};
|
|
|
|
} // namespace
|
|
|
|
// Responsible for verifying the certificates saved in
|
|
// quic::QuicCryptoClientConfig, and for notifying any associated requests when
|
|
// complete. Results from cert verification are ignored.
|
|
class QuicStreamFactory::CertVerifierJob {
|
|
public:
|
|
// ProofVerifierCallbackImpl is passed as the callback method to
|
|
// VerifyCertChain. The quic::ProofVerifier calls this class with the result
|
|
// of cert verification when verification is performed asynchronously.
|
|
class ProofVerifierCallbackImpl : public quic::ProofVerifierCallback {
|
|
public:
|
|
explicit ProofVerifierCallbackImpl(CertVerifierJob* job) : job_(job) {}
|
|
|
|
~ProofVerifierCallbackImpl() override {}
|
|
|
|
void Run(bool ok,
|
|
const std::string& error_details,
|
|
std::unique_ptr<quic::ProofVerifyDetails>* details) override {
|
|
if (job_ == nullptr)
|
|
return;
|
|
job_->verify_callback_ = nullptr;
|
|
job_->OnComplete();
|
|
}
|
|
|
|
void Cancel() { job_ = nullptr; }
|
|
|
|
private:
|
|
CertVerifierJob* job_;
|
|
};
|
|
|
|
CertVerifierJob(const quic::QuicServerId& server_id,
|
|
int cert_verify_flags,
|
|
const NetLogWithSource& net_log)
|
|
: server_id_(server_id),
|
|
verify_callback_(nullptr),
|
|
verify_context_(
|
|
std::make_unique<ProofVerifyContextChromium>(cert_verify_flags,
|
|
net_log)),
|
|
start_time_(base::TimeTicks::Now()),
|
|
net_log_(net_log),
|
|
weak_factory_(this) {}
|
|
|
|
~CertVerifierJob() {
|
|
if (verify_callback_)
|
|
verify_callback_->Cancel();
|
|
}
|
|
|
|
// Starts verification of certs cached in the |crypto_config|.
|
|
quic::QuicAsyncStatus Run(quic::QuicCryptoClientConfig* crypto_config,
|
|
CompletionOnceCallback callback) {
|
|
quic::QuicCryptoClientConfig::CachedState* cached =
|
|
crypto_config->LookupOrCreate(server_id_);
|
|
auto verify_callback = std::make_unique<ProofVerifierCallbackImpl>(this);
|
|
auto* verify_callback_ptr = verify_callback.get();
|
|
quic::QuicAsyncStatus status =
|
|
crypto_config->proof_verifier()->VerifyCertChain(
|
|
server_id_.host(), cached->certs(), verify_context_.get(),
|
|
&verify_error_details_, &verify_details_,
|
|
std::move(verify_callback));
|
|
if (status == quic::QUIC_PENDING) {
|
|
verify_callback_ = verify_callback_ptr;
|
|
callback_ = std::move(callback);
|
|
}
|
|
return status;
|
|
}
|
|
|
|
void OnComplete() {
|
|
UMA_HISTOGRAM_TIMES("Net.QuicSession.CertVerifierJob.CompleteTime",
|
|
base::TimeTicks::Now() - start_time_);
|
|
if (!callback_.is_null())
|
|
base::ResetAndReturn(&callback_).Run(OK);
|
|
}
|
|
|
|
const quic::QuicServerId& server_id() const { return server_id_; }
|
|
|
|
size_t EstimateMemoryUsage() const {
|
|
// TODO(xunjieli): crbug.com/669108. Track |verify_context_| and
|
|
// |verify_details_|.
|
|
return base::trace_event::EstimateMemoryUsage(verify_error_details_);
|
|
}
|
|
|
|
private:
|
|
const quic::QuicServerId server_id_;
|
|
ProofVerifierCallbackImpl* verify_callback_;
|
|
std::unique_ptr<quic::ProofVerifyContext> verify_context_;
|
|
std::unique_ptr<quic::ProofVerifyDetails> verify_details_;
|
|
std::string verify_error_details_;
|
|
const base::TimeTicks start_time_;
|
|
const NetLogWithSource net_log_;
|
|
CompletionOnceCallback callback_;
|
|
base::WeakPtrFactory<CertVerifierJob> weak_factory_;
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(CertVerifierJob);
|
|
};
|
|
|
|
// Responsible for creating a new QUIC session to the specified server, and
|
|
// for notifying any associated requests when complete.
|
|
class QuicStreamFactory::Job {
|
|
public:
|
|
Job(QuicStreamFactory* factory,
|
|
const quic::QuicTransportVersion& quic_version,
|
|
HostResolver* host_resolver,
|
|
const QuicSessionAliasKey& key,
|
|
bool was_alternative_service_recently_broken,
|
|
RequestPriority priority,
|
|
int cert_verify_flags,
|
|
const NetLogWithSource& net_log);
|
|
|
|
~Job();
|
|
|
|
int Run(CompletionOnceCallback host_resolution_callback,
|
|
CompletionOnceCallback callback);
|
|
|
|
int DoLoop(int rv);
|
|
int DoResolveHost();
|
|
int DoResolveHostComplete(int rv);
|
|
int DoConnect();
|
|
int DoConnectComplete(int rv);
|
|
int DoConfirmConnection(int rv);
|
|
|
|
void OnResolveHostComplete(int rv);
|
|
void OnConnectComplete(int rv);
|
|
|
|
const QuicSessionAliasKey& key() const { return key_; }
|
|
|
|
const NetLogWithSource& net_log() const { return net_log_; }
|
|
|
|
base::WeakPtr<Job> GetWeakPtr() { return weak_factory_.GetWeakPtr(); }
|
|
|
|
void PopulateNetErrorDetails(NetErrorDetails* details) const;
|
|
|
|
// Returns the estimate of dynamically allocated memory in bytes.
|
|
size_t EstimateMemoryUsage() const;
|
|
|
|
void AddRequest(QuicStreamRequest* request) {
|
|
stream_requests_.insert(request);
|
|
if (io_state_ == STATE_RESOLVE_HOST ||
|
|
io_state_ == STATE_RESOLVE_HOST_COMPLETE) {
|
|
request->ExpectOnHostResolution();
|
|
}
|
|
}
|
|
|
|
void RemoveRequest(QuicStreamRequest* request) {
|
|
auto request_iter = stream_requests_.find(request);
|
|
DCHECK(request_iter != stream_requests_.end());
|
|
stream_requests_.erase(request_iter);
|
|
}
|
|
|
|
const std::set<QuicStreamRequest*>& stream_requests() {
|
|
return stream_requests_;
|
|
}
|
|
|
|
bool IsHostResolutionComplete() const {
|
|
return io_state_ == STATE_NONE || io_state_ >= STATE_CONNECT;
|
|
}
|
|
|
|
private:
|
|
enum IoState {
|
|
STATE_NONE,
|
|
STATE_RESOLVE_HOST,
|
|
STATE_RESOLVE_HOST_COMPLETE,
|
|
STATE_CONNECT,
|
|
STATE_CONNECT_COMPLETE,
|
|
STATE_CONFIRM_CONNECTION,
|
|
};
|
|
|
|
IoState io_state_;
|
|
QuicStreamFactory* factory_;
|
|
quic::QuicTransportVersion quic_version_;
|
|
HostResolver* host_resolver_;
|
|
std::unique_ptr<HostResolver::Request> request_;
|
|
const QuicSessionAliasKey key_;
|
|
const RequestPriority priority_;
|
|
const int cert_verify_flags_;
|
|
const bool was_alternative_service_recently_broken_;
|
|
const NetLogWithSource net_log_;
|
|
int num_sent_client_hellos_;
|
|
QuicChromiumClientSession* session_;
|
|
// If connection migraiton is supported, |network_| denotes the network on
|
|
// which |session_| is created.
|
|
NetworkChangeNotifier::NetworkHandle network_;
|
|
CompletionOnceCallback host_resolution_callback_;
|
|
CompletionOnceCallback callback_;
|
|
AddressList address_list_;
|
|
base::TimeTicks dns_resolution_start_time_;
|
|
base::TimeTicks dns_resolution_end_time_;
|
|
std::set<QuicStreamRequest*> stream_requests_;
|
|
base::WeakPtrFactory<Job> weak_factory_;
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(Job);
|
|
};
|
|
|
|
QuicStreamFactory::Job::Job(QuicStreamFactory* factory,
|
|
const quic::QuicTransportVersion& quic_version,
|
|
HostResolver* host_resolver,
|
|
const QuicSessionAliasKey& key,
|
|
bool was_alternative_service_recently_broken,
|
|
RequestPriority priority,
|
|
int cert_verify_flags,
|
|
const NetLogWithSource& net_log)
|
|
: io_state_(STATE_RESOLVE_HOST),
|
|
factory_(factory),
|
|
quic_version_(quic_version),
|
|
host_resolver_(host_resolver),
|
|
key_(key),
|
|
priority_(priority),
|
|
cert_verify_flags_(cert_verify_flags),
|
|
was_alternative_service_recently_broken_(
|
|
was_alternative_service_recently_broken),
|
|
net_log_(
|
|
NetLogWithSource::Make(net_log.net_log(),
|
|
NetLogSourceType::QUIC_STREAM_FACTORY_JOB)),
|
|
num_sent_client_hellos_(0),
|
|
session_(nullptr),
|
|
network_(NetworkChangeNotifier::kInvalidNetworkHandle),
|
|
weak_factory_(this) {
|
|
net_log_.BeginEvent(
|
|
NetLogEventType::QUIC_STREAM_FACTORY_JOB,
|
|
base::Bind(&NetLogQuicStreamFactoryJobCallback, &key_.server_id()));
|
|
// Associate |net_log_| with |net_log|.
|
|
net_log_.AddEvent(
|
|
NetLogEventType::QUIC_STREAM_FACTORY_JOB_BOUND_TO_HTTP_STREAM_JOB,
|
|
net_log.source().ToEventParametersCallback());
|
|
net_log.AddEvent(
|
|
NetLogEventType::HTTP_STREAM_JOB_BOUND_TO_QUIC_STREAM_FACTORY_JOB,
|
|
net_log_.source().ToEventParametersCallback());
|
|
}
|
|
|
|
QuicStreamFactory::Job::~Job() {
|
|
net_log_.EndEvent(NetLogEventType::QUIC_STREAM_FACTORY_JOB);
|
|
// If |this| is destroyed in QuicStreamFactory's destructor, |callback_| is
|
|
// non-null.
|
|
}
|
|
|
|
int QuicStreamFactory::Job::Run(CompletionOnceCallback host_resolution_callback,
|
|
CompletionOnceCallback callback) {
|
|
int rv = DoLoop(OK);
|
|
if (rv == ERR_IO_PENDING) {
|
|
host_resolution_callback_ = std::move(host_resolution_callback);
|
|
callback_ = std::move(callback);
|
|
}
|
|
|
|
return rv > 0 ? OK : rv;
|
|
}
|
|
|
|
int QuicStreamFactory::Job::DoLoop(int rv) {
|
|
TRACE_EVENT0(kNetTracingCategory, "QuicStreamFactory::Job::DoLoop");
|
|
|
|
do {
|
|
IoState state = io_state_;
|
|
io_state_ = STATE_NONE;
|
|
switch (state) {
|
|
case STATE_RESOLVE_HOST:
|
|
CHECK_EQ(OK, rv);
|
|
rv = DoResolveHost();
|
|
break;
|
|
case STATE_RESOLVE_HOST_COMPLETE:
|
|
rv = DoResolveHostComplete(rv);
|
|
break;
|
|
case STATE_CONNECT:
|
|
CHECK_EQ(OK, rv);
|
|
rv = DoConnect();
|
|
break;
|
|
case STATE_CONNECT_COMPLETE:
|
|
rv = DoConnectComplete(rv);
|
|
break;
|
|
case STATE_CONFIRM_CONNECTION:
|
|
rv = DoConfirmConnection(rv);
|
|
break;
|
|
default:
|
|
NOTREACHED() << "io_state_: " << io_state_;
|
|
break;
|
|
}
|
|
} while (io_state_ != STATE_NONE && rv != ERR_IO_PENDING);
|
|
return rv;
|
|
}
|
|
|
|
void QuicStreamFactory::Job::OnResolveHostComplete(int rv) {
|
|
DCHECK_EQ(STATE_RESOLVE_HOST_COMPLETE, io_state_);
|
|
|
|
rv = DoLoop(rv);
|
|
if (!host_resolution_callback_.is_null())
|
|
base::ResetAndReturn(&host_resolution_callback_).Run(rv);
|
|
|
|
if (rv != ERR_IO_PENDING && !callback_.is_null())
|
|
base::ResetAndReturn(&callback_).Run(rv);
|
|
}
|
|
|
|
void QuicStreamFactory::Job::OnConnectComplete(int rv) {
|
|
rv = DoLoop(rv);
|
|
if (rv != ERR_IO_PENDING && !callback_.is_null())
|
|
base::ResetAndReturn(&callback_).Run(rv);
|
|
}
|
|
|
|
void QuicStreamFactory::Job::PopulateNetErrorDetails(
|
|
NetErrorDetails* details) const {
|
|
if (!session_)
|
|
return;
|
|
details->connection_info = QuicHttpStream::ConnectionInfoFromQuicVersion(
|
|
session_->connection()->transport_version());
|
|
details->quic_connection_error = session_->error();
|
|
}
|
|
|
|
size_t QuicStreamFactory::Job::EstimateMemoryUsage() const {
|
|
return base::trace_event::EstimateMemoryUsage(key_);
|
|
}
|
|
|
|
int QuicStreamFactory::Job::DoResolveHost() {
|
|
dns_resolution_start_time_ = base::TimeTicks::Now();
|
|
|
|
io_state_ = STATE_RESOLVE_HOST_COMPLETE;
|
|
return host_resolver_->Resolve(
|
|
HostResolver::RequestInfo(key_.destination()), priority_, &address_list_,
|
|
base::Bind(&QuicStreamFactory::Job::OnResolveHostComplete, GetWeakPtr()),
|
|
&request_, net_log_);
|
|
}
|
|
|
|
int QuicStreamFactory::Job::DoResolveHostComplete(int rv) {
|
|
dns_resolution_end_time_ = base::TimeTicks::Now();
|
|
if (rv != OK)
|
|
return rv;
|
|
|
|
DCHECK(!factory_->HasActiveSession(key_.session_key()));
|
|
|
|
// Inform the factory of this resolution, which will set up
|
|
// a session alias, if possible.
|
|
if (factory_->HasMatchingIpSession(key_, address_list_))
|
|
return OK;
|
|
|
|
io_state_ = STATE_CONNECT;
|
|
return OK;
|
|
}
|
|
|
|
int QuicStreamFactory::Job::DoConnect() {
|
|
io_state_ = STATE_CONNECT_COMPLETE;
|
|
|
|
bool require_confirmation = was_alternative_service_recently_broken_;
|
|
net_log_.BeginEvent(
|
|
NetLogEventType::QUIC_STREAM_FACTORY_JOB_CONNECT,
|
|
NetLog::BoolCallback("require_confirmation", require_confirmation));
|
|
|
|
DCHECK_NE(quic_version_, quic::QUIC_VERSION_UNSUPPORTED);
|
|
int rv = factory_->CreateSession(
|
|
key_, quic_version_, cert_verify_flags_, require_confirmation,
|
|
address_list_, dns_resolution_start_time_, dns_resolution_end_time_,
|
|
net_log_, &session_, &network_);
|
|
if (rv != OK) {
|
|
DCHECK(rv != ERR_IO_PENDING);
|
|
DCHECK(!session_);
|
|
return rv;
|
|
}
|
|
|
|
if (!session_->connection()->connected())
|
|
return ERR_CONNECTION_CLOSED;
|
|
|
|
session_->StartReading();
|
|
if (!session_->connection()->connected())
|
|
return ERR_QUIC_PROTOCOL_ERROR;
|
|
|
|
rv = session_->CryptoConnect(
|
|
base::Bind(&QuicStreamFactory::Job::OnConnectComplete, GetWeakPtr()));
|
|
|
|
if (!session_->connection()->connected() &&
|
|
session_->error() == quic::QUIC_PROOF_INVALID) {
|
|
return ERR_QUIC_HANDSHAKE_FAILED;
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
int QuicStreamFactory::Job::DoConnectComplete(int rv) {
|
|
io_state_ = STATE_CONFIRM_CONNECTION;
|
|
return rv;
|
|
}
|
|
|
|
int QuicStreamFactory::Job::DoConfirmConnection(int rv) {
|
|
net_log_.EndEvent(NetLogEventType::QUIC_STREAM_FACTORY_JOB_CONNECT);
|
|
if (session_ &&
|
|
session_->error() == quic::QUIC_CRYPTO_HANDSHAKE_STATELESS_REJECT) {
|
|
num_sent_client_hellos_ += session_->GetNumSentClientHellos();
|
|
if (num_sent_client_hellos_ >=
|
|
quic::QuicCryptoClientStream::kMaxClientHellos)
|
|
return ERR_QUIC_HANDSHAKE_FAILED;
|
|
// The handshake was rejected statelessly, so create another connection
|
|
// to resume the handshake.
|
|
io_state_ = STATE_CONNECT;
|
|
return OK;
|
|
}
|
|
|
|
if (was_alternative_service_recently_broken_)
|
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.ConnectAfterBroken", rv == OK);
|
|
|
|
if (rv != OK)
|
|
return rv;
|
|
|
|
DCHECK(!factory_->HasActiveSession(key_.session_key()));
|
|
// There may well now be an active session for this IP. If so, use the
|
|
// existing session instead.
|
|
AddressList address(
|
|
session_->connection()->peer_address().impl().socket_address());
|
|
if (factory_->HasMatchingIpSession(key_, address)) {
|
|
session_->connection()->CloseConnection(
|
|
quic::QUIC_CONNECTION_IP_POOLED,
|
|
"An active session exists for the given IP.",
|
|
quic::ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
|
|
session_ = nullptr;
|
|
return OK;
|
|
}
|
|
|
|
factory_->ActivateSession(key_, session_);
|
|
|
|
return OK;
|
|
}
|
|
|
|
QuicStreamRequest::QuicStreamRequest(QuicStreamFactory* factory)
|
|
: factory_(factory), expect_on_host_resolution_(false) {}
|
|
|
|
QuicStreamRequest::~QuicStreamRequest() {
|
|
if (factory_ && !callback_.is_null())
|
|
factory_->CancelRequest(this);
|
|
}
|
|
|
|
int QuicStreamRequest::Request(const HostPortPair& destination,
|
|
quic::QuicTransportVersion quic_version,
|
|
PrivacyMode privacy_mode,
|
|
RequestPriority priority,
|
|
const SocketTag& socket_tag,
|
|
int cert_verify_flags,
|
|
const GURL& url,
|
|
const NetLogWithSource& net_log,
|
|
NetErrorDetails* net_error_details,
|
|
CompletionOnceCallback callback) {
|
|
DCHECK_NE(quic_version, quic::QUIC_VERSION_UNSUPPORTED);
|
|
DCHECK(net_error_details);
|
|
DCHECK(callback_.is_null());
|
|
DCHECK(host_resolution_callback_.is_null());
|
|
DCHECK(factory_);
|
|
|
|
net_error_details_ = net_error_details;
|
|
session_key_ =
|
|
QuicSessionKey(HostPortPair::FromURL(url), privacy_mode, socket_tag);
|
|
|
|
int rv = factory_->Create(session_key_, destination, quic_version, priority,
|
|
cert_verify_flags, url, net_log, this);
|
|
if (rv == ERR_IO_PENDING) {
|
|
net_log_ = net_log;
|
|
callback_ = std::move(callback);
|
|
} else {
|
|
DCHECK(!expect_on_host_resolution_);
|
|
factory_ = nullptr;
|
|
}
|
|
|
|
if (rv == OK)
|
|
DCHECK(session_);
|
|
return rv;
|
|
}
|
|
|
|
bool QuicStreamRequest::WaitForHostResolution(CompletionOnceCallback callback) {
|
|
DCHECK(host_resolution_callback_.is_null());
|
|
if (expect_on_host_resolution_) {
|
|
host_resolution_callback_ = std::move(callback);
|
|
}
|
|
return expect_on_host_resolution_;
|
|
}
|
|
|
|
void QuicStreamRequest::SetSession(
|
|
std::unique_ptr<QuicChromiumClientSession::Handle> session) {
|
|
session_ = move(session);
|
|
}
|
|
|
|
void QuicStreamRequest::OnRequestComplete(int rv) {
|
|
factory_ = nullptr;
|
|
base::ResetAndReturn(&callback_).Run(rv);
|
|
}
|
|
|
|
void QuicStreamRequest::ExpectOnHostResolution() {
|
|
expect_on_host_resolution_ = true;
|
|
}
|
|
|
|
void QuicStreamRequest::OnHostResolutionComplete(int rv) {
|
|
DCHECK(expect_on_host_resolution_);
|
|
expect_on_host_resolution_ = false;
|
|
if (!host_resolution_callback_.is_null()) {
|
|
base::ResetAndReturn(&host_resolution_callback_).Run(rv);
|
|
}
|
|
}
|
|
|
|
base::TimeDelta QuicStreamRequest::GetTimeDelayForWaitingJob() const {
|
|
if (!factory_)
|
|
return base::TimeDelta();
|
|
return factory_->GetTimeDelayForWaitingJob(session_key_.server_id());
|
|
}
|
|
|
|
std::unique_ptr<QuicChromiumClientSession::Handle>
|
|
QuicStreamRequest::ReleaseSessionHandle() {
|
|
if (!session_ || !session_->IsConnected())
|
|
return nullptr;
|
|
|
|
return std::move(session_);
|
|
}
|
|
|
|
QuicStreamFactory::QuicStreamFactory(
|
|
NetLog* net_log,
|
|
HostResolver* host_resolver,
|
|
SSLConfigService* ssl_config_service,
|
|
ClientSocketFactory* client_socket_factory,
|
|
HttpServerProperties* http_server_properties,
|
|
CertVerifier* cert_verifier,
|
|
CTPolicyEnforcer* ct_policy_enforcer,
|
|
ChannelIDService* channel_id_service,
|
|
TransportSecurityState* transport_security_state,
|
|
CTVerifier* cert_transparency_verifier,
|
|
SocketPerformanceWatcherFactory* socket_performance_watcher_factory,
|
|
QuicCryptoClientStreamFactory* quic_crypto_client_stream_factory,
|
|
quic::QuicRandom* random_generator,
|
|
quic::QuicClock* clock,
|
|
size_t max_packet_length,
|
|
const std::string& user_agent_id,
|
|
bool store_server_configs_in_properties,
|
|
bool close_sessions_on_ip_change,
|
|
bool goaway_sessions_on_ip_change,
|
|
bool mark_quic_broken_when_network_blackholes,
|
|
int idle_connection_timeout_seconds,
|
|
int reduced_ping_timeout_seconds,
|
|
int max_time_before_crypto_handshake_seconds,
|
|
int max_idle_time_before_crypto_handshake_seconds,
|
|
bool migrate_sessions_on_network_change_v2,
|
|
bool migrate_sessions_early_v2,
|
|
bool go_away_on_path_degrading,
|
|
base::TimeDelta max_time_on_non_default_network,
|
|
int max_migrations_to_non_default_network_on_write_error,
|
|
int max_migrations_to_non_default_network_on_path_degrading,
|
|
bool allow_server_migration,
|
|
bool race_cert_verification,
|
|
bool estimate_initial_rtt,
|
|
bool headers_include_h2_stream_dependency,
|
|
const quic::QuicTagVector& connection_options,
|
|
const quic::QuicTagVector& client_connection_options,
|
|
bool enable_token_binding,
|
|
bool enable_channel_id,
|
|
bool enable_socket_recv_optimization)
|
|
: require_confirmation_(true),
|
|
net_log_(net_log),
|
|
host_resolver_(host_resolver),
|
|
client_socket_factory_(client_socket_factory),
|
|
http_server_properties_(http_server_properties),
|
|
push_delegate_(nullptr),
|
|
transport_security_state_(transport_security_state),
|
|
cert_transparency_verifier_(cert_transparency_verifier),
|
|
quic_crypto_client_stream_factory_(quic_crypto_client_stream_factory),
|
|
random_generator_(random_generator),
|
|
clock_(clock),
|
|
max_packet_length_(max_packet_length),
|
|
clock_skew_detector_(base::TimeTicks::Now(), base::Time::Now()),
|
|
socket_performance_watcher_factory_(socket_performance_watcher_factory),
|
|
config_(
|
|
InitializeQuicConfig(connection_options,
|
|
client_connection_options,
|
|
idle_connection_timeout_seconds,
|
|
max_time_before_crypto_handshake_seconds,
|
|
max_idle_time_before_crypto_handshake_seconds)),
|
|
crypto_config_(
|
|
std::make_unique<ProofVerifierChromium>(cert_verifier,
|
|
ct_policy_enforcer,
|
|
transport_security_state,
|
|
cert_transparency_verifier),
|
|
quic::TlsClientHandshaker::CreateSslCtx()),
|
|
mark_quic_broken_when_network_blackholes_(
|
|
mark_quic_broken_when_network_blackholes),
|
|
store_server_configs_in_properties_(store_server_configs_in_properties),
|
|
ping_timeout_(quic::QuicTime::Delta::FromSeconds(quic::kPingTimeoutSecs)),
|
|
reduced_ping_timeout_(
|
|
quic::QuicTime::Delta::FromSeconds(reduced_ping_timeout_seconds)),
|
|
yield_after_packets_(kQuicYieldAfterPacketsRead),
|
|
yield_after_duration_(quic::QuicTime::Delta::FromMilliseconds(
|
|
kQuicYieldAfterDurationMilliseconds)),
|
|
close_sessions_on_ip_change_(close_sessions_on_ip_change),
|
|
goaway_sessions_on_ip_change_(goaway_sessions_on_ip_change),
|
|
migrate_sessions_on_network_change_v2_(
|
|
migrate_sessions_on_network_change_v2 &&
|
|
NetworkChangeNotifier::AreNetworkHandlesSupported()),
|
|
migrate_sessions_early_v2_(migrate_sessions_early_v2 &&
|
|
migrate_sessions_on_network_change_v2_),
|
|
go_away_on_path_degrading_(go_away_on_path_degrading),
|
|
default_network_(NetworkChangeNotifier::kInvalidNetworkHandle),
|
|
max_time_on_non_default_network_(max_time_on_non_default_network),
|
|
max_migrations_to_non_default_network_on_write_error_(
|
|
max_migrations_to_non_default_network_on_write_error),
|
|
max_migrations_to_non_default_network_on_path_degrading_(
|
|
max_migrations_to_non_default_network_on_path_degrading),
|
|
allow_server_migration_(allow_server_migration),
|
|
race_cert_verification_(race_cert_verification),
|
|
estimate_initial_rtt(estimate_initial_rtt),
|
|
headers_include_h2_stream_dependency_(
|
|
headers_include_h2_stream_dependency),
|
|
need_to_check_persisted_supports_quic_(true),
|
|
num_push_streams_created_(0),
|
|
task_runner_(nullptr),
|
|
ssl_config_service_(ssl_config_service),
|
|
enable_socket_recv_optimization_(enable_socket_recv_optimization),
|
|
weak_factory_(this) {
|
|
if (ssl_config_service_)
|
|
ssl_config_service_->AddObserver(this);
|
|
DCHECK(transport_security_state_);
|
|
DCHECK(http_server_properties_);
|
|
crypto_config_.set_user_agent_id(user_agent_id);
|
|
crypto_config_.AddCanonicalSuffix(".c.youtube.com");
|
|
crypto_config_.AddCanonicalSuffix(".ggpht.com");
|
|
crypto_config_.AddCanonicalSuffix(".googlevideo.com");
|
|
crypto_config_.AddCanonicalSuffix(".googleusercontent.com");
|
|
// TODO(rtenneti): http://crbug.com/487355. Temporary fix for b/20760730 until
|
|
// channel_id_service is supported in cronet.
|
|
if (enable_channel_id && channel_id_service) {
|
|
crypto_config_.SetChannelIDSource(
|
|
new ChannelIDSourceChromium(channel_id_service));
|
|
}
|
|
if (enable_token_binding && channel_id_service)
|
|
crypto_config_.tb_key_params.push_back(quic::kTB10);
|
|
crypto::EnsureOpenSSLInit();
|
|
bool has_aes_hardware_support = !!EVP_has_aes_hardware();
|
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.PreferAesGcm",
|
|
has_aes_hardware_support);
|
|
if (has_aes_hardware_support)
|
|
crypto_config_.PreferAesGcm();
|
|
|
|
if (migrate_sessions_early_v2)
|
|
DCHECK(migrate_sessions_on_network_change_v2);
|
|
|
|
// goaway_sessions_on_ip_change and close_sessions_on_ip_change should never
|
|
// be simultaneously set to true.
|
|
DCHECK(!(close_sessions_on_ip_change_ && goaway_sessions_on_ip_change_));
|
|
|
|
// Connection migration should not be set if explicitly handle ip address
|
|
// change.
|
|
bool handle_ip_change =
|
|
close_sessions_on_ip_change_ || goaway_sessions_on_ip_change_;
|
|
DCHECK(!(handle_ip_change && migrate_sessions_on_network_change_v2_));
|
|
|
|
if (handle_ip_change)
|
|
NetworkChangeNotifier::AddIPAddressObserver(this);
|
|
|
|
if (NetworkChangeNotifier::AreNetworkHandlesSupported())
|
|
NetworkChangeNotifier::AddNetworkObserver(this);
|
|
}
|
|
|
|
QuicStreamFactory::~QuicStreamFactory() {
|
|
UMA_HISTOGRAM_COUNTS_1000("Net.NumQuicSessionsAtShutdown",
|
|
all_sessions_.size());
|
|
CloseAllSessions(ERR_ABORTED, quic::QUIC_CONNECTION_CANCELLED);
|
|
while (!all_sessions_.empty()) {
|
|
delete all_sessions_.begin()->first;
|
|
all_sessions_.erase(all_sessions_.begin());
|
|
}
|
|
active_jobs_.clear();
|
|
while (!active_cert_verifier_jobs_.empty())
|
|
active_cert_verifier_jobs_.erase(active_cert_verifier_jobs_.begin());
|
|
if (ssl_config_service_)
|
|
ssl_config_service_->RemoveObserver(this);
|
|
if (close_sessions_on_ip_change_ || goaway_sessions_on_ip_change_) {
|
|
NetworkChangeNotifier::RemoveIPAddressObserver(this);
|
|
}
|
|
if (NetworkChangeNotifier::AreNetworkHandlesSupported()) {
|
|
NetworkChangeNotifier::RemoveNetworkObserver(this);
|
|
}
|
|
}
|
|
|
|
void QuicStreamFactory::set_require_confirmation(bool require_confirmation) {
|
|
require_confirmation_ = require_confirmation;
|
|
if (!(local_address_ == IPEndPoint())) {
|
|
http_server_properties_->SetSupportsQuic(!require_confirmation,
|
|
local_address_.address());
|
|
}
|
|
}
|
|
|
|
base::TimeDelta QuicStreamFactory::GetTimeDelayForWaitingJob(
|
|
const quic::QuicServerId& server_id) {
|
|
if (require_confirmation_) {
|
|
IPAddress last_address;
|
|
if (!need_to_check_persisted_supports_quic_ ||
|
|
!http_server_properties_->GetSupportsQuic(&last_address)) {
|
|
return base::TimeDelta();
|
|
}
|
|
}
|
|
|
|
int64_t srtt =
|
|
1.5 * GetServerNetworkStatsSmoothedRttInMicroseconds(server_id);
|
|
// Picked 300ms based on mean time from
|
|
// Net.QuicSession.HostResolution.HandshakeConfirmedTime histogram.
|
|
const int kDefaultRTT = 300 * quic::kNumMicrosPerMilli;
|
|
if (!srtt)
|
|
srtt = kDefaultRTT;
|
|
return base::TimeDelta::FromMicroseconds(srtt);
|
|
}
|
|
|
|
void QuicStreamFactory::DumpMemoryStats(
|
|
base::trace_event::ProcessMemoryDump* pmd,
|
|
const std::string& parent_absolute_name) const {
|
|
if (all_sessions_.empty() && active_jobs_.empty())
|
|
return;
|
|
base::trace_event::MemoryAllocatorDump* factory_dump =
|
|
pmd->CreateAllocatorDump(parent_absolute_name + "/quic_stream_factory");
|
|
size_t memory_estimate =
|
|
base::trace_event::EstimateMemoryUsage(all_sessions_) +
|
|
base::trace_event::EstimateMemoryUsage(active_sessions_) +
|
|
base::trace_event::EstimateMemoryUsage(session_aliases_) +
|
|
base::trace_event::EstimateMemoryUsage(ip_aliases_) +
|
|
base::trace_event::EstimateMemoryUsage(session_peer_ip_) +
|
|
base::trace_event::EstimateMemoryUsage(gone_away_aliases_) +
|
|
base::trace_event::EstimateMemoryUsage(active_jobs_) +
|
|
base::trace_event::EstimateMemoryUsage(active_cert_verifier_jobs_);
|
|
factory_dump->AddScalar(base::trace_event::MemoryAllocatorDump::kNameSize,
|
|
base::trace_event::MemoryAllocatorDump::kUnitsBytes,
|
|
memory_estimate);
|
|
factory_dump->AddScalar("all_sessions",
|
|
base::trace_event::MemoryAllocatorDump::kUnitsObjects,
|
|
all_sessions_.size());
|
|
factory_dump->AddScalar("active_jobs",
|
|
base::trace_event::MemoryAllocatorDump::kUnitsObjects,
|
|
active_jobs_.size());
|
|
factory_dump->AddScalar("active_cert_jobs",
|
|
base::trace_event::MemoryAllocatorDump::kUnitsObjects,
|
|
active_cert_verifier_jobs_.size());
|
|
}
|
|
|
|
bool QuicStreamFactory::CanUseExistingSession(const QuicSessionKey& session_key,
|
|
const HostPortPair& destination) {
|
|
// TODO(zhongyi): delete active_sessions_.empty() checks once the
|
|
// android crash issue(crbug.com/498823) is resolved.
|
|
if (active_sessions_.empty())
|
|
return false;
|
|
|
|
if (base::ContainsKey(active_sessions_, session_key))
|
|
return true;
|
|
|
|
for (const auto& key_value : active_sessions_) {
|
|
QuicChromiumClientSession* session = key_value.second;
|
|
if (destination.Equals(all_sessions_[session].destination()) &&
|
|
session->CanPool(session_key.host(), session_key.privacy_mode(),
|
|
session_key.socket_tag())) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void QuicStreamFactory::MarkAllActiveSessionsGoingAway() {
|
|
while (!active_sessions_.empty()) {
|
|
QuicChromiumClientSession* session = active_sessions_.begin()->second;
|
|
OnSessionGoingAway(session);
|
|
}
|
|
}
|
|
|
|
int QuicStreamFactory::Create(const QuicSessionKey& session_key,
|
|
const HostPortPair& destination,
|
|
quic::QuicTransportVersion quic_version,
|
|
RequestPriority priority,
|
|
int cert_verify_flags,
|
|
const GURL& url,
|
|
const NetLogWithSource& net_log,
|
|
QuicStreamRequest* request) {
|
|
if (clock_skew_detector_.ClockSkewDetected(base::TimeTicks::Now(),
|
|
base::Time::Now())) {
|
|
MarkAllActiveSessionsGoingAway();
|
|
}
|
|
DCHECK(HostPortPair(session_key.server_id().host(),
|
|
session_key.server_id().port())
|
|
.Equals(HostPortPair::FromURL(url)));
|
|
// Enforce session affinity for promised streams.
|
|
quic::QuicClientPromisedInfo* promised =
|
|
push_promise_index_.GetPromised(url.spec());
|
|
if (promised) {
|
|
QuicChromiumClientSession* session =
|
|
static_cast<QuicChromiumClientSession*>(promised->session());
|
|
DCHECK(session);
|
|
if (session->server_id().privacy_mode_enabled() ==
|
|
session_key.server_id().privacy_mode_enabled()) {
|
|
request->SetSession(session->CreateHandle(destination));
|
|
++num_push_streams_created_;
|
|
return OK;
|
|
}
|
|
// This should happen extremely rarely (if ever), but if somehow a
|
|
// request comes in with a mismatched privacy mode, consider the
|
|
// promise borked.
|
|
promised->Cancel();
|
|
}
|
|
|
|
// Use active session for |session_key| if such exists.
|
|
// TODO(rtenneti): crbug.com/498823 - delete active_sessions_.empty() checks.
|
|
if (!active_sessions_.empty()) {
|
|
SessionMap::iterator it = active_sessions_.find(session_key);
|
|
if (it != active_sessions_.end()) {
|
|
QuicChromiumClientSession* session = it->second;
|
|
request->SetSession(session->CreateHandle(destination));
|
|
return OK;
|
|
}
|
|
}
|
|
|
|
// Associate with active job to |session_key| if such exists.
|
|
auto it = active_jobs_.find(session_key);
|
|
if (it != active_jobs_.end()) {
|
|
const NetLogWithSource& job_net_log = it->second->net_log();
|
|
job_net_log.AddEvent(
|
|
NetLogEventType::QUIC_STREAM_FACTORY_JOB_BOUND_TO_HTTP_STREAM_JOB,
|
|
net_log.source().ToEventParametersCallback());
|
|
net_log.AddEvent(
|
|
NetLogEventType::HTTP_STREAM_JOB_BOUND_TO_QUIC_STREAM_FACTORY_JOB,
|
|
job_net_log.source().ToEventParametersCallback());
|
|
it->second->AddRequest(request);
|
|
return ERR_IO_PENDING;
|
|
}
|
|
|
|
// Pool to active session to |destination| if possible.
|
|
if (!active_sessions_.empty()) {
|
|
for (const auto& key_value : active_sessions_) {
|
|
QuicChromiumClientSession* session = key_value.second;
|
|
if (destination.Equals(all_sessions_[session].destination()) &&
|
|
session->CanPool(session_key.server_id().host(),
|
|
session_key.server_id().privacy_mode_enabled()
|
|
? PRIVACY_MODE_ENABLED
|
|
: PRIVACY_MODE_DISABLED,
|
|
session_key.socket_tag())) {
|
|
request->SetSession(session->CreateHandle(destination));
|
|
return OK;
|
|
}
|
|
}
|
|
}
|
|
|
|
// TODO(rtenneti): |task_runner_| is used by the Job. Initialize task_runner_
|
|
// in the constructor after WebRequestActionWithThreadsTest.* tests are fixed.
|
|
if (!task_runner_)
|
|
task_runner_ = base::ThreadTaskRunnerHandle::Get().get();
|
|
|
|
ignore_result(
|
|
StartCertVerifyJob(session_key.server_id(), cert_verify_flags, net_log));
|
|
|
|
QuicSessionAliasKey key(destination, session_key);
|
|
std::unique_ptr<Job> job =
|
|
std::make_unique<Job>(this, quic_version, host_resolver_, key,
|
|
WasQuicRecentlyBroken(session_key.server_id()),
|
|
priority, cert_verify_flags, net_log);
|
|
int rv = job->Run(
|
|
base::BindRepeating(&QuicStreamFactory::OnJobHostResolutionComplete,
|
|
base::Unretained(this), job.get()),
|
|
base::BindRepeating(&QuicStreamFactory::OnJobComplete,
|
|
base::Unretained(this), job.get()));
|
|
if (rv == ERR_IO_PENDING) {
|
|
job->AddRequest(request);
|
|
active_jobs_[session_key] = std::move(job);
|
|
return rv;
|
|
}
|
|
if (rv == OK) {
|
|
// TODO(rtenneti): crbug.com/498823 - revert active_sessions_.empty()
|
|
// related changes.
|
|
if (active_sessions_.empty())
|
|
return ERR_QUIC_PROTOCOL_ERROR;
|
|
SessionMap::iterator it = active_sessions_.find(session_key);
|
|
DCHECK(it != active_sessions_.end());
|
|
if (it == active_sessions_.end())
|
|
return ERR_QUIC_PROTOCOL_ERROR;
|
|
QuicChromiumClientSession* session = it->second;
|
|
request->SetSession(session->CreateHandle(destination));
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
QuicStreamFactory::QuicSessionAliasKey::QuicSessionAliasKey(
|
|
const HostPortPair& destination,
|
|
const QuicSessionKey& session_key)
|
|
: destination_(destination), session_key_(session_key) {}
|
|
|
|
bool QuicStreamFactory::QuicSessionAliasKey::operator<(
|
|
const QuicSessionAliasKey& other) const {
|
|
return std::tie(destination_, session_key_) <
|
|
std::tie(other.destination_, other.session_key_);
|
|
}
|
|
|
|
bool QuicStreamFactory::QuicSessionAliasKey::operator==(
|
|
const QuicSessionAliasKey& other) const {
|
|
return destination_.Equals(other.destination_) &&
|
|
session_key_ == other.session_key_;
|
|
}
|
|
|
|
size_t QuicStreamFactory::QuicSessionAliasKey::EstimateMemoryUsage() const {
|
|
return base::trace_event::EstimateMemoryUsage(destination_) +
|
|
base::trace_event::EstimateMemoryUsage(session_key_.server_id());
|
|
}
|
|
|
|
bool QuicStreamFactory::HasMatchingIpSession(const QuicSessionAliasKey& key,
|
|
const AddressList& address_list) {
|
|
const quic::QuicServerId& server_id(key.server_id());
|
|
DCHECK(!HasActiveSession(key.session_key()));
|
|
for (const IPEndPoint& address : address_list) {
|
|
if (!base::ContainsKey(ip_aliases_, address))
|
|
continue;
|
|
|
|
const SessionSet& sessions = ip_aliases_[address];
|
|
for (QuicChromiumClientSession* session : sessions) {
|
|
if (!session->CanPool(server_id.host(),
|
|
server_id.privacy_mode_enabled()
|
|
? PRIVACY_MODE_ENABLED
|
|
: PRIVACY_MODE_DISABLED,
|
|
key.session_key().socket_tag()))
|
|
continue;
|
|
active_sessions_[key.session_key()] = session;
|
|
session_aliases_[session].insert(key);
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void QuicStreamFactory::OnJobHostResolutionComplete(Job* job, int rv) {
|
|
auto iter = active_jobs_.find(job->key().session_key());
|
|
DCHECK(iter != active_jobs_.end());
|
|
for (auto* request : iter->second->stream_requests()) {
|
|
request->OnHostResolutionComplete(rv);
|
|
}
|
|
}
|
|
|
|
void QuicStreamFactory::OnJobComplete(Job* job, int rv) {
|
|
auto iter = active_jobs_.find(job->key().session_key());
|
|
DCHECK(iter != active_jobs_.end());
|
|
if (rv == OK) {
|
|
set_require_confirmation(false);
|
|
|
|
SessionMap::iterator session_it =
|
|
active_sessions_.find(job->key().session_key());
|
|
CHECK(session_it != active_sessions_.end());
|
|
QuicChromiumClientSession* session = session_it->second;
|
|
for (auto* request : iter->second->stream_requests()) {
|
|
// Do not notify |request| yet.
|
|
request->SetSession(session->CreateHandle(job->key().destination()));
|
|
}
|
|
}
|
|
|
|
for (auto* request : iter->second->stream_requests()) {
|
|
// Even though we're invoking callbacks here, we don't need to worry
|
|
// about |this| being deleted, because the factory is owned by the
|
|
// profile which can not be deleted via callbacks.
|
|
if (rv < 0) {
|
|
job->PopulateNetErrorDetails(request->net_error_details());
|
|
}
|
|
request->OnRequestComplete(rv);
|
|
}
|
|
active_jobs_.erase(iter);
|
|
}
|
|
|
|
void QuicStreamFactory::OnCertVerifyJobComplete(CertVerifierJob* job, int rv) {
|
|
active_cert_verifier_jobs_.erase(job->server_id());
|
|
}
|
|
|
|
void QuicStreamFactory::OnIdleSession(QuicChromiumClientSession* session) {}
|
|
|
|
void QuicStreamFactory::OnSessionGoingAway(QuicChromiumClientSession* session) {
|
|
const AliasSet& aliases = session_aliases_[session];
|
|
for (AliasSet::const_iterator it = aliases.begin(); it != aliases.end();
|
|
++it) {
|
|
const QuicSessionKey& session_key = it->session_key();
|
|
DCHECK(active_sessions_.count(session_key));
|
|
DCHECK_EQ(session, active_sessions_[session_key]);
|
|
// Track sessions which have recently gone away so that we can disable
|
|
// port suggestions.
|
|
if (session->goaway_received())
|
|
gone_away_aliases_.insert(*it);
|
|
|
|
active_sessions_.erase(session_key);
|
|
ProcessGoingAwaySession(session, session_key.server_id(), true);
|
|
}
|
|
ProcessGoingAwaySession(session, all_sessions_[session].server_id(), false);
|
|
if (!aliases.empty()) {
|
|
DCHECK(base::ContainsKey(session_peer_ip_, session));
|
|
const IPEndPoint peer_address = session_peer_ip_[session];
|
|
ip_aliases_[peer_address].erase(session);
|
|
if (ip_aliases_[peer_address].empty())
|
|
ip_aliases_.erase(peer_address);
|
|
session_peer_ip_.erase(session);
|
|
}
|
|
session_aliases_.erase(session);
|
|
}
|
|
|
|
void QuicStreamFactory::OnSessionClosed(QuicChromiumClientSession* session) {
|
|
DCHECK_EQ(0u, session->GetNumActiveStreams());
|
|
OnSessionGoingAway(session);
|
|
delete session;
|
|
all_sessions_.erase(session);
|
|
}
|
|
|
|
void QuicStreamFactory::OnBlackholeAfterHandshakeConfirmed(
|
|
QuicChromiumClientSession* session) {
|
|
// Reduce PING timeout when connection blackholes after the handshake.
|
|
if (ping_timeout_ > reduced_ping_timeout_)
|
|
ping_timeout_ = reduced_ping_timeout_;
|
|
|
|
if (mark_quic_broken_when_network_blackholes_) {
|
|
http_server_properties_->MarkAlternativeServiceBroken(AlternativeService(
|
|
kProtoQUIC, HostPortPair(session->server_id().host(),
|
|
session->server_id().port())));
|
|
}
|
|
}
|
|
|
|
void QuicStreamFactory::CancelRequest(QuicStreamRequest* request) {
|
|
auto job_iter = active_jobs_.find(request->session_key());
|
|
CHECK(job_iter != active_jobs_.end());
|
|
job_iter->second->RemoveRequest(request);
|
|
}
|
|
|
|
void QuicStreamFactory::CloseAllSessions(int error,
|
|
quic::QuicErrorCode quic_error) {
|
|
base::UmaHistogramSparse("Net.QuicSession.CloseAllSessionsError", -error);
|
|
while (!active_sessions_.empty()) {
|
|
size_t initial_size = active_sessions_.size();
|
|
active_sessions_.begin()->second->CloseSessionOnError(error, quic_error);
|
|
DCHECK_NE(initial_size, active_sessions_.size());
|
|
}
|
|
while (!all_sessions_.empty()) {
|
|
size_t initial_size = all_sessions_.size();
|
|
all_sessions_.begin()->first->CloseSessionOnError(error, quic_error);
|
|
DCHECK_NE(initial_size, all_sessions_.size());
|
|
}
|
|
DCHECK(all_sessions_.empty());
|
|
}
|
|
|
|
std::unique_ptr<base::Value> QuicStreamFactory::QuicStreamFactoryInfoToValue()
|
|
const {
|
|
std::unique_ptr<base::ListValue> list(new base::ListValue());
|
|
|
|
for (SessionMap::const_iterator it = active_sessions_.begin();
|
|
it != active_sessions_.end(); ++it) {
|
|
const quic::QuicServerId& server_id = it->first.server_id();
|
|
QuicChromiumClientSession* session = it->second;
|
|
const AliasSet& aliases = session_aliases_.find(session)->second;
|
|
// Only add a session to the list once.
|
|
if (server_id == aliases.begin()->server_id()) {
|
|
std::set<HostPortPair> hosts;
|
|
for (AliasSet::const_iterator alias_it = aliases.begin();
|
|
alias_it != aliases.end(); ++alias_it) {
|
|
hosts.insert(HostPortPair(alias_it->server_id().host(),
|
|
alias_it->server_id().port()));
|
|
}
|
|
list->Append(session->GetInfoAsValue(hosts));
|
|
}
|
|
}
|
|
return std::move(list);
|
|
}
|
|
|
|
void QuicStreamFactory::ClearCachedStatesInCryptoConfig(
|
|
const base::Callback<bool(const GURL&)>& origin_filter) {
|
|
ServerIdOriginFilter filter(origin_filter);
|
|
crypto_config_.ClearCachedStates(filter);
|
|
}
|
|
|
|
void QuicStreamFactory::OnIPAddressChanged() {
|
|
LogPlatformNotificationInHistogram(NETWORK_IP_ADDRESS_CHANGED);
|
|
// Do nothing if connection migration is turned on.
|
|
if (migrate_sessions_on_network_change_v2_)
|
|
return;
|
|
|
|
set_require_confirmation(true);
|
|
if (close_sessions_on_ip_change_) {
|
|
CloseAllSessions(ERR_NETWORK_CHANGED, quic::QUIC_IP_ADDRESS_CHANGED);
|
|
} else {
|
|
DCHECK(goaway_sessions_on_ip_change_);
|
|
MarkAllActiveSessionsGoingAway();
|
|
}
|
|
}
|
|
|
|
void QuicStreamFactory::OnNetworkConnected(NetworkHandle network) {
|
|
LogPlatformNotificationInHistogram(NETWORK_CONNECTED);
|
|
if (!migrate_sessions_on_network_change_v2_)
|
|
return;
|
|
|
|
ScopedConnectionMigrationEventLog scoped_event_log(net_log_,
|
|
"OnNetworkConnected");
|
|
QuicStreamFactory::SessionIdMap::iterator it = all_sessions_.begin();
|
|
// Sessions may be deleted while iterating through the map.
|
|
while (it != all_sessions_.end()) {
|
|
QuicChromiumClientSession* session = it->first;
|
|
++it;
|
|
session->OnNetworkConnected(network, scoped_event_log.net_log());
|
|
}
|
|
}
|
|
|
|
void QuicStreamFactory::OnNetworkMadeDefault(NetworkHandle network) {
|
|
LogPlatformNotificationInHistogram(NETWORK_MADE_DEFAULT);
|
|
if (!migrate_sessions_on_network_change_v2_)
|
|
return;
|
|
|
|
DCHECK_NE(NetworkChangeNotifier::kInvalidNetworkHandle, network);
|
|
default_network_ = network;
|
|
ScopedConnectionMigrationEventLog scoped_event_log(net_log_,
|
|
"OnNetworkMadeDefault");
|
|
|
|
QuicStreamFactory::SessionIdMap::iterator it = all_sessions_.begin();
|
|
// Sessions may be deleted while iterating through the map.
|
|
while (it != all_sessions_.end()) {
|
|
QuicChromiumClientSession* session = it->first;
|
|
++it;
|
|
session->OnNetworkMadeDefault(network, scoped_event_log.net_log());
|
|
}
|
|
set_require_confirmation(true);
|
|
}
|
|
|
|
void QuicStreamFactory::OnNetworkDisconnected(NetworkHandle network) {
|
|
LogPlatformNotificationInHistogram(NETWORK_DISCONNECTED);
|
|
if (!migrate_sessions_on_network_change_v2_)
|
|
return;
|
|
|
|
ScopedConnectionMigrationEventLog scoped_event_log(net_log_,
|
|
"OnNetworkDisconnected");
|
|
QuicStreamFactory::SessionIdMap::iterator it = all_sessions_.begin();
|
|
// Sessions may be deleted while iterating through the map.
|
|
while (it != all_sessions_.end()) {
|
|
QuicChromiumClientSession* session = it->first;
|
|
++it;
|
|
session->OnNetworkDisconnectedV2(/*disconnected_network*/ network,
|
|
scoped_event_log.net_log());
|
|
}
|
|
}
|
|
|
|
// This method is expected to only be called when migrating from Cellular to
|
|
// WiFi on Android, and should always be preceded by OnNetworkMadeDefault().
|
|
void QuicStreamFactory::OnNetworkSoonToDisconnect(NetworkHandle network) {
|
|
LogPlatformNotificationInHistogram(NETWORK_SOON_TO_DISCONNECT);
|
|
}
|
|
|
|
NetworkHandle QuicStreamFactory::FindAlternateNetwork(
|
|
NetworkHandle old_network) {
|
|
// Find a new network that sessions bound to |old_network| can be migrated to.
|
|
NetworkChangeNotifier::NetworkList network_list;
|
|
NetworkChangeNotifier::GetConnectedNetworks(&network_list);
|
|
for (NetworkHandle new_network : network_list) {
|
|
if (new_network != old_network)
|
|
return new_network;
|
|
}
|
|
return NetworkChangeNotifier::kInvalidNetworkHandle;
|
|
}
|
|
|
|
std::unique_ptr<DatagramClientSocket> QuicStreamFactory::CreateSocket(
|
|
NetLog* net_log,
|
|
const NetLogSource& source) {
|
|
auto socket = client_socket_factory_->CreateDatagramClientSocket(
|
|
DatagramSocket::DEFAULT_BIND, net_log, source);
|
|
if (enable_socket_recv_optimization_)
|
|
socket->EnableRecvOptimization();
|
|
return socket;
|
|
}
|
|
|
|
void QuicStreamFactory::OnSSLConfigChanged() {
|
|
CloseAllSessions(ERR_CERT_DATABASE_CHANGED, quic::QUIC_CONNECTION_CANCELLED);
|
|
}
|
|
|
|
void QuicStreamFactory::OnCertDBChanged() {
|
|
// We should flush the sessions if we removed trust from a
|
|
// cert, because a previously trusted server may have become
|
|
// untrusted.
|
|
//
|
|
// We should not flush the sessions if we added trust to a cert.
|
|
//
|
|
// Since the OnCertDBChanged method doesn't tell us what
|
|
// kind of change it is, we have to flush the socket
|
|
// pools to be safe.
|
|
MarkAllActiveSessionsGoingAway();
|
|
}
|
|
|
|
bool QuicStreamFactory::HasActiveSession(
|
|
const QuicSessionKey& session_key) const {
|
|
// TODO(rtenneti): crbug.com/498823 - delete active_sessions_.empty() check.
|
|
if (active_sessions_.empty())
|
|
return false;
|
|
return base::ContainsKey(active_sessions_, session_key);
|
|
}
|
|
|
|
bool QuicStreamFactory::HasActiveJob(const QuicSessionKey& session_key) const {
|
|
return base::ContainsKey(active_jobs_, session_key);
|
|
}
|
|
|
|
bool QuicStreamFactory::HasActiveCertVerifierJob(
|
|
const quic::QuicServerId& server_id) const {
|
|
return base::ContainsKey(active_cert_verifier_jobs_, server_id);
|
|
}
|
|
|
|
int QuicStreamFactory::ConfigureSocket(DatagramClientSocket* socket,
|
|
IPEndPoint addr,
|
|
NetworkHandle network,
|
|
const SocketTag& socket_tag) {
|
|
socket->UseNonBlockingIO();
|
|
|
|
int rv;
|
|
if (migrate_sessions_on_network_change_v2_) {
|
|
// If caller leaves network unspecified, use current default network.
|
|
if (network == NetworkChangeNotifier::kInvalidNetworkHandle) {
|
|
rv = socket->ConnectUsingDefaultNetwork(addr);
|
|
} else {
|
|
rv = socket->ConnectUsingNetwork(network, addr);
|
|
}
|
|
} else {
|
|
rv = socket->Connect(addr);
|
|
}
|
|
if (rv != OK) {
|
|
HistogramCreateSessionFailure(CREATION_ERROR_CONNECTING_SOCKET);
|
|
return rv;
|
|
}
|
|
|
|
socket->ApplySocketTag(socket_tag);
|
|
|
|
rv = socket->SetReceiveBufferSize(kQuicSocketReceiveBufferSize);
|
|
if (rv != OK) {
|
|
HistogramCreateSessionFailure(CREATION_ERROR_SETTING_RECEIVE_BUFFER);
|
|
return rv;
|
|
}
|
|
|
|
rv = socket->SetDoNotFragment();
|
|
// SetDoNotFragment is not implemented on all platforms, so ignore errors.
|
|
if (rv != OK && rv != ERR_NOT_IMPLEMENTED) {
|
|
HistogramCreateSessionFailure(CREATION_ERROR_SETTING_DO_NOT_FRAGMENT);
|
|
return rv;
|
|
}
|
|
|
|
// Set a buffer large enough to contain the initial CWND's worth of packet
|
|
// to work around the problem with CHLO packets being sent out with the
|
|
// wrong encryption level, when the send buffer is full.
|
|
rv = socket->SetSendBufferSize(quic::kMaxPacketSize * 20);
|
|
if (rv != OK) {
|
|
HistogramCreateSessionFailure(CREATION_ERROR_SETTING_SEND_BUFFER);
|
|
return rv;
|
|
}
|
|
|
|
socket->GetLocalAddress(&local_address_);
|
|
if (need_to_check_persisted_supports_quic_) {
|
|
need_to_check_persisted_supports_quic_ = false;
|
|
IPAddress last_address;
|
|
if (http_server_properties_->GetSupportsQuic(&last_address) &&
|
|
last_address == local_address_.address()) {
|
|
require_confirmation_ = false;
|
|
// Clear the persisted IP address, in case the network no longer supports
|
|
// QUIC so the next restart will require confirmation. It will be
|
|
// re-persisted when the first job completes successfully.
|
|
http_server_properties_->SetSupportsQuic(false, last_address);
|
|
}
|
|
}
|
|
|
|
return OK;
|
|
}
|
|
|
|
int QuicStreamFactory::CreateSession(
|
|
const QuicSessionAliasKey& key,
|
|
const quic::QuicTransportVersion& quic_version,
|
|
int cert_verify_flags,
|
|
bool require_confirmation,
|
|
const AddressList& address_list,
|
|
base::TimeTicks dns_resolution_start_time,
|
|
base::TimeTicks dns_resolution_end_time,
|
|
const NetLogWithSource& net_log,
|
|
QuicChromiumClientSession** session,
|
|
NetworkChangeNotifier::NetworkHandle* network) {
|
|
TRACE_EVENT0(kNetTracingCategory, "QuicStreamFactory::CreateSession");
|
|
IPEndPoint addr = *address_list.begin();
|
|
const quic::QuicServerId& server_id = key.server_id();
|
|
std::unique_ptr<DatagramClientSocket> socket(
|
|
CreateSocket(net_log.net_log(), net_log.source()));
|
|
|
|
// Passing in kInvalidNetworkHandle binds socket to default network.
|
|
int rv = ConfigureSocket(socket.get(), addr,
|
|
NetworkChangeNotifier::kInvalidNetworkHandle,
|
|
key.session_key().socket_tag());
|
|
if (rv != OK)
|
|
return rv;
|
|
|
|
if (migrate_sessions_on_network_change_v2_) {
|
|
*network = socket->GetBoundNetwork();
|
|
if (default_network_ == NetworkChangeNotifier::kInvalidNetworkHandle) {
|
|
// QuicStreamFactory may miss the default network signal before its
|
|
// creation, update |default_network_| when the first socket is bound
|
|
// to the default network.
|
|
default_network_ = *network;
|
|
} else {
|
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicStreamFactory.DefaultNetworkMatch",
|
|
default_network_ == *network);
|
|
}
|
|
}
|
|
|
|
if (!helper_.get()) {
|
|
helper_.reset(new QuicChromiumConnectionHelper(clock_, random_generator_));
|
|
}
|
|
|
|
if (!alarm_factory_.get()) {
|
|
alarm_factory_.reset(new QuicChromiumAlarmFactory(
|
|
base::ThreadTaskRunnerHandle::Get().get(), clock_));
|
|
}
|
|
|
|
quic::QuicConnectionId connection_id = random_generator_->RandUint64();
|
|
std::unique_ptr<QuicServerInfo> server_info;
|
|
if (store_server_configs_in_properties_) {
|
|
server_info = std::make_unique<PropertiesBasedQuicServerInfo>(
|
|
server_id, http_server_properties_);
|
|
}
|
|
InitializeCachedStateInCryptoConfig(server_id, server_info, &connection_id);
|
|
|
|
QuicChromiumPacketWriter* writer =
|
|
new QuicChromiumPacketWriter(socket.get(), task_runner_);
|
|
quic::QuicConnection* connection = new quic::QuicConnection(
|
|
connection_id, quic::QuicSocketAddress(quic::QuicSocketAddressImpl(addr)),
|
|
helper_.get(), alarm_factory_.get(), writer, true /* owns_writer */,
|
|
quic::Perspective::IS_CLIENT,
|
|
quic::ParsedQuicVersionVector{
|
|
quic::ParsedQuicVersion(quic::PROTOCOL_QUIC_CRYPTO, quic_version)});
|
|
connection->set_ping_timeout(ping_timeout_);
|
|
connection->SetMaxPacketLength(max_packet_length_);
|
|
|
|
quic::QuicConfig config = config_;
|
|
config.set_max_undecryptable_packets(kMaxUndecryptablePackets);
|
|
config.SetInitialSessionFlowControlWindowToSend(
|
|
kQuicSessionMaxRecvWindowSize);
|
|
config.SetInitialStreamFlowControlWindowToSend(kQuicStreamMaxRecvWindowSize);
|
|
config.SetBytesForConnectionIdToSend(0);
|
|
ConfigureInitialRttEstimate(server_id, &config);
|
|
if (quic_version > quic::QUIC_VERSION_35 &&
|
|
quic_version < quic::QUIC_VERSION_44 &&
|
|
!config.HasClientSentConnectionOption(quic::kNSTP,
|
|
quic::Perspective::IS_CLIENT)) {
|
|
// Enable the no stop waiting frames connection option by default.
|
|
quic::QuicTagVector connection_options = config.SendConnectionOptions();
|
|
connection_options.push_back(quic::kNSTP);
|
|
config.SetConnectionOptionsToSend(connection_options);
|
|
}
|
|
|
|
// Use the factory to create a new socket performance watcher, and pass the
|
|
// ownership to QuicChromiumClientSession.
|
|
std::unique_ptr<SocketPerformanceWatcher> socket_performance_watcher;
|
|
if (socket_performance_watcher_factory_) {
|
|
socket_performance_watcher =
|
|
socket_performance_watcher_factory_->CreateSocketPerformanceWatcher(
|
|
SocketPerformanceWatcherFactory::PROTOCOL_QUIC, address_list);
|
|
}
|
|
|
|
// Wait for handshake confirmation before allowing streams to be created if
|
|
// either this session or the factory require confirmation.
|
|
if (require_confirmation_)
|
|
require_confirmation = true;
|
|
|
|
*session = new QuicChromiumClientSession(
|
|
connection, std::move(socket), this, quic_crypto_client_stream_factory_,
|
|
clock_, transport_security_state_, ssl_config_service_,
|
|
std::move(server_info), key.session_key(), require_confirmation,
|
|
migrate_sessions_early_v2_, migrate_sessions_on_network_change_v2_,
|
|
go_away_on_path_degrading_, default_network_,
|
|
max_time_on_non_default_network_,
|
|
max_migrations_to_non_default_network_on_write_error_,
|
|
max_migrations_to_non_default_network_on_path_degrading_,
|
|
yield_after_packets_, yield_after_duration_,
|
|
headers_include_h2_stream_dependency_, cert_verify_flags, config,
|
|
&crypto_config_, network_connection_.connection_description(),
|
|
dns_resolution_start_time, dns_resolution_end_time, &push_promise_index_,
|
|
push_delegate_, task_runner_, std::move(socket_performance_watcher),
|
|
net_log.net_log());
|
|
|
|
all_sessions_[*session] = key; // owning pointer
|
|
writer->set_delegate(*session);
|
|
|
|
(*session)->Initialize();
|
|
bool closed_during_initialize = !base::ContainsKey(all_sessions_, *session) ||
|
|
!(*session)->connection()->connected();
|
|
UMA_HISTOGRAM_BOOLEAN("Net.QuicSession.ClosedDuringInitializeSession",
|
|
closed_during_initialize);
|
|
if (closed_during_initialize) {
|
|
DLOG(DFATAL) << "Session closed during initialize";
|
|
*session = nullptr;
|
|
return ERR_CONNECTION_CLOSED;
|
|
}
|
|
return OK;
|
|
}
|
|
|
|
void QuicStreamFactory::ActivateSession(const QuicSessionAliasKey& key,
|
|
QuicChromiumClientSession* session) {
|
|
DCHECK(!HasActiveSession(key.session_key()));
|
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicActiveSessions", active_sessions_.size());
|
|
active_sessions_[key.session_key()] = session;
|
|
session_aliases_[session].insert(key);
|
|
const IPEndPoint peer_address =
|
|
session->connection()->peer_address().impl().socket_address();
|
|
DCHECK(!base::ContainsKey(ip_aliases_[peer_address], session));
|
|
ip_aliases_[peer_address].insert(session);
|
|
DCHECK(!base::ContainsKey(session_peer_ip_, session));
|
|
session_peer_ip_[session] = peer_address;
|
|
}
|
|
|
|
void QuicStreamFactory::ConfigureInitialRttEstimate(
|
|
const quic::QuicServerId& server_id,
|
|
quic::QuicConfig* config) {
|
|
const base::TimeDelta* srtt = GetServerNetworkStatsSmoothedRtt(server_id);
|
|
if (srtt != nullptr) {
|
|
SetInitialRttEstimate(*srtt, INITIAL_RTT_CACHED, config);
|
|
return;
|
|
}
|
|
|
|
NetworkChangeNotifier::ConnectionType type =
|
|
network_connection_.connection_type();
|
|
if (type == NetworkChangeNotifier::CONNECTION_2G) {
|
|
SetInitialRttEstimate(base::TimeDelta::FromMilliseconds(1200),
|
|
INITIAL_RTT_CACHED, config);
|
|
return;
|
|
}
|
|
|
|
if (type == NetworkChangeNotifier::CONNECTION_3G) {
|
|
SetInitialRttEstimate(base::TimeDelta::FromMilliseconds(400),
|
|
INITIAL_RTT_CACHED, config);
|
|
return;
|
|
}
|
|
|
|
SetInitialRttEstimate(base::TimeDelta(), INITIAL_RTT_DEFAULT, config);
|
|
}
|
|
|
|
const base::TimeDelta* QuicStreamFactory::GetServerNetworkStatsSmoothedRtt(
|
|
const quic::QuicServerId& server_id) const {
|
|
url::SchemeHostPort server("https", server_id.host(), server_id.port());
|
|
const ServerNetworkStats* stats =
|
|
http_server_properties_->GetServerNetworkStats(server);
|
|
if (stats == nullptr)
|
|
return nullptr;
|
|
return &(stats->srtt);
|
|
}
|
|
|
|
int64_t QuicStreamFactory::GetServerNetworkStatsSmoothedRttInMicroseconds(
|
|
const quic::QuicServerId& server_id) const {
|
|
const base::TimeDelta* srtt = GetServerNetworkStatsSmoothedRtt(server_id);
|
|
return srtt == nullptr ? 0 : srtt->InMicroseconds();
|
|
}
|
|
|
|
bool QuicStreamFactory::WasQuicRecentlyBroken(
|
|
const quic::QuicServerId& server_id) const {
|
|
const AlternativeService alternative_service(
|
|
kProtoQUIC, HostPortPair(server_id.host(), server_id.port()));
|
|
return http_server_properties_->WasAlternativeServiceRecentlyBroken(
|
|
alternative_service);
|
|
}
|
|
|
|
bool QuicStreamFactory::CryptoConfigCacheIsEmpty(
|
|
const quic::QuicServerId& server_id) {
|
|
quic::QuicCryptoClientConfig::CachedState* cached =
|
|
crypto_config_.LookupOrCreate(server_id);
|
|
return cached->IsEmpty();
|
|
}
|
|
|
|
quic::QuicAsyncStatus QuicStreamFactory::StartCertVerifyJob(
|
|
const quic::QuicServerId& server_id,
|
|
int cert_verify_flags,
|
|
const NetLogWithSource& net_log) {
|
|
if (!race_cert_verification_)
|
|
return quic::QUIC_FAILURE;
|
|
quic::QuicCryptoClientConfig::CachedState* cached =
|
|
crypto_config_.LookupOrCreate(server_id);
|
|
if (!cached || cached->certs().empty() ||
|
|
HasActiveCertVerifierJob(server_id)) {
|
|
return quic::QUIC_FAILURE;
|
|
}
|
|
std::unique_ptr<CertVerifierJob> cert_verifier_job(
|
|
new CertVerifierJob(server_id, cert_verify_flags, net_log));
|
|
quic::QuicAsyncStatus status = cert_verifier_job->Run(
|
|
&crypto_config_,
|
|
base::Bind(&QuicStreamFactory::OnCertVerifyJobComplete,
|
|
base::Unretained(this), cert_verifier_job.get()));
|
|
if (status == quic::QUIC_PENDING)
|
|
active_cert_verifier_jobs_[server_id] = std::move(cert_verifier_job);
|
|
return status;
|
|
}
|
|
|
|
void QuicStreamFactory::InitializeCachedStateInCryptoConfig(
|
|
const quic::QuicServerId& server_id,
|
|
const std::unique_ptr<QuicServerInfo>& server_info,
|
|
quic::QuicConnectionId* connection_id) {
|
|
quic::QuicCryptoClientConfig::CachedState* cached =
|
|
crypto_config_.LookupOrCreate(server_id);
|
|
if (cached->has_server_designated_connection_id())
|
|
*connection_id = cached->GetNextServerDesignatedConnectionId();
|
|
|
|
if (!cached->IsEmpty())
|
|
return;
|
|
|
|
if (!server_info || !server_info->Load())
|
|
return;
|
|
|
|
cached->Initialize(server_info->state().server_config,
|
|
server_info->state().source_address_token,
|
|
server_info->state().certs, server_info->state().cert_sct,
|
|
server_info->state().chlo_hash,
|
|
server_info->state().server_config_sig, clock_->WallNow(),
|
|
quic::QuicWallTime::Zero());
|
|
}
|
|
|
|
void QuicStreamFactory::ProcessGoingAwaySession(
|
|
QuicChromiumClientSession* session,
|
|
const quic::QuicServerId& server_id,
|
|
bool session_was_active) {
|
|
if (!http_server_properties_)
|
|
return;
|
|
|
|
const quic::QuicConnectionStats& stats = session->connection()->GetStats();
|
|
const AlternativeService alternative_service(
|
|
kProtoQUIC, HostPortPair(server_id.host(), server_id.port()));
|
|
|
|
url::SchemeHostPort server("https", server_id.host(), server_id.port());
|
|
// Do nothing if QUIC is currently marked as broken.
|
|
if (http_server_properties_->IsAlternativeServiceBroken(alternative_service))
|
|
return;
|
|
|
|
if (session->IsCryptoHandshakeConfirmed()) {
|
|
http_server_properties_->ConfirmAlternativeService(alternative_service);
|
|
ServerNetworkStats network_stats;
|
|
network_stats.srtt = base::TimeDelta::FromMicroseconds(stats.srtt_us);
|
|
network_stats.bandwidth_estimate = stats.estimated_bandwidth;
|
|
http_server_properties_->SetServerNetworkStats(server, network_stats);
|
|
return;
|
|
}
|
|
|
|
http_server_properties_->ClearServerNetworkStats(server);
|
|
|
|
UMA_HISTOGRAM_COUNTS_1M("Net.QuicHandshakeNotConfirmedNumPacketsReceived",
|
|
stats.packets_received);
|
|
|
|
if (!session_was_active)
|
|
return;
|
|
|
|
// TODO(rch): In the special case where the session has received no
|
|
// packets from the peer, we should consider blacklisting this
|
|
// differently so that we still race TCP but we don't consider the
|
|
// session connected until the handshake has been confirmed.
|
|
HistogramBrokenAlternateProtocolLocation(
|
|
BROKEN_ALTERNATE_PROTOCOL_LOCATION_QUIC_STREAM_FACTORY);
|
|
|
|
// Since the session was active, there's no longer an HttpStreamFactory::Job
|
|
// running which can mark it broken, unless the TCP job also fails. So to
|
|
// avoid not using QUIC when we otherwise could, we mark it as recently
|
|
// broken, which means that 0-RTT will be disabled but we'll still race.
|
|
http_server_properties_->MarkAlternativeServiceRecentlyBroken(
|
|
alternative_service);
|
|
}
|
|
|
|
} // namespace net
|