241 lines
7.3 KiB
C++
241 lines
7.3 KiB
C++
// Copyright 2012 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "net/socket/client_socket_handle.h"
|
|
|
|
#include <utility>
|
|
|
|
#include "base/check_op.h"
|
|
#include "base/compiler_specific.h"
|
|
#include "base/functional/bind.h"
|
|
#include "base/functional/callback_helpers.h"
|
|
#include "base/notreached.h"
|
|
#include "net/base/net_errors.h"
|
|
#include "net/base/trace_constants.h"
|
|
#include "net/base/tracing.h"
|
|
#include "net/log/net_log_event_type.h"
|
|
#include "net/socket/client_socket_pool.h"
|
|
#include "net/socket/connect_job.h"
|
|
|
|
namespace net {
|
|
|
|
ClientSocketHandle::ClientSocketHandle()
|
|
: resolve_error_info_(ResolveErrorInfo(OK)) {}
|
|
|
|
ClientSocketHandle::~ClientSocketHandle() {
|
|
Reset();
|
|
}
|
|
|
|
int ClientSocketHandle::Init(
|
|
const ClientSocketPool::GroupId& group_id,
|
|
scoped_refptr<ClientSocketPool::SocketParams> socket_params,
|
|
const absl::optional<NetworkTrafficAnnotationTag>& proxy_annotation_tag,
|
|
RequestPriority priority,
|
|
const SocketTag& socket_tag,
|
|
ClientSocketPool::RespectLimits respect_limits,
|
|
CompletionOnceCallback callback,
|
|
const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback,
|
|
ClientSocketPool* pool,
|
|
const NetLogWithSource& net_log) {
|
|
requesting_source_ = net_log.source();
|
|
|
|
CHECK(group_id.destination().IsValid());
|
|
ResetInternal(true /* cancel */, false /* cancel_connect_job */);
|
|
ResetErrorState();
|
|
pool_ = pool;
|
|
group_id_ = group_id;
|
|
CompletionOnceCallback io_complete_callback =
|
|
base::BindOnce(&ClientSocketHandle::OnIOComplete, base::Unretained(this));
|
|
int rv = pool_->RequestSocket(
|
|
group_id, std::move(socket_params), proxy_annotation_tag, priority,
|
|
socket_tag, respect_limits, this, std::move(io_complete_callback),
|
|
proxy_auth_callback, net_log);
|
|
if (rv == ERR_IO_PENDING) {
|
|
callback_ = std::move(callback);
|
|
} else {
|
|
HandleInitCompletion(rv);
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
void ClientSocketHandle::SetPriority(RequestPriority priority) {
|
|
if (socket_) {
|
|
// The priority of the handle is no longer relevant to the socket pool;
|
|
// just return.
|
|
return;
|
|
}
|
|
|
|
if (pool_)
|
|
pool_->SetPriority(group_id_, this, priority);
|
|
}
|
|
|
|
void ClientSocketHandle::Reset() {
|
|
ResetInternal(true /* cancel */, false /* cancel_connect_job */);
|
|
ResetErrorState();
|
|
}
|
|
|
|
void ClientSocketHandle::ResetAndCloseSocket() {
|
|
if (is_initialized() && socket_)
|
|
socket_->Disconnect();
|
|
ResetInternal(true /* cancel */, true /* cancel_connect_job */);
|
|
ResetErrorState();
|
|
}
|
|
|
|
LoadState ClientSocketHandle::GetLoadState() const {
|
|
CHECK(!is_initialized());
|
|
CHECK(group_id_.destination().IsValid());
|
|
// Because of http://crbug.com/37810 we may not have a pool, but have
|
|
// just a raw socket.
|
|
if (!pool_)
|
|
return LOAD_STATE_IDLE;
|
|
return pool_->GetLoadState(group_id_, this);
|
|
}
|
|
|
|
bool ClientSocketHandle::IsPoolStalled() const {
|
|
if (!pool_)
|
|
return false;
|
|
return pool_->IsStalled();
|
|
}
|
|
|
|
void ClientSocketHandle::AddHigherLayeredPool(HigherLayeredPool* higher_pool) {
|
|
CHECK(higher_pool);
|
|
CHECK(!higher_pool_);
|
|
// TODO(mmenke): |pool_| should only be NULL in tests. Maybe stop doing that
|
|
// so this be be made into a DCHECK, and the same can be done in
|
|
// RemoveHigherLayeredPool?
|
|
if (pool_) {
|
|
pool_->AddHigherLayeredPool(higher_pool);
|
|
higher_pool_ = higher_pool;
|
|
}
|
|
}
|
|
|
|
void ClientSocketHandle::RemoveHigherLayeredPool(
|
|
HigherLayeredPool* higher_pool) {
|
|
CHECK(higher_pool_);
|
|
CHECK_EQ(higher_pool_, higher_pool);
|
|
if (pool_) {
|
|
pool_->RemoveHigherLayeredPool(higher_pool);
|
|
higher_pool_ = nullptr;
|
|
}
|
|
}
|
|
|
|
void ClientSocketHandle::CloseIdleSocketsInGroup(
|
|
const char* net_log_reason_utf8) {
|
|
if (pool_)
|
|
pool_->CloseIdleSocketsInGroup(group_id_, net_log_reason_utf8);
|
|
}
|
|
|
|
bool ClientSocketHandle::GetLoadTimingInfo(
|
|
bool is_reused,
|
|
LoadTimingInfo* load_timing_info) const {
|
|
if (socket_) {
|
|
load_timing_info->socket_log_id = socket_->NetLog().source().id;
|
|
} else {
|
|
// Only return load timing information when there's a socket.
|
|
return false;
|
|
}
|
|
|
|
load_timing_info->socket_reused = is_reused;
|
|
|
|
// No times if the socket is reused.
|
|
if (is_reused)
|
|
return true;
|
|
|
|
load_timing_info->connect_timing = connect_timing_;
|
|
return true;
|
|
}
|
|
|
|
void ClientSocketHandle::SetSocket(std::unique_ptr<StreamSocket> s) {
|
|
socket_ = std::move(s);
|
|
}
|
|
|
|
void ClientSocketHandle::SetAdditionalErrorState(ConnectJob* connect_job) {
|
|
connection_attempts_ = connect_job->GetConnectionAttempts();
|
|
|
|
resolve_error_info_ = connect_job->GetResolveErrorInfo();
|
|
is_ssl_error_ = connect_job->IsSSLError();
|
|
ssl_cert_request_info_ = connect_job->GetCertRequestInfo();
|
|
}
|
|
|
|
std::unique_ptr<StreamSocket> ClientSocketHandle::PassSocket() {
|
|
return std::move(socket_);
|
|
}
|
|
|
|
void ClientSocketHandle::OnIOComplete(int result) {
|
|
TRACE_EVENT0(NetTracingCategory(), "ClientSocketHandle::OnIOComplete");
|
|
CompletionOnceCallback callback = std::move(callback_);
|
|
callback_.Reset();
|
|
HandleInitCompletion(result);
|
|
std::move(callback).Run(result);
|
|
}
|
|
|
|
void ClientSocketHandle::HandleInitCompletion(int result) {
|
|
CHECK_NE(ERR_IO_PENDING, result);
|
|
if (result != OK) {
|
|
if (!socket_.get())
|
|
ResetInternal(false /* cancel */,
|
|
false /* cancel_connect_job */); // Nothing to cancel since
|
|
// the request failed.
|
|
else
|
|
is_initialized_ = true;
|
|
return;
|
|
}
|
|
is_initialized_ = true;
|
|
CHECK_NE(-1, group_generation_)
|
|
<< "Pool should have set |group_generation_| to a valid value.";
|
|
|
|
// Broadcast that the socket has been acquired.
|
|
// TODO(eroman): This logging is not complete, in particular set_socket() and
|
|
// release() socket. It ends up working though, since those methods are being
|
|
// used to layer sockets (and the destination sources are the same).
|
|
DCHECK(socket_.get());
|
|
socket_->NetLog().BeginEventReferencingSource(NetLogEventType::SOCKET_IN_USE,
|
|
requesting_source_);
|
|
}
|
|
|
|
void ClientSocketHandle::ResetInternal(bool cancel, bool cancel_connect_job) {
|
|
DCHECK(cancel || !cancel_connect_job);
|
|
|
|
// Was Init called?
|
|
if (group_id_.destination().IsValid()) {
|
|
// If so, we must have a pool.
|
|
CHECK(pool_);
|
|
if (is_initialized()) {
|
|
if (socket_) {
|
|
socket_->NetLog().EndEvent(NetLogEventType::SOCKET_IN_USE);
|
|
// Release the socket back to the ClientSocketPool so it can be
|
|
// deleted or reused.
|
|
pool_->ReleaseSocket(group_id_, std::move(socket_), group_generation_);
|
|
} else {
|
|
// If the handle has been initialized, we should still have a
|
|
// socket.
|
|
NOTREACHED();
|
|
}
|
|
} else if (cancel) {
|
|
// If we did not get initialized yet and we have a socket
|
|
// request pending, cancel it.
|
|
pool_->CancelRequest(group_id_, this, cancel_connect_job);
|
|
}
|
|
}
|
|
is_initialized_ = false;
|
|
socket_.reset();
|
|
group_id_ = ClientSocketPool::GroupId();
|
|
reuse_type_ = ClientSocketHandle::UNUSED;
|
|
callback_.Reset();
|
|
if (higher_pool_)
|
|
RemoveHigherLayeredPool(higher_pool_);
|
|
pool_ = nullptr;
|
|
idle_time_ = base::TimeDelta();
|
|
connect_timing_ = LoadTimingInfo::ConnectTiming();
|
|
group_generation_ = -1;
|
|
}
|
|
|
|
void ClientSocketHandle::ResetErrorState() {
|
|
resolve_error_info_ = ResolveErrorInfo(OK);
|
|
is_ssl_error_ = false;
|
|
ssl_cert_request_info_ = nullptr;
|
|
}
|
|
|
|
} // namespace net
|