2007-03-22 10:30:00 -07:00
|
|
|
/* vim:set ts=4 sw=4 sts=4 et cin: */
|
2012-05-21 04:12:37 -07:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
#include "nsHttpConnectionMgr.h"
|
|
|
|
#include "nsHttpConnection.h"
|
|
|
|
#include "nsHttpPipeline.h"
|
|
|
|
#include "nsHttpHandler.h"
|
2012-04-25 19:02:12 -07:00
|
|
|
#include "nsIHttpChannelInternal.h"
|
2007-03-22 10:30:00 -07:00
|
|
|
#include "nsNetCID.h"
|
|
|
|
#include "nsCOMPtr.h"
|
2010-11-24 21:20:11 -08:00
|
|
|
#include "nsNetUtil.h"
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
#include "nsIServiceManager.h"
|
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
#include "nsIObserverService.h"
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
#include "nsISSLSocketControl.h"
|
|
|
|
#include "prnetdb.h"
|
|
|
|
#include "mozilla/Telemetry.h"
|
|
|
|
|
Rollup of bug 645263 and bug 646259: Switch to mozilla:: sync primitives. r=cjones,dbaron,doublec,ehsan src=bsmedberg
Bug 645263, part 0: Count sync primitive ctor/dtors. r=dbaron
Bug 645263, part 1: Migrate content/media to mozilla:: sync primitives. r=doublec
Bug 645263, part 2: Migrate modules/plugin to mozilla:: sync primitives. sr=bsmedberg
Bug 645263, part 3: Migrate nsComponentManagerImpl to mozilla:: sync primitives. sr=bsmedberg
Bug 645263, part 4: Migrate everything else to mozilla:: sync primitives. r=dbaron
Bug 645263, part 5: Remove nsAutoLock.*. sr=bsmedberg
Bug 645263, part 6: Make editor test be nicer to deadlock detector. r=ehsan
Bug 645263, part 7: Disable tracemalloc backtraces for xpcshell tests. r=dbaron
Bug 646259: Fix nsCacheService to use a CondVar for notifying. r=cjones
2011-03-31 21:29:02 -07:00
|
|
|
using namespace mozilla;
|
2012-04-25 05:54:42 -07:00
|
|
|
using namespace mozilla::net;
|
Rollup of bug 645263 and bug 646259: Switch to mozilla:: sync primitives. r=cjones,dbaron,doublec,ehsan src=bsmedberg
Bug 645263, part 0: Count sync primitive ctor/dtors. r=dbaron
Bug 645263, part 1: Migrate content/media to mozilla:: sync primitives. r=doublec
Bug 645263, part 2: Migrate modules/plugin to mozilla:: sync primitives. sr=bsmedberg
Bug 645263, part 3: Migrate nsComponentManagerImpl to mozilla:: sync primitives. sr=bsmedberg
Bug 645263, part 4: Migrate everything else to mozilla:: sync primitives. r=dbaron
Bug 645263, part 5: Remove nsAutoLock.*. sr=bsmedberg
Bug 645263, part 6: Make editor test be nicer to deadlock detector. r=ehsan
Bug 645263, part 7: Disable tracemalloc backtraces for xpcshell tests. r=dbaron
Bug 646259: Fix nsCacheService to use a CondVar for notifying. r=cjones
2011-03-31 21:29:02 -07:00
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
// defined by the socket transport service while active
|
|
|
|
extern PRThread *gSocketThread;
|
|
|
|
|
|
|
|
static NS_DEFINE_CID(kSocketTransportServiceCID, NS_SOCKETTRANSPORTSERVICE_CID);
|
|
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS1(nsHttpConnectionMgr, nsIObserver)
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
static void
|
2009-02-22 17:05:28 -08:00
|
|
|
InsertTransactionSorted(nsTArray<nsHttpTransaction*> &pendingQ, nsHttpTransaction *trans)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
// insert into queue with smallest valued number first. search in reverse
|
|
|
|
// order under the assumption that many of the existing transactions will
|
|
|
|
// have the same priority (usually 0).
|
|
|
|
|
2009-02-22 17:05:28 -08:00
|
|
|
for (PRInt32 i=pendingQ.Length()-1; i>=0; --i) {
|
|
|
|
nsHttpTransaction *t = pendingQ[i];
|
2007-03-22 10:30:00 -07:00
|
|
|
if (trans->Priority() >= t->Priority()) {
|
2009-02-22 17:05:28 -08:00
|
|
|
pendingQ.InsertElementAt(i+1, trans);
|
2007-03-22 10:30:00 -07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2009-02-22 17:05:28 -08:00
|
|
|
pendingQ.InsertElementAt(0, trans);
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::nsHttpConnectionMgr()
|
|
|
|
: mRef(0)
|
2011-04-29 12:21:57 -07:00
|
|
|
, mReentrantMonitor("nsHttpConnectionMgr.mReentrantMonitor")
|
2007-03-22 10:30:00 -07:00
|
|
|
, mMaxConns(0)
|
|
|
|
, mMaxPersistConnsPerHost(0)
|
|
|
|
, mMaxPersistConnsPerProxy(0)
|
2011-10-17 07:59:28 -07:00
|
|
|
, mIsShuttingDown(false)
|
2007-03-22 10:30:00 -07:00
|
|
|
, mNumActiveConns(0)
|
|
|
|
, mNumIdleConns(0)
|
2010-10-14 17:28:43 -07:00
|
|
|
, mTimeOfNextWakeUp(LL_MAXUINT)
|
2012-02-23 17:56:57 -08:00
|
|
|
, mReadTimeoutTickArmed(false)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
LOG(("Creating nsHttpConnectionMgr @%x\n", this));
|
2011-08-03 18:59:10 -07:00
|
|
|
mCT.Init();
|
2011-12-13 07:55:50 -08:00
|
|
|
mAlternateProtocolHash.Init(16);
|
2012-01-25 21:15:26 -08:00
|
|
|
mSpdyPreferredHash.Init();
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::~nsHttpConnectionMgr()
|
|
|
|
{
|
|
|
|
LOG(("Destroying nsHttpConnectionMgr @%x\n", this));
|
2012-02-23 17:56:57 -08:00
|
|
|
if (mReadTimeoutTick)
|
|
|
|
mReadTimeoutTick->Cancel();
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2010-11-24 21:20:11 -08:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::EnsureSocketThreadTargetIfOnline()
|
|
|
|
{
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIEventTarget> sts;
|
|
|
|
nsCOMPtr<nsIIOService> ioService = do_GetIOService(&rv);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2011-09-28 23:19:26 -07:00
|
|
|
bool offline = true;
|
2010-11-24 21:20:11 -08:00
|
|
|
ioService->GetOffline(&offline);
|
|
|
|
|
|
|
|
if (!offline) {
|
|
|
|
sts = do_GetService(NS_SOCKETTRANSPORTSERVICE_CONTRACTID, &rv);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-04-29 12:21:57 -07:00
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
2010-11-24 21:20:11 -08:00
|
|
|
|
|
|
|
// do nothing if already initialized or if we've shut down
|
|
|
|
if (mSocketThreadTarget || mIsShuttingDown)
|
|
|
|
return NS_OK;
|
|
|
|
|
|
|
|
mSocketThreadTarget = sts;
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::Init(PRUint16 maxConns,
|
|
|
|
PRUint16 maxPersistConnsPerHost,
|
|
|
|
PRUint16 maxPersistConnsPerProxy,
|
|
|
|
PRUint16 maxRequestDelay,
|
2012-03-22 16:39:31 -07:00
|
|
|
PRUint16 maxPipelinedRequests,
|
|
|
|
PRUint16 maxOptimisticPipelinedRequests)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::Init\n"));
|
|
|
|
|
2010-11-24 21:20:11 -08:00
|
|
|
{
|
2011-04-29 12:21:57 -07:00
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
2010-11-30 10:57:24 -08:00
|
|
|
|
2010-11-24 21:20:11 -08:00
|
|
|
mMaxConns = maxConns;
|
|
|
|
mMaxPersistConnsPerHost = maxPersistConnsPerHost;
|
|
|
|
mMaxPersistConnsPerProxy = maxPersistConnsPerProxy;
|
|
|
|
mMaxRequestDelay = maxRequestDelay;
|
|
|
|
mMaxPipelinedRequests = maxPipelinedRequests;
|
2012-03-22 16:39:31 -07:00
|
|
|
mMaxOptimisticPipelinedRequests = maxOptimisticPipelinedRequests;
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-10-17 07:59:28 -07:00
|
|
|
mIsShuttingDown = false;
|
2010-11-24 21:20:11 -08:00
|
|
|
}
|
2010-11-30 10:57:24 -08:00
|
|
|
|
2010-11-24 21:20:11 -08:00
|
|
|
return EnsureSocketThreadTargetIfOnline();
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::Shutdown()
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::Shutdown\n"));
|
|
|
|
|
2011-04-29 12:21:57 -07:00
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
// do nothing if already shutdown
|
|
|
|
if (!mSocketThreadTarget)
|
|
|
|
return NS_OK;
|
|
|
|
|
|
|
|
nsresult rv = PostEvent(&nsHttpConnectionMgr::OnMsgShutdown);
|
|
|
|
|
|
|
|
// release our reference to the STS to prevent further events
|
|
|
|
// from being posted. this is how we indicate that we are
|
|
|
|
// shutting down.
|
2011-10-17 07:59:28 -07:00
|
|
|
mIsShuttingDown = true;
|
2007-03-22 10:30:00 -07:00
|
|
|
mSocketThreadTarget = 0;
|
|
|
|
|
|
|
|
if (NS_FAILED(rv)) {
|
2009-08-03 16:17:35 -07:00
|
|
|
NS_WARNING("unable to post SHUTDOWN message");
|
2007-03-22 10:30:00 -07:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// wait for shutdown event to complete
|
|
|
|
mon.Wait();
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::PostEvent(nsConnEventHandler handler, PRInt32 iparam, void *vparam)
|
|
|
|
{
|
2010-11-24 21:20:11 -08:00
|
|
|
// This object doesn't get reinitialized if the offline state changes, so our
|
|
|
|
// socket thread target might be uninitialized if we were offline when this
|
|
|
|
// object was being initialized, and we go online later on. This call takes
|
|
|
|
// care of initializing the socket thread target if that's the case.
|
|
|
|
EnsureSocketThreadTargetIfOnline();
|
|
|
|
|
2011-04-29 12:21:57 -07:00
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
nsresult rv;
|
|
|
|
if (!mSocketThreadTarget) {
|
|
|
|
NS_WARNING("cannot post event if not initialized");
|
|
|
|
rv = NS_ERROR_NOT_INITIALIZED;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
nsRefPtr<nsIRunnable> event = new nsConnEvent(this, handler, iparam, vparam);
|
2012-03-22 16:39:31 -07:00
|
|
|
rv = mSocketThreadTarget->Dispatch(event, NS_DISPATCH_NORMAL);
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::PruneDeadConnectionsAfter(PRUint32 timeInSeconds)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::PruneDeadConnectionsAfter\n"));
|
|
|
|
|
|
|
|
if(!mTimer)
|
|
|
|
mTimer = do_CreateInstance("@mozilla.org/timer;1");
|
|
|
|
|
|
|
|
// failure to create a timer is not a fatal error, but idle connections
|
|
|
|
// will not be cleaned up until we try to use them.
|
|
|
|
if (mTimer) {
|
|
|
|
mTimeOfNextWakeUp = timeInSeconds + NowInSeconds();
|
|
|
|
mTimer->Init(this, timeInSeconds*1000, nsITimer::TYPE_ONE_SHOT);
|
|
|
|
} else {
|
|
|
|
NS_WARNING("failed to create: timer for pruning the dead connections!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2011-12-13 07:55:50 -08:00
|
|
|
nsHttpConnectionMgr::ConditionallyStopPruneDeadConnectionsTimer()
|
2010-10-14 17:28:43 -07:00
|
|
|
{
|
2011-12-13 07:55:50 -08:00
|
|
|
// Leave the timer in place if there are connections that potentially
|
|
|
|
// need management
|
|
|
|
if (mNumIdleConns || (mNumActiveConns && gHttpHandler->IsSpdyEnabled()))
|
|
|
|
return;
|
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
LOG(("nsHttpConnectionMgr::StopPruneDeadConnectionsTimer\n"));
|
|
|
|
|
2010-10-28 10:10:03 -07:00
|
|
|
// Reset mTimeOfNextWakeUp so that we can find a new shortest value.
|
|
|
|
mTimeOfNextWakeUp = LL_MAXUINT;
|
2010-10-14 17:28:43 -07:00
|
|
|
if (mTimer) {
|
|
|
|
mTimer->Cancel();
|
|
|
|
mTimer = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-04-11 10:11:09 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ConditionallyStopReadTimeoutTick()
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::ConditionallyStopReadTimeoutTick "
|
|
|
|
"armed=%d active=%d\n", mReadTimeoutTickArmed, mNumActiveConns));
|
|
|
|
|
|
|
|
if (!mReadTimeoutTickArmed)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (mNumActiveConns)
|
|
|
|
return;
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::ConditionallyStopReadTimeoutTick stop==true\n"));
|
|
|
|
|
|
|
|
mReadTimeoutTick->Cancel();
|
|
|
|
mReadTimeoutTickArmed = false;
|
|
|
|
}
|
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// nsHttpConnectionMgr::nsIObserver
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
nsHttpConnectionMgr::Observe(nsISupports *subject,
|
|
|
|
const char *topic,
|
|
|
|
const PRUnichar *data)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::Observe [topic=\"%s\"]\n", topic));
|
|
|
|
|
2012-02-23 17:56:57 -08:00
|
|
|
if (0 == strcmp(topic, NS_TIMER_CALLBACK_TOPIC)) {
|
2010-10-14 17:28:43 -07:00
|
|
|
nsCOMPtr<nsITimer> timer = do_QueryInterface(subject);
|
2012-02-23 17:56:57 -08:00
|
|
|
if (timer == mTimer) {
|
|
|
|
PruneDeadConnections();
|
|
|
|
}
|
|
|
|
else if (timer == mReadTimeoutTick) {
|
|
|
|
ReadTimeoutTick();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_ABORT_IF_FALSE(false, "unexpected timer-callback");
|
|
|
|
LOG(("Unexpected timer object\n"));
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
2010-10-14 17:28:43 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::AddTransaction(nsHttpTransaction *trans, PRInt32 priority)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::AddTransaction [trans=%x %d]\n", trans, priority));
|
|
|
|
|
|
|
|
NS_ADDREF(trans);
|
|
|
|
nsresult rv = PostEvent(&nsHttpConnectionMgr::OnMsgNewTransaction, priority, trans);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
NS_RELEASE(trans);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::RescheduleTransaction(nsHttpTransaction *trans, PRInt32 priority)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::RescheduleTransaction [trans=%x %d]\n", trans, priority));
|
|
|
|
|
|
|
|
NS_ADDREF(trans);
|
|
|
|
nsresult rv = PostEvent(&nsHttpConnectionMgr::OnMsgReschedTransaction, priority, trans);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
NS_RELEASE(trans);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::CancelTransaction(nsHttpTransaction *trans, nsresult reason)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::CancelTransaction [trans=%x reason=%x]\n", trans, reason));
|
|
|
|
|
|
|
|
NS_ADDREF(trans);
|
|
|
|
nsresult rv = PostEvent(&nsHttpConnectionMgr::OnMsgCancelTransaction, reason, trans);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
NS_RELEASE(trans);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::PruneDeadConnections()
|
|
|
|
{
|
|
|
|
return PostEvent(&nsHttpConnectionMgr::OnMsgPruneDeadConnections);
|
|
|
|
}
|
|
|
|
|
2011-07-25 13:25:01 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::ClosePersistentConnections()
|
|
|
|
{
|
|
|
|
return PostEvent(&nsHttpConnectionMgr::OnMsgClosePersistentConnections);
|
|
|
|
}
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::SpeculativeConnect(nsHttpConnectionInfo *ci,
|
|
|
|
nsIInterfaceRequestor *callbacks,
|
|
|
|
nsIEventTarget *target)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::SpeculativeConnect [ci=%s]\n",
|
|
|
|
ci->HashKey().get()));
|
|
|
|
|
|
|
|
PRUint8 caps = ci->GetAnonymous() ? NS_HTTP_LOAD_ANONYMOUS : 0;
|
|
|
|
nsRefPtr<NullHttpTransaction> trans =
|
|
|
|
new NullHttpTransaction(ci, callbacks, target, caps);
|
|
|
|
|
|
|
|
nsresult rv =
|
|
|
|
PostEvent(&nsHttpConnectionMgr::OnMsgSpeculativeConnect, 0, trans);
|
|
|
|
if (NS_SUCCEEDED(rv))
|
|
|
|
trans.forget();
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::GetSocketThreadTarget(nsIEventTarget **target)
|
|
|
|
{
|
2010-11-24 21:20:11 -08:00
|
|
|
// This object doesn't get reinitialized if the offline state changes, so our
|
|
|
|
// socket thread target might be uninitialized if we were offline when this
|
|
|
|
// object was being initialized, and we go online later on. This call takes
|
|
|
|
// care of initializing the socket thread target if that's the case.
|
|
|
|
EnsureSocketThreadTargetIfOnline();
|
|
|
|
|
2011-04-29 12:21:57 -07:00
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
2007-03-22 10:30:00 -07:00
|
|
|
NS_IF_ADDREF(*target = mSocketThreadTarget);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::ReclaimConnection(nsHttpConnection *conn)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::ReclaimConnection [conn=%x]\n", conn));
|
|
|
|
|
|
|
|
NS_ADDREF(conn);
|
|
|
|
nsresult rv = PostEvent(&nsHttpConnectionMgr::OnMsgReclaimConnection, 0, conn);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2012-04-25 19:02:12 -07:00
|
|
|
// A structure used to marshall 2 pointers across the various necessary
|
|
|
|
// threads to complete an HTTP upgrade.
|
|
|
|
class nsCompleteUpgradeData
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
nsCompleteUpgradeData(nsAHttpConnection *aConn,
|
|
|
|
nsIHttpUpgradeListener *aListener)
|
|
|
|
: mConn(aConn), mUpgradeListener(aListener) {}
|
|
|
|
|
|
|
|
nsRefPtr<nsAHttpConnection> mConn;
|
|
|
|
nsCOMPtr<nsIHttpUpgradeListener> mUpgradeListener;
|
|
|
|
};
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::CompleteUpgrade(nsAHttpConnection *aConn,
|
|
|
|
nsIHttpUpgradeListener *aUpgradeListener)
|
|
|
|
{
|
|
|
|
nsCompleteUpgradeData *data =
|
|
|
|
new nsCompleteUpgradeData(aConn, aUpgradeListener);
|
|
|
|
nsresult rv;
|
|
|
|
rv = PostEvent(&nsHttpConnectionMgr::OnMsgCompleteUpgrade, 0, data);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
delete data;
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::UpdateParam(nsParamName name, PRUint16 value)
|
|
|
|
{
|
|
|
|
PRUint32 param = (PRUint32(name) << 16) | PRUint32(value);
|
|
|
|
return PostEvent(&nsHttpConnectionMgr::OnMsgUpdateParam, 0, (void *) param);
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::ProcessPendingQ(nsHttpConnectionInfo *ci)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::ProcessPendingQ [ci=%s]\n", ci->HashKey().get()));
|
|
|
|
|
|
|
|
NS_ADDREF(ci);
|
|
|
|
nsresult rv = PostEvent(&nsHttpConnectionMgr::OnMsgProcessPendingQ, 0, ci);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
NS_RELEASE(ci);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
// Given a nsHttpConnectionInfo find the connection entry object that
|
|
|
|
// contains either the nshttpconnection or nshttptransaction parameter.
|
|
|
|
// Normally this is done by the hashkey lookup of connectioninfo,
|
|
|
|
// but if spdy coalescing is in play it might be found in a redirected
|
|
|
|
// entry
|
|
|
|
nsHttpConnectionMgr::nsConnectionEntry *
|
|
|
|
nsHttpConnectionMgr::LookupConnectionEntry(nsHttpConnectionInfo *ci,
|
|
|
|
nsHttpConnection *conn,
|
|
|
|
nsHttpTransaction *trans)
|
|
|
|
{
|
|
|
|
if (!ci)
|
|
|
|
return nsnull;
|
|
|
|
|
|
|
|
nsConnectionEntry *ent = mCT.Get(ci->HashKey());
|
|
|
|
|
|
|
|
// If there is no sign of coalescing (or it is disabled) then just
|
|
|
|
// return the primary hash lookup
|
2012-01-25 21:15:26 -08:00
|
|
|
if (!ent || !ent->mUsingSpdy || ent->mCoalescingKey.IsEmpty())
|
2011-12-13 07:55:50 -08:00
|
|
|
return ent;
|
|
|
|
|
|
|
|
// If there is no preferred coalescing entry for this host (or the
|
|
|
|
// preferred entry is the one that matched the mCT hash lookup) then
|
|
|
|
// there is only option
|
|
|
|
nsConnectionEntry *preferred = mSpdyPreferredHash.Get(ent->mCoalescingKey);
|
|
|
|
if (!preferred || (preferred == ent))
|
|
|
|
return ent;
|
|
|
|
|
|
|
|
if (conn) {
|
|
|
|
// The connection could be either in preferred or ent. It is most
|
|
|
|
// likely the only active connection in preferred - so start with that.
|
|
|
|
if (preferred->mActiveConns.Contains(conn))
|
|
|
|
return preferred;
|
|
|
|
if (preferred->mIdleConns.Contains(conn))
|
|
|
|
return preferred;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (trans && preferred->mPendingQ.Contains(trans))
|
|
|
|
return preferred;
|
|
|
|
|
|
|
|
// Neither conn nor trans found in preferred, use the default entry
|
|
|
|
return ent;
|
|
|
|
}
|
|
|
|
|
2011-05-16 06:32:37 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::CloseIdleConnection(nsHttpConnection *conn)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
LOG(("nsHttpConnectionMgr::CloseIdleConnection %p conn=%p",
|
|
|
|
this, conn));
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
if (!conn->ConnectionInfo())
|
2011-05-16 06:32:37 -07:00
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
nsConnectionEntry *ent = LookupConnectionEntry(conn->ConnectionInfo(),
|
|
|
|
conn, nsnull);
|
2011-05-16 06:32:37 -07:00
|
|
|
|
|
|
|
if (!ent || !ent->mIdleConns.RemoveElement(conn))
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
|
|
|
|
conn->Close(NS_ERROR_ABORT);
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
mNumIdleConns--;
|
2011-12-13 07:55:50 -08:00
|
|
|
ConditionallyStopPruneDeadConnectionsTimer();
|
2011-05-16 06:32:37 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2012-01-25 21:15:26 -08:00
|
|
|
// This function lets a connection, after completing the NPN phase,
|
|
|
|
// report whether or not it is using spdy through the usingSpdy
|
|
|
|
// argument. It would not be necessary if NPN were driven out of
|
|
|
|
// the connection manager. The connection entry associated with the
|
|
|
|
// connection is then updated to indicate whether or not we want to use
|
|
|
|
// spdy with that host and update the preliminary preferred host
|
|
|
|
// entries used for de-sharding hostsnames.
|
2011-12-13 07:55:50 -08:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ReportSpdyConnection(nsHttpConnection *conn,
|
|
|
|
bool usingSpdy)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
|
|
|
nsConnectionEntry *ent = LookupConnectionEntry(conn->ConnectionInfo(),
|
|
|
|
conn, nsnull);
|
|
|
|
|
|
|
|
if (!ent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
ent->mTestedSpdy = true;
|
|
|
|
|
2012-01-25 21:15:26 -08:00
|
|
|
if (!usingSpdy)
|
2011-12-13 07:55:50 -08:00
|
|
|
return;
|
|
|
|
|
|
|
|
ent->mUsingSpdy = true;
|
|
|
|
|
|
|
|
PRUint32 ttl = conn->TimeToLive();
|
|
|
|
PRUint64 timeOfExpire = NowInSeconds() + ttl;
|
|
|
|
if (!mTimer || timeOfExpire < mTimeOfNextWakeUp)
|
|
|
|
PruneDeadConnectionsAfter(ttl);
|
|
|
|
|
|
|
|
// Lookup preferred directly from the hash instead of using
|
2012-01-25 21:15:26 -08:00
|
|
|
// GetSpdyPreferredEnt() because we want to avoid the cert compatibility
|
2011-12-13 07:55:50 -08:00
|
|
|
// check at this point because the cert is never part of the hash
|
|
|
|
// lookup. Filtering on that has to be done at the time of use
|
|
|
|
// rather than the time of registration (i.e. now).
|
|
|
|
nsConnectionEntry *preferred =
|
|
|
|
mSpdyPreferredHash.Get(ent->mCoalescingKey);
|
|
|
|
|
2012-01-25 21:15:26 -08:00
|
|
|
LOG(("ReportSpdyConnection %s %s ent=%p preferred=%p\n",
|
2011-12-13 07:55:50 -08:00
|
|
|
ent->mConnInfo->Host(), ent->mCoalescingKey.get(),
|
|
|
|
ent, preferred));
|
|
|
|
|
|
|
|
if (!preferred) {
|
2012-01-25 21:15:26 -08:00
|
|
|
if (!ent->mCoalescingKey.IsEmpty()) {
|
|
|
|
mSpdyPreferredHash.Put(ent->mCoalescingKey, ent);
|
|
|
|
ent->mSpdyPreferred = true;
|
|
|
|
preferred = ent;
|
|
|
|
}
|
2011-12-13 07:55:50 -08:00
|
|
|
}
|
|
|
|
else if (preferred != ent) {
|
|
|
|
// A different hostname is the preferred spdy host for this
|
2012-01-25 21:15:26 -08:00
|
|
|
// IP address. That preferred mapping must have been setup while
|
|
|
|
// this connection was negotiating NPN.
|
|
|
|
|
|
|
|
// Call don't reuse on the current connection to shut it down as soon
|
|
|
|
// as possible without causing any errors.
|
|
|
|
// i.e. the current transaction(s) on this connection will be processed
|
|
|
|
// normally, but then it will go away and future connections will be
|
|
|
|
// coalesced through the preferred entry.
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
conn->DontReuse();
|
|
|
|
}
|
|
|
|
|
2012-01-25 21:15:26 -08:00
|
|
|
ProcessAllSpdyPendingQ();
|
2011-12-13 07:55:50 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
nsHttpConnectionMgr::GetSpdyAlternateProtocol(nsACString &hostPortKey)
|
|
|
|
{
|
2012-01-25 21:15:26 -08:00
|
|
|
if (!gHttpHandler->UseAlternateProtocol())
|
|
|
|
return false;
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
// The Alternate Protocol hash is protected under the monitor because
|
|
|
|
// it is read from both the main and the network thread.
|
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
|
|
|
|
|
|
|
return mAlternateProtocolHash.Contains(hostPortKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ReportSpdyAlternateProtocol(nsHttpConnection *conn)
|
|
|
|
{
|
|
|
|
// Check network.http.spdy.use-alternate-protocol pref
|
|
|
|
if (!gHttpHandler->UseAlternateProtocol())
|
|
|
|
return;
|
|
|
|
|
|
|
|
// For now lets not bypass proxies due to the alternate-protocol header
|
|
|
|
if (conn->ConnectionInfo()->UsingHttpProxy())
|
|
|
|
return;
|
|
|
|
|
|
|
|
nsCString hostPortKey(conn->ConnectionInfo()->Host());
|
|
|
|
if (conn->ConnectionInfo()->Port() != 80) {
|
|
|
|
hostPortKey.Append(NS_LITERAL_CSTRING(":"));
|
|
|
|
hostPortKey.AppendInt(conn->ConnectionInfo()->Port());
|
|
|
|
}
|
|
|
|
|
|
|
|
// The Alternate Protocol hash is protected under the monitor because
|
|
|
|
// it is read from both the main and the network thread.
|
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
|
|
|
|
|
|
|
// Check to see if this is already present
|
|
|
|
if (mAlternateProtocolHash.Contains(hostPortKey))
|
|
|
|
return;
|
|
|
|
|
2012-02-27 08:20:29 -08:00
|
|
|
if (mAlternateProtocolHash.Count() > 2000)
|
|
|
|
mAlternateProtocolHash.EnumerateEntries(&TrimAlternateProtocolHash,
|
|
|
|
this);
|
2011-12-13 07:55:50 -08:00
|
|
|
|
2012-02-27 08:20:29 -08:00
|
|
|
mAlternateProtocolHash.PutEntry(hostPortKey);
|
2011-12-13 07:55:50 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::RemoveSpdyAlternateProtocol(nsACString &hostPortKey)
|
|
|
|
{
|
|
|
|
// The Alternate Protocol hash is protected under the monitor because
|
|
|
|
// it is read from both the main and the network thread.
|
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
|
|
|
|
2012-02-27 08:20:29 -08:00
|
|
|
return mAlternateProtocolHash.RemoveEntry(hostPortKey);
|
2011-12-13 07:55:50 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
PLDHashOperator
|
2012-02-27 08:20:29 -08:00
|
|
|
nsHttpConnectionMgr::TrimAlternateProtocolHash(nsCStringHashKey *entry,
|
2011-12-13 07:55:50 -08:00
|
|
|
void *closure)
|
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = (nsHttpConnectionMgr *) closure;
|
|
|
|
|
2012-02-27 08:20:29 -08:00
|
|
|
if (self->mAlternateProtocolHash.Count() > 2000)
|
2011-12-13 07:55:50 -08:00
|
|
|
return PL_DHASH_REMOVE;
|
|
|
|
return PL_DHASH_STOP;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::nsConnectionEntry *
|
2012-01-25 21:15:26 -08:00
|
|
|
nsHttpConnectionMgr::GetSpdyPreferredEnt(nsConnectionEntry *aOriginalEntry)
|
2011-12-13 07:55:50 -08:00
|
|
|
{
|
|
|
|
if (!gHttpHandler->IsSpdyEnabled() ||
|
|
|
|
!gHttpHandler->CoalesceSpdy() ||
|
|
|
|
aOriginalEntry->mCoalescingKey.IsEmpty())
|
|
|
|
return nsnull;
|
|
|
|
|
|
|
|
nsConnectionEntry *preferred =
|
|
|
|
mSpdyPreferredHash.Get(aOriginalEntry->mCoalescingKey);
|
|
|
|
|
|
|
|
// if there is no redirection no cert validation is required
|
|
|
|
if (preferred == aOriginalEntry)
|
|
|
|
return aOriginalEntry;
|
|
|
|
|
|
|
|
// if there is no preferred host or it is no longer using spdy
|
|
|
|
// then skip pooling
|
|
|
|
if (!preferred || !preferred->mUsingSpdy)
|
|
|
|
return nsnull;
|
|
|
|
|
|
|
|
// if there is not an active spdy session in this entry then
|
|
|
|
// we cannot pool because the cert upon activation may not
|
|
|
|
// be the same as the old one. Active sessions are prohibited
|
|
|
|
// from changing certs.
|
|
|
|
|
|
|
|
nsHttpConnection *activeSpdy = nsnull;
|
|
|
|
|
|
|
|
for (PRUint32 index = 0; index < preferred->mActiveConns.Length(); ++index) {
|
|
|
|
if (preferred->mActiveConns[index]->CanDirectlyActivate()) {
|
|
|
|
activeSpdy = preferred->mActiveConns[index];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!activeSpdy) {
|
|
|
|
// remove the preferred status of this entry if it cannot be
|
|
|
|
// used for pooling.
|
|
|
|
preferred->mSpdyPreferred = false;
|
2012-01-25 21:15:26 -08:00
|
|
|
RemoveSpdyPreferredEnt(preferred->mCoalescingKey);
|
2011-12-13 07:55:50 -08:00
|
|
|
LOG(("nsHttpConnectionMgr::GetSpdyPreferredConnection "
|
|
|
|
"preferred host mapping %s to %s removed due to inactivity.\n",
|
|
|
|
aOriginalEntry->mConnInfo->Host(),
|
|
|
|
preferred->mConnInfo->Host()));
|
|
|
|
|
|
|
|
return nsnull;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the server cert supports redirection
|
|
|
|
nsresult rv;
|
|
|
|
bool isJoined = false;
|
|
|
|
|
|
|
|
nsCOMPtr<nsISupports> securityInfo;
|
|
|
|
nsCOMPtr<nsISSLSocketControl> sslSocketControl;
|
|
|
|
nsCAutoString negotiatedNPN;
|
|
|
|
|
|
|
|
activeSpdy->GetSecurityInfo(getter_AddRefs(securityInfo));
|
2012-01-25 21:15:26 -08:00
|
|
|
if (!securityInfo) {
|
|
|
|
NS_WARNING("cannot obtain spdy security info");
|
2011-12-13 07:55:50 -08:00
|
|
|
return nsnull;
|
2012-01-25 21:15:26 -08:00
|
|
|
}
|
2011-12-13 07:55:50 -08:00
|
|
|
|
|
|
|
sslSocketControl = do_QueryInterface(securityInfo, &rv);
|
2012-01-25 21:15:26 -08:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
NS_WARNING("sslSocketControl QI Failed");
|
2011-12-13 07:55:50 -08:00
|
|
|
return nsnull;
|
2012-01-25 21:15:26 -08:00
|
|
|
}
|
2011-12-13 07:55:50 -08:00
|
|
|
|
2012-05-25 14:37:01 -07:00
|
|
|
if (gHttpHandler->SpdyInfo()->ProtocolEnabled(0))
|
|
|
|
rv = sslSocketControl->JoinConnection(gHttpHandler->SpdyInfo()->VersionString[0],
|
|
|
|
aOriginalEntry->mConnInfo->GetHost(),
|
|
|
|
aOriginalEntry->mConnInfo->Port(),
|
|
|
|
&isJoined);
|
|
|
|
else
|
|
|
|
rv = NS_OK; /* simulate failed join */
|
|
|
|
|
|
|
|
// JoinConnection() may have failed due to spdy version level. Try the other
|
|
|
|
// level we support (if any)
|
|
|
|
if (NS_SUCCEEDED(rv) && !isJoined && gHttpHandler->SpdyInfo()->ProtocolEnabled(1)) {
|
|
|
|
rv = sslSocketControl->JoinConnection(gHttpHandler->SpdyInfo()->VersionString[1],
|
|
|
|
aOriginalEntry->mConnInfo->GetHost(),
|
|
|
|
aOriginalEntry->mConnInfo->Port(),
|
|
|
|
&isJoined);
|
|
|
|
}
|
2011-12-13 07:55:50 -08:00
|
|
|
|
|
|
|
if (NS_FAILED(rv) || !isJoined) {
|
|
|
|
LOG(("nsHttpConnectionMgr::GetSpdyPreferredConnection "
|
|
|
|
"Host %s cannot be confirmed to be joined "
|
2012-01-25 21:15:26 -08:00
|
|
|
"with %s connections. rv=%x isJoined=%d",
|
|
|
|
preferred->mConnInfo->Host(), aOriginalEntry->mConnInfo->Host(),
|
|
|
|
rv, isJoined));
|
2011-12-13 07:55:50 -08:00
|
|
|
mozilla::Telemetry::Accumulate(mozilla::Telemetry::SPDY_NPN_JOIN,
|
|
|
|
false);
|
|
|
|
return nsnull;
|
|
|
|
}
|
|
|
|
|
|
|
|
// IP pooling confirmed
|
|
|
|
LOG(("nsHttpConnectionMgr::GetSpdyPreferredConnection "
|
2012-01-25 21:15:26 -08:00
|
|
|
"Host %s has cert valid for %s connections, "
|
|
|
|
"so %s will be coalesced with %s",
|
|
|
|
preferred->mConnInfo->Host(), aOriginalEntry->mConnInfo->Host(),
|
|
|
|
aOriginalEntry->mConnInfo->Host(), preferred->mConnInfo->Host()));
|
2011-12-13 07:55:50 -08:00
|
|
|
mozilla::Telemetry::Accumulate(mozilla::Telemetry::SPDY_NPN_JOIN, true);
|
|
|
|
return preferred;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-01-25 21:15:26 -08:00
|
|
|
nsHttpConnectionMgr::RemoveSpdyPreferredEnt(nsACString &aHashKey)
|
2011-12-13 07:55:50 -08:00
|
|
|
{
|
|
|
|
if (aHashKey.IsEmpty())
|
|
|
|
return;
|
|
|
|
|
|
|
|
mSpdyPreferredHash.Remove(aHashKey);
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// enumeration callbacks
|
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
PLDHashOperator
|
|
|
|
nsHttpConnectionMgr::ProcessOneTransactionCB(const nsACString &key,
|
|
|
|
nsAutoPtr<nsConnectionEntry> &ent,
|
|
|
|
void *closure)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = (nsHttpConnectionMgr *) closure;
|
|
|
|
|
|
|
|
if (self->ProcessPendingQForEntry(ent))
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_STOP;
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_NEXT;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
// If the global number of idle connections is preventing the opening of
|
|
|
|
// new connections to a host without idle connections, then
|
|
|
|
// close them regardless of their TTL
|
2011-08-03 18:59:10 -07:00
|
|
|
PLDHashOperator
|
|
|
|
nsHttpConnectionMgr::PurgeExcessIdleConnectionsCB(const nsACString &key,
|
|
|
|
nsAutoPtr<nsConnectionEntry> &ent,
|
|
|
|
void *closure)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = (nsHttpConnectionMgr *) closure;
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
while (self->mNumIdleConns + self->mNumActiveConns + 1 >= self->mMaxConns) {
|
|
|
|
if (!ent->mIdleConns.Length()) {
|
|
|
|
// There are no idle conns left in this connection entry
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_NEXT;
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
2009-02-22 17:05:28 -08:00
|
|
|
nsHttpConnection *conn = ent->mIdleConns[0];
|
2007-03-22 10:30:00 -07:00
|
|
|
ent->mIdleConns.RemoveElementAt(0);
|
|
|
|
conn->Close(NS_ERROR_ABORT);
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
self->mNumIdleConns--;
|
2011-12-13 07:55:50 -08:00
|
|
|
self->ConditionallyStopPruneDeadConnectionsTimer();
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_STOP;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
PLDHashOperator
|
|
|
|
nsHttpConnectionMgr::PruneDeadConnectionsCB(const nsACString &key,
|
|
|
|
nsAutoPtr<nsConnectionEntry> &ent,
|
|
|
|
void *closure)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = (nsHttpConnectionMgr *) closure;
|
|
|
|
|
|
|
|
LOG((" pruning [ci=%s]\n", ent->mConnInfo->HashKey().get()));
|
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
// Find out how long it will take for next idle connection to not be reusable
|
|
|
|
// anymore.
|
|
|
|
PRUint32 timeToNextExpire = PR_UINT32_MAX;
|
2009-02-22 17:05:28 -08:00
|
|
|
PRInt32 count = ent->mIdleConns.Length();
|
2007-03-22 10:30:00 -07:00
|
|
|
if (count > 0) {
|
|
|
|
for (PRInt32 i=count-1; i>=0; --i) {
|
2009-02-22 17:05:28 -08:00
|
|
|
nsHttpConnection *conn = ent->mIdleConns[i];
|
2007-03-22 10:30:00 -07:00
|
|
|
if (!conn->CanReuse()) {
|
|
|
|
ent->mIdleConns.RemoveElementAt(i);
|
|
|
|
conn->Close(NS_ERROR_ABORT);
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
self->mNumIdleConns--;
|
2010-10-14 17:28:43 -07:00
|
|
|
} else {
|
2011-06-02 05:56:50 -07:00
|
|
|
timeToNextExpire = NS_MIN(timeToNextExpire, conn->TimeToLive());
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
if (ent->mUsingSpdy) {
|
|
|
|
for (PRUint32 index = 0; index < ent->mActiveConns.Length(); ++index) {
|
|
|
|
nsHttpConnection *conn = ent->mActiveConns[index];
|
|
|
|
if (conn->UsingSpdy()) {
|
|
|
|
if (!conn->CanReuse()) {
|
|
|
|
// marking it dont reuse will create an active tear down if
|
|
|
|
// the spdy session is idle.
|
|
|
|
conn->DontReuse();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
timeToNextExpire = NS_MIN(timeToNextExpire,
|
|
|
|
conn->TimeToLive());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
// If time to next expire found is shorter than time to next wake-up, we need to
|
|
|
|
// change the time for next wake-up.
|
2012-01-25 21:15:26 -08:00
|
|
|
if (timeToNextExpire != PR_UINT32_MAX) {
|
2011-12-13 07:55:50 -08:00
|
|
|
PRUint32 now = NowInSeconds();
|
2010-10-14 17:28:43 -07:00
|
|
|
PRUint64 timeOfNextExpire = now + timeToNextExpire;
|
|
|
|
// If pruning of dead connections is not already scheduled to happen
|
|
|
|
// or time found for next connection to expire is is before
|
|
|
|
// mTimeOfNextWakeUp, we need to schedule the pruning to happen
|
|
|
|
// after timeToNextExpire.
|
|
|
|
if (!self->mTimer || timeOfNextExpire < self->mTimeOfNextWakeUp) {
|
|
|
|
self->PruneDeadConnectionsAfter(timeToNextExpire);
|
|
|
|
}
|
2011-12-13 07:55:50 -08:00
|
|
|
} else {
|
|
|
|
self->ConditionallyStopPruneDeadConnectionsTimer();
|
2010-10-14 17:28:43 -07:00
|
|
|
}
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// if this entry is empty, we have too many entries,
|
|
|
|
// and this doesn't represent some painfully determined
|
|
|
|
// red condition, then we can clean it up and restart from
|
|
|
|
// yellow
|
|
|
|
if (ent->PipelineState() != PS_RED &&
|
|
|
|
self->mCT.Count() > 125 &&
|
|
|
|
ent->mIdleConns.Length() == 0 &&
|
2009-02-22 17:05:28 -08:00
|
|
|
ent->mActiveConns.Length() == 0 &&
|
2011-03-31 12:38:30 -07:00
|
|
|
ent->mHalfOpens.Length() == 0 &&
|
2011-12-13 07:55:50 -08:00
|
|
|
ent->mPendingQ.Length() == 0 &&
|
|
|
|
((!ent->mTestedSpdy && !ent->mUsingSpdy) ||
|
|
|
|
!gHttpHandler->IsSpdyEnabled() ||
|
|
|
|
self->mCT.Count() > 300)) {
|
2007-03-22 10:30:00 -07:00
|
|
|
LOG((" removing empty connection entry\n"));
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_REMOVE;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// otherwise use this opportunity to compact our arrays...
|
2007-03-22 10:30:00 -07:00
|
|
|
ent->mIdleConns.Compact();
|
|
|
|
ent->mActiveConns.Compact();
|
|
|
|
ent->mPendingQ.Compact();
|
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_NEXT;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
PLDHashOperator
|
|
|
|
nsHttpConnectionMgr::ShutdownPassCB(const nsACString &key,
|
|
|
|
nsAutoPtr<nsConnectionEntry> &ent,
|
|
|
|
void *closure)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = (nsHttpConnectionMgr *) closure;
|
|
|
|
|
|
|
|
nsHttpTransaction *trans;
|
|
|
|
nsHttpConnection *conn;
|
|
|
|
|
|
|
|
// close all active connections
|
2009-02-22 17:05:28 -08:00
|
|
|
while (ent->mActiveConns.Length()) {
|
|
|
|
conn = ent->mActiveConns[0];
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
ent->mActiveConns.RemoveElementAt(0);
|
|
|
|
self->mNumActiveConns--;
|
|
|
|
|
|
|
|
conn->Close(NS_ERROR_ABORT);
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
// close all idle connections
|
2009-02-22 17:05:28 -08:00
|
|
|
while (ent->mIdleConns.Length()) {
|
|
|
|
conn = ent->mIdleConns[0];
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
ent->mIdleConns.RemoveElementAt(0);
|
|
|
|
self->mNumIdleConns--;
|
|
|
|
|
|
|
|
conn->Close(NS_ERROR_ABORT);
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
}
|
2010-10-14 17:28:43 -07:00
|
|
|
// If all idle connections are removed,
|
|
|
|
// we can stop pruning dead connections.
|
2011-12-13 07:55:50 -08:00
|
|
|
self->ConditionallyStopPruneDeadConnectionsTimer();
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
// close all pending transactions
|
2009-02-22 17:05:28 -08:00
|
|
|
while (ent->mPendingQ.Length()) {
|
|
|
|
trans = ent->mPendingQ[0];
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
ent->mPendingQ.RemoveElementAt(0);
|
|
|
|
|
|
|
|
trans->Close(NS_ERROR_ABORT);
|
|
|
|
NS_RELEASE(trans);
|
|
|
|
}
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
// close all half open tcp connections
|
|
|
|
for (PRInt32 i = ((PRInt32) ent->mHalfOpens.Length()) - 1; i >= 0; i--)
|
|
|
|
ent->mHalfOpens[i]->Abandon();
|
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_REMOVE;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
bool
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnectionMgr::ProcessPendingQForEntry(nsConnectionEntry *ent)
|
|
|
|
{
|
2011-12-13 07:55:50 -08:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
LOG(("nsHttpConnectionMgr::ProcessPendingQForEntry [ci=%s]\n",
|
2012-03-22 16:39:31 -07:00
|
|
|
ent->mConnInfo->HashKey().get()));
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-01-25 21:15:26 -08:00
|
|
|
ProcessSpdyPendingQ(ent);
|
2011-12-13 07:55:50 -08:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
PRUint32 count = ent->mPendingQ.Length();
|
2012-03-22 16:39:31 -07:00
|
|
|
nsHttpTransaction *trans;
|
|
|
|
nsresult rv;
|
2012-03-22 16:39:31 -07:00
|
|
|
bool dispatchedSuccessfully = false;
|
|
|
|
|
|
|
|
// iterate the pending list until one is dispatched successfully. Keep
|
|
|
|
// iterating afterwards only until a transaction fails to dispatch.
|
|
|
|
for (PRUint32 i = 0; i < count; ++i) {
|
2012-03-22 16:39:31 -07:00
|
|
|
trans = ent->mPendingQ[i];
|
|
|
|
|
|
|
|
// When this transaction has already established a half-open
|
|
|
|
// connection, we want to prevent any duplicate half-open
|
|
|
|
// connections from being established and bound to this
|
|
|
|
// transaction. Allow only use of an idle persistent connection
|
|
|
|
// (if found) for transactions referred by a half-open connection.
|
|
|
|
bool alreadyHalfOpen = false;
|
|
|
|
for (PRInt32 j = 0; j < ((PRInt32) ent->mHalfOpens.Length()); ++j) {
|
|
|
|
if (ent->mHalfOpens[j]->Transaction() == trans) {
|
|
|
|
alreadyHalfOpen = true;
|
2007-03-22 10:30:00 -07:00
|
|
|
break;
|
2012-03-22 16:39:31 -07:00
|
|
|
}
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
rv = TryDispatchTransaction(ent, alreadyHalfOpen, trans);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
LOG((" dispatching pending transaction...\n"));
|
2007-03-22 10:30:00 -07:00
|
|
|
ent->mPendingQ.RemoveElementAt(i);
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_RELEASE(trans);
|
2012-03-22 16:39:31 -07:00
|
|
|
|
|
|
|
// reset index and array length after RemoveElelmentAt()
|
|
|
|
dispatchedSuccessfully = true;
|
|
|
|
count = ent->mPendingQ.Length();
|
|
|
|
--i;
|
|
|
|
continue;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
if (dispatchedSuccessfully)
|
|
|
|
return true;
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(count == ((PRInt32) ent->mPendingQ.Length()),
|
|
|
|
"something mutated pending queue from "
|
|
|
|
"GetConnection()");
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
2011-10-17 07:59:28 -07:00
|
|
|
return false;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
bool
|
2012-03-22 16:39:31 -07:00
|
|
|
nsHttpConnectionMgr::ProcessPendingQForEntry(nsHttpConnectionInfo *ci)
|
2012-03-22 16:39:31 -07:00
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsConnectionEntry *ent = mCT.Get(ci->HashKey());
|
|
|
|
if (ent)
|
|
|
|
return ProcessPendingQForEntry(ent);
|
|
|
|
return false;
|
|
|
|
}
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
bool
|
|
|
|
nsHttpConnectionMgr::SupportsPipelining(nsHttpConnectionInfo *ci)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsConnectionEntry *ent = mCT.Get(ci->HashKey());
|
|
|
|
if (ent)
|
|
|
|
return ent->SupportsPipelining();
|
|
|
|
return false;
|
|
|
|
}
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// nsHttpPipelineFeedback used to hold references across events
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
class nsHttpPipelineFeedback
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
nsHttpPipelineFeedback(nsHttpConnectionInfo *ci,
|
|
|
|
nsHttpConnectionMgr::PipelineFeedbackInfoType info,
|
|
|
|
nsHttpConnection *conn, PRUint32 data)
|
|
|
|
: mConnInfo(ci)
|
|
|
|
, mConn(conn)
|
|
|
|
, mInfo(info)
|
|
|
|
, mData(data)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
}
|
2012-03-22 16:39:31 -07:00
|
|
|
|
|
|
|
~nsHttpPipelineFeedback()
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
}
|
2012-03-22 16:39:31 -07:00
|
|
|
|
|
|
|
nsRefPtr<nsHttpConnectionInfo> mConnInfo;
|
|
|
|
nsRefPtr<nsHttpConnection> mConn;
|
|
|
|
nsHttpConnectionMgr::PipelineFeedbackInfoType mInfo;
|
|
|
|
PRUint32 mData;
|
|
|
|
};
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::PipelineFeedbackInfo(nsHttpConnectionInfo *ci,
|
|
|
|
PipelineFeedbackInfoType info,
|
|
|
|
nsHttpConnection *conn,
|
|
|
|
PRUint32 data)
|
2012-03-22 16:39:31 -07:00
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
if (!ci)
|
|
|
|
return;
|
|
|
|
|
|
|
|
// Post this to the socket thread if we are not running there already
|
|
|
|
if (PR_GetCurrentThread() != gSocketThread) {
|
|
|
|
nsHttpPipelineFeedback *fb = new nsHttpPipelineFeedback(ci, info,
|
|
|
|
conn, data);
|
|
|
|
|
|
|
|
nsresult rv = PostEvent(&nsHttpConnectionMgr::OnMsgProcessFeedback,
|
|
|
|
0, fb);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
delete fb;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsConnectionEntry *ent = mCT.Get(ci->HashKey());
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
if (ent)
|
|
|
|
ent->OnPipelineFeedbackInfo(info, conn, data);
|
2012-03-22 16:39:31 -07:00
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:32 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ReportFailedToProcess(nsIURI *uri)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(uri, "precondition");
|
|
|
|
|
|
|
|
nsCAutoString host;
|
|
|
|
PRInt32 port = -1;
|
|
|
|
bool usingSSL = false;
|
2012-04-09 07:22:07 -07:00
|
|
|
bool isHttp = false;
|
2012-03-22 16:39:32 -07:00
|
|
|
|
|
|
|
nsresult rv = uri->SchemeIs("https", &usingSSL);
|
2012-04-09 07:22:07 -07:00
|
|
|
if (NS_SUCCEEDED(rv) && usingSSL)
|
|
|
|
isHttp = true;
|
|
|
|
if (NS_SUCCEEDED(rv) && !isHttp)
|
|
|
|
rv = uri->SchemeIs("http", &isHttp);
|
2012-03-22 16:39:32 -07:00
|
|
|
if (NS_SUCCEEDED(rv))
|
|
|
|
rv = uri->GetAsciiHost(host);
|
|
|
|
if (NS_SUCCEEDED(rv))
|
|
|
|
rv = uri->GetPort(&port);
|
2012-04-09 07:22:07 -07:00
|
|
|
if (NS_FAILED(rv) || !isHttp || host.IsEmpty())
|
2012-03-22 16:39:32 -07:00
|
|
|
return;
|
|
|
|
|
2012-05-24 08:31:53 -07:00
|
|
|
// report the event for all the permutations of anonymous and
|
|
|
|
// private versions of this host
|
2012-03-22 16:39:32 -07:00
|
|
|
nsRefPtr<nsHttpConnectionInfo> ci =
|
|
|
|
new nsHttpConnectionInfo(host, port, nsnull, usingSSL);
|
2012-04-09 07:22:07 -07:00
|
|
|
ci->SetAnonymous(false);
|
2012-05-24 08:31:53 -07:00
|
|
|
ci->SetPrivate(false);
|
2012-04-09 07:22:07 -07:00
|
|
|
PipelineFeedbackInfo(ci, RedCorruptedContent, nsnull, 0);
|
|
|
|
|
2012-05-24 08:31:53 -07:00
|
|
|
ci = ci->Clone();
|
|
|
|
ci->SetAnonymous(false);
|
|
|
|
ci->SetPrivate(true);
|
|
|
|
PipelineFeedbackInfo(ci, RedCorruptedContent, nsnull, 0);
|
|
|
|
|
|
|
|
ci = ci->Clone();
|
|
|
|
ci->SetAnonymous(true);
|
|
|
|
ci->SetPrivate(false);
|
|
|
|
PipelineFeedbackInfo(ci, RedCorruptedContent, nsnull, 0);
|
|
|
|
|
|
|
|
ci = ci->Clone();
|
2012-04-09 07:22:07 -07:00
|
|
|
ci->SetAnonymous(true);
|
2012-05-24 08:31:53 -07:00
|
|
|
ci->SetPrivate(true);
|
2012-03-22 16:39:32 -07:00
|
|
|
PipelineFeedbackInfo(ci, RedCorruptedContent, nsnull, 0);
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
// we're at the active connection limit if any one of the following conditions is true:
|
|
|
|
// (1) at max-connections
|
|
|
|
// (2) keep-alive enabled and at max-persistent-connections-per-server/proxy
|
|
|
|
// (3) keep-alive disabled and at max-connections-per-server
|
2011-09-28 23:19:26 -07:00
|
|
|
bool
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnectionMgr::AtActiveConnectionLimit(nsConnectionEntry *ent, PRUint8 caps)
|
|
|
|
{
|
|
|
|
nsHttpConnectionInfo *ci = ent->mConnInfo;
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::AtActiveConnectionLimit [ci=%s caps=%x]\n",
|
|
|
|
ci->HashKey().get(), caps));
|
|
|
|
|
2011-10-25 08:36:49 -07:00
|
|
|
// update maxconns if potentially limited by the max socket count
|
|
|
|
// this requires a dynamic reduction in the max socket count to a point
|
|
|
|
// lower than the max-connections pref.
|
|
|
|
PRUint32 maxSocketCount = gHttpHandler->MaxSocketCount();
|
|
|
|
if (mMaxConns > maxSocketCount) {
|
|
|
|
mMaxConns = maxSocketCount;
|
|
|
|
LOG(("nsHttpConnectionMgr %p mMaxConns dynamically reduced to %u",
|
|
|
|
this, mMaxConns));
|
|
|
|
}
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
// If there are more active connections than the global limit, then we're
|
|
|
|
// done. Purging idle connections won't get us below it.
|
2007-03-22 10:30:00 -07:00
|
|
|
if (mNumActiveConns >= mMaxConns) {
|
|
|
|
LOG((" num active conns == max conns\n"));
|
2011-10-17 07:59:28 -07:00
|
|
|
return true;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2012-07-20 05:40:13 -07:00
|
|
|
PRInt32 totalCount = ent->mActiveConns.Length();
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
// Add in the in-progress tcp connections, we will assume they are
|
|
|
|
// keepalive enabled.
|
2012-05-22 13:12:40 -07:00
|
|
|
PRUint32 pendingHalfOpens = 0;
|
2012-07-20 05:40:13 -07:00
|
|
|
for (PRUint32 i = 0; i < ent->mHalfOpens.Length(); ++i) {
|
2012-05-22 13:12:40 -07:00
|
|
|
nsHalfOpenSocket *halfOpen = ent->mHalfOpens[i];
|
|
|
|
|
|
|
|
// Exclude half-open's that has already created a usable connection.
|
|
|
|
// This prevents the limit being stuck on ipv6 connections that
|
|
|
|
// eventually time out after typical 21 seconds of no ACK+SYN reply.
|
|
|
|
if (halfOpen->HasConnected())
|
|
|
|
continue;
|
|
|
|
|
|
|
|
++pendingHalfOpens;
|
|
|
|
}
|
2011-03-31 12:38:30 -07:00
|
|
|
|
2012-05-22 13:12:40 -07:00
|
|
|
totalCount += pendingHalfOpens;
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
PRUint16 maxPersistConns;
|
|
|
|
|
2012-07-20 05:40:13 -07:00
|
|
|
if (ci->UsingHttpProxy() && !ci->UsingConnect())
|
2007-03-22 10:30:00 -07:00
|
|
|
maxPersistConns = mMaxPersistConnsPerProxy;
|
2012-07-20 05:40:13 -07:00
|
|
|
else
|
2007-03-22 10:30:00 -07:00
|
|
|
maxPersistConns = mMaxPersistConnsPerHost;
|
2012-07-20 05:40:13 -07:00
|
|
|
|
|
|
|
LOG((" connection count = %d, limit %d\n", totalCount, maxPersistConns));
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
// use >= just to be safe
|
2012-07-20 05:40:13 -07:00
|
|
|
bool result = (totalCount >= maxPersistConns);
|
2012-05-22 13:12:40 -07:00
|
|
|
LOG((" result: %s", result ? "true" : "false"));
|
|
|
|
return result;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2011-07-22 09:31:37 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ClosePersistentConnections(nsConnectionEntry *ent)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::ClosePersistentConnections [ci=%s]\n",
|
|
|
|
ent->mConnInfo->HashKey().get()));
|
|
|
|
while (ent->mIdleConns.Length()) {
|
|
|
|
nsHttpConnection *conn = ent->mIdleConns[0];
|
|
|
|
ent->mIdleConns.RemoveElementAt(0);
|
|
|
|
mNumIdleConns--;
|
|
|
|
conn->Close(NS_ERROR_ABORT);
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
PRInt32 activeCount = ent->mActiveConns.Length();
|
|
|
|
for (PRInt32 i=0; i < activeCount; i++)
|
|
|
|
ent->mActiveConns[i]->DontReuse();
|
|
|
|
}
|
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
PLDHashOperator
|
|
|
|
nsHttpConnectionMgr::ClosePersistentConnectionsCB(const nsACString &key,
|
|
|
|
nsAutoPtr<nsConnectionEntry> &ent,
|
|
|
|
void *closure)
|
2011-07-25 13:25:01 -07:00
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = static_cast<nsHttpConnectionMgr *>(closure);
|
|
|
|
self->ClosePersistentConnections(ent);
|
2011-08-03 18:59:10 -07:00
|
|
|
return PL_DHASH_NEXT;
|
2011-07-25 13:25:01 -07:00
|
|
|
}
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
bool
|
|
|
|
nsHttpConnectionMgr::RestrictConnections(nsConnectionEntry *ent)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
|
|
|
// If this host is trying to negotiate a SPDY session right now,
|
|
|
|
// don't create any new ssl connections until the result of the
|
|
|
|
// negotiation is known.
|
|
|
|
|
2012-05-03 17:32:12 -07:00
|
|
|
bool doRestrict = ent->mConnInfo->UsingSSL() &&
|
2012-04-25 05:54:42 -07:00
|
|
|
gHttpHandler->IsSpdyEnabled() &&
|
|
|
|
(!ent->mTestedSpdy || ent->mUsingSpdy) &&
|
|
|
|
(ent->mHalfOpens.Length() || ent->mActiveConns.Length());
|
2012-05-03 17:32:12 -07:00
|
|
|
|
|
|
|
// If there are no restrictions, we are done
|
|
|
|
if (!doRestrict)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// If the restriction is based on a tcp handshake in progress
|
|
|
|
// let that connect and then see if it was SPDY or not
|
|
|
|
if (ent->mHalfOpens.Length())
|
|
|
|
return true;
|
|
|
|
|
|
|
|
// There is a concern that a host is using a mix of HTTP/1 and SPDY.
|
|
|
|
// In that case we don't want to restrict connections just because
|
|
|
|
// there is a single active HTTP/1 session in use.
|
|
|
|
if (ent->mUsingSpdy && ent->mActiveConns.Length()) {
|
|
|
|
bool confirmedRestrict = false;
|
|
|
|
for (PRUint32 index = 0; index < ent->mActiveConns.Length(); ++index) {
|
|
|
|
nsHttpConnection *conn = ent->mActiveConns[index];
|
2012-05-21 14:09:25 -07:00
|
|
|
if (!conn->ReportedNPN() || conn->CanDirectlyActivate()) {
|
2012-05-03 17:32:12 -07:00
|
|
|
confirmedRestrict = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
doRestrict = confirmedRestrict;
|
|
|
|
if (!confirmedRestrict) {
|
|
|
|
LOG(("nsHttpConnectionMgr spdy connection restriction to "
|
|
|
|
"%s bypassed.\n", ent->mConnInfo->Host()));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return doRestrict;
|
2012-04-25 05:54:42 -07:00
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
bool
|
|
|
|
nsHttpConnectionMgr::MakeNewConnection(nsConnectionEntry *ent,
|
|
|
|
nsHttpTransaction *trans)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
LOG(("nsHttpConnectionMgr::MakeNewConnection %p ent=%p trans=%p",
|
|
|
|
this, ent, trans));
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
PRUint32 halfOpenLength = ent->mHalfOpens.Length();
|
|
|
|
for (PRUint32 i = 0; i < halfOpenLength; i++) {
|
|
|
|
if (ent->mHalfOpens[i]->IsSpeculative()) {
|
|
|
|
// We've found a speculative connection in the half
|
|
|
|
// open list. Remove the speculative bit from it and that
|
|
|
|
// connection can later be used for this transaction
|
|
|
|
// (or another one in the pending queue) - we don't
|
|
|
|
// need to open a new connection here.
|
|
|
|
LOG(("nsHttpConnectionMgr::MakeNewConnection [ci = %s]\n"
|
|
|
|
"Found a speculative half open connection\n",
|
|
|
|
ent->mConnInfo->HashKey().get()));
|
|
|
|
ent->mHalfOpens[i]->SetSpeculative(false);
|
|
|
|
|
|
|
|
// return true because we have essentially opened a new connection
|
|
|
|
// by converting a speculative half-open to general use
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// If this host is trying to negotiate a SPDY session right now,
|
|
|
|
// don't create any new connections until the result of the
|
|
|
|
// negotiation is known.
|
2012-04-25 05:54:42 -07:00
|
|
|
if (!(trans->Caps() & NS_HTTP_DISALLOW_SPDY) && RestrictConnections(ent))
|
2012-03-22 16:39:31 -07:00
|
|
|
return false;
|
2011-03-31 12:38:30 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// We need to make a new connection. If that is going to exceed the
|
|
|
|
// global connection limit then try and free up some room by closing
|
|
|
|
// an idle connection to another host. We know it won't select "ent"
|
|
|
|
// beacuse we have already determined there are no idle connections
|
|
|
|
// to our destination
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
if ((mNumIdleConns + mNumActiveConns + 1 >= mMaxConns) && mNumIdleConns)
|
|
|
|
mCT.Enumerate(PurgeExcessIdleConnectionsCB, this);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
if (AtActiveConnectionLimit(ent, trans->Caps()))
|
|
|
|
return false;
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
nsresult rv = CreateTransport(ent, trans, trans->Caps(), false);
|
2012-03-22 16:39:31 -07:00
|
|
|
if (NS_FAILED(rv)) /* hard failure */
|
|
|
|
trans->Close(rv);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
bool
|
|
|
|
nsHttpConnectionMgr::AddToShortestPipeline(nsConnectionEntry *ent,
|
|
|
|
nsHttpTransaction *trans,
|
|
|
|
nsHttpTransaction::Classifier classification,
|
|
|
|
PRUint16 depthLimit)
|
|
|
|
{
|
|
|
|
if (classification == nsAHttpTransaction::CLASS_SOLO)
|
|
|
|
return false;
|
2011-12-13 07:55:50 -08:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
PRUint32 maxdepth = ent->MaxPipelineDepth(classification);
|
|
|
|
if (maxdepth == 0) {
|
|
|
|
ent->CreditPenalty();
|
|
|
|
maxdepth = ent->MaxPipelineDepth(classification);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ent->PipelineState() == PS_RED)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (ent->PipelineState() == PS_YELLOW && ent->mYellowConnection)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// The maximum depth of a pipeline in yellow is 1 pipeline of
|
|
|
|
// depth 2 for entire CI. When that transaction completes successfully
|
|
|
|
// we transition to green and that expands the allowed depth
|
|
|
|
// to any number of pipelines of up to depth 4. When a transaction
|
|
|
|
// queued at position 3 or deeper succeeds we open it all the way
|
|
|
|
// up to depths limited only by configuration. The staggered start
|
|
|
|
// in green is simply because a successful yellow test of depth=2
|
|
|
|
// might really just be a race condition (i.e. depth=1 from the
|
|
|
|
// server's point of view), while depth=3 is a stronger indicator -
|
|
|
|
// keeping the pipelines to a modest depth during that period limits
|
|
|
|
// the damage if something is going to go wrong.
|
|
|
|
|
|
|
|
maxdepth = PR_MIN(maxdepth, depthLimit);
|
|
|
|
|
|
|
|
if (maxdepth < 2)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
nsAHttpTransaction *activeTrans;
|
|
|
|
|
|
|
|
nsHttpConnection *bestConn = nsnull;
|
|
|
|
PRUint32 activeCount = ent->mActiveConns.Length();
|
|
|
|
PRUint32 bestConnLength = 0;
|
|
|
|
PRUint32 connLength;
|
|
|
|
|
|
|
|
for (PRUint32 i = 0; i < activeCount; ++i) {
|
|
|
|
nsHttpConnection *conn = ent->mActiveConns[i];
|
|
|
|
if (!conn->SupportsPipelining())
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (conn->Classification() != classification)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
activeTrans = conn->Transaction();
|
|
|
|
if (!activeTrans ||
|
|
|
|
activeTrans->IsDone() ||
|
|
|
|
NS_FAILED(activeTrans->Status()))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
connLength = activeTrans->PipelineDepth();
|
|
|
|
|
|
|
|
if (maxdepth <= connLength)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!bestConn || (connLength < bestConnLength)) {
|
|
|
|
bestConn = conn;
|
|
|
|
bestConnLength = connLength;
|
2011-12-13 07:55:50 -08:00
|
|
|
}
|
2012-03-22 16:39:31 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!bestConn)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
activeTrans = bestConn->Transaction();
|
|
|
|
nsresult rv = activeTrans->AddTransaction(trans);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
LOG((" scheduling trans %p on pipeline at position %d\n",
|
|
|
|
trans, trans->PipelinePosition()));
|
|
|
|
|
|
|
|
if ((ent->PipelineState() == PS_YELLOW) && (trans->PipelinePosition() > 1))
|
|
|
|
ent->SetYellowConnection(bestConn);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
nsHttpConnectionMgr::IsUnderPressure(nsConnectionEntry *ent,
|
|
|
|
nsHttpTransaction::Classifier classification)
|
|
|
|
{
|
|
|
|
// A connection entry is declared to be "under pressure" if most of the
|
|
|
|
// allowed parallel connections are already used up. In that case we want to
|
|
|
|
// favor existing pipelines over more parallelism so as to reserve any
|
|
|
|
// unused parallel connections for types that don't have existing pipelines.
|
|
|
|
//
|
2012-06-22 12:01:00 -07:00
|
|
|
// The definition of connection pressure is a pretty liberal one here - that
|
2012-03-22 16:39:31 -07:00
|
|
|
// is why we are using the more restrictive maxPersist* counters.
|
|
|
|
//
|
|
|
|
// Pipelines are also favored when the requested classification is already
|
|
|
|
// using 3 or more of the connections. Failure to do this could result in
|
|
|
|
// one class (e.g. images) establishing self replenishing queues on all the
|
|
|
|
// connections that would starve the other transaction types.
|
|
|
|
|
|
|
|
PRInt32 currentConns = ent->mActiveConns.Length();
|
|
|
|
PRInt32 maxConns =
|
2012-06-22 12:01:00 -07:00
|
|
|
(ent->mConnInfo->UsingHttpProxy() && !ent->mConnInfo->UsingConnect()) ?
|
2012-03-22 16:39:31 -07:00
|
|
|
mMaxPersistConnsPerProxy : mMaxPersistConnsPerHost;
|
|
|
|
|
|
|
|
// Leave room for at least 3 distinct types to operate concurrently,
|
|
|
|
// this satisfies the typical {html, js/css, img} page.
|
|
|
|
if (currentConns >= (maxConns - 2))
|
|
|
|
return true; /* prefer pipeline */
|
|
|
|
|
|
|
|
PRInt32 sameClass = 0;
|
|
|
|
for (PRInt32 i = 0; i < currentConns; ++i)
|
|
|
|
if (classification == ent->mActiveConns[i]->Classification())
|
|
|
|
if (++sameClass == 3)
|
|
|
|
return true; /* prefer pipeline */
|
|
|
|
|
|
|
|
return false; /* normal behavior */
|
|
|
|
}
|
|
|
|
|
|
|
|
// returns OK if a connection is found for the transaction
|
|
|
|
// and the transaction is started.
|
|
|
|
// returns ERROR_NOT_AVAILABLE if no connection can be found and it
|
|
|
|
// should be queued
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::TryDispatchTransaction(nsConnectionEntry *ent,
|
|
|
|
bool onlyReusedConnection,
|
|
|
|
nsHttpTransaction *trans)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
LOG(("nsHttpConnectionMgr::TryDispatchTransaction without conn "
|
|
|
|
"[ci=%s caps=%x]\n",
|
|
|
|
ent->mConnInfo->HashKey().get(), PRUint32(trans->Caps())));
|
|
|
|
|
|
|
|
nsHttpTransaction::Classifier classification = trans->Classification();
|
|
|
|
PRUint8 caps = trans->Caps();
|
|
|
|
|
|
|
|
// no keep-alive means no pipelines either
|
|
|
|
if (!(caps & NS_HTTP_ALLOW_KEEPALIVE))
|
|
|
|
caps = caps & ~NS_HTTP_ALLOW_PIPELINING;
|
|
|
|
|
|
|
|
// 0 - If this should use spdy then dispatch it post haste.
|
|
|
|
// 1 - If there is connection pressure then see if we can pipeline this on
|
|
|
|
// a connection of a matching type instead of using a new conn
|
|
|
|
// 2 - If there is an idle connection, use it!
|
|
|
|
// 3 - if class == reval or script and there is an open conn of that type
|
|
|
|
// then pipeline onto shortest pipeline of that class if limits allow
|
|
|
|
// 4 - If we aren't up against our connection limit,
|
|
|
|
// then open a new one
|
|
|
|
// 5 - Try a pipeline if we haven't already - this will be unusual because
|
|
|
|
// it implies a low connection pressure situation where
|
|
|
|
// MakeNewConnection() failed.. that is possible, but unlikely, due to
|
|
|
|
// global limits
|
|
|
|
// 6 - no connection is available - queue it
|
|
|
|
|
|
|
|
bool attemptedOptimisticPipeline = !(caps & NS_HTTP_ALLOW_PIPELINING);
|
|
|
|
|
|
|
|
// step 0
|
|
|
|
// look for existing spdy connection - that's always best because it is
|
|
|
|
// essentially pipelining without head of line blocking
|
|
|
|
|
|
|
|
if (!(caps & NS_HTTP_DISALLOW_SPDY) && gHttpHandler->IsSpdyEnabled()) {
|
|
|
|
nsRefPtr<nsHttpConnection> conn = GetSpdyPreferredConn(ent);
|
|
|
|
if (conn) {
|
|
|
|
LOG((" dispatch to spdy: [conn=%x]\n", conn.get()));
|
|
|
|
DispatchTransaction(ent, trans, conn);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// step 1
|
|
|
|
// If connection pressure, then we want to favor pipelining of any kind
|
|
|
|
if (IsUnderPressure(ent, classification) && !attemptedOptimisticPipeline) {
|
|
|
|
attemptedOptimisticPipeline = true;
|
|
|
|
if (AddToShortestPipeline(ent, trans,
|
|
|
|
classification,
|
|
|
|
mMaxOptimisticPipelinedRequests)) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// step 2
|
|
|
|
// consider an idle persistent connection
|
|
|
|
if (caps & NS_HTTP_ALLOW_KEEPALIVE) {
|
|
|
|
nsRefPtr<nsHttpConnection> conn;
|
2009-02-22 17:05:28 -08:00
|
|
|
while (!conn && (ent->mIdleConns.Length() > 0)) {
|
|
|
|
conn = ent->mIdleConns[0];
|
2012-03-22 16:39:31 -07:00
|
|
|
ent->mIdleConns.RemoveElementAt(0);
|
|
|
|
mNumIdleConns--;
|
|
|
|
nsHttpConnection *temp = conn;
|
|
|
|
NS_RELEASE(temp);
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
// we check if the connection can be reused before even checking if
|
|
|
|
// it is a "matching" connection.
|
|
|
|
if (!conn->CanReuse()) {
|
2012-03-22 16:39:31 -07:00
|
|
|
LOG((" dropping stale connection: [conn=%x]\n", conn.get()));
|
2007-03-22 10:30:00 -07:00
|
|
|
conn->Close(NS_ERROR_ABORT);
|
2012-03-22 16:39:31 -07:00
|
|
|
conn = nsnull;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
2011-05-16 06:32:37 -07:00
|
|
|
else {
|
2012-03-22 16:39:31 -07:00
|
|
|
LOG((" reusing connection [conn=%x]\n", conn.get()));
|
2011-05-16 06:32:37 -07:00
|
|
|
conn->EndIdleMonitoring();
|
|
|
|
}
|
|
|
|
|
2010-10-28 10:10:03 -07:00
|
|
|
// If there are no idle connections left at all, we need to make
|
|
|
|
// sure that we are not pruning dead connections anymore.
|
2011-12-13 07:55:50 -08:00
|
|
|
ConditionallyStopPruneDeadConnectionsTimer();
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
2012-03-22 16:39:31 -07:00
|
|
|
if (conn) {
|
|
|
|
// This will update the class of the connection to be the class of
|
|
|
|
// the transaction dispatched on it.
|
|
|
|
AddActiveConn(conn, ent);
|
|
|
|
DispatchTransaction(ent, trans, conn);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// step 3
|
|
|
|
// consider pipelining scripts and revalidations
|
|
|
|
if (!attemptedOptimisticPipeline &&
|
|
|
|
(classification == nsHttpTransaction::CLASS_REVALIDATION ||
|
|
|
|
classification == nsHttpTransaction::CLASS_SCRIPT)) {
|
|
|
|
attemptedOptimisticPipeline = true;
|
|
|
|
if (AddToShortestPipeline(ent, trans,
|
|
|
|
classification,
|
|
|
|
mMaxOptimisticPipelinedRequests)) {
|
|
|
|
return NS_OK;
|
2011-12-13 07:55:50 -08:00
|
|
|
}
|
2011-04-01 09:23:48 -07:00
|
|
|
}
|
2011-03-31 12:38:30 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// step 4
|
|
|
|
if (!onlyReusedConnection && MakeNewConnection(ent, trans)) {
|
|
|
|
return NS_ERROR_IN_PROGRESS;
|
2011-12-13 07:55:50 -08:00
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// step 5
|
|
|
|
if (caps & NS_HTTP_ALLOW_PIPELINING) {
|
|
|
|
if (AddToShortestPipeline(ent, trans,
|
|
|
|
classification,
|
|
|
|
mMaxPipelinedRequests)) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// step 6
|
|
|
|
return NS_ERROR_NOT_AVAILABLE; /* queue it */
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::DispatchTransaction(nsConnectionEntry *ent,
|
2012-03-22 16:39:31 -07:00
|
|
|
nsHttpTransaction *trans,
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnection *conn)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
PRUint8 caps = trans->Caps();
|
|
|
|
PRInt32 priority = trans->Priority();
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::DispatchTransaction "
|
|
|
|
"[ci=%s trans=%x caps=%x conn=%x priority=%d]\n",
|
|
|
|
ent->mConnInfo->HashKey().get(), trans, caps, conn, priority));
|
2011-12-13 07:55:50 -08:00
|
|
|
|
|
|
|
if (conn->UsingSpdy()) {
|
|
|
|
LOG(("Spdy Dispatch Transaction via Activate(). Transaction host = %s,"
|
|
|
|
"Connection host = %s\n",
|
2012-03-22 16:39:31 -07:00
|
|
|
trans->ConnectionInfo()->Host(),
|
2011-12-13 07:55:50 -08:00
|
|
|
conn->ConnectionInfo()->Host()));
|
2012-03-22 16:39:31 -07:00
|
|
|
nsresult rv = conn->Activate(trans, caps, priority);
|
2011-12-13 07:55:50 -08:00
|
|
|
NS_ABORT_IF_FALSE(NS_SUCCEEDED(rv), "SPDY Cannot Fail Dispatch");
|
|
|
|
return rv;
|
|
|
|
}
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(conn && !conn->Transaction(),
|
|
|
|
"DispatchTranaction() on non spdy active connection");
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
if (!(caps & NS_HTTP_ALLOW_PIPELINING))
|
|
|
|
conn->Classify(nsAHttpTransaction::CLASS_SOLO);
|
|
|
|
else
|
|
|
|
conn->Classify(trans->Classification());
|
|
|
|
|
|
|
|
return DispatchAbstractTransaction(ent, trans, caps, conn, priority);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Use this method for dispatching nsAHttpTransction's. It can only safely be
|
|
|
|
// used upon first use of a connection when NPN has not negotiated SPDY vs
|
|
|
|
// HTTP/1 yet as multiplexing onto an existing SPDY session requires a
|
|
|
|
// concrete nsHttpTransaction
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::DispatchAbstractTransaction(nsConnectionEntry *ent,
|
|
|
|
nsAHttpTransaction *aTrans,
|
|
|
|
PRUint8 caps,
|
|
|
|
nsHttpConnection *conn,
|
|
|
|
PRInt32 priority)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(!conn->UsingSpdy(),
|
|
|
|
"Spdy Must Not Use DispatchAbstractTransaction");
|
|
|
|
LOG(("nsHttpConnectionMgr::DispatchAbstractTransaction "
|
|
|
|
"[ci=%s trans=%x caps=%x conn=%x]\n",
|
|
|
|
ent->mConnInfo->HashKey().get(), aTrans, caps, conn));
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
/* Use pipeline datastructure even if connection does not currently qualify
|
|
|
|
to pipeline this transaction because a different pipeline-eligible
|
2012-06-06 12:47:45 -07:00
|
|
|
transaction might be placed on the active connection. Make an exception
|
|
|
|
for CLASS_SOLO as that connection will never pipeline until it goes
|
|
|
|
quiescent */
|
2012-03-22 16:39:31 -07:00
|
|
|
|
2012-06-06 12:47:45 -07:00
|
|
|
nsRefPtr<nsAHttpTransaction> transaction;
|
|
|
|
nsresult rv;
|
|
|
|
if (conn->Classification() != nsAHttpTransaction::CLASS_SOLO) {
|
|
|
|
LOG((" using pipeline datastructure.\n"));
|
|
|
|
nsRefPtr<nsHttpPipeline> pipeline;
|
|
|
|
rv = BuildPipeline(ent, aTrans, getter_AddRefs(pipeline));
|
|
|
|
if (!NS_SUCCEEDED(rv))
|
|
|
|
return rv;
|
|
|
|
transaction = pipeline;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
LOG((" not using pipeline datastructure due to class solo.\n"));
|
|
|
|
transaction = aTrans;
|
|
|
|
}
|
2011-12-13 07:55:50 -08:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsRefPtr<nsConnectionHandle> handle = new nsConnectionHandle(conn);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
// give the transaction the indirect reference to the connection.
|
2012-06-06 12:47:45 -07:00
|
|
|
transaction->SetConnection(handle);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-06-06 12:47:45 -07:00
|
|
|
rv = conn->Activate(transaction, caps, priority);
|
2007-03-22 10:30:00 -07:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
LOG((" conn->Activate failed [rv=%x]\n", rv));
|
|
|
|
ent->mActiveConns.RemoveElement(conn);
|
2012-03-22 16:39:31 -07:00
|
|
|
if (conn == ent->mYellowConnection)
|
|
|
|
ent->OnYellowComplete();
|
2007-03-22 10:30:00 -07:00
|
|
|
mNumActiveConns--;
|
2012-04-11 10:11:09 -07:00
|
|
|
ConditionallyStopReadTimeoutTick();
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
// sever back references to connection, and do so without triggering
|
|
|
|
// a call to ReclaimConnection ;-)
|
2012-06-06 12:47:45 -07:00
|
|
|
transaction->SetConnection(nsnull);
|
2007-03-22 10:30:00 -07:00
|
|
|
NS_RELEASE(handle->mConn);
|
|
|
|
// destroy the connection
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
}
|
|
|
|
|
2012-06-06 12:47:45 -07:00
|
|
|
// As transaction goes out of scope it will drop the last refernece to the
|
2012-03-22 16:39:31 -07:00
|
|
|
// pipeline if activation failed, in which case this will destroy
|
2007-03-22 10:30:00 -07:00
|
|
|
// the pipeline, which will cause each the transactions owned by the
|
|
|
|
// pipeline to be restarted.
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsresult
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnectionMgr::BuildPipeline(nsConnectionEntry *ent,
|
|
|
|
nsAHttpTransaction *firstTrans,
|
|
|
|
nsHttpPipeline **result)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
/* form a pipeline here even if nothing is pending so that we
|
|
|
|
can stream-feed it as new transactions arrive */
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
/* the first transaction can go in unconditionally - 1 transaction
|
|
|
|
on a nsHttpPipeline object is not a real HTTP pipeline */
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsRefPtr<nsHttpPipeline> pipeline = new nsHttpPipeline();
|
2012-03-22 16:39:31 -07:00
|
|
|
pipeline->AddTransaction(firstTrans);
|
2007-03-22 10:30:00 -07:00
|
|
|
NS_ADDREF(*result = pipeline);
|
2012-03-22 16:39:31 -07:00
|
|
|
return NS_OK;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::ProcessNewTransaction(nsHttpTransaction *trans)
|
|
|
|
{
|
2011-03-31 12:38:30 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
// since "adds" and "cancels" are processed asynchronously and because
|
|
|
|
// various events might trigger an "add" directly on the socket thread,
|
|
|
|
// we must take care to avoid dispatching a transaction that has already
|
|
|
|
// been canceled (see bug 190001).
|
|
|
|
if (NS_FAILED(trans->Status())) {
|
|
|
|
LOG((" transaction was canceled... dropping event!\n"));
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsresult rv = NS_OK;
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnectionInfo *ci = trans->ConnectionInfo();
|
|
|
|
NS_ASSERTION(ci, "no connection info");
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
nsConnectionEntry *ent = GetOrCreateConnectionEntry(ci);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
// SPDY coalescing of hostnames means we might redirect from this
|
|
|
|
// connection entry onto the preferred one.
|
2012-01-25 21:15:26 -08:00
|
|
|
nsConnectionEntry *preferredEntry = GetSpdyPreferredEnt(ent);
|
2011-12-13 07:55:50 -08:00
|
|
|
if (preferredEntry && (preferredEntry != ent)) {
|
|
|
|
LOG(("nsHttpConnectionMgr::ProcessNewTransaction trans=%p "
|
|
|
|
"redirected via coalescing from %s to %s\n", trans,
|
|
|
|
ent->mConnInfo->Host(), preferredEntry->mConnInfo->Host()));
|
|
|
|
|
|
|
|
ent = preferredEntry;
|
|
|
|
}
|
|
|
|
|
2011-07-22 09:31:37 -07:00
|
|
|
// If we are doing a force reload then close out any existing conns
|
|
|
|
// to this host so that changes in DNS, LBs, etc.. are reflected
|
2012-03-22 16:39:31 -07:00
|
|
|
if (trans->Caps() & NS_HTTP_CLEAR_KEEPALIVES)
|
2011-07-22 09:31:37 -07:00
|
|
|
ClosePersistentConnections(ent);
|
|
|
|
|
2011-04-08 11:37:16 -07:00
|
|
|
// Check if the transaction already has a sticky reference to a connection.
|
|
|
|
// If so, then we can just use it directly by transferring its reference
|
2012-03-22 16:39:31 -07:00
|
|
|
// to the new connection variable instead of searching for a new one
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-04-08 11:37:16 -07:00
|
|
|
nsAHttpConnection *wrappedConnection = trans->Connection();
|
2012-03-22 16:39:31 -07:00
|
|
|
nsRefPtr<nsHttpConnection> conn;
|
|
|
|
if (wrappedConnection)
|
|
|
|
conn = dont_AddRef(wrappedConnection->TakeHttpConnection());
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-04-08 11:37:16 -07:00
|
|
|
if (conn) {
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ASSERTION(trans->Caps() & NS_HTTP_STICKY_CONNECTION,
|
|
|
|
"unexpected caps");
|
|
|
|
NS_ABORT_IF_FALSE(((PRInt32)ent->mActiveConns.IndexOf(conn)) != -1,
|
|
|
|
"Sticky Connection Not In Active List");
|
2007-03-22 10:30:00 -07:00
|
|
|
trans->SetConnection(nsnull);
|
2012-03-22 16:39:31 -07:00
|
|
|
rv = DispatchTransaction(ent, trans, conn);
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
else
|
2012-03-22 16:39:31 -07:00
|
|
|
rv = TryDispatchTransaction(ent, false, trans);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
LOG((" adding transaction to pending queue "
|
|
|
|
"[trans=%p pending-count=%u]\n",
|
|
|
|
trans, ent->mPendingQ.Length()+1));
|
2007-03-22 10:30:00 -07:00
|
|
|
// put this transaction on the pending queue...
|
|
|
|
InsertTransactionSorted(ent->mPendingQ, trans);
|
|
|
|
NS_ADDREF(trans);
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::AddActiveConn(nsHttpConnection *conn,
|
|
|
|
nsConnectionEntry *ent)
|
|
|
|
{
|
|
|
|
NS_ADDREF(conn);
|
|
|
|
ent->mActiveConns.AppendElement(conn);
|
|
|
|
mNumActiveConns++;
|
|
|
|
ActivateTimeoutTick();
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::StartedConnect()
|
|
|
|
{
|
|
|
|
mNumActiveConns++;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::RecvdConnect()
|
|
|
|
{
|
|
|
|
mNumActiveConns--;
|
2012-04-11 10:11:09 -07:00
|
|
|
ConditionallyStopReadTimeoutTick();
|
2012-03-22 16:39:31 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::CreateTransport(nsConnectionEntry *ent,
|
2012-04-25 05:54:42 -07:00
|
|
|
nsAHttpTransaction *trans,
|
|
|
|
PRUint8 caps,
|
|
|
|
bool speculative)
|
2012-03-22 16:39:31 -07:00
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
nsRefPtr<nsHalfOpenSocket> sock = new nsHalfOpenSocket(ent, trans, caps);
|
2012-03-22 16:39:31 -07:00
|
|
|
nsresult rv = sock->SetupPrimaryStreams();
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
ent->mHalfOpens.AppendElement(sock);
|
2012-04-25 05:54:42 -07:00
|
|
|
if (speculative)
|
|
|
|
sock->SetSpeculative(true);
|
2012-03-22 16:39:31 -07:00
|
|
|
return NS_OK;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
// This function tries to dispatch the pending spdy transactions on
|
|
|
|
// the connection entry sent in as an argument. It will do so on the
|
|
|
|
// active spdy connection either in that same entry or in the
|
|
|
|
// redirected 'preferred' entry for the same coalescing hash key if
|
|
|
|
// coalescing is enabled.
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ProcessSpdyPendingQ(nsConnectionEntry *ent)
|
|
|
|
{
|
|
|
|
nsHttpConnection *conn = GetSpdyPreferredConn(ent);
|
|
|
|
if (!conn)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (PRInt32 index = ent->mPendingQ.Length() - 1;
|
|
|
|
index >= 0 && conn->CanDirectlyActivate();
|
|
|
|
--index) {
|
|
|
|
nsHttpTransaction *trans = ent->mPendingQ[index];
|
|
|
|
|
|
|
|
if (!(trans->Caps() & NS_HTTP_ALLOW_KEEPALIVE) ||
|
|
|
|
trans->Caps() & NS_HTTP_DISALLOW_SPDY)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
ent->mPendingQ.RemoveElementAt(index);
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
nsresult rv = DispatchTransaction(ent, trans, conn);
|
2012-01-25 21:15:26 -08:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
// this cannot happen, but if due to some bug it does then
|
|
|
|
// close the transaction
|
|
|
|
NS_ABORT_IF_FALSE(false, "Dispatch SPDY Transaction");
|
|
|
|
LOG(("ProcessSpdyPendingQ Dispatch Transaction failed trans=%p\n",
|
|
|
|
trans));
|
|
|
|
trans->Close(rv);
|
|
|
|
}
|
2011-12-13 07:55:50 -08:00
|
|
|
NS_RELEASE(trans);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
PLDHashOperator
|
|
|
|
nsHttpConnectionMgr::ProcessSpdyPendingQCB(const nsACString &key,
|
|
|
|
nsAutoPtr<nsConnectionEntry> &ent,
|
|
|
|
void *closure)
|
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = (nsHttpConnectionMgr *) closure;
|
|
|
|
self->ProcessSpdyPendingQ(ent);
|
|
|
|
return PL_DHASH_NEXT;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-01-25 21:15:26 -08:00
|
|
|
nsHttpConnectionMgr::ProcessAllSpdyPendingQ()
|
2011-12-13 07:55:50 -08:00
|
|
|
{
|
|
|
|
mCT.Enumerate(ProcessSpdyPendingQCB, this);
|
|
|
|
}
|
|
|
|
|
|
|
|
nsHttpConnection *
|
|
|
|
nsHttpConnectionMgr::GetSpdyPreferredConn(nsConnectionEntry *ent)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
NS_ABORT_IF_FALSE(ent, "no connection entry");
|
|
|
|
|
2012-01-25 21:15:26 -08:00
|
|
|
nsConnectionEntry *preferred = GetSpdyPreferredEnt(ent);
|
2011-12-13 07:55:50 -08:00
|
|
|
|
|
|
|
// this entry is spdy-enabled if it is involved in a redirect
|
|
|
|
if (preferred)
|
2012-01-25 21:15:26 -08:00
|
|
|
// all new connections for this entry will use spdy too
|
2011-12-13 07:55:50 -08:00
|
|
|
ent->mUsingSpdy = true;
|
|
|
|
else
|
|
|
|
preferred = ent;
|
|
|
|
|
|
|
|
nsHttpConnection *conn = nsnull;
|
|
|
|
|
|
|
|
if (preferred->mUsingSpdy) {
|
|
|
|
for (PRUint32 index = 0;
|
|
|
|
index < preferred->mActiveConns.Length();
|
|
|
|
++index) {
|
|
|
|
if (preferred->mActiveConns[index]->CanDirectlyActivate()) {
|
|
|
|
conn = preferred->mActiveConns[index];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgShutdown(PRInt32, void *)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2007-03-22 10:30:00 -07:00
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgShutdown\n"));
|
|
|
|
|
2011-08-03 18:59:10 -07:00
|
|
|
mCT.Enumerate(ShutdownPassCB, this);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2012-02-23 17:56:57 -08:00
|
|
|
if (mReadTimeoutTick) {
|
|
|
|
mReadTimeoutTick->Cancel();
|
|
|
|
mReadTimeoutTick = nsnull;
|
|
|
|
mReadTimeoutTickArmed = false;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
// signal shutdown complete
|
2011-04-29 12:21:57 -07:00
|
|
|
ReentrantMonitorAutoEnter mon(mReentrantMonitor);
|
2007-03-22 10:30:00 -07:00
|
|
|
mon.Notify();
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgNewTransaction(PRInt32 priority, void *param)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgNewTransaction [trans=%p]\n", param));
|
|
|
|
|
|
|
|
nsHttpTransaction *trans = (nsHttpTransaction *) param;
|
|
|
|
trans->SetPriority(priority);
|
|
|
|
nsresult rv = ProcessNewTransaction(trans);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
trans->Close(rv); // for whatever its worth
|
|
|
|
NS_RELEASE(trans);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgReschedTransaction(PRInt32 priority, void *param)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgReschedTransaction [trans=%p]\n", param));
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
nsHttpTransaction *trans = (nsHttpTransaction *) param;
|
|
|
|
trans->SetPriority(priority);
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
nsConnectionEntry *ent = LookupConnectionEntry(trans->ConnectionInfo(),
|
|
|
|
nsnull, trans);
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
if (ent) {
|
|
|
|
PRInt32 index = ent->mPendingQ.IndexOf(trans);
|
|
|
|
if (index >= 0) {
|
|
|
|
ent->mPendingQ.RemoveElementAt(index);
|
|
|
|
InsertTransactionSorted(ent->mPendingQ, trans);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_RELEASE(trans);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgCancelTransaction(PRInt32 reason, void *param)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2007-03-22 10:30:00 -07:00
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgCancelTransaction [trans=%p]\n", param));
|
|
|
|
|
|
|
|
nsHttpTransaction *trans = (nsHttpTransaction *) param;
|
|
|
|
//
|
|
|
|
// if the transaction owns a connection and the transaction is not done,
|
|
|
|
// then ask the connection to close the transaction. otherwise, close the
|
|
|
|
// transaction directly (removing it from the pending queue first).
|
|
|
|
//
|
|
|
|
nsAHttpConnection *conn = trans->Connection();
|
|
|
|
if (conn && !trans->IsDone())
|
|
|
|
conn->CloseTransaction(trans, reason);
|
|
|
|
else {
|
2011-12-13 07:55:50 -08:00
|
|
|
nsConnectionEntry *ent = LookupConnectionEntry(trans->ConnectionInfo(),
|
|
|
|
nsnull, trans);
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
if (ent) {
|
|
|
|
PRInt32 index = ent->mPendingQ.IndexOf(trans);
|
|
|
|
if (index >= 0) {
|
|
|
|
ent->mPendingQ.RemoveElementAt(index);
|
|
|
|
nsHttpTransaction *temp = trans;
|
|
|
|
NS_RELEASE(temp); // b/c NS_RELEASE nulls its argument!
|
|
|
|
}
|
|
|
|
}
|
|
|
|
trans->Close(reason);
|
|
|
|
}
|
|
|
|
NS_RELEASE(trans);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgProcessPendingQ(PRInt32, void *param)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnectionInfo *ci = (nsHttpConnectionInfo *) param;
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgProcessPendingQ [ci=%s]\n", ci->HashKey().get()));
|
|
|
|
|
|
|
|
// start by processing the queue identified by the given connection info.
|
2011-08-03 18:59:10 -07:00
|
|
|
nsConnectionEntry *ent = mCT.Get(ci->HashKey());
|
2007-03-22 10:30:00 -07:00
|
|
|
if (!(ent && ProcessPendingQForEntry(ent))) {
|
|
|
|
// if we reach here, it means that we couldn't dispatch a transaction
|
|
|
|
// for the specified connection info. walk the connection table...
|
|
|
|
mCT.Enumerate(ProcessOneTransactionCB, this);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_RELEASE(ci);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgPruneDeadConnections(PRInt32, void *)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2007-03-22 10:30:00 -07:00
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgPruneDeadConnections\n"));
|
|
|
|
|
2010-10-28 10:10:03 -07:00
|
|
|
// Reset mTimeOfNextWakeUp so that we can find a new shortest value.
|
|
|
|
mTimeOfNextWakeUp = LL_MAXUINT;
|
2011-12-13 07:55:50 -08:00
|
|
|
|
|
|
|
// check canreuse() for all idle connections plus any active connections on
|
|
|
|
// connection entries that are using spdy.
|
|
|
|
if (mNumIdleConns || (mNumActiveConns && gHttpHandler->IsSpdyEnabled()))
|
2007-03-22 10:30:00 -07:00
|
|
|
mCT.Enumerate(PruneDeadConnectionsCB, this);
|
|
|
|
}
|
|
|
|
|
2011-07-25 13:25:01 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgClosePersistentConnections(PRInt32, void *)
|
|
|
|
{
|
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgClosePersistentConnections\n"));
|
|
|
|
|
|
|
|
mCT.Enumerate(ClosePersistentConnectionsCB, this);
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgReclaimConnection(PRInt32, void *param)
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
2007-03-22 10:30:00 -07:00
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgReclaimConnection [conn=%p]\n", param));
|
|
|
|
|
|
|
|
nsHttpConnection *conn = (nsHttpConnection *) param;
|
|
|
|
|
|
|
|
//
|
|
|
|
// 1) remove the connection from the active list
|
|
|
|
// 2) if keep-alive, add connection to idle list
|
|
|
|
// 3) post event to process the pending transaction queue
|
|
|
|
//
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
nsConnectionEntry *ent = LookupConnectionEntry(conn->ConnectionInfo(),
|
|
|
|
conn, nsnull);
|
|
|
|
nsHttpConnectionInfo *ci = nsnull;
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
if (!ent) {
|
|
|
|
// this should never happen
|
2012-01-25 21:15:26 -08:00
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgReclaimConnection ent == null\n"));
|
|
|
|
NS_ABORT_IF_FALSE(false, "no connection entry");
|
2011-12-13 07:55:50 -08:00
|
|
|
NS_ADDREF(ci = conn->ConnectionInfo());
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_ADDREF(ci = ent->mConnInfo);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
// If the connection is in the active list, remove that entry
|
|
|
|
// and the reference held by the mActiveConns list.
|
|
|
|
// This is never the final reference on conn as the event context
|
|
|
|
// is also holding one that is released at the end of this function.
|
2011-12-13 07:55:50 -08:00
|
|
|
|
2012-01-25 21:15:26 -08:00
|
|
|
if (ent->mUsingSpdy) {
|
|
|
|
// Spdy connections aren't reused in the traditional HTTP way in
|
|
|
|
// the idleconns list, they are actively multplexed as active
|
|
|
|
// conns. Even when they have 0 transactions on them they are
|
|
|
|
// considered active connections. So when one is reclaimed it
|
|
|
|
// is really complete and is meant to be shut down and not
|
|
|
|
// reused.
|
2011-12-13 07:55:50 -08:00
|
|
|
conn->DontReuse();
|
2012-01-25 21:15:26 -08:00
|
|
|
}
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
if (ent->mActiveConns.RemoveElement(conn)) {
|
2012-03-22 16:39:31 -07:00
|
|
|
if (conn == ent->mYellowConnection)
|
|
|
|
ent->OnYellowComplete();
|
2011-03-31 12:38:30 -07:00
|
|
|
nsHttpConnection *temp = conn;
|
|
|
|
NS_RELEASE(temp);
|
|
|
|
mNumActiveConns--;
|
2012-04-11 10:11:09 -07:00
|
|
|
ConditionallyStopReadTimeoutTick();
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
if (conn->CanReuse()) {
|
|
|
|
LOG((" adding connection to idle list\n"));
|
2011-04-08 11:36:47 -07:00
|
|
|
// Keep The idle connection list sorted with the connections that
|
|
|
|
// have moved the largest data pipelines at the front because these
|
|
|
|
// connections have the largest cwnds on the server.
|
|
|
|
|
|
|
|
// The linear search is ok here because the number of idleconns
|
|
|
|
// in a single entry is generally limited to a small number (i.e. 6)
|
|
|
|
|
2011-04-19 16:28:38 -07:00
|
|
|
PRUint32 idx;
|
2011-04-08 11:36:47 -07:00
|
|
|
for (idx = 0; idx < ent->mIdleConns.Length(); idx++) {
|
|
|
|
nsHttpConnection *idleConn = ent->mIdleConns[idx];
|
|
|
|
if (idleConn->MaxBytesRead() < conn->MaxBytesRead())
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
NS_ADDREF(conn);
|
2011-04-08 11:36:47 -07:00
|
|
|
ent->mIdleConns.InsertElementAt(idx, conn);
|
2007-03-22 10:30:00 -07:00
|
|
|
mNumIdleConns++;
|
2011-05-16 06:32:37 -07:00
|
|
|
conn->BeginIdleMonitoring();
|
2011-04-08 11:36:47 -07:00
|
|
|
|
2010-10-14 17:28:43 -07:00
|
|
|
// If the added connection was first idle connection or has shortest
|
2011-12-13 07:55:50 -08:00
|
|
|
// time to live among the watched connections, pruning dead
|
2010-10-14 17:28:43 -07:00
|
|
|
// connections needs to be done when it can't be reused anymore.
|
|
|
|
PRUint32 timeToLive = conn->TimeToLive();
|
|
|
|
if(!mTimer || NowInSeconds() + timeToLive < mTimeOfNextWakeUp)
|
|
|
|
PruneDeadConnectionsAfter(timeToLive);
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
LOG((" connection cannot be reused; closing connection\n"));
|
|
|
|
conn->Close(NS_ERROR_ABORT);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
OnMsgProcessPendingQ(NS_OK, ci); // releases |ci|
|
|
|
|
NS_RELEASE(conn);
|
|
|
|
}
|
|
|
|
|
2012-04-25 19:02:12 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgCompleteUpgrade(PRInt32, void *param)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
nsCompleteUpgradeData *data = (nsCompleteUpgradeData *) param;
|
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgCompleteUpgrade "
|
|
|
|
"this=%p conn=%p listener=%p\n", this, data->mConn.get(),
|
|
|
|
data->mUpgradeListener.get()));
|
|
|
|
|
|
|
|
nsCOMPtr<nsISocketTransport> socketTransport;
|
|
|
|
nsCOMPtr<nsIAsyncInputStream> socketIn;
|
|
|
|
nsCOMPtr<nsIAsyncOutputStream> socketOut;
|
|
|
|
|
|
|
|
nsresult rv;
|
|
|
|
rv = data->mConn->TakeTransport(getter_AddRefs(socketTransport),
|
|
|
|
getter_AddRefs(socketIn),
|
|
|
|
getter_AddRefs(socketOut));
|
|
|
|
|
|
|
|
if (NS_SUCCEEDED(rv))
|
|
|
|
data->mUpgradeListener->OnTransportAvailable(socketTransport,
|
|
|
|
socketIn,
|
|
|
|
socketOut);
|
|
|
|
delete data;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgUpdateParam(PRInt32, void *param)
|
|
|
|
{
|
|
|
|
PRUint16 name = (NS_PTR_TO_INT32(param) & 0xFFFF0000) >> 16;
|
|
|
|
PRUint16 value = NS_PTR_TO_INT32(param) & 0x0000FFFF;
|
|
|
|
|
|
|
|
switch (name) {
|
|
|
|
case MAX_CONNECTIONS:
|
|
|
|
mMaxConns = value;
|
|
|
|
break;
|
|
|
|
case MAX_PERSISTENT_CONNECTIONS_PER_HOST:
|
|
|
|
mMaxPersistConnsPerHost = value;
|
|
|
|
break;
|
|
|
|
case MAX_PERSISTENT_CONNECTIONS_PER_PROXY:
|
|
|
|
mMaxPersistConnsPerProxy = value;
|
|
|
|
break;
|
|
|
|
case MAX_REQUEST_DELAY:
|
|
|
|
mMaxRequestDelay = value;
|
|
|
|
break;
|
|
|
|
case MAX_PIPELINED_REQUESTS:
|
|
|
|
mMaxPipelinedRequests = value;
|
|
|
|
break;
|
2012-03-22 16:39:31 -07:00
|
|
|
case MAX_OPTIMISTIC_PIPELINED_REQUESTS:
|
|
|
|
mMaxOptimisticPipelinedRequests = value;
|
|
|
|
break;
|
2007-03-22 10:30:00 -07:00
|
|
|
default:
|
|
|
|
NS_NOTREACHED("unexpected parameter name");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
// nsHttpConnectionMgr::nsConnectionEntry
|
|
|
|
nsHttpConnectionMgr::nsConnectionEntry::~nsConnectionEntry()
|
|
|
|
{
|
|
|
|
if (mSpdyPreferred)
|
2012-01-25 21:15:26 -08:00
|
|
|
gHttpHandler->ConnMgr()->RemoveSpdyPreferredEnt(mCoalescingKey);
|
2011-12-13 07:55:50 -08:00
|
|
|
|
|
|
|
NS_RELEASE(mConnInfo);
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgProcessFeedback(PRInt32, void *param)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
nsHttpPipelineFeedback *fb = (nsHttpPipelineFeedback *)param;
|
|
|
|
|
|
|
|
PipelineFeedbackInfo(fb->mConnInfo, fb->mInfo, fb->mConn, fb->mData);
|
|
|
|
delete fb;
|
|
|
|
}
|
|
|
|
|
2012-02-23 17:56:57 -08:00
|
|
|
// Read Timeout Tick handlers
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ActivateTimeoutTick()
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
LOG(("nsHttpConnectionMgr::ActivateTimeoutTick() "
|
|
|
|
"this=%p mReadTimeoutTick=%p\n"));
|
|
|
|
|
|
|
|
// The timer tick should be enabled if it is not already pending.
|
|
|
|
// Upon running the tick will rearm itself if there are active
|
|
|
|
// connections available.
|
|
|
|
|
|
|
|
if (mReadTimeoutTick && mReadTimeoutTickArmed)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!mReadTimeoutTick) {
|
|
|
|
mReadTimeoutTick = do_CreateInstance(NS_TIMER_CONTRACTID);
|
|
|
|
if (!mReadTimeoutTick) {
|
|
|
|
NS_WARNING("failed to create timer for http timeout management");
|
|
|
|
return;
|
|
|
|
}
|
2012-04-13 12:47:43 -07:00
|
|
|
mReadTimeoutTick->SetTarget(mSocketThreadTarget);
|
2012-02-23 17:56:57 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_ABORT_IF_FALSE(!mReadTimeoutTickArmed, "timer tick armed");
|
|
|
|
mReadTimeoutTickArmed = true;
|
2012-03-22 16:39:31 -07:00
|
|
|
mReadTimeoutTick->Init(this, 1000, nsITimer::TYPE_REPEATING_SLACK);
|
2012-02-23 17:56:57 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::ReadTimeoutTick()
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
NS_ABORT_IF_FALSE(mReadTimeoutTick, "no readtimeout tick");
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::ReadTimeoutTick active=%d\n",
|
|
|
|
mNumActiveConns));
|
|
|
|
|
|
|
|
mCT.Enumerate(ReadTimeoutTickCB, this);
|
|
|
|
}
|
|
|
|
|
|
|
|
PLDHashOperator
|
|
|
|
nsHttpConnectionMgr::ReadTimeoutTickCB(const nsACString &key,
|
|
|
|
nsAutoPtr<nsConnectionEntry> &ent,
|
|
|
|
void *closure)
|
|
|
|
{
|
|
|
|
nsHttpConnectionMgr *self = (nsHttpConnectionMgr *) closure;
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::ReadTimeoutTickCB() this=%p host=%s\n",
|
|
|
|
self, ent->mConnInfo->Host()));
|
|
|
|
|
|
|
|
PRIntervalTime now = PR_IntervalNow();
|
|
|
|
for (PRUint32 index = 0; index < ent->mActiveConns.Length(); ++index)
|
|
|
|
ent->mActiveConns[index]->ReadTimeoutTick(now);
|
|
|
|
|
|
|
|
return PL_DHASH_NEXT;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// nsHttpConnectionMgr::nsConnectionHandle
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::~nsConnectionHandle()
|
|
|
|
{
|
|
|
|
if (mConn) {
|
|
|
|
gHttpHandler->ReclaimConnection(mConn);
|
|
|
|
NS_RELEASE(mConn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS0(nsHttpConnectionMgr::nsConnectionHandle)
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
nsHttpConnectionMgr::nsConnectionEntry *
|
|
|
|
nsHttpConnectionMgr::GetOrCreateConnectionEntry(nsHttpConnectionInfo *ci)
|
|
|
|
{
|
|
|
|
nsConnectionEntry *ent = mCT.Get(ci->HashKey());
|
|
|
|
if (ent)
|
|
|
|
return ent;
|
|
|
|
|
|
|
|
nsHttpConnectionInfo *clone = ci->Clone();
|
|
|
|
ent = new nsConnectionEntry(clone);
|
|
|
|
mCT.Put(ci->HashKey(), ent);
|
|
|
|
return ent;
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::OnHeadersAvailable(nsAHttpTransaction *trans,
|
|
|
|
nsHttpRequestHead *req,
|
|
|
|
nsHttpResponseHead *resp,
|
2011-09-28 23:19:26 -07:00
|
|
|
bool *reset)
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
return mConn->OnHeadersAvailable(trans, req, resp, reset);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::CloseTransaction(nsAHttpTransaction *trans, nsresult reason)
|
|
|
|
{
|
|
|
|
mConn->CloseTransaction(trans, reason);
|
|
|
|
}
|
|
|
|
|
2011-05-19 16:43:37 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsConnectionHandle::TakeTransport(nsISocketTransport **aTransport,
|
|
|
|
nsIAsyncInputStream **aInputStream,
|
|
|
|
nsIAsyncOutputStream **aOutputStream)
|
|
|
|
{
|
|
|
|
return mConn->TakeTransport(aTransport, aInputStream, aOutputStream);
|
|
|
|
}
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::OnMsgSpeculativeConnect(PRInt32, void *param)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
|
|
|
nsRefPtr<NullHttpTransaction> trans =
|
|
|
|
dont_AddRef(static_cast<NullHttpTransaction *>(param));
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::OnMsgSpeculativeConnect [ci=%s]\n",
|
|
|
|
trans->ConnectionInfo()->HashKey().get()));
|
|
|
|
|
|
|
|
nsConnectionEntry *ent =
|
|
|
|
GetOrCreateConnectionEntry(trans->ConnectionInfo());
|
|
|
|
|
2012-05-07 06:43:46 -07:00
|
|
|
// If spdy has previously made a preferred entry for this host via
|
|
|
|
// the ip pooling rules. If so, connect to the preferred host instead of
|
|
|
|
// the one directly passed in here.
|
|
|
|
nsConnectionEntry *preferredEntry = GetSpdyPreferredEnt(ent);
|
|
|
|
if (preferredEntry)
|
|
|
|
ent = preferredEntry;
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
if (!ent->mIdleConns.Length() && !RestrictConnections(ent) &&
|
|
|
|
!AtActiveConnectionLimit(ent, trans->Caps())) {
|
|
|
|
CreateTransport(ent, trans, trans->Caps(), true);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
bool
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::IsPersistent()
|
|
|
|
{
|
|
|
|
return mConn->IsPersistent();
|
|
|
|
}
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
bool
|
2007-03-22 10:30:00 -07:00
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::IsReused()
|
|
|
|
{
|
|
|
|
return mConn->IsReused();
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::DontReuse()
|
|
|
|
{
|
|
|
|
mConn->DontReuse();
|
|
|
|
}
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::PushBack(const char *buf, PRUint32 bufLen)
|
|
|
|
{
|
|
|
|
return mConn->PushBack(buf, bufLen);
|
|
|
|
}
|
2010-10-14 17:28:43 -07:00
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
|
|
|
|
//////////////////////// nsHalfOpenSocket
|
|
|
|
|
|
|
|
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS4(nsHttpConnectionMgr::nsHalfOpenSocket,
|
|
|
|
nsIOutputStreamCallback,
|
|
|
|
nsITransportEventSink,
|
|
|
|
nsIInterfaceRequestor,
|
|
|
|
nsITimerCallback)
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsHalfOpenSocket::nsHalfOpenSocket(nsConnectionEntry *ent,
|
2012-04-25 05:54:42 -07:00
|
|
|
nsAHttpTransaction *trans,
|
|
|
|
PRUint8 caps)
|
2011-03-31 12:38:30 -07:00
|
|
|
: mEnt(ent),
|
2012-04-25 05:54:42 -07:00
|
|
|
mTransaction(trans),
|
|
|
|
mCaps(caps),
|
2012-05-22 13:12:40 -07:00
|
|
|
mSpeculative(false),
|
|
|
|
mHasConnected(false)
|
2011-03-31 12:38:30 -07:00
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(ent && trans, "constructor with null arguments");
|
|
|
|
LOG(("Creating nsHalfOpenSocket [this=%p trans=%p ent=%s]\n",
|
|
|
|
this, trans, ent->mConnInfo->Host()));
|
|
|
|
}
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::~nsHalfOpenSocket()
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(!mStreamOut, "streamout not null");
|
|
|
|
NS_ABORT_IF_FALSE(!mBackupStreamOut, "backupstreamout not null");
|
|
|
|
NS_ABORT_IF_FALSE(!mSynTimer, "syntimer not null");
|
|
|
|
LOG(("Destroying nsHalfOpenSocket [this=%p]\n", this));
|
|
|
|
|
|
|
|
if (mEnt) {
|
2012-04-25 05:54:42 -07:00
|
|
|
// If the removal of the HalfOpenSocket from the mHalfOpens list
|
|
|
|
// removes the RestrictConnections() throttle then we need to
|
|
|
|
// process the pending queue.
|
|
|
|
bool restrictedBeforeRelease =
|
|
|
|
gHttpHandler->ConnMgr()->RestrictConnections(mEnt);
|
|
|
|
|
2011-04-28 14:43:24 -07:00
|
|
|
// A failure to create the transport object at all
|
|
|
|
// will result in this not being present in the halfopen table
|
|
|
|
// so ignore failures of RemoveElement()
|
|
|
|
mEnt->mHalfOpens.RemoveElement(this);
|
2012-04-25 05:54:42 -07:00
|
|
|
|
|
|
|
if (restrictedBeforeRelease &&
|
|
|
|
!gHttpHandler->ConnMgr()->RestrictConnections(mEnt)) {
|
|
|
|
LOG(("nsHalfOpenSocket %p lifted RestrictConnections() limit.\n"));
|
|
|
|
gHttpHandler->ConnMgr()->ProcessPendingQForEntry(mEnt);
|
|
|
|
}
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsHalfOpenSocket::SetupStreams(nsISocketTransport **transport,
|
|
|
|
nsIAsyncInputStream **instream,
|
2011-07-04 02:47:09 -07:00
|
|
|
nsIAsyncOutputStream **outstream,
|
2011-09-28 23:19:26 -07:00
|
|
|
bool isBackup)
|
2011-03-31 12:38:30 -07:00
|
|
|
{
|
|
|
|
nsresult rv;
|
|
|
|
|
|
|
|
const char* types[1];
|
|
|
|
types[0] = (mEnt->mConnInfo->UsingSSL()) ?
|
|
|
|
"ssl" : gHttpHandler->DefaultSocketType();
|
|
|
|
PRUint32 typeCount = (types[0] != nsnull);
|
|
|
|
|
|
|
|
nsCOMPtr<nsISocketTransport> socketTransport;
|
|
|
|
nsCOMPtr<nsISocketTransportService> sts;
|
|
|
|
|
|
|
|
sts = do_GetService(NS_SOCKETTRANSPORTSERVICE_CONTRACTID, &rv);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
rv = sts->CreateTransport(types, typeCount,
|
|
|
|
nsDependentCString(mEnt->mConnInfo->Host()),
|
|
|
|
mEnt->mConnInfo->Port(),
|
|
|
|
mEnt->mConnInfo->ProxyInfo(),
|
|
|
|
getter_AddRefs(socketTransport));
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
PRUint32 tmpFlags = 0;
|
2012-04-25 05:54:42 -07:00
|
|
|
if (mCaps & NS_HTTP_REFRESH_DNS)
|
2011-03-31 12:38:30 -07:00
|
|
|
tmpFlags = nsISocketTransport::BYPASS_CACHE;
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
if (mCaps & NS_HTTP_LOAD_ANONYMOUS)
|
2011-03-31 12:38:30 -07:00
|
|
|
tmpFlags |= nsISocketTransport::ANONYMOUS_CONNECT;
|
|
|
|
|
2011-07-04 02:47:09 -07:00
|
|
|
// For backup connections, we disable IPv6. That's because some users have
|
|
|
|
// broken IPv6 connectivity (leading to very long timeouts), and disabling
|
|
|
|
// IPv6 on the backup connection gives them a much better user experience
|
|
|
|
// with dual-stack hosts, though they still pay the 250ms delay for each new
|
|
|
|
// connection. This strategy is also known as "happy eyeballs".
|
2011-08-27 03:49:40 -07:00
|
|
|
if (isBackup && gHttpHandler->FastFallbackToIPv4())
|
2011-07-04 02:47:09 -07:00
|
|
|
tmpFlags |= nsISocketTransport::DISABLE_IPV6;
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
socketTransport->SetConnectionFlags(tmpFlags);
|
|
|
|
|
|
|
|
socketTransport->SetQoSBits(gHttpHandler->GetQoSBits());
|
|
|
|
|
|
|
|
rv = socketTransport->SetEventSink(this, nsnull);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
rv = socketTransport->SetSecurityCallbacks(this);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIOutputStream> sout;
|
|
|
|
rv = socketTransport->OpenOutputStream(nsITransport::OPEN_UNBUFFERED,
|
|
|
|
0, 0,
|
|
|
|
getter_AddRefs(sout));
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> sin;
|
|
|
|
rv = socketTransport->OpenInputStream(nsITransport::OPEN_UNBUFFERED,
|
|
|
|
0, 0,
|
|
|
|
getter_AddRefs(sin));
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
socketTransport.forget(transport);
|
|
|
|
CallQueryInterface(sin, instream);
|
|
|
|
CallQueryInterface(sout, outstream);
|
|
|
|
|
|
|
|
rv = (*outstream)->AsyncWait(this, 0, 0, nsnull);
|
|
|
|
if (NS_SUCCEEDED(rv))
|
|
|
|
gHttpHandler->ConnMgr()->StartedConnect();
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::SetupPrimaryStreams()
|
|
|
|
{
|
2011-12-13 07:55:50 -08:00
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
|
|
|
nsresult rv;
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
mPrimarySynStarted = mozilla::TimeStamp::Now();
|
2011-12-13 07:55:50 -08:00
|
|
|
rv = SetupStreams(getter_AddRefs(mSocketTransport),
|
|
|
|
getter_AddRefs(mStreamIn),
|
|
|
|
getter_AddRefs(mStreamOut),
|
|
|
|
false);
|
2011-03-31 12:38:30 -07:00
|
|
|
LOG(("nsHalfOpenSocket::SetupPrimaryStream [this=%p ent=%s rv=%x]",
|
|
|
|
this, mEnt->mConnInfo->Host(), rv));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
if (mStreamOut)
|
|
|
|
mStreamOut->AsyncWait(nsnull, 0, 0, nsnull);
|
|
|
|
mStreamOut = nsnull;
|
|
|
|
mStreamIn = nsnull;
|
|
|
|
mSocketTransport = nsnull;
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::SetupBackupStreams()
|
|
|
|
{
|
2012-03-22 16:39:31 -07:00
|
|
|
mBackupSynStarted = mozilla::TimeStamp::Now();
|
2011-03-31 12:38:30 -07:00
|
|
|
nsresult rv = SetupStreams(getter_AddRefs(mBackupTransport),
|
|
|
|
getter_AddRefs(mBackupStreamIn),
|
2011-07-04 02:47:09 -07:00
|
|
|
getter_AddRefs(mBackupStreamOut),
|
2011-10-17 07:59:28 -07:00
|
|
|
true);
|
2011-03-31 12:38:30 -07:00
|
|
|
LOG(("nsHalfOpenSocket::SetupBackupStream [this=%p ent=%s rv=%x]",
|
|
|
|
this, mEnt->mConnInfo->Host(), rv));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
if (mBackupStreamOut)
|
|
|
|
mBackupStreamOut->AsyncWait(nsnull, 0, 0, nsnull);
|
|
|
|
mBackupStreamOut = nsnull;
|
|
|
|
mBackupStreamIn = nsnull;
|
|
|
|
mBackupTransport = nsnull;
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::SetupBackupTimer()
|
|
|
|
{
|
|
|
|
PRUint16 timeout = gHttpHandler->GetIdleSynTimeout();
|
|
|
|
NS_ABORT_IF_FALSE(!mSynTimer, "timer already initd");
|
2011-12-13 07:55:50 -08:00
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
if (timeout && !mTransaction->IsDone()) {
|
2011-03-31 12:38:30 -07:00
|
|
|
// Setup the timer that will establish a backup socket
|
|
|
|
// if we do not get a writable event on the main one.
|
|
|
|
// We do this because a lost SYN takes a very long time
|
|
|
|
// to repair at the TCP level.
|
|
|
|
//
|
|
|
|
// Failure to setup the timer is something we can live with,
|
|
|
|
// so don't return an error in that case.
|
|
|
|
nsresult rv;
|
|
|
|
mSynTimer = do_CreateInstance(NS_TIMER_CONTRACTID, &rv);
|
2011-11-02 09:18:53 -07:00
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2011-03-31 12:38:30 -07:00
|
|
|
mSynTimer->InitWithCallback(this, timeout, nsITimer::TYPE_ONE_SHOT);
|
2012-05-22 13:12:40 -07:00
|
|
|
LOG(("nsHalfOpenSocket::SetupBackupTimer() [this=%p]", this));
|
2011-11-02 09:18:53 -07:00
|
|
|
}
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
2012-05-22 13:12:40 -07:00
|
|
|
else if (timeout) {
|
|
|
|
LOG(("nsHalfOpenSocket::SetupBackupTimer() [this=%p],"
|
|
|
|
" transaction already done!", this));
|
|
|
|
}
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
|
|
|
|
2011-11-02 09:18:53 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::CancelBackupTimer()
|
|
|
|
{
|
|
|
|
// If the syntimer is still armed, we can cancel it because no backup
|
|
|
|
// socket should be formed at this point
|
|
|
|
if (!mSynTimer)
|
|
|
|
return;
|
|
|
|
|
|
|
|
LOG(("nsHalfOpenSocket::CancelBackupTimer()"));
|
|
|
|
mSynTimer->Cancel();
|
|
|
|
mSynTimer = nsnull;
|
|
|
|
}
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::Abandon()
|
|
|
|
{
|
|
|
|
LOG(("nsHalfOpenSocket::Abandon [this=%p ent=%s]",
|
|
|
|
this, mEnt->mConnInfo->Host()));
|
2011-11-08 02:56:46 -08:00
|
|
|
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
nsRefPtr<nsHalfOpenSocket> deleteProtector(this);
|
|
|
|
|
|
|
|
if (mStreamOut) {
|
|
|
|
gHttpHandler->ConnMgr()->RecvdConnect();
|
|
|
|
mStreamOut->AsyncWait(nsnull, 0, 0, nsnull);
|
|
|
|
mStreamOut = nsnull;
|
|
|
|
}
|
|
|
|
if (mBackupStreamOut) {
|
|
|
|
gHttpHandler->ConnMgr()->RecvdConnect();
|
|
|
|
mBackupStreamOut->AsyncWait(nsnull, 0, 0, nsnull);
|
|
|
|
mBackupStreamOut = nsnull;
|
|
|
|
}
|
2011-11-02 09:18:53 -07:00
|
|
|
|
|
|
|
CancelBackupTimer();
|
2011-03-31 12:38:30 -07:00
|
|
|
|
|
|
|
mEnt = nsnull;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP // method for nsITimerCallback
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::Notify(nsITimer *timer)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
NS_ABORT_IF_FALSE(timer == mSynTimer, "wrong timer");
|
|
|
|
|
2012-05-22 13:12:40 -07:00
|
|
|
SetupBackupStreams();
|
2011-11-02 09:18:53 -07:00
|
|
|
|
|
|
|
mSynTimer = nsnull;
|
2011-03-31 12:38:30 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// method for nsIAsyncOutputStreamCallback
|
|
|
|
NS_IMETHODIMP
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsHalfOpenSocket::OnOutputStreamReady(nsIAsyncOutputStream *out)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
NS_ABORT_IF_FALSE(out == mStreamOut ||
|
|
|
|
out == mBackupStreamOut, "stream mismatch");
|
|
|
|
LOG(("nsHalfOpenSocket::OnOutputStreamReady [this=%p ent=%s %s]\n",
|
|
|
|
this, mEnt->mConnInfo->Host(),
|
|
|
|
out == mStreamOut ? "primary" : "backup"));
|
|
|
|
PRInt32 index;
|
|
|
|
nsresult rv;
|
|
|
|
|
|
|
|
gHttpHandler->ConnMgr()->RecvdConnect();
|
|
|
|
|
2011-11-02 09:18:53 -07:00
|
|
|
CancelBackupTimer();
|
2011-03-31 12:38:30 -07:00
|
|
|
|
|
|
|
// assign the new socket to the http connection
|
|
|
|
nsRefPtr<nsHttpConnection> conn = new nsHttpConnection();
|
|
|
|
LOG(("nsHalfOpenSocket::OnOutputStreamReady "
|
2011-04-01 14:38:46 -07:00
|
|
|
"Created new nshttpconnection %p\n", conn.get()));
|
2011-03-31 12:38:30 -07:00
|
|
|
|
|
|
|
nsCOMPtr<nsIInterfaceRequestor> callbacks;
|
|
|
|
nsCOMPtr<nsIEventTarget> callbackTarget;
|
|
|
|
mTransaction->GetSecurityCallbacks(getter_AddRefs(callbacks),
|
|
|
|
getter_AddRefs(callbackTarget));
|
|
|
|
if (out == mStreamOut) {
|
2012-03-22 16:39:31 -07:00
|
|
|
mozilla::TimeDuration rtt =
|
|
|
|
mozilla::TimeStamp::Now() - mPrimarySynStarted;
|
2011-03-31 12:38:30 -07:00
|
|
|
rv = conn->Init(mEnt->mConnInfo,
|
|
|
|
gHttpHandler->ConnMgr()->mMaxRequestDelay,
|
|
|
|
mSocketTransport, mStreamIn, mStreamOut,
|
2012-03-22 16:39:31 -07:00
|
|
|
callbacks, callbackTarget,
|
|
|
|
PR_MillisecondsToInterval(rtt.ToMilliseconds()));
|
2011-03-31 12:38:30 -07:00
|
|
|
|
|
|
|
// The nsHttpConnection object now owns these streams and sockets
|
|
|
|
mStreamOut = nsnull;
|
|
|
|
mStreamIn = nsnull;
|
|
|
|
mSocketTransport = nsnull;
|
|
|
|
}
|
|
|
|
else {
|
2012-03-22 16:39:31 -07:00
|
|
|
mozilla::TimeDuration rtt =
|
|
|
|
mozilla::TimeStamp::Now() - mBackupSynStarted;
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
rv = conn->Init(mEnt->mConnInfo,
|
|
|
|
gHttpHandler->ConnMgr()->mMaxRequestDelay,
|
|
|
|
mBackupTransport, mBackupStreamIn, mBackupStreamOut,
|
2012-03-22 16:39:31 -07:00
|
|
|
callbacks, callbackTarget,
|
|
|
|
PR_MillisecondsToInterval(rtt.ToMilliseconds()));
|
2011-03-31 12:38:30 -07:00
|
|
|
|
|
|
|
// The nsHttpConnection object now owns these streams and sockets
|
|
|
|
mBackupStreamOut = nsnull;
|
|
|
|
mBackupStreamIn = nsnull;
|
|
|
|
mBackupTransport = nsnull;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
LOG(("nsHalfOpenSocket::OnOutputStreamReady "
|
2011-04-01 14:38:46 -07:00
|
|
|
"conn->init (%p) failed %x\n", conn.get(), rv));
|
2011-03-31 12:38:30 -07:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2012-05-22 13:12:40 -07:00
|
|
|
// This half-open socket has created a connection. This flag excludes it
|
|
|
|
// from counter of actual connections used for checking limits.
|
|
|
|
mHasConnected = true;
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
// if this is still in the pending list, remove it and dispatch it
|
|
|
|
index = mEnt->mPendingQ.IndexOf(mTransaction);
|
|
|
|
if (index != -1) {
|
2012-04-25 05:54:42 -07:00
|
|
|
NS_ABORT_IF_FALSE(!mSpeculative,
|
|
|
|
"Speculative Half Open found mTranscation");
|
|
|
|
nsRefPtr<nsHttpTransaction> temp = dont_AddRef(mEnt->mPendingQ[index]);
|
2011-03-31 12:38:30 -07:00
|
|
|
mEnt->mPendingQ.RemoveElementAt(index);
|
|
|
|
gHttpHandler->ConnMgr()->AddActiveConn(conn, mEnt);
|
2012-04-25 05:54:42 -07:00
|
|
|
rv = gHttpHandler->ConnMgr()->DispatchTransaction(mEnt, temp, conn);
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
// this transaction was dispatched off the pending q before all the
|
|
|
|
// sockets established themselves.
|
|
|
|
|
|
|
|
// We need to establish a small non-zero idle timeout so the connection
|
|
|
|
// mgr perceives this socket as suitable for persistent connection reuse
|
2012-02-23 17:58:43 -08:00
|
|
|
const PRIntervalTime k5Sec = PR_SecondsToInterval(5);
|
|
|
|
if (k5Sec < gHttpHandler->IdleTimeout())
|
|
|
|
conn->SetIdleTimeout(k5Sec);
|
|
|
|
else
|
|
|
|
conn->SetIdleTimeout(gHttpHandler->IdleTimeout());
|
2011-03-31 12:38:30 -07:00
|
|
|
|
|
|
|
// After about 1 second allow for the possibility of restarting a
|
|
|
|
// transaction due to server close. Keep at sub 1 second as that is the
|
|
|
|
// minimum granularity we can expect a server to be timing out with.
|
|
|
|
conn->SetIsReusedAfter(950);
|
|
|
|
|
2012-04-25 05:54:42 -07:00
|
|
|
// if we are using ssl and no other transactions are waiting right now,
|
|
|
|
// then form a null transaction to drive the SSL handshake to
|
|
|
|
// completion. Afterwards the connection will be 100% ready for the next
|
2012-06-06 12:47:45 -07:00
|
|
|
// transaction to use it. Make an exception for SSL over HTTP proxy as the
|
|
|
|
// NullHttpTransaction does not know how to drive CONNECT.
|
|
|
|
if (mEnt->mConnInfo->UsingSSL() && !mEnt->mPendingQ.Length() &&
|
|
|
|
!mEnt->mConnInfo->UsingHttpProxy()) {
|
2012-04-25 05:54:42 -07:00
|
|
|
LOG(("nsHalfOpenSocket::OnOutputStreamReady null transaction will "
|
|
|
|
"be used to finish SSL handshake on conn %p\n", conn.get()));
|
|
|
|
nsRefPtr<NullHttpTransaction> trans =
|
|
|
|
new NullHttpTransaction(mEnt->mConnInfo,
|
|
|
|
callbacks, callbackTarget,
|
|
|
|
mCaps & ~NS_HTTP_ALLOW_PIPELINING);
|
|
|
|
|
|
|
|
gHttpHandler->ConnMgr()->AddActiveConn(conn, mEnt);
|
|
|
|
conn->Classify(nsAHttpTransaction::CLASS_SOLO);
|
|
|
|
rv = gHttpHandler->ConnMgr()->
|
|
|
|
DispatchAbstractTransaction(mEnt, trans, mCaps, conn, 0);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// otherwise just put this in the persistent connection pool
|
|
|
|
LOG(("nsHalfOpenSocket::OnOutputStreamReady no transaction match "
|
|
|
|
"returning conn %p to pool\n", conn.get()));
|
|
|
|
nsRefPtr<nsHttpConnection> copy(conn);
|
|
|
|
// forget() to effectively addref because onmsg*() will drop a ref
|
|
|
|
gHttpHandler->ConnMgr()->OnMsgReclaimConnection(
|
|
|
|
NS_OK, conn.forget().get());
|
|
|
|
}
|
2011-03-31 12:38:30 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
// method for nsITransportEventSink
|
|
|
|
NS_IMETHODIMP
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::OnTransportStatus(nsITransport *trans,
|
|
|
|
nsresult status,
|
|
|
|
PRUint64 progress,
|
|
|
|
PRUint64 progressMax)
|
|
|
|
{
|
2011-12-13 07:55:50 -08:00
|
|
|
NS_ASSERTION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
2011-12-06 06:43:09 -08:00
|
|
|
if (mTransaction)
|
|
|
|
mTransaction->OnTransportStatus(trans, status, progress);
|
|
|
|
|
|
|
|
if (trans != mSocketTransport)
|
|
|
|
return NS_OK;
|
|
|
|
|
2011-12-13 07:55:50 -08:00
|
|
|
// if we are doing spdy coalescing and haven't recorded the ip address
|
|
|
|
// for this entry before then make the hash key if our dns lookup
|
2012-05-07 07:27:25 -07:00
|
|
|
// just completed. We can't do coalescing if using a proxy because the
|
|
|
|
// ip addresses are not available to the client.
|
2011-12-13 07:55:50 -08:00
|
|
|
|
|
|
|
if (status == nsISocketTransport::STATUS_CONNECTED_TO &&
|
|
|
|
gHttpHandler->IsSpdyEnabled() &&
|
|
|
|
gHttpHandler->CoalesceSpdy() &&
|
|
|
|
mEnt && mEnt->mConnInfo && mEnt->mConnInfo->UsingSSL() &&
|
|
|
|
!mEnt->mConnInfo->UsingHttpProxy() &&
|
|
|
|
mEnt->mCoalescingKey.IsEmpty()) {
|
|
|
|
|
|
|
|
PRNetAddr addr;
|
|
|
|
nsresult rv = mSocketTransport->GetPeerAddr(&addr);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
mEnt->mCoalescingKey.SetCapacity(72);
|
|
|
|
PR_NetAddrToString(&addr, mEnt->mCoalescingKey.BeginWriting(), 64);
|
|
|
|
mEnt->mCoalescingKey.SetLength(
|
|
|
|
strlen(mEnt->mCoalescingKey.BeginReading()));
|
|
|
|
|
|
|
|
if (mEnt->mConnInfo->GetAnonymous())
|
|
|
|
mEnt->mCoalescingKey.AppendLiteral("~A:");
|
|
|
|
else
|
|
|
|
mEnt->mCoalescingKey.AppendLiteral("~.:");
|
|
|
|
mEnt->mCoalescingKey.AppendInt(mEnt->mConnInfo->Port());
|
|
|
|
|
|
|
|
LOG(("nsHttpConnectionMgr::nsHalfOpenSocket::OnTransportStatus "
|
|
|
|
"STATUS_CONNECTED_TO Established New Coalescing Key for host "
|
|
|
|
"%s [%s]", mEnt->mConnInfo->Host(),
|
|
|
|
mEnt->mCoalescingKey.get()));
|
|
|
|
|
|
|
|
gHttpHandler->ConnMgr()->ProcessSpdyPendingQ(mEnt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-11-02 09:18:53 -07:00
|
|
|
switch (status) {
|
|
|
|
case nsISocketTransport::STATUS_CONNECTING_TO:
|
|
|
|
// Passed DNS resolution, now trying to connect, start the backup timer
|
2011-11-08 02:56:46 -08:00
|
|
|
// only prevent creating another backup transport.
|
|
|
|
// We also check for mEnt presence to not instantiate the timer after
|
|
|
|
// this half open socket has already been abandoned. It may happen
|
|
|
|
// when we get this notification right between main-thread calls to
|
|
|
|
// nsHttpConnectionMgr::Shutdown and nsSocketTransportService::Shutdown
|
|
|
|
// where the first abandones all half open socket instances and only
|
|
|
|
// after that the second stops the socket thread.
|
|
|
|
if (mEnt && !mBackupTransport && !mSynTimer)
|
2011-11-02 09:18:53 -07:00
|
|
|
SetupBackupTimer();
|
|
|
|
break;
|
|
|
|
|
|
|
|
case nsISocketTransport::STATUS_CONNECTED_TO:
|
|
|
|
// TCP connection's up, now transfer or SSL negotiantion starts,
|
|
|
|
// no need for backup socket
|
|
|
|
CancelBackupTimer();
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-03-31 12:38:30 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// method for nsIInterfaceRequestor
|
|
|
|
NS_IMETHODIMP
|
|
|
|
nsHttpConnectionMgr::nsHalfOpenSocket::GetInterface(const nsIID &iid,
|
|
|
|
void **result)
|
|
|
|
{
|
|
|
|
if (mTransaction) {
|
|
|
|
nsCOMPtr<nsIInterfaceRequestor> callbacks;
|
|
|
|
mTransaction->GetSecurityCallbacks(getter_AddRefs(callbacks), nsnull);
|
|
|
|
if (callbacks)
|
|
|
|
return callbacks->GetInterface(iid, result);
|
|
|
|
}
|
|
|
|
return NS_ERROR_NO_INTERFACE;
|
|
|
|
}
|
|
|
|
|
2011-04-08 11:37:16 -07:00
|
|
|
|
|
|
|
nsHttpConnection *
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::TakeHttpConnection()
|
|
|
|
{
|
|
|
|
// return our connection object to the caller and clear it internally
|
|
|
|
// do not drop our reference - the caller now owns it.
|
|
|
|
|
|
|
|
NS_ASSERTION(mConn, "no connection");
|
|
|
|
nsHttpConnection *conn = mConn;
|
|
|
|
mConn = nsnull;
|
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
PRUint32
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::CancelPipeline(nsresult reason)
|
|
|
|
{
|
|
|
|
// no pipeline to cancel
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAHttpTransaction::Classifier
|
|
|
|
nsHttpConnectionMgr::nsConnectionHandle::Classification()
|
|
|
|
{
|
|
|
|
if (mConn)
|
|
|
|
return mConn->Classification();
|
|
|
|
|
|
|
|
LOG(("nsConnectionHandle::Classification this=%p "
|
|
|
|
"has null mConn using CLASS_SOLO default", this));
|
|
|
|
return nsAHttpTransaction::CLASS_SOLO;
|
|
|
|
}
|
|
|
|
|
2012-03-22 16:39:31 -07:00
|
|
|
// nsConnectionEntry
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsConnectionEntry::nsConnectionEntry(nsHttpConnectionInfo *ci)
|
|
|
|
: mConnInfo(ci)
|
|
|
|
, mPipelineState(PS_YELLOW)
|
|
|
|
, mYellowGoodEvents(0)
|
|
|
|
, mYellowBadEvents(0)
|
|
|
|
, mYellowConnection(nsnull)
|
|
|
|
, mGreenDepth(kPipelineOpen)
|
|
|
|
, mPipeliningPenalty(0)
|
|
|
|
, mUsingSpdy(false)
|
|
|
|
, mTestedSpdy(false)
|
|
|
|
, mSpdyPreferred(false)
|
|
|
|
{
|
|
|
|
NS_ADDREF(mConnInfo);
|
|
|
|
if (gHttpHandler->GetPipelineAggressive()) {
|
|
|
|
mGreenDepth = kPipelineUnlimited;
|
|
|
|
mPipelineState = PS_GREEN;
|
|
|
|
}
|
|
|
|
mInitialGreenDepth = mGreenDepth;
|
|
|
|
memset(mPipeliningClassPenalty, 0, sizeof(PRInt16) * nsAHttpTransaction::CLASS_MAX);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
nsHttpConnectionMgr::nsConnectionEntry::SupportsPipelining()
|
|
|
|
{
|
|
|
|
return mPipelineState != nsHttpConnectionMgr::PS_RED;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsHttpConnectionMgr::PipeliningState
|
|
|
|
nsHttpConnectionMgr::nsConnectionEntry::PipelineState()
|
|
|
|
{
|
|
|
|
return mPipelineState;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsConnectionEntry::OnPipelineFeedbackInfo(
|
|
|
|
nsHttpConnectionMgr::PipelineFeedbackInfoType info,
|
|
|
|
nsHttpConnection *conn,
|
|
|
|
PRUint32 data)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
|
|
|
|
if (mPipelineState == PS_YELLOW) {
|
|
|
|
if (info & kPipelineInfoTypeBad)
|
|
|
|
mYellowBadEvents++;
|
|
|
|
else if (info & (kPipelineInfoTypeNeutral | kPipelineInfoTypeGood))
|
|
|
|
mYellowGoodEvents++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mPipelineState == PS_GREEN && info == GoodCompletedOK) {
|
|
|
|
PRInt32 depth = data;
|
2012-07-02 15:10:04 -07:00
|
|
|
LOG(("Transaction completed at pipeline depth of %d. Host = %s\n",
|
2012-03-22 16:39:31 -07:00
|
|
|
depth, mConnInfo->Host()));
|
|
|
|
|
|
|
|
if (depth >= 3)
|
|
|
|
mGreenDepth = kPipelineUnlimited;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAHttpTransaction::Classifier classification;
|
|
|
|
if (conn)
|
|
|
|
classification = conn->Classification();
|
2012-03-22 16:39:31 -07:00
|
|
|
else if (info == BadInsufficientFraming ||
|
|
|
|
info == BadUnexpectedLarge)
|
2012-03-22 16:39:31 -07:00
|
|
|
classification = (nsAHttpTransaction::Classifier) data;
|
|
|
|
else
|
|
|
|
classification = nsAHttpTransaction::CLASS_SOLO;
|
|
|
|
|
|
|
|
if (gHttpHandler->GetPipelineAggressive() &&
|
|
|
|
info & kPipelineInfoTypeBad &&
|
|
|
|
info != BadExplicitClose &&
|
|
|
|
info != RedVersionTooLow &&
|
|
|
|
info != RedBannedServer &&
|
|
|
|
info != RedCorruptedContent &&
|
|
|
|
info != BadInsufficientFraming) {
|
|
|
|
LOG(("minor negative feedback ignored "
|
|
|
|
"because of pipeline aggressive mode"));
|
|
|
|
}
|
|
|
|
else if (info & kPipelineInfoTypeBad) {
|
|
|
|
if ((info & kPipelineInfoTypeRed) && (mPipelineState != PS_RED)) {
|
|
|
|
LOG(("transition to red from %d. Host = %s.\n",
|
|
|
|
mPipelineState, mConnInfo->Host()));
|
|
|
|
mPipelineState = PS_RED;
|
|
|
|
mPipeliningPenalty = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mLastCreditTime.IsNull())
|
|
|
|
mLastCreditTime = mozilla::TimeStamp::Now();
|
|
|
|
|
|
|
|
// Red* events impact the host globally via mPipeliningPenalty, while
|
|
|
|
// Bad* events impact the per class penalty.
|
|
|
|
|
|
|
|
// The individual penalties should be < 16bit-signed-maxint - 25000
|
|
|
|
// (approx 7500). Penalties are paid-off either when something promising
|
|
|
|
// happens (a successful transaction, or promising headers) or when
|
|
|
|
// time goes by at a rate of 1 penalty point every 16 seconds.
|
|
|
|
|
|
|
|
switch (info) {
|
|
|
|
case RedVersionTooLow:
|
|
|
|
mPipeliningPenalty += 1000;
|
|
|
|
break;
|
|
|
|
case RedBannedServer:
|
|
|
|
mPipeliningPenalty += 7000;
|
|
|
|
break;
|
|
|
|
case RedCorruptedContent:
|
|
|
|
mPipeliningPenalty += 7000;
|
|
|
|
break;
|
|
|
|
case RedCanceledPipeline:
|
|
|
|
mPipeliningPenalty += 60;
|
|
|
|
break;
|
|
|
|
case BadExplicitClose:
|
|
|
|
mPipeliningClassPenalty[classification] += 250;
|
|
|
|
break;
|
|
|
|
case BadSlowReadMinor:
|
|
|
|
mPipeliningClassPenalty[classification] += 5;
|
|
|
|
break;
|
|
|
|
case BadSlowReadMajor:
|
|
|
|
mPipeliningClassPenalty[classification] += 25;
|
|
|
|
break;
|
|
|
|
case BadInsufficientFraming:
|
|
|
|
mPipeliningClassPenalty[classification] += 7000;
|
|
|
|
break;
|
2012-03-22 16:39:31 -07:00
|
|
|
case BadUnexpectedLarge:
|
|
|
|
mPipeliningClassPenalty[classification] += 120;
|
|
|
|
break;
|
2012-03-22 16:39:31 -07:00
|
|
|
|
|
|
|
default:
|
|
|
|
NS_ABORT_IF_FALSE(0, "Unknown Bad/Red Pipeline Feedback Event");
|
|
|
|
}
|
|
|
|
|
|
|
|
mPipeliningPenalty = PR_MIN(mPipeliningPenalty, 25000);
|
|
|
|
mPipeliningClassPenalty[classification] = PR_MIN(mPipeliningClassPenalty[classification], 25000);
|
|
|
|
|
|
|
|
LOG(("Assessing red penalty to %s class %d for event %d. "
|
|
|
|
"Penalty now %d, throttle[%d] = %d\n", mConnInfo->Host(),
|
|
|
|
classification, info, mPipeliningPenalty, classification,
|
|
|
|
mPipeliningClassPenalty[classification]));
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// hand out credits for neutral and good events such as
|
|
|
|
// "headers look ok" events
|
|
|
|
|
|
|
|
mPipeliningPenalty = PR_MAX(mPipeliningPenalty - 1, 0);
|
|
|
|
mPipeliningClassPenalty[classification] = PR_MAX(mPipeliningClassPenalty[classification] - 1, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mPipelineState == PS_RED && !mPipeliningPenalty)
|
|
|
|
{
|
|
|
|
LOG(("transition %s to yellow\n", mConnInfo->Host()));
|
|
|
|
mPipelineState = PS_YELLOW;
|
|
|
|
mYellowConnection = nsnull;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsConnectionEntry::SetYellowConnection(nsHttpConnection *conn)
|
|
|
|
{
|
|
|
|
NS_ABORT_IF_FALSE(!mYellowConnection && mPipelineState == PS_YELLOW,
|
|
|
|
"yellow connection already set or state is not yellow");
|
|
|
|
mYellowConnection = conn;
|
|
|
|
mYellowGoodEvents = mYellowBadEvents = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::nsConnectionEntry::OnYellowComplete()
|
|
|
|
{
|
|
|
|
if (mPipelineState == PS_YELLOW) {
|
|
|
|
if (mYellowGoodEvents && !mYellowBadEvents) {
|
|
|
|
LOG(("transition %s to green\n", mConnInfo->Host()));
|
|
|
|
mPipelineState = PS_GREEN;
|
|
|
|
mGreenDepth = mInitialGreenDepth;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// The purpose of the yellow state is to witness at least
|
|
|
|
// one successful pipelined transaction without seeing any
|
|
|
|
// kind of negative feedback before opening the flood gates.
|
|
|
|
// If we haven't confirmed that, then transfer back to red.
|
|
|
|
LOG(("transition %s to red from yellow return\n",
|
|
|
|
mConnInfo->Host()));
|
|
|
|
mPipelineState = PS_RED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mYellowConnection = nsnull;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nsHttpConnectionMgr::nsConnectionEntry::CreditPenalty()
|
|
|
|
{
|
|
|
|
if (mLastCreditTime.IsNull())
|
|
|
|
return;
|
|
|
|
|
|
|
|
// Decrease penalty values by 1 for every 16 seconds
|
|
|
|
// (i.e 3.7 per minute, or 1000 every 4h20m)
|
|
|
|
|
|
|
|
mozilla::TimeStamp now = mozilla::TimeStamp::Now();
|
|
|
|
mozilla::TimeDuration elapsedTime = now - mLastCreditTime;
|
|
|
|
PRUint32 creditsEarned =
|
|
|
|
static_cast<PRUint32>(elapsedTime.ToSeconds()) >> 4;
|
|
|
|
|
|
|
|
bool failed = false;
|
|
|
|
if (creditsEarned > 0) {
|
|
|
|
mPipeliningPenalty =
|
|
|
|
PR_MAX(PRInt32(mPipeliningPenalty - creditsEarned), 0);
|
|
|
|
if (mPipeliningPenalty > 0)
|
|
|
|
failed = true;
|
|
|
|
|
|
|
|
for (PRInt32 i = 0; i < nsAHttpTransaction::CLASS_MAX; ++i) {
|
|
|
|
mPipeliningClassPenalty[i] =
|
|
|
|
PR_MAX(PRInt32(mPipeliningClassPenalty[i] - creditsEarned), 0);
|
|
|
|
failed = failed || (mPipeliningClassPenalty[i] > 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// update last credit mark to reflect elapsed time
|
|
|
|
mLastCreditTime +=
|
|
|
|
mozilla::TimeDuration::FromSeconds(creditsEarned << 4);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
failed = true; /* just assume this */
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we are no longer red then clear the credit counter - you only
|
|
|
|
// get credits for time spent in the red state
|
|
|
|
if (!failed)
|
|
|
|
mLastCreditTime = mozilla::TimeStamp(); /* reset to null timestamp */
|
|
|
|
|
|
|
|
if (mPipelineState == PS_RED && !mPipeliningPenalty)
|
|
|
|
{
|
|
|
|
LOG(("transition %s to yellow based on time credit\n",
|
|
|
|
mConnInfo->Host()));
|
|
|
|
mPipelineState = PS_YELLOW;
|
|
|
|
mYellowConnection = nsnull;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
PRUint32
|
|
|
|
nsHttpConnectionMgr::
|
|
|
|
nsConnectionEntry::MaxPipelineDepth(nsAHttpTransaction::Classifier aClass)
|
|
|
|
{
|
|
|
|
// Still subject to configuration limit no matter return value
|
|
|
|
|
|
|
|
if ((mPipelineState == PS_RED) || (mPipeliningClassPenalty[aClass] > 0))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (mPipelineState == PS_YELLOW)
|
|
|
|
return kPipelineRestricted;
|
|
|
|
|
|
|
|
return mGreenDepth;
|
|
|
|
}
|