mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
1343 lines
45 KiB
C++
1343 lines
45 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
/* vim:set ts=4 sw=4 sts=4 et cin: */
|
|
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is Mozilla.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Netscape Communications.
|
|
* Portions created by the Initial Developer are Copyright (C) 2001
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
* Darin Fisher <darin@netscape.com> (original author)
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
#include "nsHttpConnection.h"
|
|
#include "nsHttpTransaction.h"
|
|
#include "nsHttpRequestHead.h"
|
|
#include "nsHttpResponseHead.h"
|
|
#include "nsHttpHandler.h"
|
|
#include "nsIOService.h"
|
|
#include "nsISocketTransportService.h"
|
|
#include "nsISocketTransport.h"
|
|
#include "nsIServiceManager.h"
|
|
#include "nsISSLSocketControl.h"
|
|
#include "nsStringStream.h"
|
|
#include "netCore.h"
|
|
#include "nsNetCID.h"
|
|
#include "nsProxyRelease.h"
|
|
#include "prmem.h"
|
|
#include "nsPreloadedStream.h"
|
|
#include "SpdySession.h"
|
|
#include "mozilla/Telemetry.h"
|
|
#include "nsISupportsPriority.h"
|
|
|
|
#ifdef DEBUG
|
|
// defined by the socket transport service while active
|
|
extern PRThread *gSocketThread;
|
|
#endif
|
|
|
|
static NS_DEFINE_CID(kSocketTransportServiceCID, NS_SOCKETTRANSPORTSERVICE_CID);
|
|
|
|
using namespace mozilla::net;
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// nsHttpConnection <public>
|
|
//-----------------------------------------------------------------------------
|
|
|
|
nsHttpConnection::nsHttpConnection()
|
|
: mTransaction(nsnull)
|
|
, mLastReadTime(0)
|
|
, mIdleTimeout(0)
|
|
, mConsiderReusedAfterInterval(0)
|
|
, mConsiderReusedAfterEpoch(0)
|
|
, mCurrentBytesRead(0)
|
|
, mMaxBytesRead(0)
|
|
, mTotalBytesRead(0)
|
|
, mKeepAlive(true) // assume to keep-alive by default
|
|
, mKeepAliveMask(true)
|
|
, mSupportsPipelining(false) // assume low-grade server
|
|
, mIsReused(false)
|
|
, mCompletedProxyConnect(false)
|
|
, mLastTransactionExpectedNoContent(false)
|
|
, mIdleMonitoring(false)
|
|
, mHttp1xTransactionCount(0)
|
|
, mNPNComplete(false)
|
|
, mSetupNPNCalled(false)
|
|
, mUsingSpdy(false)
|
|
, mPriority(nsISupportsPriority::PRIORITY_NORMAL)
|
|
, mReportedSpdy(false)
|
|
, mEverUsedSpdy(false)
|
|
{
|
|
LOG(("Creating nsHttpConnection @%x\n", this));
|
|
|
|
// grab a reference to the handler to ensure that it doesn't go away.
|
|
nsHttpHandler *handler = gHttpHandler;
|
|
NS_ADDREF(handler);
|
|
}
|
|
|
|
nsHttpConnection::~nsHttpConnection()
|
|
{
|
|
LOG(("Destroying nsHttpConnection @%x\n", this));
|
|
|
|
if (mCallbacks) {
|
|
nsIInterfaceRequestor *cbs = nsnull;
|
|
mCallbacks.swap(cbs);
|
|
NS_ProxyRelease(mCallbackTarget, cbs);
|
|
}
|
|
|
|
// release our reference to the handler
|
|
nsHttpHandler *handler = gHttpHandler;
|
|
NS_RELEASE(handler);
|
|
|
|
if (!mEverUsedSpdy) {
|
|
LOG(("nsHttpConnection %p performed %d HTTP/1.x transactions\n",
|
|
this, mHttp1xTransactionCount));
|
|
mozilla::Telemetry::Accumulate(
|
|
mozilla::Telemetry::HTTP_REQUEST_PER_CONN, mHttp1xTransactionCount);
|
|
}
|
|
|
|
if (mTotalBytesRead) {
|
|
PRUint32 totalKBRead = static_cast<PRUint32>(mTotalBytesRead >> 10);
|
|
LOG(("nsHttpConnection %p read %dkb on connection spdy=%d\n",
|
|
this, totalKBRead, mEverUsedSpdy));
|
|
mozilla::Telemetry::Accumulate(
|
|
mEverUsedSpdy ?
|
|
mozilla::Telemetry::SPDY_KBREAD_PER_CONN :
|
|
mozilla::Telemetry::HTTP_KBREAD_PER_CONN,
|
|
totalKBRead);
|
|
}
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::Init(nsHttpConnectionInfo *info,
|
|
PRUint16 maxHangTime,
|
|
nsISocketTransport *transport,
|
|
nsIAsyncInputStream *instream,
|
|
nsIAsyncOutputStream *outstream,
|
|
nsIInterfaceRequestor *callbacks,
|
|
nsIEventTarget *callbackTarget)
|
|
{
|
|
NS_ABORT_IF_FALSE(transport && instream && outstream,
|
|
"invalid socket information");
|
|
LOG(("nsHttpConnection::Init [this=%p "
|
|
"transport=%p instream=%p outstream=%p]\n",
|
|
this, transport, instream, outstream));
|
|
|
|
NS_ENSURE_ARG_POINTER(info);
|
|
NS_ENSURE_TRUE(!mConnInfo, NS_ERROR_ALREADY_INITIALIZED);
|
|
|
|
mConnInfo = info;
|
|
mMaxHangTime = maxHangTime;
|
|
mLastReadTime = NowInSeconds();
|
|
|
|
mSocketTransport = transport;
|
|
mSocketIn = instream;
|
|
mSocketOut = outstream;
|
|
nsresult rv = mSocketTransport->SetEventSink(this, nsnull);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
mCallbacks = callbacks;
|
|
mCallbackTarget = callbackTarget;
|
|
rv = mSocketTransport->SetSecurityCallbacks(this);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::StartSpdy()
|
|
{
|
|
LOG(("nsHttpConnection::StartSpdy [this=%p]\n", this));
|
|
|
|
NS_ABORT_IF_FALSE(!mSpdySession, "mSpdySession should be null");
|
|
|
|
mUsingSpdy = true;
|
|
mEverUsedSpdy = true;
|
|
|
|
// Setting the connection as reused allows some transactions that fail
|
|
// with NS_ERROR_NET_RESET to be restarted and SPDY uses that code
|
|
// to handle clean rejections (such as those that arrived after
|
|
// a server goaway was generated).
|
|
mIsReused = true;
|
|
|
|
// If mTransaction is a pipeline object it might represent
|
|
// several requests. If so, we need to unpack that and
|
|
// pack them all into a new spdy session.
|
|
|
|
nsTArray<nsRefPtr<nsAHttpTransaction> > list;
|
|
nsresult rv = mTransaction->TakeSubTransactions(list);
|
|
|
|
if (rv == NS_ERROR_ALREADY_OPENED) {
|
|
// Has the interface for TakeSubTransactions() changed?
|
|
LOG(("TakeSubTranscations somehow called after "
|
|
"nsAHttpTransaction began processing\n"));
|
|
NS_ABORT_IF_FALSE(false,
|
|
"TakeSubTranscations somehow called after "
|
|
"nsAHttpTransaction began processing");
|
|
mTransaction->Close(NS_ERROR_ABORT);
|
|
return;
|
|
}
|
|
|
|
if (NS_FAILED(rv) && rv != NS_ERROR_NOT_IMPLEMENTED) {
|
|
// Has the interface for TakeSubTransactions() changed?
|
|
LOG(("unexpected rv from nnsAHttpTransaction::TakeSubTransactions()"));
|
|
NS_ABORT_IF_FALSE(false,
|
|
"unexpected result from "
|
|
"nsAHttpTransaction::TakeSubTransactions()");
|
|
mTransaction->Close(NS_ERROR_ABORT);
|
|
return;
|
|
}
|
|
|
|
if (NS_FAILED(rv)) { // includes NS_ERROR_NOT_IMPLEMENTED
|
|
NS_ABORT_IF_FALSE(list.IsEmpty(), "sub transaction list not empty");
|
|
|
|
// This is ok - treat mTransaction as a single real request.
|
|
// Wrap the old http transaction into the new spdy session
|
|
// as the first stream.
|
|
mSpdySession = new SpdySession(mTransaction,
|
|
mSocketTransport,
|
|
mPriority);
|
|
LOG(("nsHttpConnection::StartSpdy moves single transaction %p "
|
|
"into SpdySession %p\n", mTransaction.get(), mSpdySession.get()));
|
|
}
|
|
else {
|
|
NS_ABORT_IF_FALSE(!list.IsEmpty(), "sub transaction list empty");
|
|
|
|
PRInt32 count = list.Length();
|
|
|
|
LOG(("nsHttpConnection::StartSpdy moving transaction list len=%d "
|
|
"into SpdySession %p\n", count, mSpdySession.get()));
|
|
|
|
for (PRInt32 index = 0; index < count; ++index) {
|
|
if (!mSpdySession) {
|
|
mSpdySession = new SpdySession(list[index],
|
|
mSocketTransport,
|
|
mPriority);
|
|
}
|
|
else {
|
|
// AddStream() cannot fail
|
|
if (!mSpdySession->AddStream(list[index], mPriority)) {
|
|
NS_ABORT_IF_FALSE(false, "SpdySession::AddStream failed");
|
|
LOG(("SpdySession::AddStream failed\n"));
|
|
mTransaction->Close(NS_ERROR_ABORT);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
mSupportsPipelining = false; // dont use http/1 pipelines with spdy
|
|
mTransaction = mSpdySession;
|
|
mIdleTimeout = gHttpHandler->SpdyTimeout();
|
|
}
|
|
|
|
bool
|
|
nsHttpConnection::EnsureNPNComplete()
|
|
{
|
|
// NPN is only used by SPDY right now.
|
|
//
|
|
// If for some reason the components to check on NPN aren't available,
|
|
// this function will just return true to continue on and disable SPDY
|
|
|
|
if (!mSocketTransport) {
|
|
// this cannot happen
|
|
NS_ABORT_IF_FALSE(false,
|
|
"EnsureNPNComplete socket transport precondition");
|
|
mNPNComplete = true;
|
|
return true;
|
|
}
|
|
|
|
if (mNPNComplete)
|
|
return true;
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsISupports> securityInfo;
|
|
nsCOMPtr<nsISSLSocketControl> ssl;
|
|
nsCAutoString negotiatedNPN;
|
|
|
|
rv = mSocketTransport->GetSecurityInfo(getter_AddRefs(securityInfo));
|
|
if (NS_FAILED(rv))
|
|
goto npnComplete;
|
|
|
|
ssl = do_QueryInterface(securityInfo, &rv);
|
|
if (NS_FAILED(rv))
|
|
goto npnComplete;
|
|
|
|
rv = ssl->GetNegotiatedNPN(negotiatedNPN);
|
|
if (rv == NS_ERROR_NOT_CONNECTED) {
|
|
|
|
// By writing 0 bytes to the socket the SSL handshake machine is
|
|
// pushed forward.
|
|
PRUint32 count = 0;
|
|
rv = mSocketOut->Write("", 0, &count);
|
|
|
|
if (NS_FAILED(rv) && rv != NS_BASE_STREAM_WOULD_BLOCK)
|
|
goto npnComplete;
|
|
return false;
|
|
}
|
|
|
|
if (NS_FAILED(rv))
|
|
goto npnComplete;
|
|
|
|
LOG(("nsHttpConnection::EnsureNPNComplete %p negotiated to '%s'",
|
|
this, negotiatedNPN.get()));
|
|
|
|
if (negotiatedNPN.Equals(NS_LITERAL_CSTRING("spdy/2")))
|
|
StartSpdy();
|
|
|
|
mozilla::Telemetry::Accumulate(mozilla::Telemetry::SPDY_NPN_CONNECT,
|
|
mUsingSpdy);
|
|
|
|
npnComplete:
|
|
LOG(("nsHttpConnection::EnsureNPNComplete setting complete to true"));
|
|
mNPNComplete = true;
|
|
return true;
|
|
}
|
|
|
|
// called on the socket thread
|
|
nsresult
|
|
nsHttpConnection::Activate(nsAHttpTransaction *trans, PRUint8 caps, PRInt32 pri)
|
|
{
|
|
nsresult rv;
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
LOG(("nsHttpConnection::Activate [this=%x trans=%x caps=%x]\n",
|
|
this, trans, caps));
|
|
|
|
mPriority = pri;
|
|
if (mTransaction && mUsingSpdy)
|
|
return AddTransaction(trans, pri);
|
|
|
|
NS_ENSURE_ARG_POINTER(trans);
|
|
NS_ENSURE_TRUE(!mTransaction, NS_ERROR_IN_PROGRESS);
|
|
|
|
// Update security callbacks
|
|
nsCOMPtr<nsIInterfaceRequestor> callbacks;
|
|
nsCOMPtr<nsIEventTarget> callbackTarget;
|
|
trans->GetSecurityCallbacks(getter_AddRefs(callbacks),
|
|
getter_AddRefs(callbackTarget));
|
|
if (callbacks != mCallbacks) {
|
|
mCallbacks.swap(callbacks);
|
|
if (callbacks)
|
|
NS_ProxyRelease(mCallbackTarget, callbacks);
|
|
mCallbackTarget = callbackTarget;
|
|
}
|
|
|
|
SetupNPN(caps); // only for spdy
|
|
|
|
// take ownership of the transaction
|
|
mTransaction = trans;
|
|
|
|
NS_ABORT_IF_FALSE(!mIdleMonitoring,
|
|
"Activating a connection with an Idle Monitor");
|
|
mIdleMonitoring = false;
|
|
|
|
// set mKeepAlive according to what will be requested
|
|
mKeepAliveMask = mKeepAlive = (caps & NS_HTTP_ALLOW_KEEPALIVE);
|
|
|
|
// need to handle HTTP CONNECT tunnels if this is the first time if
|
|
// we are tunneling through a proxy
|
|
if (((mConnInfo->UsingSSL() && mConnInfo->UsingHttpProxy()) ||
|
|
mConnInfo->ShouldForceConnectMethod()) && !mCompletedProxyConnect) {
|
|
rv = SetupProxyConnect();
|
|
if (NS_FAILED(rv))
|
|
goto failed_activation;
|
|
}
|
|
|
|
// Clear the per activation counter
|
|
mCurrentBytesRead = 0;
|
|
|
|
// The overflow state is not needed between activations
|
|
mInputOverflow = nsnull;
|
|
|
|
rv = OnOutputStreamReady(mSocketOut);
|
|
|
|
failed_activation:
|
|
if (NS_FAILED(rv)) {
|
|
mTransaction = nsnull;
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::SetupNPN(PRUint8 caps)
|
|
{
|
|
if (mSetupNPNCalled) /* do only once */
|
|
return;
|
|
mSetupNPNCalled = true;
|
|
|
|
// Setup NPN Negotiation if necessary (only for SPDY)
|
|
if (!mNPNComplete) {
|
|
|
|
mNPNComplete = true;
|
|
|
|
if (mConnInfo->UsingSSL() &&
|
|
!(caps & NS_HTTP_DISALLOW_SPDY) &&
|
|
!mConnInfo->UsingHttpProxy() &&
|
|
gHttpHandler->IsSpdyEnabled()) {
|
|
LOG(("nsHttpConnection::Init Setting up SPDY Negotiation"));
|
|
nsCOMPtr<nsISupports> securityInfo;
|
|
nsresult rv =
|
|
mSocketTransport->GetSecurityInfo(getter_AddRefs(securityInfo));
|
|
if (NS_FAILED(rv))
|
|
return;
|
|
|
|
nsCOMPtr<nsISSLSocketControl> ssl =
|
|
do_QueryInterface(securityInfo, &rv);
|
|
if (NS_FAILED(rv))
|
|
return;
|
|
|
|
nsTArray<nsCString> protocolArray;
|
|
protocolArray.AppendElement(NS_LITERAL_CSTRING("spdy/2"));
|
|
protocolArray.AppendElement(NS_LITERAL_CSTRING("http/1.1"));
|
|
if (NS_SUCCEEDED(ssl->SetNPNList(protocolArray))) {
|
|
LOG(("nsHttpConnection::Init Setting up SPDY Negotiation OK"));
|
|
mNPNComplete = false;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::HandleAlternateProtocol(nsHttpResponseHead *responseHead)
|
|
{
|
|
// Look for the Alternate-Protocol header. Alternate-Protocol is
|
|
// essentially a way to rediect future transactions from http to
|
|
// spdy.
|
|
//
|
|
|
|
if (!gHttpHandler->IsSpdyEnabled() || mUsingSpdy)
|
|
return;
|
|
|
|
const char *val = responseHead->PeekHeader(nsHttp::Alternate_Protocol);
|
|
if (!val)
|
|
return;
|
|
|
|
// The spec allows redirections to any port, but due to concerns over
|
|
// silently redirecting to stealth ports we only allow port 443
|
|
//
|
|
// Alternate-Protocol: 5678:somethingelse, 443:npn-spdy/2
|
|
|
|
if (nsHttp::FindToken(val, "443:npn-spdy/2", HTTP_HEADER_VALUE_SEPS)) {
|
|
LOG(("Connection %p Transaction %p found Alternate-Protocol "
|
|
"header %s", this, mTransaction.get(), val));
|
|
gHttpHandler->ConnMgr()->ReportSpdyAlternateProtocol(this);
|
|
}
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::AddTransaction(nsAHttpTransaction *httpTransaction,
|
|
PRInt32 priority)
|
|
{
|
|
LOG(("nsHttpConnection::AddTransaction for SPDY"));
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
NS_ABORT_IF_FALSE(mSpdySession && mUsingSpdy,
|
|
"AddTransaction to live http connection without spdy");
|
|
NS_ABORT_IF_FALSE(mTransaction,
|
|
"AddTransaction to idle http connection");
|
|
|
|
if (!mSpdySession->AddStream(httpTransaction, priority)) {
|
|
NS_ABORT_IF_FALSE(0, "AddStream should never fail due to"
|
|
"RoomForMore() admission check");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
ResumeSend();
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::Close(nsresult reason)
|
|
{
|
|
LOG(("nsHttpConnection::Close [this=%x reason=%x]\n", this, reason));
|
|
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
if (NS_FAILED(reason)) {
|
|
if (mIdleMonitoring)
|
|
EndIdleMonitoring();
|
|
|
|
if (mSocketTransport) {
|
|
mSocketTransport->SetSecurityCallbacks(nsnull);
|
|
mSocketTransport->SetEventSink(nsnull, nsnull);
|
|
mSocketTransport->Close(reason);
|
|
}
|
|
mKeepAlive = false;
|
|
}
|
|
}
|
|
|
|
// called on the socket thread
|
|
nsresult
|
|
nsHttpConnection::ProxyStartSSL()
|
|
{
|
|
LOG(("nsHttpConnection::ProxyStartSSL [this=%x]\n", this));
|
|
#ifdef DEBUG
|
|
NS_PRECONDITION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
#endif
|
|
|
|
nsCOMPtr<nsISupports> securityInfo;
|
|
nsresult rv = mSocketTransport->GetSecurityInfo(getter_AddRefs(securityInfo));
|
|
if (NS_FAILED(rv)) return rv;
|
|
|
|
nsCOMPtr<nsISSLSocketControl> ssl = do_QueryInterface(securityInfo, &rv);
|
|
if (NS_FAILED(rv)) return rv;
|
|
|
|
return ssl->ProxyStartSSL();
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::DontReuse()
|
|
{
|
|
mKeepAliveMask = false;
|
|
mKeepAlive = false;
|
|
mIdleTimeout = 0;
|
|
if (mSpdySession)
|
|
mSpdySession->DontReuse();
|
|
}
|
|
|
|
bool
|
|
nsHttpConnection::CanReuse()
|
|
{
|
|
bool canReuse;
|
|
|
|
if (mUsingSpdy)
|
|
canReuse = mSpdySession->CanReuse();
|
|
else
|
|
canReuse = IsKeepAlive();
|
|
|
|
canReuse = canReuse &&
|
|
(NowInSeconds() - mLastReadTime < mIdleTimeout) &&
|
|
IsAlive();
|
|
|
|
// An idle persistent connection should not have data waiting to be read
|
|
// before a request is sent. Data here is likely a 408 timeout response
|
|
// which we would deal with later on through the restart logic, but that
|
|
// path is more expensive than just closing the socket now.
|
|
|
|
PRUint32 dataSize;
|
|
if (canReuse && mSocketIn && !mUsingSpdy &&
|
|
NS_SUCCEEDED(mSocketIn->Available(&dataSize)) && dataSize) {
|
|
LOG(("nsHttpConnection::CanReuse %p %s"
|
|
"Socket not reusable because read data pending (%d) on it.\n",
|
|
this, mConnInfo->Host(), dataSize));
|
|
canReuse = false;
|
|
}
|
|
return canReuse;
|
|
}
|
|
|
|
bool
|
|
nsHttpConnection::CanDirectlyActivate()
|
|
{
|
|
// return true if a new transaction can be addded to ths connection at any
|
|
// time through Activate(). In practice this means this is a healthy SPDY
|
|
// connection with room for more concurrent streams.
|
|
|
|
return UsingSpdy() && CanReuse() && mSpdySession->RoomForMoreStreams();
|
|
}
|
|
|
|
PRUint32 nsHttpConnection::TimeToLive()
|
|
{
|
|
PRInt32 tmp = mIdleTimeout - (NowInSeconds() - mLastReadTime);
|
|
if (0 > tmp)
|
|
tmp = 0;
|
|
|
|
return tmp;
|
|
}
|
|
|
|
bool
|
|
nsHttpConnection::IsAlive()
|
|
{
|
|
if (!mSocketTransport)
|
|
return false;
|
|
|
|
// SocketTransport::IsAlive can run the SSL state machine, so make sure
|
|
// the NPN options are set before that happens.
|
|
SetupNPN(0);
|
|
|
|
bool alive;
|
|
nsresult rv = mSocketTransport->IsAlive(&alive);
|
|
if (NS_FAILED(rv))
|
|
alive = false;
|
|
|
|
//#define TEST_RESTART_LOGIC
|
|
#ifdef TEST_RESTART_LOGIC
|
|
if (!alive) {
|
|
LOG(("pretending socket is still alive to test restart logic\n"));
|
|
alive = true;
|
|
}
|
|
#endif
|
|
|
|
return alive;
|
|
}
|
|
|
|
bool
|
|
nsHttpConnection::SupportsPipelining(nsHttpResponseHead *responseHead)
|
|
{
|
|
// SPDY supports infinite parallelism, so no need to pipeline.
|
|
if (mUsingSpdy)
|
|
return false;
|
|
|
|
// XXX there should be a strict mode available that disables this
|
|
// blacklisting.
|
|
|
|
// assuming connection is HTTP/1.1 with keep-alive enabled
|
|
if (mConnInfo->UsingHttpProxy() && !mConnInfo->UsingSSL()) {
|
|
// XXX check for bad proxy servers...
|
|
return true;
|
|
}
|
|
|
|
// XXX what about checking for a Via header? (transparent proxies)
|
|
|
|
// check for bad origin servers
|
|
const char *val = responseHead->PeekHeader(nsHttp::Server);
|
|
if (!val)
|
|
return false; // no header, no love
|
|
|
|
// The blacklist is indexed by the first character. All of these servers are
|
|
// known to return their identifier as the first thing in the server string,
|
|
// so we can do a leading match.
|
|
|
|
static const char *bad_servers[26][6] = {
|
|
{ nsnull }, { nsnull }, { nsnull }, { nsnull }, // a - d
|
|
{ "EFAServer/", nsnull }, // e
|
|
{ nsnull }, { nsnull }, { nsnull }, { nsnull }, // f - i
|
|
{ nsnull }, { nsnull }, { nsnull }, // j - l
|
|
{ "Microsoft-IIS/4.", "Microsoft-IIS/5.", nsnull }, // m
|
|
{ "Netscape-Enterprise/3.", "Netscape-Enterprise/4.",
|
|
"Netscape-Enterprise/5.", "Netscape-Enterprise/6.", nsnull }, // n
|
|
{ nsnull }, { nsnull }, { nsnull }, { nsnull }, // o - r
|
|
{ nsnull }, { nsnull }, { nsnull }, { nsnull }, // s - v
|
|
{ "WebLogic 3.", "WebLogic 4.","WebLogic 5.", "WebLogic 6.",
|
|
"Winstone Servlet Engine v0.", nsnull }, // w
|
|
{ nsnull }, { nsnull }, { nsnull } // x - z
|
|
};
|
|
|
|
int index = val[0] - 'A'; // the whole table begins with capital letters
|
|
if ((index >= 0) && (index <= 25))
|
|
{
|
|
for (int i = 0; bad_servers[index][i] != nsnull; i++) {
|
|
if (!PL_strncmp (val, bad_servers[index][i], strlen (bad_servers[index][i]))) {
|
|
LOG(("looks like this server does not support pipelining"));
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
// ok, let's allow pipelining to this server
|
|
return true;
|
|
}
|
|
|
|
//----------------------------------------------------------------------------
|
|
// nsHttpConnection::nsAHttpConnection compatible methods
|
|
//----------------------------------------------------------------------------
|
|
|
|
nsresult
|
|
nsHttpConnection::OnHeadersAvailable(nsAHttpTransaction *trans,
|
|
nsHttpRequestHead *requestHead,
|
|
nsHttpResponseHead *responseHead,
|
|
bool *reset)
|
|
{
|
|
LOG(("nsHttpConnection::OnHeadersAvailable [this=%p trans=%p response-head=%p]\n",
|
|
this, trans, responseHead));
|
|
|
|
NS_ASSERTION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
NS_ENSURE_ARG_POINTER(trans);
|
|
NS_ASSERTION(responseHead, "No response head?");
|
|
|
|
// If the server issued an explicit timeout, then we need to close down the
|
|
// socket transport. We pass an error code of NS_ERROR_NET_RESET to
|
|
// trigger the transactions 'restart' mechanism. We tell it to reset its
|
|
// response headers so that it will be ready to receive the new response.
|
|
if (responseHead->Status() == 408) {
|
|
Close(NS_ERROR_NET_RESET);
|
|
*reset = true;
|
|
return NS_OK;
|
|
}
|
|
|
|
// we won't change our keep-alive policy unless the server has explicitly
|
|
// told us to do so.
|
|
|
|
// inspect the connection headers for keep-alive info provided the
|
|
// transaction completed successfully.
|
|
const char *val = responseHead->PeekHeader(nsHttp::Connection);
|
|
if (!val)
|
|
val = responseHead->PeekHeader(nsHttp::Proxy_Connection);
|
|
|
|
// reset to default (the server may have changed since we last checked)
|
|
mSupportsPipelining = false;
|
|
|
|
if ((responseHead->Version() < NS_HTTP_VERSION_1_1) ||
|
|
(requestHead->Version() < NS_HTTP_VERSION_1_1)) {
|
|
// HTTP/1.0 connections are by default NOT persistent
|
|
if (val && !PL_strcasecmp(val, "keep-alive"))
|
|
mKeepAlive = true;
|
|
else
|
|
mKeepAlive = false;
|
|
}
|
|
else {
|
|
// HTTP/1.1 connections are by default persistent
|
|
if (val && !PL_strcasecmp(val, "close"))
|
|
mKeepAlive = false;
|
|
else {
|
|
mKeepAlive = true;
|
|
|
|
// Do not support pipelining when we are establishing
|
|
// an SSL tunnel though an HTTP proxy. Pipelining support
|
|
// determination must be based on comunication with the
|
|
// target server in this case. See bug 422016 for futher
|
|
// details.
|
|
if (!mProxyConnectStream)
|
|
mSupportsPipelining = SupportsPipelining(responseHead);
|
|
}
|
|
}
|
|
mKeepAliveMask = mKeepAlive;
|
|
|
|
// if this connection is persistent, then the server may send a "Keep-Alive"
|
|
// header specifying the maximum number of times the connection can be
|
|
// reused as well as the maximum amount of time the connection can be idle
|
|
// before the server will close it. we ignore the max reuse count, because
|
|
// a "keep-alive" connection is by definition capable of being reused, and
|
|
// we only care about being able to reuse it once. if a timeout is not
|
|
// specified then we use our advertized timeout value.
|
|
if (mKeepAlive) {
|
|
val = responseHead->PeekHeader(nsHttp::Keep_Alive);
|
|
|
|
if (!mUsingSpdy) {
|
|
const char *cp = PL_strcasestr(val, "timeout=");
|
|
if (cp)
|
|
mIdleTimeout = (PRUint32) atoi(cp + 8);
|
|
else
|
|
mIdleTimeout = gHttpHandler->IdleTimeout();
|
|
}
|
|
else {
|
|
mIdleTimeout = gHttpHandler->SpdyTimeout();
|
|
}
|
|
|
|
LOG(("Connection can be reused [this=%x idle-timeout=%u]\n", this, mIdleTimeout));
|
|
}
|
|
|
|
if (!mProxyConnectStream)
|
|
HandleAlternateProtocol(responseHead);
|
|
|
|
// if we're doing an SSL proxy connect, then we need to check whether or not
|
|
// the connect was successful. if so, then we have to reset the transaction
|
|
// and step-up the socket connection to SSL. finally, we have to wake up the
|
|
// socket write request.
|
|
if (mProxyConnectStream) {
|
|
NS_ABORT_IF_FALSE(!mUsingSpdy,
|
|
"SPDY NPN Complete while using proxy connect stream");
|
|
mProxyConnectStream = 0;
|
|
if (responseHead->Status() == 200) {
|
|
LOG(("proxy CONNECT succeeded! ssl=%s\n",
|
|
mConnInfo->UsingSSL() ? "true" :"false"));
|
|
*reset = true;
|
|
nsresult rv;
|
|
if (mConnInfo->UsingSSL()) {
|
|
rv = ProxyStartSSL();
|
|
if (NS_FAILED(rv)) // XXX need to handle this for real
|
|
LOG(("ProxyStartSSL failed [rv=%x]\n", rv));
|
|
}
|
|
mCompletedProxyConnect = true;
|
|
rv = mSocketOut->AsyncWait(this, 0, 0, nsnull);
|
|
// XXX what if this fails -- need to handle this error
|
|
NS_ASSERTION(NS_SUCCEEDED(rv), "mSocketOut->AsyncWait failed");
|
|
}
|
|
else {
|
|
LOG(("proxy CONNECT failed! ssl=%s\n",
|
|
mConnInfo->UsingSSL() ? "true" :"false"));
|
|
mTransaction->SetSSLConnectFailed();
|
|
}
|
|
}
|
|
|
|
const char *upgradeReq = requestHead->PeekHeader(nsHttp::Upgrade);
|
|
if (upgradeReq) {
|
|
LOG(("HTTP Upgrade in play - disable keepalive\n"));
|
|
DontReuse();
|
|
}
|
|
|
|
if (responseHead->Status() == 101) {
|
|
const char *upgradeResp = responseHead->PeekHeader(nsHttp::Upgrade);
|
|
if (!upgradeReq || !upgradeResp ||
|
|
!nsHttp::FindToken(upgradeResp, upgradeReq,
|
|
HTTP_HEADER_VALUE_SEPS)) {
|
|
LOG(("HTTP 101 Upgrade header mismatch req = %s, resp = %s\n",
|
|
upgradeReq, upgradeResp));
|
|
Close(NS_ERROR_ABORT);
|
|
}
|
|
else {
|
|
LOG(("HTTP Upgrade Response to %s\n", upgradeResp));
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
bool
|
|
nsHttpConnection::IsReused()
|
|
{
|
|
if (mIsReused)
|
|
return true;
|
|
if (!mConsiderReusedAfterInterval)
|
|
return false;
|
|
|
|
// ReusedAfter allows a socket to be consider reused only after a certain
|
|
// interval of time has passed
|
|
return (PR_IntervalNow() - mConsiderReusedAfterEpoch) >=
|
|
mConsiderReusedAfterInterval;
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::SetIsReusedAfter(PRUint32 afterMilliseconds)
|
|
{
|
|
mConsiderReusedAfterEpoch = PR_IntervalNow();
|
|
mConsiderReusedAfterInterval = PR_MillisecondsToInterval(afterMilliseconds);
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::TakeTransport(nsISocketTransport **aTransport,
|
|
nsIAsyncInputStream **aInputStream,
|
|
nsIAsyncOutputStream **aOutputStream)
|
|
{
|
|
if (mUsingSpdy)
|
|
return NS_ERROR_FAILURE;
|
|
if (mTransaction && !mTransaction->IsDone())
|
|
return NS_ERROR_IN_PROGRESS;
|
|
if (!(mSocketTransport && mSocketIn && mSocketOut))
|
|
return NS_ERROR_NOT_INITIALIZED;
|
|
|
|
if (mInputOverflow)
|
|
mSocketIn = mInputOverflow.forget();
|
|
|
|
NS_IF_ADDREF(*aTransport = mSocketTransport);
|
|
NS_IF_ADDREF(*aInputStream = mSocketIn);
|
|
NS_IF_ADDREF(*aOutputStream = mSocketOut);
|
|
|
|
mSocketTransport->SetSecurityCallbacks(nsnull);
|
|
mSocketTransport->SetEventSink(nsnull, nsnull);
|
|
mSocketTransport = nsnull;
|
|
mSocketIn = nsnull;
|
|
mSocketOut = nsnull;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::GetSecurityInfo(nsISupports **secinfo)
|
|
{
|
|
NS_ASSERTION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
if (mSocketTransport) {
|
|
if (NS_FAILED(mSocketTransport->GetSecurityInfo(secinfo)))
|
|
*secinfo = nsnull;
|
|
}
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::PushBack(const char *data, PRUint32 length)
|
|
{
|
|
LOG(("nsHttpConnection::PushBack [this=%p, length=%d]\n", this, length));
|
|
|
|
if (mInputOverflow) {
|
|
NS_ERROR("nsHttpConnection::PushBack only one buffer supported");
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
mInputOverflow = new nsPreloadedStream(mSocketIn, data, length);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::ResumeSend()
|
|
{
|
|
LOG(("nsHttpConnection::ResumeSend [this=%p]\n", this));
|
|
|
|
NS_ASSERTION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
if (mSocketOut)
|
|
return mSocketOut->AsyncWait(this, 0, 0, nsnull);
|
|
|
|
NS_NOTREACHED("no socket output stream");
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::ResumeRecv()
|
|
{
|
|
LOG(("nsHttpConnection::ResumeRecv [this=%p]\n", this));
|
|
|
|
NS_ASSERTION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
if (mSocketIn)
|
|
return mSocketIn->AsyncWait(this, 0, 0, nsnull);
|
|
|
|
NS_NOTREACHED("no socket input stream");
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::BeginIdleMonitoring()
|
|
{
|
|
LOG(("nsHttpConnection::BeginIdleMonitoring [this=%p]\n", this));
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
NS_ABORT_IF_FALSE(!mTransaction, "BeginIdleMonitoring() while active");
|
|
NS_ABORT_IF_FALSE(!mUsingSpdy, "Idle monitoring of spdy not allowed");
|
|
|
|
LOG(("Entering Idle Monitoring Mode [this=%p]", this));
|
|
mIdleMonitoring = true;
|
|
if (mSocketIn)
|
|
mSocketIn->AsyncWait(this, 0, 0, nsnull);
|
|
}
|
|
|
|
void
|
|
nsHttpConnection::EndIdleMonitoring()
|
|
{
|
|
LOG(("nsHttpConnection::EndIdleMonitoring [this=%p]\n", this));
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
NS_ABORT_IF_FALSE(!mTransaction, "EndIdleMonitoring() while active");
|
|
|
|
if (mIdleMonitoring) {
|
|
LOG(("Leaving Idle Monitoring Mode [this=%p]", this));
|
|
mIdleMonitoring = false;
|
|
if (mSocketIn)
|
|
mSocketIn->AsyncWait(nsnull, 0, 0, nsnull);
|
|
}
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// nsHttpConnection <private>
|
|
//-----------------------------------------------------------------------------
|
|
|
|
void
|
|
nsHttpConnection::CloseTransaction(nsAHttpTransaction *trans, nsresult reason)
|
|
{
|
|
LOG(("nsHttpConnection::CloseTransaction[this=%x trans=%x reason=%x]\n",
|
|
this, trans, reason));
|
|
|
|
NS_ASSERTION(trans == mTransaction, "wrong transaction");
|
|
NS_ASSERTION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
if (mCurrentBytesRead > mMaxBytesRead)
|
|
mMaxBytesRead = mCurrentBytesRead;
|
|
|
|
// mask this error code because its not a real error.
|
|
if (reason == NS_BASE_STREAM_CLOSED)
|
|
reason = NS_OK;
|
|
|
|
if (mUsingSpdy) {
|
|
DontReuse();
|
|
// if !mSpdySession then mUsingSpdy must be false for canreuse()
|
|
mUsingSpdy = false;
|
|
mSpdySession = nsnull;
|
|
}
|
|
|
|
mHttp1xTransactionCount += mTransaction->Http1xTransactionCount();
|
|
|
|
mTransaction->Close(reason);
|
|
mTransaction = nsnull;
|
|
|
|
if (mCallbacks) {
|
|
nsIInterfaceRequestor *cbs = nsnull;
|
|
mCallbacks.swap(cbs);
|
|
NS_ProxyRelease(mCallbackTarget, cbs);
|
|
}
|
|
|
|
if (NS_FAILED(reason))
|
|
Close(reason);
|
|
|
|
// flag the connection as reused here for convenience sake. certainly
|
|
// it might be going away instead ;-)
|
|
mIsReused = true;
|
|
}
|
|
|
|
NS_METHOD
|
|
nsHttpConnection::ReadFromStream(nsIInputStream *input,
|
|
void *closure,
|
|
const char *buf,
|
|
PRUint32 offset,
|
|
PRUint32 count,
|
|
PRUint32 *countRead)
|
|
{
|
|
// thunk for nsIInputStream instance
|
|
nsHttpConnection *conn = (nsHttpConnection *) closure;
|
|
return conn->OnReadSegment(buf, count, countRead);
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::OnReadSegment(const char *buf,
|
|
PRUint32 count,
|
|
PRUint32 *countRead)
|
|
{
|
|
if (count == 0) {
|
|
// some ReadSegments implementations will erroneously call the writer
|
|
// to consume 0 bytes worth of data. we must protect against this case
|
|
// or else we'd end up closing the socket prematurely.
|
|
NS_ERROR("bad ReadSegments implementation");
|
|
return NS_ERROR_FAILURE; // stop iterating
|
|
}
|
|
|
|
nsresult rv = mSocketOut->Write(buf, count, countRead);
|
|
if (NS_FAILED(rv))
|
|
mSocketOutCondition = rv;
|
|
else if (*countRead == 0)
|
|
mSocketOutCondition = NS_BASE_STREAM_CLOSED;
|
|
else
|
|
mSocketOutCondition = NS_OK; // reset condition
|
|
|
|
return mSocketOutCondition;
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::OnSocketWritable()
|
|
{
|
|
LOG(("nsHttpConnection::OnSocketWritable [this=%x]\n", this));
|
|
|
|
nsresult rv;
|
|
PRUint32 n;
|
|
bool again = true;
|
|
|
|
do {
|
|
mSocketOutCondition = NS_OK;
|
|
|
|
// if we're doing an SSL proxy connect, then we need to bypass calling
|
|
// into the transaction.
|
|
//
|
|
// NOTE: this code path can't be shared since the transaction doesn't
|
|
// implement nsIInputStream. doing so is not worth the added cost of
|
|
// extra indirections during normal reading.
|
|
//
|
|
if (mProxyConnectStream) {
|
|
LOG((" writing CONNECT request stream\n"));
|
|
rv = mProxyConnectStream->ReadSegments(ReadFromStream, this,
|
|
nsIOService::gDefaultSegmentSize,
|
|
&n);
|
|
}
|
|
else if (!EnsureNPNComplete()) {
|
|
// When SPDY is disabled this branch is not executed because Activate()
|
|
// sets mNPNComplete to true in that case.
|
|
|
|
// We are ready to proceed with SSL but the handshake is not done.
|
|
// When using NPN to negotiate between HTTPS and SPDY, we need to
|
|
// see the results of the handshake to know what bytes to send, so
|
|
// we cannot proceed with the request headers.
|
|
|
|
rv = NS_OK;
|
|
mSocketOutCondition = NS_BASE_STREAM_WOULD_BLOCK;
|
|
n = 0;
|
|
}
|
|
else {
|
|
if (!mReportedSpdy) {
|
|
mReportedSpdy = true;
|
|
gHttpHandler->ConnMgr()->ReportSpdyConnection(this, mUsingSpdy);
|
|
}
|
|
|
|
LOG((" writing transaction request stream\n"));
|
|
rv = mTransaction->ReadSegments(this, nsIOService::gDefaultSegmentSize, &n);
|
|
}
|
|
|
|
LOG((" ReadSegments returned [rv=%x read=%u sock-cond=%x]\n",
|
|
rv, n, mSocketOutCondition));
|
|
|
|
// XXX some streams return NS_BASE_STREAM_CLOSED to indicate EOF.
|
|
if (rv == NS_BASE_STREAM_CLOSED) {
|
|
rv = NS_OK;
|
|
n = 0;
|
|
}
|
|
|
|
if (NS_FAILED(rv)) {
|
|
// if the transaction didn't want to write any more data, then
|
|
// wait for the transaction to call ResumeSend.
|
|
if (rv == NS_BASE_STREAM_WOULD_BLOCK)
|
|
rv = NS_OK;
|
|
again = false;
|
|
}
|
|
else if (NS_FAILED(mSocketOutCondition)) {
|
|
if (mSocketOutCondition == NS_BASE_STREAM_WOULD_BLOCK)
|
|
rv = mSocketOut->AsyncWait(this, 0, 0, nsnull); // continue writing
|
|
else
|
|
rv = mSocketOutCondition;
|
|
again = false;
|
|
}
|
|
else if (n == 0) {
|
|
//
|
|
// at this point we've written out the entire transaction, and now we
|
|
// must wait for the server's response. we manufacture a status message
|
|
// here to reflect the fact that we are waiting. this message will be
|
|
// trumped (overwritten) if the server responds quickly.
|
|
//
|
|
mTransaction->OnTransportStatus(mSocketTransport,
|
|
nsISocketTransport::STATUS_WAITING_FOR,
|
|
LL_ZERO);
|
|
|
|
rv = mSocketIn->AsyncWait(this, 0, 0, nsnull); // start reading
|
|
again = false;
|
|
}
|
|
// write more to the socket until error or end-of-request...
|
|
} while (again);
|
|
|
|
return rv;
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::OnWriteSegment(char *buf,
|
|
PRUint32 count,
|
|
PRUint32 *countWritten)
|
|
{
|
|
if (count == 0) {
|
|
// some WriteSegments implementations will erroneously call the reader
|
|
// to provide 0 bytes worth of data. we must protect against this case
|
|
// or else we'd end up closing the socket prematurely.
|
|
NS_ERROR("bad WriteSegments implementation");
|
|
return NS_ERROR_FAILURE; // stop iterating
|
|
}
|
|
|
|
nsresult rv = mSocketIn->Read(buf, count, countWritten);
|
|
if (NS_FAILED(rv))
|
|
mSocketInCondition = rv;
|
|
else if (*countWritten == 0)
|
|
mSocketInCondition = NS_BASE_STREAM_CLOSED;
|
|
else
|
|
mSocketInCondition = NS_OK; // reset condition
|
|
|
|
return mSocketInCondition;
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::OnSocketReadable()
|
|
{
|
|
LOG(("nsHttpConnection::OnSocketReadable [this=%x]\n", this));
|
|
|
|
PRUint32 now = NowInSeconds();
|
|
|
|
if (mKeepAliveMask && (now - mLastReadTime >= PRUint32(mMaxHangTime))) {
|
|
LOG(("max hang time exceeded!\n"));
|
|
// give the handler a chance to create a new persistent connection to
|
|
// this host if we've been busy for too long.
|
|
mKeepAliveMask = false;
|
|
gHttpHandler->ProcessPendingQ(mConnInfo);
|
|
}
|
|
mLastReadTime = now;
|
|
|
|
nsresult rv;
|
|
PRUint32 n;
|
|
bool again = true;
|
|
|
|
do {
|
|
rv = mTransaction->WriteSegments(this, nsIOService::gDefaultSegmentSize, &n);
|
|
if (NS_FAILED(rv)) {
|
|
// if the transaction didn't want to take any more data, then
|
|
// wait for the transaction to call ResumeRecv.
|
|
if (rv == NS_BASE_STREAM_WOULD_BLOCK)
|
|
rv = NS_OK;
|
|
again = false;
|
|
}
|
|
else {
|
|
mCurrentBytesRead += n;
|
|
mTotalBytesRead += n;
|
|
if (NS_FAILED(mSocketInCondition)) {
|
|
// continue waiting for the socket if necessary...
|
|
if (mSocketInCondition == NS_BASE_STREAM_WOULD_BLOCK)
|
|
rv = mSocketIn->AsyncWait(this, 0, 0, nsnull);
|
|
else
|
|
rv = mSocketInCondition;
|
|
again = false;
|
|
}
|
|
}
|
|
// read more from the socket until error...
|
|
} while (again);
|
|
|
|
return rv;
|
|
}
|
|
|
|
nsresult
|
|
nsHttpConnection::SetupProxyConnect()
|
|
{
|
|
const char *val;
|
|
|
|
LOG(("nsHttpConnection::SetupProxyConnect [this=%x]\n", this));
|
|
|
|
NS_ENSURE_TRUE(!mProxyConnectStream, NS_ERROR_ALREADY_INITIALIZED);
|
|
NS_ABORT_IF_FALSE(!mUsingSpdy,
|
|
"SPDY NPN Complete while using proxy connect stream");
|
|
|
|
nsCAutoString buf;
|
|
nsresult rv = nsHttpHandler::GenerateHostPort(
|
|
nsDependentCString(mConnInfo->Host()), mConnInfo->Port(), buf);
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
|
|
// CONNECT host:port HTTP/1.1
|
|
nsHttpRequestHead request;
|
|
request.SetMethod(nsHttp::Connect);
|
|
request.SetVersion(gHttpHandler->HttpVersion());
|
|
request.SetRequestURI(buf);
|
|
request.SetHeader(nsHttp::User_Agent, gHttpHandler->UserAgent());
|
|
|
|
// send this header for backwards compatibility.
|
|
request.SetHeader(nsHttp::Proxy_Connection, NS_LITERAL_CSTRING("keep-alive"));
|
|
|
|
val = mTransaction->RequestHead()->PeekHeader(nsHttp::Host);
|
|
if (val) {
|
|
// all HTTP/1.1 requests must include a Host header (even though it
|
|
// may seem redundant in this case; see bug 82388).
|
|
request.SetHeader(nsHttp::Host, nsDependentCString(val));
|
|
}
|
|
|
|
val = mTransaction->RequestHead()->PeekHeader(nsHttp::Proxy_Authorization);
|
|
if (val) {
|
|
// we don't know for sure if this authorization is intended for the
|
|
// SSL proxy, so we add it just in case.
|
|
request.SetHeader(nsHttp::Proxy_Authorization, nsDependentCString(val));
|
|
}
|
|
|
|
buf.Truncate();
|
|
request.Flatten(buf, false);
|
|
buf.AppendLiteral("\r\n");
|
|
|
|
return NS_NewCStringInputStream(getter_AddRefs(mProxyConnectStream), buf);
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// nsHttpConnection::nsISupports
|
|
//-----------------------------------------------------------------------------
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS4(nsHttpConnection,
|
|
nsIInputStreamCallback,
|
|
nsIOutputStreamCallback,
|
|
nsITransportEventSink,
|
|
nsIInterfaceRequestor)
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// nsHttpConnection::nsIInputStreamCallback
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// called on the socket transport thread
|
|
NS_IMETHODIMP
|
|
nsHttpConnection::OnInputStreamReady(nsIAsyncInputStream *in)
|
|
{
|
|
NS_ASSERTION(in == mSocketIn, "unexpected stream");
|
|
NS_ASSERTION(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
|
|
if (mIdleMonitoring) {
|
|
NS_ABORT_IF_FALSE(!mTransaction, "Idle Input Event While Active");
|
|
|
|
// The only read event that is protocol compliant for an idle connection
|
|
// is an EOF, which we check for with CanReuse(). If the data is
|
|
// something else then just ignore it and suspend checking for EOF -
|
|
// our normal timers or protocol stack are the place to deal with
|
|
// any exception logic.
|
|
|
|
if (!CanReuse()) {
|
|
LOG(("Server initiated close of idle conn %p\n", this));
|
|
gHttpHandler->ConnMgr()->CloseIdleConnection(this);
|
|
return NS_OK;
|
|
}
|
|
|
|
LOG(("Input data on idle conn %p, but not closing yet\n", this));
|
|
return NS_OK;
|
|
}
|
|
|
|
// if the transaction was dropped...
|
|
if (!mTransaction) {
|
|
LOG((" no transaction; ignoring event\n"));
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv = OnSocketReadable();
|
|
if (NS_FAILED(rv))
|
|
CloseTransaction(mTransaction, rv);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// nsHttpConnection::nsIOutputStreamCallback
|
|
//-----------------------------------------------------------------------------
|
|
|
|
NS_IMETHODIMP
|
|
nsHttpConnection::OnOutputStreamReady(nsIAsyncOutputStream *out)
|
|
{
|
|
NS_ABORT_IF_FALSE(PR_GetCurrentThread() == gSocketThread, "wrong thread");
|
|
NS_ABORT_IF_FALSE(out == mSocketOut, "unexpected socket");
|
|
|
|
// if the transaction was dropped...
|
|
if (!mTransaction) {
|
|
LOG((" no transaction; ignoring event\n"));
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv = OnSocketWritable();
|
|
if (NS_FAILED(rv))
|
|
CloseTransaction(mTransaction, rv);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// nsHttpConnection::nsITransportEventSink
|
|
//-----------------------------------------------------------------------------
|
|
|
|
NS_IMETHODIMP
|
|
nsHttpConnection::OnTransportStatus(nsITransport *trans,
|
|
nsresult status,
|
|
PRUint64 progress,
|
|
PRUint64 progressMax)
|
|
{
|
|
if (mTransaction)
|
|
mTransaction->OnTransportStatus(trans, status, progress);
|
|
return NS_OK;
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// nsHttpConnection::nsIInterfaceRequestor
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// not called on the socket transport thread
|
|
NS_IMETHODIMP
|
|
nsHttpConnection::GetInterface(const nsIID &iid, void **result)
|
|
{
|
|
// NOTE: This function is only called on the UI thread via sync proxy from
|
|
// the socket transport thread. If that weren't the case, then we'd
|
|
// have to worry about the possibility of mTransaction going away
|
|
// part-way through this function call. See CloseTransaction.
|
|
|
|
// NOTE - there is a bug here, the call to getinterface is proxied off the
|
|
// nss thread, not the ui thread as the above comment says. So there is
|
|
// indeed a chance of mTransaction going away. bug 615342
|
|
|
|
NS_ASSERTION(PR_GetCurrentThread() != gSocketThread, "wrong thread");
|
|
|
|
if (mCallbacks)
|
|
return mCallbacks->GetInterface(iid, result);
|
|
return NS_ERROR_NO_INTERFACE;
|
|
}
|