blob: d59710b031fb6e7f3fe2d9940cac89eb0a84931d [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/socket/client_socket_pool_manager.h"
#include <memory>
#include "base/logging.h"
#include "base/stl_util.h"
#include "base/strings/stringprintf.h"
#include "net/base/load_flags.h"
#include "net/http/http_proxy_connect_job.h"
#include "net/http/http_stream_factory.h"
#include "net/proxy_resolution/proxy_info.h"
#include "net/socket/client_socket_handle.h"
#include "net/socket/socks_connect_job.h"
#include "net/socket/ssl_connect_job.h"
#include "net/socket/transport_client_socket_pool.h"
#include "net/socket/transport_connect_job.h"
#include "net/ssl/ssl_config.h"
namespace net {
namespace {
// Limit of sockets of each socket pool.
int g_max_sockets_per_pool[] = {
256, // NORMAL_SOCKET_POOL
256 // WEBSOCKET_SOCKET_POOL
};
static_assert(base::size(g_max_sockets_per_pool) ==
HttpNetworkSession::NUM_SOCKET_POOL_TYPES,
"max sockets per pool length mismatch");
// Default to allow up to 6 connections per host. Experiment and tuning may
// try other values (greater than 0). Too large may cause many problems, such
// as home routers blocking the connections!?!? See http://crbug.com/12066.
//
// WebSocket connections are long-lived, and should be treated differently
// than normal other connections. Use a limit of 255, so the limit for wss will
// be the same as the limit for ws. Also note that Firefox uses a limit of 200.
// See http://crbug.com/486800
int g_max_sockets_per_group[] = {
6, // NORMAL_SOCKET_POOL
255 // WEBSOCKET_SOCKET_POOL
};
static_assert(base::size(g_max_sockets_per_group) ==
HttpNetworkSession::NUM_SOCKET_POOL_TYPES,
"max sockets per group length mismatch");
// The max number of sockets to allow per proxy server. This applies both to
// http and SOCKS proxies. See http://crbug.com/12066 and
// http://crbug.com/44501 for details about proxy server connection limits.
int g_max_sockets_per_proxy_server[] = {
kDefaultMaxSocketsPerProxyServer, // NORMAL_SOCKET_POOL
kDefaultMaxSocketsPerProxyServer // WEBSOCKET_SOCKET_POOL
};
base::TimeDelta g_unused_idle_socket_timeout = base::TimeDelta::FromSeconds(10);
static_assert(base::size(g_max_sockets_per_proxy_server) ==
HttpNetworkSession::NUM_SOCKET_POOL_TYPES,
"max sockets per proxy server length mismatch");
// The meat of the implementation for the InitSocketHandleForHttpRequest,
// InitSocketHandleForRawConnect and PreconnectSocketsForHttpRequest methods.
scoped_refptr<TransportClientSocketPool::SocketParams>
CreateSocketParamsAndGetGroupName(
ClientSocketPoolManager::SocketGroupType group_type,
const HostPortPair& endpoint,
int request_load_flags,
HttpNetworkSession* session,
const ProxyInfo& proxy_info,
quic::QuicTransportVersion quic_version,
const SSLConfig& ssl_config_for_origin,
const SSLConfig& ssl_config_for_proxy,
bool force_tunnel,
PrivacyMode privacy_mode,
const OnHostResolutionCallback& resolution_callback,
std::string* connection_group) {
scoped_refptr<HttpProxySocketParams> http_proxy_params;
scoped_refptr<SOCKSSocketParams> socks_params;
const bool using_ssl = group_type == ClientSocketPoolManager::SSL_GROUP;
HostPortPair origin_host_port = endpoint;
if (!using_ssl && session->params().testing_fixed_http_port != 0) {
origin_host_port.set_port(session->params().testing_fixed_http_port);
} else if (using_ssl && session->params().testing_fixed_https_port != 0) {
origin_host_port.set_port(session->params().testing_fixed_https_port);
}
// LOAD_BYPASS_CACHE should bypass the host cache as well as the HTTP cache.
// Other cache-related load flags should not have this effect.
bool disable_resolver_cache = request_load_flags & LOAD_BYPASS_CACHE;
// Build the string used to uniquely identify connections of this type.
// Determine the host and port to connect to.
*connection_group = origin_host_port.ToString();
DCHECK(!connection_group->empty());
if (group_type == ClientSocketPoolManager::FTP_GROUP) {
// Combining FTP with forced SPDY over SSL would be a "path to madness".
// Make sure we never do that.
DCHECK(!using_ssl);
*connection_group = "ftp/" + *connection_group;
}
if (using_ssl) {
std::string prefix = "ssl/";
if (ssl_config_for_origin.version_interference_probe) {
prefix += "version-interference-probe/";
}
*connection_group = prefix + *connection_group;
}
if (!proxy_info.is_direct()) {
ProxyServer proxy_server = proxy_info.proxy_server();
scoped_refptr<TransportSocketParams> proxy_tcp_params(
new TransportSocketParams(proxy_server.host_port_pair(),
disable_resolver_cache, resolution_callback));
if (proxy_info.is_http() || proxy_info.is_https() || proxy_info.is_quic()) {
scoped_refptr<SSLSocketParams> ssl_params;
if (!proxy_info.is_http()) {
proxy_tcp_params = new TransportSocketParams(
proxy_server.host_port_pair(), disable_resolver_cache,
resolution_callback);
// Set ssl_params, and unset proxy_tcp_params
ssl_params = new SSLSocketParams(
proxy_tcp_params, nullptr, nullptr, proxy_server.host_port_pair(),
ssl_config_for_proxy, PRIVACY_MODE_DISABLED);
proxy_tcp_params = nullptr;
}
if (!proxy_info.is_quic()) {
quic_version = quic::QUIC_VERSION_UNSUPPORTED;
}
http_proxy_params = new HttpProxySocketParams(
proxy_tcp_params, ssl_params, quic_version, origin_host_port,
session->http_auth_cache(), session->http_auth_handler_factory(),
session->spdy_session_pool(), session->quic_stream_factory(),
proxy_server.is_trusted_proxy(), force_tunnel || using_ssl,
NetworkTrafficAnnotationTag(proxy_info.traffic_annotation()));
} else {
DCHECK(proxy_info.is_socks());
socks_params = new SOCKSSocketParams(
proxy_tcp_params, proxy_server.scheme() == ProxyServer::SCHEME_SOCKS5,
origin_host_port,
NetworkTrafficAnnotationTag(proxy_info.traffic_annotation()));
}
}
// Change group name if privacy mode is enabled.
if (privacy_mode == PRIVACY_MODE_ENABLED)
*connection_group = "pm/" + *connection_group;
// Deal with SSL - which layers on top of any given proxy.
if (using_ssl) {
scoped_refptr<TransportSocketParams> ssl_tcp_params;
if (proxy_info.is_direct()) {
ssl_tcp_params = base::MakeRefCounted<TransportSocketParams>(
origin_host_port, disable_resolver_cache, resolution_callback);
}
scoped_refptr<SSLSocketParams> ssl_params =
base::MakeRefCounted<SSLSocketParams>(
ssl_tcp_params, socks_params, http_proxy_params, origin_host_port,
ssl_config_for_origin, privacy_mode);
return TransportClientSocketPool::SocketParams::CreateFromSSLSocketParams(
std::move(ssl_params));
}
if (proxy_info.is_http() || proxy_info.is_https()) {
return TransportClientSocketPool::SocketParams::
CreateFromHttpProxySocketParams(std::move(http_proxy_params));
}
if (proxy_info.is_socks()) {
return TransportClientSocketPool::SocketParams::CreateFromSOCKSSocketParams(
socks_params);
}
DCHECK(proxy_info.is_direct());
scoped_refptr<TransportSocketParams> tcp_params = new TransportSocketParams(
origin_host_port, disable_resolver_cache, resolution_callback);
return TransportClientSocketPool::SocketParams::
CreateFromTransportSocketParams(std::move(tcp_params));
}
int InitSocketPoolHelper(
ClientSocketPoolManager::SocketGroupType group_type,
const HostPortPair& endpoint,
int request_load_flags,
RequestPriority request_priority,
HttpNetworkSession* session,
const ProxyInfo& proxy_info,
quic::QuicTransportVersion quic_version,
const SSLConfig& ssl_config_for_origin,
const SSLConfig& ssl_config_for_proxy,
bool force_tunnel,
PrivacyMode privacy_mode,
const SocketTag& socket_tag,
const NetLogWithSource& net_log,
int num_preconnect_streams,
ClientSocketHandle* socket_handle,
HttpNetworkSession::SocketPoolType socket_pool_type,
const OnHostResolutionCallback& resolution_callback,
CompletionOnceCallback callback,
const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback) {
std::string connection_group;
scoped_refptr<TransportClientSocketPool::SocketParams> socket_params =
CreateSocketParamsAndGetGroupName(
group_type, endpoint, request_load_flags, session, proxy_info,
quic_version, ssl_config_for_origin, ssl_config_for_proxy,
force_tunnel, privacy_mode, resolution_callback, &connection_group);
TransportClientSocketPool* pool =
session->GetSocketPool(socket_pool_type, proxy_info.proxy_server());
ClientSocketPool::RespectLimits respect_limits =
ClientSocketPool::RespectLimits::ENABLED;
if ((request_load_flags & LOAD_IGNORE_LIMITS) != 0)
respect_limits = ClientSocketPool::RespectLimits::DISABLED;
if (num_preconnect_streams) {
RequestSocketsForPool(pool, connection_group, std::move(socket_params),
num_preconnect_streams, net_log);
return OK;
}
return socket_handle->Init(
connection_group, std::move(socket_params), request_priority, socket_tag,
respect_limits, std::move(callback), proxy_auth_callback, pool, net_log);
}
} // namespace
ClientSocketPoolManager::ClientSocketPoolManager() = default;
ClientSocketPoolManager::~ClientSocketPoolManager() = default;
// static
int ClientSocketPoolManager::max_sockets_per_pool(
HttpNetworkSession::SocketPoolType pool_type) {
DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
return g_max_sockets_per_pool[pool_type];
}
// static
void ClientSocketPoolManager::set_max_sockets_per_pool(
HttpNetworkSession::SocketPoolType pool_type,
int socket_count) {
DCHECK_LT(0, socket_count);
DCHECK_GT(1000, socket_count); // Sanity check.
DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
g_max_sockets_per_pool[pool_type] = socket_count;
DCHECK_GE(g_max_sockets_per_pool[pool_type],
g_max_sockets_per_group[pool_type]);
}
// static
int ClientSocketPoolManager::max_sockets_per_group(
HttpNetworkSession::SocketPoolType pool_type) {
DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
return g_max_sockets_per_group[pool_type];
}
// static
void ClientSocketPoolManager::set_max_sockets_per_group(
HttpNetworkSession::SocketPoolType pool_type,
int socket_count) {
DCHECK_LT(0, socket_count);
// The following is a sanity check... but we should NEVER be near this value.
DCHECK_GT(100, socket_count);
DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
g_max_sockets_per_group[pool_type] = socket_count;
DCHECK_GE(g_max_sockets_per_pool[pool_type],
g_max_sockets_per_group[pool_type]);
DCHECK_GE(g_max_sockets_per_proxy_server[pool_type],
g_max_sockets_per_group[pool_type]);
}
// static
int ClientSocketPoolManager::max_sockets_per_proxy_server(
HttpNetworkSession::SocketPoolType pool_type) {
DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
return g_max_sockets_per_proxy_server[pool_type];
}
// static
void ClientSocketPoolManager::set_max_sockets_per_proxy_server(
HttpNetworkSession::SocketPoolType pool_type,
int socket_count) {
DCHECK_LT(0, socket_count);
DCHECK_GT(100, socket_count); // Sanity check.
DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
// Assert this case early on. The max number of sockets per group cannot
// exceed the max number of sockets per proxy server.
DCHECK_LE(g_max_sockets_per_group[pool_type], socket_count);
g_max_sockets_per_proxy_server[pool_type] = socket_count;
}
// static
base::TimeDelta ClientSocketPoolManager::unused_idle_socket_timeout(
HttpNetworkSession::SocketPoolType pool_type) {
return g_unused_idle_socket_timeout;
}
// static
void ClientSocketPoolManager::set_unused_idle_socket_timeout(
HttpNetworkSession::SocketPoolType pool_type,
base::TimeDelta timeout) {
g_unused_idle_socket_timeout = timeout;
}
int InitSocketHandleForHttpRequest(
ClientSocketPoolManager::SocketGroupType group_type,
const HostPortPair& endpoint,
int request_load_flags,
RequestPriority request_priority,
HttpNetworkSession* session,
const ProxyInfo& proxy_info,
quic::QuicTransportVersion quic_version,
const SSLConfig& ssl_config_for_origin,
const SSLConfig& ssl_config_for_proxy,
PrivacyMode privacy_mode,
const SocketTag& socket_tag,
const NetLogWithSource& net_log,
ClientSocketHandle* socket_handle,
const OnHostResolutionCallback& resolution_callback,
CompletionOnceCallback callback,
const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback) {
DCHECK(socket_handle);
return InitSocketPoolHelper(
group_type, endpoint, request_load_flags, request_priority, session,
proxy_info, quic_version, ssl_config_for_origin, ssl_config_for_proxy,
/*force_tunnel=*/false, privacy_mode, socket_tag, net_log, 0,
socket_handle, HttpNetworkSession::NORMAL_SOCKET_POOL,
resolution_callback, std::move(callback), proxy_auth_callback);
}
int InitSocketHandleForWebSocketRequest(
ClientSocketPoolManager::SocketGroupType group_type,
const HostPortPair& endpoint,
int request_load_flags,
RequestPriority request_priority,
HttpNetworkSession* session,
const ProxyInfo& proxy_info,
const SSLConfig& ssl_config_for_origin,
const SSLConfig& ssl_config_for_proxy,
PrivacyMode privacy_mode,
const NetLogWithSource& net_log,
ClientSocketHandle* socket_handle,
const OnHostResolutionCallback& resolution_callback,
CompletionOnceCallback callback,
const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback) {
DCHECK(socket_handle);
return InitSocketPoolHelper(
group_type, endpoint, request_load_flags, request_priority, session,
proxy_info, quic::QUIC_VERSION_UNSUPPORTED, ssl_config_for_origin,
ssl_config_for_proxy,
/*force_tunnel=*/true, privacy_mode, SocketTag(), net_log, 0,
socket_handle, HttpNetworkSession::WEBSOCKET_SOCKET_POOL,
resolution_callback, std::move(callback), proxy_auth_callback);
}
int InitSocketHandleForRawConnect(
const HostPortPair& host_port_pair,
HttpNetworkSession* session,
int request_load_flags,
RequestPriority request_priority,
const ProxyInfo& proxy_info,
const SSLConfig& ssl_config_for_origin,
const SSLConfig& ssl_config_for_proxy,
PrivacyMode privacy_mode,
const NetLogWithSource& net_log,
ClientSocketHandle* socket_handle,
CompletionOnceCallback callback,
const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback) {
DCHECK(socket_handle);
return InitSocketPoolHelper(
ClientSocketPoolManager::NORMAL_GROUP, host_port_pair, request_load_flags,
request_priority, session, proxy_info, quic::QUIC_VERSION_UNSUPPORTED,
ssl_config_for_origin, ssl_config_for_proxy, /*force_tunnel=*/true,
privacy_mode, SocketTag(), net_log, 0, socket_handle,
HttpNetworkSession::NORMAL_SOCKET_POOL, OnHostResolutionCallback(),
std::move(callback), proxy_auth_callback);
}
int InitSocketHandleForTlsConnect(
const HostPortPair& endpoint,
HttpNetworkSession* session,
int request_load_flags,
RequestPriority request_priority,
const ProxyInfo& proxy_info,
const SSLConfig& ssl_config_for_origin,
const SSLConfig& ssl_config_for_proxy,
PrivacyMode privacy_mode,
const NetLogWithSource& net_log,
ClientSocketHandle* socket_handle,
CompletionOnceCallback callback,
const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback) {
DCHECK(socket_handle);
return InitSocketPoolHelper(
ClientSocketPoolManager::SSL_GROUP, endpoint, request_load_flags,
request_priority, session, proxy_info, quic::QUIC_VERSION_UNSUPPORTED,
ssl_config_for_origin, ssl_config_for_proxy,
/*force_tunnel=*/true, privacy_mode, SocketTag(), net_log, 0,
socket_handle, HttpNetworkSession::NORMAL_SOCKET_POOL,
OnHostResolutionCallback(), std::move(callback), proxy_auth_callback);
}
int PreconnectSocketsForHttpRequest(
ClientSocketPoolManager::SocketGroupType group_type,
const HostPortPair& endpoint,
int request_load_flags,
RequestPriority request_priority,
HttpNetworkSession* session,
const ProxyInfo& proxy_info,
const SSLConfig& ssl_config_for_origin,
const SSLConfig& ssl_config_for_proxy,
PrivacyMode privacy_mode,
const NetLogWithSource& net_log,
int num_preconnect_streams) {
return InitSocketPoolHelper(
group_type, endpoint, request_load_flags, request_priority, session,
proxy_info, quic::QUIC_VERSION_UNSUPPORTED, ssl_config_for_origin,
ssl_config_for_proxy,
/*force_tunnel=*/false, privacy_mode, SocketTag(), net_log,
num_preconnect_streams, nullptr, HttpNetworkSession::NORMAL_SOCKET_POOL,
OnHostResolutionCallback(), CompletionOnceCallback(),
ClientSocketPool::ProxyAuthCallback());
}
} // namespace net