1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #ifndef NET_PROXY_PROXY_SERVICE_H_ 6 #define NET_PROXY_PROXY_SERVICE_H_ 7 8 #include <string> 9 #include <vector> 10 11 #include "base/gtest_prod_util.h" 12 #include "base/memory/ref_counted.h" 13 #include "base/memory/scoped_ptr.h" 14 #include "base/synchronization/waitable_event.h" 15 #include "base/threading/non_thread_safe.h" 16 #include "net/base/completion_callback.h" 17 #include "net/base/load_states.h" 18 #include "net/base/net_export.h" 19 #include "net/base/net_log.h" 20 #include "net/base/network_change_notifier.h" 21 #include "net/proxy/proxy_config_service.h" 22 #include "net/proxy/proxy_info.h" 23 #include "net/proxy/proxy_server.h" 24 25 class GURL; 26 27 namespace base { 28 class MessageLoop; 29 class SingleThreadTaskRunner; 30 class TimeDelta; 31 } // namespace base 32 33 namespace net { 34 35 class DhcpProxyScriptFetcher; 36 class HostResolver; 37 class NetworkDelegate; 38 class ProxyResolver; 39 class ProxyResolverScriptData; 40 class ProxyScriptDecider; 41 class ProxyScriptFetcher; 42 43 // This class can be used to resolve the proxy server to use when loading a 44 // HTTP(S) URL. It uses the given ProxyResolver to handle the actual proxy 45 // resolution. See ProxyResolverV8 for example. 46 class NET_EXPORT ProxyService : public NetworkChangeNotifier::IPAddressObserver, 47 public NetworkChangeNotifier::DNSObserver, 48 public ProxyConfigService::Observer, 49 NON_EXPORTED_BASE(public base::NonThreadSafe) { 50 public: 51 static const size_t kDefaultNumPacThreads = 4; 52 53 // This interface defines the set of policies for when to poll the PAC 54 // script for changes. 55 // 56 // The polling policy decides what the next poll delay should be in 57 // milliseconds. It also decides how to wait for this delay -- either 58 // by starting a timer to do the poll at exactly |next_delay_ms| 59 // (MODE_USE_TIMER) or by waiting for the first network request issued after 60 // |next_delay_ms| (MODE_START_AFTER_ACTIVITY). 61 // 62 // The timer method is more precise and guarantees that polling happens when 63 // it was requested. However it has the disadvantage of causing spurious CPU 64 // and network activity. It is a reasonable choice to use for short poll 65 // intervals which only happen a couple times. 66 // 67 // However for repeated timers this will prevent the browser from going 68 // idle. MODE_START_AFTER_ACTIVITY solves this problem by only polling in 69 // direct response to network activity. The drawback to 70 // MODE_START_AFTER_ACTIVITY is since the poll is initiated only after the 71 // request is received, the first couple requests initiated after a long 72 // period of inactivity will likely see a stale version of the PAC script 73 // until the background polling gets a chance to update things. 74 class NET_EXPORT_PRIVATE PacPollPolicy { 75 public: 76 enum Mode { 77 MODE_USE_TIMER, 78 MODE_START_AFTER_ACTIVITY, 79 }; 80 81 virtual ~PacPollPolicy() {} 82 83 // Decides the next poll delay. |current_delay| is the delay used 84 // by the preceding poll, or a negative TimeDelta value if determining 85 // the delay for the initial poll. |initial_error| is the network error 86 // code that the last PAC fetch (or WPAD initialization) failed with, 87 // or OK if it completed successfully. Implementations must set 88 // |next_delay| to a non-negative value. 89 virtual Mode GetNextDelay(int initial_error, 90 base::TimeDelta current_delay, 91 base::TimeDelta* next_delay) const = 0; 92 }; 93 94 // The instance takes ownership of |config_service| and |resolver|. 95 // |net_log| is a possibly NULL destination to send log events to. It must 96 // remain alive for the lifetime of this ProxyService. 97 ProxyService(ProxyConfigService* config_service, 98 ProxyResolver* resolver, 99 NetLog* net_log); 100 101 virtual ~ProxyService(); 102 103 // Used internally to handle PAC queries. 104 // TODO(eroman): consider naming this simply "Request". 105 class PacRequest; 106 107 // Returns ERR_IO_PENDING if the proxy information could not be provided 108 // synchronously, to indicate that the result will be available when the 109 // callback is run. The callback is run on the thread that calls 110 // ResolveProxy. 111 // 112 // The caller is responsible for ensuring that |results| and |callback| 113 // remain valid until the callback is run or until |pac_request| is cancelled 114 // via CancelPacRequest. |pac_request| is only valid while the completion 115 // callback is still pending. NULL can be passed for |pac_request| if 116 // the caller will not need to cancel the request. 117 // 118 // We use the three possible proxy access types in the following order, 119 // doing fallback if one doesn't work. See "pac_script_decider.h" 120 // for the specifics. 121 // 1. WPAD auto-detection 122 // 2. PAC URL 123 // 3. named proxy 124 // 125 // Profiling information for the request is saved to |net_log| if non-NULL. 126 int ResolveProxy(const GURL& url, 127 ProxyInfo* results, 128 const net::CompletionCallback& callback, 129 PacRequest** pac_request, 130 const BoundNetLog& net_log); 131 132 // This method is called after a failure to connect or resolve a host name. 133 // It gives the proxy service an opportunity to reconsider the proxy to use. 134 // The |results| parameter contains the results returned by an earlier call 135 // to ResolveProxy. The semantics of this call are otherwise similar to 136 // ResolveProxy. 137 // 138 // NULL can be passed for |pac_request| if the caller will not need to 139 // cancel the request. 140 // 141 // Returns ERR_FAILED if there is not another proxy config to try. 142 // 143 // Profiling information for the request is saved to |net_log| if non-NULL. 144 int ReconsiderProxyAfterError(const GURL& url, 145 ProxyInfo* results, 146 const CompletionCallback& callback, 147 PacRequest** pac_request, 148 const BoundNetLog& net_log); 149 150 // Explicitly trigger proxy fallback for the given |results| by updating our 151 // list of bad proxies to include the first entry of |results|, and, 152 // optionally, another bad proxy. Will retry after |retry_delay| if positive, 153 // and will use the default proxy retry duration otherwise. Returns true if 154 // there will be at least one proxy remaining in the list after fallback and 155 // false otherwise. 156 bool MarkProxiesAsBad(const ProxyInfo& results, 157 base::TimeDelta retry_delay, 158 const ProxyServer& another_bad_proxy, 159 const BoundNetLog& net_log); 160 161 // Called to report that the last proxy connection succeeded. If |proxy_info| 162 // has a non empty proxy_retry_info map, the proxies that have been tried (and 163 // failed) for this request will be marked as bad. 164 void ReportSuccess(const ProxyInfo& proxy_info); 165 166 // Call this method with a non-null |pac_request| to cancel the PAC request. 167 void CancelPacRequest(PacRequest* pac_request); 168 169 // Returns the LoadState for this |pac_request| which must be non-NULL. 170 LoadState GetLoadState(const PacRequest* pac_request) const; 171 172 // Sets the ProxyScriptFetcher and DhcpProxyScriptFetcher dependencies. This 173 // is needed if the ProxyResolver is of type ProxyResolverWithoutFetch. 174 // ProxyService takes ownership of both objects. 175 void SetProxyScriptFetchers( 176 ProxyScriptFetcher* proxy_script_fetcher, 177 DhcpProxyScriptFetcher* dhcp_proxy_script_fetcher); 178 ProxyScriptFetcher* GetProxyScriptFetcher() const; 179 180 // Tells this ProxyService to start using a new ProxyConfigService to 181 // retrieve its ProxyConfig from. The new ProxyConfigService will immediately 182 // be queried for new config info which will be used for all subsequent 183 // ResolveProxy calls. ProxyService takes ownership of 184 // |new_proxy_config_service|. 185 void ResetConfigService(ProxyConfigService* new_proxy_config_service); 186 187 // Tells the resolver to purge any memory it does not need. 188 void PurgeMemory(); 189 190 191 // Returns the last configuration fetched from ProxyConfigService. 192 const ProxyConfig& fetched_config() { 193 return fetched_config_; 194 } 195 196 // Returns the current configuration being used by ProxyConfigService. 197 const ProxyConfig& config() { 198 return config_; 199 } 200 201 // Returns the map of proxies which have been marked as "bad". 202 const ProxyRetryInfoMap& proxy_retry_info() const { 203 return proxy_retry_info_; 204 } 205 206 // Clears the list of bad proxy servers that has been cached. 207 void ClearBadProxiesCache() { 208 proxy_retry_info_.clear(); 209 } 210 211 // Forces refetching the proxy configuration, and applying it. 212 // This re-does everything from fetching the system configuration, 213 // to downloading and testing the PAC files. 214 void ForceReloadProxyConfig(); 215 216 // Same as CreateProxyServiceUsingV8ProxyResolver, except it uses system 217 // libraries for evaluating the PAC script if available, otherwise skips 218 // proxy autoconfig. 219 static ProxyService* CreateUsingSystemProxyResolver( 220 ProxyConfigService* proxy_config_service, 221 size_t num_pac_threads, 222 NetLog* net_log); 223 224 // Creates a ProxyService without support for proxy autoconfig. 225 static ProxyService* CreateWithoutProxyResolver( 226 ProxyConfigService* proxy_config_service, 227 NetLog* net_log); 228 229 // Convenience methods that creates a proxy service using the 230 // specified fixed settings. 231 static ProxyService* CreateFixed(const ProxyConfig& pc); 232 static ProxyService* CreateFixed(const std::string& proxy); 233 234 // Creates a proxy service that uses a DIRECT connection for all requests. 235 static ProxyService* CreateDirect(); 236 // |net_log|'s lifetime must exceed ProxyService. 237 static ProxyService* CreateDirectWithNetLog(NetLog* net_log); 238 239 // This method is used by tests to create a ProxyService that returns a 240 // hardcoded proxy fallback list (|pac_string|) for every URL. 241 // 242 // |pac_string| is a list of proxy servers, in the format that a PAC script 243 // would return it. For example, "PROXY foobar:99; SOCKS fml:2; DIRECT" 244 static ProxyService* CreateFixedFromPacResult(const std::string& pac_string); 245 246 // Creates a config service appropriate for this platform that fetches the 247 // system proxy settings. 248 static ProxyConfigService* CreateSystemProxyConfigService( 249 base::SingleThreadTaskRunner* io_thread_task_runner, 250 base::MessageLoop* file_loop); 251 252 // This method should only be used by unit tests. 253 void set_stall_proxy_auto_config_delay(base::TimeDelta delay) { 254 stall_proxy_auto_config_delay_ = delay; 255 } 256 257 // This method should only be used by unit tests. Returns the previously 258 // active policy. 259 static const PacPollPolicy* set_pac_script_poll_policy( 260 const PacPollPolicy* policy); 261 262 // This method should only be used by unit tests. Creates an instance 263 // of the default internal PacPollPolicy used by ProxyService. 264 static scoped_ptr<PacPollPolicy> CreateDefaultPacPollPolicy(); 265 266 #if defined(SPDY_PROXY_AUTH_ORIGIN) 267 // Values of the UMA DataReductionProxy.BypassInfo{Primary|Fallback} 268 // histograms. This enum must remain synchronized with the enum of the same 269 // name in metrics/histograms/histograms.xml. 270 enum DataReductionProxyBypassEventType { 271 // Bypass the proxy for less than 30 minutes. 272 SHORT_BYPASS = 0, 273 274 // Bypass the proxy for 30 minutes or more. 275 LONG_BYPASS, 276 277 // Bypass the proxy because of an internal server error. 278 INTERNAL_SERVER_ERROR_BYPASS, 279 280 // Bypass the proxy because of any other error. 281 ERROR_BYPASS, 282 283 // Bypass the proxy because responses appear not to be coming via it. 284 MISSING_VIA_HEADER, 285 286 // This must always be last. 287 BYPASS_EVENT_TYPE_MAX 288 }; 289 290 // Records a |DataReductionProxyBypassEventType| for either the data reduction 291 // proxy (|is_primary| is true) or the data reduction proxy fallback. 292 void RecordDataReductionProxyBypassInfo( 293 bool is_primary, 294 const ProxyServer& proxy_server, 295 DataReductionProxyBypassEventType bypass_type) const; 296 #endif 297 298 private: 299 FRIEND_TEST_ALL_PREFIXES(ProxyServiceTest, UpdateConfigAfterFailedAutodetect); 300 FRIEND_TEST_ALL_PREFIXES(ProxyServiceTest, UpdateConfigFromPACToDirect); 301 friend class PacRequest; 302 class InitProxyResolver; 303 class ProxyScriptDeciderPoller; 304 305 // TODO(eroman): change this to a std::set. Note that this requires updating 306 // some tests in proxy_service_unittest.cc such as: 307 // ProxyServiceTest.InitialPACScriptDownload 308 // which expects requests to finish in the order they were added. 309 typedef std::vector<scoped_refptr<PacRequest> > PendingRequests; 310 311 enum State { 312 STATE_NONE, 313 STATE_WAITING_FOR_PROXY_CONFIG, 314 STATE_WAITING_FOR_INIT_PROXY_RESOLVER, 315 STATE_READY, 316 }; 317 318 // Resets all the variables associated with the current proxy configuration, 319 // and rewinds the current state to |STATE_NONE|. Returns the previous value 320 // of |current_state_|. If |reset_fetched_config| is true then 321 // |fetched_config_| will also be reset, otherwise it will be left as-is. 322 // Resetting it means that we will have to re-fetch the configuration from 323 // the ProxyConfigService later. 324 State ResetProxyConfig(bool reset_fetched_config); 325 326 // Retrieves the current proxy configuration from the ProxyConfigService, and 327 // starts initializing for it. 328 void ApplyProxyConfigIfAvailable(); 329 330 // Callback for when the proxy resolver has been initialized with a 331 // PAC script. 332 void OnInitProxyResolverComplete(int result); 333 334 // Returns ERR_IO_PENDING if the request cannot be completed synchronously. 335 // Otherwise it fills |result| with the proxy information for |url|. 336 // Completing synchronously means we don't need to query ProxyResolver. 337 int TryToCompleteSynchronously(const GURL& url, ProxyInfo* result); 338 339 // Cancels all of the requests sent to the ProxyResolver. These will be 340 // restarted when calling SetReady(). 341 void SuspendAllPendingRequests(); 342 343 // Advances the current state to |STATE_READY|, and resumes any pending 344 // requests which had been stalled waiting for initialization to complete. 345 void SetReady(); 346 347 // Returns true if |pending_requests_| contains |req|. 348 bool ContainsPendingRequest(PacRequest* req); 349 350 // Removes |req| from the list of pending requests. 351 void RemovePendingRequest(PacRequest* req); 352 353 // Called when proxy resolution has completed (either synchronously or 354 // asynchronously). Handles logging the result, and cleaning out 355 // bad entries from the results list. 356 int DidFinishResolvingProxy(ProxyInfo* result, 357 int result_code, 358 const BoundNetLog& net_log); 359 360 // Start initialization using |fetched_config_|. 361 void InitializeUsingLastFetchedConfig(); 362 363 // Start the initialization skipping past the "decision" phase. 364 void InitializeUsingDecidedConfig( 365 int decider_result, 366 ProxyResolverScriptData* script_data, 367 const ProxyConfig& effective_config); 368 369 // NetworkChangeNotifier::IPAddressObserver 370 // When this is called, we re-fetch PAC scripts and re-run WPAD. 371 virtual void OnIPAddressChanged() OVERRIDE; 372 373 // NetworkChangeNotifier::DNSObserver 374 // We respond as above. 375 virtual void OnDNSChanged() OVERRIDE; 376 377 // ProxyConfigService::Observer 378 virtual void OnProxyConfigChanged( 379 const ProxyConfig& config, 380 ProxyConfigService::ConfigAvailability availability) OVERRIDE; 381 382 scoped_ptr<ProxyConfigService> config_service_; 383 scoped_ptr<ProxyResolver> resolver_; 384 385 // We store the proxy configuration that was last fetched from the 386 // ProxyConfigService, as well as the resulting "effective" configuration. 387 // The effective configuration is what we condense the original fetched 388 // settings to after testing the various automatic settings (auto-detect 389 // and custom PAC url). 390 ProxyConfig fetched_config_; 391 ProxyConfig config_; 392 393 // Increasing ID to give to the next ProxyConfig that we set. 394 int next_config_id_; 395 396 // The time when the proxy configuration was last read from the system. 397 base::TimeTicks config_last_update_time_; 398 399 // Map of the known bad proxies and the information about the retry time. 400 ProxyRetryInfoMap proxy_retry_info_; 401 402 // Set of pending/inprogress requests. 403 PendingRequests pending_requests_; 404 405 // The fetcher to use when downloading PAC scripts for the ProxyResolver. 406 // This dependency can be NULL if our ProxyResolver has no need for 407 // external PAC script fetching. 408 scoped_ptr<ProxyScriptFetcher> proxy_script_fetcher_; 409 410 // The fetcher to use when attempting to download the most appropriate PAC 411 // script configured in DHCP, if any. Can be NULL if the ProxyResolver has 412 // no need for DHCP PAC script fetching. 413 scoped_ptr<DhcpProxyScriptFetcher> dhcp_proxy_script_fetcher_; 414 415 // Helper to download the PAC script (wpad + custom) and apply fallback rules. 416 // 417 // Note that the declaration is important here: |proxy_script_fetcher_| and 418 // |proxy_resolver_| must outlive |init_proxy_resolver_|. 419 scoped_ptr<InitProxyResolver> init_proxy_resolver_; 420 421 // Helper to poll the PAC script for changes. 422 scoped_ptr<ProxyScriptDeciderPoller> script_poller_; 423 424 State current_state_; 425 426 // Either OK or an ERR_* value indicating that a permanent error (e.g. 427 // failed to fetch the PAC script) prevents proxy resolution. 428 int permanent_error_; 429 430 // This is the log where any events generated by |init_proxy_resolver_| are 431 // sent to. 432 NetLog* net_log_; 433 434 // The earliest time at which we should run any proxy auto-config. (Used to 435 // stall re-configuration following an IP address change). 436 base::TimeTicks stall_proxy_autoconfig_until_; 437 438 // The amount of time to stall requests following IP address changes. 439 base::TimeDelta stall_proxy_auto_config_delay_; 440 441 DISALLOW_COPY_AND_ASSIGN(ProxyService); 442 }; 443 444 // Wrapper for invoking methods on a ProxyService synchronously. 445 class NET_EXPORT SyncProxyServiceHelper 446 : public base::RefCountedThreadSafe<SyncProxyServiceHelper> { 447 public: 448 SyncProxyServiceHelper(base::MessageLoop* io_message_loop, 449 ProxyService* proxy_service); 450 451 int ResolveProxy(const GURL& url, 452 ProxyInfo* proxy_info, 453 const BoundNetLog& net_log); 454 int ReconsiderProxyAfterError(const GURL& url, 455 ProxyInfo* proxy_info, 456 const BoundNetLog& net_log); 457 458 private: 459 friend class base::RefCountedThreadSafe<SyncProxyServiceHelper>; 460 461 virtual ~SyncProxyServiceHelper(); 462 463 void StartAsyncResolve(const GURL& url, const BoundNetLog& net_log); 464 void StartAsyncReconsider(const GURL& url, const BoundNetLog& net_log); 465 466 void OnCompletion(int result); 467 468 base::MessageLoop* io_message_loop_; 469 ProxyService* proxy_service_; 470 471 base::WaitableEvent event_; 472 CompletionCallback callback_; 473 ProxyInfo proxy_info_; 474 int result_; 475 }; 476 477 } // namespace net 478 479 #endif // NET_PROXY_PROXY_SERVICE_H_ 480