1 /* 2 * Copyright 2007 The WebRTC Project Authors. All rights reserved. 3 * 4 * Use of this source code is governed by a BSD-style license 5 * that can be found in the LICENSE file in the root of the source 6 * tree. An additional intellectual property rights grant can be found 7 * in the file PATENTS. All contributing project authors may 8 * be found in the AUTHORS file in the root of the source tree. 9 */ 10 11 #include "webrtc/base/autodetectproxy.h" 12 #include "webrtc/base/httpcommon.h" 13 #include "webrtc/base/httpcommon-inl.h" 14 #include "webrtc/base/socketadapters.h" 15 #include "webrtc/base/ssladapter.h" 16 #include "webrtc/base/sslsocketfactory.h" 17 18 namespace rtc { 19 20 /////////////////////////////////////////////////////////////////////////////// 21 // ProxySocketAdapter 22 // TODO: Consider combining AutoDetectProxy and ProxySocketAdapter. I think 23 // the socket adapter is the more appropriate idiom for automatic proxy 24 // detection. We may or may not want to combine proxydetect.* as well. 25 /////////////////////////////////////////////////////////////////////////////// 26 27 class ProxySocketAdapter : public AsyncSocketAdapter { 28 public: 29 ProxySocketAdapter(SslSocketFactory* factory, int family, int type) 30 : AsyncSocketAdapter(NULL), factory_(factory), family_(family), 31 type_(type), detect_(NULL) { 32 } 33 virtual ~ProxySocketAdapter() { 34 Close(); 35 } 36 37 virtual int Connect(const SocketAddress& addr) { 38 ASSERT(NULL == detect_); 39 ASSERT(NULL == socket_); 40 remote_ = addr; 41 if (remote_.IsAnyIP() && remote_.hostname().empty()) { 42 LOG_F(LS_ERROR) << "Empty address"; 43 return SOCKET_ERROR; 44 } 45 Url<char> url("/", remote_.HostAsURIString(), remote_.port()); 46 detect_ = new AutoDetectProxy(factory_->agent_); 47 detect_->set_server_url(url.url()); 48 detect_->SignalWorkDone.connect(this, 49 &ProxySocketAdapter::OnProxyDetectionComplete); 50 detect_->Start(); 51 return SOCKET_ERROR; 52 } 53 virtual int GetError() const { 54 if (socket_) { 55 return socket_->GetError(); 56 } 57 return detect_ ? EWOULDBLOCK : EADDRNOTAVAIL; 58 } 59 virtual int Close() { 60 if (socket_) { 61 return socket_->Close(); 62 } 63 if (detect_) { 64 detect_->Destroy(false); 65 detect_ = NULL; 66 } 67 return 0; 68 } 69 virtual ConnState GetState() const { 70 if (socket_) { 71 return socket_->GetState(); 72 } 73 return detect_ ? CS_CONNECTING : CS_CLOSED; 74 } 75 76 private: 77 // AutoDetectProxy Slots 78 void OnProxyDetectionComplete(SignalThread* thread) { 79 ASSERT(detect_ == thread); 80 Attach(factory_->CreateProxySocket(detect_->proxy(), family_, type_)); 81 detect_->Release(); 82 detect_ = NULL; 83 if (0 == AsyncSocketAdapter::Connect(remote_)) { 84 SignalConnectEvent(this); 85 } else if (!IsBlockingError(socket_->GetError())) { 86 SignalCloseEvent(this, socket_->GetError()); 87 } 88 } 89 90 SslSocketFactory* factory_; 91 int family_; 92 int type_; 93 SocketAddress remote_; 94 AutoDetectProxy* detect_; 95 }; 96 97 /////////////////////////////////////////////////////////////////////////////// 98 // SslSocketFactory 99 /////////////////////////////////////////////////////////////////////////////// 100 101 Socket* SslSocketFactory::CreateSocket(int type) { 102 return CreateSocket(AF_INET, type); 103 } 104 105 Socket* SslSocketFactory::CreateSocket(int family, int type) { 106 return factory_->CreateSocket(family, type); 107 } 108 109 AsyncSocket* SslSocketFactory::CreateAsyncSocket(int type) { 110 return CreateAsyncSocket(AF_INET, type); 111 } 112 113 AsyncSocket* SslSocketFactory::CreateAsyncSocket(int family, int type) { 114 if (autodetect_proxy_) { 115 return new ProxySocketAdapter(this, family, type); 116 } else { 117 return CreateProxySocket(proxy_, family, type); 118 } 119 } 120 121 122 AsyncSocket* SslSocketFactory::CreateProxySocket(const ProxyInfo& proxy, 123 int family, 124 int type) { 125 AsyncSocket* socket = factory_->CreateAsyncSocket(family, type); 126 if (!socket) 127 return NULL; 128 129 // Binary logging happens at the lowest level 130 if (!logging_label_.empty() && binary_mode_) { 131 socket = new LoggingSocketAdapter(socket, logging_level_, 132 logging_label_.c_str(), binary_mode_); 133 } 134 135 if (proxy.type) { 136 AsyncSocket* proxy_socket = 0; 137 if (proxy_.type == PROXY_SOCKS5) { 138 proxy_socket = new AsyncSocksProxySocket(socket, proxy.address, 139 proxy.username, proxy.password); 140 } else { 141 // Note: we are trying unknown proxies as HTTPS currently 142 AsyncHttpsProxySocket* http_proxy = 143 new AsyncHttpsProxySocket(socket, agent_, proxy.address, 144 proxy.username, proxy.password); 145 http_proxy->SetForceConnect(force_connect_ || !hostname_.empty()); 146 proxy_socket = http_proxy; 147 } 148 if (!proxy_socket) { 149 delete socket; 150 return NULL; 151 } 152 socket = proxy_socket; // for our purposes the proxy is now the socket 153 } 154 155 if (!hostname_.empty()) { 156 if (SSLAdapter* ssl_adapter = SSLAdapter::Create(socket)) { 157 ssl_adapter->set_ignore_bad_cert(ignore_bad_cert_); 158 ssl_adapter->StartSSL(hostname_.c_str(), true); 159 socket = ssl_adapter; 160 } else { 161 LOG_F(LS_ERROR) << "SSL unavailable"; 162 } 163 } 164 165 // Regular logging occurs at the highest level 166 if (!logging_label_.empty() && !binary_mode_) { 167 socket = new LoggingSocketAdapter(socket, logging_level_, 168 logging_label_.c_str(), binary_mode_); 169 } 170 return socket; 171 } 172 173 /////////////////////////////////////////////////////////////////////////////// 174 175 } // namespace rtc 176