blob: 0e37ab84eb07ee3c29c18c2e35a94dc57dcba6c5 [file] [log] [blame]
henrike@webrtc.orgf7795df2014-05-13 18:00:26 +00001/*
2 * Copyright 2007 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#include "webrtc/base/autodetectproxy.h"
12#include "webrtc/base/httpcommon.h"
13#include "webrtc/base/httpcommon-inl.h"
14#include "webrtc/base/socketadapters.h"
15#include "webrtc/base/ssladapter.h"
16#include "webrtc/base/sslsocketfactory.h"
17
18namespace rtc {
19
20///////////////////////////////////////////////////////////////////////////////
21// ProxySocketAdapter
22// TODO: Consider combining AutoDetectProxy and ProxySocketAdapter. I think
23// the socket adapter is the more appropriate idiom for automatic proxy
24// detection. We may or may not want to combine proxydetect.* as well.
25///////////////////////////////////////////////////////////////////////////////
26
27class ProxySocketAdapter : public AsyncSocketAdapter {
28 public:
29 ProxySocketAdapter(SslSocketFactory* factory, int family, int type)
30 : AsyncSocketAdapter(NULL), factory_(factory), family_(family),
31 type_(type), detect_(NULL) {
32 }
33 virtual ~ProxySocketAdapter() {
34 Close();
35 }
36
37 virtual int Connect(const SocketAddress& addr) {
38 ASSERT(NULL == detect_);
39 ASSERT(NULL == socket_);
40 remote_ = addr;
41 if (remote_.IsAnyIP() && remote_.hostname().empty()) {
42 LOG_F(LS_ERROR) << "Empty address";
43 return SOCKET_ERROR;
44 }
45 Url<char> url("/", remote_.HostAsURIString(), remote_.port());
46 detect_ = new AutoDetectProxy(factory_->agent_);
47 detect_->set_server_url(url.url());
48 detect_->SignalWorkDone.connect(this,
49 &ProxySocketAdapter::OnProxyDetectionComplete);
50 detect_->Start();
51 return SOCKET_ERROR;
52 }
53 virtual int GetError() const {
54 if (socket_) {
55 return socket_->GetError();
56 }
57 return detect_ ? EWOULDBLOCK : EADDRNOTAVAIL;
58 }
59 virtual int Close() {
60 if (socket_) {
61 return socket_->Close();
62 }
63 if (detect_) {
64 detect_->Destroy(false);
65 detect_ = NULL;
66 }
67 return 0;
68 }
69 virtual ConnState GetState() const {
70 if (socket_) {
71 return socket_->GetState();
72 }
73 return detect_ ? CS_CONNECTING : CS_CLOSED;
74 }
75
76private:
77 // AutoDetectProxy Slots
78 void OnProxyDetectionComplete(SignalThread* thread) {
79 ASSERT(detect_ == thread);
80 Attach(factory_->CreateProxySocket(detect_->proxy(), family_, type_));
81 detect_->Release();
82 detect_ = NULL;
83 if (0 == AsyncSocketAdapter::Connect(remote_)) {
84 SignalConnectEvent(this);
85 } else if (!IsBlockingError(socket_->GetError())) {
86 SignalCloseEvent(this, socket_->GetError());
87 }
88 }
89
90 SslSocketFactory* factory_;
91 int family_;
92 int type_;
93 SocketAddress remote_;
94 AutoDetectProxy* detect_;
95};
96
97///////////////////////////////////////////////////////////////////////////////
98// SslSocketFactory
99///////////////////////////////////////////////////////////////////////////////
100
101Socket* SslSocketFactory::CreateSocket(int type) {
102 return CreateSocket(AF_INET, type);
103}
104
105Socket* SslSocketFactory::CreateSocket(int family, int type) {
106 return factory_->CreateSocket(family, type);
107}
108
109AsyncSocket* SslSocketFactory::CreateAsyncSocket(int type) {
110 return CreateAsyncSocket(AF_INET, type);
111}
112
113AsyncSocket* SslSocketFactory::CreateAsyncSocket(int family, int type) {
114 if (autodetect_proxy_) {
115 return new ProxySocketAdapter(this, family, type);
116 } else {
117 return CreateProxySocket(proxy_, family, type);
118 }
119}
120
121
122AsyncSocket* SslSocketFactory::CreateProxySocket(const ProxyInfo& proxy,
123 int family,
124 int type) {
125 AsyncSocket* socket = factory_->CreateAsyncSocket(family, type);
126 if (!socket)
127 return NULL;
128
129 // Binary logging happens at the lowest level
130 if (!logging_label_.empty() && binary_mode_) {
131 socket = new LoggingSocketAdapter(socket, logging_level_,
132 logging_label_.c_str(), binary_mode_);
133 }
134
135 if (proxy.type) {
136 AsyncSocket* proxy_socket = 0;
137 if (proxy_.type == PROXY_SOCKS5) {
138 proxy_socket = new AsyncSocksProxySocket(socket, proxy.address,
139 proxy.username, proxy.password);
140 } else {
141 // Note: we are trying unknown proxies as HTTPS currently
142 AsyncHttpsProxySocket* http_proxy =
143 new AsyncHttpsProxySocket(socket, agent_, proxy.address,
144 proxy.username, proxy.password);
145 http_proxy->SetForceConnect(force_connect_ || !hostname_.empty());
146 proxy_socket = http_proxy;
147 }
148 if (!proxy_socket) {
149 delete socket;
150 return NULL;
151 }
152 socket = proxy_socket; // for our purposes the proxy is now the socket
153 }
154
155 if (!hostname_.empty()) {
156 if (SSLAdapter* ssl_adapter = SSLAdapter::Create(socket)) {
157 ssl_adapter->set_ignore_bad_cert(ignore_bad_cert_);
158 ssl_adapter->StartSSL(hostname_.c_str(), true);
159 socket = ssl_adapter;
160 } else {
161 LOG_F(LS_ERROR) << "SSL unavailable";
162 }
163 }
164
165 // Regular logging occurs at the highest level
166 if (!logging_label_.empty() && !binary_mode_) {
167 socket = new LoggingSocketAdapter(socket, logging_level_,
168 logging_label_.c_str(), binary_mode_);
169 }
170 return socket;
171}
172
173///////////////////////////////////////////////////////////////////////////////
174
175} // namespace rtc