d02c9f8bc6
* chore: bump chromium in DEPS to 111.0.5522.0 * chore: bump chromium in DEPS to 111.0.5524.0 * chore: bump chromium in DEPS to 111.0.5526.0 * chore: bump chromium in DEPS to 111.0.5528.0 * chore: update patches/chromium/mas_avoid_usage_of_private_macos_apis.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4132807 Fix simple code shear * chore: update patches/chromium/unsandboxed_ppapi_processes_skip_zygote.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4130675 Fix simple code shear * chore: update patches/chromium/hack_plugin_response_interceptor_to_point_to_electron.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4144281 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/chromium/disable_unload_metrics.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4126173 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/chromium/feat_add_data_parameter_to_processsingleton.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4144281 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/chromium/preconnect_manager.patch https://chromium-review.googlesource.com/c/chromium/src/+/4144281 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/v8/force_cppheapcreateparams_to_be_noncopyable.patch https://chromium-review.googlesource.com/c/v8/v8/+/3533019 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches * chore: update patches/chromium/add_maximized_parameter_to_linuxui_getwindowframeprovider.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4128765 Upstream added a new call to HeaderContext(), whose signature we have patched * chore: bump chromium in DEPS to 111.0.5530.0 * chore: update patches * Move ChildProcessHost* from content/common to content/browser Xref: Move ChildProcessHost* from content/common to content/browser * Remove RenderViewHostChanged Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4134103 [upstream removal of RenderViewHostChanged] Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4092763 Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4093234 Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133892 Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4134103 [examples of upstream code adjusting to the change] Upstream handles this change in roughly two approaches: 1. Move the code over to RenderFrameHostChanged(old_host, new_host) but test for new_host->IsInPrimaryMainFrame() before acting 2. Migrate to the PrimaryPageChanged(page) API and use page.GetMainDocument() to get the RenderFrameHost. I've chosen 1. because electron_api_web_contents needed that pointer to old_host to call RemoveInputEventListener(), but I may be missing some context & would appreciate review on this commit. * Make electron/shell/browser/relauncher_win.cc use <winternl.h> Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4129135 Many internal Windows types are now available in winternl.h so upstrem no longer defines the types themselves. * Move ChildProcessHost* from content/common to content/browser Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4134795 * fixup! Make electron/shell/browser/relauncher_win.cc use <winternl.h> winternl.h does not define the field we need, so clone the struct Chromium was using into unnamed namespace * fixup! Move ChildProcessHost* from content/common to content/browser chore: update #includes too * chore: bump chromium in DEPS to 111.0.5532.0 * chore: sync patches/chromium/pepper_plugin_support.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133323 manually reync patch; no code changes * chore: sync patches/chromium/mas_no_private_api.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4143865 the content/common/pseudonymization_salt.cc patch is no longer needed * chore: sync patches/chromium/mas_disable_remote_accessibility.patch patch-fuzz update; no manual changes * chore: sync patches/chromium/build_do_not_depend_on_packed_resource_integrity.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4111725 manually reync patch; no code changes * chore: sync patches/chromium/create_browser_v8_snapshot_file_name_fuse.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133323 manually reync patch; no code changes * chore: sync patches/v8/fix_build_deprecated_attribute_for_older_msvc_versions.patch Xref: https://chromium-review.googlesource.com/c/v8/v8/+/4127230 patch-fuzz update; no manual changes * chore: rebuild patches * fixup! Remove RenderViewHostChanged Use PrimaryPageChanged() * chore: remove unused method TabsUpdateFunction::OnExecuteCodeFinished() Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133991 This private, already-unused function showed up as a FTBFS because it took a base::ListValue parameter and ListValue was removed upstream. * task posting v3: remove includes of runner handles and IWYU task runners Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133323 * chore: lint * chore: more lint * fixup! task posting v3: remove includes of runner handles and IWYU task runners macOS, too * fixup! task posting v3: remove includes of runner handles and IWYU task runners * chore: bump chromium in DEPS to 111.0.5534.0 * chore: sync patches/chromium/allow_new_privileges_in_unsandboxed_child_processes.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4141862 patch-fuzz update; no manual changes * chore: sync patches/chromium/logging_win32_only_create_a_console_if_logging_to_stderr.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4153110 Sync to minor upstream changes. Add const correctness. * chore: sync electron/patches/chromium/feat_configure_launch_options_for_service_process.patch https://chromium-review.googlesource.com/c/chromium/src/+/4141862 patch-fuzz update; no manual changes * chore: patches/v8/fix_build_deprecated_attribute_for_older_msvc_versions.patch sync https://chromium-review.googlesource.com/c/v8/v8/+/4147787 patch-fuzz update; no manual changes * chore: update patches * chore: bump chromium in DEPS to 111.0.5536.0 * chore: sync patches/chromium/allow_new_privileges_in_unsandboxed_child_processes.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4141863 Sync with upstream code changes. Minor code golf for readability. Note: upstream is laying groundwork for being able to work off of env vars instead of switches. Doesn't affect us yet but worth being aware of. > + // Environment variables could be supported in the future, but are not > + // currently supported when launching with the zygote. * chore: update patches/chromium/feat_expose_raw_response_headers_from_urlloader.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4126836 patch-fuzz update; no manual changes * chore: sync electron/patches/chromium/feat_configure_launch_options_for_service_process.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4141863 manual sync * chore: sync electron/patches/v8/fix_build_deprecated_attribute_for_older_msvc_versions.patch https://chromium-review.googlesource.com/c/v8/v8/+/4147788 fuzz-patch * chore: rebuild patches * chore: bump chromium in DEPS to 111.0.5538.0 * chore: bump chromium in DEPS to 111.0.5540.0 * chore: update patches * Remove sdk_forward_declarations https://chromium-review.googlesource.com/c/chromium/src/+/4166680 * task posting v3: Remove task runner handles from codebase entirely Refs https://chromium-review.googlesource.com/c/chromium/src/+/4150928 * Cleanup child_process_launcher_helper* Refs https://chromium-review.googlesource.com/c/chromium/src/+/4141863 * fix: utilityprocess spec on macOS * fix: build on windows Refs https://chromium-review.googlesource.com/c/chromium/src/+/4141863 * chore: fix lint * chore: bump chromium 111.0.5544.3 * chore: gen filenames.libcxx.gni * Add check for Executable+Writable handles in renderer processes. Refs https://chromium-review.googlesource.com/c/chromium/src/+/3774416 * fixup! Add check for Executable+Writable handles in renderer processes. * 4143761: [110] Disable SwiftShader for WebGL on M1 Macs. https://chromium-review.googlesource.com/c/chromium/src/+/4143761 (cherry picked from commit 2f74db3c2139424c416f92d9169aeaa8a2f9c1ec) * chore: bump chromium to 111.0.5555.0 * 56085: Remove hmac.h include from ssl.h. https://boringssl-review.googlesource.com/c/boringssl/+/56085 * 4167020: Remove forwarding headers https://chromium-review.googlesource.com/c/chromium/src/+/4167020 * chore: bump chromium to 111.0.5559.0 * 4181044: Restrict WebCursor usage to RenderWidgetHostViewAura https://chromium-review.googlesource.com/c/chromium/src/+/4181044 * 4189437: views: rename ink_drop_host_view to ink_drop_host https://chromium-review.googlesource.com/c/chromium/src/+/4189437 * chore: bump chromium to 111.0.5560.0 * 4167016: win7dep: remove non aeroglass code https://chromium-review.googlesource.com/c/chromium/src/+/4167016 * fixup after rebase: Remove forwarding header s https://chromium-review.googlesource.com/c/chromium/src/+/4167020 * 4125755: Reland "Reject getDisplayMedia calls without user activation" https://chromium-review.googlesource.com/c/chromium/src/+/4125755 * test: add workaround * chore: update patches * fix: alter coreModuleRegExp to prevent arm crash * Revert "fix: alter coreModuleRegExp to prevent arm crash" This reverts commit 7e50630c98137831a711c5abdbc8809e60cf1d73. * 4218354: Disable the use of preserve_most on arm64 Windows https://chromium-review.googlesource.com/c/v8/v8/+/4218354 * chore: review changes --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com> Co-authored-by: deepak1556 <hop2deep@gmail.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com>
457 lines
15 KiB
C++
457 lines
15 KiB
C++
// Copyright 2020 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "electron/shell/browser/net/proxying_websocket.h"
|
|
|
|
#include <utility>
|
|
|
|
#include "base/functional/bind.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "base/strings/stringprintf.h"
|
|
#include "content/public/browser/browser_thread.h"
|
|
#include "extensions/browser/extension_navigation_ui_data.h"
|
|
#include "net/base/ip_endpoint.h"
|
|
#include "net/http/http_util.h"
|
|
#include "services/network/public/mojom/url_response_head.mojom.h"
|
|
|
|
namespace electron {
|
|
|
|
ProxyingWebSocket::ProxyingWebSocket(
|
|
WebRequestAPI* web_request_api,
|
|
WebSocketFactory factory,
|
|
const network::ResourceRequest& request,
|
|
mojo::PendingRemote<network::mojom::WebSocketHandshakeClient>
|
|
handshake_client,
|
|
bool has_extra_headers,
|
|
int process_id,
|
|
int render_frame_id,
|
|
content::BrowserContext* browser_context,
|
|
uint64_t* request_id_generator)
|
|
: web_request_api_(web_request_api),
|
|
request_(request),
|
|
factory_(std::move(factory)),
|
|
forwarding_handshake_client_(std::move(handshake_client)),
|
|
request_headers_(request.headers),
|
|
response_(network::mojom::URLResponseHead::New()),
|
|
has_extra_headers_(has_extra_headers),
|
|
info_(extensions::WebRequestInfoInitParams(
|
|
++(*request_id_generator),
|
|
process_id,
|
|
render_frame_id,
|
|
nullptr,
|
|
request,
|
|
/*is_download=*/false,
|
|
/*is_async=*/true,
|
|
/*is_service_worker_script=*/false,
|
|
/*navigation_id=*/absl::nullopt,
|
|
/*ukm_source_id=*/ukm::kInvalidSourceIdObj)) {}
|
|
|
|
ProxyingWebSocket::~ProxyingWebSocket() {
|
|
if (on_before_send_headers_callback_) {
|
|
std::move(on_before_send_headers_callback_)
|
|
.Run(net::ERR_ABORTED, absl::nullopt);
|
|
}
|
|
if (on_headers_received_callback_) {
|
|
std::move(on_headers_received_callback_)
|
|
.Run(net::ERR_ABORTED, absl::nullopt, GURL());
|
|
}
|
|
}
|
|
|
|
void ProxyingWebSocket::Start() {
|
|
// If the header client will be used, we start the request immediately, and
|
|
// OnBeforeSendHeaders and OnSendHeaders will be handled there. Otherwise,
|
|
// send these events before the request starts.
|
|
base::RepeatingCallback<void(int)> continuation;
|
|
if (has_extra_headers_) {
|
|
continuation = base::BindRepeating(
|
|
&ProxyingWebSocket::ContinueToStartRequest, weak_factory_.GetWeakPtr());
|
|
} else {
|
|
continuation =
|
|
base::BindRepeating(&ProxyingWebSocket::OnBeforeRequestComplete,
|
|
weak_factory_.GetWeakPtr());
|
|
}
|
|
|
|
int result = web_request_api_->OnBeforeRequest(&info_, request_, continuation,
|
|
&redirect_url_);
|
|
|
|
if (result == net::ERR_BLOCKED_BY_CLIENT) {
|
|
OnError(result);
|
|
return;
|
|
}
|
|
|
|
if (result == net::ERR_IO_PENDING) {
|
|
return;
|
|
}
|
|
|
|
DCHECK_EQ(net::OK, result);
|
|
continuation.Run(net::OK);
|
|
}
|
|
|
|
void ProxyingWebSocket::OnOpeningHandshakeStarted(
|
|
network::mojom::WebSocketHandshakeRequestPtr request) {
|
|
DCHECK(forwarding_handshake_client_);
|
|
forwarding_handshake_client_->OnOpeningHandshakeStarted(std::move(request));
|
|
}
|
|
|
|
void ProxyingWebSocket::ContinueToHeadersReceived() {
|
|
auto continuation =
|
|
base::BindRepeating(&ProxyingWebSocket::OnHeadersReceivedComplete,
|
|
weak_factory_.GetWeakPtr());
|
|
info_.AddResponseInfoFromResourceResponse(*response_);
|
|
int result = web_request_api_->OnHeadersReceived(
|
|
&info_, request_, continuation, response_->headers.get(),
|
|
&override_headers_, &redirect_url_);
|
|
|
|
if (result == net::ERR_BLOCKED_BY_CLIENT) {
|
|
OnError(result);
|
|
return;
|
|
}
|
|
|
|
PauseIncomingMethodCallProcessing();
|
|
if (result == net::ERR_IO_PENDING)
|
|
return;
|
|
|
|
DCHECK_EQ(net::OK, result);
|
|
OnHeadersReceivedComplete(net::OK);
|
|
}
|
|
|
|
void ProxyingWebSocket::OnFailure(const std::string& message,
|
|
int32_t net_error,
|
|
int32_t response_code) {}
|
|
|
|
void ProxyingWebSocket::OnConnectionEstablished(
|
|
mojo::PendingRemote<network::mojom::WebSocket> websocket,
|
|
mojo::PendingReceiver<network::mojom::WebSocketClient> client_receiver,
|
|
network::mojom::WebSocketHandshakeResponsePtr response,
|
|
mojo::ScopedDataPipeConsumerHandle readable,
|
|
mojo::ScopedDataPipeProducerHandle writable) {
|
|
DCHECK(forwarding_handshake_client_);
|
|
DCHECK(!is_done_);
|
|
is_done_ = true;
|
|
websocket_ = std::move(websocket);
|
|
client_receiver_ = std::move(client_receiver);
|
|
handshake_response_ = std::move(response);
|
|
readable_ = std::move(readable);
|
|
writable_ = std::move(writable);
|
|
|
|
response_->remote_endpoint = handshake_response_->remote_endpoint;
|
|
|
|
// response_->headers will be set in OnBeforeSendHeaders if
|
|
// |receiver_as_header_client_| is set.
|
|
if (receiver_as_header_client_.is_bound()) {
|
|
ContinueToCompleted();
|
|
return;
|
|
}
|
|
|
|
response_->headers =
|
|
base::MakeRefCounted<net::HttpResponseHeaders>(base::StringPrintf(
|
|
"HTTP/%d.%d %d %s", handshake_response_->http_version.major_value(),
|
|
handshake_response_->http_version.minor_value(),
|
|
handshake_response_->status_code,
|
|
handshake_response_->status_text.c_str()));
|
|
for (const auto& header : handshake_response_->headers)
|
|
response_->headers->AddHeader(header->name, header->value);
|
|
|
|
ContinueToHeadersReceived();
|
|
}
|
|
|
|
void ProxyingWebSocket::ContinueToCompleted() {
|
|
DCHECK(forwarding_handshake_client_);
|
|
DCHECK(is_done_);
|
|
web_request_api_->OnCompleted(&info_, request_, net::ERR_WS_UPGRADE);
|
|
forwarding_handshake_client_->OnConnectionEstablished(
|
|
std::move(websocket_), std::move(client_receiver_),
|
|
std::move(handshake_response_), std::move(readable_),
|
|
std::move(writable_));
|
|
|
|
// Deletes |this|.
|
|
delete this;
|
|
}
|
|
|
|
void ProxyingWebSocket::OnAuthRequired(
|
|
const net::AuthChallengeInfo& auth_info,
|
|
const scoped_refptr<net::HttpResponseHeaders>& headers,
|
|
const net::IPEndPoint& remote_endpoint,
|
|
OnAuthRequiredCallback callback) {
|
|
if (!callback) {
|
|
OnError(net::ERR_FAILED);
|
|
return;
|
|
}
|
|
|
|
response_->headers = headers;
|
|
response_->remote_endpoint = remote_endpoint;
|
|
auth_required_callback_ = std::move(callback);
|
|
|
|
auto continuation =
|
|
base::BindRepeating(&ProxyingWebSocket::OnHeadersReceivedCompleteForAuth,
|
|
weak_factory_.GetWeakPtr(), auth_info);
|
|
info_.AddResponseInfoFromResourceResponse(*response_);
|
|
int result = web_request_api_->OnHeadersReceived(
|
|
&info_, request_, continuation, response_->headers.get(),
|
|
&override_headers_, &redirect_url_);
|
|
|
|
if (result == net::ERR_BLOCKED_BY_CLIENT) {
|
|
OnError(result);
|
|
return;
|
|
}
|
|
|
|
PauseIncomingMethodCallProcessing();
|
|
if (result == net::ERR_IO_PENDING)
|
|
return;
|
|
|
|
DCHECK_EQ(net::OK, result);
|
|
OnHeadersReceivedCompleteForAuth(auth_info, net::OK);
|
|
}
|
|
|
|
void ProxyingWebSocket::OnBeforeSendHeaders(
|
|
const net::HttpRequestHeaders& headers,
|
|
OnBeforeSendHeadersCallback callback) {
|
|
DCHECK(receiver_as_header_client_.is_bound());
|
|
|
|
request_headers_ = headers;
|
|
on_before_send_headers_callback_ = std::move(callback);
|
|
OnBeforeRequestComplete(net::OK);
|
|
}
|
|
|
|
void ProxyingWebSocket::OnHeadersReceived(const std::string& headers,
|
|
const net::IPEndPoint& endpoint,
|
|
OnHeadersReceivedCallback callback) {
|
|
DCHECK(receiver_as_header_client_.is_bound());
|
|
|
|
on_headers_received_callback_ = std::move(callback);
|
|
response_->headers = base::MakeRefCounted<net::HttpResponseHeaders>(headers);
|
|
|
|
ContinueToHeadersReceived();
|
|
}
|
|
|
|
void ProxyingWebSocket::StartProxying(
|
|
WebRequestAPI* web_request_api,
|
|
WebSocketFactory factory,
|
|
const GURL& url,
|
|
const net::SiteForCookies& site_for_cookies,
|
|
const absl::optional<std::string>& user_agent,
|
|
mojo::PendingRemote<network::mojom::WebSocketHandshakeClient>
|
|
handshake_client,
|
|
bool has_extra_headers,
|
|
int process_id,
|
|
int render_frame_id,
|
|
const url::Origin& origin,
|
|
content::BrowserContext* browser_context,
|
|
uint64_t* request_id_generator) {
|
|
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
|
network::ResourceRequest request;
|
|
request.url = url;
|
|
request.site_for_cookies = site_for_cookies;
|
|
if (user_agent) {
|
|
request.headers.SetHeader(net::HttpRequestHeaders::kUserAgent, *user_agent);
|
|
}
|
|
request.request_initiator = origin;
|
|
|
|
auto* proxy = new ProxyingWebSocket(
|
|
web_request_api, std::move(factory), request, std::move(handshake_client),
|
|
has_extra_headers, process_id, render_frame_id, browser_context,
|
|
request_id_generator);
|
|
proxy->Start();
|
|
}
|
|
|
|
void ProxyingWebSocket::OnBeforeRequestComplete(int error_code) {
|
|
DCHECK(receiver_as_header_client_.is_bound() ||
|
|
!receiver_as_handshake_client_.is_bound());
|
|
DCHECK(info_.url.SchemeIsWSOrWSS());
|
|
if (error_code != net::OK) {
|
|
OnError(error_code);
|
|
return;
|
|
}
|
|
|
|
auto continuation =
|
|
base::BindRepeating(&ProxyingWebSocket::OnBeforeSendHeadersComplete,
|
|
weak_factory_.GetWeakPtr());
|
|
|
|
info_.AddResponseInfoFromResourceResponse(*response_);
|
|
int result = web_request_api_->OnBeforeSendHeaders(
|
|
&info_, request_, continuation, &request_headers_);
|
|
|
|
if (result == net::ERR_BLOCKED_BY_CLIENT) {
|
|
OnError(result);
|
|
return;
|
|
}
|
|
|
|
if (result == net::ERR_IO_PENDING)
|
|
return;
|
|
|
|
DCHECK_EQ(net::OK, result);
|
|
OnBeforeSendHeadersComplete(std::set<std::string>(), std::set<std::string>(),
|
|
net::OK);
|
|
}
|
|
|
|
void ProxyingWebSocket::OnBeforeSendHeadersComplete(
|
|
const std::set<std::string>& removed_headers,
|
|
const std::set<std::string>& set_headers,
|
|
int error_code) {
|
|
DCHECK(receiver_as_header_client_.is_bound() ||
|
|
!receiver_as_handshake_client_.is_bound());
|
|
if (error_code != net::OK) {
|
|
OnError(error_code);
|
|
return;
|
|
}
|
|
|
|
if (receiver_as_header_client_.is_bound()) {
|
|
CHECK(on_before_send_headers_callback_);
|
|
std::move(on_before_send_headers_callback_)
|
|
.Run(error_code, request_headers_);
|
|
}
|
|
|
|
info_.AddResponseInfoFromResourceResponse(*response_);
|
|
web_request_api_->OnSendHeaders(&info_, request_, request_headers_);
|
|
|
|
if (!receiver_as_header_client_.is_bound())
|
|
ContinueToStartRequest(net::OK);
|
|
}
|
|
|
|
void ProxyingWebSocket::ContinueToStartRequest(int error_code) {
|
|
if (error_code != net::OK) {
|
|
OnError(error_code);
|
|
return;
|
|
}
|
|
|
|
base::flat_set<std::string> used_header_names;
|
|
std::vector<network::mojom::HttpHeaderPtr> additional_headers;
|
|
for (net::HttpRequestHeaders::Iterator it(request_headers_); it.GetNext();) {
|
|
additional_headers.push_back(
|
|
network::mojom::HttpHeader::New(it.name(), it.value()));
|
|
used_header_names.insert(base::ToLowerASCII(it.name()));
|
|
}
|
|
for (const auto& header : additional_headers_) {
|
|
if (!used_header_names.contains(base::ToLowerASCII(header->name))) {
|
|
additional_headers.push_back(
|
|
network::mojom::HttpHeader::New(header->name, header->value));
|
|
}
|
|
}
|
|
|
|
mojo::PendingRemote<network::mojom::TrustedHeaderClient>
|
|
trusted_header_client = mojo::NullRemote();
|
|
if (has_extra_headers_) {
|
|
trusted_header_client =
|
|
receiver_as_header_client_.BindNewPipeAndPassRemote();
|
|
}
|
|
|
|
std::move(factory_).Run(
|
|
info_.url, std::move(additional_headers),
|
|
receiver_as_handshake_client_.BindNewPipeAndPassRemote(),
|
|
receiver_as_auth_handler_.BindNewPipeAndPassRemote(),
|
|
std::move(trusted_header_client));
|
|
|
|
// Here we detect mojo connection errors on |receiver_as_handshake_client_|.
|
|
// See also CreateWebSocket in
|
|
// //network/services/public/mojom/network_context.mojom.
|
|
receiver_as_handshake_client_.set_disconnect_with_reason_handler(
|
|
base::BindOnce(&ProxyingWebSocket::OnMojoConnectionErrorWithCustomReason,
|
|
base::Unretained(this)));
|
|
forwarding_handshake_client_.set_disconnect_handler(base::BindOnce(
|
|
&ProxyingWebSocket::OnMojoConnectionError, base::Unretained(this)));
|
|
}
|
|
|
|
void ProxyingWebSocket::OnHeadersReceivedComplete(int error_code) {
|
|
if (error_code != net::OK) {
|
|
OnError(error_code);
|
|
return;
|
|
}
|
|
|
|
if (on_headers_received_callback_) {
|
|
absl::optional<std::string> headers;
|
|
if (override_headers_)
|
|
headers = override_headers_->raw_headers();
|
|
std::move(on_headers_received_callback_)
|
|
.Run(net::OK, headers, absl::nullopt);
|
|
}
|
|
|
|
if (override_headers_) {
|
|
response_->headers = override_headers_;
|
|
override_headers_ = nullptr;
|
|
}
|
|
|
|
ResumeIncomingMethodCallProcessing();
|
|
info_.AddResponseInfoFromResourceResponse(*response_);
|
|
web_request_api_->OnResponseStarted(&info_, request_);
|
|
|
|
if (!receiver_as_header_client_.is_bound())
|
|
ContinueToCompleted();
|
|
}
|
|
|
|
void ProxyingWebSocket::OnAuthRequiredComplete(AuthRequiredResponse rv) {
|
|
CHECK(auth_required_callback_);
|
|
ResumeIncomingMethodCallProcessing();
|
|
switch (rv) {
|
|
case AuthRequiredResponse::kNoAction:
|
|
case AuthRequiredResponse::kCancelAuth:
|
|
std::move(auth_required_callback_).Run(absl::nullopt);
|
|
break;
|
|
|
|
case AuthRequiredResponse::kSetAuth:
|
|
std::move(auth_required_callback_).Run(auth_credentials_);
|
|
break;
|
|
case AuthRequiredResponse::kIoPending:
|
|
NOTREACHED();
|
|
break;
|
|
}
|
|
}
|
|
|
|
void ProxyingWebSocket::OnHeadersReceivedCompleteForAuth(
|
|
const net::AuthChallengeInfo& auth_info,
|
|
int rv) {
|
|
if (rv != net::OK) {
|
|
OnError(rv);
|
|
return;
|
|
}
|
|
ResumeIncomingMethodCallProcessing();
|
|
info_.AddResponseInfoFromResourceResponse(*response_);
|
|
|
|
auto continuation = base::BindRepeating(
|
|
&ProxyingWebSocket::OnAuthRequiredComplete, weak_factory_.GetWeakPtr());
|
|
auto auth_rv = AuthRequiredResponse::kIoPending;
|
|
PauseIncomingMethodCallProcessing();
|
|
|
|
OnAuthRequiredComplete(auth_rv);
|
|
}
|
|
|
|
void ProxyingWebSocket::PauseIncomingMethodCallProcessing() {
|
|
receiver_as_handshake_client_.Pause();
|
|
receiver_as_auth_handler_.Pause();
|
|
if (receiver_as_header_client_.is_bound())
|
|
receiver_as_header_client_.Pause();
|
|
}
|
|
|
|
void ProxyingWebSocket::ResumeIncomingMethodCallProcessing() {
|
|
receiver_as_handshake_client_.Resume();
|
|
receiver_as_auth_handler_.Resume();
|
|
if (receiver_as_header_client_.is_bound())
|
|
receiver_as_header_client_.Resume();
|
|
}
|
|
|
|
void ProxyingWebSocket::OnError(int error_code) {
|
|
if (!is_done_) {
|
|
is_done_ = true;
|
|
web_request_api_->OnErrorOccurred(&info_, request_, error_code);
|
|
}
|
|
|
|
// Deletes |this|.
|
|
delete this;
|
|
}
|
|
|
|
void ProxyingWebSocket::OnMojoConnectionErrorWithCustomReason(
|
|
uint32_t custom_reason,
|
|
const std::string& description) {
|
|
// Here we want to notify the custom reason to the client, which is why
|
|
// we reset |forwarding_handshake_client_| manually.
|
|
forwarding_handshake_client_.ResetWithReason(custom_reason, description);
|
|
OnError(net::ERR_FAILED);
|
|
// Deletes |this|.
|
|
}
|
|
|
|
void ProxyingWebSocket::OnMojoConnectionError() {
|
|
OnError(net::ERR_FAILED);
|
|
// Deletes |this|.
|
|
}
|
|
|
|
} // namespace electron
|