Jelajahi Sumber

RequestServer+LibHTTP+LibGemini: Cache connections to the same host

This makes connections (particularly TLS-based ones) do the handshaking
stuff only once.
Currently the cache is configured to keep at most two connections evenly
balanced in queue size, and with a grace period of 10s after the last
queued job has finished (after which the connection will be dropped).
Ali Mohammad Pur 3 tahun lalu
induk
melakukan
65f7e45a75

+ 1 - 0
Userland/Libraries/LibCore/IODevice.h

@@ -82,6 +82,7 @@ public:
     bool can_read_line() const;
 
     bool can_read() const;
+    bool can_read_only_from_buffer() const { return !m_buffered_data.is_empty() && !can_read_from_fd(); }
 
     bool seek(i64, SeekMode = SeekMode::SetPosition, off_t* = nullptr);
 

+ 1 - 1
Userland/Libraries/LibCore/NetworkJob.cpp

@@ -19,7 +19,7 @@ NetworkJob::~NetworkJob()
 {
 }
 
-void NetworkJob::start()
+void NetworkJob::start(NonnullRefPtr<Core::Socket>)
 {
 }
 

+ 1 - 1
Userland/Libraries/LibCore/NetworkJob.h

@@ -35,7 +35,7 @@ public:
     NetworkResponse* response() { return m_response.ptr(); }
     const NetworkResponse* response() const { return m_response.ptr(); }
 
-    virtual void start() = 0;
+    virtual void start(NonnullRefPtr<Core::Socket>) = 0;
     virtual void shutdown() = 0;
 
     void cancel()

+ 17 - 13
Userland/Libraries/LibGemini/GeminiJob.cpp

@@ -14,15 +14,11 @@
 
 namespace Gemini {
 
-void GeminiJob::start()
+void GeminiJob::start(NonnullRefPtr<Core::Socket> socket)
 {
     VERIFY(!m_socket);
-    m_socket = TLS::TLSv12::construct(this);
-    m_socket->set_root_certificates(m_override_ca_certificates ? *m_override_ca_certificates : DefaultRootCACertificates::the().certificates());
-    m_socket->on_tls_connected = [this] {
-        dbgln_if(GEMINIJOB_DEBUG, "GeminiJob: on_connected callback");
-        on_socket_connected();
-    };
+    VERIFY(is<TLS::TLSv12>(*socket));
+    m_socket = static_ptr_cast<TLS::TLSv12>(socket);
     m_socket->on_tls_error = [this](TLS::AlertDescription error) {
         if (error == TLS::AlertDescription::HandshakeFailure) {
             deferred_invoke([this] {
@@ -45,11 +41,20 @@ void GeminiJob::start()
         if (on_certificate_requested)
             on_certificate_requested(*this);
     };
-    bool success = ((TLS::TLSv12&)*m_socket).connect(m_request.url().host(), m_request.url().port_or_default());
-    if (!success) {
-        deferred_invoke([this] {
-            return did_fail(Core::NetworkJob::Error::ConnectionFailed);
-        });
+
+    if (m_socket->is_established()) {
+        deferred_invoke([this] { on_socket_connected(); });
+    } else {
+        m_socket->set_root_certificates(m_override_ca_certificates ? *m_override_ca_certificates : DefaultRootCACertificates::the().certificates());
+        m_socket->on_tls_connected = [this] {
+            on_socket_connected();
+        };
+        bool success = ((TLS::TLSv12&)*m_socket).connect(m_request.url().host(), m_request.url().port_or_default());
+        if (!success) {
+            deferred_invoke([this] {
+                return did_fail(Core::NetworkJob::Error::ConnectionFailed);
+            });
+        }
     }
 }
 
@@ -59,7 +64,6 @@ void GeminiJob::shutdown()
         return;
     m_socket->on_tls_ready_to_read = nullptr;
     m_socket->on_tls_connected = nullptr;
-    remove_child(*m_socket);
     m_socket = nullptr;
 }
 

+ 4 - 1
Userland/Libraries/LibGemini/GeminiJob.h

@@ -27,10 +27,13 @@ public:
     {
     }
 
-    virtual void start() override;
+    virtual void start(NonnullRefPtr<Core::Socket>) override;
     virtual void shutdown() override;
     void set_certificate(String certificate, String key);
 
+    Core::Socket const* socket() const { return m_socket; }
+    URL url() const { return m_request.url(); }
+
     Function<void(GeminiJob&)> on_certificate_requested;
 
 protected:

+ 1 - 1
Userland/Libraries/LibGemini/Job.h

@@ -19,7 +19,7 @@ public:
     explicit Job(const GeminiRequest&, OutputStream&);
     virtual ~Job() override;
 
-    virtual void start() override = 0;
+    virtual void start(NonnullRefPtr<Core::Socket>) override = 0;
     virtual void shutdown() override = 0;
 
     GeminiResponse* response() { return static_cast<GeminiResponse*>(Core::NetworkJob::response()); }

+ 32 - 12
Userland/Libraries/LibHTTP/HttpJob.cpp

@@ -12,26 +12,35 @@
 #include <unistd.h>
 
 namespace HTTP {
-void HttpJob::start()
+void HttpJob::start(NonnullRefPtr<Core::Socket> socket)
 {
     VERIFY(!m_socket);
-    m_socket = Core::TCPSocket::construct(this);
-    m_socket->on_connected = [this] {
-        dbgln_if(CHTTPJOB_DEBUG, "HttpJob: on_connected callback");
-        on_socket_connected();
-    };
+    m_socket = move(socket);
     m_socket->on_error = [this] {
         dbgln_if(CHTTPJOB_DEBUG, "HttpJob: on_error callback");
         deferred_invoke([this] {
             did_fail(Core::NetworkJob::Error::ConnectionFailed);
         });
     };
-    bool success = m_socket->connect(m_request.url().host(), m_request.url().port_or_default());
-    if (!success) {
+    if (m_socket->is_connected()) {
+        dbgln("Reusing previous connection for {}", url());
         deferred_invoke([this] {
-            return did_fail(Core::NetworkJob::Error::ConnectionFailed);
+            dbgln_if(CHTTPJOB_DEBUG, "HttpJob: on_connected callback");
+            on_socket_connected();
         });
-    }
+    } else {
+        dbgln("Creating new connection for {}", url());
+        m_socket->on_connected = [this] {
+            dbgln_if(CHTTPJOB_DEBUG, "HttpJob: on_connected callback");
+            on_socket_connected();
+        };
+        bool success = m_socket->connect(m_request.url().host(), m_request.url().port_or_default());
+        if (!success) {
+            deferred_invoke([this] {
+                return did_fail(Core::NetworkJob::Error::ConnectionFailed);
+            });
+        }
+    };
 }
 
 void HttpJob::shutdown()
@@ -40,13 +49,24 @@ void HttpJob::shutdown()
         return;
     m_socket->on_ready_to_read = nullptr;
     m_socket->on_connected = nullptr;
-    remove_child(*m_socket);
     m_socket = nullptr;
 }
 
 void HttpJob::register_on_ready_to_read(Function<void()> callback)
 {
-    m_socket->on_ready_to_read = move(callback);
+    m_socket->on_ready_to_read = [callback = move(callback), this] {
+        callback();
+        // As IODevice so graciously buffers everything, there's a possible
+        // scenario where it buffers the entire response, and we get stuck waiting
+        // for select() in the notifier (which will never return).
+        // So handle this case by exhausting the buffer here.
+        if (m_socket->can_read_only_from_buffer() && m_state != State::Finished && !has_error()) {
+            deferred_invoke([this] {
+                if (m_socket && m_socket->on_ready_to_read)
+                    m_socket->on_ready_to_read();
+            });
+        }
+    };
 }
 
 void HttpJob::register_on_ready_to_write(Function<void()> callback)

+ 4 - 1
Userland/Libraries/LibHTTP/HttpJob.h

@@ -27,9 +27,12 @@ public:
     {
     }
 
-    virtual void start() override;
+    virtual void start(NonnullRefPtr<Core::Socket>) override;
     virtual void shutdown() override;
 
+    Core::Socket const* socket() const { return m_socket; }
+    URL url() const { return m_request.url(); }
+
 protected:
     virtual bool should_fail_on_empty_payload() const override { return false; }
     virtual void register_on_ready_to_read(Function<void()>) override;

+ 0 - 1
Userland/Libraries/LibHTTP/HttpRequest.cpp

@@ -55,7 +55,6 @@ ByteBuffer HttpRequest::to_raw_request() const
         builder.append(header.value);
         builder.append("\r\n");
     }
-    builder.append("Connection: close\r\n");
     if (!m_body.is_empty()) {
         builder.appendff("Content-Length: {}\r\n\r\n", m_body.size());
         builder.append((char const*)m_body.data(), m_body.size());

+ 20 - 13
Userland/Libraries/LibHTTP/HttpsJob.cpp

@@ -14,15 +14,12 @@
 
 namespace HTTP {
 
-void HttpsJob::start()
+void HttpsJob::start(NonnullRefPtr<Core::Socket> socket)
 {
     VERIFY(!m_socket);
-    m_socket = TLS::TLSv12::construct(this);
-    m_socket->set_root_certificates(m_override_ca_certificates ? *m_override_ca_certificates : DefaultRootCACertificates::the().certificates());
-    m_socket->on_tls_connected = [this] {
-        dbgln_if(HTTPSJOB_DEBUG, "HttpsJob: on_connected callback");
-        on_socket_connected();
-    };
+    VERIFY(is<TLS::TLSv12>(*socket));
+
+    m_socket = static_ptr_cast<TLS::TLSv12>(socket);
     m_socket->on_tls_error = [&](TLS::AlertDescription error) {
         if (error == TLS::AlertDescription::HandshakeFailure) {
             deferred_invoke([this] {
@@ -46,11 +43,22 @@ void HttpsJob::start()
         if (on_certificate_requested)
             on_certificate_requested(*this);
     };
-    bool success = ((TLS::TLSv12&)*m_socket).connect(m_request.url().host(), m_request.url().port_or_default());
-    if (!success) {
-        deferred_invoke([this] {
-            return did_fail(Core::NetworkJob::Error::ConnectionFailed);
-        });
+    if (m_socket->is_established()) {
+        dbgln("Reusing previous connection for {}", url());
+        deferred_invoke([this] { on_socket_connected(); });
+    } else {
+        dbgln("Creating a new connection for {}", url());
+        m_socket->set_root_certificates(m_override_ca_certificates ? *m_override_ca_certificates : DefaultRootCACertificates::the().certificates());
+        m_socket->on_tls_connected = [this] {
+            dbgln_if(HTTPSJOB_DEBUG, "HttpsJob: on_connected callback");
+            on_socket_connected();
+        };
+        bool success = ((TLS::TLSv12&)*m_socket).connect(m_request.url().host(), m_request.url().port_or_default());
+        if (!success) {
+            deferred_invoke([this] {
+                return did_fail(Core::NetworkJob::Error::ConnectionFailed);
+            });
+        }
     }
 }
 
@@ -60,7 +68,6 @@ void HttpsJob::shutdown()
         return;
     m_socket->on_tls_ready_to_read = nullptr;
     m_socket->on_tls_connected = nullptr;
-    remove_child(*m_socket);
     m_socket = nullptr;
 }
 

+ 4 - 1
Userland/Libraries/LibHTTP/HttpsJob.h

@@ -28,10 +28,13 @@ public:
     {
     }
 
-    virtual void start() override;
+    virtual void start(NonnullRefPtr<Core::Socket>) override;
     virtual void shutdown() override;
     void set_certificate(String certificate, String key);
 
+    Core::Socket const* socket() const { return m_socket; }
+    URL url() const { return m_request.url(); }
+
     Function<void(HttpsJob&)> on_certificate_requested;
 
 protected:

+ 9 - 3
Userland/Libraries/LibHTTP/Job.cpp

@@ -85,7 +85,7 @@ void Job::flush_received_buffers()
 {
     if (!m_can_stream_response || m_buffered_size == 0)
         return;
-    dbgln_if(JOB_DEBUG, "Job: Flushing received buffers: have {} bytes in {} buffers", m_buffered_size, m_received_buffers.size());
+    dbgln_if(JOB_DEBUG, "Job: Flushing received buffers: have {} bytes in {} buffers for {}", m_buffered_size, m_received_buffers.size(), m_request.url());
     for (size_t i = 0; i < m_received_buffers.size(); ++i) {
         auto& payload = m_received_buffers[i];
         auto written = do_write(payload);
@@ -100,7 +100,7 @@ void Job::flush_received_buffers()
         payload = payload.slice(written, payload.size() - written);
         break;
     }
-    dbgln_if(JOB_DEBUG, "Job: Flushing received buffers done: have {} bytes in {} buffers", m_buffered_size, m_received_buffers.size());
+    dbgln_if(JOB_DEBUG, "Job: Flushing received buffers done: have {} bytes in {} buffers for {}", m_buffered_size, m_received_buffers.size(), m_request.url());
 }
 
 void Job::on_socket_connected()
@@ -121,6 +121,7 @@ void Job::on_socket_connected()
             deferred_invoke([this] { did_fail(Core::NetworkJob::Error::TransmissionFailed); });
     });
     register_on_ready_to_read([&] {
+        dbgln_if(JOB_DEBUG, "Ready to read for {}, state = {}, cancelled = {}", m_request.url(), to_underlying(m_state), is_cancelled());
         if (is_cancelled())
             return;
 
@@ -132,9 +133,12 @@ void Job::on_socket_connected()
         }
 
         if (m_state == State::InStatus) {
-            if (!can_read_line())
+            if (!can_read_line()) {
+                dbgln_if(JOB_DEBUG, "Job {} cannot read line", m_request.url());
                 return;
+            }
             auto line = read_line(PAGE_SIZE);
+            dbgln_if(JOB_DEBUG, "Job {} read line of length {}", m_request.url(), line.length());
             if (line.is_null()) {
                 dbgln("Job: Expected HTTP status");
                 return deferred_invoke([this] { did_fail(Core::NetworkJob::Error::TransmissionFailed); });
@@ -287,7 +291,9 @@ void Job::on_socket_connected()
                 }
             }
 
+            dbgln_if(JOB_DEBUG, "Waiting for payload for {}", m_request.url());
             auto payload = receive(read_size);
+            dbgln_if(JOB_DEBUG, "Received {} bytes of payload from {}", payload.size(), m_request.url());
             if (payload.is_empty()) {
                 if (eof()) {
                     finish_up();

+ 1 - 1
Userland/Libraries/LibHTTP/Job.h

@@ -21,7 +21,7 @@ public:
     explicit Job(const HttpRequest&, OutputStream&);
     virtual ~Job() override;
 
-    virtual void start() override = 0;
+    virtual void start(NonnullRefPtr<Core::Socket>) override = 0;
     virtual void shutdown() override = 0;
 
     HttpResponse* response() { return static_cast<HttpResponse*>(Core::NetworkJob::response()); }

+ 1 - 0
Userland/Services/RequestServer/CMakeLists.txt

@@ -8,6 +8,7 @@ compile_ipc(RequestClient.ipc RequestClientEndpoint.h)
 
 set(SOURCES
     ClientConnection.cpp
+    ConnectionCache.cpp
     Request.cpp
     RequestClientEndpoint.h
     RequestServerEndpoint.h

+ 73 - 0
Userland/Services/RequestServer/ConnectionCache.cpp

@@ -0,0 +1,73 @@
+/*
+ * Copyright (c) 2021, Ali Mohammad Pur <mpfard@serenityos.org>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#include "ConnectionCache.h"
+#include <LibCore/EventLoop.h>
+
+namespace RequestServer::ConnectionCache {
+
+HashMap<ConnectionKey, Vector<Connection<Core::TCPSocket>>> g_tcp_connection_cache {};
+HashMap<ConnectionKey, Vector<Connection<TLS::TLSv12>>> g_tls_connection_cache {};
+
+void request_did_finish(URL const& url, Core::Socket const* socket)
+{
+    if (!socket) {
+        dbgln("Request with a null socket finished for URL {}", url);
+        return;
+    }
+
+    dbgln("Request for {} finished", url);
+
+    ConnectionKey key { url.host(), url.port_or_default() };
+    auto fire_off_next_job = [&](auto& cache) {
+        auto it = cache.find(key);
+        if (it == cache.end()) {
+            dbgln("Request for URL {} finished, but we don't own that!", url);
+            return;
+        }
+        auto connection_it = it->value.find_if([&](auto& connection) { return connection.socket == socket; });
+        if (connection_it.is_end()) {
+            dbgln("Request for URL {} finished, but we don't have a socket for that!", url);
+            return;
+        }
+
+        auto& connection = *connection_it;
+        if (connection.request_queue.is_empty()) {
+            connection.has_started = false;
+            connection.removal_timer->on_timeout = [&connection, &cache_entry = it->value] {
+                Core::deferred_invoke([&] {
+                    dbgln("Removing no-longer-used connection {}", &connection);
+                    cache_entry.remove_first_matching([&](auto& entry) { return &entry == &connection; });
+                });
+            };
+            connection.removal_timer->start();
+        } else {
+            using SocketType = RemoveCVReference<decltype(*connection.socket)>;
+            bool is_connected;
+            if constexpr (IsSame<SocketType, TLS::TLSv12>)
+                is_connected = connection.socket->is_established();
+            else
+                is_connected = connection.socket->is_connected();
+            if (!is_connected) {
+                // Create another socket for the connection.
+                dbgln("Creating a new socket for {}", url);
+                connection.socket = SocketType::construct(nullptr);
+            }
+            dbgln("Running next job in queue for connection {}", &connection);
+            auto request = connection.request_queue.take_first();
+            request(connection.socket);
+        }
+    };
+
+    if (is<TLS::TLSv12>(socket))
+        fire_off_next_job(g_tls_connection_cache);
+    else if (is<Core::TCPSocket>(socket))
+        fire_off_next_job(g_tcp_connection_cache);
+    else
+        dbgln("Unknown socket {} finished for URL {}", *socket, url);
+}
+
+}

+ 103 - 0
Userland/Services/RequestServer/ConnectionCache.h

@@ -0,0 +1,103 @@
+/*
+ * Copyright (c) 2021, Ali Mohammad Pur <mpfard@serenityos.org>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#pragma once
+
+#include <AK/HashMap.h>
+#include <AK/URL.h>
+#include <AK/Vector.h>
+#include <LibCore/TCPSocket.h>
+#include <LibCore/Timer.h>
+#include <LibTLS/TLSv12.h>
+
+namespace RequestServer::ConnectionCache {
+
+template<typename Socket>
+struct Connection {
+    using QueueType = Vector<Function<void(Core::Socket&)>>;
+    using SocketType = Socket;
+
+    NonnullRefPtr<Socket> socket;
+    QueueType request_queue;
+    NonnullRefPtr<Core::Timer> removal_timer;
+    bool has_started { false };
+};
+
+struct ConnectionKey {
+    String hostname;
+    u16 port { 0 };
+
+    bool operator==(ConnectionKey const&) const = default;
+};
+
+};
+
+template<>
+struct AK::Traits<RequestServer::ConnectionCache::ConnectionKey> : public AK::GenericTraits<RequestServer::ConnectionCache::ConnectionKey> {
+    static u32 hash(RequestServer::ConnectionCache::ConnectionKey const& key)
+    {
+        return pair_int_hash(key.hostname.hash(), key.port);
+    }
+};
+
+namespace RequestServer::ConnectionCache {
+
+extern HashMap<ConnectionKey, Vector<Connection<Core::TCPSocket>>> g_tcp_connection_cache;
+extern HashMap<ConnectionKey, Vector<Connection<TLS::TLSv12>>> g_tls_connection_cache;
+
+void request_did_finish(URL const&, Core::Socket const*);
+
+constexpr static inline size_t MaxConcurrentConnectionsPerURL = 2;
+constexpr static inline size_t ConnectionKeepAliveTimeMilliseconds = 10'000;
+
+decltype(auto) get_or_create_connection(auto& cache, URL const& url, auto& job)
+{
+    auto start_job = [&job](auto& socket) {
+        job.start(socket);
+    };
+    auto& sockets_for_url = cache.ensure({ url.host(), url.port_or_default() });
+    auto it = sockets_for_url.find_if([](auto& connection) { return connection.request_queue.is_empty(); });
+    auto did_add_new_connection = false;
+    if (it.is_end() && sockets_for_url.size() < ConnectionCache::MaxConcurrentConnectionsPerURL) {
+        sockets_for_url.append({
+            RemoveCVReference<decltype(cache.begin()->value.at(0))>::SocketType::construct(nullptr),
+            {},
+            Core::Timer::create_single_shot(ConnectionKeepAliveTimeMilliseconds, nullptr),
+        });
+        did_add_new_connection = true;
+    }
+    size_t index;
+    if (it.is_end()) {
+        if (did_add_new_connection) {
+            index = sockets_for_url.size() - 1;
+        } else {
+            // Find the least backed-up connection (based on how many entries are in their request queue.
+            index = 0;
+            auto min_queue_size = (size_t)-1;
+            for (auto it = sockets_for_url.begin(); it != sockets_for_url.end(); ++it) {
+                if (auto queue_size = it->request_queue.size(); min_queue_size > queue_size) {
+                    index = it.index();
+                    min_queue_size = queue_size;
+                }
+            }
+        }
+    } else {
+        index = it.index();
+    }
+    auto& connection = sockets_for_url[index];
+    if (!connection.has_started) {
+        dbgln("Immediately start request for url {} in {}", url, &connection);
+        connection.has_started = true;
+        connection.removal_timer->stop();
+        start_job(*connection.socket);
+    } else {
+        dbgln("Enqueue request for URL {} in {}", url, &connection);
+        connection.request_queue.append(move(start_job));
+    }
+    return connection;
+}
+
+}

+ 4 - 1
Userland/Services/RequestServer/GeminiProtocol.cpp

@@ -4,6 +4,7 @@
  * SPDX-License-Identifier: BSD-2-Clause
  */
 
+#include "ConnectionCache.h"
 #include <LibGemini/GeminiJob.h>
 #include <LibGemini/GeminiRequest.h>
 #include <RequestServer/GeminiProtocol.h>
@@ -34,7 +35,9 @@ OwnPtr<Request> GeminiProtocol::start_request(ClientConnection& client, const St
     auto job = Gemini::GeminiJob::construct(request, *output_stream);
     auto protocol_request = GeminiRequest::create_with_job({}, client, (Gemini::GeminiJob&)*job, move(output_stream));
     protocol_request->set_request_fd(pipe_result.value().read_fd);
-    job->start();
+
+    ConnectionCache::get_or_create_connection(ConnectionCache::g_tls_connection_cache, url, *job);
+
     return protocol_request;
 }
 

+ 5 - 0
Userland/Services/RequestServer/GeminiRequest.cpp

@@ -4,6 +4,8 @@
  * SPDX-License-Identifier: BSD-2-Clause
  */
 
+#include "ConnectionCache.h"
+#include <LibCore/EventLoop.h>
 #include <LibGemini/GeminiJob.h>
 #include <LibGemini/GeminiResponse.h>
 #include <RequestServer/GeminiRequest.h>
@@ -15,6 +17,9 @@ GeminiRequest::GeminiRequest(ClientConnection& client, NonnullRefPtr<Gemini::Gem
     , m_job(job)
 {
     m_job->on_finish = [this](bool success) {
+        Core::deferred_invoke([url = m_job->url(), socket = m_job->socket()] {
+            ConnectionCache::request_did_finish(url, socket);
+        });
         if (auto* response = m_job->response()) {
             set_downloaded_size(this->output_stream().size());
             if (!response->meta().is_empty()) {

+ 2 - 0
Userland/Services/RequestServer/GeminiRequest.h

@@ -18,6 +18,8 @@ public:
     virtual ~GeminiRequest() override;
     static NonnullOwnPtr<GeminiRequest> create_with_job(Badge<GeminiProtocol>, ClientConnection&, NonnullRefPtr<Gemini::GeminiJob>, NonnullOwnPtr<OutputFileStream>&&);
 
+    Gemini::GeminiJob const& job() const { return *m_job; }
+
 private:
     explicit GeminiRequest(ClientConnection&, NonnullRefPtr<Gemini::GeminiJob>, NonnullOwnPtr<OutputFileStream>&&);
 

+ 10 - 1
Userland/Services/RequestServer/HttpCommon.h

@@ -15,6 +15,7 @@
 #include <AK/Types.h>
 #include <LibHTTP/HttpRequest.h>
 #include <RequestServer/ClientConnection.h>
+#include <RequestServer/ConnectionCache.h>
 #include <RequestServer/Request.h>
 
 namespace RequestServer::Detail {
@@ -29,6 +30,9 @@ void init(TSelf* self, TJob job)
     };
 
     job->on_finish = [self](bool success) {
+        Core::deferred_invoke([url = self->job().url(), socket = self->job().socket()] {
+            ConnectionCache::request_did_finish(url, socket);
+        });
         if (auto* response = self->job().response()) {
             self->set_status_code(response->code());
             self->set_response_headers(response->headers());
@@ -80,7 +84,12 @@ OwnPtr<Request> start_request(TBadgedProtocol&& protocol, ClientConnection& clie
     auto job = TJob::construct(request, *output_stream);
     auto protocol_request = TRequest::create_with_job(forward<TBadgedProtocol>(protocol), client, (TJob&)*job, move(output_stream));
     protocol_request->set_request_fd(pipe_result.value().read_fd);
-    job->start();
+
+    if constexpr (IsSame<typename TBadgedProtocol::Type, HttpsProtocol>)
+        ConnectionCache::get_or_create_connection(ConnectionCache::g_tls_connection_cache, url, *job);
+    else
+        ConnectionCache::get_or_create_connection(ConnectionCache::g_tcp_connection_cache, url, *job);
+
     return protocol_request;
 }
 

+ 1 - 0
Userland/Services/RequestServer/HttpRequest.h

@@ -20,6 +20,7 @@ public:
     static NonnullOwnPtr<HttpRequest> create_with_job(Badge<HttpProtocol>&&, ClientConnection&, NonnullRefPtr<HTTP::HttpJob>, NonnullOwnPtr<OutputFileStream>&&);
 
     HTTP::HttpJob& job() { return m_job; }
+    HTTP::HttpJob const& job() const { return m_job; }
 
 private:
     explicit HttpRequest(ClientConnection&, NonnullRefPtr<HTTP::HttpJob>, NonnullOwnPtr<OutputFileStream>&&);

+ 1 - 0
Userland/Services/RequestServer/HttpsRequest.h

@@ -19,6 +19,7 @@ public:
     static NonnullOwnPtr<HttpsRequest> create_with_job(Badge<HttpsProtocol>&&, ClientConnection&, NonnullRefPtr<HTTP::HttpsJob>, NonnullOwnPtr<OutputFileStream>&&);
 
     HTTP::HttpsJob& job() { return m_job; }
+    HTTP::HttpsJob const& job() const { return m_job; }
 
 private:
     explicit HttpsRequest(ClientConnection&, NonnullRefPtr<HTTP::HttpsJob>, NonnullOwnPtr<OutputFileStream>&&);