| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "webkit/plugins/ppapi/ppb_url_loader_impl.h" | |
| 6 | |
| 7 #include "base/logging.h" | |
| 8 #include "net/base/net_errors.h" | |
| 9 #include "ppapi/c/pp_completion_callback.h" | |
| 10 #include "ppapi/c/pp_errors.h" | |
| 11 #include "ppapi/c/ppb_url_loader.h" | |
| 12 #include "ppapi/c/trusted/ppb_url_loader_trusted.h" | |
| 13 #include "ppapi/shared_impl/ppapi_globals.h" | |
| 14 #include "ppapi/shared_impl/url_response_info_data.h" | |
| 15 #include "ppapi/thunk/enter.h" | |
| 16 #include "ppapi/thunk/ppb_url_request_info_api.h" | |
| 17 #include "third_party/WebKit/Source/WebKit/chromium/public/WebDocument.h" | |
| 18 #include "third_party/WebKit/Source/WebKit/chromium/public/WebElement.h" | |
| 19 #include "third_party/WebKit/Source/WebKit/chromium/public/WebFrame.h" | |
| 20 #include "third_party/WebKit/Source/WebKit/chromium/public/WebKit.h" | |
| 21 #include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebKitPlatfo
rmSupport.h" | |
| 22 #include "third_party/WebKit/Source/WebKit/chromium/public/WebPluginContainer.h" | |
| 23 #include "third_party/WebKit/Source/WebKit/chromium/public/WebSecurityOrigin.h" | |
| 24 #include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebURLError.
h" | |
| 25 #include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebURLLoader
.h" | |
| 26 #include "third_party/WebKit/Source/WebKit/chromium/public/WebURLLoaderOptions.h
" | |
| 27 #include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebURLReques
t.h" | |
| 28 #include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebURLRespon
se.h" | |
| 29 #include "webkit/appcache/web_application_cache_host_impl.h" | |
| 30 #include "webkit/plugins/ppapi/common.h" | |
| 31 #include "webkit/plugins/ppapi/plugin_module.h" | |
| 32 #include "webkit/plugins/ppapi/ppapi_plugin_instance.h" | |
| 33 #include "webkit/plugins/ppapi/resource_helper.h" | |
| 34 #include "webkit/plugins/ppapi/url_request_info_util.h" | |
| 35 #include "webkit/plugins/ppapi/url_response_info_util.h" | |
| 36 | |
| 37 using appcache::WebApplicationCacheHostImpl; | |
| 38 using ppapi::Resource; | |
| 39 using ppapi::thunk::EnterResourceNoLock; | |
| 40 using ppapi::thunk::PPB_URLLoader_API; | |
| 41 using ppapi::thunk::PPB_URLRequestInfo_API; | |
| 42 using ppapi::TrackedCallback; | |
| 43 using WebKit::WebFrame; | |
| 44 using WebKit::WebString; | |
| 45 using WebKit::WebURL; | |
| 46 using WebKit::WebURLError; | |
| 47 using WebKit::WebURLLoader; | |
| 48 using WebKit::WebURLLoaderOptions; | |
| 49 using WebKit::WebURLRequest; | |
| 50 using WebKit::WebURLResponse; | |
| 51 | |
| 52 #ifdef _MSC_VER | |
| 53 // Do not warn about use of std::copy with raw pointers. | |
| 54 #pragma warning(disable : 4996) | |
| 55 #endif | |
| 56 | |
| 57 namespace webkit { | |
| 58 namespace ppapi { | |
| 59 | |
| 60 namespace { | |
| 61 | |
| 62 WebFrame* GetFrameForResource(const Resource* resource) { | |
| 63 PluginInstance* plugin_instance = ResourceHelper::GetPluginInstance(resource); | |
| 64 if (!plugin_instance) | |
| 65 return NULL; | |
| 66 return plugin_instance->container()->element().document().frame(); | |
| 67 } | |
| 68 | |
| 69 } // namespace | |
| 70 | |
| 71 PPB_URLLoader_Impl::PPB_URLLoader_Impl(PP_Instance instance, | |
| 72 bool main_document_loader) | |
| 73 : Resource(::ppapi::OBJECT_IS_IMPL, instance), | |
| 74 main_document_loader_(main_document_loader), | |
| 75 pending_callback_(), | |
| 76 bytes_sent_(0), | |
| 77 total_bytes_to_be_sent_(-1), | |
| 78 bytes_received_(0), | |
| 79 total_bytes_to_be_received_(-1), | |
| 80 user_buffer_(NULL), | |
| 81 user_buffer_size_(0), | |
| 82 done_status_(PP_OK_COMPLETIONPENDING), | |
| 83 is_streaming_to_file_(false), | |
| 84 is_asynchronous_load_suspended_(false), | |
| 85 has_universal_access_(false), | |
| 86 status_callback_(NULL) { | |
| 87 } | |
| 88 | |
| 89 PPB_URLLoader_Impl::~PPB_URLLoader_Impl() { | |
| 90 // There is a path whereby the destructor for the loader_ member can | |
| 91 // invoke InstanceWasDeleted() upon this PPB_URLLoader_Impl, thereby | |
| 92 // re-entering the scoped_ptr destructor with the same scoped_ptr object | |
| 93 // via loader_.reset(). Be sure that loader_ is first NULL then destroy | |
| 94 // the scoped_ptr. See http://crbug.com/159429. | |
| 95 scoped_ptr<WebKit::WebURLLoader> for_destruction_only(loader_.release()); | |
| 96 } | |
| 97 | |
| 98 PPB_URLLoader_API* PPB_URLLoader_Impl::AsPPB_URLLoader_API() { | |
| 99 return this; | |
| 100 } | |
| 101 | |
| 102 void PPB_URLLoader_Impl::InstanceWasDeleted() { | |
| 103 loader_.reset(); | |
| 104 } | |
| 105 | |
| 106 int32_t PPB_URLLoader_Impl::Open(PP_Resource request_id, | |
| 107 scoped_refptr<TrackedCallback> callback) { | |
| 108 EnterResourceNoLock<PPB_URLRequestInfo_API> enter_request(request_id, true); | |
| 109 if (enter_request.failed()) { | |
| 110 Log(PP_LOGLEVEL_ERROR, | |
| 111 "PPB_URLLoader.Open: invalid request resource ID. (Hint to C++ wrapper" | |
| 112 " users: use the ResourceRequest constructor that takes an instance or" | |
| 113 " else the request will be null.)"); | |
| 114 return PP_ERROR_BADARGUMENT; | |
| 115 } | |
| 116 return Open(enter_request.object()->GetData(), 0, callback); | |
| 117 } | |
| 118 | |
| 119 int32_t PPB_URLLoader_Impl::Open( | |
| 120 const ::ppapi::URLRequestInfoData& request_data, | |
| 121 int requestor_pid, | |
| 122 scoped_refptr<TrackedCallback> callback) { | |
| 123 // Main document loads are already open, so don't allow people to open them | |
| 124 // again. | |
| 125 if (main_document_loader_) | |
| 126 return PP_ERROR_INPROGRESS; | |
| 127 | |
| 128 int32_t rv = ValidateCallback(callback); | |
| 129 if (rv != PP_OK) | |
| 130 return rv; | |
| 131 | |
| 132 // Create a copy of the request data since CreateWebURLRequest will populate | |
| 133 // the file refs. | |
| 134 ::ppapi::URLRequestInfoData filled_in_request_data = request_data; | |
| 135 | |
| 136 if (URLRequestRequiresUniversalAccess(filled_in_request_data) && | |
| 137 !has_universal_access_) { | |
| 138 Log(PP_LOGLEVEL_ERROR, "PPB_URLLoader.Open: The URL you're requesting is " | |
| 139 " on a different security origin than your plugin. To request " | |
| 140 " cross-origin resources, see " | |
| 141 " PP_URLREQUESTPROPERTY_ALLOWCROSSORIGINREQUESTS."); | |
| 142 return PP_ERROR_NOACCESS; | |
| 143 } | |
| 144 | |
| 145 if (loader_.get()) | |
| 146 return PP_ERROR_INPROGRESS; | |
| 147 | |
| 148 WebFrame* frame = GetFrameForResource(this); | |
| 149 if (!frame) | |
| 150 return PP_ERROR_FAILED; | |
| 151 WebURLRequest web_request; | |
| 152 if (!CreateWebURLRequest(&filled_in_request_data, frame, &web_request)) | |
| 153 return PP_ERROR_FAILED; | |
| 154 web_request.setRequestorProcessID(requestor_pid); | |
| 155 | |
| 156 // Save a copy of the request info so the plugin can continue to use and | |
| 157 // change it while we're doing the request without affecting us. We must do | |
| 158 // this after CreateWebURLRequest since that fills out the file refs. | |
| 159 request_data_ = filled_in_request_data; | |
| 160 | |
| 161 WebURLLoaderOptions options; | |
| 162 if (has_universal_access_) { | |
| 163 options.allowCredentials = true; | |
| 164 options.crossOriginRequestPolicy = | |
| 165 WebURLLoaderOptions::CrossOriginRequestPolicyAllow; | |
| 166 } else { | |
| 167 // All other HTTP requests are untrusted. | |
| 168 options.untrustedHTTP = true; | |
| 169 if (request_data_.allow_cross_origin_requests) { | |
| 170 // Allow cross-origin requests with access control. The request specifies | |
| 171 // if credentials are to be sent. | |
| 172 options.allowCredentials = request_data_.allow_credentials; | |
| 173 options.crossOriginRequestPolicy = | |
| 174 WebURLLoaderOptions::CrossOriginRequestPolicyUseAccessControl; | |
| 175 } else { | |
| 176 // Same-origin requests can always send credentials. | |
| 177 options.allowCredentials = true; | |
| 178 } | |
| 179 } | |
| 180 | |
| 181 is_asynchronous_load_suspended_ = false; | |
| 182 loader_.reset(frame->createAssociatedURLLoader(options)); | |
| 183 if (!loader_.get()) | |
| 184 return PP_ERROR_FAILED; | |
| 185 | |
| 186 loader_->loadAsynchronously(web_request, this); | |
| 187 | |
| 188 // Notify completion when we receive a redirect or response headers. | |
| 189 RegisterCallback(callback); | |
| 190 return PP_OK_COMPLETIONPENDING; | |
| 191 } | |
| 192 | |
| 193 int32_t PPB_URLLoader_Impl::FollowRedirect( | |
| 194 scoped_refptr<TrackedCallback> callback) { | |
| 195 int32_t rv = ValidateCallback(callback); | |
| 196 if (rv != PP_OK) | |
| 197 return rv; | |
| 198 | |
| 199 SetDefersLoading(false); // Allow the redirect to continue. | |
| 200 RegisterCallback(callback); | |
| 201 return PP_OK_COMPLETIONPENDING; | |
| 202 } | |
| 203 | |
| 204 PP_Bool PPB_URLLoader_Impl::GetUploadProgress(int64_t* bytes_sent, | |
| 205 int64_t* total_bytes_to_be_sent) { | |
| 206 if (!RecordUploadProgress()) { | |
| 207 *bytes_sent = 0; | |
| 208 *total_bytes_to_be_sent = 0; | |
| 209 return PP_FALSE; | |
| 210 } | |
| 211 *bytes_sent = bytes_sent_; | |
| 212 *total_bytes_to_be_sent = total_bytes_to_be_sent_; | |
| 213 return PP_TRUE; | |
| 214 } | |
| 215 | |
| 216 PP_Bool PPB_URLLoader_Impl::GetDownloadProgress( | |
| 217 int64_t* bytes_received, | |
| 218 int64_t* total_bytes_to_be_received) { | |
| 219 if (!RecordDownloadProgress()) { | |
| 220 *bytes_received = 0; | |
| 221 *total_bytes_to_be_received = 0; | |
| 222 return PP_FALSE; | |
| 223 } | |
| 224 *bytes_received = bytes_received_; | |
| 225 *total_bytes_to_be_received = total_bytes_to_be_received_; | |
| 226 return PP_TRUE; | |
| 227 } | |
| 228 | |
| 229 PP_Resource PPB_URLLoader_Impl::GetResponseInfo() { | |
| 230 ::ppapi::thunk::EnterResourceCreationNoLock enter(pp_instance()); | |
| 231 if (enter.failed() || !response_info_.get()) | |
| 232 return 0; | |
| 233 | |
| 234 // Since we're the "host" the process-local resource for the file ref is | |
| 235 // the same as the host resource. We pass a ref to the file ref. | |
| 236 if (!response_info_->body_as_file_ref.resource.is_null()) { | |
| 237 ::ppapi::PpapiGlobals::Get()->GetResourceTracker()->AddRefResource( | |
| 238 response_info_->body_as_file_ref.resource.host_resource()); | |
| 239 } | |
| 240 return enter.functions()->CreateURLResponseInfo( | |
| 241 pp_instance(), | |
| 242 *response_info_, | |
| 243 response_info_->body_as_file_ref.resource.host_resource()); | |
| 244 } | |
| 245 | |
| 246 int32_t PPB_URLLoader_Impl::ReadResponseBody( | |
| 247 void* buffer, | |
| 248 int32_t bytes_to_read, | |
| 249 scoped_refptr<TrackedCallback> callback) { | |
| 250 int32_t rv = ValidateCallback(callback); | |
| 251 if (rv != PP_OK) | |
| 252 return rv; | |
| 253 if (!response_info_.get() || | |
| 254 !response_info_->body_as_file_ref.resource.is_null()) | |
| 255 return PP_ERROR_FAILED; | |
| 256 if (bytes_to_read <= 0 || !buffer) | |
| 257 return PP_ERROR_BADARGUMENT; | |
| 258 | |
| 259 user_buffer_ = static_cast<char*>(buffer); | |
| 260 user_buffer_size_ = bytes_to_read; | |
| 261 | |
| 262 if (!buffer_.empty()) | |
| 263 return FillUserBuffer(); | |
| 264 | |
| 265 // We may have already reached EOF. | |
| 266 if (done_status_ != PP_OK_COMPLETIONPENDING) { | |
| 267 user_buffer_ = NULL; | |
| 268 user_buffer_size_ = 0; | |
| 269 return done_status_; | |
| 270 } | |
| 271 | |
| 272 RegisterCallback(callback); | |
| 273 return PP_OK_COMPLETIONPENDING; | |
| 274 } | |
| 275 | |
| 276 int32_t PPB_URLLoader_Impl::FinishStreamingToFile( | |
| 277 scoped_refptr<TrackedCallback> callback) { | |
| 278 int32_t rv = ValidateCallback(callback); | |
| 279 if (rv != PP_OK) | |
| 280 return rv; | |
| 281 if (!response_info_.get() || | |
| 282 response_info_->body_as_file_ref.resource.is_null()) | |
| 283 return PP_ERROR_FAILED; | |
| 284 | |
| 285 // We may have already reached EOF. | |
| 286 if (done_status_ != PP_OK_COMPLETIONPENDING) | |
| 287 return done_status_; | |
| 288 | |
| 289 is_streaming_to_file_ = true; | |
| 290 if (is_asynchronous_load_suspended_) | |
| 291 SetDefersLoading(false); | |
| 292 | |
| 293 // Wait for didFinishLoading / didFail. | |
| 294 RegisterCallback(callback); | |
| 295 return PP_OK_COMPLETIONPENDING; | |
| 296 } | |
| 297 | |
| 298 void PPB_URLLoader_Impl::Close() { | |
| 299 if (loader_.get()) | |
| 300 loader_->cancel(); | |
| 301 else if (main_document_loader_) | |
| 302 GetFrameForResource(this)->stopLoading(); | |
| 303 // TODO(viettrungluu): Check what happens to the callback (probably the | |
| 304 // wrong thing). May need to post abort here. crbug.com/69457 | |
| 305 } | |
| 306 | |
| 307 void PPB_URLLoader_Impl::GrantUniversalAccess() { | |
| 308 has_universal_access_ = true; | |
| 309 } | |
| 310 | |
| 311 void PPB_URLLoader_Impl::SetStatusCallback( | |
| 312 PP_URLLoaderTrusted_StatusCallback cb) { | |
| 313 status_callback_ = cb; | |
| 314 } | |
| 315 | |
| 316 bool PPB_URLLoader_Impl::GetResponseInfoData( | |
| 317 ::ppapi::URLResponseInfoData* data) { | |
| 318 if (!response_info_.get()) | |
| 319 return false; | |
| 320 | |
| 321 *data = *response_info_; | |
| 322 | |
| 323 // We transfer one plugin reference to the FileRef to the caller. | |
| 324 if (!response_info_->body_as_file_ref.resource.is_null()) { | |
| 325 ::ppapi::PpapiGlobals::Get()->GetResourceTracker()->AddRefResource( | |
| 326 response_info_->body_as_file_ref.resource.host_resource()); | |
| 327 } | |
| 328 return true; | |
| 329 } | |
| 330 | |
| 331 void PPB_URLLoader_Impl::willSendRequest( | |
| 332 WebURLLoader* loader, | |
| 333 WebURLRequest& new_request, | |
| 334 const WebURLResponse& redirect_response) { | |
| 335 if (!request_data_.follow_redirects) { | |
| 336 SaveResponse(redirect_response); | |
| 337 SetDefersLoading(true); | |
| 338 RunCallback(PP_OK); | |
| 339 } | |
| 340 } | |
| 341 | |
| 342 void PPB_URLLoader_Impl::didSendData( | |
| 343 WebURLLoader* loader, | |
| 344 unsigned long long bytes_sent, | |
| 345 unsigned long long total_bytes_to_be_sent) { | |
| 346 // TODO(darin): Bounds check input? | |
| 347 bytes_sent_ = static_cast<int64_t>(bytes_sent); | |
| 348 total_bytes_to_be_sent_ = static_cast<int64_t>(total_bytes_to_be_sent); | |
| 349 UpdateStatus(); | |
| 350 } | |
| 351 | |
| 352 void PPB_URLLoader_Impl::didReceiveResponse(WebURLLoader* loader, | |
| 353 const WebURLResponse& response) { | |
| 354 SaveResponse(response); | |
| 355 | |
| 356 // Sets -1 if the content length is unknown. | |
| 357 total_bytes_to_be_received_ = response.expectedContentLength(); | |
| 358 UpdateStatus(); | |
| 359 | |
| 360 RunCallback(PP_OK); | |
| 361 } | |
| 362 | |
| 363 void PPB_URLLoader_Impl::didDownloadData(WebURLLoader* loader, | |
| 364 int data_length) { | |
| 365 bytes_received_ += data_length; | |
| 366 UpdateStatus(); | |
| 367 } | |
| 368 | |
| 369 void PPB_URLLoader_Impl::didReceiveData(WebURLLoader* loader, | |
| 370 const char* data, | |
| 371 int data_length, | |
| 372 int encoded_data_length) { | |
| 373 // Note that |loader| will be NULL for document loads. | |
| 374 bytes_received_ += data_length; | |
| 375 UpdateStatus(); | |
| 376 | |
| 377 buffer_.insert(buffer_.end(), data, data + data_length); | |
| 378 | |
| 379 // To avoid letting the network stack download an entire stream all at once, | |
| 380 // defer loading when we have enough buffer. | |
| 381 // Check for this before we run the callback, even though that could move | |
| 382 // data out of the buffer. Doing anything after the callback is unsafe. | |
| 383 DCHECK(request_data_.prefetch_buffer_lower_threshold < | |
| 384 request_data_.prefetch_buffer_upper_threshold); | |
| 385 if (!is_streaming_to_file_ && | |
| 386 !is_asynchronous_load_suspended_ && | |
| 387 (buffer_.size() >= static_cast<size_t>( | |
| 388 request_data_.prefetch_buffer_upper_threshold))) { | |
| 389 DVLOG(1) << "Suspending async load - buffer size: " << buffer_.size(); | |
| 390 SetDefersLoading(true); | |
| 391 } | |
| 392 | |
| 393 if (user_buffer_) { | |
| 394 RunCallback(FillUserBuffer()); | |
| 395 } else { | |
| 396 DCHECK(!TrackedCallback::IsPending(pending_callback_)); | |
| 397 } | |
| 398 } | |
| 399 | |
| 400 void PPB_URLLoader_Impl::didFinishLoading(WebURLLoader* loader, | |
| 401 double finish_time) { | |
| 402 FinishLoading(PP_OK); | |
| 403 } | |
| 404 | |
| 405 void PPB_URLLoader_Impl::didFail(WebURLLoader* loader, | |
| 406 const WebURLError& error) { | |
| 407 int32_t pp_error = PP_ERROR_FAILED; | |
| 408 if (error.domain.equals(WebString::fromUTF8(net::kErrorDomain))) { | |
| 409 // TODO(bbudge): Extend pp_errors.h to cover interesting network errors | |
| 410 // from the net error domain. | |
| 411 switch (error.reason) { | |
| 412 case net::ERR_ABORTED: | |
| 413 pp_error = PP_ERROR_ABORTED; | |
| 414 break; | |
| 415 case net::ERR_ACCESS_DENIED: | |
| 416 case net::ERR_NETWORK_ACCESS_DENIED: | |
| 417 pp_error = PP_ERROR_NOACCESS; | |
| 418 break; | |
| 419 } | |
| 420 } else { | |
| 421 // It's a WebKit error. | |
| 422 pp_error = PP_ERROR_NOACCESS; | |
| 423 } | |
| 424 | |
| 425 FinishLoading(pp_error); | |
| 426 } | |
| 427 | |
| 428 void PPB_URLLoader_Impl::SetDefersLoading(bool defers_loading) { | |
| 429 if (loader_.get()) { | |
| 430 loader_->setDefersLoading(defers_loading); | |
| 431 is_asynchronous_load_suspended_ = defers_loading; | |
| 432 } | |
| 433 | |
| 434 // TODO(brettw) bug 96770: We need a way to set the defers loading flag on | |
| 435 // main document loads (when the loader_ is null). | |
| 436 } | |
| 437 | |
| 438 void PPB_URLLoader_Impl::FinishLoading(int32_t done_status) { | |
| 439 done_status_ = done_status; | |
| 440 user_buffer_ = NULL; | |
| 441 user_buffer_size_ = 0; | |
| 442 // If the client hasn't called any function that takes a callback since | |
| 443 // the initial call to Open, or called ReadResponseBody and got a | |
| 444 // synchronous return, then the callback will be NULL. | |
| 445 if (TrackedCallback::IsPending(pending_callback_)) | |
| 446 RunCallback(done_status_); | |
| 447 } | |
| 448 | |
| 449 int32_t PPB_URLLoader_Impl::ValidateCallback( | |
| 450 scoped_refptr<TrackedCallback> callback) { | |
| 451 DCHECK(callback); | |
| 452 | |
| 453 if (TrackedCallback::IsPending(pending_callback_)) | |
| 454 return PP_ERROR_INPROGRESS; | |
| 455 | |
| 456 return PP_OK; | |
| 457 } | |
| 458 | |
| 459 void PPB_URLLoader_Impl::RegisterCallback( | |
| 460 scoped_refptr<TrackedCallback> callback) { | |
| 461 DCHECK(!TrackedCallback::IsPending(pending_callback_)); | |
| 462 | |
| 463 PluginModule* plugin_module = ResourceHelper::GetPluginModule(this); | |
| 464 if (!plugin_module) | |
| 465 return; | |
| 466 | |
| 467 pending_callback_ = callback; | |
| 468 } | |
| 469 | |
| 470 void PPB_URLLoader_Impl::RunCallback(int32_t result) { | |
| 471 // This may be null only when this is a main document loader. | |
| 472 if (!pending_callback_.get()) { | |
| 473 CHECK(main_document_loader_); | |
| 474 return; | |
| 475 } | |
| 476 | |
| 477 // If |user_buffer_| was set as part of registering a callback, the paths | |
| 478 // which trigger that callack must have cleared it since the callback is now | |
| 479 // free to delete it. | |
| 480 DCHECK(!user_buffer_); | |
| 481 | |
| 482 // As a second line of defense, clear the |user_buffer_| in case the | |
| 483 // callbacks get called in an unexpected order. | |
| 484 user_buffer_ = NULL; | |
| 485 user_buffer_size_ = 0; | |
| 486 pending_callback_->Run(result); | |
| 487 } | |
| 488 | |
| 489 size_t PPB_URLLoader_Impl::FillUserBuffer() { | |
| 490 DCHECK(user_buffer_); | |
| 491 DCHECK(user_buffer_size_); | |
| 492 | |
| 493 size_t bytes_to_copy = std::min(buffer_.size(), user_buffer_size_); | |
| 494 std::copy(buffer_.begin(), buffer_.begin() + bytes_to_copy, user_buffer_); | |
| 495 buffer_.erase(buffer_.begin(), buffer_.begin() + bytes_to_copy); | |
| 496 | |
| 497 // If the buffer is getting too empty, resume asynchronous loading. | |
| 498 if (is_asynchronous_load_suspended_ && | |
| 499 buffer_.size() <= static_cast<size_t>( | |
| 500 request_data_.prefetch_buffer_lower_threshold)) { | |
| 501 DVLOG(1) << "Resuming async load - buffer size: " << buffer_.size(); | |
| 502 SetDefersLoading(false); | |
| 503 } | |
| 504 | |
| 505 // Reset for next time. | |
| 506 user_buffer_ = NULL; | |
| 507 user_buffer_size_ = 0; | |
| 508 return bytes_to_copy; | |
| 509 } | |
| 510 | |
| 511 void PPB_URLLoader_Impl::SaveResponse(const WebURLResponse& response) { | |
| 512 // DataFromWebURLResponse returns a file ref with one reference to it, which | |
| 513 // we take over via our ScopedPPResource. | |
| 514 response_info_.reset(new ::ppapi::URLResponseInfoData( | |
| 515 DataFromWebURLResponse(pp_instance(), response))); | |
| 516 response_info_file_ref_ = ::ppapi::ScopedPPResource( | |
| 517 ::ppapi::ScopedPPResource::PassRef(), | |
| 518 response_info_->body_as_file_ref.resource.host_resource()); | |
| 519 } | |
| 520 | |
| 521 void PPB_URLLoader_Impl::UpdateStatus() { | |
| 522 if (status_callback_ && | |
| 523 (RecordDownloadProgress() || RecordUploadProgress())) { | |
| 524 // Here we go through some effort to only send the exact information that | |
| 525 // the requestor wanted in the request flags. It would be just as | |
| 526 // efficient to send all of it, but we don't want people to rely on | |
| 527 // getting download progress when they happen to set the upload progress | |
| 528 // flag. | |
| 529 status_callback_( | |
| 530 pp_instance(), pp_resource(), | |
| 531 RecordUploadProgress() ? bytes_sent_ : -1, | |
| 532 RecordUploadProgress() ? total_bytes_to_be_sent_ : -1, | |
| 533 RecordDownloadProgress() ? bytes_received_ : -1, | |
| 534 RecordDownloadProgress() ? total_bytes_to_be_received_ : -1); | |
| 535 } | |
| 536 } | |
| 537 | |
| 538 bool PPB_URLLoader_Impl::RecordDownloadProgress() const { | |
| 539 return request_data_.record_download_progress; | |
| 540 } | |
| 541 | |
| 542 bool PPB_URLLoader_Impl::RecordUploadProgress() const { | |
| 543 return request_data_.record_upload_progress; | |
| 544 } | |
| 545 | |
| 546 } // namespace ppapi | |
| 547 } // namespace webkit | |
| OLD | NEW |