OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "media/blink/resource_multibuffer_data_provider.h" | |
6 | |
7 #include "base/bind.h" | |
8 #include "base/bits.h" | |
9 #include "base/callback_helpers.h" | |
10 #include "base/message_loop/message_loop.h" | |
11 #include "base/metrics/histogram.h" | |
12 #include "base/strings/string_number_conversions.h" | |
13 #include "media/blink/active_loader.h" | |
14 #include "media/blink/cache_util.h" | |
15 #include "media/blink/media_blink_export.h" | |
16 #include "media/blink/resource_multibuffer.h" | |
17 #include "net/http/http_byte_range.h" | |
18 #include "net/http/http_request_headers.h" | |
19 #include "third_party/WebKit/public/platform/WebURLError.h" | |
20 #include "third_party/WebKit/public/platform/WebURLResponse.h" | |
21 | |
22 using blink::WebFrame; | |
23 using blink::WebString; | |
24 using blink::WebURLError; | |
25 using blink::WebURLLoader; | |
26 using blink::WebURLLoaderOptions; | |
27 using blink::WebURLRequest; | |
28 using blink::WebURLResponse; | |
29 | |
30 namespace media { | |
31 | |
32 // The number of milliseconds to wait before retrying a failed load. | |
33 const int kLoaderFailedRetryDelayMs = 250; | |
34 | |
35 static const int kHttpOK = 200; | |
36 static const int kHttpPartialContent = 206; | |
37 static const int kMaxRetries = 3; | |
38 | |
39 ResourceMultiBufferDataProvider::ResourceMultiBufferDataProvider( | |
40 const MultiBufferBlockId& pos, | |
41 ResourceMultiBuffer* resource_multibuffer) | |
42 : pos_(pos), | |
43 resource_multibuffer_(resource_multibuffer), | |
44 retries_(0), | |
45 weak_factory_(this) { | |
46 url_data_ = pos_.url_data(); | |
47 DCHECK(url_data_) << " pos = " << pos; | |
48 DCHECK_GE(pos.block_num(), 0); | |
49 original_url_data_ = url_data_; | |
50 } | |
51 | |
52 void ResourceMultiBufferDataProvider::Start() { | |
53 // In the case of a re-start, throw away any half-finished blocks. | |
54 fifo_.clear(); | |
55 // Prepare the request. | |
56 WebURLRequest request(url_data_->url()); | |
57 // TODO(mkwst): Split this into video/audio. | |
58 request.setRequestContext(WebURLRequest::RequestContextVideo); | |
59 | |
60 request.setHTTPHeaderField( | |
61 WebString::fromUTF8(net::HttpRequestHeaders::kRange), | |
62 WebString::fromUTF8( | |
63 net::HttpByteRange::RightUnbounded(byte_pos()).GetHeaderValue())); | |
64 | |
65 resource_multibuffer_->frame_->setReferrerForRequest(request, | |
liberato (no reviews please)
2015/11/05 19:03:18
frame_ => frame() (and elsewhere)?
hubbe
2015/11/13 22:56:52
Done.
| |
66 blink::WebURL()); | |
67 | |
68 // Disable compression, compression for audio/video doesn't make sense... | |
69 request.setHTTPHeaderField( | |
70 WebString::fromUTF8(net::HttpRequestHeaders::kAcceptEncoding), | |
71 WebString::fromUTF8("identity;q=1, *;q=0")); | |
72 | |
73 WebURLLoaderOptions options; | |
74 if (url_data_->cors_mode() == UrlData::kUnspecified) { | |
75 options.allowCredentials = true; | |
76 options.crossOriginRequestPolicy = | |
77 WebURLLoaderOptions::CrossOriginRequestPolicyAllow; | |
78 } else { | |
79 options.exposeAllResponseHeaders = true; | |
80 // The author header set is empty, no preflight should go ahead. | |
81 options.preflightPolicy = WebURLLoaderOptions::PreventPreflight; | |
82 options.crossOriginRequestPolicy = | |
83 WebURLLoaderOptions::CrossOriginRequestPolicyUseAccessControl; | |
84 if (url_data_->cors_mode() == UrlData::kUseCredentials) | |
85 options.allowCredentials = true; | |
86 } | |
87 scoped_ptr<WebURLLoader> loader( | |
88 resource_multibuffer_->frame_->createAssociatedURLLoader(options)); | |
89 | |
90 // Start the resource loading. | |
91 loader->loadAsynchronously(request, this); | |
92 active_loader_.reset(new ActiveLoader(loader.Pass())); | |
93 } | |
94 | |
95 ResourceMultiBufferDataProvider::~ResourceMultiBufferDataProvider() {} | |
96 | |
97 ///////////////////////////////////////////////////////////////////////////// | |
98 // MultiBufferDataProvider implementation. | |
99 MultiBufferBlockId ResourceMultiBufferDataProvider::Tell() const { | |
100 return pos_; | |
101 } | |
102 | |
103 bool ResourceMultiBufferDataProvider::Available() const { | |
104 if (fifo_.empty()) | |
105 return false; | |
106 if (fifo_.back()->end_of_stream()) | |
107 return true; | |
108 if (fifo_.front()->data_size() == block_size()) | |
109 return true; | |
110 return false; | |
111 } | |
112 | |
113 scoped_refptr<DataBuffer> ResourceMultiBufferDataProvider::Read() { | |
114 DCHECK(Available()); | |
115 scoped_refptr<DataBuffer> ret = fifo_.front(); | |
116 fifo_.pop_front(); | |
117 ++pos_; | |
118 return ret; | |
119 } | |
120 | |
121 void ResourceMultiBufferDataProvider::SetAvailableCallback( | |
122 const base::Closure& cb) { | |
123 DCHECK(!Available()); | |
124 cb_ = cb; | |
125 } | |
126 | |
127 void ResourceMultiBufferDataProvider::SetDeferred(bool deferred) { | |
128 if (active_loader_) { | |
129 if (active_loader_->deferred() != deferred) { | |
130 active_loader_->SetDeferred(deferred); | |
131 } | |
132 } | |
133 } | |
134 | |
135 ///////////////////////////////////////////////////////////////////////////// | |
136 // WebURLLoaderClient implementation. | |
137 | |
138 void ResourceMultiBufferDataProvider::willFollowRedirect( | |
139 WebURLLoader* loader, | |
140 WebURLRequest& newRequest, | |
141 const WebURLResponse& redirectResponse) { | |
142 GURL url(newRequest.url()); | |
143 scoped_refptr<UrlData> new_url_data = | |
144 resource_multibuffer_->url_index()->GetByUrl(url, url_data_->cors_mode()); | |
145 new_url_data->Use(); | |
146 redirected_url_data_ = url_data_; | |
147 url_data_ = new_url_data; | |
148 | |
149 redirected_url_data_->set_valid_until( | |
150 GetMemoryCacheValidUntil(redirectResponse)); | |
151 } | |
152 | |
153 void ResourceMultiBufferDataProvider::didSendData( | |
154 WebURLLoader* loader, | |
155 unsigned long long bytes_sent, | |
156 unsigned long long total_bytes_to_be_sent) { | |
157 NOTIMPLEMENTED(); | |
158 } | |
159 | |
160 void ResourceMultiBufferDataProvider::didReceiveResponse( | |
161 WebURLLoader* loader, | |
162 const WebURLResponse& response) { | |
163 DVLOG(1) << "didReceiveResponse: HTTP/" | |
164 << (response.httpVersion() == WebURLResponse::HTTP_0_9 | |
165 ? "0.9" | |
166 : response.httpVersion() == WebURLResponse::HTTP_1_0 | |
167 ? "1.0" | |
168 : response.httpVersion() == WebURLResponse::HTTP_1_1 | |
169 ? "1.1" | |
170 : "Unknown") | |
171 << " " << response.httpStatusCode(); | |
172 DCHECK(active_loader_); | |
173 | |
174 // This test is vital for security! | |
175 if (original_url_data_->cors_mode() == UrlData::kUnspecified) { | |
176 // Unless we already passed a CORS check, make sure that | |
177 // we're on the same origin. | |
178 if (original_url_data_->url().GetOrigin() != url_data_->url().GetOrigin()) { | |
179 resource_multibuffer_->Fail(url_data_); | |
180 return; | |
181 } | |
182 } | |
183 | |
184 base::Time last_modified; | |
185 if (base::Time::FromString( | |
186 response.httpHeaderField("Last-Modified").utf8().data(), | |
187 &last_modified)) { | |
188 scoped_refptr<UrlData> new_url_data = | |
189 url_data_->set_last_modified(last_modified); | |
190 new_url_data->Use(); | |
191 if (new_url_data != url_data_) { | |
192 // Not technically a redirect, but we found a better URLData. | |
193 resource_multibuffer_->OnRedirect(url_data_, new_url_data); | |
194 url_data_ = new_url_data; | |
195 } | |
196 } | |
197 | |
198 url_data_->set_valid_until(GetMemoryCacheValidUntil(response)); | |
199 | |
200 if (redirected_url_data_) { | |
201 redirected_url_data_->set_redirects_to(url_data_->url()); | |
202 resource_multibuffer_->OnRedirect(redirected_url_data_, url_data_); | |
203 redirected_url_data_ = NULL; | |
204 | |
205 scoped_ptr<MultiBuffer::DataProvider> self( | |
206 resource_multibuffer_->RemoveProvider(this)); | |
207 pos_ = MultiBufferBlockId(url_data_, pos_.block_num()); | |
208 resource_multibuffer_->AddProvider(self.Pass()); | |
209 } | |
210 | |
211 uint32 reasons = GetReasonsForUncacheability(response); | |
212 url_data_->set_cacheable(reasons == 0); | |
213 UMA_HISTOGRAM_BOOLEAN("Media.CacheUseful", reasons == 0); | |
214 int shift = 0; | |
215 int max_enum = base::bits::Log2Ceiling(kMaxReason); | |
216 while (reasons) { | |
217 DCHECK_LT(shift, max_enum); // Sanity check. | |
218 if (reasons & 0x1) { | |
219 UMA_HISTOGRAM_ENUMERATION("Media.UncacheableReason", shift, | |
220 max_enum); // PRESUBMIT_IGNORE_UMA_MAX | |
221 } | |
222 | |
223 reasons >>= 1; | |
224 ++shift; | |
225 } | |
226 | |
227 // Expected content length can be |kPositionNotSpecified|, in that case | |
228 // |content_length_| is not specified and this is a streaming response. | |
229 int64 content_length = response.expectedContentLength(); | |
230 | |
231 // We make a strong assumption that when we reach here we have either | |
232 // received a response from HTTP/HTTPS protocol or the request was | |
233 // successful (in particular range request). So we only verify the partial | |
234 // response for HTTP and HTTPS protocol. | |
235 if (url_data_->url().SchemeIsHTTPOrHTTPS()) { | |
236 bool partial_response = (response.httpStatusCode() == kHttpPartialContent); | |
237 bool ok_response = (response.httpStatusCode() == kHttpOK); | |
238 | |
239 // Check to see whether the server supports byte ranges. | |
240 std::string accept_ranges = | |
241 response.httpHeaderField("Accept-Ranges").utf8(); | |
242 if (accept_ranges.find("bytes") != std::string::npos) | |
243 url_data_->set_range_supported(); | |
244 | |
245 // If we have verified the partial response and it is correct, we will | |
246 // return kOk. It's also possible for a server to support range requests | |
247 // without advertising "Accept-Ranges: bytes". | |
248 if (partial_response && VerifyPartialResponse(response)) { | |
249 url_data_->set_range_supported(); | |
250 } else if (ok_response && pos_.block_num() == 0) { | |
251 // We accept a 200 response for a Range:0- request, trusting the | |
252 // Accept-Ranges header, because Apache thinks that's a reasonable thing | |
253 // to return. | |
254 url_data_->set_length(content_length); | |
255 } else if (response.httpStatusCode() == 416) { | |
256 // Really, we should never request a range that doesn't exist, but | |
257 // if we do, let's handle it in a sane way. | |
258 // Unsatisfiable range | |
259 fifo_.push_back(DataBuffer::CreateEOSBuffer()); | |
260 cb_.Run(); | |
261 } else { | |
262 resource_multibuffer_->Fail(url_data_); | |
263 return; | |
264 } | |
265 } else { | |
266 if (content_length != kPositionNotSpecified) { | |
267 url_data_->set_length(content_length + byte_pos()); | |
268 } | |
269 } | |
270 } | |
271 | |
272 void ResourceMultiBufferDataProvider::didReceiveData(WebURLLoader* loader, | |
273 const char* data, | |
274 int data_length, | |
275 int encoded_data_length) { | |
276 DVLOG(1) << "didReceiveData: " << data_length << " bytes"; | |
277 DCHECK(!Available()); | |
278 DCHECK(active_loader_); | |
279 DCHECK_GT(data_length, 0); | |
280 | |
281 // When we receive data, we allow more retries. | |
282 retries_ = 0; | |
283 | |
284 while (data_length) { | |
285 if (fifo_.empty() || fifo_.back()->data_size() == block_size()) { | |
286 fifo_.push_back(new DataBuffer(block_size())); | |
287 fifo_.back()->set_data_size(0); | |
288 } | |
289 int to_append = | |
290 std::min<int>(data_length, block_size() - fifo_.back()->data_size()); | |
291 DCHECK_GT(to_append, 0); | |
292 memcpy(fifo_.back()->writable_data() + fifo_.back()->data_size(), data, | |
293 to_append); | |
294 data += to_append; | |
295 fifo_.back()->set_data_size(fifo_.back()->data_size() + to_append); | |
296 data_length -= to_append; | |
297 } | |
298 | |
299 if (Available()) | |
300 cb_.Run(); | |
301 | |
302 // Beware, this object might be deleted here. | |
303 } | |
304 | |
305 void ResourceMultiBufferDataProvider::didDownloadData(WebURLLoader* loader, | |
306 int dataLength, | |
307 int encoded_data_length) { | |
308 NOTIMPLEMENTED(); | |
309 } | |
310 | |
311 void ResourceMultiBufferDataProvider::didReceiveCachedMetadata( | |
312 WebURLLoader* loader, | |
313 const char* data, | |
314 int data_length) { | |
315 NOTIMPLEMENTED(); | |
316 } | |
317 | |
318 void ResourceMultiBufferDataProvider::didFinishLoading( | |
319 WebURLLoader* loader, | |
320 double finishTime, | |
321 int64_t total_encoded_data_length) { | |
322 DVLOG(1) << "didFinishLoading"; | |
323 DCHECK(active_loader_.get()); | |
324 DCHECK(!Available()); | |
325 | |
326 // We're done with the loader. | |
327 active_loader_.reset(); | |
328 | |
329 // If we didn't know the |instance_size_| we do now. | |
330 int64_t size = byte_pos(); | |
331 if (!fifo_.empty()) | |
332 size += fifo_.back()->data_size(); | |
333 | |
334 // This request reports something smaller than what we've seen in the past, | |
335 // Maybe it's transient error? | |
336 if (url_data_->length() != kPositionNotSpecified && | |
337 size < url_data_->length()) { | |
338 if (retries_ < kMaxRetries) { | |
339 fifo_.clear(); | |
340 retries_++; | |
341 base::MessageLoop::current()->PostDelayedTask( | |
342 FROM_HERE, base::Bind(&ResourceMultiBufferDataProvider::Start, | |
343 weak_factory_.GetWeakPtr()), | |
344 base::TimeDelta::FromMilliseconds(kLoaderFailedRetryDelayMs)); | |
345 return; | |
346 } else { | |
347 scoped_ptr<ActiveLoader> active_loader = active_loader_.Pass(); | |
348 resource_multibuffer_->Fail(url_data_); | |
349 return; | |
350 } | |
351 } | |
352 | |
353 url_data_->set_length(size); | |
354 fifo_.push_back(DataBuffer::CreateEOSBuffer()); | |
355 | |
356 DCHECK(Available()); | |
357 cb_.Run(); | |
358 | |
359 // Beware, this object might be deleted here. | |
360 } | |
361 | |
362 void ResourceMultiBufferDataProvider::didFail(WebURLLoader* loader, | |
363 const WebURLError& error) { | |
364 DVLOG(1) << "didFail: reason=" << error.reason | |
365 << ", isCancellation=" << error.isCancellation | |
366 << ", domain=" << error.domain.utf8().data() | |
367 << ", localizedDescription=" | |
368 << error.localizedDescription.utf8().data(); | |
369 DCHECK(active_loader_.get()); | |
370 | |
371 if (retries_ < kMaxRetries) { | |
372 retries_++; | |
373 base::MessageLoop::current()->PostDelayedTask( | |
374 FROM_HERE, base::Bind(&ResourceMultiBufferDataProvider::Start, | |
375 weak_factory_.GetWeakPtr()), | |
376 base::TimeDelta::FromMilliseconds(kLoaderFailedRetryDelayMs)); | |
377 } else { | |
378 // We don't need to continue loading after failure. | |
379 // | |
380 // Keep it alive until we exit this method so that |error| remains valid. | |
381 scoped_ptr<ActiveLoader> active_loader = active_loader_.Pass(); | |
382 resource_multibuffer_->Fail(url_data_); | |
383 } | |
384 } | |
385 | |
386 bool ResourceMultiBufferDataProvider::ParseContentRange( | |
387 const std::string& content_range_str, | |
388 int64* first_byte_position, | |
389 int64* last_byte_position, | |
390 int64* instance_size) { | |
391 const std::string kUpThroughBytesUnit = "bytes "; | |
392 if (content_range_str.find(kUpThroughBytesUnit) != 0) | |
393 return false; | |
394 std::string range_spec = | |
395 content_range_str.substr(kUpThroughBytesUnit.length()); | |
396 size_t dash_offset = range_spec.find("-"); | |
397 size_t slash_offset = range_spec.find("/"); | |
398 | |
399 if (dash_offset == std::string::npos || slash_offset == std::string::npos || | |
400 slash_offset < dash_offset || slash_offset + 1 == range_spec.length()) { | |
401 return false; | |
402 } | |
403 if (!base::StringToInt64(range_spec.substr(0, dash_offset), | |
404 first_byte_position) || | |
405 !base::StringToInt64( | |
406 range_spec.substr(dash_offset + 1, slash_offset - dash_offset - 1), | |
407 last_byte_position)) { | |
408 return false; | |
409 } | |
410 if (slash_offset == range_spec.length() - 2 && | |
411 range_spec[slash_offset + 1] == '*') { | |
412 *instance_size = kPositionNotSpecified; | |
413 } else { | |
414 if (!base::StringToInt64(range_spec.substr(slash_offset + 1), | |
415 instance_size)) { | |
416 return false; | |
417 } | |
418 } | |
419 if (*last_byte_position < *first_byte_position || | |
420 (*instance_size != kPositionNotSpecified && | |
421 *last_byte_position >= *instance_size)) { | |
422 return false; | |
423 } | |
424 | |
425 return true; | |
426 } | |
427 | |
428 int64_t ResourceMultiBufferDataProvider::byte_pos() const { | |
429 int64_t ret = pos_.block_num(); | |
430 return ret << resource_multibuffer_->block_size_shift(); | |
431 } | |
432 | |
433 int64_t ResourceMultiBufferDataProvider::block_size() const { | |
434 int64_t ret = 1; | |
435 return ret << resource_multibuffer_->block_size_shift(); | |
436 } | |
437 | |
438 bool ResourceMultiBufferDataProvider::VerifyPartialResponse( | |
439 const WebURLResponse& response) { | |
440 int64 first_byte_position, last_byte_position, instance_size; | |
441 if (!ParseContentRange(response.httpHeaderField("Content-Range").utf8(), | |
442 &first_byte_position, &last_byte_position, | |
443 &instance_size)) { | |
444 return false; | |
445 } | |
446 | |
447 if (url_data_->length() == kPositionNotSpecified) { | |
448 url_data_->set_length(instance_size); | |
449 } | |
450 | |
451 if (byte_pos() != first_byte_position) { | |
452 return false; | |
453 } | |
454 | |
455 return true; | |
456 } | |
457 | |
458 } // namespace media | |
OLD | NEW |