Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(557)

Side by Side Diff: storage/browser/fileapi/file_system_url_request_job.cc

Issue 1410643007: URLRequestJob: change ReadRawData contract (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Randy's comments Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "storage/browser/fileapi/file_system_url_request_job.h" 5 #include "storage/browser/fileapi/file_system_url_request_job.h"
6 6
7 #include <vector> 7 #include <vector>
8 8
9 #include "base/bind.h" 9 #include "base/bind.h"
10 #include "base/compiler_specific.h" 10 #include "base/compiler_specific.h"
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after
55 FileSystemURLRequestJob::FileSystemURLRequestJob( 55 FileSystemURLRequestJob::FileSystemURLRequestJob(
56 URLRequest* request, 56 URLRequest* request,
57 NetworkDelegate* network_delegate, 57 NetworkDelegate* network_delegate,
58 const std::string& storage_domain, 58 const std::string& storage_domain,
59 FileSystemContext* file_system_context) 59 FileSystemContext* file_system_context)
60 : URLRequestJob(request, network_delegate), 60 : URLRequestJob(request, network_delegate),
61 storage_domain_(storage_domain), 61 storage_domain_(storage_domain),
62 file_system_context_(file_system_context), 62 file_system_context_(file_system_context),
63 is_directory_(false), 63 is_directory_(false),
64 remaining_bytes_(0), 64 remaining_bytes_(0),
65 weak_factory_(this) { 65 range_parse_result_(net::OK),
66 } 66 weak_factory_(this) {}
67 67
68 FileSystemURLRequestJob::~FileSystemURLRequestJob() {} 68 FileSystemURLRequestJob::~FileSystemURLRequestJob() {}
69 69
70 void FileSystemURLRequestJob::Start() { 70 void FileSystemURLRequestJob::Start() {
71 base::MessageLoop::current()->PostTask( 71 base::MessageLoop::current()->PostTask(
72 FROM_HERE, 72 FROM_HERE,
73 base::Bind(&FileSystemURLRequestJob::StartAsync, 73 base::Bind(&FileSystemURLRequestJob::StartAsync,
74 weak_factory_.GetWeakPtr())); 74 weak_factory_.GetWeakPtr()));
75 } 75 }
76 76
77 void FileSystemURLRequestJob::Kill() { 77 void FileSystemURLRequestJob::Kill() {
78 reader_.reset(); 78 reader_.reset();
79 URLRequestJob::Kill(); 79 URLRequestJob::Kill();
80 weak_factory_.InvalidateWeakPtrs(); 80 weak_factory_.InvalidateWeakPtrs();
81 } 81 }
82 82
83 bool FileSystemURLRequestJob::ReadRawData(net::IOBuffer* dest, 83 int FileSystemURLRequestJob::ReadRawData(net::IOBuffer* dest, int dest_size) {
84 int dest_size,
85 int* bytes_read) {
86 DCHECK_NE(dest_size, 0); 84 DCHECK_NE(dest_size, 0);
87 DCHECK(bytes_read);
88 DCHECK_GE(remaining_bytes_, 0); 85 DCHECK_GE(remaining_bytes_, 0);
89 86
90 if (reader_.get() == NULL) 87 if (reader_.get() == NULL)
91 return false; 88 return net::ERR_FAILED;
92 89
93 if (remaining_bytes_ < dest_size) 90 if (remaining_bytes_ < dest_size)
94 dest_size = static_cast<int>(remaining_bytes_); 91 dest_size = remaining_bytes_;
95 92
96 if (!dest_size) { 93 if (!dest_size)
97 *bytes_read = 0; 94 return 0;
98 return true;
99 }
100 95
101 const int rv = reader_->Read(dest, dest_size, 96 const int rv = reader_->Read(dest, dest_size,
102 base::Bind(&FileSystemURLRequestJob::DidRead, 97 base::Bind(&FileSystemURLRequestJob::DidRead,
103 weak_factory_.GetWeakPtr())); 98 weak_factory_.GetWeakPtr()));
104 if (rv >= 0) { 99 if (rv >= 0) {
105 // Data is immediately available.
106 *bytes_read = rv;
107 remaining_bytes_ -= rv; 100 remaining_bytes_ -= rv;
108 DCHECK_GE(remaining_bytes_, 0); 101 DCHECK_GE(remaining_bytes_, 0);
109 return true;
110 } 102 }
111 if (rv == net::ERR_IO_PENDING) 103
112 SetStatus(URLRequestStatus(URLRequestStatus::IO_PENDING, 0)); 104 return rv;
113 else
114 NotifyFailed(rv);
115 return false;
116 } 105 }
117 106
118 bool FileSystemURLRequestJob::GetMimeType(std::string* mime_type) const { 107 bool FileSystemURLRequestJob::GetMimeType(std::string* mime_type) const {
119 DCHECK(request_); 108 DCHECK(request_);
120 DCHECK(url_.is_valid()); 109 DCHECK(url_.is_valid());
121 base::FilePath::StringType extension = url_.path().Extension(); 110 base::FilePath::StringType extension = url_.path().Extension();
122 if (!extension.empty()) 111 if (!extension.empty())
123 extension = extension.substr(1); 112 extension = extension.substr(1);
124 return net::GetWellKnownMimeTypeFromExtension(extension, mime_type); 113 return net::GetWellKnownMimeTypeFromExtension(extension, mime_type);
125 } 114 }
126 115
116 // Extracts headers that this job cares about from the supplied request headers.
117 // Currently this job only cares about the Range header. Note that validation is
118 // deferred to DidGetMetaData(), because NotifyStartError is not legal to call
119 // since the job has not started.
mmenke 2015/10/27 19:41:08 See my other comment about a similar comment.
xunjieli 2015/10/27 21:24:07 Done.
127 void FileSystemURLRequestJob::SetExtraRequestHeaders( 120 void FileSystemURLRequestJob::SetExtraRequestHeaders(
128 const net::HttpRequestHeaders& headers) { 121 const net::HttpRequestHeaders& headers) {
129 std::string range_header; 122 std::string range_header;
130 if (headers.GetHeader(net::HttpRequestHeaders::kRange, &range_header)) { 123 if (headers.GetHeader(net::HttpRequestHeaders::kRange, &range_header)) {
131 std::vector<net::HttpByteRange> ranges; 124 std::vector<net::HttpByteRange> ranges;
125
132 if (net::HttpUtil::ParseRangeHeader(range_header, &ranges)) { 126 if (net::HttpUtil::ParseRangeHeader(range_header, &ranges)) {
133 if (ranges.size() == 1) { 127 if (ranges.size() == 1) {
134 byte_range_ = ranges[0]; 128 byte_range_ = ranges[0];
135 } else { 129 } else {
136 // We don't support multiple range requests in one single URL request. 130 // We don't support multiple range requests in one single URL request.
131 // Saves the failure which will be reported in DidGetMetaData.
137 // TODO(adamk): decide whether we want to support multiple range 132 // TODO(adamk): decide whether we want to support multiple range
138 // requests. 133 // requests.
139 NotifyFailed(net::ERR_REQUEST_RANGE_NOT_SATISFIABLE); 134 range_parse_result_ = net::ERR_REQUEST_RANGE_NOT_SATISFIABLE;
140 } 135 }
141 } 136 }
142 } 137 }
143 } 138 }
144 139
145 void FileSystemURLRequestJob::GetResponseInfo(net::HttpResponseInfo* info) { 140 void FileSystemURLRequestJob::GetResponseInfo(net::HttpResponseInfo* info) {
146 if (response_info_) 141 if (response_info_)
147 *info = *response_info_; 142 *info = *response_info_;
148 } 143 }
149 144
(...skipping 11 matching lines...) Expand all
161 if (!url_.is_valid()) { 156 if (!url_.is_valid()) {
162 file_system_context_->AttemptAutoMountForURLRequest( 157 file_system_context_->AttemptAutoMountForURLRequest(
163 request_, 158 request_,
164 storage_domain_, 159 storage_domain_,
165 base::Bind(&FileSystemURLRequestJob::DidAttemptAutoMount, 160 base::Bind(&FileSystemURLRequestJob::DidAttemptAutoMount,
166 weak_factory_.GetWeakPtr())); 161 weak_factory_.GetWeakPtr()));
167 return; 162 return;
168 } 163 }
169 if (!file_system_context_->CanServeURLRequest(url_)) { 164 if (!file_system_context_->CanServeURLRequest(url_)) {
170 // In incognito mode the API is not usable and there should be no data. 165 // In incognito mode the API is not usable and there should be no data.
171 NotifyFailed(net::ERR_FILE_NOT_FOUND); 166 NotifyStartError(URLRequestStatus::FromError(net::ERR_FILE_NOT_FOUND));
172 return; 167 return;
173 } 168 }
174 file_system_context_->operation_runner()->GetMetadata( 169 file_system_context_->operation_runner()->GetMetadata(
175 url_, 170 url_,
176 base::Bind(&FileSystemURLRequestJob::DidGetMetadata, 171 base::Bind(&FileSystemURLRequestJob::DidGetMetadata,
177 weak_factory_.GetWeakPtr())); 172 weak_factory_.GetWeakPtr()));
178 } 173 }
179 174
180 void FileSystemURLRequestJob::DidAttemptAutoMount(base::File::Error result) { 175 void FileSystemURLRequestJob::DidAttemptAutoMount(base::File::Error result) {
181 if (result >= 0 && 176 if (result >= 0 &&
182 file_system_context_->CrackURL(request_->url()).is_valid()) { 177 file_system_context_->CrackURL(request_->url()).is_valid()) {
183 StartAsync(); 178 StartAsync();
184 } else { 179 } else {
185 NotifyFailed(net::ERR_FILE_NOT_FOUND); 180 NotifyStartError(URLRequestStatus::FromError(net::ERR_FILE_NOT_FOUND));
186 } 181 }
187 } 182 }
188 183
189 void FileSystemURLRequestJob::DidGetMetadata( 184 void FileSystemURLRequestJob::DidGetMetadata(
190 base::File::Error error_code, 185 base::File::Error error_code,
191 const base::File::Info& file_info) { 186 const base::File::Info& file_info) {
192 if (error_code != base::File::FILE_OK) { 187 if (error_code != base::File::FILE_OK) {
193 NotifyFailed(error_code == base::File::FILE_ERROR_INVALID_URL ? 188 NotifyStartError(URLRequestStatus::FromError(
194 net::ERR_INVALID_URL : net::ERR_FILE_NOT_FOUND); 189 error_code == base::File::FILE_ERROR_INVALID_URL
190 ? net::ERR_INVALID_URL
191 : net::ERR_FILE_NOT_FOUND));
195 return; 192 return;
196 } 193 }
197 194
198 // We may have been orphaned... 195 // We may have been orphaned...
199 if (!request_) 196 if (!request_)
200 return; 197 return;
201 198
202 is_directory_ = file_info.is_directory; 199 is_directory_ = file_info.is_directory;
203 200
204 if (!byte_range_.ComputeBounds(file_info.size)) { 201 if (range_parse_result_ != net::OK) {
205 NotifyFailed(net::ERR_REQUEST_RANGE_NOT_SATISFIABLE); 202 NotifyStartError(URLRequestStatus::FromError(range_parse_result_));
206 return; 203 return;
207 } 204 }
208 205
206 if (!byte_range_.ComputeBounds(file_info.size)) {
207 NotifyStartError(
208 URLRequestStatus::FromError(net::ERR_REQUEST_RANGE_NOT_SATISFIABLE));
209 return;
210 }
211
209 if (is_directory_) { 212 if (is_directory_) {
210 NotifyHeadersComplete(); 213 NotifyHeadersComplete();
211 return; 214 return;
212 } 215 }
213 216
214 remaining_bytes_ = byte_range_.last_byte_position() - 217 remaining_bytes_ = byte_range_.last_byte_position() -
215 byte_range_.first_byte_position() + 1; 218 byte_range_.first_byte_position() + 1;
216 DCHECK_GE(remaining_bytes_, 0); 219 DCHECK_GE(remaining_bytes_, 0);
217 220
218 DCHECK(!reader_.get()); 221 DCHECK(!reader_.get());
219 reader_ = file_system_context_->CreateFileStreamReader( 222 reader_ = file_system_context_->CreateFileStreamReader(
220 url_, byte_range_.first_byte_position(), remaining_bytes_, base::Time()); 223 url_, byte_range_.first_byte_position(), remaining_bytes_, base::Time());
221 224
222 set_expected_content_size(remaining_bytes_); 225 set_expected_content_size(remaining_bytes_);
223 response_info_.reset(new net::HttpResponseInfo()); 226 response_info_.reset(new net::HttpResponseInfo());
224 response_info_->headers = CreateHttpResponseHeaders(); 227 response_info_->headers = CreateHttpResponseHeaders();
225 NotifyHeadersComplete(); 228 NotifyHeadersComplete();
226 } 229 }
227 230
228 void FileSystemURLRequestJob::DidRead(int result) { 231 void FileSystemURLRequestJob::DidRead(int result) {
229 if (result > 0) 232 if (result >= 0) {
230 SetStatus(URLRequestStatus()); // Clear the IO_PENDING status 233 remaining_bytes_ -= result;
231 else if (result == 0) 234 DCHECK_GE(remaining_bytes_, 0);
232 NotifyDone(URLRequestStatus()); 235 }
233 else
234 NotifyFailed(result);
235 236
236 remaining_bytes_ -= result; 237 ReadRawDataComplete(result);
237 DCHECK_GE(remaining_bytes_, 0);
238
239 NotifyReadComplete(result);
240 } 238 }
241 239
242 bool FileSystemURLRequestJob::IsRedirectResponse(GURL* location, 240 bool FileSystemURLRequestJob::IsRedirectResponse(GURL* location,
243 int* http_status_code) { 241 int* http_status_code) {
244 if (is_directory_) { 242 if (is_directory_) {
245 // This happens when we discovered the file is a directory, so needs a 243 // This happens when we discovered the file is a directory, so needs a
246 // slash at the end of the path. 244 // slash at the end of the path.
247 std::string new_path = request_->url().path(); 245 std::string new_path = request_->url().path();
248 new_path.push_back('/'); 246 new_path.push_back('/');
249 GURL::Replacements replacements; 247 GURL::Replacements replacements;
250 replacements.SetPathStr(new_path); 248 replacements.SetPathStr(new_path);
251 *location = request_->url().ReplaceComponents(replacements); 249 *location = request_->url().ReplaceComponents(replacements);
252 *http_status_code = 301; // simulate a permanent redirect 250 *http_status_code = 301; // simulate a permanent redirect
253 return true; 251 return true;
254 } 252 }
255 253
256 return false; 254 return false;
257 } 255 }
258 256
259 void FileSystemURLRequestJob::NotifyFailed(int rv) {
260 NotifyDone(URLRequestStatus(URLRequestStatus::FAILED, rv));
261 }
262
263 } // namespace storage 257 } // namespace storage
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698