| Index: content/browser/download/download_request_core.cc
|
| diff --git a/content/browser/download/download_request_core.cc b/content/browser/download/download_request_core.cc
|
| index 072ba7b0b55469efc47e767f0fa3da78e1f5457e..f35e8591a7ffcd177f8e7223f12bdcfa04ea1796 100644
|
| --- a/content/browser/download/download_request_core.cc
|
| +++ b/content/browser/download/download_request_core.cc
|
| @@ -48,7 +48,8 @@ DownloadRequestCore::DownloadRequestCore(
|
| last_buffer_size_(0),
|
| bytes_read_(0),
|
| pause_count_(0),
|
| - was_deferred_(false) {
|
| + was_deferred_(false),
|
| + is_resumption_request_(save_info_->offset > 0) {
|
| DCHECK(request_);
|
| DCHECK(save_info_);
|
| DCHECK(!on_ready_to_read_callback_.is_null());
|
| @@ -69,14 +70,22 @@ DownloadRequestCore::~DownloadRequestCore() {
|
| }
|
|
|
| // Send the download creation information to the download thread.
|
| -void DownloadRequestCore::OnResponseStarted(
|
| - scoped_ptr<DownloadCreateInfo>* create_info,
|
| - scoped_ptr<ByteStreamReader>* stream_reader) {
|
| +DownloadInterruptReason DownloadRequestCore::OnResponseStarted(
|
| + scoped_ptr<DownloadCreateInfo>* create_info_out,
|
| + scoped_ptr<ByteStreamReader>* stream_reader_out) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
| DCHECK(save_info_);
|
| DVLOG(20) << __FUNCTION__ << "()" << DebugString();
|
| download_start_time_ = base::TimeTicks::Now();
|
|
|
| + DownloadInterruptReason result =
|
| + request()->response_headers()
|
| + ? HandleSuccessfulServerResponse(*request()->response_headers(),
|
| + save_info_.get())
|
| + : DOWNLOAD_INTERRUPT_REASON_NONE;
|
| + if (result != DOWNLOAD_INTERRUPT_REASON_NONE)
|
| + return result;
|
| +
|
| // If it's a download, we don't want to poison the cache with it.
|
| request()->StopCaching();
|
|
|
| @@ -92,7 +101,7 @@ void DownloadRequestCore::OnResponseStarted(
|
| : 0;
|
|
|
| // Deleted in DownloadManager.
|
| - scoped_ptr<DownloadCreateInfo> info(
|
| + scoped_ptr<DownloadCreateInfo> create_info(
|
| new DownloadCreateInfo(base::Time::Now(), content_length,
|
| request()->net_log(), std::move(save_info_)));
|
|
|
| @@ -100,25 +109,25 @@ void DownloadRequestCore::OnResponseStarted(
|
| CreateByteStream(
|
| base::ThreadTaskRunnerHandle::Get(),
|
| BrowserThread::GetMessageLoopProxyForThread(BrowserThread::FILE),
|
| - kDownloadByteStreamSize, &stream_writer_, stream_reader);
|
| + kDownloadByteStreamSize, &stream_writer_, stream_reader_out);
|
| stream_writer_->RegisterCallback(
|
| base::Bind(&DownloadRequestCore::ResumeRequest, AsWeakPtr()));
|
|
|
| - info->url_chain = request()->url_chain();
|
| - info->referrer_url = GURL(request()->referrer());
|
| + create_info->url_chain = request()->url_chain();
|
| + create_info->referrer_url = GURL(request()->referrer());
|
| string mime_type;
|
| request()->GetMimeType(&mime_type);
|
| - info->mime_type = mime_type;
|
| - info->remote_address = request()->GetSocketAddress().host();
|
| + create_info->mime_type = mime_type;
|
| + create_info->remote_address = request()->GetSocketAddress().host();
|
| if (request()->response_headers()) {
|
| // Grab the first content-disposition header. There may be more than one,
|
| // though as of this writing, the network stack ensures if there are, they
|
| // are all duplicates.
|
| request()->response_headers()->EnumerateHeader(
|
| - nullptr, "Content-Disposition", &info->content_disposition);
|
| + nullptr, "Content-Disposition", &create_info->content_disposition);
|
| }
|
| - RecordDownloadMimeType(info->mime_type);
|
| - RecordDownloadContentDisposition(info->content_disposition);
|
| + RecordDownloadMimeType(create_info->mime_type);
|
| + RecordDownloadContentDisposition(create_info->content_disposition);
|
|
|
| // Get the last modified time and etag.
|
| const net::HttpResponseHeaders* headers = request()->response_headers();
|
| @@ -127,33 +136,37 @@ void DownloadRequestCore::OnResponseStarted(
|
| // If we don't have strong validators as per RFC 2616 section 13.3.3, then
|
| // we neither store nor use them for range requests.
|
| if (!headers->EnumerateHeader(nullptr, "Last-Modified",
|
| - &info->last_modified))
|
| - info->last_modified.clear();
|
| - if (!headers->EnumerateHeader(nullptr, "ETag", &info->etag))
|
| - info->etag.clear();
|
| - }
|
| -
|
| - int status = headers->response_code();
|
| - if (2 == status / 100 && status != net::HTTP_PARTIAL_CONTENT) {
|
| - // Success & not range response; if we asked for a range, we didn't
|
| - // get it--reset the file pointers to reflect that.
|
| - info->save_info->offset = 0;
|
| - info->save_info->hash_state = "";
|
| + &create_info->last_modified))
|
| + create_info->last_modified.clear();
|
| + if (!headers->EnumerateHeader(nullptr, "ETag", &create_info->etag))
|
| + create_info->etag.clear();
|
| }
|
|
|
| - if (!headers->GetMimeType(&info->original_mime_type))
|
| - info->original_mime_type.clear();
|
| + if (!headers->GetMimeType(&create_info->original_mime_type))
|
| + create_info->original_mime_type.clear();
|
| }
|
|
|
| // Blink verifies that the requester of this download is allowed to set a
|
| - // suggested name for the security origin of the downlaod URL. However, this
|
| + // suggested name for the security origin of the download URL. However, this
|
| // assumption doesn't hold if there were cross origin redirects. Therefore,
|
| // clear the suggested_name for such requests.
|
| - if (info->url_chain.size() > 1 &&
|
| - info->url_chain.front().GetOrigin() != info->url_chain.back().GetOrigin())
|
| - info->save_info->suggested_name.clear();
|
| + if (create_info->url_chain.size() > 1 &&
|
| + create_info->url_chain.front().GetOrigin() !=
|
| + create_info->url_chain.back().GetOrigin())
|
| + create_info->save_info->suggested_name.clear();
|
|
|
| - info.swap(*create_info);
|
| + create_info.swap(*create_info_out);
|
| +
|
| + return DOWNLOAD_INTERRUPT_REASON_NONE;
|
| +}
|
| +
|
| +DownloadInterruptReason DownloadRequestCore::OnRequestRedirected(
|
| + const net::RedirectInfo& redirect_info) {
|
| + // A redirect while attempting a partial resumption indicates a potential
|
| + // middle box. Trigger another interruption so that the DownloadItem can
|
| + // retry.
|
| + return is_resumption_request_ ? DOWNLOAD_INTERRUPT_REASON_SERVER_UNREACHABLE
|
| + : DOWNLOAD_INTERRUPT_REASON_NONE;
|
| }
|
|
|
| // Create a new buffer, which will be handed to the download thread for file
|
| @@ -221,26 +234,7 @@ DownloadInterruptReason DownloadRequestCore::OnResponseCompleted(
|
| << " status.error() = " << status.error()
|
| << " response_code = " << response_code;
|
|
|
| - net::Error error_code = net::OK;
|
| - if (status.status() == net::URLRequestStatus::FAILED ||
|
| - // Note cancels as failures too.
|
| - status.status() == net::URLRequestStatus::CANCELED) {
|
| - error_code = static_cast<net::Error>(status.error()); // Normal case.
|
| - // Make sure that at least the fact of failure comes through.
|
| - if (error_code == net::OK)
|
| - error_code = net::ERR_FAILED;
|
| - }
|
| -
|
| - // ERR_CONTENT_LENGTH_MISMATCH and ERR_INCOMPLETE_CHUNKED_ENCODING are
|
| - // allowed since a number of servers in the wild close the connection too
|
| - // early by mistake. Other browsers - IE9, Firefox 11.0, and Safari 5.1.4 -
|
| - // treat downloads as complete in both cases, so we follow their lead.
|
| - if (error_code == net::ERR_CONTENT_LENGTH_MISMATCH ||
|
| - error_code == net::ERR_INCOMPLETE_CHUNKED_ENCODING) {
|
| - error_code = net::OK;
|
| - }
|
| - DownloadInterruptReason reason = ConvertNetErrorToInterruptReason(
|
| - error_code, DOWNLOAD_INTERRUPT_FROM_NETWORK);
|
| + DownloadInterruptReason reason = HandleRequestStatus(status);
|
|
|
| if (status.status() == net::URLRequestStatus::CANCELED &&
|
| status.error() == net::ERR_ABORTED) {
|
| @@ -252,49 +246,12 @@ DownloadInterruptReason DownloadRequestCore::OnResponseCompleted(
|
| // to a user action.
|
| // TODO(ahendrickson) -- Find a better set of codes to use here, as
|
| // CANCELED/ERR_ABORTED can occur for reasons other than user cancel.
|
| - if (net::IsCertStatusError(request()->ssl_info().cert_status))
|
| - reason = DOWNLOAD_INTERRUPT_REASON_SERVER_CERT_PROBLEM;
|
| - else
|
| + if (net::IsCertStatusError(request()->ssl_info().cert_status)) {
|
| + reason = is_resumption_request_
|
| + ? DOWNLOAD_INTERRUPT_REASON_SERVER_UNREACHABLE
|
| + : DOWNLOAD_INTERRUPT_REASON_SERVER_CERT_PROBLEM;
|
| + } else {
|
| reason = DOWNLOAD_INTERRUPT_REASON_USER_CANCELED;
|
| - }
|
| -
|
| - if (status.is_success() && reason == DOWNLOAD_INTERRUPT_REASON_NONE &&
|
| - request()->response_headers()) {
|
| - // Handle server's response codes.
|
| - switch (response_code) {
|
| - case -1: // Non-HTTP request.
|
| - case net::HTTP_OK:
|
| - case net::HTTP_CREATED:
|
| - case net::HTTP_ACCEPTED:
|
| - case net::HTTP_NON_AUTHORITATIVE_INFORMATION:
|
| - case net::HTTP_RESET_CONTENT:
|
| - case net::HTTP_PARTIAL_CONTENT:
|
| - // Expected successful codes.
|
| - break;
|
| - case net::HTTP_NO_CONTENT:
|
| - case net::HTTP_NOT_FOUND:
|
| - reason = DOWNLOAD_INTERRUPT_REASON_SERVER_BAD_CONTENT;
|
| - break;
|
| - case net::HTTP_REQUESTED_RANGE_NOT_SATISFIABLE:
|
| - // Retry by downloading from the start automatically:
|
| - // If we haven't received data when we get this error, we won't.
|
| - reason = DOWNLOAD_INTERRUPT_REASON_SERVER_NO_RANGE;
|
| - break;
|
| - case net::HTTP_UNAUTHORIZED:
|
| - // Server didn't authorize this request.
|
| - reason = DOWNLOAD_INTERRUPT_REASON_SERVER_UNAUTHORIZED;
|
| - break;
|
| - case net::HTTP_FORBIDDEN:
|
| - // Server forbids access to this resource.
|
| - reason = DOWNLOAD_INTERRUPT_REASON_SERVER_FORBIDDEN;
|
| - break;
|
| - default: // All other errors.
|
| - // Redirection and informational codes should have been handled earlier
|
| - // in the stack.
|
| - DCHECK_NE(3, response_code / 100);
|
| - DCHECK_NE(1, response_code / 100);
|
| - reason = DOWNLOAD_INTERRUPT_REASON_SERVER_FAILED;
|
| - break;
|
| }
|
| }
|
|
|
| @@ -363,4 +320,121 @@ std::string DownloadRequestCore::DebugString() const {
|
| request() ? request()->url().spec().c_str() : "<NULL request>");
|
| }
|
|
|
| +// static
|
| +DownloadInterruptReason DownloadRequestCore::HandleRequestStatus(
|
| + const net::URLRequestStatus& status) {
|
| + net::Error error_code = net::OK;
|
| + if (status.status() == net::URLRequestStatus::FAILED ||
|
| + // Note cancels as failures too.
|
| + status.status() == net::URLRequestStatus::CANCELED) {
|
| + error_code = static_cast<net::Error>(status.error()); // Normal case.
|
| + // Make sure that at least the fact of failure comes through.
|
| + if (error_code == net::OK)
|
| + error_code = net::ERR_FAILED;
|
| + }
|
| +
|
| + // ERR_CONTENT_LENGTH_MISMATCH and ERR_INCOMPLETE_CHUNKED_ENCODING are
|
| + // allowed since a number of servers in the wild close the connection too
|
| + // early by mistake. Other browsers - IE9, Firefox 11.0, and Safari 5.1.4 -
|
| + // treat downloads as complete in both cases, so we follow their lead.
|
| + if (error_code == net::ERR_CONTENT_LENGTH_MISMATCH ||
|
| + error_code == net::ERR_INCOMPLETE_CHUNKED_ENCODING) {
|
| + error_code = net::OK;
|
| + }
|
| + DownloadInterruptReason reason = ConvertNetErrorToInterruptReason(
|
| + error_code, DOWNLOAD_INTERRUPT_FROM_NETWORK);
|
| +
|
| + return reason;
|
| +}
|
| +
|
| +// static
|
| +DownloadInterruptReason DownloadRequestCore::HandleSuccessfulServerResponse(
|
| + const net::HttpResponseHeaders& http_headers,
|
| + DownloadSaveInfo* save_info) {
|
| + switch (http_headers.response_code()) {
|
| + case -1: // Non-HTTP request.
|
| + case net::HTTP_OK:
|
| + case net::HTTP_NON_AUTHORITATIVE_INFORMATION:
|
| + case net::HTTP_PARTIAL_CONTENT:
|
| + // Expected successful codes.
|
| + break;
|
| +
|
| + case net::HTTP_CREATED:
|
| + case net::HTTP_ACCEPTED:
|
| + // Per RFC 2616 the entity being transferred is metadata about the
|
| + // resource at the target URL and not the resource at that URL (or the
|
| + // resource that would be at the URL once processing is completed in the
|
| + // case of HTTP_ACCEPTED). However, we currently don't have special
|
| + // handling for these response and they are downloaded the same as a
|
| + // regular response.
|
| + break;
|
| +
|
| + case net::HTTP_NO_CONTENT:
|
| + case net::HTTP_RESET_CONTENT:
|
| + // These two status codes don't have an entity (or rather RFC 2616
|
| + // requires that there be no entity). They are treated the same as the
|
| + // resource not being found since there is no entity to download.
|
| +
|
| + case net::HTTP_NOT_FOUND:
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_BAD_CONTENT;
|
| + break;
|
| +
|
| + case net::HTTP_REQUESTED_RANGE_NOT_SATISFIABLE:
|
| + // Retry by downloading from the start automatically:
|
| + // If we haven't received data when we get this error, we won't.
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_NO_RANGE;
|
| + break;
|
| + case net::HTTP_UNAUTHORIZED:
|
| + case net::HTTP_PROXY_AUTHENTICATION_REQUIRED:
|
| + // Server didn't authorize this request.
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_UNAUTHORIZED;
|
| + break;
|
| + case net::HTTP_FORBIDDEN:
|
| + // Server forbids access to this resource.
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_FORBIDDEN;
|
| + break;
|
| + default: // All other errors.
|
| + // Redirection and informational codes should have been handled earlier
|
| + // in the stack.
|
| + DCHECK_NE(3, http_headers.response_code() / 100);
|
| + DCHECK_NE(1, http_headers.response_code() / 100);
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_FAILED;
|
| + }
|
| +
|
| + if (save_info->offset > 0) {
|
| + // The caller is expecting a partial response.
|
| +
|
| + if (http_headers.response_code() != net::HTTP_PARTIAL_CONTENT) {
|
| + // Requested a partial range, but received the entire response.
|
| + save_info->offset = 0;
|
| + save_info->hash_state.clear();
|
| + return DOWNLOAD_INTERRUPT_REASON_NONE;
|
| + }
|
| +
|
| + int64_t first_byte = -1;
|
| + int64_t last_byte = -1;
|
| + int64_t length = -1;
|
| + if (!http_headers.GetContentRange(&first_byte, &last_byte, &length))
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_BAD_CONTENT;
|
| + DCHECK_GE(first_byte, 0);
|
| +
|
| + if (first_byte != save_info->offset) {
|
| + // The server returned a different range than the one we requested. Assume
|
| + // the response is bad.
|
| + //
|
| + // In the future we should consider allowing offsets that are less than
|
| + // the offset we've requested, since in theory we can truncate the partial
|
| + // file at the offset and continue.
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_BAD_CONTENT;
|
| + }
|
| +
|
| + return DOWNLOAD_INTERRUPT_REASON_NONE;
|
| + }
|
| +
|
| + if (http_headers.response_code() == net::HTTP_PARTIAL_CONTENT)
|
| + return DOWNLOAD_INTERRUPT_REASON_SERVER_BAD_CONTENT;
|
| +
|
| + return DOWNLOAD_INTERRUPT_REASON_NONE;
|
| +}
|
| +
|
| } // namespace content
|
|
|