| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 // An implementation of WebURLLoader in terms of ResourceLoaderBridge. | |
| 6 | |
| 7 #include "webkit/glue/weburlloader_impl.h" | |
| 8 | |
| 9 #include "base/bind.h" | |
| 10 #include "base/files/file_path.h" | |
| 11 #include "base/memory/scoped_ptr.h" | |
| 12 #include "base/message_loop/message_loop.h" | |
| 13 #include "base/process_util.h" | |
| 14 #include "base/strings/string_util.h" | |
| 15 #include "base/time/time.h" | |
| 16 #include "net/base/data_url.h" | |
| 17 #include "net/base/load_flags.h" | |
| 18 #include "net/base/mime_util.h" | |
| 19 #include "net/base/net_errors.h" | |
| 20 #include "net/base/net_util.h" | |
| 21 #include "net/http/http_response_headers.h" | |
| 22 #include "net/http/http_util.h" | |
| 23 #include "third_party/WebKit/public/platform/WebHTTPHeaderVisitor.h" | |
| 24 #include "third_party/WebKit/public/platform/WebHTTPLoadInfo.h" | |
| 25 #include "third_party/WebKit/public/platform/WebURL.h" | |
| 26 #include "third_party/WebKit/public/platform/WebURLError.h" | |
| 27 #include "third_party/WebKit/public/platform/WebURLLoaderClient.h" | |
| 28 #include "third_party/WebKit/public/platform/WebURLLoadTiming.h" | |
| 29 #include "third_party/WebKit/public/platform/WebURLRequest.h" | |
| 30 #include "third_party/WebKit/public/platform/WebURLResponse.h" | |
| 31 #include "third_party/WebKit/public/web/WebSecurityPolicy.h" | |
| 32 #include "webkit/common/resource_request_body.h" | |
| 33 #include "webkit/glue/ftp_directory_listing_response_delegate.h" | |
| 34 #include "webkit/glue/multipart_response_delegate.h" | |
| 35 #include "webkit/glue/resource_loader_bridge.h" | |
| 36 #include "webkit/glue/webkitplatformsupport_impl.h" | |
| 37 #include "webkit/glue/weburlrequest_extradata_impl.h" | |
| 38 #include "webkit/glue/weburlresponse_extradata_impl.h" | |
| 39 | |
| 40 using base::Time; | |
| 41 using base::TimeTicks; | |
| 42 using WebKit::WebData; | |
| 43 using WebKit::WebHTTPBody; | |
| 44 using WebKit::WebHTTPHeaderVisitor; | |
| 45 using WebKit::WebHTTPLoadInfo; | |
| 46 using WebKit::WebReferrerPolicy; | |
| 47 using WebKit::WebSecurityPolicy; | |
| 48 using WebKit::WebString; | |
| 49 using WebKit::WebURL; | |
| 50 using WebKit::WebURLError; | |
| 51 using WebKit::WebURLLoadTiming; | |
| 52 using WebKit::WebURLLoader; | |
| 53 using WebKit::WebURLLoaderClient; | |
| 54 using WebKit::WebURLRequest; | |
| 55 using WebKit::WebURLResponse; | |
| 56 | |
| 57 namespace webkit_glue { | |
| 58 | |
| 59 // Utilities ------------------------------------------------------------------ | |
| 60 | |
| 61 namespace { | |
| 62 | |
| 63 const char kThrottledErrorDescription[] = | |
| 64 "Request throttled. Visit http://dev.chromium.org/throttling for more " | |
| 65 "information."; | |
| 66 | |
| 67 class HeaderFlattener : public WebHTTPHeaderVisitor { | |
| 68 public: | |
| 69 explicit HeaderFlattener(int load_flags) | |
| 70 : load_flags_(load_flags), | |
| 71 has_accept_header_(false) { | |
| 72 } | |
| 73 | |
| 74 virtual void visitHeader(const WebString& name, const WebString& value) { | |
| 75 // TODO(darin): is UTF-8 really correct here? It is if the strings are | |
| 76 // already ASCII (i.e., if they are already escaped properly). | |
| 77 const std::string& name_utf8 = name.utf8(); | |
| 78 const std::string& value_utf8 = value.utf8(); | |
| 79 | |
| 80 // Skip over referrer headers found in the header map because we already | |
| 81 // pulled it out as a separate parameter. | |
| 82 if (LowerCaseEqualsASCII(name_utf8, "referer")) | |
| 83 return; | |
| 84 | |
| 85 // Skip over "Cache-Control: max-age=0" header if the corresponding | |
| 86 // load flag is already specified. FrameLoader sets both the flag and | |
| 87 // the extra header -- the extra header is redundant since our network | |
| 88 // implementation will add the necessary headers based on load flags. | |
| 89 // See http://code.google.com/p/chromium/issues/detail?id=3434. | |
| 90 if ((load_flags_ & net::LOAD_VALIDATE_CACHE) && | |
| 91 LowerCaseEqualsASCII(name_utf8, "cache-control") && | |
| 92 LowerCaseEqualsASCII(value_utf8, "max-age=0")) | |
| 93 return; | |
| 94 | |
| 95 if (LowerCaseEqualsASCII(name_utf8, "accept")) | |
| 96 has_accept_header_ = true; | |
| 97 | |
| 98 if (!buffer_.empty()) | |
| 99 buffer_.append("\r\n"); | |
| 100 buffer_.append(name_utf8 + ": " + value_utf8); | |
| 101 } | |
| 102 | |
| 103 const std::string& GetBuffer() { | |
| 104 // In some cases, WebKit doesn't add an Accept header, but not having the | |
| 105 // header confuses some web servers. See bug 808613. | |
| 106 if (!has_accept_header_) { | |
| 107 if (!buffer_.empty()) | |
| 108 buffer_.append("\r\n"); | |
| 109 buffer_.append("Accept: */*"); | |
| 110 has_accept_header_ = true; | |
| 111 } | |
| 112 return buffer_; | |
| 113 } | |
| 114 | |
| 115 private: | |
| 116 int load_flags_; | |
| 117 std::string buffer_; | |
| 118 bool has_accept_header_; | |
| 119 }; | |
| 120 | |
| 121 // Extracts the information from a data: url. | |
| 122 bool GetInfoFromDataURL(const GURL& url, | |
| 123 ResourceResponseInfo* info, | |
| 124 std::string* data, | |
| 125 int* error_code) { | |
| 126 std::string mime_type; | |
| 127 std::string charset; | |
| 128 if (net::DataURL::Parse(url, &mime_type, &charset, data)) { | |
| 129 *error_code = net::OK; | |
| 130 // Assure same time for all time fields of data: URLs. | |
| 131 Time now = Time::Now(); | |
| 132 info->load_timing.request_start = TimeTicks::Now(); | |
| 133 info->load_timing.request_start_time = now; | |
| 134 info->request_time = now; | |
| 135 info->response_time = now; | |
| 136 info->headers = NULL; | |
| 137 info->mime_type.swap(mime_type); | |
| 138 info->charset.swap(charset); | |
| 139 info->security_info.clear(); | |
| 140 info->content_length = data->length(); | |
| 141 info->encoded_data_length = 0; | |
| 142 | |
| 143 return true; | |
| 144 } | |
| 145 | |
| 146 *error_code = net::ERR_INVALID_URL; | |
| 147 return false; | |
| 148 } | |
| 149 | |
| 150 typedef ResourceDevToolsInfo::HeadersVector HeadersVector; | |
| 151 | |
| 152 // Converts timing data from |load_timing| to the format used by WebKit. | |
| 153 void PopulateURLLoadTiming(const net::LoadTimingInfo& load_timing, | |
| 154 WebURLLoadTiming* url_timing) { | |
| 155 DCHECK(!load_timing.request_start.is_null()); | |
| 156 | |
| 157 const TimeTicks kNullTicks; | |
| 158 url_timing->initialize(); | |
| 159 url_timing->setRequestTime( | |
| 160 (load_timing.request_start - kNullTicks).InSecondsF()); | |
| 161 url_timing->setProxyStart( | |
| 162 (load_timing.proxy_resolve_start - kNullTicks).InSecondsF()); | |
| 163 url_timing->setProxyEnd( | |
| 164 (load_timing.proxy_resolve_end - kNullTicks).InSecondsF()); | |
| 165 url_timing->setDNSStart( | |
| 166 (load_timing.connect_timing.dns_start - kNullTicks).InSecondsF()); | |
| 167 url_timing->setDNSEnd( | |
| 168 (load_timing.connect_timing.dns_end - kNullTicks).InSecondsF()); | |
| 169 url_timing->setConnectStart( | |
| 170 (load_timing.connect_timing.connect_start - kNullTicks).InSecondsF()); | |
| 171 url_timing->setConnectEnd( | |
| 172 (load_timing.connect_timing.connect_end - kNullTicks).InSecondsF()); | |
| 173 url_timing->setSSLStart( | |
| 174 (load_timing.connect_timing.ssl_start - kNullTicks).InSecondsF()); | |
| 175 url_timing->setSSLEnd( | |
| 176 (load_timing.connect_timing.ssl_end - kNullTicks).InSecondsF()); | |
| 177 url_timing->setSendStart( | |
| 178 (load_timing.send_start - kNullTicks).InSecondsF()); | |
| 179 url_timing->setSendEnd( | |
| 180 (load_timing.send_end - kNullTicks).InSecondsF()); | |
| 181 url_timing->setReceiveHeadersEnd( | |
| 182 (load_timing.receive_headers_end - kNullTicks).InSecondsF()); | |
| 183 } | |
| 184 | |
| 185 void PopulateURLResponse( | |
| 186 const GURL& url, | |
| 187 const ResourceResponseInfo& info, | |
| 188 WebURLResponse* response) { | |
| 189 response->setURL(url); | |
| 190 response->setResponseTime(info.response_time.ToDoubleT()); | |
| 191 response->setMIMEType(WebString::fromUTF8(info.mime_type)); | |
| 192 response->setTextEncodingName(WebString::fromUTF8(info.charset)); | |
| 193 response->setExpectedContentLength(info.content_length); | |
| 194 response->setSecurityInfo(info.security_info); | |
| 195 response->setAppCacheID(info.appcache_id); | |
| 196 response->setAppCacheManifestURL(info.appcache_manifest_url); | |
| 197 response->setWasCached(!info.load_timing.request_start_time.is_null() && | |
| 198 info.response_time < info.load_timing.request_start_time); | |
| 199 response->setRemoteIPAddress( | |
| 200 WebString::fromUTF8(info.socket_address.host())); | |
| 201 response->setRemotePort(info.socket_address.port()); | |
| 202 response->setConnectionID(info.load_timing.socket_log_id); | |
| 203 response->setConnectionReused(info.load_timing.socket_reused); | |
| 204 response->setDownloadFilePath(info.download_file_path.AsUTF16Unsafe()); | |
| 205 WebURLResponseExtraDataImpl* extra_data = | |
| 206 new WebURLResponseExtraDataImpl(info.npn_negotiated_protocol); | |
| 207 response->setExtraData(extra_data); | |
| 208 extra_data->set_was_fetched_via_spdy(info.was_fetched_via_spdy); | |
| 209 extra_data->set_was_npn_negotiated(info.was_npn_negotiated); | |
| 210 extra_data->set_was_alternate_protocol_available( | |
| 211 info.was_alternate_protocol_available); | |
| 212 extra_data->set_connection_info(info.connection_info); | |
| 213 extra_data->set_was_fetched_via_proxy(info.was_fetched_via_proxy); | |
| 214 | |
| 215 // If there's no received headers end time, don't set load timing. This is | |
| 216 // the case for non-HTTP requests, requests that don't go over the wire, and | |
| 217 // certain error cases. | |
| 218 if (!info.load_timing.receive_headers_end.is_null()) { | |
| 219 WebURLLoadTiming timing; | |
| 220 PopulateURLLoadTiming(info.load_timing, &timing); | |
| 221 response->setLoadTiming(timing); | |
| 222 } | |
| 223 | |
| 224 if (info.devtools_info.get()) { | |
| 225 WebHTTPLoadInfo load_info; | |
| 226 | |
| 227 load_info.setHTTPStatusCode(info.devtools_info->http_status_code); | |
| 228 load_info.setHTTPStatusText(WebString::fromUTF8( | |
| 229 info.devtools_info->http_status_text)); | |
| 230 load_info.setEncodedDataLength(info.encoded_data_length); | |
| 231 | |
| 232 load_info.setRequestHeadersText(WebString::fromUTF8( | |
| 233 info.devtools_info->request_headers_text)); | |
| 234 load_info.setResponseHeadersText(WebString::fromUTF8( | |
| 235 info.devtools_info->response_headers_text)); | |
| 236 const HeadersVector& request_headers = info.devtools_info->request_headers; | |
| 237 for (HeadersVector::const_iterator it = request_headers.begin(); | |
| 238 it != request_headers.end(); ++it) { | |
| 239 load_info.addRequestHeader(WebString::fromUTF8(it->first), | |
| 240 WebString::fromUTF8(it->second)); | |
| 241 } | |
| 242 const HeadersVector& response_headers = | |
| 243 info.devtools_info->response_headers; | |
| 244 for (HeadersVector::const_iterator it = response_headers.begin(); | |
| 245 it != response_headers.end(); ++it) { | |
| 246 load_info.addResponseHeader(WebString::fromUTF8(it->first), | |
| 247 WebString::fromUTF8(it->second)); | |
| 248 } | |
| 249 response->setHTTPLoadInfo(load_info); | |
| 250 } | |
| 251 | |
| 252 const net::HttpResponseHeaders* headers = info.headers.get(); | |
| 253 if (!headers) | |
| 254 return; | |
| 255 | |
| 256 WebURLResponse::HTTPVersion version = WebURLResponse::Unknown; | |
| 257 if (headers->GetHttpVersion() == net::HttpVersion(0, 9)) | |
| 258 version = WebURLResponse::HTTP_0_9; | |
| 259 else if (headers->GetHttpVersion() == net::HttpVersion(1, 0)) | |
| 260 version = WebURLResponse::HTTP_1_0; | |
| 261 else if (headers->GetHttpVersion() == net::HttpVersion(1, 1)) | |
| 262 version = WebURLResponse::HTTP_1_1; | |
| 263 response->setHTTPVersion(version); | |
| 264 response->setHTTPStatusCode(headers->response_code()); | |
| 265 response->setHTTPStatusText(WebString::fromUTF8(headers->GetStatusText())); | |
| 266 | |
| 267 // TODO(darin): We should leverage HttpResponseHeaders for this, and this | |
| 268 // should be using the same code as ResourceDispatcherHost. | |
| 269 // TODO(jungshik): Figure out the actual value of the referrer charset and | |
| 270 // pass it to GetSuggestedFilename. | |
| 271 std::string value; | |
| 272 headers->EnumerateHeader(NULL, "content-disposition", &value); | |
| 273 response->setSuggestedFileName( | |
| 274 net::GetSuggestedFilename(url, | |
| 275 value, | |
| 276 std::string(), // referrer_charset | |
| 277 std::string(), // suggested_name | |
| 278 std::string(), // mime_type | |
| 279 std::string())); // default_name | |
| 280 | |
| 281 Time time_val; | |
| 282 if (headers->GetLastModifiedValue(&time_val)) | |
| 283 response->setLastModifiedDate(time_val.ToDoubleT()); | |
| 284 | |
| 285 // Build up the header map. | |
| 286 void* iter = NULL; | |
| 287 std::string name; | |
| 288 while (headers->EnumerateHeaderLines(&iter, &name, &value)) { | |
| 289 response->addHTTPHeaderField(WebString::fromUTF8(name), | |
| 290 WebString::fromUTF8(value)); | |
| 291 } | |
| 292 } | |
| 293 | |
| 294 net::RequestPriority ConvertWebKitPriorityToNetPriority( | |
| 295 const WebURLRequest::Priority& priority) { | |
| 296 switch (priority) { | |
| 297 case WebURLRequest::PriorityVeryHigh: | |
| 298 return net::HIGHEST; | |
| 299 | |
| 300 case WebURLRequest::PriorityHigh: | |
| 301 return net::MEDIUM; | |
| 302 | |
| 303 case WebURLRequest::PriorityMedium: | |
| 304 return net::LOW; | |
| 305 | |
| 306 case WebURLRequest::PriorityLow: | |
| 307 return net::LOWEST; | |
| 308 | |
| 309 case WebURLRequest::PriorityVeryLow: | |
| 310 return net::IDLE; | |
| 311 | |
| 312 case WebURLRequest::PriorityUnresolved: | |
| 313 default: | |
| 314 NOTREACHED(); | |
| 315 return net::LOW; | |
| 316 } | |
| 317 } | |
| 318 | |
| 319 } // namespace | |
| 320 | |
| 321 // WebURLLoaderImpl::Context -------------------------------------------------- | |
| 322 | |
| 323 // This inner class exists since the WebURLLoader may be deleted while inside a | |
| 324 // call to WebURLLoaderClient. The bridge requires its Peer to stay alive | |
| 325 // until it receives OnCompletedRequest. | |
| 326 class WebURLLoaderImpl::Context : public base::RefCounted<Context>, | |
| 327 public ResourceLoaderBridge::Peer { | |
| 328 public: | |
| 329 explicit Context(WebURLLoaderImpl* loader); | |
| 330 | |
| 331 WebURLLoaderClient* client() const { return client_; } | |
| 332 void set_client(WebURLLoaderClient* client) { client_ = client; } | |
| 333 | |
| 334 void Cancel(); | |
| 335 void SetDefersLoading(bool value); | |
| 336 void DidChangePriority(WebURLRequest::Priority new_priority); | |
| 337 void Start( | |
| 338 const WebURLRequest& request, | |
| 339 ResourceLoaderBridge::SyncLoadResponse* sync_load_response, | |
| 340 WebKitPlatformSupportImpl* platform); | |
| 341 | |
| 342 // ResourceLoaderBridge::Peer methods: | |
| 343 virtual void OnUploadProgress(uint64 position, uint64 size) OVERRIDE; | |
| 344 virtual bool OnReceivedRedirect( | |
| 345 const GURL& new_url, | |
| 346 const ResourceResponseInfo& info, | |
| 347 bool* has_new_first_party_for_cookies, | |
| 348 GURL* new_first_party_for_cookies) OVERRIDE; | |
| 349 virtual void OnReceivedResponse(const ResourceResponseInfo& info) OVERRIDE; | |
| 350 virtual void OnDownloadedData(int len) OVERRIDE; | |
| 351 virtual void OnReceivedData(const char* data, | |
| 352 int data_length, | |
| 353 int encoded_data_length) OVERRIDE; | |
| 354 virtual void OnReceivedCachedMetadata(const char* data, int len) OVERRIDE; | |
| 355 virtual void OnCompletedRequest( | |
| 356 int error_code, | |
| 357 bool was_ignored_by_handler, | |
| 358 const std::string& security_info, | |
| 359 const base::TimeTicks& completion_time) OVERRIDE; | |
| 360 | |
| 361 private: | |
| 362 friend class base::RefCounted<Context>; | |
| 363 virtual ~Context() {} | |
| 364 | |
| 365 // We can optimize the handling of data URLs in most cases. | |
| 366 bool CanHandleDataURL(const GURL& url) const; | |
| 367 void HandleDataURL(); | |
| 368 | |
| 369 WebURLLoaderImpl* loader_; | |
| 370 WebURLRequest request_; | |
| 371 WebURLLoaderClient* client_; | |
| 372 WebReferrerPolicy referrer_policy_; | |
| 373 scoped_ptr<ResourceLoaderBridge> bridge_; | |
| 374 scoped_ptr<FtpDirectoryListingResponseDelegate> ftp_listing_delegate_; | |
| 375 scoped_ptr<MultipartResponseDelegate> multipart_delegate_; | |
| 376 scoped_ptr<ResourceLoaderBridge> completed_bridge_; | |
| 377 }; | |
| 378 | |
| 379 WebURLLoaderImpl::Context::Context(WebURLLoaderImpl* loader) | |
| 380 : loader_(loader), | |
| 381 client_(NULL), | |
| 382 referrer_policy_(WebKit::WebReferrerPolicyDefault) { | |
| 383 } | |
| 384 | |
| 385 void WebURLLoaderImpl::Context::Cancel() { | |
| 386 // The bridge will still send OnCompletedRequest, which will Release() us, so | |
| 387 // we don't do that here. | |
| 388 if (bridge_) | |
| 389 bridge_->Cancel(); | |
| 390 | |
| 391 // Ensure that we do not notify the multipart delegate anymore as it has | |
| 392 // its own pointer to the client. | |
| 393 if (multipart_delegate_) | |
| 394 multipart_delegate_->Cancel(); | |
| 395 | |
| 396 // Do not make any further calls to the client. | |
| 397 client_ = NULL; | |
| 398 loader_ = NULL; | |
| 399 } | |
| 400 | |
| 401 void WebURLLoaderImpl::Context::SetDefersLoading(bool value) { | |
| 402 if (bridge_) | |
| 403 bridge_->SetDefersLoading(value); | |
| 404 } | |
| 405 | |
| 406 void WebURLLoaderImpl::Context::DidChangePriority( | |
| 407 WebURLRequest::Priority new_priority) { | |
| 408 if (bridge_) | |
| 409 bridge_->DidChangePriority( | |
| 410 ConvertWebKitPriorityToNetPriority(new_priority)); | |
| 411 } | |
| 412 | |
| 413 void WebURLLoaderImpl::Context::Start( | |
| 414 const WebURLRequest& request, | |
| 415 ResourceLoaderBridge::SyncLoadResponse* sync_load_response, | |
| 416 WebKitPlatformSupportImpl* platform) { | |
| 417 DCHECK(!bridge_.get()); | |
| 418 | |
| 419 request_ = request; // Save the request. | |
| 420 | |
| 421 GURL url = request.url(); | |
| 422 if (url.SchemeIs("data") && CanHandleDataURL(url)) { | |
| 423 if (sync_load_response) { | |
| 424 // This is a sync load. Do the work now. | |
| 425 sync_load_response->url = url; | |
| 426 std::string data; | |
| 427 GetInfoFromDataURL(sync_load_response->url, sync_load_response, | |
| 428 &sync_load_response->data, | |
| 429 &sync_load_response->error_code); | |
| 430 } else { | |
| 431 AddRef(); // Balanced in OnCompletedRequest | |
| 432 base::MessageLoop::current()->PostTask( | |
| 433 FROM_HERE, base::Bind(&Context::HandleDataURL, this)); | |
| 434 } | |
| 435 return; | |
| 436 } | |
| 437 | |
| 438 GURL referrer_url( | |
| 439 request.httpHeaderField(WebString::fromUTF8("Referer")).utf8()); | |
| 440 const std::string& method = request.httpMethod().utf8(); | |
| 441 | |
| 442 int load_flags = net::LOAD_NORMAL; | |
| 443 switch (request.cachePolicy()) { | |
| 444 case WebURLRequest::ReloadIgnoringCacheData: | |
| 445 // Required by LayoutTests/http/tests/misc/refresh-headers.php | |
| 446 load_flags |= net::LOAD_VALIDATE_CACHE; | |
| 447 break; | |
| 448 case WebURLRequest::ReturnCacheDataElseLoad: | |
| 449 load_flags |= net::LOAD_PREFERRING_CACHE; | |
| 450 break; | |
| 451 case WebURLRequest::ReturnCacheDataDontLoad: | |
| 452 load_flags |= net::LOAD_ONLY_FROM_CACHE; | |
| 453 break; | |
| 454 case WebURLRequest::UseProtocolCachePolicy: | |
| 455 break; | |
| 456 } | |
| 457 | |
| 458 if (request.reportUploadProgress()) | |
| 459 load_flags |= net::LOAD_ENABLE_UPLOAD_PROGRESS; | |
| 460 if (request.reportLoadTiming()) | |
| 461 load_flags |= net::LOAD_ENABLE_LOAD_TIMING; | |
| 462 if (request.reportRawHeaders()) | |
| 463 load_flags |= net::LOAD_REPORT_RAW_HEADERS; | |
| 464 | |
| 465 if (!request.allowCookies() || !request.allowStoredCredentials()) { | |
| 466 load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES; | |
| 467 load_flags |= net::LOAD_DO_NOT_SEND_COOKIES; | |
| 468 } | |
| 469 | |
| 470 if (!request.allowStoredCredentials()) | |
| 471 load_flags |= net::LOAD_DO_NOT_SEND_AUTH_DATA; | |
| 472 | |
| 473 HeaderFlattener flattener(load_flags); | |
| 474 request.visitHTTPHeaderFields(&flattener); | |
| 475 | |
| 476 // TODO(brettw) this should take parameter encoding into account when | |
| 477 // creating the GURLs. | |
| 478 | |
| 479 ResourceLoaderBridge::RequestInfo request_info; | |
| 480 request_info.method = method; | |
| 481 request_info.url = url; | |
| 482 request_info.first_party_for_cookies = request.firstPartyForCookies(); | |
| 483 request_info.referrer = referrer_url; | |
| 484 request_info.headers = flattener.GetBuffer(); | |
| 485 request_info.load_flags = load_flags; | |
| 486 // requestor_pid only needs to be non-zero if the request originates outside | |
| 487 // the render process, so we can use requestorProcessID even for requests | |
| 488 // from in-process plugins. | |
| 489 request_info.requestor_pid = request.requestorProcessID(); | |
| 490 request_info.request_type = | |
| 491 ResourceType::FromTargetType(request.targetType()); | |
| 492 request_info.priority = | |
| 493 ConvertWebKitPriorityToNetPriority(request.priority()); | |
| 494 request_info.appcache_host_id = request.appCacheHostID(); | |
| 495 request_info.routing_id = request.requestorID(); | |
| 496 request_info.download_to_file = request.downloadToFile(); | |
| 497 request_info.has_user_gesture = request.hasUserGesture(); | |
| 498 request_info.extra_data = request.extraData(); | |
| 499 if (request.extraData()) { | |
| 500 referrer_policy_ = static_cast<WebURLRequestExtraDataImpl*>( | |
| 501 request.extraData())->referrer_policy(); | |
| 502 request_info.referrer_policy = referrer_policy_; | |
| 503 } | |
| 504 bridge_.reset(platform->CreateResourceLoader(request_info)); | |
| 505 | |
| 506 if (!request.httpBody().isNull()) { | |
| 507 // GET and HEAD requests shouldn't have http bodies. | |
| 508 DCHECK(method != "GET" && method != "HEAD"); | |
| 509 const WebHTTPBody& httpBody = request.httpBody(); | |
| 510 size_t i = 0; | |
| 511 WebHTTPBody::Element element; | |
| 512 scoped_refptr<ResourceRequestBody> request_body = new ResourceRequestBody; | |
| 513 while (httpBody.elementAt(i++, element)) { | |
| 514 switch (element.type) { | |
| 515 case WebHTTPBody::Element::TypeData: | |
| 516 if (!element.data.isEmpty()) { | |
| 517 // WebKit sometimes gives up empty data to append. These aren't | |
| 518 // necessary so we just optimize those out here. | |
| 519 request_body->AppendBytes( | |
| 520 element.data.data(), static_cast<int>(element.data.size())); | |
| 521 } | |
| 522 break; | |
| 523 case WebHTTPBody::Element::TypeFile: | |
| 524 if (element.fileLength == -1) { | |
| 525 request_body->AppendFileRange( | |
| 526 base::FilePath::FromUTF16Unsafe(element.filePath), | |
| 527 0, kuint64max, base::Time()); | |
| 528 } else { | |
| 529 request_body->AppendFileRange( | |
| 530 base::FilePath::FromUTF16Unsafe(element.filePath), | |
| 531 static_cast<uint64>(element.fileStart), | |
| 532 static_cast<uint64>(element.fileLength), | |
| 533 base::Time::FromDoubleT(element.modificationTime)); | |
| 534 } | |
| 535 break; | |
| 536 case WebHTTPBody::Element::TypeURL: { | |
| 537 GURL url = GURL(element.url); | |
| 538 DCHECK(url.SchemeIsFileSystem()); | |
| 539 request_body->AppendFileSystemFileRange( | |
| 540 url, | |
| 541 static_cast<uint64>(element.fileStart), | |
| 542 static_cast<uint64>(element.fileLength), | |
| 543 base::Time::FromDoubleT(element.modificationTime)); | |
| 544 break; | |
| 545 } | |
| 546 case WebHTTPBody::Element::TypeBlob: | |
| 547 request_body->AppendBlob(GURL(element.blobURL)); | |
| 548 break; | |
| 549 default: | |
| 550 NOTREACHED(); | |
| 551 } | |
| 552 } | |
| 553 request_body->set_identifier(request.httpBody().identifier()); | |
| 554 bridge_->SetRequestBody(request_body.get()); | |
| 555 } | |
| 556 | |
| 557 if (sync_load_response) { | |
| 558 bridge_->SyncLoad(sync_load_response); | |
| 559 return; | |
| 560 } | |
| 561 | |
| 562 if (bridge_->Start(this)) { | |
| 563 AddRef(); // Balanced in OnCompletedRequest | |
| 564 } else { | |
| 565 bridge_.reset(); | |
| 566 } | |
| 567 } | |
| 568 | |
| 569 void WebURLLoaderImpl::Context::OnUploadProgress(uint64 position, uint64 size) { | |
| 570 if (client_) | |
| 571 client_->didSendData(loader_, position, size); | |
| 572 } | |
| 573 | |
| 574 bool WebURLLoaderImpl::Context::OnReceivedRedirect( | |
| 575 const GURL& new_url, | |
| 576 const ResourceResponseInfo& info, | |
| 577 bool* has_new_first_party_for_cookies, | |
| 578 GURL* new_first_party_for_cookies) { | |
| 579 if (!client_) | |
| 580 return false; | |
| 581 | |
| 582 WebURLResponse response; | |
| 583 response.initialize(); | |
| 584 PopulateURLResponse(request_.url(), info, &response); | |
| 585 | |
| 586 // TODO(darin): We lack sufficient information to construct the actual | |
| 587 // request that resulted from the redirect. | |
| 588 WebURLRequest new_request(new_url); | |
| 589 new_request.setFirstPartyForCookies(request_.firstPartyForCookies()); | |
| 590 new_request.setDownloadToFile(request_.downloadToFile()); | |
| 591 | |
| 592 WebString referrer_string = WebString::fromUTF8("Referer"); | |
| 593 WebString referrer = WebSecurityPolicy::generateReferrerHeader( | |
| 594 referrer_policy_, | |
| 595 new_url, | |
| 596 request_.httpHeaderField(referrer_string)); | |
| 597 if (!referrer.isEmpty()) | |
| 598 new_request.setHTTPHeaderField(referrer_string, referrer); | |
| 599 | |
| 600 if (response.httpStatusCode() == 307) | |
| 601 new_request.setHTTPMethod(request_.httpMethod()); | |
| 602 | |
| 603 client_->willSendRequest(loader_, new_request, response); | |
| 604 request_ = new_request; | |
| 605 *has_new_first_party_for_cookies = true; | |
| 606 *new_first_party_for_cookies = request_.firstPartyForCookies(); | |
| 607 | |
| 608 // Only follow the redirect if WebKit left the URL unmodified. | |
| 609 if (new_url == GURL(new_request.url())) | |
| 610 return true; | |
| 611 | |
| 612 // We assume that WebKit only changes the URL to suppress a redirect, and we | |
| 613 // assume that it does so by setting it to be invalid. | |
| 614 DCHECK(!new_request.url().isValid()); | |
| 615 return false; | |
| 616 } | |
| 617 | |
| 618 void WebURLLoaderImpl::Context::OnReceivedResponse( | |
| 619 const ResourceResponseInfo& info) { | |
| 620 if (!client_) | |
| 621 return; | |
| 622 | |
| 623 WebURLResponse response; | |
| 624 response.initialize(); | |
| 625 PopulateURLResponse(request_.url(), info, &response); | |
| 626 | |
| 627 bool show_raw_listing = (GURL(request_.url()).query() == "raw"); | |
| 628 | |
| 629 if (info.mime_type == "text/vnd.chromium.ftp-dir") { | |
| 630 if (show_raw_listing) { | |
| 631 // Set the MIME type to plain text to prevent any active content. | |
| 632 response.setMIMEType("text/plain"); | |
| 633 } else { | |
| 634 // We're going to produce a parsed listing in HTML. | |
| 635 response.setMIMEType("text/html"); | |
| 636 } | |
| 637 } | |
| 638 | |
| 639 scoped_refptr<Context> protect(this); | |
| 640 client_->didReceiveResponse(loader_, response); | |
| 641 | |
| 642 // We may have been cancelled after didReceiveResponse, which would leave us | |
| 643 // without a client and therefore without much need to do further handling. | |
| 644 if (!client_) | |
| 645 return; | |
| 646 | |
| 647 DCHECK(!ftp_listing_delegate_.get()); | |
| 648 DCHECK(!multipart_delegate_.get()); | |
| 649 if (info.headers.get() && info.mime_type == "multipart/x-mixed-replace") { | |
| 650 std::string content_type; | |
| 651 info.headers->EnumerateHeader(NULL, "content-type", &content_type); | |
| 652 | |
| 653 std::string mime_type; | |
| 654 std::string charset; | |
| 655 bool had_charset = false; | |
| 656 std::string boundary; | |
| 657 net::HttpUtil::ParseContentType(content_type, &mime_type, &charset, | |
| 658 &had_charset, &boundary); | |
| 659 TrimString(boundary, " \"", &boundary); | |
| 660 | |
| 661 // If there's no boundary, just handle the request normally. In the gecko | |
| 662 // code, nsMultiMixedConv::OnStartRequest throws an exception. | |
| 663 if (!boundary.empty()) { | |
| 664 multipart_delegate_.reset( | |
| 665 new MultipartResponseDelegate(client_, loader_, response, boundary)); | |
| 666 } | |
| 667 } else if (info.mime_type == "text/vnd.chromium.ftp-dir" && | |
| 668 !show_raw_listing) { | |
| 669 ftp_listing_delegate_.reset( | |
| 670 new FtpDirectoryListingResponseDelegate(client_, loader_, response)); | |
| 671 } | |
| 672 } | |
| 673 | |
| 674 void WebURLLoaderImpl::Context::OnDownloadedData(int len) { | |
| 675 if (client_) | |
| 676 client_->didDownloadData(loader_, len); | |
| 677 } | |
| 678 | |
| 679 void WebURLLoaderImpl::Context::OnReceivedData(const char* data, | |
| 680 int data_length, | |
| 681 int encoded_data_length) { | |
| 682 if (!client_) | |
| 683 return; | |
| 684 | |
| 685 if (ftp_listing_delegate_) { | |
| 686 // The FTP listing delegate will make the appropriate calls to | |
| 687 // client_->didReceiveData and client_->didReceiveResponse. | |
| 688 ftp_listing_delegate_->OnReceivedData(data, data_length); | |
| 689 } else if (multipart_delegate_) { | |
| 690 // The multipart delegate will make the appropriate calls to | |
| 691 // client_->didReceiveData and client_->didReceiveResponse. | |
| 692 multipart_delegate_->OnReceivedData(data, data_length, encoded_data_length); | |
| 693 } else { | |
| 694 client_->didReceiveData(loader_, data, data_length, encoded_data_length); | |
| 695 } | |
| 696 } | |
| 697 | |
| 698 void WebURLLoaderImpl::Context::OnReceivedCachedMetadata( | |
| 699 const char* data, int len) { | |
| 700 if (client_) | |
| 701 client_->didReceiveCachedMetadata(loader_, data, len); | |
| 702 } | |
| 703 | |
| 704 void WebURLLoaderImpl::Context::OnCompletedRequest( | |
| 705 int error_code, | |
| 706 bool was_ignored_by_handler, | |
| 707 const std::string& security_info, | |
| 708 const base::TimeTicks& completion_time) { | |
| 709 if (ftp_listing_delegate_) { | |
| 710 ftp_listing_delegate_->OnCompletedRequest(); | |
| 711 ftp_listing_delegate_.reset(NULL); | |
| 712 } else if (multipart_delegate_) { | |
| 713 multipart_delegate_->OnCompletedRequest(); | |
| 714 multipart_delegate_.reset(NULL); | |
| 715 } | |
| 716 | |
| 717 // Prevent any further IPC to the browser now that we're complete, but | |
| 718 // don't delete it to keep any downloaded temp files alive. | |
| 719 DCHECK(!completed_bridge_.get()); | |
| 720 completed_bridge_.swap(bridge_); | |
| 721 | |
| 722 if (client_) { | |
| 723 if (error_code != net::OK) { | |
| 724 client_->didFail(loader_, CreateError(request_.url(), error_code)); | |
| 725 } else { | |
| 726 client_->didFinishLoading( | |
| 727 loader_, (completion_time - TimeTicks()).InSecondsF()); | |
| 728 } | |
| 729 } | |
| 730 | |
| 731 // We are done with the bridge now, and so we need to release the reference | |
| 732 // to ourselves that we took on behalf of the bridge. This may cause our | |
| 733 // destruction. | |
| 734 Release(); | |
| 735 } | |
| 736 | |
| 737 bool WebURLLoaderImpl::Context::CanHandleDataURL(const GURL& url) const { | |
| 738 DCHECK(url.SchemeIs("data")); | |
| 739 | |
| 740 // Optimize for the case where we can handle a data URL locally. We must | |
| 741 // skip this for data URLs targetted at frames since those could trigger a | |
| 742 // download. | |
| 743 // | |
| 744 // NOTE: We special case MIME types we can render both for performance | |
| 745 // reasons as well as to support unit tests, which do not have an underlying | |
| 746 // ResourceLoaderBridge implementation. | |
| 747 | |
| 748 #if defined(OS_ANDROID) | |
| 749 // For compatibility reasons on Android we need to expose top-level data:// | |
| 750 // to the browser. | |
| 751 if (request_.targetType() == WebURLRequest::TargetIsMainFrame) | |
| 752 return false; | |
| 753 #endif | |
| 754 | |
| 755 if (request_.targetType() != WebURLRequest::TargetIsMainFrame && | |
| 756 request_.targetType() != WebURLRequest::TargetIsSubframe) | |
| 757 return true; | |
| 758 | |
| 759 std::string mime_type, unused_charset; | |
| 760 if (net::DataURL::Parse(url, &mime_type, &unused_charset, NULL) && | |
| 761 net::IsSupportedMimeType(mime_type)) | |
| 762 return true; | |
| 763 | |
| 764 return false; | |
| 765 } | |
| 766 | |
| 767 void WebURLLoaderImpl::Context::HandleDataURL() { | |
| 768 ResourceResponseInfo info; | |
| 769 int error_code; | |
| 770 std::string data; | |
| 771 | |
| 772 if (GetInfoFromDataURL(request_.url(), &info, &data, &error_code)) { | |
| 773 OnReceivedResponse(info); | |
| 774 if (!data.empty()) | |
| 775 OnReceivedData(data.data(), data.size(), 0); | |
| 776 } | |
| 777 | |
| 778 OnCompletedRequest(error_code, false, info.security_info, | |
| 779 base::TimeTicks::Now()); | |
| 780 } | |
| 781 | |
| 782 // WebURLLoaderImpl ----------------------------------------------------------- | |
| 783 | |
| 784 WebURLLoaderImpl::WebURLLoaderImpl(WebKitPlatformSupportImpl* platform) | |
| 785 : context_(new Context(this)), | |
| 786 platform_(platform) { | |
| 787 } | |
| 788 | |
| 789 WebURLLoaderImpl::~WebURLLoaderImpl() { | |
| 790 cancel(); | |
| 791 } | |
| 792 | |
| 793 WebURLError WebURLLoaderImpl::CreateError(const WebURL& unreachable_url, | |
| 794 int reason) { | |
| 795 WebURLError error; | |
| 796 error.domain = WebString::fromUTF8(net::kErrorDomain); | |
| 797 error.reason = reason; | |
| 798 error.unreachableURL = unreachable_url; | |
| 799 if (reason == net::ERR_ABORTED) { | |
| 800 error.isCancellation = true; | |
| 801 } else if (reason == net::ERR_TEMPORARILY_THROTTLED) { | |
| 802 error.localizedDescription = WebString::fromUTF8( | |
| 803 kThrottledErrorDescription); | |
| 804 } | |
| 805 return error; | |
| 806 } | |
| 807 | |
| 808 void WebURLLoaderImpl::loadSynchronously(const WebURLRequest& request, | |
| 809 WebURLResponse& response, | |
| 810 WebURLError& error, | |
| 811 WebData& data) { | |
| 812 ResourceLoaderBridge::SyncLoadResponse sync_load_response; | |
| 813 context_->Start(request, &sync_load_response, platform_); | |
| 814 | |
| 815 const GURL& final_url = sync_load_response.url; | |
| 816 | |
| 817 // TODO(tc): For file loads, we may want to include a more descriptive | |
| 818 // status code or status text. | |
| 819 int error_code = sync_load_response.error_code; | |
| 820 if (error_code != net::OK) { | |
| 821 response.setURL(final_url); | |
| 822 error.domain = WebString::fromUTF8(net::kErrorDomain); | |
| 823 error.reason = error_code; | |
| 824 error.unreachableURL = final_url; | |
| 825 return; | |
| 826 } | |
| 827 | |
| 828 PopulateURLResponse(final_url, sync_load_response, &response); | |
| 829 | |
| 830 data.assign(sync_load_response.data.data(), | |
| 831 sync_load_response.data.size()); | |
| 832 } | |
| 833 | |
| 834 void WebURLLoaderImpl::loadAsynchronously(const WebURLRequest& request, | |
| 835 WebURLLoaderClient* client) { | |
| 836 DCHECK(!context_->client()); | |
| 837 | |
| 838 context_->set_client(client); | |
| 839 context_->Start(request, NULL, platform_); | |
| 840 } | |
| 841 | |
| 842 void WebURLLoaderImpl::cancel() { | |
| 843 context_->Cancel(); | |
| 844 } | |
| 845 | |
| 846 void WebURLLoaderImpl::setDefersLoading(bool value) { | |
| 847 context_->SetDefersLoading(value); | |
| 848 } | |
| 849 | |
| 850 void WebURLLoaderImpl::didChangePriority(WebURLRequest::Priority new_priority) { | |
| 851 context_->DidChangePriority(new_priority); | |
| 852 } | |
| 853 | |
| 854 } // namespace webkit_glue | |
| OLD | NEW |