Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(405)

Side by Side Diff: webkit/glue/weburlloader_impl.cc

Issue 20003004: reland crrev.com/212927 Move webkitplatformsupport_impl and related from glue to child (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: rebase & allocator dep for components_unittests in shared_library2 Created 7 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « webkit/glue/weburlloader_impl.h ('k') | webkit/glue/weburlrequest_extradata_impl.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 // An implementation of WebURLLoader in terms of ResourceLoaderBridge.
6
7 #include "webkit/glue/weburlloader_impl.h"
8
9 #include "base/bind.h"
10 #include "base/files/file_path.h"
11 #include "base/memory/scoped_ptr.h"
12 #include "base/message_loop/message_loop.h"
13 #include "base/process_util.h"
14 #include "base/strings/string_util.h"
15 #include "base/time/time.h"
16 #include "net/base/data_url.h"
17 #include "net/base/load_flags.h"
18 #include "net/base/mime_util.h"
19 #include "net/base/net_errors.h"
20 #include "net/base/net_util.h"
21 #include "net/http/http_response_headers.h"
22 #include "net/http/http_util.h"
23 #include "third_party/WebKit/public/platform/WebHTTPHeaderVisitor.h"
24 #include "third_party/WebKit/public/platform/WebHTTPLoadInfo.h"
25 #include "third_party/WebKit/public/platform/WebURL.h"
26 #include "third_party/WebKit/public/platform/WebURLError.h"
27 #include "third_party/WebKit/public/platform/WebURLLoaderClient.h"
28 #include "third_party/WebKit/public/platform/WebURLLoadTiming.h"
29 #include "third_party/WebKit/public/platform/WebURLRequest.h"
30 #include "third_party/WebKit/public/platform/WebURLResponse.h"
31 #include "third_party/WebKit/public/web/WebSecurityPolicy.h"
32 #include "webkit/common/resource_request_body.h"
33 #include "webkit/glue/ftp_directory_listing_response_delegate.h"
34 #include "webkit/glue/multipart_response_delegate.h"
35 #include "webkit/glue/resource_loader_bridge.h"
36 #include "webkit/glue/webkitplatformsupport_impl.h"
37 #include "webkit/glue/weburlrequest_extradata_impl.h"
38 #include "webkit/glue/weburlresponse_extradata_impl.h"
39
40 using base::Time;
41 using base::TimeTicks;
42 using WebKit::WebData;
43 using WebKit::WebHTTPBody;
44 using WebKit::WebHTTPHeaderVisitor;
45 using WebKit::WebHTTPLoadInfo;
46 using WebKit::WebReferrerPolicy;
47 using WebKit::WebSecurityPolicy;
48 using WebKit::WebString;
49 using WebKit::WebURL;
50 using WebKit::WebURLError;
51 using WebKit::WebURLLoadTiming;
52 using WebKit::WebURLLoader;
53 using WebKit::WebURLLoaderClient;
54 using WebKit::WebURLRequest;
55 using WebKit::WebURLResponse;
56
57 namespace webkit_glue {
58
59 // Utilities ------------------------------------------------------------------
60
61 namespace {
62
63 const char kThrottledErrorDescription[] =
64 "Request throttled. Visit http://dev.chromium.org/throttling for more "
65 "information.";
66
67 class HeaderFlattener : public WebHTTPHeaderVisitor {
68 public:
69 explicit HeaderFlattener(int load_flags)
70 : load_flags_(load_flags),
71 has_accept_header_(false) {
72 }
73
74 virtual void visitHeader(const WebString& name, const WebString& value) {
75 // TODO(darin): is UTF-8 really correct here? It is if the strings are
76 // already ASCII (i.e., if they are already escaped properly).
77 const std::string& name_utf8 = name.utf8();
78 const std::string& value_utf8 = value.utf8();
79
80 // Skip over referrer headers found in the header map because we already
81 // pulled it out as a separate parameter.
82 if (LowerCaseEqualsASCII(name_utf8, "referer"))
83 return;
84
85 // Skip over "Cache-Control: max-age=0" header if the corresponding
86 // load flag is already specified. FrameLoader sets both the flag and
87 // the extra header -- the extra header is redundant since our network
88 // implementation will add the necessary headers based on load flags.
89 // See http://code.google.com/p/chromium/issues/detail?id=3434.
90 if ((load_flags_ & net::LOAD_VALIDATE_CACHE) &&
91 LowerCaseEqualsASCII(name_utf8, "cache-control") &&
92 LowerCaseEqualsASCII(value_utf8, "max-age=0"))
93 return;
94
95 if (LowerCaseEqualsASCII(name_utf8, "accept"))
96 has_accept_header_ = true;
97
98 if (!buffer_.empty())
99 buffer_.append("\r\n");
100 buffer_.append(name_utf8 + ": " + value_utf8);
101 }
102
103 const std::string& GetBuffer() {
104 // In some cases, WebKit doesn't add an Accept header, but not having the
105 // header confuses some web servers. See bug 808613.
106 if (!has_accept_header_) {
107 if (!buffer_.empty())
108 buffer_.append("\r\n");
109 buffer_.append("Accept: */*");
110 has_accept_header_ = true;
111 }
112 return buffer_;
113 }
114
115 private:
116 int load_flags_;
117 std::string buffer_;
118 bool has_accept_header_;
119 };
120
121 // Extracts the information from a data: url.
122 bool GetInfoFromDataURL(const GURL& url,
123 ResourceResponseInfo* info,
124 std::string* data,
125 int* error_code) {
126 std::string mime_type;
127 std::string charset;
128 if (net::DataURL::Parse(url, &mime_type, &charset, data)) {
129 *error_code = net::OK;
130 // Assure same time for all time fields of data: URLs.
131 Time now = Time::Now();
132 info->load_timing.request_start = TimeTicks::Now();
133 info->load_timing.request_start_time = now;
134 info->request_time = now;
135 info->response_time = now;
136 info->headers = NULL;
137 info->mime_type.swap(mime_type);
138 info->charset.swap(charset);
139 info->security_info.clear();
140 info->content_length = data->length();
141 info->encoded_data_length = 0;
142
143 return true;
144 }
145
146 *error_code = net::ERR_INVALID_URL;
147 return false;
148 }
149
150 typedef ResourceDevToolsInfo::HeadersVector HeadersVector;
151
152 // Converts timing data from |load_timing| to the format used by WebKit.
153 void PopulateURLLoadTiming(const net::LoadTimingInfo& load_timing,
154 WebURLLoadTiming* url_timing) {
155 DCHECK(!load_timing.request_start.is_null());
156
157 const TimeTicks kNullTicks;
158 url_timing->initialize();
159 url_timing->setRequestTime(
160 (load_timing.request_start - kNullTicks).InSecondsF());
161 url_timing->setProxyStart(
162 (load_timing.proxy_resolve_start - kNullTicks).InSecondsF());
163 url_timing->setProxyEnd(
164 (load_timing.proxy_resolve_end - kNullTicks).InSecondsF());
165 url_timing->setDNSStart(
166 (load_timing.connect_timing.dns_start - kNullTicks).InSecondsF());
167 url_timing->setDNSEnd(
168 (load_timing.connect_timing.dns_end - kNullTicks).InSecondsF());
169 url_timing->setConnectStart(
170 (load_timing.connect_timing.connect_start - kNullTicks).InSecondsF());
171 url_timing->setConnectEnd(
172 (load_timing.connect_timing.connect_end - kNullTicks).InSecondsF());
173 url_timing->setSSLStart(
174 (load_timing.connect_timing.ssl_start - kNullTicks).InSecondsF());
175 url_timing->setSSLEnd(
176 (load_timing.connect_timing.ssl_end - kNullTicks).InSecondsF());
177 url_timing->setSendStart(
178 (load_timing.send_start - kNullTicks).InSecondsF());
179 url_timing->setSendEnd(
180 (load_timing.send_end - kNullTicks).InSecondsF());
181 url_timing->setReceiveHeadersEnd(
182 (load_timing.receive_headers_end - kNullTicks).InSecondsF());
183 }
184
185 void PopulateURLResponse(
186 const GURL& url,
187 const ResourceResponseInfo& info,
188 WebURLResponse* response) {
189 response->setURL(url);
190 response->setResponseTime(info.response_time.ToDoubleT());
191 response->setMIMEType(WebString::fromUTF8(info.mime_type));
192 response->setTextEncodingName(WebString::fromUTF8(info.charset));
193 response->setExpectedContentLength(info.content_length);
194 response->setSecurityInfo(info.security_info);
195 response->setAppCacheID(info.appcache_id);
196 response->setAppCacheManifestURL(info.appcache_manifest_url);
197 response->setWasCached(!info.load_timing.request_start_time.is_null() &&
198 info.response_time < info.load_timing.request_start_time);
199 response->setRemoteIPAddress(
200 WebString::fromUTF8(info.socket_address.host()));
201 response->setRemotePort(info.socket_address.port());
202 response->setConnectionID(info.load_timing.socket_log_id);
203 response->setConnectionReused(info.load_timing.socket_reused);
204 response->setDownloadFilePath(info.download_file_path.AsUTF16Unsafe());
205 WebURLResponseExtraDataImpl* extra_data =
206 new WebURLResponseExtraDataImpl(info.npn_negotiated_protocol);
207 response->setExtraData(extra_data);
208 extra_data->set_was_fetched_via_spdy(info.was_fetched_via_spdy);
209 extra_data->set_was_npn_negotiated(info.was_npn_negotiated);
210 extra_data->set_was_alternate_protocol_available(
211 info.was_alternate_protocol_available);
212 extra_data->set_connection_info(info.connection_info);
213 extra_data->set_was_fetched_via_proxy(info.was_fetched_via_proxy);
214
215 // If there's no received headers end time, don't set load timing. This is
216 // the case for non-HTTP requests, requests that don't go over the wire, and
217 // certain error cases.
218 if (!info.load_timing.receive_headers_end.is_null()) {
219 WebURLLoadTiming timing;
220 PopulateURLLoadTiming(info.load_timing, &timing);
221 response->setLoadTiming(timing);
222 }
223
224 if (info.devtools_info.get()) {
225 WebHTTPLoadInfo load_info;
226
227 load_info.setHTTPStatusCode(info.devtools_info->http_status_code);
228 load_info.setHTTPStatusText(WebString::fromUTF8(
229 info.devtools_info->http_status_text));
230 load_info.setEncodedDataLength(info.encoded_data_length);
231
232 load_info.setRequestHeadersText(WebString::fromUTF8(
233 info.devtools_info->request_headers_text));
234 load_info.setResponseHeadersText(WebString::fromUTF8(
235 info.devtools_info->response_headers_text));
236 const HeadersVector& request_headers = info.devtools_info->request_headers;
237 for (HeadersVector::const_iterator it = request_headers.begin();
238 it != request_headers.end(); ++it) {
239 load_info.addRequestHeader(WebString::fromUTF8(it->first),
240 WebString::fromUTF8(it->second));
241 }
242 const HeadersVector& response_headers =
243 info.devtools_info->response_headers;
244 for (HeadersVector::const_iterator it = response_headers.begin();
245 it != response_headers.end(); ++it) {
246 load_info.addResponseHeader(WebString::fromUTF8(it->first),
247 WebString::fromUTF8(it->second));
248 }
249 response->setHTTPLoadInfo(load_info);
250 }
251
252 const net::HttpResponseHeaders* headers = info.headers.get();
253 if (!headers)
254 return;
255
256 WebURLResponse::HTTPVersion version = WebURLResponse::Unknown;
257 if (headers->GetHttpVersion() == net::HttpVersion(0, 9))
258 version = WebURLResponse::HTTP_0_9;
259 else if (headers->GetHttpVersion() == net::HttpVersion(1, 0))
260 version = WebURLResponse::HTTP_1_0;
261 else if (headers->GetHttpVersion() == net::HttpVersion(1, 1))
262 version = WebURLResponse::HTTP_1_1;
263 response->setHTTPVersion(version);
264 response->setHTTPStatusCode(headers->response_code());
265 response->setHTTPStatusText(WebString::fromUTF8(headers->GetStatusText()));
266
267 // TODO(darin): We should leverage HttpResponseHeaders for this, and this
268 // should be using the same code as ResourceDispatcherHost.
269 // TODO(jungshik): Figure out the actual value of the referrer charset and
270 // pass it to GetSuggestedFilename.
271 std::string value;
272 headers->EnumerateHeader(NULL, "content-disposition", &value);
273 response->setSuggestedFileName(
274 net::GetSuggestedFilename(url,
275 value,
276 std::string(), // referrer_charset
277 std::string(), // suggested_name
278 std::string(), // mime_type
279 std::string())); // default_name
280
281 Time time_val;
282 if (headers->GetLastModifiedValue(&time_val))
283 response->setLastModifiedDate(time_val.ToDoubleT());
284
285 // Build up the header map.
286 void* iter = NULL;
287 std::string name;
288 while (headers->EnumerateHeaderLines(&iter, &name, &value)) {
289 response->addHTTPHeaderField(WebString::fromUTF8(name),
290 WebString::fromUTF8(value));
291 }
292 }
293
294 net::RequestPriority ConvertWebKitPriorityToNetPriority(
295 const WebURLRequest::Priority& priority) {
296 switch (priority) {
297 case WebURLRequest::PriorityVeryHigh:
298 return net::HIGHEST;
299
300 case WebURLRequest::PriorityHigh:
301 return net::MEDIUM;
302
303 case WebURLRequest::PriorityMedium:
304 return net::LOW;
305
306 case WebURLRequest::PriorityLow:
307 return net::LOWEST;
308
309 case WebURLRequest::PriorityVeryLow:
310 return net::IDLE;
311
312 case WebURLRequest::PriorityUnresolved:
313 default:
314 NOTREACHED();
315 return net::LOW;
316 }
317 }
318
319 } // namespace
320
321 // WebURLLoaderImpl::Context --------------------------------------------------
322
323 // This inner class exists since the WebURLLoader may be deleted while inside a
324 // call to WebURLLoaderClient. The bridge requires its Peer to stay alive
325 // until it receives OnCompletedRequest.
326 class WebURLLoaderImpl::Context : public base::RefCounted<Context>,
327 public ResourceLoaderBridge::Peer {
328 public:
329 explicit Context(WebURLLoaderImpl* loader);
330
331 WebURLLoaderClient* client() const { return client_; }
332 void set_client(WebURLLoaderClient* client) { client_ = client; }
333
334 void Cancel();
335 void SetDefersLoading(bool value);
336 void DidChangePriority(WebURLRequest::Priority new_priority);
337 void Start(
338 const WebURLRequest& request,
339 ResourceLoaderBridge::SyncLoadResponse* sync_load_response,
340 WebKitPlatformSupportImpl* platform);
341
342 // ResourceLoaderBridge::Peer methods:
343 virtual void OnUploadProgress(uint64 position, uint64 size) OVERRIDE;
344 virtual bool OnReceivedRedirect(
345 const GURL& new_url,
346 const ResourceResponseInfo& info,
347 bool* has_new_first_party_for_cookies,
348 GURL* new_first_party_for_cookies) OVERRIDE;
349 virtual void OnReceivedResponse(const ResourceResponseInfo& info) OVERRIDE;
350 virtual void OnDownloadedData(int len) OVERRIDE;
351 virtual void OnReceivedData(const char* data,
352 int data_length,
353 int encoded_data_length) OVERRIDE;
354 virtual void OnReceivedCachedMetadata(const char* data, int len) OVERRIDE;
355 virtual void OnCompletedRequest(
356 int error_code,
357 bool was_ignored_by_handler,
358 const std::string& security_info,
359 const base::TimeTicks& completion_time) OVERRIDE;
360
361 private:
362 friend class base::RefCounted<Context>;
363 virtual ~Context() {}
364
365 // We can optimize the handling of data URLs in most cases.
366 bool CanHandleDataURL(const GURL& url) const;
367 void HandleDataURL();
368
369 WebURLLoaderImpl* loader_;
370 WebURLRequest request_;
371 WebURLLoaderClient* client_;
372 WebReferrerPolicy referrer_policy_;
373 scoped_ptr<ResourceLoaderBridge> bridge_;
374 scoped_ptr<FtpDirectoryListingResponseDelegate> ftp_listing_delegate_;
375 scoped_ptr<MultipartResponseDelegate> multipart_delegate_;
376 scoped_ptr<ResourceLoaderBridge> completed_bridge_;
377 };
378
379 WebURLLoaderImpl::Context::Context(WebURLLoaderImpl* loader)
380 : loader_(loader),
381 client_(NULL),
382 referrer_policy_(WebKit::WebReferrerPolicyDefault) {
383 }
384
385 void WebURLLoaderImpl::Context::Cancel() {
386 // The bridge will still send OnCompletedRequest, which will Release() us, so
387 // we don't do that here.
388 if (bridge_)
389 bridge_->Cancel();
390
391 // Ensure that we do not notify the multipart delegate anymore as it has
392 // its own pointer to the client.
393 if (multipart_delegate_)
394 multipart_delegate_->Cancel();
395
396 // Do not make any further calls to the client.
397 client_ = NULL;
398 loader_ = NULL;
399 }
400
401 void WebURLLoaderImpl::Context::SetDefersLoading(bool value) {
402 if (bridge_)
403 bridge_->SetDefersLoading(value);
404 }
405
406 void WebURLLoaderImpl::Context::DidChangePriority(
407 WebURLRequest::Priority new_priority) {
408 if (bridge_)
409 bridge_->DidChangePriority(
410 ConvertWebKitPriorityToNetPriority(new_priority));
411 }
412
413 void WebURLLoaderImpl::Context::Start(
414 const WebURLRequest& request,
415 ResourceLoaderBridge::SyncLoadResponse* sync_load_response,
416 WebKitPlatformSupportImpl* platform) {
417 DCHECK(!bridge_.get());
418
419 request_ = request; // Save the request.
420
421 GURL url = request.url();
422 if (url.SchemeIs("data") && CanHandleDataURL(url)) {
423 if (sync_load_response) {
424 // This is a sync load. Do the work now.
425 sync_load_response->url = url;
426 std::string data;
427 GetInfoFromDataURL(sync_load_response->url, sync_load_response,
428 &sync_load_response->data,
429 &sync_load_response->error_code);
430 } else {
431 AddRef(); // Balanced in OnCompletedRequest
432 base::MessageLoop::current()->PostTask(
433 FROM_HERE, base::Bind(&Context::HandleDataURL, this));
434 }
435 return;
436 }
437
438 GURL referrer_url(
439 request.httpHeaderField(WebString::fromUTF8("Referer")).utf8());
440 const std::string& method = request.httpMethod().utf8();
441
442 int load_flags = net::LOAD_NORMAL;
443 switch (request.cachePolicy()) {
444 case WebURLRequest::ReloadIgnoringCacheData:
445 // Required by LayoutTests/http/tests/misc/refresh-headers.php
446 load_flags |= net::LOAD_VALIDATE_CACHE;
447 break;
448 case WebURLRequest::ReturnCacheDataElseLoad:
449 load_flags |= net::LOAD_PREFERRING_CACHE;
450 break;
451 case WebURLRequest::ReturnCacheDataDontLoad:
452 load_flags |= net::LOAD_ONLY_FROM_CACHE;
453 break;
454 case WebURLRequest::UseProtocolCachePolicy:
455 break;
456 }
457
458 if (request.reportUploadProgress())
459 load_flags |= net::LOAD_ENABLE_UPLOAD_PROGRESS;
460 if (request.reportLoadTiming())
461 load_flags |= net::LOAD_ENABLE_LOAD_TIMING;
462 if (request.reportRawHeaders())
463 load_flags |= net::LOAD_REPORT_RAW_HEADERS;
464
465 if (!request.allowCookies() || !request.allowStoredCredentials()) {
466 load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
467 load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
468 }
469
470 if (!request.allowStoredCredentials())
471 load_flags |= net::LOAD_DO_NOT_SEND_AUTH_DATA;
472
473 HeaderFlattener flattener(load_flags);
474 request.visitHTTPHeaderFields(&flattener);
475
476 // TODO(brettw) this should take parameter encoding into account when
477 // creating the GURLs.
478
479 ResourceLoaderBridge::RequestInfo request_info;
480 request_info.method = method;
481 request_info.url = url;
482 request_info.first_party_for_cookies = request.firstPartyForCookies();
483 request_info.referrer = referrer_url;
484 request_info.headers = flattener.GetBuffer();
485 request_info.load_flags = load_flags;
486 // requestor_pid only needs to be non-zero if the request originates outside
487 // the render process, so we can use requestorProcessID even for requests
488 // from in-process plugins.
489 request_info.requestor_pid = request.requestorProcessID();
490 request_info.request_type =
491 ResourceType::FromTargetType(request.targetType());
492 request_info.priority =
493 ConvertWebKitPriorityToNetPriority(request.priority());
494 request_info.appcache_host_id = request.appCacheHostID();
495 request_info.routing_id = request.requestorID();
496 request_info.download_to_file = request.downloadToFile();
497 request_info.has_user_gesture = request.hasUserGesture();
498 request_info.extra_data = request.extraData();
499 if (request.extraData()) {
500 referrer_policy_ = static_cast<WebURLRequestExtraDataImpl*>(
501 request.extraData())->referrer_policy();
502 request_info.referrer_policy = referrer_policy_;
503 }
504 bridge_.reset(platform->CreateResourceLoader(request_info));
505
506 if (!request.httpBody().isNull()) {
507 // GET and HEAD requests shouldn't have http bodies.
508 DCHECK(method != "GET" && method != "HEAD");
509 const WebHTTPBody& httpBody = request.httpBody();
510 size_t i = 0;
511 WebHTTPBody::Element element;
512 scoped_refptr<ResourceRequestBody> request_body = new ResourceRequestBody;
513 while (httpBody.elementAt(i++, element)) {
514 switch (element.type) {
515 case WebHTTPBody::Element::TypeData:
516 if (!element.data.isEmpty()) {
517 // WebKit sometimes gives up empty data to append. These aren't
518 // necessary so we just optimize those out here.
519 request_body->AppendBytes(
520 element.data.data(), static_cast<int>(element.data.size()));
521 }
522 break;
523 case WebHTTPBody::Element::TypeFile:
524 if (element.fileLength == -1) {
525 request_body->AppendFileRange(
526 base::FilePath::FromUTF16Unsafe(element.filePath),
527 0, kuint64max, base::Time());
528 } else {
529 request_body->AppendFileRange(
530 base::FilePath::FromUTF16Unsafe(element.filePath),
531 static_cast<uint64>(element.fileStart),
532 static_cast<uint64>(element.fileLength),
533 base::Time::FromDoubleT(element.modificationTime));
534 }
535 break;
536 case WebHTTPBody::Element::TypeURL: {
537 GURL url = GURL(element.url);
538 DCHECK(url.SchemeIsFileSystem());
539 request_body->AppendFileSystemFileRange(
540 url,
541 static_cast<uint64>(element.fileStart),
542 static_cast<uint64>(element.fileLength),
543 base::Time::FromDoubleT(element.modificationTime));
544 break;
545 }
546 case WebHTTPBody::Element::TypeBlob:
547 request_body->AppendBlob(GURL(element.blobURL));
548 break;
549 default:
550 NOTREACHED();
551 }
552 }
553 request_body->set_identifier(request.httpBody().identifier());
554 bridge_->SetRequestBody(request_body.get());
555 }
556
557 if (sync_load_response) {
558 bridge_->SyncLoad(sync_load_response);
559 return;
560 }
561
562 if (bridge_->Start(this)) {
563 AddRef(); // Balanced in OnCompletedRequest
564 } else {
565 bridge_.reset();
566 }
567 }
568
569 void WebURLLoaderImpl::Context::OnUploadProgress(uint64 position, uint64 size) {
570 if (client_)
571 client_->didSendData(loader_, position, size);
572 }
573
574 bool WebURLLoaderImpl::Context::OnReceivedRedirect(
575 const GURL& new_url,
576 const ResourceResponseInfo& info,
577 bool* has_new_first_party_for_cookies,
578 GURL* new_first_party_for_cookies) {
579 if (!client_)
580 return false;
581
582 WebURLResponse response;
583 response.initialize();
584 PopulateURLResponse(request_.url(), info, &response);
585
586 // TODO(darin): We lack sufficient information to construct the actual
587 // request that resulted from the redirect.
588 WebURLRequest new_request(new_url);
589 new_request.setFirstPartyForCookies(request_.firstPartyForCookies());
590 new_request.setDownloadToFile(request_.downloadToFile());
591
592 WebString referrer_string = WebString::fromUTF8("Referer");
593 WebString referrer = WebSecurityPolicy::generateReferrerHeader(
594 referrer_policy_,
595 new_url,
596 request_.httpHeaderField(referrer_string));
597 if (!referrer.isEmpty())
598 new_request.setHTTPHeaderField(referrer_string, referrer);
599
600 if (response.httpStatusCode() == 307)
601 new_request.setHTTPMethod(request_.httpMethod());
602
603 client_->willSendRequest(loader_, new_request, response);
604 request_ = new_request;
605 *has_new_first_party_for_cookies = true;
606 *new_first_party_for_cookies = request_.firstPartyForCookies();
607
608 // Only follow the redirect if WebKit left the URL unmodified.
609 if (new_url == GURL(new_request.url()))
610 return true;
611
612 // We assume that WebKit only changes the URL to suppress a redirect, and we
613 // assume that it does so by setting it to be invalid.
614 DCHECK(!new_request.url().isValid());
615 return false;
616 }
617
618 void WebURLLoaderImpl::Context::OnReceivedResponse(
619 const ResourceResponseInfo& info) {
620 if (!client_)
621 return;
622
623 WebURLResponse response;
624 response.initialize();
625 PopulateURLResponse(request_.url(), info, &response);
626
627 bool show_raw_listing = (GURL(request_.url()).query() == "raw");
628
629 if (info.mime_type == "text/vnd.chromium.ftp-dir") {
630 if (show_raw_listing) {
631 // Set the MIME type to plain text to prevent any active content.
632 response.setMIMEType("text/plain");
633 } else {
634 // We're going to produce a parsed listing in HTML.
635 response.setMIMEType("text/html");
636 }
637 }
638
639 scoped_refptr<Context> protect(this);
640 client_->didReceiveResponse(loader_, response);
641
642 // We may have been cancelled after didReceiveResponse, which would leave us
643 // without a client and therefore without much need to do further handling.
644 if (!client_)
645 return;
646
647 DCHECK(!ftp_listing_delegate_.get());
648 DCHECK(!multipart_delegate_.get());
649 if (info.headers.get() && info.mime_type == "multipart/x-mixed-replace") {
650 std::string content_type;
651 info.headers->EnumerateHeader(NULL, "content-type", &content_type);
652
653 std::string mime_type;
654 std::string charset;
655 bool had_charset = false;
656 std::string boundary;
657 net::HttpUtil::ParseContentType(content_type, &mime_type, &charset,
658 &had_charset, &boundary);
659 TrimString(boundary, " \"", &boundary);
660
661 // If there's no boundary, just handle the request normally. In the gecko
662 // code, nsMultiMixedConv::OnStartRequest throws an exception.
663 if (!boundary.empty()) {
664 multipart_delegate_.reset(
665 new MultipartResponseDelegate(client_, loader_, response, boundary));
666 }
667 } else if (info.mime_type == "text/vnd.chromium.ftp-dir" &&
668 !show_raw_listing) {
669 ftp_listing_delegate_.reset(
670 new FtpDirectoryListingResponseDelegate(client_, loader_, response));
671 }
672 }
673
674 void WebURLLoaderImpl::Context::OnDownloadedData(int len) {
675 if (client_)
676 client_->didDownloadData(loader_, len);
677 }
678
679 void WebURLLoaderImpl::Context::OnReceivedData(const char* data,
680 int data_length,
681 int encoded_data_length) {
682 if (!client_)
683 return;
684
685 if (ftp_listing_delegate_) {
686 // The FTP listing delegate will make the appropriate calls to
687 // client_->didReceiveData and client_->didReceiveResponse.
688 ftp_listing_delegate_->OnReceivedData(data, data_length);
689 } else if (multipart_delegate_) {
690 // The multipart delegate will make the appropriate calls to
691 // client_->didReceiveData and client_->didReceiveResponse.
692 multipart_delegate_->OnReceivedData(data, data_length, encoded_data_length);
693 } else {
694 client_->didReceiveData(loader_, data, data_length, encoded_data_length);
695 }
696 }
697
698 void WebURLLoaderImpl::Context::OnReceivedCachedMetadata(
699 const char* data, int len) {
700 if (client_)
701 client_->didReceiveCachedMetadata(loader_, data, len);
702 }
703
704 void WebURLLoaderImpl::Context::OnCompletedRequest(
705 int error_code,
706 bool was_ignored_by_handler,
707 const std::string& security_info,
708 const base::TimeTicks& completion_time) {
709 if (ftp_listing_delegate_) {
710 ftp_listing_delegate_->OnCompletedRequest();
711 ftp_listing_delegate_.reset(NULL);
712 } else if (multipart_delegate_) {
713 multipart_delegate_->OnCompletedRequest();
714 multipart_delegate_.reset(NULL);
715 }
716
717 // Prevent any further IPC to the browser now that we're complete, but
718 // don't delete it to keep any downloaded temp files alive.
719 DCHECK(!completed_bridge_.get());
720 completed_bridge_.swap(bridge_);
721
722 if (client_) {
723 if (error_code != net::OK) {
724 client_->didFail(loader_, CreateError(request_.url(), error_code));
725 } else {
726 client_->didFinishLoading(
727 loader_, (completion_time - TimeTicks()).InSecondsF());
728 }
729 }
730
731 // We are done with the bridge now, and so we need to release the reference
732 // to ourselves that we took on behalf of the bridge. This may cause our
733 // destruction.
734 Release();
735 }
736
737 bool WebURLLoaderImpl::Context::CanHandleDataURL(const GURL& url) const {
738 DCHECK(url.SchemeIs("data"));
739
740 // Optimize for the case where we can handle a data URL locally. We must
741 // skip this for data URLs targetted at frames since those could trigger a
742 // download.
743 //
744 // NOTE: We special case MIME types we can render both for performance
745 // reasons as well as to support unit tests, which do not have an underlying
746 // ResourceLoaderBridge implementation.
747
748 #if defined(OS_ANDROID)
749 // For compatibility reasons on Android we need to expose top-level data://
750 // to the browser.
751 if (request_.targetType() == WebURLRequest::TargetIsMainFrame)
752 return false;
753 #endif
754
755 if (request_.targetType() != WebURLRequest::TargetIsMainFrame &&
756 request_.targetType() != WebURLRequest::TargetIsSubframe)
757 return true;
758
759 std::string mime_type, unused_charset;
760 if (net::DataURL::Parse(url, &mime_type, &unused_charset, NULL) &&
761 net::IsSupportedMimeType(mime_type))
762 return true;
763
764 return false;
765 }
766
767 void WebURLLoaderImpl::Context::HandleDataURL() {
768 ResourceResponseInfo info;
769 int error_code;
770 std::string data;
771
772 if (GetInfoFromDataURL(request_.url(), &info, &data, &error_code)) {
773 OnReceivedResponse(info);
774 if (!data.empty())
775 OnReceivedData(data.data(), data.size(), 0);
776 }
777
778 OnCompletedRequest(error_code, false, info.security_info,
779 base::TimeTicks::Now());
780 }
781
782 // WebURLLoaderImpl -----------------------------------------------------------
783
784 WebURLLoaderImpl::WebURLLoaderImpl(WebKitPlatformSupportImpl* platform)
785 : context_(new Context(this)),
786 platform_(platform) {
787 }
788
789 WebURLLoaderImpl::~WebURLLoaderImpl() {
790 cancel();
791 }
792
793 WebURLError WebURLLoaderImpl::CreateError(const WebURL& unreachable_url,
794 int reason) {
795 WebURLError error;
796 error.domain = WebString::fromUTF8(net::kErrorDomain);
797 error.reason = reason;
798 error.unreachableURL = unreachable_url;
799 if (reason == net::ERR_ABORTED) {
800 error.isCancellation = true;
801 } else if (reason == net::ERR_TEMPORARILY_THROTTLED) {
802 error.localizedDescription = WebString::fromUTF8(
803 kThrottledErrorDescription);
804 }
805 return error;
806 }
807
808 void WebURLLoaderImpl::loadSynchronously(const WebURLRequest& request,
809 WebURLResponse& response,
810 WebURLError& error,
811 WebData& data) {
812 ResourceLoaderBridge::SyncLoadResponse sync_load_response;
813 context_->Start(request, &sync_load_response, platform_);
814
815 const GURL& final_url = sync_load_response.url;
816
817 // TODO(tc): For file loads, we may want to include a more descriptive
818 // status code or status text.
819 int error_code = sync_load_response.error_code;
820 if (error_code != net::OK) {
821 response.setURL(final_url);
822 error.domain = WebString::fromUTF8(net::kErrorDomain);
823 error.reason = error_code;
824 error.unreachableURL = final_url;
825 return;
826 }
827
828 PopulateURLResponse(final_url, sync_load_response, &response);
829
830 data.assign(sync_load_response.data.data(),
831 sync_load_response.data.size());
832 }
833
834 void WebURLLoaderImpl::loadAsynchronously(const WebURLRequest& request,
835 WebURLLoaderClient* client) {
836 DCHECK(!context_->client());
837
838 context_->set_client(client);
839 context_->Start(request, NULL, platform_);
840 }
841
842 void WebURLLoaderImpl::cancel() {
843 context_->Cancel();
844 }
845
846 void WebURLLoaderImpl::setDefersLoading(bool value) {
847 context_->SetDefersLoading(value);
848 }
849
850 void WebURLLoaderImpl::didChangePriority(WebURLRequest::Priority new_priority) {
851 context_->DidChangePriority(new_priority);
852 }
853
854 } // namespace webkit_glue
OLDNEW
« no previous file with comments | « webkit/glue/weburlloader_impl.h ('k') | webkit/glue/weburlrequest_extradata_impl.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698