| Index: webkit/plugins/ppapi/url_request_info_util.cc
|
| ===================================================================
|
| --- webkit/plugins/ppapi/url_request_info_util.cc (revision 213561)
|
| +++ webkit/plugins/ppapi/url_request_info_util.cc (working copy)
|
| @@ -1,205 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "webkit/plugins/ppapi/url_request_info_util.h"
|
| -
|
| -#include "base/logging.h"
|
| -#include "base/strings/string_util.h"
|
| -#include "net/http/http_util.h"
|
| -#include "ppapi/shared_impl/url_request_info_data.h"
|
| -#include "ppapi/shared_impl/var.h"
|
| -#include "ppapi/thunk/enter.h"
|
| -#include "third_party/WebKit/public/platform/WebData.h"
|
| -#include "third_party/WebKit/public/platform/WebHTTPBody.h"
|
| -#include "third_party/WebKit/public/platform/WebURL.h"
|
| -#include "third_party/WebKit/public/platform/WebURLRequest.h"
|
| -#include "third_party/WebKit/public/web/WebDocument.h"
|
| -#include "third_party/WebKit/public/web/WebFrame.h"
|
| -#include "url/gurl.h"
|
| -#include "url/url_util.h"
|
| -#include "webkit/child/weburlrequest_extradata_impl.h"
|
| -#include "webkit/plugins/ppapi/common.h"
|
| -#include "webkit/plugins/ppapi/plugin_module.h"
|
| -#include "webkit/plugins/ppapi/ppb_file_ref_impl.h"
|
| -#include "webkit/plugins/ppapi/resource_helper.h"
|
| -
|
| -using ppapi::URLRequestInfoData;
|
| -using ppapi::Resource;
|
| -using ppapi::thunk::EnterResourceNoLock;
|
| -using ppapi::thunk::PPB_FileRef_API;
|
| -using WebKit::WebData;
|
| -using WebKit::WebHTTPBody;
|
| -using WebKit::WebString;
|
| -using WebKit::WebFrame;
|
| -using WebKit::WebURL;
|
| -using WebKit::WebURLRequest;
|
| -
|
| -namespace webkit {
|
| -namespace ppapi {
|
| -
|
| -namespace {
|
| -
|
| -// Appends the file ref given the Resource pointer associated with it to the
|
| -// given HTTP body, returning true on success.
|
| -bool AppendFileRefToBody(
|
| - Resource* file_ref_resource,
|
| - int64_t start_offset,
|
| - int64_t number_of_bytes,
|
| - PP_Time expected_last_modified_time,
|
| - WebHTTPBody *http_body) {
|
| - // Get the underlying file ref impl.
|
| - if (!file_ref_resource)
|
| - return false;
|
| - PPB_FileRef_API* file_ref_api = file_ref_resource->AsPPB_FileRef_API();
|
| - if (!file_ref_api)
|
| - return false;
|
| - const PPB_FileRef_Impl* file_ref =
|
| - static_cast<PPB_FileRef_Impl*>(file_ref_api);
|
| -
|
| - PluginDelegate* plugin_delegate =
|
| - ResourceHelper::GetPluginDelegate(file_ref_resource);
|
| - if (!plugin_delegate)
|
| - return false;
|
| -
|
| - base::FilePath platform_path;
|
| - switch (file_ref->GetFileSystemType()) {
|
| - case PP_FILESYSTEMTYPE_LOCALTEMPORARY:
|
| - case PP_FILESYSTEMTYPE_LOCALPERSISTENT:
|
| - // TODO(kinuko): remove this sync IPC when we fully support
|
| - // AppendURLRange for FileSystem URL.
|
| - plugin_delegate->SyncGetFileSystemPlatformPath(
|
| - file_ref->GetFileSystemURL(), &platform_path);
|
| - break;
|
| - case PP_FILESYSTEMTYPE_EXTERNAL:
|
| - platform_path = file_ref->GetSystemPath();
|
| - break;
|
| - default:
|
| - NOTREACHED();
|
| - }
|
| - http_body->appendFileRange(
|
| - platform_path.AsUTF16Unsafe(),
|
| - start_offset,
|
| - number_of_bytes,
|
| - expected_last_modified_time);
|
| - return true;
|
| -}
|
| -
|
| -// Checks that the request data is valid. Returns false on failure. Note that
|
| -// method and header validation is done by the URL loader when the request is
|
| -// opened, and any access errors are returned asynchronously.
|
| -bool ValidateURLRequestData(const ::ppapi::URLRequestInfoData& data) {
|
| - if (data.prefetch_buffer_lower_threshold < 0 ||
|
| - data.prefetch_buffer_upper_threshold < 0 ||
|
| - data.prefetch_buffer_upper_threshold <=
|
| - data.prefetch_buffer_lower_threshold) {
|
| - return false;
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -// Ensures that the file_ref members of the given request info data are
|
| -// populated from the resource IDs. Returns true on success.
|
| -bool EnsureFileRefObjectsPopulated(::ppapi::URLRequestInfoData* data) {
|
| - // Get the Resource objects for any file refs with only host resource (this
|
| - // is the state of the request as it comes off IPC).
|
| - for (size_t i = 0; i < data->body.size(); ++i) {
|
| - URLRequestInfoData::BodyItem& item = data->body[i];
|
| - if (item.is_file && !item.file_ref.get()) {
|
| - EnterResourceNoLock<PPB_FileRef_API> enter(
|
| - item.file_ref_host_resource.host_resource(), false);
|
| - if (!enter.succeeded())
|
| - return false;
|
| - item.file_ref = enter.resource();
|
| - }
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -bool CreateWebURLRequest(::ppapi::URLRequestInfoData* data,
|
| - WebFrame* frame,
|
| - WebURLRequest* dest) {
|
| - // In the out-of-process case, we've received the URLRequestInfoData
|
| - // from the untrusted plugin and done no validation on it. We need to be
|
| - // sure it's not being malicious by checking everything for consistency.
|
| - if (!ValidateURLRequestData(*data) || !EnsureFileRefObjectsPopulated(data))
|
| - return false;
|
| -
|
| - dest->initialize();
|
| - dest->setTargetType(WebURLRequest::TargetIsObject);
|
| - dest->setURL(frame->document().completeURL(WebString::fromUTF8(
|
| - data->url)));
|
| - dest->setDownloadToFile(data->stream_to_file);
|
| - dest->setReportUploadProgress(data->record_upload_progress);
|
| -
|
| - if (!data->method.empty())
|
| - dest->setHTTPMethod(WebString::fromUTF8(data->method));
|
| -
|
| - dest->setFirstPartyForCookies(frame->document().firstPartyForCookies());
|
| -
|
| - const std::string& headers = data->headers;
|
| - if (!headers.empty()) {
|
| - net::HttpUtil::HeadersIterator it(headers.begin(), headers.end(), "\n\r");
|
| - while (it.GetNext()) {
|
| - dest->addHTTPHeaderField(
|
| - WebString::fromUTF8(it.name()),
|
| - WebString::fromUTF8(it.values()));
|
| - }
|
| - }
|
| -
|
| - // Append the upload data.
|
| - if (!data->body.empty()) {
|
| - WebHTTPBody http_body;
|
| - http_body.initialize();
|
| - for (size_t i = 0; i < data->body.size(); ++i) {
|
| - const URLRequestInfoData::BodyItem& item = data->body[i];
|
| - if (item.is_file) {
|
| - if (!AppendFileRefToBody(item.file_ref.get(),
|
| - item.start_offset,
|
| - item.number_of_bytes,
|
| - item.expected_last_modified_time,
|
| - &http_body))
|
| - return false;
|
| - } else {
|
| - DCHECK(!item.data.empty());
|
| - http_body.appendData(WebData(item.data));
|
| - }
|
| - }
|
| - dest->setHTTPBody(http_body);
|
| - }
|
| -
|
| - // Add the "Referer" header if there is a custom referrer. Such requests
|
| - // require universal access. For all other requests, "Referer" will be set
|
| - // after header security checks are done in AssociatedURLLoader.
|
| - if (data->has_custom_referrer_url && !data->custom_referrer_url.empty())
|
| - frame->setReferrerForRequest(*dest, GURL(data->custom_referrer_url));
|
| -
|
| - if (data->has_custom_content_transfer_encoding &&
|
| - !data->custom_content_transfer_encoding.empty()) {
|
| - dest->addHTTPHeaderField(
|
| - WebString::fromUTF8("Content-Transfer-Encoding"),
|
| - WebString::fromUTF8(data->custom_content_transfer_encoding));
|
| - }
|
| -
|
| - if (data->has_custom_user_agent) {
|
| - dest->setExtraData(new webkit_glue::WebURLRequestExtraDataImpl(
|
| - WebKit::WebReferrerPolicyDefault, // Ignored.
|
| - WebString::fromUTF8(data->custom_user_agent)));
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -bool URLRequestRequiresUniversalAccess(
|
| - const ::ppapi::URLRequestInfoData& data) {
|
| - return
|
| - data.has_custom_referrer_url ||
|
| - data.has_custom_content_transfer_encoding ||
|
| - data.has_custom_user_agent ||
|
| - url_util::FindAndCompareScheme(data.url, "javascript", NULL);
|
| -}
|
| -
|
| -} // namespace ppapi
|
| -} // namespace webkit
|
|
|