| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/url_request/url_request_job.h" | 5 #include "net/url_request/url_request_job.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/compiler_specific.h" | 8 #include "base/compiler_specific.h" |
| 9 #include "base/message_loop/message_loop.h" | 9 #include "base/message_loop/message_loop.h" |
| 10 #include "base/power_monitor/power_monitor.h" | 10 #include "base/power_monitor/power_monitor.h" |
| 11 #include "base/profiler/scoped_tracker.h" | 11 #include "base/profiler/scoped_tracker.h" |
| 12 #include "base/strings/string_number_conversions.h" | 12 #include "base/strings/string_number_conversions.h" |
| 13 #include "base/strings/string_util.h" | 13 #include "base/strings/string_util.h" |
| 14 #include "base/values.h" | 14 #include "base/values.h" |
| 15 #include "net/base/auth.h" | 15 #include "net/base/auth.h" |
| 16 #include "net/base/host_port_pair.h" | 16 #include "net/base/host_port_pair.h" |
| 17 #include "net/base/io_buffer.h" | 17 #include "net/base/io_buffer.h" |
| 18 #include "net/base/load_states.h" | 18 #include "net/base/load_states.h" |
| 19 #include "net/base/net_errors.h" | 19 #include "net/base/net_errors.h" |
| 20 #include "net/base/network_delegate.h" | 20 #include "net/base/network_delegate.h" |
| 21 #include "net/filter/filter.h" | 21 #include "net/filter/filter.h" |
| 22 #include "net/http/http_response_headers.h" | 22 #include "net/http/http_response_headers.h" |
| 23 #include "net/url_request/url_request.h" | |
| 24 | 23 |
| 25 namespace { | 24 namespace { |
| 26 | 25 |
| 27 // Callback for TYPE_URL_REQUEST_FILTERS_SET net-internals event. | 26 // Callback for TYPE_URL_REQUEST_FILTERS_SET net-internals event. |
| 28 base::Value* FiltersSetCallback(net::Filter* filter, | 27 base::Value* FiltersSetCallback(net::Filter* filter, |
| 29 enum net::NetLog::LogLevel /* log_level */) { | 28 enum net::NetLog::LogLevel /* log_level */) { |
| 30 base::DictionaryValue* event_params = new base::DictionaryValue(); | 29 base::DictionaryValue* event_params = new base::DictionaryValue(); |
| 31 event_params->SetString("filters", filter->OrderedFilterList()); | 30 event_params->SetString("filters", filter->OrderedFilterList()); |
| 32 return event_params; | 31 return event_params; |
| 33 } | 32 } |
| (...skipping 214 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 248 return HostPortPair(); | 247 return HostPortPair(); |
| 249 } | 248 } |
| 250 | 249 |
| 251 void URLRequestJob::OnSuspend() { | 250 void URLRequestJob::OnSuspend() { |
| 252 Kill(); | 251 Kill(); |
| 253 } | 252 } |
| 254 | 253 |
| 255 void URLRequestJob::NotifyURLRequestDestroyed() { | 254 void URLRequestJob::NotifyURLRequestDestroyed() { |
| 256 } | 255 } |
| 257 | 256 |
| 257 // static |
| 258 GURL URLRequestJob::ComputeReferrerForRedirect( |
| 259 URLRequest::ReferrerPolicy policy, |
| 260 const std::string& referrer, |
| 261 const GURL& redirect_destination) { |
| 262 GURL original_referrer(referrer); |
| 263 bool secure_referrer_but_insecure_destination = |
| 264 original_referrer.SchemeIsSecure() && |
| 265 !redirect_destination.SchemeIsSecure(); |
| 266 bool same_origin = |
| 267 original_referrer.GetOrigin() == redirect_destination.GetOrigin(); |
| 268 switch (policy) { |
| 269 case URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE: |
| 270 return secure_referrer_but_insecure_destination ? GURL() |
| 271 : original_referrer; |
| 272 |
| 273 case URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN: |
| 274 if (same_origin) { |
| 275 return original_referrer; |
| 276 } else if (secure_referrer_but_insecure_destination) { |
| 277 return GURL(); |
| 278 } else { |
| 279 return original_referrer.GetOrigin(); |
| 280 } |
| 281 |
| 282 case URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN: |
| 283 return same_origin ? original_referrer : original_referrer.GetOrigin(); |
| 284 |
| 285 case URLRequest::NEVER_CLEAR_REFERRER: |
| 286 return original_referrer; |
| 287 } |
| 288 |
| 289 NOTREACHED(); |
| 290 return GURL(); |
| 291 } |
| 292 |
| 258 URLRequestJob::~URLRequestJob() { | 293 URLRequestJob::~URLRequestJob() { |
| 259 base::PowerMonitor* power_monitor = base::PowerMonitor::Get(); | 294 base::PowerMonitor* power_monitor = base::PowerMonitor::Get(); |
| 260 if (power_monitor) | 295 if (power_monitor) |
| 261 power_monitor->RemoveObserver(this); | 296 power_monitor->RemoveObserver(this); |
| 262 } | 297 } |
| 263 | 298 |
| 264 void URLRequestJob::NotifyCertificateRequested( | 299 void URLRequestJob::NotifyCertificateRequested( |
| 265 SSLCertRequestInfo* cert_request_info) { | 300 SSLCertRequestInfo* cert_request_info) { |
| 266 if (!request_) | 301 if (!request_) |
| 267 return; // The request was destroyed, so there is no more work to do. | 302 return; // The request was destroyed, so there is no more work to do. |
| (...skipping 588 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 856 | 891 |
| 857 // Update the first-party URL if appropriate. | 892 // Update the first-party URL if appropriate. |
| 858 if (request_->first_party_url_policy() == | 893 if (request_->first_party_url_policy() == |
| 859 URLRequest::UPDATE_FIRST_PARTY_URL_ON_REDIRECT) { | 894 URLRequest::UPDATE_FIRST_PARTY_URL_ON_REDIRECT) { |
| 860 redirect_info.new_first_party_for_cookies = redirect_info.new_url; | 895 redirect_info.new_first_party_for_cookies = redirect_info.new_url; |
| 861 } else { | 896 } else { |
| 862 redirect_info.new_first_party_for_cookies = | 897 redirect_info.new_first_party_for_cookies = |
| 863 request_->first_party_for_cookies(); | 898 request_->first_party_for_cookies(); |
| 864 } | 899 } |
| 865 | 900 |
| 866 // Suppress the referrer if we're redirecting out of https. | 901 // Alter the referrer if redirecting cross-origin (especially HTTP->HTTPS). |
| 867 if (request_->referrer_policy() == | 902 redirect_info.new_referrer = |
| 868 URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE && | 903 ComputeReferrerForRedirect(request_->referrer_policy(), |
| 869 GURL(request_->referrer()).SchemeIsSecure() && | 904 request_->referrer(), |
| 870 !redirect_info.new_url.SchemeIsSecure()) { | 905 redirect_info.new_url).spec(); |
| 871 redirect_info.new_referrer.clear(); | |
| 872 } else { | |
| 873 redirect_info.new_referrer = request_->referrer(); | |
| 874 } | |
| 875 | 906 |
| 876 return redirect_info; | 907 return redirect_info; |
| 877 } | 908 } |
| 878 | 909 |
| 879 } // namespace net | 910 } // namespace net |
| OLD | NEW |