Home | History | Annotate | Download | only in child
      1 // Copyright 2014 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 // An implementation of WebURLLoader in terms of ResourceLoaderBridge.
      6 
      7 #include "content/child/web_url_loader_impl.h"
      8 
      9 #include "base/bind.h"
     10 #include "base/files/file_path.h"
     11 #include "base/memory/scoped_ptr.h"
     12 #include "base/message_loop/message_loop.h"
     13 #include "base/strings/string_util.h"
     14 #include "base/time/time.h"
     15 #include "content/child/child_thread.h"
     16 #include "content/child/ftp_directory_listing_response_delegate.h"
     17 #include "content/child/request_extra_data.h"
     18 #include "content/child/request_info.h"
     19 #include "content/child/resource_dispatcher.h"
     20 #include "content/child/sync_load_response.h"
     21 #include "content/common/resource_request_body.h"
     22 #include "content/public/child/request_peer.h"
     23 #include "net/base/data_url.h"
     24 #include "net/base/filename_util.h"
     25 #include "net/base/load_flags.h"
     26 #include "net/base/mime_util.h"
     27 #include "net/base/net_errors.h"
     28 #include "net/http/http_response_headers.h"
     29 #include "net/http/http_util.h"
     30 #include "net/url_request/url_request.h"
     31 #include "third_party/WebKit/public/platform/WebHTTPHeaderVisitor.h"
     32 #include "third_party/WebKit/public/platform/WebHTTPLoadInfo.h"
     33 #include "third_party/WebKit/public/platform/WebURL.h"
     34 #include "third_party/WebKit/public/platform/WebURLError.h"
     35 #include "third_party/WebKit/public/platform/WebURLLoadTiming.h"
     36 #include "third_party/WebKit/public/platform/WebURLLoaderClient.h"
     37 #include "third_party/WebKit/public/platform/WebURLRequest.h"
     38 #include "third_party/WebKit/public/platform/WebURLResponse.h"
     39 #include "third_party/WebKit/public/web/WebSecurityPolicy.h"
     40 #include "webkit/child/multipart_response_delegate.h"
     41 #include "webkit/child/resource_loader_bridge.h"
     42 #include "webkit/child/weburlresponse_extradata_impl.h"
     43 
     44 using base::Time;
     45 using base::TimeTicks;
     46 using blink::WebData;
     47 using blink::WebHTTPBody;
     48 using blink::WebHTTPHeaderVisitor;
     49 using blink::WebHTTPLoadInfo;
     50 using blink::WebReferrerPolicy;
     51 using blink::WebSecurityPolicy;
     52 using blink::WebString;
     53 using blink::WebURL;
     54 using blink::WebURLError;
     55 using blink::WebURLLoadTiming;
     56 using blink::WebURLLoader;
     57 using blink::WebURLLoaderClient;
     58 using blink::WebURLRequest;
     59 using blink::WebURLResponse;
     60 using webkit_glue::MultipartResponseDelegate;
     61 using webkit_glue::ResourceLoaderBridge;
     62 using webkit_glue::WebURLResponseExtraDataImpl;
     63 
     64 namespace content {
     65 
     66 // Utilities ------------------------------------------------------------------
     67 
     68 namespace {
     69 
     70 const char kThrottledErrorDescription[] =
     71     "Request throttled. Visit http://dev.chromium.org/throttling for more "
     72     "information.";
     73 
     74 class HeaderFlattener : public WebHTTPHeaderVisitor {
     75  public:
     76   explicit HeaderFlattener() : has_accept_header_(false) {}
     77 
     78   virtual void visitHeader(const WebString& name, const WebString& value) {
     79     // Headers are latin1.
     80     const std::string& name_latin1 = name.latin1();
     81     const std::string& value_latin1 = value.latin1();
     82 
     83     // Skip over referrer headers found in the header map because we already
     84     // pulled it out as a separate parameter.
     85     if (LowerCaseEqualsASCII(name_latin1, "referer"))
     86       return;
     87 
     88     if (LowerCaseEqualsASCII(name_latin1, "accept"))
     89       has_accept_header_ = true;
     90 
     91     if (!buffer_.empty())
     92       buffer_.append("\r\n");
     93     buffer_.append(name_latin1 + ": " + value_latin1);
     94   }
     95 
     96   const std::string& GetBuffer() {
     97     // In some cases, WebKit doesn't add an Accept header, but not having the
     98     // header confuses some web servers.  See bug 808613.
     99     if (!has_accept_header_) {
    100       if (!buffer_.empty())
    101         buffer_.append("\r\n");
    102       buffer_.append("Accept: */*");
    103       has_accept_header_ = true;
    104     }
    105     return buffer_;
    106   }
    107 
    108  private:
    109   std::string buffer_;
    110   bool has_accept_header_;
    111 };
    112 
    113 // Extracts the information from a data: url.
    114 bool GetInfoFromDataURL(const GURL& url,
    115                         ResourceResponseInfo* info,
    116                         std::string* data,
    117                         int* error_code) {
    118   std::string mime_type;
    119   std::string charset;
    120   if (net::DataURL::Parse(url, &mime_type, &charset, data)) {
    121     *error_code = net::OK;
    122     // Assure same time for all time fields of data: URLs.
    123     Time now = Time::Now();
    124     info->load_timing.request_start = TimeTicks::Now();
    125     info->load_timing.request_start_time = now;
    126     info->request_time = now;
    127     info->response_time = now;
    128     info->headers = NULL;
    129     info->mime_type.swap(mime_type);
    130     info->charset.swap(charset);
    131     info->security_info.clear();
    132     info->content_length = data->length();
    133     info->encoded_data_length = 0;
    134 
    135     return true;
    136   }
    137 
    138   *error_code = net::ERR_INVALID_URL;
    139   return false;
    140 }
    141 
    142 typedef ResourceDevToolsInfo::HeadersVector HeadersVector;
    143 
    144 // Converts timing data from |load_timing| to the format used by WebKit.
    145 void PopulateURLLoadTiming(const net::LoadTimingInfo& load_timing,
    146                            WebURLLoadTiming* url_timing) {
    147   DCHECK(!load_timing.request_start.is_null());
    148 
    149   const TimeTicks kNullTicks;
    150   url_timing->initialize();
    151   url_timing->setRequestTime(
    152       (load_timing.request_start - kNullTicks).InSecondsF());
    153   url_timing->setProxyStart(
    154       (load_timing.proxy_resolve_start - kNullTicks).InSecondsF());
    155   url_timing->setProxyEnd(
    156       (load_timing.proxy_resolve_end - kNullTicks).InSecondsF());
    157   url_timing->setDNSStart(
    158       (load_timing.connect_timing.dns_start - kNullTicks).InSecondsF());
    159   url_timing->setDNSEnd(
    160       (load_timing.connect_timing.dns_end - kNullTicks).InSecondsF());
    161   url_timing->setConnectStart(
    162       (load_timing.connect_timing.connect_start - kNullTicks).InSecondsF());
    163   url_timing->setConnectEnd(
    164       (load_timing.connect_timing.connect_end - kNullTicks).InSecondsF());
    165   url_timing->setSSLStart(
    166       (load_timing.connect_timing.ssl_start - kNullTicks).InSecondsF());
    167   url_timing->setSSLEnd(
    168       (load_timing.connect_timing.ssl_end - kNullTicks).InSecondsF());
    169   url_timing->setSendStart(
    170       (load_timing.send_start - kNullTicks).InSecondsF());
    171   url_timing->setSendEnd(
    172       (load_timing.send_end - kNullTicks).InSecondsF());
    173   url_timing->setReceiveHeadersEnd(
    174       (load_timing.receive_headers_end - kNullTicks).InSecondsF());
    175 }
    176 
    177 net::RequestPriority ConvertWebKitPriorityToNetPriority(
    178     const WebURLRequest::Priority& priority) {
    179   switch (priority) {
    180     case WebURLRequest::PriorityVeryHigh:
    181       return net::HIGHEST;
    182 
    183     case WebURLRequest::PriorityHigh:
    184       return net::MEDIUM;
    185 
    186     case WebURLRequest::PriorityMedium:
    187       return net::LOW;
    188 
    189     case WebURLRequest::PriorityLow:
    190       return net::LOWEST;
    191 
    192     case WebURLRequest::PriorityVeryLow:
    193       return net::IDLE;
    194 
    195     case WebURLRequest::PriorityUnresolved:
    196     default:
    197       NOTREACHED();
    198       return net::LOW;
    199   }
    200 }
    201 
    202 }  // namespace
    203 
    204 // WebURLLoaderImpl::Context --------------------------------------------------
    205 
    206 // This inner class exists since the WebURLLoader may be deleted while inside a
    207 // call to WebURLLoaderClient.  The bridge requires its Peer to stay alive
    208 // until it receives OnCompletedRequest.
    209 class WebURLLoaderImpl::Context : public base::RefCounted<Context>,
    210                                   public RequestPeer {
    211  public:
    212   explicit Context(WebURLLoaderImpl* loader);
    213 
    214   WebURLLoaderClient* client() const { return client_; }
    215   void set_client(WebURLLoaderClient* client) { client_ = client; }
    216 
    217   void Cancel();
    218   void SetDefersLoading(bool value);
    219   void DidChangePriority(WebURLRequest::Priority new_priority,
    220                          int intra_priority_value);
    221   bool AttachThreadedDataReceiver(
    222       blink::WebThreadedDataReceiver* threaded_data_receiver);
    223   void Start(const WebURLRequest& request,
    224              SyncLoadResponse* sync_load_response);
    225 
    226   // RequestPeer methods:
    227   virtual void OnUploadProgress(uint64 position, uint64 size) OVERRIDE;
    228   virtual bool OnReceivedRedirect(const GURL& new_url,
    229                                   const GURL& new_first_party_for_cookies,
    230                                   const ResourceResponseInfo& info) OVERRIDE;
    231   virtual void OnReceivedResponse(const ResourceResponseInfo& info) OVERRIDE;
    232   virtual void OnDownloadedData(int len, int encoded_data_length) OVERRIDE;
    233   virtual void OnReceivedData(const char* data,
    234                               int data_length,
    235                               int encoded_data_length) OVERRIDE;
    236   virtual void OnReceivedCachedMetadata(const char* data, int len) OVERRIDE;
    237   virtual void OnCompletedRequest(
    238       int error_code,
    239       bool was_ignored_by_handler,
    240       bool stale_copy_in_cache,
    241       const std::string& security_info,
    242       const base::TimeTicks& completion_time,
    243       int64 total_transfer_size) OVERRIDE;
    244 
    245  private:
    246   friend class base::RefCounted<Context>;
    247   virtual ~Context() {}
    248 
    249   // We can optimize the handling of data URLs in most cases.
    250   bool CanHandleDataURL(const GURL& url) const;
    251   void HandleDataURL();
    252 
    253   WebURLLoaderImpl* loader_;
    254   WebURLRequest request_;
    255   WebURLLoaderClient* client_;
    256   WebReferrerPolicy referrer_policy_;
    257   scoped_ptr<ResourceLoaderBridge> bridge_;
    258   scoped_ptr<FtpDirectoryListingResponseDelegate> ftp_listing_delegate_;
    259   scoped_ptr<MultipartResponseDelegate> multipart_delegate_;
    260   scoped_ptr<ResourceLoaderBridge> completed_bridge_;
    261 };
    262 
    263 WebURLLoaderImpl::Context::Context(WebURLLoaderImpl* loader)
    264     : loader_(loader),
    265       client_(NULL),
    266       referrer_policy_(blink::WebReferrerPolicyDefault) {
    267 }
    268 
    269 void WebURLLoaderImpl::Context::Cancel() {
    270   // The bridge will still send OnCompletedRequest, which will Release() us, so
    271   // we don't do that here.
    272   if (bridge_)
    273     bridge_->Cancel();
    274 
    275   // Ensure that we do not notify the multipart delegate anymore as it has
    276   // its own pointer to the client.
    277   if (multipart_delegate_)
    278     multipart_delegate_->Cancel();
    279   // Ditto for the ftp delegate.
    280   if (ftp_listing_delegate_)
    281     ftp_listing_delegate_->Cancel();
    282 
    283   // Do not make any further calls to the client.
    284   client_ = NULL;
    285   loader_ = NULL;
    286 }
    287 
    288 void WebURLLoaderImpl::Context::SetDefersLoading(bool value) {
    289   if (bridge_)
    290     bridge_->SetDefersLoading(value);
    291 }
    292 
    293 void WebURLLoaderImpl::Context::DidChangePriority(
    294     WebURLRequest::Priority new_priority, int intra_priority_value) {
    295   if (bridge_)
    296     bridge_->DidChangePriority(
    297         ConvertWebKitPriorityToNetPriority(new_priority), intra_priority_value);
    298 }
    299 
    300 bool WebURLLoaderImpl::Context::AttachThreadedDataReceiver(
    301     blink::WebThreadedDataReceiver* threaded_data_receiver) {
    302   if (bridge_)
    303     return bridge_->AttachThreadedDataReceiver(threaded_data_receiver);
    304 
    305   return false;
    306 }
    307 
    308 void WebURLLoaderImpl::Context::Start(const WebURLRequest& request,
    309                                       SyncLoadResponse* sync_load_response) {
    310   DCHECK(!bridge_.get());
    311 
    312   request_ = request;  // Save the request.
    313 
    314   GURL url = request.url();
    315   if (url.SchemeIs("data") && CanHandleDataURL(url)) {
    316     if (sync_load_response) {
    317       // This is a sync load. Do the work now.
    318       sync_load_response->url = url;
    319       std::string data;
    320       GetInfoFromDataURL(sync_load_response->url, sync_load_response,
    321                          &sync_load_response->data,
    322                          &sync_load_response->error_code);
    323     } else {
    324       AddRef();  // Balanced in OnCompletedRequest
    325       base::MessageLoop::current()->PostTask(
    326           FROM_HERE, base::Bind(&Context::HandleDataURL, this));
    327     }
    328     return;
    329   }
    330 
    331   GURL referrer_url(
    332       request.httpHeaderField(WebString::fromUTF8("Referer")).latin1());
    333   const std::string& method = request.httpMethod().latin1();
    334 
    335   int load_flags = net::LOAD_NORMAL | net::LOAD_ENABLE_LOAD_TIMING;
    336   switch (request.cachePolicy()) {
    337     case WebURLRequest::ReloadIgnoringCacheData:
    338       // Required by LayoutTests/http/tests/misc/refresh-headers.php
    339       load_flags |= net::LOAD_VALIDATE_CACHE;
    340       break;
    341     case WebURLRequest::ReloadBypassingCache:
    342       load_flags |= net::LOAD_BYPASS_CACHE;
    343       break;
    344     case WebURLRequest::ReturnCacheDataElseLoad:
    345       load_flags |= net::LOAD_PREFERRING_CACHE;
    346       break;
    347     case WebURLRequest::ReturnCacheDataDontLoad:
    348       load_flags |= net::LOAD_ONLY_FROM_CACHE;
    349       break;
    350     case WebURLRequest::UseProtocolCachePolicy:
    351       break;
    352     default:
    353       NOTREACHED();
    354   }
    355 
    356   if (request.reportUploadProgress())
    357     load_flags |= net::LOAD_ENABLE_UPLOAD_PROGRESS;
    358   if (request.reportRawHeaders())
    359     load_flags |= net::LOAD_REPORT_RAW_HEADERS;
    360 
    361   if (!request.allowStoredCredentials()) {
    362     load_flags |= net::LOAD_DO_NOT_SAVE_COOKIES;
    363     load_flags |= net::LOAD_DO_NOT_SEND_COOKIES;
    364   }
    365 
    366   if (!request.allowStoredCredentials())
    367     load_flags |= net::LOAD_DO_NOT_SEND_AUTH_DATA;
    368 
    369   if (request.targetType() == WebURLRequest::TargetIsXHR &&
    370       (url.has_username() || url.has_password())) {
    371     load_flags |= net::LOAD_DO_NOT_PROMPT_FOR_LOGIN;
    372   }
    373 
    374   HeaderFlattener flattener;
    375   request.visitHTTPHeaderFields(&flattener);
    376 
    377   // TODO(brettw) this should take parameter encoding into account when
    378   // creating the GURLs.
    379 
    380   RequestInfo request_info;
    381   request_info.method = method;
    382   request_info.url = url;
    383   request_info.first_party_for_cookies = request.firstPartyForCookies();
    384   request_info.referrer = referrer_url;
    385   request_info.headers = flattener.GetBuffer();
    386   request_info.load_flags = load_flags;
    387   // requestor_pid only needs to be non-zero if the request originates outside
    388   // the render process, so we can use requestorProcessID even for requests
    389   // from in-process plugins.
    390   request_info.requestor_pid = request.requestorProcessID();
    391   request_info.request_type =
    392       ResourceType::FromTargetType(request.targetType());
    393   request_info.priority =
    394       ConvertWebKitPriorityToNetPriority(request.priority());
    395   request_info.appcache_host_id = request.appCacheHostID();
    396   request_info.routing_id = request.requestorID();
    397   request_info.download_to_file = request.downloadToFile();
    398   request_info.has_user_gesture = request.hasUserGesture();
    399   request_info.extra_data = request.extraData();
    400   referrer_policy_ = request.referrerPolicy();
    401   request_info.referrer_policy = request.referrerPolicy();
    402   bridge_.reset(ChildThread::current()->resource_dispatcher()->CreateBridge(
    403       request_info));
    404 
    405   if (!request.httpBody().isNull()) {
    406     // GET and HEAD requests shouldn't have http bodies.
    407     DCHECK(method != "GET" && method != "HEAD");
    408     const WebHTTPBody& httpBody = request.httpBody();
    409     size_t i = 0;
    410     WebHTTPBody::Element element;
    411     scoped_refptr<ResourceRequestBody> request_body = new ResourceRequestBody;
    412     while (httpBody.elementAt(i++, element)) {
    413       switch (element.type) {
    414         case WebHTTPBody::Element::TypeData:
    415           if (!element.data.isEmpty()) {
    416             // WebKit sometimes gives up empty data to append. These aren't
    417             // necessary so we just optimize those out here.
    418             request_body->AppendBytes(
    419                 element.data.data(), static_cast<int>(element.data.size()));
    420           }
    421           break;
    422         case WebHTTPBody::Element::TypeFile:
    423           if (element.fileLength == -1) {
    424             request_body->AppendFileRange(
    425                 base::FilePath::FromUTF16Unsafe(element.filePath),
    426                 0, kuint64max, base::Time());
    427           } else {
    428             request_body->AppendFileRange(
    429                 base::FilePath::FromUTF16Unsafe(element.filePath),
    430                 static_cast<uint64>(element.fileStart),
    431                 static_cast<uint64>(element.fileLength),
    432                 base::Time::FromDoubleT(element.modificationTime));
    433           }
    434           break;
    435         case WebHTTPBody::Element::TypeFileSystemURL: {
    436           GURL file_system_url = element.fileSystemURL;
    437           DCHECK(file_system_url.SchemeIsFileSystem());
    438           request_body->AppendFileSystemFileRange(
    439               file_system_url,
    440               static_cast<uint64>(element.fileStart),
    441               static_cast<uint64>(element.fileLength),
    442               base::Time::FromDoubleT(element.modificationTime));
    443           break;
    444         }
    445         case WebHTTPBody::Element::TypeBlob:
    446           request_body->AppendBlob(element.blobUUID.utf8());
    447           break;
    448         default:
    449           NOTREACHED();
    450       }
    451     }
    452     request_body->set_identifier(request.httpBody().identifier());
    453     bridge_->SetRequestBody(request_body.get());
    454   }
    455 
    456   if (sync_load_response) {
    457     bridge_->SyncLoad(sync_load_response);
    458     return;
    459   }
    460 
    461   if (bridge_->Start(this)) {
    462     AddRef();  // Balanced in OnCompletedRequest
    463   } else {
    464     bridge_.reset();
    465   }
    466 }
    467 
    468 void WebURLLoaderImpl::Context::OnUploadProgress(uint64 position, uint64 size) {
    469   if (client_)
    470     client_->didSendData(loader_, position, size);
    471 }
    472 
    473 bool WebURLLoaderImpl::Context::OnReceivedRedirect(
    474     const GURL& new_url,
    475     const GURL& new_first_party_for_cookies,
    476     const ResourceResponseInfo& info) {
    477   if (!client_)
    478     return false;
    479 
    480   WebURLResponse response;
    481   response.initialize();
    482   PopulateURLResponse(request_.url(), info, &response);
    483 
    484   // TODO(darin): We lack sufficient information to construct the actual
    485   // request that resulted from the redirect.
    486   WebURLRequest new_request(new_url);
    487   new_request.setFirstPartyForCookies(new_first_party_for_cookies);
    488   new_request.setDownloadToFile(request_.downloadToFile());
    489 
    490   WebString referrer_string = WebString::fromUTF8("Referer");
    491   WebString referrer = WebSecurityPolicy::generateReferrerHeader(
    492       referrer_policy_,
    493       new_url,
    494       request_.httpHeaderField(referrer_string));
    495   if (!referrer.isEmpty())
    496     new_request.setHTTPReferrer(referrer, referrer_policy_);
    497 
    498   std::string method = request_.httpMethod().utf8();
    499   std::string new_method = net::URLRequest::ComputeMethodForRedirect(
    500       method, response.httpStatusCode());
    501   new_request.setHTTPMethod(WebString::fromUTF8(new_method));
    502   if (new_method == method)
    503     new_request.setHTTPBody(request_.httpBody());
    504 
    505   client_->willSendRequest(loader_, new_request, response);
    506   request_ = new_request;
    507 
    508   // Only follow the redirect if WebKit left the URL unmodified.
    509   if (new_url == GURL(new_request.url())) {
    510     // First-party cookie logic moved from DocumentLoader in Blink to
    511     // CrossSiteResourceHandler in the browser. Assert that Blink didn't try to
    512     // change it to something else.
    513     DCHECK_EQ(new_first_party_for_cookies.spec(),
    514               request_.firstPartyForCookies().string().utf8());
    515     return true;
    516   }
    517 
    518   // We assume that WebKit only changes the URL to suppress a redirect, and we
    519   // assume that it does so by setting it to be invalid.
    520   DCHECK(!new_request.url().isValid());
    521   return false;
    522 }
    523 
    524 void WebURLLoaderImpl::Context::OnReceivedResponse(
    525     const ResourceResponseInfo& info) {
    526   if (!client_)
    527     return;
    528 
    529   WebURLResponse response;
    530   response.initialize();
    531   PopulateURLResponse(request_.url(), info, &response);
    532 
    533   bool show_raw_listing = (GURL(request_.url()).query() == "raw");
    534 
    535   if (info.mime_type == "text/vnd.chromium.ftp-dir") {
    536     if (show_raw_listing) {
    537       // Set the MIME type to plain text to prevent any active content.
    538       response.setMIMEType("text/plain");
    539     } else {
    540       // We're going to produce a parsed listing in HTML.
    541       response.setMIMEType("text/html");
    542     }
    543   }
    544 
    545   scoped_refptr<Context> protect(this);
    546   client_->didReceiveResponse(loader_, response);
    547 
    548   // We may have been cancelled after didReceiveResponse, which would leave us
    549   // without a client and therefore without much need to do further handling.
    550   if (!client_)
    551     return;
    552 
    553   DCHECK(!ftp_listing_delegate_.get());
    554   DCHECK(!multipart_delegate_.get());
    555   if (info.headers.get() && info.mime_type == "multipart/x-mixed-replace") {
    556     std::string content_type;
    557     info.headers->EnumerateHeader(NULL, "content-type", &content_type);
    558 
    559     std::string mime_type;
    560     std::string charset;
    561     bool had_charset = false;
    562     std::string boundary;
    563     net::HttpUtil::ParseContentType(content_type, &mime_type, &charset,
    564                                     &had_charset, &boundary);
    565     base::TrimString(boundary, " \"", &boundary);
    566 
    567     // If there's no boundary, just handle the request normally.  In the gecko
    568     // code, nsMultiMixedConv::OnStartRequest throws an exception.
    569     if (!boundary.empty()) {
    570       multipart_delegate_.reset(
    571           new MultipartResponseDelegate(client_, loader_, response, boundary));
    572     }
    573   } else if (info.mime_type == "text/vnd.chromium.ftp-dir" &&
    574              !show_raw_listing) {
    575     ftp_listing_delegate_.reset(
    576         new FtpDirectoryListingResponseDelegate(client_, loader_, response));
    577   }
    578 }
    579 
    580 void WebURLLoaderImpl::Context::OnDownloadedData(int len,
    581                                                  int encoded_data_length) {
    582   if (client_)
    583     client_->didDownloadData(loader_, len, encoded_data_length);
    584 }
    585 
    586 void WebURLLoaderImpl::Context::OnReceivedData(const char* data,
    587                                                int data_length,
    588                                                int encoded_data_length) {
    589   if (!client_)
    590     return;
    591 
    592   if (ftp_listing_delegate_) {
    593     // The FTP listing delegate will make the appropriate calls to
    594     // client_->didReceiveData and client_->didReceiveResponse.
    595     ftp_listing_delegate_->OnReceivedData(data, data_length);
    596   } else if (multipart_delegate_) {
    597     // The multipart delegate will make the appropriate calls to
    598     // client_->didReceiveData and client_->didReceiveResponse.
    599     multipart_delegate_->OnReceivedData(data, data_length, encoded_data_length);
    600   } else {
    601     client_->didReceiveData(loader_, data, data_length, encoded_data_length);
    602   }
    603 }
    604 
    605 void WebURLLoaderImpl::Context::OnReceivedCachedMetadata(
    606     const char* data, int len) {
    607   if (client_)
    608     client_->didReceiveCachedMetadata(loader_, data, len);
    609 }
    610 
    611 void WebURLLoaderImpl::Context::OnCompletedRequest(
    612     int error_code,
    613     bool was_ignored_by_handler,
    614     bool stale_copy_in_cache,
    615     const std::string& security_info,
    616     const base::TimeTicks& completion_time,
    617     int64 total_transfer_size) {
    618   if (ftp_listing_delegate_) {
    619     ftp_listing_delegate_->OnCompletedRequest();
    620     ftp_listing_delegate_.reset(NULL);
    621   } else if (multipart_delegate_) {
    622     multipart_delegate_->OnCompletedRequest();
    623     multipart_delegate_.reset(NULL);
    624   }
    625 
    626   // Prevent any further IPC to the browser now that we're complete, but
    627   // don't delete it to keep any downloaded temp files alive.
    628   DCHECK(!completed_bridge_.get());
    629   completed_bridge_.swap(bridge_);
    630 
    631   if (client_) {
    632     if (error_code != net::OK) {
    633       client_->didFail(loader_, CreateError(request_.url(),
    634                                             stale_copy_in_cache,
    635                                             error_code));
    636     } else {
    637       client_->didFinishLoading(
    638           loader_, (completion_time - TimeTicks()).InSecondsF(),
    639           total_transfer_size);
    640     }
    641   }
    642 
    643   // We are done with the bridge now, and so we need to release the reference
    644   // to ourselves that we took on behalf of the bridge.  This may cause our
    645   // destruction.
    646   Release();
    647 }
    648 
    649 bool WebURLLoaderImpl::Context::CanHandleDataURL(const GURL& url) const {
    650   DCHECK(url.SchemeIs("data"));
    651 
    652   // Optimize for the case where we can handle a data URL locally.  We must
    653   // skip this for data URLs targetted at frames since those could trigger a
    654   // download.
    655   //
    656   // NOTE: We special case MIME types we can render both for performance
    657   // reasons as well as to support unit tests, which do not have an underlying
    658   // ResourceLoaderBridge implementation.
    659 
    660 #if defined(OS_ANDROID)
    661   // For compatibility reasons on Android we need to expose top-level data://
    662   // to the browser.
    663   if (request_.targetType() == WebURLRequest::TargetIsMainFrame)
    664     return false;
    665 #endif
    666 
    667   if (request_.targetType() != WebURLRequest::TargetIsMainFrame &&
    668       request_.targetType() != WebURLRequest::TargetIsSubframe)
    669     return true;
    670 
    671   std::string mime_type, unused_charset;
    672   if (net::DataURL::Parse(url, &mime_type, &unused_charset, NULL) &&
    673       net::IsSupportedMimeType(mime_type))
    674     return true;
    675 
    676   return false;
    677 }
    678 
    679 void WebURLLoaderImpl::Context::HandleDataURL() {
    680   ResourceResponseInfo info;
    681   int error_code;
    682   std::string data;
    683 
    684   if (GetInfoFromDataURL(request_.url(), &info, &data, &error_code)) {
    685     OnReceivedResponse(info);
    686     if (!data.empty())
    687       OnReceivedData(data.data(), data.size(), 0);
    688   }
    689 
    690   OnCompletedRequest(error_code, false, false, info.security_info,
    691                      base::TimeTicks::Now(), 0);
    692 }
    693 
    694 // WebURLLoaderImpl -----------------------------------------------------------
    695 
    696 WebURLLoaderImpl::WebURLLoaderImpl()
    697     : context_(new Context(this)) {
    698 }
    699 
    700 WebURLLoaderImpl::~WebURLLoaderImpl() {
    701   cancel();
    702 }
    703 
    704 WebURLError WebURLLoaderImpl::CreateError(const WebURL& unreachable_url,
    705                                           bool stale_copy_in_cache,
    706                                           int reason) {
    707   WebURLError error;
    708   error.domain = WebString::fromUTF8(net::kErrorDomain);
    709   error.reason = reason;
    710   error.unreachableURL = unreachable_url;
    711   error.staleCopyInCache = stale_copy_in_cache;
    712   if (reason == net::ERR_ABORTED) {
    713     error.isCancellation = true;
    714   } else if (reason == net::ERR_TEMPORARILY_THROTTLED) {
    715     error.localizedDescription = WebString::fromUTF8(
    716         kThrottledErrorDescription);
    717   } else {
    718     error.localizedDescription = WebString::fromUTF8(
    719         net::ErrorToString(reason));
    720   }
    721   return error;
    722 }
    723 
    724 void WebURLLoaderImpl::PopulateURLResponse(const GURL& url,
    725                                            const ResourceResponseInfo& info,
    726                                            WebURLResponse* response) {
    727   response->setURL(url);
    728   response->setResponseTime(info.response_time.ToDoubleT());
    729   response->setMIMEType(WebString::fromUTF8(info.mime_type));
    730   response->setTextEncodingName(WebString::fromUTF8(info.charset));
    731   response->setExpectedContentLength(info.content_length);
    732   response->setSecurityInfo(info.security_info);
    733   response->setAppCacheID(info.appcache_id);
    734   response->setAppCacheManifestURL(info.appcache_manifest_url);
    735   response->setWasCached(!info.load_timing.request_start_time.is_null() &&
    736       info.response_time < info.load_timing.request_start_time);
    737   response->setRemoteIPAddress(
    738       WebString::fromUTF8(info.socket_address.host()));
    739   response->setRemotePort(info.socket_address.port());
    740   response->setConnectionID(info.load_timing.socket_log_id);
    741   response->setConnectionReused(info.load_timing.socket_reused);
    742   response->setDownloadFilePath(info.download_file_path.AsUTF16Unsafe());
    743   WebURLResponseExtraDataImpl* extra_data =
    744       new WebURLResponseExtraDataImpl(info.npn_negotiated_protocol);
    745   response->setExtraData(extra_data);
    746   extra_data->set_was_fetched_via_spdy(info.was_fetched_via_spdy);
    747   extra_data->set_was_npn_negotiated(info.was_npn_negotiated);
    748   extra_data->set_was_alternate_protocol_available(
    749       info.was_alternate_protocol_available);
    750   extra_data->set_connection_info(info.connection_info);
    751   extra_data->set_was_fetched_via_proxy(info.was_fetched_via_proxy);
    752 
    753   // If there's no received headers end time, don't set load timing.  This is
    754   // the case for non-HTTP requests, requests that don't go over the wire, and
    755   // certain error cases.
    756   if (!info.load_timing.receive_headers_end.is_null()) {
    757     WebURLLoadTiming timing;
    758     PopulateURLLoadTiming(info.load_timing, &timing);
    759     response->setLoadTiming(timing);
    760   }
    761 
    762   if (info.devtools_info.get()) {
    763     WebHTTPLoadInfo load_info;
    764 
    765     load_info.setHTTPStatusCode(info.devtools_info->http_status_code);
    766     load_info.setHTTPStatusText(WebString::fromLatin1(
    767         info.devtools_info->http_status_text));
    768     load_info.setEncodedDataLength(info.encoded_data_length);
    769 
    770     load_info.setRequestHeadersText(WebString::fromLatin1(
    771         info.devtools_info->request_headers_text));
    772     load_info.setResponseHeadersText(WebString::fromLatin1(
    773         info.devtools_info->response_headers_text));
    774     const HeadersVector& request_headers = info.devtools_info->request_headers;
    775     for (HeadersVector::const_iterator it = request_headers.begin();
    776          it != request_headers.end(); ++it) {
    777       load_info.addRequestHeader(WebString::fromLatin1(it->first),
    778           WebString::fromLatin1(it->second));
    779     }
    780     const HeadersVector& response_headers =
    781         info.devtools_info->response_headers;
    782     for (HeadersVector::const_iterator it = response_headers.begin();
    783          it != response_headers.end(); ++it) {
    784       load_info.addResponseHeader(WebString::fromLatin1(it->first),
    785           WebString::fromLatin1(it->second));
    786     }
    787     response->setHTTPLoadInfo(load_info);
    788   }
    789 
    790   const net::HttpResponseHeaders* headers = info.headers.get();
    791   if (!headers)
    792     return;
    793 
    794   WebURLResponse::HTTPVersion version = WebURLResponse::Unknown;
    795   if (headers->GetHttpVersion() == net::HttpVersion(0, 9))
    796     version = WebURLResponse::HTTP_0_9;
    797   else if (headers->GetHttpVersion() == net::HttpVersion(1, 0))
    798     version = WebURLResponse::HTTP_1_0;
    799   else if (headers->GetHttpVersion() == net::HttpVersion(1, 1))
    800     version = WebURLResponse::HTTP_1_1;
    801   response->setHTTPVersion(version);
    802   response->setHTTPStatusCode(headers->response_code());
    803   response->setHTTPStatusText(WebString::fromLatin1(headers->GetStatusText()));
    804 
    805   // TODO(darin): We should leverage HttpResponseHeaders for this, and this
    806   // should be using the same code as ResourceDispatcherHost.
    807   // TODO(jungshik): Figure out the actual value of the referrer charset and
    808   // pass it to GetSuggestedFilename.
    809   std::string value;
    810   headers->EnumerateHeader(NULL, "content-disposition", &value);
    811   response->setSuggestedFileName(
    812       net::GetSuggestedFilename(url,
    813                                 value,
    814                                 std::string(),  // referrer_charset
    815                                 std::string(),  // suggested_name
    816                                 std::string(),  // mime_type
    817                                 std::string()));  // default_name
    818 
    819   Time time_val;
    820   if (headers->GetLastModifiedValue(&time_val))
    821     response->setLastModifiedDate(time_val.ToDoubleT());
    822 
    823   // Build up the header map.
    824   void* iter = NULL;
    825   std::string name;
    826   while (headers->EnumerateHeaderLines(&iter, &name, &value)) {
    827     response->addHTTPHeaderField(WebString::fromLatin1(name),
    828                                  WebString::fromLatin1(value));
    829   }
    830 }
    831 
    832 void WebURLLoaderImpl::loadSynchronously(const WebURLRequest& request,
    833                                          WebURLResponse& response,
    834                                          WebURLError& error,
    835                                          WebData& data) {
    836   SyncLoadResponse sync_load_response;
    837   context_->Start(request, &sync_load_response);
    838 
    839   const GURL& final_url = sync_load_response.url;
    840 
    841   // TODO(tc): For file loads, we may want to include a more descriptive
    842   // status code or status text.
    843   int error_code = sync_load_response.error_code;
    844   if (error_code != net::OK) {
    845     response.setURL(final_url);
    846     error.domain = WebString::fromUTF8(net::kErrorDomain);
    847     error.reason = error_code;
    848     error.unreachableURL = final_url;
    849     return;
    850   }
    851 
    852   PopulateURLResponse(final_url, sync_load_response, &response);
    853 
    854   data.assign(sync_load_response.data.data(),
    855               sync_load_response.data.size());
    856 }
    857 
    858 void WebURLLoaderImpl::loadAsynchronously(const WebURLRequest& request,
    859                                           WebURLLoaderClient* client) {
    860   DCHECK(!context_->client());
    861 
    862   context_->set_client(client);
    863   context_->Start(request, NULL);
    864 }
    865 
    866 void WebURLLoaderImpl::cancel() {
    867   context_->Cancel();
    868 }
    869 
    870 void WebURLLoaderImpl::setDefersLoading(bool value) {
    871   context_->SetDefersLoading(value);
    872 }
    873 
    874 void WebURLLoaderImpl::didChangePriority(WebURLRequest::Priority new_priority,
    875                                          int intra_priority_value) {
    876   context_->DidChangePriority(new_priority, intra_priority_value);
    877 }
    878 
    879 bool WebURLLoaderImpl::attachThreadedDataReceiver(
    880     blink::WebThreadedDataReceiver* threaded_data_receiver) {
    881   return context_->AttachThreadedDataReceiver(threaded_data_receiver);
    882 }
    883 
    884 }  // namespace content
    885