Roll src/third_party/skia 523beb7:de50d9b
[chromium-blink-merge.git] / net / base / network_delegate.h
blob9ea82028b11fc8dd6025577c9b84406f81d0d141
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_BASE_NETWORK_DELEGATE_H_
6 #define NET_BASE_NETWORK_DELEGATE_H_
8 #include <string>
10 #include "base/callback.h"
11 #include "base/strings/string16.h"
12 #include "base/threading/non_thread_safe.h"
13 #include "net/base/auth.h"
14 #include "net/base/completion_callback.h"
15 #include "net/cookies/canonical_cookie.h"
17 class GURL;
19 namespace base {
20 class FilePath;
23 namespace net {
25 // NOTE: Layering violations!
26 // We decided to accept these violations (depending
27 // on other net/ submodules from net/base/), because otherwise NetworkDelegate
28 // would have to be broken up into too many smaller interfaces targeted to each
29 // submodule. Also, since the lower levels in net/ may callback into higher
30 // levels, we may encounter dangerous casting issues.
32 // NOTE: It is not okay to add any compile-time dependencies on symbols outside
33 // of net/base here, because we have a net_base library. Forward declarations
34 // are ok.
35 class CookieOptions;
36 class HttpRequestHeaders;
37 class HttpResponseHeaders;
38 class ProxyInfo;
39 class ProxyServer;
40 class ProxyService;
41 class URLRequest;
43 class NET_EXPORT NetworkDelegate : public base::NonThreadSafe {
44 public:
45 // AuthRequiredResponse indicates how a NetworkDelegate handles an
46 // OnAuthRequired call. It's placed in this file to prevent url_request.h
47 // from having to include network_delegate.h.
48 enum AuthRequiredResponse {
49 AUTH_REQUIRED_RESPONSE_NO_ACTION,
50 AUTH_REQUIRED_RESPONSE_SET_AUTH,
51 AUTH_REQUIRED_RESPONSE_CANCEL_AUTH,
52 AUTH_REQUIRED_RESPONSE_IO_PENDING,
54 typedef base::Callback<void(AuthRequiredResponse)> AuthCallback;
56 virtual ~NetworkDelegate() {}
58 // Notification interface called by the network stack. Note that these
59 // functions mostly forward to the private virtuals. They also add some sanity
60 // checking on parameters. See the corresponding virtuals for explanations of
61 // the methods and their arguments.
62 int NotifyBeforeURLRequest(URLRequest* request,
63 const CompletionCallback& callback,
64 GURL* new_url);
65 void NotifyResolveProxy(const GURL& url,
66 int load_flags,
67 const ProxyService& proxy_service,
68 ProxyInfo* result);
69 void NotifyProxyFallback(const ProxyServer& bad_proxy,
70 int net_error);
71 int NotifyBeforeSendHeaders(URLRequest* request,
72 const CompletionCallback& callback,
73 HttpRequestHeaders* headers);
74 void NotifyBeforeSendProxyHeaders(URLRequest* request,
75 const ProxyInfo& proxy_info,
76 HttpRequestHeaders* headers);
77 void NotifySendHeaders(URLRequest* request,
78 const HttpRequestHeaders& headers);
79 int NotifyHeadersReceived(
80 URLRequest* request,
81 const CompletionCallback& callback,
82 const HttpResponseHeaders* original_response_headers,
83 scoped_refptr<HttpResponseHeaders>* override_response_headers,
84 GURL* allowed_unsafe_redirect_url);
85 void NotifyBeforeRedirect(URLRequest* request,
86 const GURL& new_location);
87 void NotifyResponseStarted(URLRequest* request);
88 void NotifyRawBytesRead(const URLRequest& request, int bytes_read);
89 void NotifyCompleted(URLRequest* request, bool started);
90 void NotifyURLRequestDestroyed(URLRequest* request);
91 void NotifyPACScriptError(int line_number, const base::string16& error);
92 AuthRequiredResponse NotifyAuthRequired(URLRequest* request,
93 const AuthChallengeInfo& auth_info,
94 const AuthCallback& callback,
95 AuthCredentials* credentials);
96 bool CanGetCookies(const URLRequest& request,
97 const CookieList& cookie_list);
98 bool CanSetCookie(const URLRequest& request,
99 const std::string& cookie_line,
100 CookieOptions* options);
101 bool CanAccessFile(const URLRequest& request,
102 const base::FilePath& path) const;
103 bool CanThrottleRequest(const URLRequest& request) const;
104 bool CanEnablePrivacyMode(const GURL& url,
105 const GURL& first_party_for_cookies) const;
107 // TODO(mkwst): Remove this once we decide whether or not we wish to ship
108 // first-party cookies. https://crbug.com/459154
109 bool FirstPartyOnlyCookieExperimentEnabled() const;
111 bool CancelURLRequestWithPolicyViolatingReferrerHeader(
112 const URLRequest& request,
113 const GURL& target_url,
114 const GURL& referrer_url) const;
116 private:
117 // This is the interface for subclasses of NetworkDelegate to implement. These
118 // member functions will be called by the respective public notification
119 // member function, which will perform basic sanity checking.
121 // Called before a request is sent. Allows the delegate to rewrite the URL
122 // being fetched by modifying |new_url|. If set, the URL must be valid. The
123 // reference fragment from the original URL is not automatically appended to
124 // |new_url|; callers are responsible for copying the reference fragment if
125 // desired.
126 // |callback| and |new_url| are valid only until OnURLRequestDestroyed is
127 // called for this request. Returns a net status code, generally either OK to
128 // continue with the request or ERR_IO_PENDING if the result is not ready yet.
129 // A status code other than OK and ERR_IO_PENDING will cancel the request and
130 // report the status code as the reason.
132 // The default implementation returns OK (continue with request).
133 virtual int OnBeforeURLRequest(URLRequest* request,
134 const CompletionCallback& callback,
135 GURL* new_url) = 0;
137 // Called as the proxy is being resolved for |url|. Allows the delegate to
138 // override the proxy resolution decision made by ProxyService. The delegate
139 // may override the decision by modifying the ProxyInfo |result|.
140 virtual void OnResolveProxy(const GURL& url,
141 int load_flags,
142 const ProxyService& proxy_service,
143 ProxyInfo* result) = 0;
145 // Called when use of |bad_proxy| fails due to |net_error|. |net_error| is
146 // the network error encountered, if any, and OK if the fallback was
147 // for a reason other than a network error (e.g. the proxy service was
148 // explicitly directed to skip a proxy).
149 virtual void OnProxyFallback(const ProxyServer& bad_proxy, int net_error) = 0;
151 // Called right before the HTTP headers are sent. Allows the delegate to
152 // read/write |headers| before they get sent out. |callback| and |headers| are
153 // valid only until OnCompleted or OnURLRequestDestroyed is called for this
154 // request.
155 // See OnBeforeURLRequest for return value description. Returns OK by default.
156 virtual int OnBeforeSendHeaders(URLRequest* request,
157 const CompletionCallback& callback,
158 HttpRequestHeaders* headers) = 0;
160 // Called after a proxy connection. Allows the delegate to read/write
161 // |headers| before they get sent out. |headers| is valid only until
162 // OnCompleted or OnURLRequestDestroyed is called for this request.
163 virtual void OnBeforeSendProxyHeaders(URLRequest* request,
164 const ProxyInfo& proxy_info,
165 HttpRequestHeaders* headers) = 0;
167 // Called right before the HTTP request(s) are being sent to the network.
168 // |headers| is only valid until OnCompleted or OnURLRequestDestroyed is
169 // called for this request.
170 virtual void OnSendHeaders(URLRequest* request,
171 const HttpRequestHeaders& headers) = 0;
173 // Called for HTTP requests when the headers have been received.
174 // |original_response_headers| contains the headers as received over the
175 // network, these must not be modified. |override_response_headers| can be set
176 // to new values, that should be considered as overriding
177 // |original_response_headers|.
178 // If the response is a redirect, and the Location response header value is
179 // identical to |allowed_unsafe_redirect_url|, then the redirect is never
180 // blocked and the reference fragment is not copied from the original URL
181 // to the redirection target.
183 // |callback|, |original_response_headers|, and |override_response_headers|
184 // are only valid until OnURLRequestDestroyed is called for this request.
185 // See OnBeforeURLRequest for return value description. Returns OK by default.
186 virtual int OnHeadersReceived(
187 URLRequest* request,
188 const CompletionCallback& callback,
189 const HttpResponseHeaders* original_response_headers,
190 scoped_refptr<HttpResponseHeaders>* override_response_headers,
191 GURL* allowed_unsafe_redirect_url) = 0;
193 // Called right after a redirect response code was received.
194 // |new_location| is only valid until OnURLRequestDestroyed is called for this
195 // request.
196 virtual void OnBeforeRedirect(URLRequest* request,
197 const GURL& new_location) = 0;
199 // This corresponds to URLRequestDelegate::OnResponseStarted.
200 virtual void OnResponseStarted(URLRequest* request) = 0;
202 // Called every time we read raw bytes.
203 virtual void OnRawBytesRead(const URLRequest& request, int bytes_read) = 0;
205 // Indicates that the URL request has been completed or failed.
206 // |started| indicates whether the request has been started. If false,
207 // some information like the socket address is not available.
208 virtual void OnCompleted(URLRequest* request, bool started) = 0;
210 // Called when an URLRequest is being destroyed. Note that the request is
211 // being deleted, so it's not safe to call any methods that may result in
212 // a virtual method call.
213 virtual void OnURLRequestDestroyed(URLRequest* request) = 0;
215 // Corresponds to ProxyResolverJSBindings::OnError.
216 virtual void OnPACScriptError(int line_number,
217 const base::string16& error) = 0;
219 // Called when a request receives an authentication challenge
220 // specified by |auth_info|, and is unable to respond using cached
221 // credentials. |callback| and |credentials| must be non-NULL, and must
222 // be valid until OnURLRequestDestroyed is called for |request|.
224 // The following return values are allowed:
225 // - AUTH_REQUIRED_RESPONSE_NO_ACTION: |auth_info| is observed, but
226 // no action is being taken on it.
227 // - AUTH_REQUIRED_RESPONSE_SET_AUTH: |credentials| is filled in with
228 // a username and password, which should be used in a response to
229 // |auth_info|.
230 // - AUTH_REQUIRED_RESPONSE_CANCEL_AUTH: The authentication challenge
231 // should not be attempted.
232 // - AUTH_REQUIRED_RESPONSE_IO_PENDING: The action will be decided
233 // asynchronously. |callback| will be invoked when the decision is made,
234 // and one of the other AuthRequiredResponse values will be passed in with
235 // the same semantics as described above.
236 virtual AuthRequiredResponse OnAuthRequired(
237 URLRequest* request,
238 const AuthChallengeInfo& auth_info,
239 const AuthCallback& callback,
240 AuthCredentials* credentials) = 0;
242 // Called when reading cookies to allow the network delegate to block access
243 // to the cookie. This method will never be invoked when
244 // LOAD_DO_NOT_SEND_COOKIES is specified.
245 virtual bool OnCanGetCookies(const URLRequest& request,
246 const CookieList& cookie_list) = 0;
248 // Called when a cookie is set to allow the network delegate to block access
249 // to the cookie. This method will never be invoked when
250 // LOAD_DO_NOT_SAVE_COOKIES is specified.
251 virtual bool OnCanSetCookie(const URLRequest& request,
252 const std::string& cookie_line,
253 CookieOptions* options) = 0;
255 // Called when a file access is attempted to allow the network delegate to
256 // allow or block access to the given file path. Returns true if access is
257 // allowed.
258 virtual bool OnCanAccessFile(const URLRequest& request,
259 const base::FilePath& path) const = 0;
261 // Returns true if the given request may be rejected when the
262 // URLRequestThrottlerManager believes the server servicing the
263 // request is overloaded or down.
264 virtual bool OnCanThrottleRequest(const URLRequest& request) const = 0;
266 // Returns true if the given |url| has to be requested over connection that
267 // is not tracked by the server. Usually is false, unless user privacy
268 // settings block cookies from being get or set.
269 virtual bool OnCanEnablePrivacyMode(
270 const GURL& url,
271 const GURL& first_party_for_cookies) const = 0;
273 // Returns true if the embedder has enabled the "first-party" cookie
274 // experiment, and false otherwise.
276 // TODO(mkwst): Remove this once we decide whether or not we wish to ship
277 // first-party cookies. https://crbug.com/459154
278 virtual bool OnFirstPartyOnlyCookieExperimentEnabled() const = 0;
280 // Called when the |referrer_url| for requesting |target_url| during handling
281 // of the |request| is does not comply with the referrer policy (e.g. a
282 // secure referrer for an insecure initial target).
283 // Returns true if the request should be cancelled. Otherwise, the referrer
284 // header is stripped from the request.
285 virtual bool OnCancelURLRequestWithPolicyViolatingReferrerHeader(
286 const URLRequest& request,
287 const GURL& target_url,
288 const GURL& referrer_url) const = 0;
291 } // namespace net
293 #endif // NET_BASE_NETWORK_DELEGATE_H_