1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_BASE_NETWORK_DELEGATE_H_
6 #define NET_BASE_NETWORK_DELEGATE_H_
10 #include "base/callback.h"
11 #include "base/strings/string16.h"
12 #include "base/threading/non_thread_safe.h"
13 #include "net/base/auth.h"
14 #include "net/base/completion_callback.h"
15 #include "net/cookies/canonical_cookie.h"
25 // NOTE: Layering violations!
26 // We decided to accept these violations (depending
27 // on other net/ submodules from net/base/), because otherwise NetworkDelegate
28 // would have to be broken up into too many smaller interfaces targeted to each
29 // submodule. Also, since the lower levels in net/ may callback into higher
30 // levels, we may encounter dangerous casting issues.
32 // NOTE: It is not okay to add any compile-time dependencies on symbols outside
33 // of net/base here, because we have a net_base library. Forward declarations
36 class HttpRequestHeaders
;
37 class HttpResponseHeaders
;
43 class NET_EXPORT NetworkDelegate
: public base::NonThreadSafe
{
45 // AuthRequiredResponse indicates how a NetworkDelegate handles an
46 // OnAuthRequired call. It's placed in this file to prevent url_request.h
47 // from having to include network_delegate.h.
48 enum AuthRequiredResponse
{
49 AUTH_REQUIRED_RESPONSE_NO_ACTION
,
50 AUTH_REQUIRED_RESPONSE_SET_AUTH
,
51 AUTH_REQUIRED_RESPONSE_CANCEL_AUTH
,
52 AUTH_REQUIRED_RESPONSE_IO_PENDING
,
54 typedef base::Callback
<void(AuthRequiredResponse
)> AuthCallback
;
56 virtual ~NetworkDelegate() {}
58 // Notification interface called by the network stack. Note that these
59 // functions mostly forward to the private virtuals. They also add some sanity
60 // checking on parameters. See the corresponding virtuals for explanations of
61 // the methods and their arguments.
62 int NotifyBeforeURLRequest(URLRequest
* request
,
63 const CompletionCallback
& callback
,
65 void NotifyResolveProxy(const GURL
& url
,
67 const ProxyService
& proxy_service
,
69 void NotifyProxyFallback(const ProxyServer
& bad_proxy
,
71 int NotifyBeforeSendHeaders(URLRequest
* request
,
72 const CompletionCallback
& callback
,
73 HttpRequestHeaders
* headers
);
74 void NotifyBeforeSendProxyHeaders(URLRequest
* request
,
75 const ProxyInfo
& proxy_info
,
76 HttpRequestHeaders
* headers
);
77 void NotifySendHeaders(URLRequest
* request
,
78 const HttpRequestHeaders
& headers
);
79 int NotifyHeadersReceived(
81 const CompletionCallback
& callback
,
82 const HttpResponseHeaders
* original_response_headers
,
83 scoped_refptr
<HttpResponseHeaders
>* override_response_headers
,
84 GURL
* allowed_unsafe_redirect_url
);
85 void NotifyBeforeRedirect(URLRequest
* request
,
86 const GURL
& new_location
);
87 void NotifyResponseStarted(URLRequest
* request
);
88 void NotifyRawBytesRead(const URLRequest
& request
, int bytes_read
);
89 void NotifyCompleted(URLRequest
* request
, bool started
);
90 void NotifyURLRequestDestroyed(URLRequest
* request
);
91 void NotifyPACScriptError(int line_number
, const base::string16
& error
);
92 AuthRequiredResponse
NotifyAuthRequired(URLRequest
* request
,
93 const AuthChallengeInfo
& auth_info
,
94 const AuthCallback
& callback
,
95 AuthCredentials
* credentials
);
96 bool CanGetCookies(const URLRequest
& request
,
97 const CookieList
& cookie_list
);
98 bool CanSetCookie(const URLRequest
& request
,
99 const std::string
& cookie_line
,
100 CookieOptions
* options
);
101 bool CanAccessFile(const URLRequest
& request
,
102 const base::FilePath
& path
) const;
103 bool CanThrottleRequest(const URLRequest
& request
) const;
104 bool CanEnablePrivacyMode(const GURL
& url
,
105 const GURL
& first_party_for_cookies
) const;
107 // TODO(mkwst): Remove this once we decide whether or not we wish to ship
108 // first-party cookies. https://crbug.com/459154
109 bool FirstPartyOnlyCookieExperimentEnabled() const;
111 bool CancelURLRequestWithPolicyViolatingReferrerHeader(
112 const URLRequest
& request
,
113 const GURL
& target_url
,
114 const GURL
& referrer_url
) const;
117 // This is the interface for subclasses of NetworkDelegate to implement. These
118 // member functions will be called by the respective public notification
119 // member function, which will perform basic sanity checking.
121 // Called before a request is sent. Allows the delegate to rewrite the URL
122 // being fetched by modifying |new_url|. If set, the URL must be valid. The
123 // reference fragment from the original URL is not automatically appended to
124 // |new_url|; callers are responsible for copying the reference fragment if
126 // |callback| and |new_url| are valid only until OnURLRequestDestroyed is
127 // called for this request. Returns a net status code, generally either OK to
128 // continue with the request or ERR_IO_PENDING if the result is not ready yet.
129 // A status code other than OK and ERR_IO_PENDING will cancel the request and
130 // report the status code as the reason.
132 // The default implementation returns OK (continue with request).
133 virtual int OnBeforeURLRequest(URLRequest
* request
,
134 const CompletionCallback
& callback
,
137 // Called as the proxy is being resolved for |url|. Allows the delegate to
138 // override the proxy resolution decision made by ProxyService. The delegate
139 // may override the decision by modifying the ProxyInfo |result|.
140 virtual void OnResolveProxy(const GURL
& url
,
142 const ProxyService
& proxy_service
,
143 ProxyInfo
* result
) = 0;
145 // Called when use of |bad_proxy| fails due to |net_error|. |net_error| is
146 // the network error encountered, if any, and OK if the fallback was
147 // for a reason other than a network error (e.g. the proxy service was
148 // explicitly directed to skip a proxy).
149 virtual void OnProxyFallback(const ProxyServer
& bad_proxy
, int net_error
) = 0;
151 // Called right before the HTTP headers are sent. Allows the delegate to
152 // read/write |headers| before they get sent out. |callback| and |headers| are
153 // valid only until OnCompleted or OnURLRequestDestroyed is called for this
155 // See OnBeforeURLRequest for return value description. Returns OK by default.
156 virtual int OnBeforeSendHeaders(URLRequest
* request
,
157 const CompletionCallback
& callback
,
158 HttpRequestHeaders
* headers
) = 0;
160 // Called after a proxy connection. Allows the delegate to read/write
161 // |headers| before they get sent out. |headers| is valid only until
162 // OnCompleted or OnURLRequestDestroyed is called for this request.
163 virtual void OnBeforeSendProxyHeaders(URLRequest
* request
,
164 const ProxyInfo
& proxy_info
,
165 HttpRequestHeaders
* headers
) = 0;
167 // Called right before the HTTP request(s) are being sent to the network.
168 // |headers| is only valid until OnCompleted or OnURLRequestDestroyed is
169 // called for this request.
170 virtual void OnSendHeaders(URLRequest
* request
,
171 const HttpRequestHeaders
& headers
) = 0;
173 // Called for HTTP requests when the headers have been received.
174 // |original_response_headers| contains the headers as received over the
175 // network, these must not be modified. |override_response_headers| can be set
176 // to new values, that should be considered as overriding
177 // |original_response_headers|.
178 // If the response is a redirect, and the Location response header value is
179 // identical to |allowed_unsafe_redirect_url|, then the redirect is never
180 // blocked and the reference fragment is not copied from the original URL
181 // to the redirection target.
183 // |callback|, |original_response_headers|, and |override_response_headers|
184 // are only valid until OnURLRequestDestroyed is called for this request.
185 // See OnBeforeURLRequest for return value description. Returns OK by default.
186 virtual int OnHeadersReceived(
188 const CompletionCallback
& callback
,
189 const HttpResponseHeaders
* original_response_headers
,
190 scoped_refptr
<HttpResponseHeaders
>* override_response_headers
,
191 GURL
* allowed_unsafe_redirect_url
) = 0;
193 // Called right after a redirect response code was received.
194 // |new_location| is only valid until OnURLRequestDestroyed is called for this
196 virtual void OnBeforeRedirect(URLRequest
* request
,
197 const GURL
& new_location
) = 0;
199 // This corresponds to URLRequestDelegate::OnResponseStarted.
200 virtual void OnResponseStarted(URLRequest
* request
) = 0;
202 // Called every time we read raw bytes.
203 virtual void OnRawBytesRead(const URLRequest
& request
, int bytes_read
) = 0;
205 // Indicates that the URL request has been completed or failed.
206 // |started| indicates whether the request has been started. If false,
207 // some information like the socket address is not available.
208 virtual void OnCompleted(URLRequest
* request
, bool started
) = 0;
210 // Called when an URLRequest is being destroyed. Note that the request is
211 // being deleted, so it's not safe to call any methods that may result in
212 // a virtual method call.
213 virtual void OnURLRequestDestroyed(URLRequest
* request
) = 0;
215 // Corresponds to ProxyResolverJSBindings::OnError.
216 virtual void OnPACScriptError(int line_number
,
217 const base::string16
& error
) = 0;
219 // Called when a request receives an authentication challenge
220 // specified by |auth_info|, and is unable to respond using cached
221 // credentials. |callback| and |credentials| must be non-NULL, and must
222 // be valid until OnURLRequestDestroyed is called for |request|.
224 // The following return values are allowed:
225 // - AUTH_REQUIRED_RESPONSE_NO_ACTION: |auth_info| is observed, but
226 // no action is being taken on it.
227 // - AUTH_REQUIRED_RESPONSE_SET_AUTH: |credentials| is filled in with
228 // a username and password, which should be used in a response to
230 // - AUTH_REQUIRED_RESPONSE_CANCEL_AUTH: The authentication challenge
231 // should not be attempted.
232 // - AUTH_REQUIRED_RESPONSE_IO_PENDING: The action will be decided
233 // asynchronously. |callback| will be invoked when the decision is made,
234 // and one of the other AuthRequiredResponse values will be passed in with
235 // the same semantics as described above.
236 virtual AuthRequiredResponse
OnAuthRequired(
238 const AuthChallengeInfo
& auth_info
,
239 const AuthCallback
& callback
,
240 AuthCredentials
* credentials
) = 0;
242 // Called when reading cookies to allow the network delegate to block access
243 // to the cookie. This method will never be invoked when
244 // LOAD_DO_NOT_SEND_COOKIES is specified.
245 virtual bool OnCanGetCookies(const URLRequest
& request
,
246 const CookieList
& cookie_list
) = 0;
248 // Called when a cookie is set to allow the network delegate to block access
249 // to the cookie. This method will never be invoked when
250 // LOAD_DO_NOT_SAVE_COOKIES is specified.
251 virtual bool OnCanSetCookie(const URLRequest
& request
,
252 const std::string
& cookie_line
,
253 CookieOptions
* options
) = 0;
255 // Called when a file access is attempted to allow the network delegate to
256 // allow or block access to the given file path. Returns true if access is
258 virtual bool OnCanAccessFile(const URLRequest
& request
,
259 const base::FilePath
& path
) const = 0;
261 // Returns true if the given request may be rejected when the
262 // URLRequestThrottlerManager believes the server servicing the
263 // request is overloaded or down.
264 virtual bool OnCanThrottleRequest(const URLRequest
& request
) const = 0;
266 // Returns true if the given |url| has to be requested over connection that
267 // is not tracked by the server. Usually is false, unless user privacy
268 // settings block cookies from being get or set.
269 virtual bool OnCanEnablePrivacyMode(
271 const GURL
& first_party_for_cookies
) const = 0;
273 // Returns true if the embedder has enabled the "first-party" cookie
274 // experiment, and false otherwise.
276 // TODO(mkwst): Remove this once we decide whether or not we wish to ship
277 // first-party cookies. https://crbug.com/459154
278 virtual bool OnFirstPartyOnlyCookieExperimentEnabled() const = 0;
280 // Called when the |referrer_url| for requesting |target_url| during handling
281 // of the |request| is does not comply with the referrer policy (e.g. a
282 // secure referrer for an insecure initial target).
283 // Returns true if the request should be cancelled. Otherwise, the referrer
284 // header is stripped from the request.
285 virtual bool OnCancelURLRequestWithPolicyViolatingReferrerHeader(
286 const URLRequest
& request
,
287 const GURL
& target_url
,
288 const GURL
& referrer_url
) const = 0;
293 #endif // NET_BASE_NETWORK_DELEGATE_H_