Disable firewall check. It takes signifficant time, need to be on FILE thread.
[chromium-blink-merge.git] / net / filter / filter.cc
blob497b9dc9d584d147141af6bc949840afd7b207fe
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/filter/filter.h"
7 #include "base/files/file_path.h"
8 #include "base/strings/string_util.h"
9 #include "net/base/filename_util.h"
10 #include "net/base/io_buffer.h"
11 #include "net/base/mime_util.h"
12 #include "net/filter/gzip_filter.h"
13 #include "net/filter/sdch_filter.h"
14 #include "url/gurl.h"
16 namespace {
18 // Filter types (using canonical lower case only):
19 const char kDeflate[] = "deflate";
20 const char kGZip[] = "gzip";
21 const char kXGZip[] = "x-gzip";
22 const char kSdch[] = "sdch";
23 // compress and x-compress are currently not supported. If we decide to support
24 // them, we'll need the same mime type compatibility hack we have for gzip. For
25 // more information, see Firefox's nsHttpChannel::ProcessNormal.
27 // Mime types:
28 const char kApplicationXGzip[] = "application/x-gzip";
29 const char kApplicationGzip[] = "application/gzip";
30 const char kApplicationXGunzip[] = "application/x-gunzip";
31 const char kTextHtml[] = "text/html";
33 // Buffer size allocated when de-compressing data.
34 const int kFilterBufSize = 32 * 1024;
36 } // namespace
38 namespace net {
40 FilterContext::~FilterContext() {
43 Filter::~Filter() {}
45 // static
46 Filter* Filter::Factory(const std::vector<FilterType>& filter_types,
47 const FilterContext& filter_context) {
48 if (filter_types.empty())
49 return NULL;
51 Filter* filter_list = NULL; // Linked list of filters.
52 for (size_t i = 0; i < filter_types.size(); i++) {
53 filter_list = PrependNewFilter(filter_types[i], filter_context,
54 kFilterBufSize, filter_list);
55 if (!filter_list)
56 return NULL;
58 return filter_list;
61 // static
62 Filter* Filter::GZipFactory() {
63 return InitGZipFilter(FILTER_TYPE_GZIP, kFilterBufSize);
66 // static
67 Filter* Filter::FactoryForTests(const std::vector<FilterType>& filter_types,
68 const FilterContext& filter_context,
69 int buffer_size) {
70 if (filter_types.empty())
71 return NULL;
73 Filter* filter_list = NULL; // Linked list of filters.
74 for (size_t i = 0; i < filter_types.size(); i++) {
75 filter_list = PrependNewFilter(filter_types[i], filter_context,
76 buffer_size, filter_list);
77 if (!filter_list)
78 return NULL;
80 return filter_list;
83 Filter::FilterStatus Filter::ReadData(char* dest_buffer, int* dest_len) {
84 const int dest_buffer_capacity = *dest_len;
85 if (last_status_ == FILTER_ERROR)
86 return last_status_;
87 if (!next_filter_.get())
88 return last_status_ = ReadFilteredData(dest_buffer, dest_len);
89 if (last_status_ == FILTER_NEED_MORE_DATA && !stream_data_len())
90 return next_filter_->ReadData(dest_buffer, dest_len);
92 do {
93 if (next_filter_->last_status() == FILTER_NEED_MORE_DATA) {
94 PushDataIntoNextFilter();
95 if (FILTER_ERROR == last_status_)
96 return FILTER_ERROR;
98 *dest_len = dest_buffer_capacity; // Reset the input/output parameter.
99 next_filter_->ReadData(dest_buffer, dest_len);
100 if (FILTER_NEED_MORE_DATA == last_status_)
101 return next_filter_->last_status();
103 // In the case where this filter has data internally, and is indicating such
104 // with a last_status_ of FILTER_OK, but at the same time the next filter in
105 // the chain indicated it FILTER_NEED_MORE_DATA, we have to be cautious
106 // about confusing the caller. The API confusion can appear if we return
107 // FILTER_OK (suggesting we have more data in aggregate), but yet we don't
108 // populate our output buffer. When that is the case, we need to
109 // alternately call our filter element, and the next_filter element until we
110 // get out of this state (by pumping data into the next filter until it
111 // outputs data, or it runs out of data and reports that it NEED_MORE_DATA.)
112 } while (FILTER_OK == last_status_ &&
113 FILTER_NEED_MORE_DATA == next_filter_->last_status() &&
114 0 == *dest_len);
116 if (next_filter_->last_status() == FILTER_ERROR)
117 return FILTER_ERROR;
118 return FILTER_OK;
121 bool Filter::FlushStreamBuffer(int stream_data_len) {
122 DCHECK_LE(stream_data_len, stream_buffer_size_);
123 if (stream_data_len <= 0 || stream_data_len > stream_buffer_size_)
124 return false;
126 DCHECK(stream_buffer());
127 // Bail out if there is more data in the stream buffer to be filtered.
128 if (!stream_buffer() || stream_data_len_)
129 return false;
131 next_stream_data_ = stream_buffer()->data();
132 stream_data_len_ = stream_data_len;
133 return true;
136 // static
137 Filter::FilterType Filter::ConvertEncodingToType(
138 const std::string& filter_type) {
139 FilterType type_id;
140 if (LowerCaseEqualsASCII(filter_type, kDeflate)) {
141 type_id = FILTER_TYPE_DEFLATE;
142 } else if (LowerCaseEqualsASCII(filter_type, kGZip) ||
143 LowerCaseEqualsASCII(filter_type, kXGZip)) {
144 type_id = FILTER_TYPE_GZIP;
145 } else if (LowerCaseEqualsASCII(filter_type, kSdch)) {
146 type_id = FILTER_TYPE_SDCH;
147 } else {
148 // Note we also consider "identity" and "uncompressed" UNSUPPORTED as
149 // filter should be disabled in such cases.
150 type_id = FILTER_TYPE_UNSUPPORTED;
152 return type_id;
155 // static
156 void Filter::FixupEncodingTypes(
157 const FilterContext& filter_context,
158 std::vector<FilterType>* encoding_types) {
159 std::string mime_type;
160 bool success = filter_context.GetMimeType(&mime_type);
161 DCHECK(success || mime_type.empty());
163 if ((1 == encoding_types->size()) &&
164 (FILTER_TYPE_GZIP == encoding_types->front())) {
165 if (LowerCaseEqualsASCII(mime_type, kApplicationXGzip) ||
166 LowerCaseEqualsASCII(mime_type, kApplicationGzip) ||
167 LowerCaseEqualsASCII(mime_type, kApplicationXGunzip))
168 // The server has told us that it sent us gziped content with a gzip
169 // content encoding. Sadly, Apache mistakenly sets these headers for all
170 // .gz files. We match Firefox's nsHttpChannel::ProcessNormal and ignore
171 // the Content-Encoding here.
172 encoding_types->clear();
174 GURL url;
175 std::string disposition;
176 success = filter_context.GetURL(&url);
177 DCHECK(success);
178 filter_context.GetContentDisposition(&disposition);
179 // Don't supply a MIME type here, since that may cause disk IO.
180 base::FilePath filepath = GenerateFileName(url, disposition, "UTF-8", "",
181 "", "");
182 base::FilePath::StringType extension = filepath.Extension();
184 if (filter_context.IsDownload()) {
185 // We don't want to decompress gzipped files when the user explicitly
186 // asks to download them.
187 // For the case of svgz files, we use the extension to distinguish
188 // between svgz files and svg files compressed with gzip by the server.
189 // When viewing a .svgz file, we need to uncompress it, but we don't
190 // want to do that when downloading.
191 // See Firefox's nonDecodableExtensions in nsExternalHelperAppService.cpp
192 if (EndsWith(extension, FILE_PATH_LITERAL(".gz"), false) ||
193 LowerCaseEqualsASCII(extension, ".tgz") ||
194 LowerCaseEqualsASCII(extension, ".svgz"))
195 encoding_types->clear();
196 } else {
197 // When the user does not explicitly ask to download a file, if we get a
198 // supported mime type, then we attempt to decompress in order to view it.
199 // However, if it's not a supported mime type, then we will attempt to
200 // download it, and in that case, don't decompress .gz/.tgz files.
201 if ((EndsWith(extension, FILE_PATH_LITERAL(".gz"), false) ||
202 LowerCaseEqualsASCII(extension, ".tgz")) &&
203 !IsSupportedMimeType(mime_type))
204 encoding_types->clear();
208 // If the request was for SDCH content, then we might need additional fixups.
209 if (!filter_context.IsSdchResponse()) {
210 // It was not an SDCH request, so we'll just record stats.
211 if (1 < encoding_types->size()) {
212 // Multiple filters were intended to only be used for SDCH (thus far!)
213 SdchManager::SdchErrorRecovery(
214 SdchManager::MULTIENCODING_FOR_NON_SDCH_REQUEST);
216 if ((1 == encoding_types->size()) &&
217 (FILTER_TYPE_SDCH == encoding_types->front())) {
218 SdchManager::SdchErrorRecovery(
219 SdchManager::SDCH_CONTENT_ENCODE_FOR_NON_SDCH_REQUEST);
221 return;
224 // The request was tagged as an SDCH request, which means the server supplied
225 // a dictionary, and we advertised it in the request. Some proxies will do
226 // very strange things to the request, or the response, so we have to handle
227 // them gracefully.
229 // If content encoding included SDCH, then everything is "relatively" fine.
230 if (!encoding_types->empty() &&
231 (FILTER_TYPE_SDCH == encoding_types->front())) {
232 // Some proxies (found currently in Argentina) strip the Content-Encoding
233 // text from "sdch,gzip" to a mere "sdch" without modifying the compressed
234 // payload. To handle this gracefully, we simulate the "probably" deleted
235 // ",gzip" by appending a tentative gzip decode, which will default to a
236 // no-op pass through filter if it doesn't get gzip headers where expected.
237 if (1 == encoding_types->size()) {
238 encoding_types->push_back(FILTER_TYPE_GZIP_HELPING_SDCH);
239 SdchManager::SdchErrorRecovery(
240 SdchManager::OPTIONAL_GUNZIP_ENCODING_ADDED);
242 return;
245 // There are now several cases to handle for an SDCH request. Foremost, if
246 // the outbound request was stripped so as not to advertise support for
247 // encodings, we might get back content with no encoding, or (for example)
248 // just gzip. We have to be sure that any changes we make allow for such
249 // minimal coding to work. That issue is why we use TENTATIVE filters if we
250 // add any, as those filters sniff the content, and act as pass-through
251 // filters if headers are not found.
253 // If the outbound GET is not modified, then the server will generally try to
254 // send us SDCH encoded content. As that content returns, there are several
255 // corruptions of the header "content-encoding" that proxies may perform (and
256 // have been detected in the wild). We already dealt with the a honest
257 // content encoding of "sdch,gzip" being corrupted into "sdch" with on change
258 // of the actual content. Another common corruption is to either disscard
259 // the accurate content encoding, or to replace it with gzip only (again, with
260 // no change in actual content). The last observed corruption it to actually
261 // change the content, such as by re-gzipping it, and that may happen along
262 // with corruption of the stated content encoding (wow!).
264 // The one unresolved failure mode comes when we advertise a dictionary, and
265 // the server tries to *send* a gzipped file (not gzip encode content), and
266 // then we could do a gzip decode :-(. Since SDCH is only (currently)
267 // supported server side on paths that only send HTML content, this mode has
268 // never surfaced in the wild (and is unlikely to).
269 // We will gather a lot of stats as we perform the fixups
270 if (StartsWithASCII(mime_type, kTextHtml, false)) {
271 // Suspicious case: Advertised dictionary, but server didn't use sdch, and
272 // we're HTML tagged.
273 if (encoding_types->empty()) {
274 SdchManager::SdchErrorRecovery(
275 SdchManager::ADDED_CONTENT_ENCODING);
276 } else if (1 == encoding_types->size()) {
277 SdchManager::SdchErrorRecovery(
278 SdchManager::FIXED_CONTENT_ENCODING);
279 } else {
280 SdchManager::SdchErrorRecovery(
281 SdchManager::FIXED_CONTENT_ENCODINGS);
283 } else {
284 // Remarkable case!?! We advertised an SDCH dictionary, content-encoding
285 // was not marked for SDCH processing: Why did the server suggest an SDCH
286 // dictionary in the first place??. Also, the content isn't
287 // tagged as HTML, despite the fact that SDCH encoding is mostly likely for
288 // HTML: Did some anti-virus system strip this tag (sometimes they strip
289 // accept-encoding headers on the request)?? Does the content encoding not
290 // start with "text/html" for some other reason?? We'll report this as a
291 // fixup to a binary file, but it probably really is text/html (some how).
292 if (encoding_types->empty()) {
293 SdchManager::SdchErrorRecovery(
294 SdchManager::BINARY_ADDED_CONTENT_ENCODING);
295 } else if (1 == encoding_types->size()) {
296 SdchManager::SdchErrorRecovery(
297 SdchManager::BINARY_FIXED_CONTENT_ENCODING);
298 } else {
299 SdchManager::SdchErrorRecovery(
300 SdchManager::BINARY_FIXED_CONTENT_ENCODINGS);
304 // Leave the existing encoding type to be processed first, and add our
305 // tentative decodings to be done afterwards. Vodaphone UK reportedyl will
306 // perform a second layer of gzip encoding atop the server's sdch,gzip
307 // encoding, and then claim that the content encoding is a mere gzip. As a
308 // result we'll need (in that case) to do the gunzip, plus our tentative
309 // gunzip and tentative SDCH decoding.
310 // This approach nicely handles the empty() list as well, and should work with
311 // other (as yet undiscovered) proxies the choose to re-compressed with some
312 // other encoding (such as bzip2, etc.).
313 encoding_types->insert(encoding_types->begin(),
314 FILTER_TYPE_GZIP_HELPING_SDCH);
315 encoding_types->insert(encoding_types->begin(), FILTER_TYPE_SDCH_POSSIBLE);
316 return;
319 Filter::Filter()
320 : stream_buffer_(NULL),
321 stream_buffer_size_(0),
322 next_stream_data_(NULL),
323 stream_data_len_(0),
324 last_status_(FILTER_NEED_MORE_DATA) {}
326 Filter::FilterStatus Filter::CopyOut(char* dest_buffer, int* dest_len) {
327 int out_len;
328 int input_len = *dest_len;
329 *dest_len = 0;
331 if (0 == stream_data_len_)
332 return Filter::FILTER_NEED_MORE_DATA;
334 out_len = std::min(input_len, stream_data_len_);
335 memcpy(dest_buffer, next_stream_data_, out_len);
336 *dest_len += out_len;
337 stream_data_len_ -= out_len;
338 if (0 == stream_data_len_) {
339 next_stream_data_ = NULL;
340 return Filter::FILTER_NEED_MORE_DATA;
341 } else {
342 next_stream_data_ += out_len;
343 return Filter::FILTER_OK;
347 // static
348 Filter* Filter::InitGZipFilter(FilterType type_id, int buffer_size) {
349 scoped_ptr<GZipFilter> gz_filter(new GZipFilter());
350 gz_filter->InitBuffer(buffer_size);
351 return gz_filter->InitDecoding(type_id) ? gz_filter.release() : NULL;
354 // static
355 Filter* Filter::InitSdchFilter(FilterType type_id,
356 const FilterContext& filter_context,
357 int buffer_size) {
358 scoped_ptr<SdchFilter> sdch_filter(new SdchFilter(filter_context));
359 sdch_filter->InitBuffer(buffer_size);
360 return sdch_filter->InitDecoding(type_id) ? sdch_filter.release() : NULL;
363 // static
364 Filter* Filter::PrependNewFilter(FilterType type_id,
365 const FilterContext& filter_context,
366 int buffer_size,
367 Filter* filter_list) {
368 scoped_ptr<Filter> first_filter; // Soon to be start of chain.
369 switch (type_id) {
370 case FILTER_TYPE_GZIP_HELPING_SDCH:
371 case FILTER_TYPE_DEFLATE:
372 case FILTER_TYPE_GZIP:
373 first_filter.reset(InitGZipFilter(type_id, buffer_size));
374 break;
375 case FILTER_TYPE_SDCH:
376 case FILTER_TYPE_SDCH_POSSIBLE:
377 if (SdchManager::Global() && SdchManager::sdch_enabled()) {
378 first_filter.reset(
379 InitSdchFilter(type_id, filter_context, buffer_size));
381 break;
382 default:
383 break;
386 if (!first_filter.get())
387 return NULL;
389 first_filter->next_filter_.reset(filter_list);
390 return first_filter.release();
393 void Filter::InitBuffer(int buffer_size) {
394 DCHECK(!stream_buffer());
395 DCHECK_GT(buffer_size, 0);
396 stream_buffer_ = new IOBuffer(buffer_size);
397 stream_buffer_size_ = buffer_size;
400 void Filter::PushDataIntoNextFilter() {
401 IOBuffer* next_buffer = next_filter_->stream_buffer();
402 int next_size = next_filter_->stream_buffer_size();
403 last_status_ = ReadFilteredData(next_buffer->data(), &next_size);
404 if (FILTER_ERROR != last_status_)
405 next_filter_->FlushStreamBuffer(next_size);
408 } // namespace net