1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/browser/loader/buffered_resource_handler.h"
10 #include "base/location.h"
11 #include "base/logging.h"
12 #include "base/metrics/histogram.h"
13 #include "base/single_thread_task_runner.h"
14 #include "base/strings/string_util.h"
15 #include "base/thread_task_runner_handle.h"
16 #include "components/mime_util/mime_util.h"
17 #include "content/browser/download/download_resource_handler.h"
18 #include "content/browser/download/download_stats.h"
19 #include "content/browser/loader/certificate_resource_handler.h"
20 #include "content/browser/loader/resource_dispatcher_host_impl.h"
21 #include "content/browser/loader/resource_request_info_impl.h"
22 #include "content/browser/loader/stream_resource_handler.h"
23 #include "content/public/browser/content_browser_client.h"
24 #include "content/public/browser/download_item.h"
25 #include "content/public/browser/download_save_info.h"
26 #include "content/public/browser/download_url_parameters.h"
27 #include "content/public/browser/plugin_service.h"
28 #include "content/public/browser/resource_context.h"
29 #include "content/public/browser/resource_dispatcher_host_delegate.h"
30 #include "content/public/common/resource_response.h"
31 #include "content/public/common/webplugininfo.h"
32 #include "net/base/io_buffer.h"
33 #include "net/base/mime_sniffer.h"
34 #include "net/base/mime_util.h"
35 #include "net/base/net_errors.h"
36 #include "net/http/http_content_disposition.h"
37 #include "net/http/http_response_headers.h"
43 void RecordSnifferMetrics(bool sniffing_blocked
,
44 bool we_would_like_to_sniff
,
45 const std::string
& mime_type
) {
46 static base::HistogramBase
* nosniff_usage(NULL
);
48 nosniff_usage
= base::BooleanHistogram::FactoryGet(
49 "nosniff.usage", base::HistogramBase::kUmaTargetedHistogramFlag
);
50 nosniff_usage
->AddBoolean(sniffing_blocked
);
52 if (sniffing_blocked
) {
53 static base::HistogramBase
* nosniff_otherwise(NULL
);
54 if (!nosniff_otherwise
)
55 nosniff_otherwise
= base::BooleanHistogram::FactoryGet(
56 "nosniff.otherwise", base::HistogramBase::kUmaTargetedHistogramFlag
);
57 nosniff_otherwise
->AddBoolean(we_would_like_to_sniff
);
59 static base::HistogramBase
* nosniff_empty_mime_type(NULL
);
60 if (!nosniff_empty_mime_type
)
61 nosniff_empty_mime_type
= base::BooleanHistogram::FactoryGet(
62 "nosniff.empty_mime_type",
63 base::HistogramBase::kUmaTargetedHistogramFlag
);
64 nosniff_empty_mime_type
->AddBoolean(mime_type
.empty());
68 // Used to write into an existing IOBuffer at a given offset.
69 class DependentIOBuffer
: public net::WrappedIOBuffer
{
71 DependentIOBuffer(net::IOBuffer
* buf
, int offset
)
72 : net::WrappedIOBuffer(buf
->data() + offset
),
77 ~DependentIOBuffer() override
{}
79 scoped_refptr
<net::IOBuffer
> buf_
;
84 BufferedResourceHandler::BufferedResourceHandler(
85 scoped_ptr
<ResourceHandler
> next_handler
,
86 ResourceDispatcherHostImpl
* host
,
87 PluginService
* plugin_service
,
88 net::URLRequest
* request
)
89 : LayeredResourceHandler(request
, next_handler
.Pass()),
90 state_(STATE_STARTING
),
92 plugin_service_(plugin_service
),
95 must_download_(false),
96 must_download_is_set_(false),
97 weak_ptr_factory_(this) {
100 BufferedResourceHandler::~BufferedResourceHandler() {
103 void BufferedResourceHandler::SetController(ResourceController
* controller
) {
104 ResourceHandler::SetController(controller
);
106 // Downstream handlers see us as their ResourceController, which allows us to
107 // consume part or all of the resource response, and then later replay it to
108 // downstream handler.
109 DCHECK(next_handler_
.get());
110 next_handler_
->SetController(this);
113 bool BufferedResourceHandler::OnResponseStarted(ResourceResponse
* response
,
115 response_
= response
;
117 // A 304 response should not contain a Content-Type header (RFC 7232 section
118 // 4.1). The following code may incorrectly attempt to add a Content-Type to
119 // the response, and so must be skipped for 304 responses.
120 if (!(response_
->head
.headers
.get() &&
121 response_
->head
.headers
->response_code() == 304)) {
122 if (ShouldSniffContent()) {
123 state_
= STATE_BUFFERING
;
127 if (response_
->head
.mime_type
.empty()) {
128 // Ugg. The server told us not to sniff the content but didn't give us
129 // a mime type. What's a browser to do? Turns out, we're supposed to
130 // treat the response as "text/plain". This is the most secure option.
131 response_
->head
.mime_type
.assign("text/plain");
134 // Treat feed types as text/plain.
135 if (response_
->head
.mime_type
== "application/rss+xml" ||
136 response_
->head
.mime_type
== "application/atom+xml") {
137 response_
->head
.mime_type
.assign("text/plain");
141 state_
= STATE_PROCESSING
;
142 return ProcessResponse(defer
);
145 // We'll let the original event handler provide a buffer, and reuse it for
146 // subsequent reads until we're done buffering.
147 bool BufferedResourceHandler::OnWillRead(scoped_refptr
<net::IOBuffer
>* buf
,
150 if (state_
== STATE_STREAMING
)
151 return next_handler_
->OnWillRead(buf
, buf_size
, min_size
);
153 DCHECK_EQ(-1, min_size
);
155 if (read_buffer_
.get()) {
156 CHECK_LT(bytes_read_
, read_buffer_size_
);
157 *buf
= new DependentIOBuffer(read_buffer_
.get(), bytes_read_
);
158 *buf_size
= read_buffer_size_
- bytes_read_
;
160 if (!next_handler_
->OnWillRead(buf
, buf_size
, min_size
))
164 read_buffer_size_
= *buf_size
;
165 DCHECK_GE(read_buffer_size_
, net::kMaxBytesToSniff
* 2);
170 bool BufferedResourceHandler::OnReadCompleted(int bytes_read
, bool* defer
) {
171 if (state_
== STATE_STREAMING
)
172 return next_handler_
->OnReadCompleted(bytes_read
, defer
);
174 DCHECK_EQ(state_
, STATE_BUFFERING
);
175 bytes_read_
+= bytes_read
;
177 if (!DetermineMimeType() && (bytes_read
> 0))
178 return true; // Needs more data, so keep buffering.
180 state_
= STATE_PROCESSING
;
181 return ProcessResponse(defer
);
184 void BufferedResourceHandler::OnResponseCompleted(
185 const net::URLRequestStatus
& status
,
186 const std::string
& security_info
,
188 // Upon completion, act like a pass-through handler in case the downstream
189 // handler defers OnResponseCompleted.
190 state_
= STATE_STREAMING
;
192 next_handler_
->OnResponseCompleted(status
, security_info
, defer
);
195 void BufferedResourceHandler::Resume() {
197 case STATE_BUFFERING
:
198 case STATE_PROCESSING
:
201 case STATE_REPLAYING
:
202 base::ThreadTaskRunnerHandle::Get()->PostTask(
204 base::Bind(&BufferedResourceHandler::CallReplayReadCompleted
,
205 weak_ptr_factory_
.GetWeakPtr()));
208 case STATE_STREAMING
:
209 controller()->Resume();
214 void BufferedResourceHandler::Cancel() {
215 controller()->Cancel();
218 void BufferedResourceHandler::CancelAndIgnore() {
219 controller()->CancelAndIgnore();
222 void BufferedResourceHandler::CancelWithError(int error_code
) {
223 controller()->CancelWithError(error_code
);
226 bool BufferedResourceHandler::ProcessResponse(bool* defer
) {
227 DCHECK_EQ(STATE_PROCESSING
, state_
);
229 // TODO(darin): Stop special-casing 304 responses.
230 if (!(response_
->head
.headers
.get() &&
231 response_
->head
.headers
->response_code() == 304)) {
232 if (!SelectNextHandler(defer
))
238 state_
= STATE_REPLAYING
;
240 if (!next_handler_
->OnResponseStarted(response_
.get(), defer
))
243 if (!read_buffer_
.get()) {
244 state_
= STATE_STREAMING
;
249 return ReplayReadCompleted(defer
);
254 bool BufferedResourceHandler::ShouldSniffContent() {
255 const std::string
& mime_type
= response_
->head
.mime_type
;
257 std::string content_type_options
;
258 request()->GetResponseHeaderByName("x-content-type-options",
259 &content_type_options
);
261 bool sniffing_blocked
=
262 base::LowerCaseEqualsASCII(content_type_options
, "nosniff");
263 bool we_would_like_to_sniff
=
264 net::ShouldSniffMimeType(request()->url(), mime_type
);
266 RecordSnifferMetrics(sniffing_blocked
, we_would_like_to_sniff
, mime_type
);
268 if (!sniffing_blocked
&& we_would_like_to_sniff
) {
269 // We're going to look at the data before deciding what the content type
270 // is. That means we need to delay sending the ResponseStarted message
271 // over the IPC channel.
272 VLOG(1) << "To buffer: " << request()->url().spec();
279 bool BufferedResourceHandler::DetermineMimeType() {
280 DCHECK_EQ(STATE_BUFFERING
, state_
);
282 const std::string
& type_hint
= response_
->head
.mime_type
;
284 std::string new_type
;
285 bool made_final_decision
=
286 net::SniffMimeType(read_buffer_
->data(), bytes_read_
, request()->url(),
287 type_hint
, &new_type
);
289 // SniffMimeType() returns false if there is not enough data to determine
290 // the mime type. However, even if it returns false, it returns a new type
291 // that is probably better than the current one.
292 response_
->head
.mime_type
.assign(new_type
);
294 return made_final_decision
;
297 bool BufferedResourceHandler::SelectNextHandler(bool* defer
) {
298 DCHECK(!response_
->head
.mime_type
.empty());
300 ResourceRequestInfoImpl
* info
= GetRequestInfo();
301 const std::string
& mime_type
= response_
->head
.mime_type
;
303 if (mime_util::IsSupportedCertificateMimeType(mime_type
)) {
304 // Install certificate file.
305 info
->set_is_download(true);
306 scoped_ptr
<ResourceHandler
> handler(
307 new CertificateResourceHandler(request()));
308 return UseAlternateNextHandler(handler
.Pass(), std::string());
311 // Allow requests for object/embed tags to be intercepted as streams.
312 if (info
->GetResourceType() == content::RESOURCE_TYPE_OBJECT
) {
313 DCHECK(!info
->allow_download());
315 scoped_ptr
<ResourceHandler
> handler(
316 host_
->MaybeInterceptAsStream(request(), response_
.get(), &payload
));
318 DCHECK(!mime_util::IsSupportedMimeType(mime_type
));
319 return UseAlternateNextHandler(handler
.Pass(), payload
);
323 if (!info
->allow_download())
326 // info->allow_download() == true implies
327 // info->GetResourceType() == RESOURCE_TYPE_MAIN_FRAME or
328 // info->GetResourceType() == RESOURCE_TYPE_SUB_FRAME.
329 DCHECK(info
->GetResourceType() == RESOURCE_TYPE_MAIN_FRAME
||
330 info
->GetResourceType() == RESOURCE_TYPE_SUB_FRAME
);
332 bool must_download
= MustDownload();
333 if (!must_download
) {
334 if (mime_util::IsSupportedMimeType(mime_type
))
338 scoped_ptr
<ResourceHandler
> handler(
339 host_
->MaybeInterceptAsStream(request(), response_
.get(), &payload
));
341 return UseAlternateNextHandler(handler
.Pass(), payload
);
344 #if defined(ENABLE_PLUGINS)
346 bool has_plugin
= HasSupportingPlugin(&stale
);
348 // Refresh the plugins asynchronously.
349 plugin_service_
->GetPlugins(
350 base::Bind(&BufferedResourceHandler::OnPluginsLoaded
,
351 weak_ptr_factory_
.GetWeakPtr()));
352 request()->LogBlockedBy("BufferedResourceHandler");
361 // Install download handler
362 info
->set_is_download(true);
363 scoped_ptr
<ResourceHandler
> handler(
364 host_
->CreateResourceHandlerForDownload(
366 true, // is_content_initiated
368 DownloadItem::kInvalidId
,
369 scoped_ptr
<DownloadSaveInfo
>(new DownloadSaveInfo()),
370 DownloadUrlParameters::OnStartedCallback()));
371 return UseAlternateNextHandler(handler
.Pass(), std::string());
374 bool BufferedResourceHandler::UseAlternateNextHandler(
375 scoped_ptr
<ResourceHandler
> new_handler
,
376 const std::string
& payload_for_old_handler
) {
377 if (response_
->head
.headers
.get() && // Can be NULL if FTP.
378 response_
->head
.headers
->response_code() / 100 != 2) {
379 // The response code indicates that this is an error page, but we don't
380 // know how to display the content. We follow Firefox here and show our
381 // own error page instead of triggering a download.
382 // TODO(abarth): We should abstract the response_code test, but this kind
383 // of check is scattered throughout our codebase.
384 request()->CancelWithError(net::ERR_INVALID_RESPONSE
);
388 // Inform the original ResourceHandler that this will be handled entirely by
389 // the new ResourceHandler.
390 // TODO(darin): We should probably check the return values of these.
391 bool defer_ignored
= false;
392 next_handler_
->OnResponseStarted(response_
.get(), &defer_ignored
);
393 // Although deferring OnResponseStarted is legal, the only downstream handler
394 // which does so is CrossSiteResourceHandler. Cross-site transitions should
395 // not trigger when switching handlers.
396 DCHECK(!defer_ignored
);
397 if (payload_for_old_handler
.empty()) {
398 net::URLRequestStatus
status(net::URLRequestStatus::CANCELED
,
400 next_handler_
->OnResponseCompleted(status
, std::string(), &defer_ignored
);
401 DCHECK(!defer_ignored
);
403 scoped_refptr
<net::IOBuffer
> buf
;
406 next_handler_
->OnWillRead(&buf
, &size
, -1);
407 CHECK_GE(size
, static_cast<int>(payload_for_old_handler
.length()));
409 memcpy(buf
->data(), payload_for_old_handler
.c_str(),
410 payload_for_old_handler
.length());
412 next_handler_
->OnReadCompleted(payload_for_old_handler
.length(),
414 DCHECK(!defer_ignored
);
416 net::URLRequestStatus
status(net::URLRequestStatus::SUCCESS
, 0);
417 next_handler_
->OnResponseCompleted(status
, std::string(), &defer_ignored
);
418 DCHECK(!defer_ignored
);
421 // This is handled entirely within the new ResourceHandler, so just reset the
422 // original ResourceHandler.
423 next_handler_
= new_handler
.Pass();
424 next_handler_
->SetController(this);
426 return CopyReadBufferToNextHandler();
429 bool BufferedResourceHandler::ReplayReadCompleted(bool* defer
) {
430 DCHECK(read_buffer_
.get());
432 bool result
= next_handler_
->OnReadCompleted(bytes_read_
, defer
);
435 read_buffer_size_
= 0;
438 state_
= STATE_STREAMING
;
443 void BufferedResourceHandler::CallReplayReadCompleted() {
445 if (!ReplayReadCompleted(&defer
)) {
446 controller()->Cancel();
448 state_
= STATE_STREAMING
;
449 controller()->Resume();
453 bool BufferedResourceHandler::MustDownload() {
454 if (must_download_is_set_
)
455 return must_download_
;
457 must_download_is_set_
= true;
459 std::string disposition
;
460 request()->GetResponseHeaderByName("content-disposition", &disposition
);
461 if (!disposition
.empty() &&
462 net::HttpContentDisposition(disposition
, std::string()).is_attachment()) {
463 must_download_
= true;
464 } else if (host_
->delegate() &&
465 host_
->delegate()->ShouldForceDownloadResource(
466 request()->url(), response_
->head
.mime_type
)) {
467 must_download_
= true;
469 must_download_
= false;
472 return must_download_
;
475 bool BufferedResourceHandler::HasSupportingPlugin(bool* stale
) {
476 #if defined(ENABLE_PLUGINS)
477 ResourceRequestInfoImpl
* info
= GetRequestInfo();
479 bool allow_wildcard
= false;
480 WebPluginInfo plugin
;
481 return plugin_service_
->GetPluginInfo(
482 info
->GetChildID(), info
->GetRenderFrameID(), info
->GetContext(),
483 request()->url(), GURL(), response_
->head
.mime_type
, allow_wildcard
,
484 stale
, &plugin
, NULL
);
492 bool BufferedResourceHandler::CopyReadBufferToNextHandler() {
493 if (!read_buffer_
.get())
496 scoped_refptr
<net::IOBuffer
> buf
;
498 if (!next_handler_
->OnWillRead(&buf
, &buf_len
, bytes_read_
))
501 CHECK((buf_len
>= bytes_read_
) && (bytes_read_
>= 0));
502 memcpy(buf
->data(), read_buffer_
->data(), bytes_read_
);
506 void BufferedResourceHandler::OnPluginsLoaded(
507 const std::vector
<WebPluginInfo
>& plugins
) {
508 request()->LogUnblocked();
510 if (!ProcessResponse(&defer
)) {
511 controller()->Cancel();
513 controller()->Resume();
517 } // namespace content