Pin Chrome's shortcut to the Win10 Start menu on install and OS upgrade.
[chromium-blink-merge.git] / chrome / browser / download / download_target_determiner.h
blob0bb4cb034e297f6e0540ce9aee9d75502a64efe0
1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef CHROME_BROWSER_DOWNLOAD_DOWNLOAD_TARGET_DETERMINER_H_
6 #define CHROME_BROWSER_DOWNLOAD_DOWNLOAD_TARGET_DETERMINER_H_
8 #include "base/files/file_path.h"
9 #include "base/memory/ref_counted.h"
10 #include "base/memory/scoped_ptr.h"
11 #include "base/memory/weak_ptr.h"
12 #include "base/task/cancelable_task_tracker.h"
13 #include "chrome/browser/download/download_path_reservation_tracker.h"
14 #include "chrome/browser/download/download_target_determiner_delegate.h"
15 #include "chrome/browser/download/download_target_info.h"
16 #include "content/public/browser/download_danger_type.h"
17 #include "content/public/browser/download_item.h"
18 #include "content/public/browser/download_manager_delegate.h"
20 class ChromeDownloadManagerDelegate;
21 class Profile;
22 class DownloadPrefs;
24 namespace content {
25 enum DownloadDangerType;
28 // Determines the target of the download.
30 // Terminology:
31 // Virtual Path: A path representing the target of the download that may or
32 // may not be a physical file path. E.g. if the target of the download is in
33 // cloud storage, then the virtual path may be relative to a logical mount
34 // point.
36 // Local Path: A local file system path where the downloads system should
37 // write the file to.
39 // Intermediate Path: Where the data should be written to during the course of
40 // the download. Once the download completes, the file could be renamed to
41 // Local Path.
43 // DownloadTargetDeterminer is a self owned object that performs the work of
44 // determining the download target. It observes the DownloadItem and aborts the
45 // process if the download is removed. DownloadTargetDeterminerDelegate is
46 // responsible for providing external dependencies and prompting the user if
47 // necessary.
49 // The only public entrypoint is the static Start() method which creates an
50 // instance of DownloadTargetDeterminer.
51 class DownloadTargetDeterminer
52 : public content::DownloadItem::Observer {
53 public:
54 typedef base::Callback<void(scoped_ptr<DownloadTargetInfo>)>
55 CompletionCallback;
57 // Start the process of determing the target of |download|.
59 // |initial_virtual_path| if non-empty, defines the initial virtual path for
60 // the target determination process. If one isn't specified, one will be
61 // generated based on the response data specified in |download| and the
62 // users' downloads directory.
63 // Note: |initial_virtual_path| is only used if download has prompted the
64 // user before and doesn't have a forced path.
65 // |download_prefs| is required and must outlive |download|. It is used for
66 // determining the user's preferences regarding the default downloads
67 // directory, prompting and auto-open behavior.
68 // |delegate| is required and must live until |callback| is invoked.
69 // |callback| will be scheduled asynchronously on the UI thread after download
70 // determination is complete or after |download| is destroyed.
72 // Start() should be called on the UI thread.
73 static void Start(content::DownloadItem* download,
74 const base::FilePath& initial_virtual_path,
75 DownloadPrefs* download_prefs,
76 DownloadTargetDeterminerDelegate* delegate,
77 const CompletionCallback& callback);
79 // Returns a .crdownload intermediate path for the |suggested_path|.
80 static base::FilePath GetCrDownloadPath(const base::FilePath& suggested_path);
82 #if defined(OS_WIN)
83 // Returns true if Adobe Reader is up to date. This information refreshed
84 // only when Start() gets called for a PDF and Adobe Reader is the default
85 // System PDF viewer.
86 static bool IsAdobeReaderUpToDate();
87 #endif
89 private:
90 // The main workflow is controlled via a set of state transitions. Each state
91 // has an associated handler. The handler for STATE_FOO is DoFoo. Each handler
92 // performs work, determines the next state to transition to and returns a
93 // Result indicating how the workflow should proceed. The loop ends when a
94 // handler returns COMPLETE.
95 enum State {
96 STATE_GENERATE_TARGET_PATH,
97 STATE_NOTIFY_EXTENSIONS,
98 STATE_RESERVE_VIRTUAL_PATH,
99 STATE_PROMPT_USER_FOR_DOWNLOAD_PATH,
100 STATE_DETERMINE_LOCAL_PATH,
101 STATE_DETERMINE_MIME_TYPE,
102 STATE_DETERMINE_IF_HANDLED_SAFELY_BY_BROWSER,
103 STATE_DETERMINE_IF_ADOBE_READER_UP_TO_DATE,
104 STATE_CHECK_DOWNLOAD_URL,
105 STATE_CHECK_VISITED_REFERRER_BEFORE,
106 STATE_DETERMINE_INTERMEDIATE_PATH,
107 STATE_NONE,
110 // Result code returned by each step of the workflow below. Controls execution
111 // of DoLoop().
112 enum Result {
113 // Continue processing. next_state_ is required to not be STATE_NONE.
114 CONTINUE,
116 // The DoLoop() that invoked the handler should exit. This value is
117 // typically returned when the handler has invoked an asynchronous operation
118 // and is expecting a callback. If a handler returns this value, it has
119 // taken responsibility for ensuring that DoLoop() is invoked. It is
120 // possible that the handler has invoked another DoLoop() already.
121 QUIT_DOLOOP,
123 // Target determination is complete.
124 COMPLETE
127 // Used with IsDangerousFile to indicate whether the user has visited the
128 // referrer URL for the download prior to today.
129 enum PriorVisitsToReferrer {
130 NO_VISITS_TO_REFERRER,
131 VISITED_REFERRER,
134 // Construct a DownloadTargetDeterminer object. Constraints on the arguments
135 // are as per Start() above.
136 DownloadTargetDeterminer(content::DownloadItem* download,
137 const base::FilePath& initial_virtual_path,
138 DownloadPrefs* download_prefs,
139 DownloadTargetDeterminerDelegate* delegate,
140 const CompletionCallback& callback);
142 ~DownloadTargetDeterminer() override;
144 // Invoke each successive handler until a handler returns QUIT_DOLOOP or
145 // COMPLETE. Note that as a result, this object might be deleted. So |this|
146 // should not be accessed after calling DoLoop().
147 void DoLoop();
149 // === Main workflow ===
151 // Generates an initial target path. This target is based only on the state of
152 // the download item.
153 // Next state:
154 // - STATE_NONE : If the download is not in progress, returns COMPLETE.
155 // - STATE_NOTIFY_EXTENSIONS : All other downloads.
156 Result DoGenerateTargetPath();
158 // Notifies downloads extensions. If any extension wishes to override the
159 // download filename, it will respond to the OnDeterminingFilename()
160 // notification.
161 // Next state:
162 // - STATE_RESERVE_VIRTUAL_PATH.
163 Result DoNotifyExtensions();
165 // Callback invoked after extensions are notified. Updates |virtual_path_| and
166 // |conflict_action_|.
167 void NotifyExtensionsDone(
168 const base::FilePath& new_path,
169 DownloadPathReservationTracker::FilenameConflictAction conflict_action);
171 // Invokes ReserveVirtualPath() on the delegate to acquire a reservation for
172 // the path. See DownloadPathReservationTracker.
173 // Next state:
174 // - STATE_PROMPT_USER_FOR_DOWNLOAD_PATH.
175 Result DoReserveVirtualPath();
177 // Callback invoked after the delegate aquires a path reservation.
178 void ReserveVirtualPathDone(const base::FilePath& path, bool verified);
180 // Presents a file picker to the user if necessary.
181 // Next state:
182 // - STATE_DETERMINE_LOCAL_PATH.
183 Result DoPromptUserForDownloadPath();
185 // Callback invoked after the file picker completes. Cancels the download if
186 // the user cancels the file picker.
187 void PromptUserForDownloadPathDone(const base::FilePath& virtual_path);
189 // Up until this point, the path that was used is considered to be a virtual
190 // path. This step determines the local file system path corresponding to this
191 // virtual path. The translation is done by invoking the DetermineLocalPath()
192 // method on the delegate.
193 // Next state:
194 // - STATE_DETERMINE_MIME_TYPE.
195 Result DoDetermineLocalPath();
197 // Callback invoked when the delegate has determined local path.
198 void DetermineLocalPathDone(const base::FilePath& local_path);
200 // Determine the MIME type corresponding to the local file path. This is only
201 // done if the local path and the virtual path was the same. I.e. The file is
202 // intended for the local file system. This restriction is there because the
203 // resulting MIME type is only valid for determining whether the browser can
204 // handle the download if it were opened via a file:// URL.
205 // Next state:
206 // - STATE_DETERMINE_IF_HANDLED_SAFELY_BY_BROWSER.
207 Result DoDetermineMimeType();
209 // Callback invoked when the MIME type is available. Since determination of
210 // the MIME type can involve disk access, it is done in the blocking pool.
211 void DetermineMimeTypeDone(const std::string& mime_type);
213 // Determine if the file type can be handled safely by the browser if it were
214 // to be opened via a file:// URL.
215 // Next state:
216 // - STATE_DETERMINE_IF_ADOBE_READER_UP_TO_DATE.
217 Result DoDetermineIfHandledSafely();
219 #if defined(ENABLE_PLUGINS)
220 // Callback invoked when a decision is available about whether the file type
221 // can be handled safely by the browser.
222 void DetermineIfHandledSafelyDone(bool is_handled_safely);
223 #endif
225 // Determine if Adobe Reader is up to date. Only do the check on Windows for
226 // .pdf file targets.
227 // Next state:
228 // - STATE_CHECK_DOWNLOAD_URL.
229 Result DoDetermineIfAdobeReaderUpToDate();
231 #if defined(OS_WIN)
232 // Callback invoked when a decision is available about whether Adobe Reader
233 // is up to date.
234 void DetermineIfAdobeReaderUpToDateDone(bool adobe_reader_up_to_date);
235 #endif
237 // Checks whether the downloaded URL is malicious. Invokes the
238 // DownloadProtectionService via the delegate.
239 // Next state:
240 // - STATE_CHECK_VISITED_REFERRER_BEFORE.
241 Result DoCheckDownloadUrl();
243 // Callback invoked after the delegate has checked the download URL. Sets the
244 // danger type of the download to |danger_type|.
245 void CheckDownloadUrlDone(content::DownloadDangerType danger_type);
247 // Checks if the user has visited the referrer URL of the download prior to
248 // today. The actual check is only performed if it would be needed to
249 // determine the danger type of the download.
250 // Next state:
251 // - STATE_DETERMINE_INTERMEDIATE_PATH.
252 Result DoCheckVisitedReferrerBefore();
254 // Callback invoked after completion of history check for prior visits to
255 // referrer URL.
256 void CheckVisitedReferrerBeforeDone(bool visited_referrer_before);
258 // Determines the intermediate path. Once this step completes, downloads
259 // target determination is complete. The determination assumes that the
260 // intermediate file will never be overwritten (always uniquified if needed).
261 // Next state:
262 // - STATE_NONE: Returns COMPLETE.
263 Result DoDetermineIntermediatePath();
265 // === End of main workflow ===
267 // Utilities:
269 void ScheduleCallbackAndDeleteSelf();
271 void CancelOnFailureAndDeleteSelf();
273 Profile* GetProfile();
275 // Determine whether to prompt the user for the download location. For regular
276 // downloads, this determination is based on the target disposition, auto-open
277 // behavior, among other factors. For an interrupted download, this
278 // determination will be based on the interrupt reason. It is assumed that
279 // download interruptions always occur after the first round of download
280 // target determination is complete.
281 bool ShouldPromptForDownload(const base::FilePath& filename) const;
283 // Returns true if the user has been prompted for this download at least once
284 // prior to this target determination operation. This method is only expected
285 // to return true for a resuming interrupted download that has prompted the
286 // user before interruption. The return value does not depend on whether the
287 // user will be or has been prompted during the current target determination
288 // operation.
289 bool HasPromptedForPath() const;
291 // Returns true if this download should show the "dangerous file" warning.
292 // Various factors are considered, such as the type of the file, whether a
293 // user action initiated the download, and whether the user has explicitly
294 // marked the file type as "auto open". Protected virtual for testing.
295 bool IsDangerousFile(PriorVisitsToReferrer visits);
297 // content::DownloadItem::Observer
298 void OnDownloadDestroyed(content::DownloadItem* download) override;
300 // state
301 State next_state_;
302 bool should_prompt_;
303 bool should_notify_extensions_;
304 bool create_target_directory_;
305 DownloadPathReservationTracker::FilenameConflictAction conflict_action_;
306 content::DownloadDangerType danger_type_;
307 bool is_dangerous_file_; // See DownloadTargetInfo::is_dangerous_file
308 base::FilePath virtual_path_;
309 base::FilePath local_path_;
310 base::FilePath intermediate_path_;
311 std::string mime_type_;
312 bool is_filetype_handled_safely_;
314 content::DownloadItem* download_;
315 const bool is_resumption_;
316 DownloadPrefs* download_prefs_;
317 DownloadTargetDeterminerDelegate* delegate_;
318 CompletionCallback completion_callback_;
319 base::CancelableTaskTracker history_tracker_;
321 base::WeakPtrFactory<DownloadTargetDeterminer> weak_ptr_factory_;
323 DISALLOW_COPY_AND_ASSIGN(DownloadTargetDeterminer);
326 #endif // CHROME_BROWSER_DOWNLOAD_DOWNLOAD_TARGET_DETERMINER_H_