1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/child/npapi/plugin_url_fetcher.h"
7 #include "base/memory/scoped_ptr.h"
8 #include "content/child/child_thread_impl.h"
9 #include "content/child/multipart_response_delegate.h"
10 #include "content/child/npapi/plugin_host.h"
11 #include "content/child/npapi/plugin_instance.h"
12 #include "content/child/npapi/plugin_stream_url.h"
13 #include "content/child/npapi/webplugin.h"
14 #include "content/child/npapi/webplugin_resource_client.h"
15 #include "content/child/plugin_messages.h"
16 #include "content/child/request_extra_data.h"
17 #include "content/child/request_info.h"
18 #include "content/child/resource_dispatcher.h"
19 #include "content/child/web_url_loader_impl.h"
20 #include "content/common/resource_request_body.h"
21 #include "content/common/service_worker/service_worker_types.h"
22 #include "content/public/common/resource_response_info.h"
23 #include "net/base/load_flags.h"
24 #include "net/base/net_errors.h"
25 #include "net/http/http_response_headers.h"
26 #include "net/url_request/redirect_info.h"
27 #include "third_party/WebKit/public/platform/WebURLLoaderClient.h"
28 #include "third_party/WebKit/public/platform/WebURLResponse.h"
33 // This class handles individual multipart responses. It is instantiated when
34 // we receive HTTP status code 206 in the HTTP response. This indicates
35 // that the response could have multiple parts each separated by a boundary
36 // specified in the response header.
37 // TODO(jam): this is similar to MultiPartResponseClient in webplugin_impl.cc,
38 // we should remove that other class once we switch to loading from the plugin
39 // process by default.
40 class MultiPartResponseClient
: public blink::WebURLLoaderClient
{
42 explicit MultiPartResponseClient(PluginStreamUrl
* plugin_stream
)
43 : byte_range_lower_bound_(0), plugin_stream_(plugin_stream
) {}
45 // blink::WebURLLoaderClient implementation:
46 void didReceiveResponse(blink::WebURLLoader
* loader
,
47 const blink::WebURLResponse
& response
) override
{
48 int64 byte_range_upper_bound
, instance_size
;
49 if (!MultipartResponseDelegate::ReadContentRanges(response
,
50 &byte_range_lower_bound_
,
51 &byte_range_upper_bound
,
56 void didReceiveData(blink::WebURLLoader
* loader
,
59 int encoded_data_length
) override
{
61 // We should defer further loads on multipart resources on the same lines
62 // as regular resources requested by plugins to prevent reentrancy.
63 int64 data_offset
= byte_range_lower_bound_
;
64 byte_range_lower_bound_
+= data_length
;
65 plugin_stream_
->DidReceiveData(data
, data_length
, data_offset
);
66 // DANGER: this instance may be deleted at this point.
70 // The lower bound of the byte range.
71 int64 byte_range_lower_bound_
;
72 // The handler for the data.
73 PluginStreamUrl
* plugin_stream_
;
78 PluginURLFetcher::PluginURLFetcher(PluginStreamUrl
* plugin_stream
,
80 const GURL
& first_party_for_cookies
,
81 const std::string
& method
,
84 const Referrer
& referrer
,
85 const std::string
& range
,
86 bool notify_redirects
,
87 bool is_plugin_src_load
,
91 unsigned long resource_id
,
92 bool copy_stream_data
)
93 : plugin_stream_(plugin_stream
),
95 first_party_for_cookies_(first_party_for_cookies
),
97 notify_redirects_(notify_redirects
),
98 is_plugin_src_load_(is_plugin_src_load
),
99 origin_pid_(origin_pid
),
100 render_frame_id_(render_frame_id
),
101 render_view_id_(render_view_id
),
102 resource_id_(resource_id
),
103 copy_stream_data_(copy_stream_data
),
105 pending_failure_notification_(false),
107 weak_factory_(this) {
108 RequestInfo request_info
;
109 request_info
.method
= method
;
110 request_info
.url
= url
;
111 request_info
.first_party_for_cookies
= first_party_for_cookies
;
112 request_info
.referrer
= referrer
;
113 request_info
.load_flags
= net::LOAD_NORMAL
;
114 request_info
.requestor_pid
= origin_pid
;
115 request_info
.request_type
= RESOURCE_TYPE_OBJECT
;
116 request_info
.routing_id
= render_view_id
;
117 // ServiceWorker is disabled for NPAPI.
118 request_info
.skip_service_worker
= true;
120 RequestExtraData extra_data
;
121 extra_data
.set_render_frame_id(render_frame_id
);
122 extra_data
.set_is_main_frame(false);
123 request_info
.extra_data
= &extra_data
;
125 std::vector
<char> body
;
126 if (method
== "POST") {
127 bool content_type_found
= false;
128 std::vector
<std::string
> names
;
129 std::vector
<std::string
> values
;
130 PluginHost::SetPostData(buf
, len
, &names
, &values
, &body
);
131 for (size_t i
= 0; i
< names
.size(); ++i
) {
132 if (!request_info
.headers
.empty())
133 request_info
.headers
+= "\r\n";
134 request_info
.headers
+= names
[i
] + ": " + values
[i
];
135 if (base::LowerCaseEqualsASCII(names
[i
], "content-type"))
136 content_type_found
= true;
139 if (!content_type_found
) {
140 if (!request_info
.headers
.empty())
141 request_info
.headers
+= "\r\n";
142 request_info
.headers
+= "Content-Type: application/x-www-form-urlencoded";
146 request_info
.headers
= std::string("Range: ") + range
;
149 scoped_refptr
<ResourceRequestBody
> request_body
= new ResourceRequestBody
;
151 request_body
->AppendBytes(&body
[0], body
.size());
153 request_id_
= ChildThreadImpl::current()->resource_dispatcher()->StartAsync(
154 request_info
, request_body
.get(), this);
156 // TODO(jam): range requests
159 PluginURLFetcher::~PluginURLFetcher() {
160 if (request_id_
>= 0) {
161 ChildThreadImpl::current()->resource_dispatcher()->RemovePendingRequest(
166 void PluginURLFetcher::Cancel() {
167 ChildThreadImpl::current()->resource_dispatcher()->Cancel(request_id_
);
169 // Due to races and nested event loops, PluginURLFetcher may still receive
170 // events from the bridge before being destroyed. Do not forward additional
171 // events back to the plugin, via either |plugin_stream_| or
172 // |multipart_delegate_| which has its own pointer via
173 // MultiPartResponseClient.
174 if (multipart_delegate_
)
175 multipart_delegate_
->Cancel();
176 plugin_stream_
= NULL
;
179 void PluginURLFetcher::URLRedirectResponse(bool allow
) {
184 ChildThreadImpl::current()->resource_dispatcher()->SetDefersLoading(
187 ChildThreadImpl::current()->resource_dispatcher()->Cancel(request_id_
);
188 plugin_stream_
->DidFail(resource_id_
); // That will delete |this|.
192 void PluginURLFetcher::OnUploadProgress(uint64 position
, uint64 size
) {
195 bool PluginURLFetcher::OnReceivedRedirect(
196 const net::RedirectInfo
& redirect_info
,
197 const ResourceResponseInfo
& info
) {
201 // TODO(jam): THIS LOGIC IS COPIED FROM WebPluginImpl::willSendRequest until
202 // kDirectNPAPIRequests is the default and we can remove the old path there.
204 // Currently this check is just to catch an https -> http redirect when
205 // loading the main plugin src URL. Longer term, we could investigate
206 // firing mixed diplay or scripting issues for subresource loads
207 // initiated by plugins.
208 if (is_plugin_src_load_
&&
209 !plugin_stream_
->instance()->webplugin()->CheckIfRunInsecureContent(
210 redirect_info
.new_url
)) {
211 plugin_stream_
->DidFail(resource_id_
); // That will delete |this|.
216 url_
= redirect_info
.new_url
;
217 first_party_for_cookies_
= redirect_info
.new_first_party_for_cookies
;
219 // If the plugin does not participate in url redirect notifications then just
220 // block cross origin 307 POST redirects.
221 if (!notify_redirects_
) {
222 if (redirect_info
.status_code
== 307 &&
223 redirect_info
.new_method
== "POST" &&
224 old_url
.GetOrigin() != url_
.GetOrigin()) {
225 plugin_stream_
->DidFail(resource_id_
); // That will delete |this|.
229 // Pause the request while we ask the plugin what to do about the redirect.
230 ChildThreadImpl::current()->resource_dispatcher()->SetDefersLoading(
232 plugin_stream_
->WillSendRequest(url_
, redirect_info
.status_code
);
238 void PluginURLFetcher::OnReceivedResponse(const ResourceResponseInfo
& info
) {
242 // TODO(jam): THIS LOGIC IS COPIED FROM WebPluginImpl::didReceiveResponse
243 // GetAllHeaders, and GetResponseInfo until kDirectNPAPIRequests is the
244 // default and we can remove the old path there.
246 bool request_is_seekable
= true;
247 DCHECK(!multipart_delegate_
.get());
248 if (plugin_stream_
->seekable()) {
249 int response_code
= info
.headers
->response_code();
250 if (response_code
== 206) {
251 blink::WebURLResponse response
;
252 response
.initialize();
253 WebURLLoaderImpl::PopulateURLResponse(url_
, info
, &response
);
255 std::string multipart_boundary
;
256 if (MultipartResponseDelegate::ReadMultipartBoundary(
257 response
, &multipart_boundary
)) {
258 plugin_stream_
->instance()->webplugin()->DidStartLoading();
260 MultiPartResponseClient
* multi_part_response_client
=
261 new MultiPartResponseClient(plugin_stream_
);
263 multipart_delegate_
.reset(new MultipartResponseDelegate(
264 multi_part_response_client
, NULL
, response
, multipart_boundary
));
266 // Multiple ranges requested, data will be delivered by
267 // MultipartResponseDelegate.
272 int64 upper_bound
= 0, instance_size
= 0;
273 // Single range requested - go through original processing for
274 // non-multipart requests, but update data offset.
275 MultipartResponseDelegate::ReadContentRanges(
276 response
, &data_offset_
, &upper_bound
, &instance_size
);
277 } else if (response_code
== 200) {
278 // TODO: should we handle this case? We used to but it's not clear that we
279 // still need to. This was bug 5403, fixed in r7139.
283 // If the length comes in as -1, then it indicates that it was not
284 // read off the HTTP headers. We replicate Safari webkit behavior here,
285 // which is to set it to 0.
286 int expected_length
= std::max(static_cast<int>(info
.content_length
), 0);
289 uint32 last_modified
= 0;
291 if (info
.headers
.get()) { // NULL for data: urls.
292 if (info
.headers
->GetLastModifiedValue(&temp
))
293 last_modified
= static_cast<uint32
>(temp
.ToDoubleT());
295 // TODO(darin): Shouldn't we also report HTTP version numbers?
296 int response_code
= info
.headers
->response_code();
297 headers
= base::StringPrintf("HTTP %d ", response_code
);
298 headers
+= info
.headers
->GetStatusText();
302 std::string name
, value
;
303 while (info
.headers
->EnumerateHeaderLines(&iter
, &name
, &value
)) {
304 // TODO(darin): Should we really exclude headers with an empty value?
305 if (!name
.empty() && !value
.empty())
306 headers
+= name
+ ": " + value
+ "\n";
309 // Bug http://b/issue?id=925559. The flash plugin would not handle the HTTP
310 // error codes in the stream header and as a result, was unaware of the fate
311 // of the HTTP requests issued via NPN_GetURLNotify. Webkit and FF destroy
312 // the stream and invoke the NPP_DestroyStream function on the plugin if the
313 // HTTPrequest fails.
314 if ((url_
.SchemeIs(url::kHttpScheme
) || url_
.SchemeIs(url::kHttpsScheme
)) &&
315 (response_code
< 100 || response_code
>= 400)) {
316 pending_failure_notification_
= true;
320 plugin_stream_
->DidReceiveResponse(info
.mime_type
,
324 request_is_seekable
);
327 void PluginURLFetcher::OnDownloadedData(int len
,
328 int encoded_data_length
) {
331 void PluginURLFetcher::OnReceivedData(scoped_ptr
<ReceivedData
> data
) {
332 const char* payload
= data
->payload();
333 int data_length
= data
->length();
334 int encoded_data_length
= data
->encoded_length();
338 if (multipart_delegate_
) {
339 multipart_delegate_
->OnReceivedData(payload
, data_length
,
340 encoded_data_length
);
342 int64 offset
= data_offset_
;
343 data_offset_
+= data_length
;
345 if (copy_stream_data_
) {
346 // QuickTime writes to this memory, and since we got it from
347 // ResourceDispatcher it's not mapped for write access in this process.
348 // http://crbug.com/308466.
349 scoped_ptr
<char[]> data_copy(new char[data_length
]);
350 memcpy(data_copy
.get(), payload
, data_length
);
351 plugin_stream_
->DidReceiveData(data_copy
.get(), data_length
, offset
);
353 plugin_stream_
->DidReceiveData(payload
, data_length
, offset
);
355 // DANGER: this instance may be deleted at this point.
359 void PluginURLFetcher::OnCompletedRequest(
361 bool was_ignored_by_handler
,
362 bool stale_copy_in_cache
,
363 const std::string
& security_info
,
364 const base::TimeTicks
& completion_time
,
365 int64 total_transfer_size
) {
369 if (multipart_delegate_
) {
370 multipart_delegate_
->OnCompletedRequest();
371 multipart_delegate_
.reset();
374 if (error_code
== net::OK
) {
375 plugin_stream_
->DidFinishLoading(resource_id_
);
377 plugin_stream_
->DidFail(resource_id_
);
381 void PluginURLFetcher::OnReceivedCompletedResponse(
382 const content::ResourceResponseInfo
& info
,
383 scoped_ptr
<ReceivedData
> data
,
385 bool was_ignored_by_handler
,
386 bool stale_copy_in_cache
,
387 const std::string
& security_info
,
388 const base::TimeTicks
& completion_time
,
389 int64 total_transfer_size
) {
390 // |this| can be deleted on each callback. |weak_this| is placed here to
391 // detect the deletion.
392 base::WeakPtr
<PluginURLFetcher
> weak_this
= weak_factory_
.GetWeakPtr();
393 OnReceivedResponse(info
);
398 OnReceivedData(data
.Pass());
402 OnCompletedRequest(error_code
, was_ignored_by_handler
, stale_copy_in_cache
,
403 security_info
, completion_time
, total_transfer_size
);
405 } // namespace content