Don't send a SHChangeNotify for creating an app icon when creating a shortcut.
[chromium-blink-merge.git] / media / blink / buffered_resource_loader.cc
blobd88266d06b22dbe60cd90967b7de340973b58806
1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "media/blink/buffered_resource_loader.h"
7 #include "base/bits.h"
8 #include "base/callback_helpers.h"
9 #include "base/metrics/histogram.h"
10 #include "base/strings/string_number_conversions.h"
11 #include "base/strings/string_util.h"
12 #include "media/base/media_log.h"
13 #include "media/blink/cache_util.h"
14 #include "net/http/http_byte_range.h"
15 #include "net/http/http_request_headers.h"
16 #include "third_party/WebKit/public/platform/WebString.h"
17 #include "third_party/WebKit/public/platform/WebURLError.h"
18 #include "third_party/WebKit/public/platform/WebURLResponse.h"
19 #include "third_party/WebKit/public/web/WebKit.h"
20 #include "third_party/WebKit/public/web/WebURLLoaderOptions.h"
22 using blink::WebFrame;
23 using blink::WebString;
24 using blink::WebURLError;
25 using blink::WebURLLoader;
26 using blink::WebURLLoaderOptions;
27 using blink::WebURLRequest;
28 using blink::WebURLResponse;
30 namespace media {
32 static const int kHttpOK = 200;
33 static const int kHttpPartialContent = 206;
35 // Define the number of bytes in a megabyte.
36 static const int kMegabyte = 1024 * 1024;
38 // Minimum capacity of the buffer in forward or backward direction.
40 // 2MB is an arbitrary limit; it just seems to be "good enough" in practice.
41 static const int kMinBufferCapacity = 2 * kMegabyte;
43 // Maximum capacity of the buffer in forward or backward direction. This is
44 // effectively the largest single read the code path can handle.
45 // 20MB is an arbitrary limit; it just seems to be "good enough" in practice.
46 static const int kMaxBufferCapacity = 20 * kMegabyte;
48 // Maximum number of bytes outside the buffer we will wait for in order to
49 // fulfill a read. If a read starts more than 2MB away from the data we
50 // currently have in the buffer, we will not wait for buffer to reach the read's
51 // location and will instead reset the request.
52 static const int kForwardWaitThreshold = 2 * kMegabyte;
54 // Computes the suggested backward and forward capacity for the buffer
55 // if one wants to play at |playback_rate| * the natural playback speed.
56 // Use a value of 0 for |bitrate| if it is unknown.
57 static void ComputeTargetBufferWindow(float playback_rate, int bitrate,
58 int* out_backward_capacity,
59 int* out_forward_capacity) {
60 static const int kDefaultBitrate = 200 * 1024 * 8; // 200 Kbps.
61 static const int kMaxBitrate = 20 * kMegabyte * 8; // 20 Mbps.
62 static const float kMaxPlaybackRate = 25.0;
63 static const int kTargetSecondsBufferedAhead = 10;
64 static const int kTargetSecondsBufferedBehind = 2;
66 // Use a default bit rate if unknown and clamp to prevent overflow.
67 if (bitrate <= 0)
68 bitrate = kDefaultBitrate;
69 bitrate = std::min(bitrate, kMaxBitrate);
71 // Only scale the buffer window for playback rates greater than 1.0 in
72 // magnitude and clamp to prevent overflow.
73 bool backward_playback = false;
74 if (playback_rate < 0.0f) {
75 backward_playback = true;
76 playback_rate *= -1.0f;
79 playback_rate = std::max(playback_rate, 1.0f);
80 playback_rate = std::min(playback_rate, kMaxPlaybackRate);
82 int bytes_per_second = (bitrate / 8.0) * playback_rate;
84 // Clamp between kMinBufferCapacity and kMaxBufferCapacity.
85 *out_forward_capacity = std::max(
86 kTargetSecondsBufferedAhead * bytes_per_second, kMinBufferCapacity);
87 *out_backward_capacity = std::max(
88 kTargetSecondsBufferedBehind * bytes_per_second, kMinBufferCapacity);
90 *out_forward_capacity = std::min(*out_forward_capacity, kMaxBufferCapacity);
91 *out_backward_capacity = std::min(*out_backward_capacity, kMaxBufferCapacity);
93 if (backward_playback)
94 std::swap(*out_forward_capacity, *out_backward_capacity);
97 BufferedResourceLoader::BufferedResourceLoader(
98 const GURL& url,
99 CORSMode cors_mode,
100 int64 first_byte_position,
101 int64 last_byte_position,
102 DeferStrategy strategy,
103 int bitrate,
104 float playback_rate,
105 MediaLog* media_log)
106 : buffer_(kMinBufferCapacity, kMinBufferCapacity),
107 loader_failed_(false),
108 defer_strategy_(strategy),
109 might_be_reused_from_cache_in_future_(true),
110 range_supported_(false),
111 saved_forward_capacity_(0),
112 url_(url),
113 cors_mode_(cors_mode),
114 first_byte_position_(first_byte_position),
115 last_byte_position_(last_byte_position),
116 single_origin_(true),
117 offset_(0),
118 content_length_(kPositionNotSpecified),
119 instance_size_(kPositionNotSpecified),
120 read_position_(0),
121 read_size_(0),
122 read_buffer_(NULL),
123 first_offset_(0),
124 last_offset_(0),
125 bitrate_(bitrate),
126 playback_rate_(playback_rate),
127 media_log_(media_log) {
129 // Set the initial capacity of |buffer_| based on |bitrate_| and
130 // |playback_rate_|.
131 UpdateBufferWindow();
134 BufferedResourceLoader::~BufferedResourceLoader() {}
136 void BufferedResourceLoader::Start(
137 const StartCB& start_cb,
138 const LoadingStateChangedCB& loading_cb,
139 const ProgressCB& progress_cb,
140 WebFrame* frame) {
141 // Make sure we have not started.
142 DCHECK(start_cb_.is_null());
143 DCHECK(loading_cb_.is_null());
144 DCHECK(progress_cb_.is_null());
145 DCHECK(!start_cb.is_null());
146 DCHECK(!loading_cb.is_null());
147 DCHECK(!progress_cb.is_null());
148 CHECK(frame);
150 start_cb_ = start_cb;
151 loading_cb_ = loading_cb;
152 progress_cb_ = progress_cb;
154 if (first_byte_position_ != kPositionNotSpecified) {
155 // TODO(hclam): server may not support range request so |offset_| may not
156 // equal to |first_byte_position_|.
157 offset_ = first_byte_position_;
160 // Prepare the request.
161 WebURLRequest request(url_);
162 // TODO(mkwst): Split this into video/audio.
163 request.setRequestContext(WebURLRequest::RequestContextVideo);
165 if (IsRangeRequest()) {
166 request.setHTTPHeaderField(
167 WebString::fromUTF8(net::HttpRequestHeaders::kRange),
168 WebString::fromUTF8(net::HttpByteRange::Bounded(
169 first_byte_position_, last_byte_position_).GetHeaderValue()));
172 frame->setReferrerForRequest(request, blink::WebURL());
174 // Disable compression, compression for audio/video doesn't make sense...
175 request.setHTTPHeaderField(
176 WebString::fromUTF8(net::HttpRequestHeaders::kAcceptEncoding),
177 WebString::fromUTF8("identity;q=1, *;q=0"));
179 // Check for our test WebURLLoader.
180 scoped_ptr<WebURLLoader> loader;
181 if (test_loader_) {
182 loader = test_loader_.Pass();
183 } else {
184 WebURLLoaderOptions options;
185 if (cors_mode_ == kUnspecified) {
186 options.allowCredentials = true;
187 options.crossOriginRequestPolicy =
188 WebURLLoaderOptions::CrossOriginRequestPolicyAllow;
189 } else {
190 options.exposeAllResponseHeaders = true;
191 // The author header set is empty, no preflight should go ahead.
192 options.preflightPolicy = WebURLLoaderOptions::PreventPreflight;
193 options.crossOriginRequestPolicy =
194 WebURLLoaderOptions::CrossOriginRequestPolicyUseAccessControl;
195 if (cors_mode_ == kUseCredentials)
196 options.allowCredentials = true;
198 loader.reset(frame->createAssociatedURLLoader(options));
201 // Start the resource loading.
202 loader->loadAsynchronously(request, this);
203 active_loader_.reset(new ActiveLoader(loader.Pass()));
204 loading_cb_.Run(kLoading);
207 void BufferedResourceLoader::Stop() {
208 // Reset callbacks.
209 start_cb_.Reset();
210 loading_cb_.Reset();
211 progress_cb_.Reset();
212 read_cb_.Reset();
214 // Cancel and reset any active loaders.
215 active_loader_.reset();
218 void BufferedResourceLoader::Read(
219 int64 position,
220 int read_size,
221 uint8* buffer,
222 const ReadCB& read_cb) {
223 DCHECK(start_cb_.is_null());
224 DCHECK(read_cb_.is_null());
225 DCHECK(!read_cb.is_null());
226 DCHECK(buffer);
227 DCHECK_GT(read_size, 0);
229 // Save the parameter of reading.
230 read_cb_ = read_cb;
231 read_position_ = position;
232 read_size_ = read_size;
233 read_buffer_ = buffer;
235 // Reads should immediately fail if the loader also failed.
236 if (loader_failed_) {
237 DoneRead(kFailed, 0);
238 return;
241 // If we're attempting to read past the end of the file, return a zero
242 // indicating EOF.
244 // This can happen with callees that read in fixed-sized amounts for parsing
245 // or at the end of chunked 200 responses when we discover the actual length
246 // of the file.
247 if (instance_size_ != kPositionNotSpecified &&
248 instance_size_ <= read_position_) {
249 DVLOG(1) << "Appear to have seeked beyond EOS; returning 0.";
250 DoneRead(kOk, 0);
251 return;
254 // Make sure |offset_| and |read_position_| does not differ by a large
255 // amount.
256 if (read_position_ > offset_ + kint32max ||
257 read_position_ < offset_ + kint32min) {
258 DoneRead(kCacheMiss, 0);
259 return;
262 // Make sure |read_size_| is not too large for the buffer to ever be able to
263 // fulfill the read request.
264 if (read_size_ > kMaxBufferCapacity) {
265 DoneRead(kFailed, 0);
266 return;
269 // Prepare the parameters.
270 first_offset_ = read_position_ - offset_;
271 last_offset_ = first_offset_ + read_size_;
273 // If we can serve the request now, do the actual read.
274 if (CanFulfillRead()) {
275 ReadInternal();
276 UpdateDeferBehavior();
277 return;
280 // If we expect the read request to be fulfilled later, expand capacity as
281 // necessary and disable deferring.
282 if (WillFulfillRead()) {
283 // Advance offset as much as possible to create additional capacity.
284 int advance = std::min(first_offset_, buffer_.forward_bytes());
285 bool ret = buffer_.Seek(advance);
286 DCHECK(ret);
288 offset_ += advance;
289 first_offset_ -= advance;
290 last_offset_ -= advance;
292 // Expand capacity to accomodate a read that extends past the normal
293 // capacity.
295 // This can happen when reading in a large seek index or when the
296 // first byte of a read request falls within kForwardWaitThreshold.
297 if (last_offset_ > buffer_.forward_capacity()) {
298 saved_forward_capacity_ = buffer_.forward_capacity();
299 buffer_.set_forward_capacity(last_offset_);
302 // Make sure we stop deferring now that there's additional capacity.
303 DCHECK(!ShouldDefer())
304 << "Capacity was not adjusted properly to prevent deferring.";
305 UpdateDeferBehavior();
307 return;
310 // Make a callback to report failure.
311 DoneRead(kCacheMiss, 0);
314 int64 BufferedResourceLoader::content_length() {
315 return content_length_;
318 int64 BufferedResourceLoader::instance_size() {
319 return instance_size_;
322 bool BufferedResourceLoader::range_supported() {
323 return range_supported_;
326 /////////////////////////////////////////////////////////////////////////////
327 // blink::WebURLLoaderClient implementation.
328 void BufferedResourceLoader::willSendRequest(
329 WebURLLoader* loader,
330 WebURLRequest& newRequest,
331 const WebURLResponse& redirectResponse) {
333 // The load may have been stopped and |start_cb| is destroyed.
334 // In this case we shouldn't do anything.
335 if (start_cb_.is_null()) {
336 // Set the url in the request to an invalid value (empty url).
337 newRequest.setURL(blink::WebURL());
338 return;
341 // Only allow |single_origin_| if we haven't seen a different origin yet.
342 if (single_origin_)
343 single_origin_ = url_.GetOrigin() == GURL(newRequest.url()).GetOrigin();
345 url_ = newRequest.url();
348 void BufferedResourceLoader::didSendData(
349 WebURLLoader* loader,
350 unsigned long long bytes_sent,
351 unsigned long long total_bytes_to_be_sent) {
352 NOTIMPLEMENTED();
355 void BufferedResourceLoader::didReceiveResponse(
356 WebURLLoader* loader,
357 const WebURLResponse& response) {
358 DVLOG(1) << "didReceiveResponse: HTTP/"
359 << (response.httpVersion() == WebURLResponse::HTTP_0_9 ? "0.9" :
360 response.httpVersion() == WebURLResponse::HTTP_1_0 ? "1.0" :
361 response.httpVersion() == WebURLResponse::HTTP_1_1 ? "1.1" :
362 "Unknown")
363 << " " << response.httpStatusCode();
364 DCHECK(active_loader_.get());
366 // The loader may have been stopped and |start_cb| is destroyed.
367 // In this case we shouldn't do anything.
368 if (start_cb_.is_null())
369 return;
371 uint32 reasons = GetReasonsForUncacheability(response);
372 might_be_reused_from_cache_in_future_ = reasons == 0;
373 UMA_HISTOGRAM_BOOLEAN("Media.CacheUseful", reasons == 0);
374 int shift = 0;
375 int max_enum = base::bits::Log2Ceiling(kMaxReason);
376 while (reasons) {
377 DCHECK_LT(shift, max_enum); // Sanity check.
378 if (reasons & 0x1) {
379 UMA_HISTOGRAM_ENUMERATION("Media.UncacheableReason",
380 shift,
381 max_enum); // PRESUBMIT_IGNORE_UMA_MAX
384 reasons >>= 1;
385 ++shift;
388 // Expected content length can be |kPositionNotSpecified|, in that case
389 // |content_length_| is not specified and this is a streaming response.
390 content_length_ = response.expectedContentLength();
392 // We make a strong assumption that when we reach here we have either
393 // received a response from HTTP/HTTPS protocol or the request was
394 // successful (in particular range request). So we only verify the partial
395 // response for HTTP and HTTPS protocol.
396 if (url_.SchemeIsHTTPOrHTTPS()) {
397 bool partial_response = (response.httpStatusCode() == kHttpPartialContent);
398 bool ok_response = (response.httpStatusCode() == kHttpOK);
400 if (IsRangeRequest()) {
401 // Check to see whether the server supports byte ranges.
402 std::string accept_ranges =
403 response.httpHeaderField("Accept-Ranges").utf8();
404 range_supported_ = (accept_ranges.find("bytes") != std::string::npos);
406 // If we have verified the partial response and it is correct, we will
407 // return kOk. It's also possible for a server to support range requests
408 // without advertising "Accept-Ranges: bytes".
409 if (partial_response && VerifyPartialResponse(response)) {
410 range_supported_ = true;
411 } else if (ok_response && first_byte_position_ == 0 &&
412 last_byte_position_ == kPositionNotSpecified) {
413 // We accept a 200 response for a Range:0- request, trusting the
414 // Accept-Ranges header, because Apache thinks that's a reasonable thing
415 // to return.
416 instance_size_ = content_length_;
417 } else {
418 DoneStart(kFailed);
419 return;
421 } else {
422 instance_size_ = content_length_;
423 if (response.httpStatusCode() != kHttpOK) {
424 // We didn't request a range but server didn't reply with "200 OK".
425 DoneStart(kFailed);
426 return;
430 } else {
431 CHECK_EQ(instance_size_, kPositionNotSpecified);
432 if (content_length_ != kPositionNotSpecified) {
433 if (first_byte_position_ == kPositionNotSpecified)
434 instance_size_ = content_length_;
435 else if (last_byte_position_ == kPositionNotSpecified)
436 instance_size_ = content_length_ + first_byte_position_;
440 // Calls with a successful response.
441 DoneStart(kOk);
444 void BufferedResourceLoader::didReceiveData(
445 WebURLLoader* loader,
446 const char* data,
447 int data_length,
448 int encoded_data_length) {
449 DVLOG(1) << "didReceiveData: " << data_length << " bytes";
450 DCHECK(active_loader_.get());
451 DCHECK_GT(data_length, 0);
453 buffer_.Append(reinterpret_cast<const uint8*>(data), data_length);
455 // If there is an active read request, try to fulfill the request.
456 if (HasPendingRead() && CanFulfillRead())
457 ReadInternal();
459 // At last see if the buffer is full and we need to defer the downloading.
460 UpdateDeferBehavior();
462 // Consume excess bytes from our in-memory buffer if necessary.
463 if (buffer_.forward_bytes() > buffer_.forward_capacity()) {
464 int excess = buffer_.forward_bytes() - buffer_.forward_capacity();
465 bool success = buffer_.Seek(excess);
466 DCHECK(success);
467 offset_ += first_offset_ + excess;
470 // Notify latest progress and buffered offset.
471 progress_cb_.Run(offset_ + buffer_.forward_bytes() - 1);
472 Log();
475 void BufferedResourceLoader::didDownloadData(
476 blink::WebURLLoader* loader,
477 int dataLength,
478 int encoded_data_length) {
479 NOTIMPLEMENTED();
482 void BufferedResourceLoader::didReceiveCachedMetadata(
483 WebURLLoader* loader,
484 const char* data,
485 int data_length) {
486 NOTIMPLEMENTED();
489 void BufferedResourceLoader::didFinishLoading(
490 WebURLLoader* loader,
491 double finishTime,
492 int64_t total_encoded_data_length) {
493 DVLOG(1) << "didFinishLoading";
494 DCHECK(active_loader_.get());
496 // We're done with the loader.
497 active_loader_.reset();
498 loading_cb_.Run(kLoadingFinished);
500 // If we didn't know the |instance_size_| we do now.
501 if (instance_size_ == kPositionNotSpecified) {
502 instance_size_ = offset_ + buffer_.forward_bytes();
505 // If there is a start callback, run it.
506 if (!start_cb_.is_null()) {
507 DCHECK(read_cb_.is_null())
508 << "Shouldn't have a read callback during start";
509 DoneStart(kOk);
510 return;
513 // Don't leave read callbacks hanging around.
514 if (HasPendingRead()) {
515 // Try to fulfill with what is in the buffer.
516 if (CanFulfillRead())
517 ReadInternal();
518 else
519 DoneRead(kCacheMiss, 0);
523 void BufferedResourceLoader::didFail(
524 WebURLLoader* loader,
525 const WebURLError& error) {
526 DVLOG(1) << "didFail: reason=" << error.reason
527 << ", isCancellation=" << error.isCancellation
528 << ", domain=" << error.domain.utf8().data()
529 << ", localizedDescription="
530 << error.localizedDescription.utf8().data();
531 DCHECK(active_loader_.get());
533 // We don't need to continue loading after failure.
535 // Keep it alive until we exit this method so that |error| remains valid.
536 scoped_ptr<ActiveLoader> active_loader = active_loader_.Pass();
537 loader_failed_ = true;
538 loading_cb_.Run(kLoadingFailed);
540 // Don't leave start callbacks hanging around.
541 if (!start_cb_.is_null()) {
542 DCHECK(read_cb_.is_null())
543 << "Shouldn't have a read callback during start";
544 DoneStart(kFailed);
545 return;
548 // Don't leave read callbacks hanging around.
549 if (HasPendingRead()) {
550 DoneRead(kFailed, 0);
554 bool BufferedResourceLoader::HasSingleOrigin() const {
555 DCHECK(start_cb_.is_null())
556 << "Start() must complete before calling HasSingleOrigin()";
557 return single_origin_;
560 bool BufferedResourceLoader::DidPassCORSAccessCheck() const {
561 DCHECK(start_cb_.is_null())
562 << "Start() must complete before calling DidPassCORSAccessCheck()";
563 return !loader_failed_ && cors_mode_ != kUnspecified;
566 void BufferedResourceLoader::UpdateDeferStrategy(DeferStrategy strategy) {
567 if (!might_be_reused_from_cache_in_future_ && strategy == kNeverDefer)
568 strategy = kCapacityDefer;
569 defer_strategy_ = strategy;
570 UpdateDeferBehavior();
573 void BufferedResourceLoader::SetPlaybackRate(float playback_rate) {
574 playback_rate_ = playback_rate;
576 // This is a pause so don't bother updating the buffer window as we'll likely
577 // get unpaused in the future.
578 if (playback_rate_ == 0.0)
579 return;
581 UpdateBufferWindow();
584 void BufferedResourceLoader::SetBitrate(int bitrate) {
585 DCHECK(bitrate >= 0);
586 bitrate_ = bitrate;
587 UpdateBufferWindow();
590 /////////////////////////////////////////////////////////////////////////////
591 // Helper methods.
593 void BufferedResourceLoader::UpdateBufferWindow() {
594 int backward_capacity;
595 int forward_capacity;
596 ComputeTargetBufferWindow(
597 playback_rate_, bitrate_, &backward_capacity, &forward_capacity);
599 // This does not evict data from the buffer if the new capacities are less
600 // than the current capacities; the new limits will be enforced after the
601 // existing excess buffered data is consumed.
602 buffer_.set_backward_capacity(backward_capacity);
603 buffer_.set_forward_capacity(forward_capacity);
606 void BufferedResourceLoader::UpdateDeferBehavior() {
607 if (!active_loader_)
608 return;
610 SetDeferred(ShouldDefer());
613 void BufferedResourceLoader::SetDeferred(bool deferred) {
614 if (active_loader_->deferred() == deferred)
615 return;
617 active_loader_->SetDeferred(deferred);
618 loading_cb_.Run(deferred ? kLoadingDeferred : kLoading);
621 bool BufferedResourceLoader::ShouldDefer() const {
622 switch(defer_strategy_) {
623 case kNeverDefer:
624 return false;
626 case kReadThenDefer:
627 DCHECK(read_cb_.is_null() || last_offset_ > buffer_.forward_bytes())
628 << "We shouldn't stop deferring if we can fulfill the read";
629 return read_cb_.is_null();
631 case kCapacityDefer:
632 return buffer_.forward_bytes() >= buffer_.forward_capacity();
634 NOTREACHED();
635 return false;
638 bool BufferedResourceLoader::CanFulfillRead() const {
639 // If we are reading too far in the backward direction.
640 if (first_offset_ < 0 && (first_offset_ + buffer_.backward_bytes()) < 0)
641 return false;
643 // If the start offset is too far ahead.
644 if (first_offset_ >= buffer_.forward_bytes())
645 return false;
647 // At the point, we verified that first byte requested is within the buffer.
648 // If the request has completed, then just returns with what we have now.
649 if (!active_loader_)
650 return true;
652 // If the resource request is still active, make sure the whole requested
653 // range is covered.
654 if (last_offset_ > buffer_.forward_bytes())
655 return false;
657 return true;
660 bool BufferedResourceLoader::WillFulfillRead() const {
661 // Trying to read too far behind.
662 if (first_offset_ < 0 && (first_offset_ + buffer_.backward_bytes()) < 0)
663 return false;
665 // Trying to read too far ahead.
666 if ((first_offset_ - buffer_.forward_bytes()) >= kForwardWaitThreshold)
667 return false;
669 // The resource request has completed, there's no way we can fulfill the
670 // read request.
671 if (!active_loader_)
672 return false;
674 return true;
677 void BufferedResourceLoader::ReadInternal() {
678 // Seek to the first byte requested.
679 bool ret = buffer_.Seek(first_offset_);
680 DCHECK(ret);
682 // Then do the read.
683 int read = buffer_.Read(read_buffer_, read_size_);
684 offset_ += first_offset_ + read;
686 // And report with what we have read.
687 DoneRead(kOk, read);
690 int64 BufferedResourceLoader::first_byte_position() const {
691 return first_byte_position_;
694 // static
695 bool BufferedResourceLoader::ParseContentRange(
696 const std::string& content_range_str, int64* first_byte_position,
697 int64* last_byte_position, int64* instance_size) {
698 const std::string kUpThroughBytesUnit = "bytes ";
699 if (content_range_str.find(kUpThroughBytesUnit) != 0)
700 return false;
701 std::string range_spec =
702 content_range_str.substr(kUpThroughBytesUnit.length());
703 size_t dash_offset = range_spec.find("-");
704 size_t slash_offset = range_spec.find("/");
706 if (dash_offset == std::string::npos || slash_offset == std::string::npos ||
707 slash_offset < dash_offset || slash_offset + 1 == range_spec.length()) {
708 return false;
710 if (!base::StringToInt64(range_spec.substr(0, dash_offset),
711 first_byte_position) ||
712 !base::StringToInt64(range_spec.substr(dash_offset + 1,
713 slash_offset - dash_offset - 1),
714 last_byte_position)) {
715 return false;
717 if (slash_offset == range_spec.length() - 2 &&
718 range_spec[slash_offset + 1] == '*') {
719 *instance_size = kPositionNotSpecified;
720 } else {
721 if (!base::StringToInt64(range_spec.substr(slash_offset + 1),
722 instance_size)) {
723 return false;
726 if (*last_byte_position < *first_byte_position ||
727 (*instance_size != kPositionNotSpecified &&
728 *last_byte_position >= *instance_size)) {
729 return false;
732 return true;
735 bool BufferedResourceLoader::VerifyPartialResponse(
736 const WebURLResponse& response) {
737 int64 first_byte_position, last_byte_position, instance_size;
738 if (!ParseContentRange(response.httpHeaderField("Content-Range").utf8(),
739 &first_byte_position, &last_byte_position,
740 &instance_size)) {
741 return false;
744 if (instance_size != kPositionNotSpecified) {
745 instance_size_ = instance_size;
748 if (first_byte_position_ != kPositionNotSpecified &&
749 first_byte_position_ != first_byte_position) {
750 return false;
753 // TODO(hclam): I should also check |last_byte_position|, but since
754 // we will never make such a request that it is ok to leave it unimplemented.
755 return true;
758 void BufferedResourceLoader::DoneRead(Status status, int bytes_read) {
759 if (saved_forward_capacity_) {
760 buffer_.set_forward_capacity(saved_forward_capacity_);
761 saved_forward_capacity_ = 0;
763 read_position_ = 0;
764 read_size_ = 0;
765 read_buffer_ = NULL;
766 first_offset_ = 0;
767 last_offset_ = 0;
768 Log();
770 base::ResetAndReturn(&read_cb_).Run(status, bytes_read);
774 void BufferedResourceLoader::DoneStart(Status status) {
775 base::ResetAndReturn(&start_cb_).Run(status);
778 bool BufferedResourceLoader::IsRangeRequest() const {
779 return first_byte_position_ != kPositionNotSpecified;
782 void BufferedResourceLoader::Log() {
783 media_log_->AddEvent(
784 media_log_->CreateBufferedExtentsChangedEvent(
785 offset_ - buffer_.backward_bytes(),
786 offset_,
787 offset_ + buffer_.forward_bytes()));
790 } // namespace media