| /* |
| * Copyright (C) 2006, 2008 Apple Inc. All rights reserved. |
| * Copyright (C) 2009 Google Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY |
| * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR |
| * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
| * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
| * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY |
| * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "platform/network/ResourceResponse.h" |
| |
| #include "wtf/CurrentTime.h" |
| #include "wtf/PtrUtil.h" |
| #include "wtf/StdLibExtras.h" |
| #include <memory> |
| |
| namespace blink { |
| |
| namespace { |
| |
| template <typename Interface> |
| Vector<Interface> isolatedCopy(const Vector<Interface>& src) |
| { |
| Vector<Interface> result; |
| result.reserveCapacity(src.size()); |
| for (const auto& timestamp : src) { |
| result.append(timestamp.isolatedCopy()); |
| } |
| return result; |
| } |
| |
| } // namespace |
| |
| ResourceResponse::SignedCertificateTimestamp::SignedCertificateTimestamp( |
| const blink::WebURLResponse::SignedCertificateTimestamp& sct) |
| : m_status(sct.status) |
| , m_origin(sct.origin) |
| , m_logDescription(sct.logDescription) |
| , m_logId(sct.logId) |
| , m_timestamp(sct.timestamp) |
| , m_hashAlgorithm(sct.hashAlgorithm) |
| , m_signatureAlgorithm(sct.signatureAlgorithm) |
| , m_signatureData(sct.signatureData) |
| { |
| } |
| |
| ResourceResponse::SignedCertificateTimestamp ResourceResponse::SignedCertificateTimestamp::isolatedCopy() const |
| { |
| return SignedCertificateTimestamp( |
| m_status.isolatedCopy(), |
| m_origin.isolatedCopy(), |
| m_logDescription.isolatedCopy(), |
| m_logId.isolatedCopy(), |
| m_timestamp, |
| m_hashAlgorithm.isolatedCopy(), |
| m_signatureAlgorithm.isolatedCopy(), |
| m_signatureData.isolatedCopy()); |
| } |
| |
| ResourceResponse::ResourceResponse() |
| : m_expectedContentLength(0) |
| , m_httpStatusCode(0) |
| , m_lastModifiedDate(0) |
| , m_wasCached(false) |
| , m_connectionID(0) |
| , m_connectionReused(false) |
| , m_isNull(true) |
| , m_haveParsedAgeHeader(false) |
| , m_haveParsedDateHeader(false) |
| , m_haveParsedExpiresHeader(false) |
| , m_haveParsedLastModifiedHeader(false) |
| , m_age(0.0) |
| , m_date(0.0) |
| , m_expires(0.0) |
| , m_lastModified(0.0) |
| , m_hasMajorCertificateErrors(false) |
| , m_securityStyle(SecurityStyleUnknown) |
| , m_httpVersion(HTTPVersionUnknown) |
| , m_appCacheID(0) |
| , m_wasFetchedViaSPDY(false) |
| , m_wasNpnNegotiated(false) |
| , m_wasAlternateProtocolAvailable(false) |
| , m_wasFetchedViaProxy(false) |
| , m_wasFetchedViaServiceWorker(false) |
| , m_wasFetchedViaForeignFetch(false) |
| , m_wasFallbackRequiredByServiceWorker(false) |
| , m_serviceWorkerResponseType(WebServiceWorkerResponseTypeDefault) |
| , m_responseTime(0) |
| , m_remotePort(0) |
| , m_encodedBodyLength(0) |
| , m_decodedBodyLength(0) |
| { |
| } |
| |
| ResourceResponse::ResourceResponse(const KURL& url, const AtomicString& mimeType, long long expectedLength, const AtomicString& textEncodingName, const String& filename) |
| : m_url(url) |
| , m_mimeType(mimeType) |
| , m_expectedContentLength(expectedLength) |
| , m_textEncodingName(textEncodingName) |
| , m_suggestedFilename(filename) |
| , m_httpStatusCode(0) |
| , m_lastModifiedDate(0) |
| , m_wasCached(false) |
| , m_connectionID(0) |
| , m_connectionReused(false) |
| , m_isNull(false) |
| , m_haveParsedAgeHeader(false) |
| , m_haveParsedDateHeader(false) |
| , m_haveParsedExpiresHeader(false) |
| , m_haveParsedLastModifiedHeader(false) |
| , m_age(0.0) |
| , m_date(0.0) |
| , m_expires(0.0) |
| , m_lastModified(0.0) |
| , m_hasMajorCertificateErrors(false) |
| , m_securityStyle(SecurityStyleUnknown) |
| , m_httpVersion(HTTPVersionUnknown) |
| , m_appCacheID(0) |
| , m_wasFetchedViaSPDY(false) |
| , m_wasNpnNegotiated(false) |
| , m_wasAlternateProtocolAvailable(false) |
| , m_wasFetchedViaProxy(false) |
| , m_wasFetchedViaServiceWorker(false) |
| , m_wasFetchedViaForeignFetch(false) |
| , m_wasFallbackRequiredByServiceWorker(false) |
| , m_serviceWorkerResponseType(WebServiceWorkerResponseTypeDefault) |
| , m_responseTime(0) |
| , m_remotePort(0) |
| , m_encodedBodyLength(0) |
| , m_decodedBodyLength(0) |
| { |
| } |
| |
| ResourceResponse::ResourceResponse(CrossThreadResourceResponseData* data) |
| : ResourceResponse() |
| { |
| setURL(data->m_url); |
| setMimeType(AtomicString(data->m_mimeType)); |
| setExpectedContentLength(data->m_expectedContentLength); |
| setTextEncodingName(AtomicString(data->m_textEncodingName)); |
| setSuggestedFilename(data->m_suggestedFilename); |
| |
| setHTTPStatusCode(data->m_httpStatusCode); |
| setHTTPStatusText(AtomicString(data->m_httpStatusText)); |
| |
| m_httpHeaderFields.adopt(std::move(data->m_httpHeaders)); |
| setLastModifiedDate(data->m_lastModifiedDate); |
| setResourceLoadTiming(data->m_resourceLoadTiming.release()); |
| m_securityInfo = data->m_securityInfo; |
| m_hasMajorCertificateErrors = data->m_hasMajorCertificateErrors; |
| m_securityStyle = data->m_securityStyle; |
| m_securityDetails.protocol = data->m_securityDetails.protocol; |
| m_securityDetails.cipher = data->m_securityDetails.cipher; |
| m_securityDetails.keyExchange = data->m_securityDetails.keyExchange; |
| m_securityDetails.mac = data->m_securityDetails.mac; |
| m_securityDetails.subjectName = data->m_securityDetails.subjectName; |
| m_securityDetails.sanList = data->m_securityDetails.sanList; |
| m_securityDetails.issuer = data->m_securityDetails.issuer; |
| m_securityDetails.validFrom = data->m_securityDetails.validFrom; |
| m_securityDetails.validTo = data->m_securityDetails.validTo; |
| for (auto& cert : data->m_certificate) |
| m_securityDetails.certificate.append(AtomicString(cert)); |
| m_securityDetails.sctList = data->m_securityDetails.sctList; |
| m_httpVersion = data->m_httpVersion; |
| m_appCacheID = data->m_appCacheID; |
| m_appCacheManifestURL = data->m_appCacheManifestURL.copy(); |
| m_multipartBoundary = data->m_multipartBoundary; |
| m_wasFetchedViaSPDY = data->m_wasFetchedViaSPDY; |
| m_wasNpnNegotiated = data->m_wasNpnNegotiated; |
| m_wasAlternateProtocolAvailable = data->m_wasAlternateProtocolAvailable; |
| m_wasFetchedViaProxy = data->m_wasFetchedViaProxy; |
| m_wasFetchedViaServiceWorker = data->m_wasFetchedViaServiceWorker; |
| m_wasFetchedViaForeignFetch = data->m_wasFetchedViaForeignFetch; |
| m_wasFallbackRequiredByServiceWorker = data->m_wasFallbackRequiredByServiceWorker; |
| m_serviceWorkerResponseType = data->m_serviceWorkerResponseType; |
| m_originalURLViaServiceWorker = data->m_originalURLViaServiceWorker; |
| m_cacheStorageCacheName = data->m_cacheStorageCacheName; |
| m_responseTime = data->m_responseTime; |
| m_remoteIPAddress = AtomicString(data->m_remoteIPAddress); |
| m_remotePort = data->m_remotePort; |
| m_encodedBodyLength = data->m_encodedBodyLength; |
| m_decodedBodyLength = data->m_decodedBodyLength; |
| m_downloadedFilePath = data->m_downloadedFilePath; |
| m_downloadedFileHandle = data->m_downloadedFileHandle; |
| |
| // Bug https://bugs.webkit.org/show_bug.cgi?id=60397 this doesn't support |
| // whatever values may be present in the opaque m_extraData structure. |
| } |
| |
| ResourceResponse::ResourceResponse(const ResourceResponse&) = default; |
| ResourceResponse& ResourceResponse::operator=(const ResourceResponse&) = default; |
| |
| std::unique_ptr<CrossThreadResourceResponseData> ResourceResponse::copyData() const |
| { |
| std::unique_ptr<CrossThreadResourceResponseData> data = wrapUnique(new CrossThreadResourceResponseData); |
| data->m_url = url().copy(); |
| data->m_mimeType = mimeType().getString().isolatedCopy(); |
| data->m_expectedContentLength = expectedContentLength(); |
| data->m_textEncodingName = textEncodingName().getString().isolatedCopy(); |
| data->m_suggestedFilename = suggestedFilename().isolatedCopy(); |
| data->m_httpStatusCode = httpStatusCode(); |
| data->m_httpStatusText = httpStatusText().getString().isolatedCopy(); |
| data->m_httpHeaders = httpHeaderFields().copyData(); |
| data->m_lastModifiedDate = lastModifiedDate(); |
| if (m_resourceLoadTiming) |
| data->m_resourceLoadTiming = m_resourceLoadTiming->deepCopy(); |
| data->m_securityInfo = CString(m_securityInfo.data(), m_securityInfo.length()); |
| data->m_hasMajorCertificateErrors = m_hasMajorCertificateErrors; |
| data->m_securityStyle = m_securityStyle; |
| data->m_securityDetails.protocol = m_securityDetails.protocol.isolatedCopy(); |
| data->m_securityDetails.cipher = m_securityDetails.cipher.isolatedCopy(); |
| data->m_securityDetails.keyExchange = m_securityDetails.keyExchange.isolatedCopy(); |
| data->m_securityDetails.mac = m_securityDetails.mac.isolatedCopy(); |
| data->m_securityDetails.subjectName = m_securityDetails.subjectName.isolatedCopy(); |
| data->m_securityDetails.sanList = isolatedCopy(m_securityDetails.sanList); |
| data->m_securityDetails.issuer = m_securityDetails.issuer.isolatedCopy(); |
| data->m_securityDetails.validFrom = m_securityDetails.validFrom; |
| data->m_securityDetails.validTo = m_securityDetails.validTo; |
| for (auto& cert : m_securityDetails.certificate) |
| data->m_certificate.append(cert.getString().isolatedCopy()); |
| data->m_securityDetails.sctList = isolatedCopy(m_securityDetails.sctList); |
| data->m_httpVersion = m_httpVersion; |
| data->m_appCacheID = m_appCacheID; |
| data->m_appCacheManifestURL = m_appCacheManifestURL.copy(); |
| data->m_multipartBoundary = m_multipartBoundary; |
| data->m_wasFetchedViaSPDY = m_wasFetchedViaSPDY; |
| data->m_wasNpnNegotiated = m_wasNpnNegotiated; |
| data->m_wasAlternateProtocolAvailable = m_wasAlternateProtocolAvailable; |
| data->m_wasFetchedViaProxy = m_wasFetchedViaProxy; |
| data->m_wasFetchedViaServiceWorker = m_wasFetchedViaServiceWorker; |
| data->m_wasFetchedViaForeignFetch = m_wasFetchedViaForeignFetch; |
| data->m_wasFallbackRequiredByServiceWorker = m_wasFallbackRequiredByServiceWorker; |
| data->m_serviceWorkerResponseType = m_serviceWorkerResponseType; |
| data->m_originalURLViaServiceWorker = m_originalURLViaServiceWorker.copy(); |
| data->m_cacheStorageCacheName = cacheStorageCacheName().isolatedCopy(); |
| data->m_responseTime = m_responseTime; |
| data->m_remoteIPAddress = m_remoteIPAddress.getString().isolatedCopy(); |
| data->m_remotePort = m_remotePort; |
| data->m_encodedBodyLength = m_encodedBodyLength; |
| data->m_decodedBodyLength = m_decodedBodyLength; |
| data->m_downloadedFilePath = m_downloadedFilePath.isolatedCopy(); |
| data->m_downloadedFileHandle = m_downloadedFileHandle; |
| |
| // Bug https://bugs.webkit.org/show_bug.cgi?id=60397 this doesn't support |
| // whatever values may be present in the opaque m_extraData structure. |
| |
| return data; |
| } |
| |
| bool ResourceResponse::isHTTP() const |
| { |
| return m_url.protocolIsInHTTPFamily(); |
| } |
| |
| const KURL& ResourceResponse::url() const |
| { |
| return m_url; |
| } |
| |
| void ResourceResponse::setURL(const KURL& url) |
| { |
| m_isNull = false; |
| |
| m_url = url; |
| } |
| |
| const AtomicString& ResourceResponse::mimeType() const |
| { |
| return m_mimeType; |
| } |
| |
| void ResourceResponse::setMimeType(const AtomicString& mimeType) |
| { |
| m_isNull = false; |
| |
| // FIXME: MIME type is determined by HTTP Content-Type header. We should update the header, so that it doesn't disagree with m_mimeType. |
| m_mimeType = mimeType; |
| } |
| |
| long long ResourceResponse::expectedContentLength() const |
| { |
| return m_expectedContentLength; |
| } |
| |
| void ResourceResponse::setExpectedContentLength(long long expectedContentLength) |
| { |
| m_isNull = false; |
| |
| // FIXME: Content length is determined by HTTP Content-Length header. We should update the header, so that it doesn't disagree with m_expectedContentLength. |
| m_expectedContentLength = expectedContentLength; |
| } |
| |
| const AtomicString& ResourceResponse::textEncodingName() const |
| { |
| return m_textEncodingName; |
| } |
| |
| void ResourceResponse::setTextEncodingName(const AtomicString& encodingName) |
| { |
| m_isNull = false; |
| |
| // FIXME: Text encoding is determined by HTTP Content-Type header. We should update the header, so that it doesn't disagree with m_textEncodingName. |
| m_textEncodingName = encodingName; |
| } |
| |
| // FIXME should compute this on the fly |
| const String& ResourceResponse::suggestedFilename() const |
| { |
| return m_suggestedFilename; |
| } |
| |
| void ResourceResponse::setSuggestedFilename(const String& suggestedName) |
| { |
| m_isNull = false; |
| |
| // FIXME: Suggested file name is calculated based on other headers. There should not be a setter for it. |
| m_suggestedFilename = suggestedName; |
| } |
| |
| int ResourceResponse::httpStatusCode() const |
| { |
| return m_httpStatusCode; |
| } |
| |
| void ResourceResponse::setHTTPStatusCode(int statusCode) |
| { |
| m_httpStatusCode = statusCode; |
| } |
| |
| const AtomicString& ResourceResponse::httpStatusText() const |
| { |
| return m_httpStatusText; |
| } |
| |
| void ResourceResponse::setHTTPStatusText(const AtomicString& statusText) |
| { |
| m_httpStatusText = statusText; |
| } |
| |
| const AtomicString& ResourceResponse::httpHeaderField(const AtomicString& name) const |
| { |
| return m_httpHeaderFields.get(name); |
| } |
| |
| static const AtomicString& cacheControlHeaderString() |
| { |
| DEFINE_STATIC_LOCAL(const AtomicString, cacheControlHeader, ("cache-control")); |
| return cacheControlHeader; |
| } |
| |
| static const AtomicString& pragmaHeaderString() |
| { |
| DEFINE_STATIC_LOCAL(const AtomicString, pragmaHeader, ("pragma")); |
| return pragmaHeader; |
| } |
| |
| void ResourceResponse::updateHeaderParsedState(const AtomicString& name) |
| { |
| DEFINE_STATIC_LOCAL(const AtomicString, ageHeader, ("age")); |
| DEFINE_STATIC_LOCAL(const AtomicString, dateHeader, ("date")); |
| DEFINE_STATIC_LOCAL(const AtomicString, expiresHeader, ("expires")); |
| DEFINE_STATIC_LOCAL(const AtomicString, lastModifiedHeader, ("last-modified")); |
| |
| if (equalIgnoringCase(name, ageHeader)) |
| m_haveParsedAgeHeader = false; |
| else if (equalIgnoringCase(name, cacheControlHeaderString()) || equalIgnoringCase(name, pragmaHeaderString())) |
| m_cacheControlHeader = CacheControlHeader(); |
| else if (equalIgnoringCase(name, dateHeader)) |
| m_haveParsedDateHeader = false; |
| else if (equalIgnoringCase(name, expiresHeader)) |
| m_haveParsedExpiresHeader = false; |
| else if (equalIgnoringCase(name, lastModifiedHeader)) |
| m_haveParsedLastModifiedHeader = false; |
| } |
| |
| void ResourceResponse::setSecurityDetails(const String& protocol, const String& keyExchange, const String& cipher, const String& mac, const String& subjectName, const Vector<String>& sanList, const String& issuer, time_t validFrom, time_t validTo, const Vector<AtomicString>& certificate, const SignedCertificateTimestampList& sctList) |
| { |
| m_securityDetails.protocol = protocol; |
| m_securityDetails.keyExchange = keyExchange; |
| m_securityDetails.cipher = cipher; |
| m_securityDetails.mac = mac; |
| m_securityDetails.subjectName = subjectName; |
| m_securityDetails.sanList = sanList; |
| m_securityDetails.issuer = issuer; |
| m_securityDetails.validFrom = validFrom; |
| m_securityDetails.validTo = validTo; |
| m_securityDetails.certificate = certificate; |
| m_securityDetails.sctList = sctList; |
| } |
| |
| void ResourceResponse::setHTTPHeaderField(const AtomicString& name, const AtomicString& value) |
| { |
| updateHeaderParsedState(name); |
| |
| m_httpHeaderFields.set(name, value); |
| } |
| |
| void ResourceResponse::addHTTPHeaderField(const AtomicString& name, const AtomicString& value) |
| { |
| updateHeaderParsedState(name); |
| |
| HTTPHeaderMap::AddResult result = m_httpHeaderFields.add(name, value); |
| if (!result.isNewEntry) |
| result.storedValue->value = result.storedValue->value + ", " + value; |
| } |
| |
| void ResourceResponse::clearHTTPHeaderField(const AtomicString& name) |
| { |
| m_httpHeaderFields.remove(name); |
| } |
| |
| const HTTPHeaderMap& ResourceResponse::httpHeaderFields() const |
| { |
| return m_httpHeaderFields; |
| } |
| |
| bool ResourceResponse::cacheControlContainsNoCache() const |
| { |
| if (!m_cacheControlHeader.parsed) |
| m_cacheControlHeader = parseCacheControlDirectives(m_httpHeaderFields.get(cacheControlHeaderString()), m_httpHeaderFields.get(pragmaHeaderString())); |
| return m_cacheControlHeader.containsNoCache; |
| } |
| |
| bool ResourceResponse::cacheControlContainsNoStore() const |
| { |
| if (!m_cacheControlHeader.parsed) |
| m_cacheControlHeader = parseCacheControlDirectives(m_httpHeaderFields.get(cacheControlHeaderString()), m_httpHeaderFields.get(pragmaHeaderString())); |
| return m_cacheControlHeader.containsNoStore; |
| } |
| |
| bool ResourceResponse::cacheControlContainsMustRevalidate() const |
| { |
| if (!m_cacheControlHeader.parsed) |
| m_cacheControlHeader = parseCacheControlDirectives(m_httpHeaderFields.get(cacheControlHeaderString()), m_httpHeaderFields.get(pragmaHeaderString())); |
| return m_cacheControlHeader.containsMustRevalidate; |
| } |
| |
| bool ResourceResponse::hasCacheValidatorFields() const |
| { |
| DEFINE_STATIC_LOCAL(const AtomicString, lastModifiedHeader, ("last-modified")); |
| DEFINE_STATIC_LOCAL(const AtomicString, eTagHeader, ("etag")); |
| return !m_httpHeaderFields.get(lastModifiedHeader).isEmpty() || !m_httpHeaderFields.get(eTagHeader).isEmpty(); |
| } |
| |
| double ResourceResponse::cacheControlMaxAge() const |
| { |
| if (!m_cacheControlHeader.parsed) |
| m_cacheControlHeader = parseCacheControlDirectives(m_httpHeaderFields.get(cacheControlHeaderString()), m_httpHeaderFields.get(pragmaHeaderString())); |
| return m_cacheControlHeader.maxAge; |
| } |
| |
| double ResourceResponse::cacheControlStaleWhileRevalidate() const |
| { |
| if (!m_cacheControlHeader.parsed) |
| m_cacheControlHeader = parseCacheControlDirectives(m_httpHeaderFields.get(cacheControlHeaderString()), m_httpHeaderFields.get(pragmaHeaderString())); |
| return m_cacheControlHeader.staleWhileRevalidate; |
| } |
| |
| static double parseDateValueInHeader(const HTTPHeaderMap& headers, const AtomicString& headerName) |
| { |
| const AtomicString& headerValue = headers.get(headerName); |
| if (headerValue.isEmpty()) |
| return std::numeric_limits<double>::quiet_NaN(); |
| // This handles all date formats required by RFC2616: |
| // Sun, 06 Nov 1994 08:49:37 GMT ; RFC 822, updated by RFC 1123 |
| // Sunday, 06-Nov-94 08:49:37 GMT ; RFC 850, obsoleted by RFC 1036 |
| // Sun Nov 6 08:49:37 1994 ; ANSI C's asctime() format |
| double dateInMilliseconds = parseDate(headerValue); |
| if (!std::isfinite(dateInMilliseconds)) |
| return std::numeric_limits<double>::quiet_NaN(); |
| return dateInMilliseconds / 1000; |
| } |
| |
| double ResourceResponse::date() const |
| { |
| if (!m_haveParsedDateHeader) { |
| DEFINE_STATIC_LOCAL(const AtomicString, headerName, ("date")); |
| m_date = parseDateValueInHeader(m_httpHeaderFields, headerName); |
| m_haveParsedDateHeader = true; |
| } |
| return m_date; |
| } |
| |
| double ResourceResponse::age() const |
| { |
| if (!m_haveParsedAgeHeader) { |
| DEFINE_STATIC_LOCAL(const AtomicString, headerName, ("age")); |
| const AtomicString& headerValue = m_httpHeaderFields.get(headerName); |
| bool ok; |
| m_age = headerValue.toDouble(&ok); |
| if (!ok) |
| m_age = std::numeric_limits<double>::quiet_NaN(); |
| m_haveParsedAgeHeader = true; |
| } |
| return m_age; |
| } |
| |
| double ResourceResponse::expires() const |
| { |
| if (!m_haveParsedExpiresHeader) { |
| DEFINE_STATIC_LOCAL(const AtomicString, headerName, ("expires")); |
| m_expires = parseDateValueInHeader(m_httpHeaderFields, headerName); |
| m_haveParsedExpiresHeader = true; |
| } |
| return m_expires; |
| } |
| |
| double ResourceResponse::lastModified() const |
| { |
| if (!m_haveParsedLastModifiedHeader) { |
| DEFINE_STATIC_LOCAL(const AtomicString, headerName, ("last-modified")); |
| m_lastModified = parseDateValueInHeader(m_httpHeaderFields, headerName); |
| m_haveParsedLastModifiedHeader = true; |
| } |
| return m_lastModified; |
| } |
| |
| bool ResourceResponse::isAttachment() const |
| { |
| DEFINE_STATIC_LOCAL(const AtomicString, headerName, ("content-disposition")); |
| String value = m_httpHeaderFields.get(headerName); |
| size_t loc = value.find(';'); |
| if (loc != kNotFound) |
| value = value.left(loc); |
| value = value.stripWhiteSpace(); |
| DEFINE_STATIC_LOCAL(const AtomicString, attachmentString, ("attachment")); |
| return equalIgnoringCase(value, attachmentString); |
| } |
| |
| void ResourceResponse::setLastModifiedDate(time_t lastModifiedDate) |
| { |
| m_lastModifiedDate = lastModifiedDate; |
| } |
| |
| time_t ResourceResponse::lastModifiedDate() const |
| { |
| return m_lastModifiedDate; |
| } |
| |
| bool ResourceResponse::wasCached() const |
| { |
| return m_wasCached; |
| } |
| |
| void ResourceResponse::setWasCached(bool value) |
| { |
| m_wasCached = value; |
| } |
| |
| bool ResourceResponse::connectionReused() const |
| { |
| return m_connectionReused; |
| } |
| |
| void ResourceResponse::setConnectionReused(bool connectionReused) |
| { |
| m_connectionReused = connectionReused; |
| } |
| |
| unsigned ResourceResponse::connectionID() const |
| { |
| return m_connectionID; |
| } |
| |
| void ResourceResponse::setConnectionID(unsigned connectionID) |
| { |
| m_connectionID = connectionID; |
| } |
| |
| ResourceLoadTiming* ResourceResponse::resourceLoadTiming() const |
| { |
| return m_resourceLoadTiming.get(); |
| } |
| |
| void ResourceResponse::setResourceLoadTiming(PassRefPtr<ResourceLoadTiming> resourceLoadTiming) |
| { |
| m_resourceLoadTiming = resourceLoadTiming; |
| } |
| |
| PassRefPtr<ResourceLoadInfo> ResourceResponse::resourceLoadInfo() const |
| { |
| return m_resourceLoadInfo.get(); |
| } |
| |
| void ResourceResponse::setResourceLoadInfo(PassRefPtr<ResourceLoadInfo> loadInfo) |
| { |
| m_resourceLoadInfo = loadInfo; |
| } |
| |
| void ResourceResponse::addToEncodedBodyLength(int value) |
| { |
| m_encodedBodyLength += value; |
| } |
| |
| void ResourceResponse::addToDecodedBodyLength(int value) |
| { |
| m_decodedBodyLength += value; |
| } |
| |
| void ResourceResponse::setDownloadedFilePath(const String& downloadedFilePath) |
| { |
| m_downloadedFilePath = downloadedFilePath; |
| if (m_downloadedFilePath.isEmpty()) { |
| m_downloadedFileHandle.clear(); |
| return; |
| } |
| std::unique_ptr<BlobData> blobData = BlobData::create(); |
| blobData->appendFile(m_downloadedFilePath); |
| blobData->detachFromCurrentThread(); |
| m_downloadedFileHandle = BlobDataHandle::create(std::move(blobData), -1); |
| } |
| |
| bool ResourceResponse::compare(const ResourceResponse& a, const ResourceResponse& b) |
| { |
| if (a.isNull() != b.isNull()) |
| return false; |
| if (a.url() != b.url()) |
| return false; |
| if (a.mimeType() != b.mimeType()) |
| return false; |
| if (a.expectedContentLength() != b.expectedContentLength()) |
| return false; |
| if (a.textEncodingName() != b.textEncodingName()) |
| return false; |
| if (a.suggestedFilename() != b.suggestedFilename()) |
| return false; |
| if (a.httpStatusCode() != b.httpStatusCode()) |
| return false; |
| if (a.httpStatusText() != b.httpStatusText()) |
| return false; |
| if (a.httpHeaderFields() != b.httpHeaderFields()) |
| return false; |
| if (a.resourceLoadTiming() && b.resourceLoadTiming() && *a.resourceLoadTiming() == *b.resourceLoadTiming()) |
| return true; |
| if (a.resourceLoadTiming() != b.resourceLoadTiming()) |
| return false; |
| if (a.encodedBodyLength() != b.encodedBodyLength()) |
| return false; |
| if (a.decodedBodyLength() != b.decodedBodyLength()) |
| return false; |
| return true; |
| } |
| |
| } // namespace blink |