blob: ff28a98eb0211dcdade60775cac2cf74f8319c8a [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROME_BROWSER_NET_CHROME_NETWORK_DELEGATE_H_
#define CHROME_BROWSER_NET_CHROME_NETWORK_DELEGATE_H_
#include <stdint.h>
#include <memory>
#include <set>
#include <string>
#include "base/compiler_specific.h"
#include "base/files/file_path.h"
#include "base/macros.h"
#include "base/memory/ref_counted.h"
#include "base/values.h"
#include "build/build_config.h"
#include "chrome/browser/net/reporting_permissions_checker.h"
#include "components/domain_reliability/monitor.h"
#include "net/base/network_delegate_impl.h"
class ChromeExtensionsNetworkDelegate;
namespace content_settings {
class CookieSettings;
}
namespace domain_reliability {
class DomainReliabilityMonitor;
}
namespace extensions {
class EventRouterForwarder;
class InfoMap;
}
namespace net {
class URLRequest;
}
// ChromeNetworkDelegate is the central point from within the chrome code to
// add hooks into the network stack.
class ChromeNetworkDelegate : public net::NetworkDelegateImpl {
public:
explicit ChromeNetworkDelegate(
extensions::EventRouterForwarder* event_router);
~ChromeNetworkDelegate() override;
// Pass through to ChromeExtensionsNetworkDelegate::set_extension_info_map().
void set_extension_info_map(extensions::InfoMap* extension_info_map);
// If |profile| is nullptr or not set, events will be broadcast to all
// profiles, otherwise they will only be sent to the specified profile.
// Also pass through to ChromeExtensionsNetworkDelegate::set_profile().
void set_profile(void* profile);
// |profile_path| is used to locate profile specific paths such as the
// "Downloads" folder on Chrome OS. If it is set, folders like Downloads
// for the profile are added to the whitelist for accesses via file: scheme.
void set_profile_path(const base::FilePath& profile_path) {
profile_path_ = profile_path;
}
// If |cookie_settings| is nullptr or not set, all cookies are enabled,
// otherwise the settings are enforced on all observed network requests.
// Not inlined because we assign a scoped_refptr, which requires us to include
// the header file. Here we just forward-declare it.
void set_cookie_settings(content_settings::CookieSettings* cookie_settings);
void set_domain_reliability_monitor(
std::unique_ptr<domain_reliability::DomainReliabilityMonitor> monitor) {
domain_reliability_monitor_ = std::move(monitor);
}
domain_reliability::DomainReliabilityMonitor* domain_reliability_monitor() {
return domain_reliability_monitor_.get();
}
void set_reporting_permissions_checker(
std::unique_ptr<ReportingPermissionsChecker>
reporting_permissions_checker) {
reporting_permissions_checker_ = std::move(reporting_permissions_checker);
}
ReportingPermissionsChecker* reporting_permissions_checker() {
return reporting_permissions_checker_.get();
}
// Returns true if access to |path| is allowed. |profile_path| is used to
// locate certain paths on Chrome OS. See set_profile_path() for details.
static bool IsAccessAllowed(const base::FilePath& path,
const base::FilePath& profile_path);
// Like above, but also takes |path|'s absolute path in |absolute_path| to
// further validate access.
static bool IsAccessAllowed(const base::FilePath& path,
const base::FilePath& absolute_path,
const base::FilePath& profile_path);
// Enables access to all files for testing purposes. This function is used
// to bypass the access control for file: scheme. Calling this function
// with false brings back the original (production) behaviors.
static void EnableAccessToAllFilesForTesting(bool enabled);
private:
// NetworkDelegate implementation.
int OnBeforeURLRequest(net::URLRequest* request,
net::CompletionOnceCallback callback,
GURL* new_url) override;
int OnBeforeStartTransaction(net::URLRequest* request,
net::CompletionOnceCallback callback,
net::HttpRequestHeaders* headers) override;
void OnStartTransaction(net::URLRequest* request,
const net::HttpRequestHeaders& headers) override;
int OnHeadersReceived(
net::URLRequest* request,
net::CompletionOnceCallback callback,
const net::HttpResponseHeaders* original_response_headers,
scoped_refptr<net::HttpResponseHeaders>* override_response_headers,
GURL* allowed_unsafe_redirect_url) override;
void OnBeforeRedirect(net::URLRequest* request,
const GURL& new_location) override;
void OnResponseStarted(net::URLRequest* request, int net_error) override;
void OnNetworkBytesReceived(net::URLRequest* request,
int64_t bytes_received) override;
void OnNetworkBytesSent(net::URLRequest* request,
int64_t bytes_sent) override;
void OnCompleted(net::URLRequest* request,
bool started,
int net_error) override;
void OnURLRequestDestroyed(net::URLRequest* request) override;
net::NetworkDelegate::AuthRequiredResponse OnAuthRequired(
net::URLRequest* request,
const net::AuthChallengeInfo& auth_info,
AuthCallback callback,
net::AuthCredentials* credentials) override;
bool OnCanGetCookies(const net::URLRequest& request,
const net::CookieList& cookie_list,
bool allowed_from_caller) override;
bool OnCanSetCookie(const net::URLRequest& request,
const net::CanonicalCookie& cookie,
net::CookieOptions* options,
bool allowed_from_caller) override;
bool OnCanAccessFile(const net::URLRequest& request,
const base::FilePath& original_path,
const base::FilePath& absolute_path) const override;
bool OnAreExperimentalCookieFeaturesEnabled() const override;
bool OnCancelURLRequestWithPolicyViolatingReferrerHeader(
const net::URLRequest& request,
const GURL& target_url,
const GURL& referrer_url) const override;
bool OnCanQueueReportingReport(const url::Origin& origin) const override;
void OnCanSendReportingReports(std::set<url::Origin> origins,
base::OnceCallback<void(std::set<url::Origin>)>
result_callback) const override;
bool OnCanSetReportingClient(const url::Origin& origin,
const GURL& endpoint) const override;
bool OnCanUseReportingClient(const url::Origin& origin,
const GURL& endpoint) const override;
std::unique_ptr<ChromeExtensionsNetworkDelegate> extensions_delegate_;
void* profile_;
base::FilePath profile_path_;
scoped_refptr<content_settings::CookieSettings> cookie_settings_;
// Weak, owned by our owner.
std::unique_ptr<domain_reliability::DomainReliabilityMonitor>
domain_reliability_monitor_;
std::unique_ptr<ReportingPermissionsChecker> reporting_permissions_checker_;
bool experimental_web_platform_features_enabled_;
DISALLOW_COPY_AND_ASSIGN(ChromeNetworkDelegate);
};
#endif // CHROME_BROWSER_NET_CHROME_NETWORK_DELEGATE_H_