| // Copyright 2014 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "sync/internal_api/public/attachments/attachment_uploader_impl.h" |
| |
| #include <stdint.h> |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include "base/base64.h" |
| #include "base/base64url.h" |
| #include "base/bind.h" |
| #include "base/location.h" |
| #include "base/macros.h" |
| #include "base/memory/weak_ptr.h" |
| #include "base/metrics/sparse_histogram.h" |
| #include "base/single_thread_task_runner.h" |
| #include "base/strings/string_piece.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/sys_byteorder.h" |
| #include "base/threading/non_thread_safe.h" |
| #include "base/threading/thread_task_runner_handle.h" |
| #include "google_apis/gaia/gaia_constants.h" |
| #include "net/base/load_flags.h" |
| #include "net/http/http_status_code.h" |
| #include "net/url_request/url_fetcher.h" |
| #include "net/url_request/url_fetcher_delegate.h" |
| #include "net/url_request/url_request_status.h" |
| #include "sync/api/attachments/attachment.h" |
| #include "sync/protocol/sync.pb.h" |
| |
| namespace { |
| |
| const char kContentType[] = "application/octet-stream"; |
| const char kAttachments[] = "attachments/"; |
| const char kSyncStoreBirthday[] = "X-Sync-Store-Birthday"; |
| const char kSyncDataTypeId[] = "X-Sync-Data-Type-Id"; |
| |
| } // namespace |
| |
| namespace syncer { |
| |
| // Encapsulates all the state associated with a single upload. |
| class AttachmentUploaderImpl::UploadState : public net::URLFetcherDelegate, |
| public OAuth2TokenService::Consumer, |
| public base::NonThreadSafe { |
| public: |
| // Construct an UploadState. |
| // |
| // UploadState encapsulates the state associated with a single upload. When |
| // the upload completes, the UploadState object becomes "stopped". |
| // |
| // |owner| is a pointer to the object that owns this UploadState. Upon |
| // completion this object will PostTask to owner's OnUploadStateStopped |
| // method. |
| UploadState( |
| const GURL& upload_url, |
| const scoped_refptr<net::URLRequestContextGetter>& |
| url_request_context_getter, |
| const Attachment& attachment, |
| const UploadCallback& user_callback, |
| const std::string& account_id, |
| const OAuth2TokenService::ScopeSet& scopes, |
| OAuth2TokenServiceRequest::TokenServiceProvider* token_service_provider, |
| const std::string& raw_store_birthday, |
| const base::WeakPtr<AttachmentUploaderImpl>& owner, |
| ModelType model_type); |
| |
| ~UploadState() override; |
| |
| // Returns true if this object is stopped. Once stopped, this object is |
| // effectively dead and can be destroyed. |
| bool IsStopped() const; |
| |
| // Add |user_callback| to the list of callbacks to be invoked when this upload |
| // completed. |
| // |
| // It is an error to call |AddUserCallback| on a stopped UploadState (see |
| // |IsStopped|). |
| void AddUserCallback(const UploadCallback& user_callback); |
| |
| // Return the Attachment this object is uploading. |
| const Attachment& GetAttachment(); |
| |
| // URLFetcher implementation. |
| void OnURLFetchComplete(const net::URLFetcher* source) override; |
| |
| // OAuth2TokenService::Consumer. |
| void OnGetTokenSuccess(const OAuth2TokenService::Request* request, |
| const std::string& access_token, |
| const base::Time& expiration_time) override; |
| void OnGetTokenFailure(const OAuth2TokenService::Request* request, |
| const GoogleServiceAuthError& error) override; |
| |
| private: |
| typedef std::vector<UploadCallback> UploadCallbackList; |
| |
| void GetToken(); |
| |
| void StopAndReportResult(const UploadResult& result, |
| const AttachmentId& attachment_id); |
| |
| bool is_stopped_; |
| GURL upload_url_; |
| const scoped_refptr<net::URLRequestContextGetter>& |
| url_request_context_getter_; |
| Attachment attachment_; |
| UploadCallbackList user_callbacks_; |
| std::unique_ptr<net::URLFetcher> fetcher_; |
| std::string account_id_; |
| OAuth2TokenService::ScopeSet scopes_; |
| std::string access_token_; |
| std::string raw_store_birthday_; |
| OAuth2TokenServiceRequest::TokenServiceProvider* token_service_provider_; |
| // Pointer to the AttachmentUploaderImpl that owns this object. |
| base::WeakPtr<AttachmentUploaderImpl> owner_; |
| std::unique_ptr<OAuth2TokenServiceRequest> access_token_request_; |
| ModelType model_type_; |
| |
| DISALLOW_COPY_AND_ASSIGN(UploadState); |
| }; |
| |
| AttachmentUploaderImpl::UploadState::UploadState( |
| const GURL& upload_url, |
| const scoped_refptr<net::URLRequestContextGetter>& |
| url_request_context_getter, |
| const Attachment& attachment, |
| const UploadCallback& user_callback, |
| const std::string& account_id, |
| const OAuth2TokenService::ScopeSet& scopes, |
| OAuth2TokenServiceRequest::TokenServiceProvider* token_service_provider, |
| const std::string& raw_store_birthday, |
| const base::WeakPtr<AttachmentUploaderImpl>& owner, |
| ModelType model_type) |
| : OAuth2TokenService::Consumer("attachment-uploader-impl"), |
| is_stopped_(false), |
| upload_url_(upload_url), |
| url_request_context_getter_(url_request_context_getter), |
| attachment_(attachment), |
| user_callbacks_(1, user_callback), |
| account_id_(account_id), |
| scopes_(scopes), |
| raw_store_birthday_(raw_store_birthday), |
| token_service_provider_(token_service_provider), |
| owner_(owner), |
| model_type_(model_type) { |
| DCHECK(upload_url_.is_valid()); |
| DCHECK(url_request_context_getter_.get()); |
| DCHECK(!account_id_.empty()); |
| DCHECK(!scopes_.empty()); |
| DCHECK(token_service_provider_); |
| DCHECK(!raw_store_birthday_.empty()); |
| GetToken(); |
| } |
| |
| AttachmentUploaderImpl::UploadState::~UploadState() { |
| } |
| |
| bool AttachmentUploaderImpl::UploadState::IsStopped() const { |
| DCHECK(CalledOnValidThread()); |
| return is_stopped_; |
| } |
| |
| void AttachmentUploaderImpl::UploadState::AddUserCallback( |
| const UploadCallback& user_callback) { |
| DCHECK(CalledOnValidThread()); |
| DCHECK(!is_stopped_); |
| user_callbacks_.push_back(user_callback); |
| } |
| |
| const Attachment& AttachmentUploaderImpl::UploadState::GetAttachment() { |
| DCHECK(CalledOnValidThread()); |
| return attachment_; |
| } |
| |
| void AttachmentUploaderImpl::UploadState::OnURLFetchComplete( |
| const net::URLFetcher* source) { |
| DCHECK(CalledOnValidThread()); |
| if (is_stopped_) { |
| return; |
| } |
| |
| UploadResult result = UPLOAD_TRANSIENT_ERROR; |
| AttachmentId attachment_id = attachment_.GetId(); |
| net::URLRequestStatus status = source->GetStatus(); |
| const int response_code = source->GetResponseCode(); |
| UMA_HISTOGRAM_SPARSE_SLOWLY("Sync.Attachments.UploadResponseCode", |
| status.is_success() ? response_code : status.error()); |
| if (response_code == net::HTTP_OK) { |
| result = UPLOAD_SUCCESS; |
| } else if (response_code == net::HTTP_UNAUTHORIZED) { |
| // Server tells us we've got a bad token so invalidate it. |
| OAuth2TokenServiceRequest::InvalidateToken( |
| token_service_provider_, account_id_, scopes_, access_token_); |
| // Fail the request, but indicate that it may be successful if retried. |
| result = UPLOAD_TRANSIENT_ERROR; |
| } else if (response_code == net::HTTP_FORBIDDEN) { |
| // User is not allowed to use attachments. Retrying won't help. |
| result = UPLOAD_UNSPECIFIED_ERROR; |
| } else if (response_code == net::URLFetcher::RESPONSE_CODE_INVALID) { |
| result = UPLOAD_TRANSIENT_ERROR; |
| } |
| StopAndReportResult(result, attachment_id); |
| } |
| |
| void AttachmentUploaderImpl::UploadState::OnGetTokenSuccess( |
| const OAuth2TokenService::Request* request, |
| const std::string& access_token, |
| const base::Time& expiration_time) { |
| DCHECK(CalledOnValidThread()); |
| if (is_stopped_) { |
| return; |
| } |
| |
| DCHECK_EQ(access_token_request_.get(), request); |
| access_token_request_.reset(); |
| access_token_ = access_token; |
| fetcher_ = net::URLFetcher::Create(upload_url_, net::URLFetcher::POST, this); |
| ConfigureURLFetcherCommon(fetcher_.get(), access_token_, raw_store_birthday_, |
| model_type_, url_request_context_getter_.get()); |
| |
| const uint32_t crc32c = attachment_.GetCrc32c(); |
| fetcher_->AddExtraRequestHeader(base::StringPrintf( |
| "X-Goog-Hash: crc32c=%s", FormatCrc32cHash(crc32c).c_str())); |
| |
| // TODO(maniscalco): Is there a better way? Copying the attachment data into |
| // a string feels wrong given how large attachments may be (several MBs). If |
| // we may end up switching from URLFetcher to URLRequest, this copy won't be |
| // necessary. |
| scoped_refptr<base::RefCountedMemory> memory = attachment_.GetData(); |
| const std::string upload_content(memory->front_as<char>(), memory->size()); |
| fetcher_->SetUploadData(kContentType, upload_content); |
| |
| fetcher_->Start(); |
| } |
| |
| void AttachmentUploaderImpl::UploadState::OnGetTokenFailure( |
| const OAuth2TokenService::Request* request, |
| const GoogleServiceAuthError& error) { |
| DCHECK(CalledOnValidThread()); |
| if (is_stopped_) { |
| return; |
| } |
| |
| DCHECK_EQ(access_token_request_.get(), request); |
| access_token_request_.reset(); |
| // TODO(maniscalco): We treat this as a transient error, but it may in fact be |
| // a very long lived error and require user action. Consider differentiating |
| // between the causes of GetToken failure and act accordingly. Think about |
| // the causes of GetToken failure. Are there (bug 412802). |
| StopAndReportResult(UPLOAD_TRANSIENT_ERROR, attachment_.GetId()); |
| } |
| |
| void AttachmentUploaderImpl::UploadState::GetToken() { |
| access_token_request_ = OAuth2TokenServiceRequest::CreateAndStart( |
| token_service_provider_, account_id_, scopes_, this); |
| } |
| |
| void AttachmentUploaderImpl::UploadState::StopAndReportResult( |
| const UploadResult& result, |
| const AttachmentId& attachment_id) { |
| DCHECK(!is_stopped_); |
| is_stopped_ = true; |
| UploadCallbackList::const_iterator iter = user_callbacks_.begin(); |
| UploadCallbackList::const_iterator end = user_callbacks_.end(); |
| for (; iter != end; ++iter) { |
| base::ThreadTaskRunnerHandle::Get()->PostTask( |
| FROM_HERE, base::Bind(*iter, result, attachment_id)); |
| } |
| base::ThreadTaskRunnerHandle::Get()->PostTask( |
| FROM_HERE, base::Bind(&AttachmentUploaderImpl::OnUploadStateStopped, |
| owner_, attachment_id.GetProto().unique_id())); |
| } |
| |
| AttachmentUploaderImpl::AttachmentUploaderImpl( |
| const GURL& sync_service_url, |
| const scoped_refptr<net::URLRequestContextGetter>& |
| url_request_context_getter, |
| const std::string& account_id, |
| const OAuth2TokenService::ScopeSet& scopes, |
| const scoped_refptr<OAuth2TokenServiceRequest::TokenServiceProvider>& |
| token_service_provider, |
| const std::string& store_birthday, |
| ModelType model_type) |
| : sync_service_url_(sync_service_url), |
| url_request_context_getter_(url_request_context_getter), |
| account_id_(account_id), |
| scopes_(scopes), |
| token_service_provider_(token_service_provider), |
| raw_store_birthday_(store_birthday), |
| model_type_(model_type), |
| weak_ptr_factory_(this) { |
| DCHECK(CalledOnValidThread()); |
| DCHECK(!account_id.empty()); |
| DCHECK(!scopes.empty()); |
| DCHECK(token_service_provider_.get()); |
| DCHECK(!raw_store_birthday_.empty()); |
| } |
| |
| AttachmentUploaderImpl::~AttachmentUploaderImpl() { |
| DCHECK(CalledOnValidThread()); |
| } |
| |
| void AttachmentUploaderImpl::UploadAttachment(const Attachment& attachment, |
| const UploadCallback& callback) { |
| DCHECK(CalledOnValidThread()); |
| const AttachmentId attachment_id = attachment.GetId(); |
| const std::string unique_id = attachment_id.GetProto().unique_id(); |
| DCHECK(!unique_id.empty()); |
| StateMap::iterator iter = state_map_.find(unique_id); |
| if (iter != state_map_.end()) { |
| // We have an old upload request for this attachment... |
| if (!iter->second->IsStopped()) { |
| // "join" to it. |
| DCHECK(attachment.GetData() |
| ->Equals(iter->second->GetAttachment().GetData())); |
| iter->second->AddUserCallback(callback); |
| return; |
| } else { |
| // It's stopped so we can't use it. Delete it. |
| state_map_.erase(iter); |
| } |
| } |
| |
| const GURL url = GetURLForAttachmentId(sync_service_url_, attachment_id); |
| std::unique_ptr<UploadState> upload_state(new UploadState( |
| url, url_request_context_getter_, attachment, callback, account_id_, |
| scopes_, token_service_provider_.get(), raw_store_birthday_, |
| weak_ptr_factory_.GetWeakPtr(), model_type_)); |
| state_map_[unique_id] = std::move(upload_state); |
| } |
| |
| // Static. |
| GURL AttachmentUploaderImpl::GetURLForAttachmentId( |
| const GURL& sync_service_url, |
| const AttachmentId& attachment_id) { |
| std::string path = sync_service_url.path(); |
| if (path.empty() || *path.rbegin() != '/') { |
| path += '/'; |
| } |
| path += kAttachments; |
| path += attachment_id.GetProto().unique_id(); |
| GURL::Replacements replacements; |
| replacements.SetPathStr(path); |
| return sync_service_url.ReplaceComponents(replacements); |
| } |
| |
| void AttachmentUploaderImpl::OnUploadStateStopped(const UniqueId& unique_id) { |
| StateMap::iterator iter = state_map_.find(unique_id); |
| // Only erase if stopped. Because this method is called asynchronously, it's |
| // possible that a new request for this same id arrived after the UploadState |
| // stopped, but before this method was invoked. In that case the UploadState |
| // in the map might be a new one. |
| if (iter != state_map_.end() && iter->second->IsStopped()) { |
| state_map_.erase(iter); |
| } |
| } |
| |
| std::string AttachmentUploaderImpl::FormatCrc32cHash(uint32_t crc32c) { |
| const uint32_t crc32c_big_endian = base::HostToNet32(crc32c); |
| const base::StringPiece raw(reinterpret_cast<const char*>(&crc32c_big_endian), |
| sizeof(crc32c_big_endian)); |
| std::string encoded; |
| base::Base64Encode(raw, &encoded); |
| return encoded; |
| } |
| |
| void AttachmentUploaderImpl::ConfigureURLFetcherCommon( |
| net::URLFetcher* fetcher, |
| const std::string& access_token, |
| const std::string& raw_store_birthday, |
| ModelType model_type, |
| net::URLRequestContextGetter* request_context_getter) { |
| DCHECK(request_context_getter); |
| DCHECK(fetcher); |
| fetcher->SetAutomaticallyRetryOn5xx(false); |
| fetcher->SetRequestContext(request_context_getter); |
| fetcher->SetLoadFlags(net::LOAD_DO_NOT_SAVE_COOKIES | |
| net::LOAD_DO_NOT_SEND_COOKIES | |
| net::LOAD_DISABLE_CACHE); |
| fetcher->AddExtraRequestHeader(base::StringPrintf( |
| "%s: Bearer %s", net::HttpRequestHeaders::kAuthorization, |
| access_token.c_str())); |
| // Encode the birthday. Birthday is opaque so we assume it could contain |
| // anything. Encode it so that it's safe to pass as an HTTP header value. |
| std::string encoded_store_birthday; |
| base::Base64UrlEncode( |
| raw_store_birthday, base::Base64UrlEncodePolicy::OMIT_PADDING, |
| &encoded_store_birthday); |
| fetcher->AddExtraRequestHeader(base::StringPrintf( |
| "%s: %s", kSyncStoreBirthday, encoded_store_birthday.c_str())); |
| |
| // Use field number to pass ModelType because it's stable and we have server |
| // code to decode it. |
| const int field_number = GetSpecificsFieldNumberFromModelType(model_type); |
| fetcher->AddExtraRequestHeader( |
| base::StringPrintf("%s: %d", kSyncDataTypeId, field_number)); |
| } |
| |
| } // namespace syncer |