blob: 01bf7c4bc0fa59d6ca0f17a2455ad69483ed0f5b [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/child/web_url_loader_impl.h"
#include <stdint.h>
#include <algorithm>
#include <memory>
#include <string>
#include <utility>
#include <vector>
#include "base/bind.h"
#include "base/callback.h"
#include "base/command_line.h"
#include "base/files/file_path.h"
#include "base/logging.h"
#include "base/memory/ptr_util.h"
#include "base/optional.h"
#include "base/single_thread_task_runner.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_util.h"
#include "base/threading/thread_task_runner_handle.h"
#include "base/time/time.h"
#include "build/build_config.h"
#include "content/child/child_thread_impl.h"
#include "content/child/ftp_directory_listing_response_delegate.h"
#include "content/child/request_extra_data.h"
#include "content/child/resource_dispatcher.h"
#include "content/child/shared_memory_data_consumer_handle.h"
#include "content/child/sync_load_response.h"
#include "content/child/web_url_request_util.h"
#include "content/child/weburlresponse_extradata_impl.h"
#include "content/common/resource_messages.h"
#include "content/common/service_worker/service_worker_types.h"
#include "content/public/child/fixed_received_data.h"
#include "content/public/child/request_peer.h"
#include "content/public/common/browser_side_navigation_policy.h"
#include "content/public/common/content_features.h"
#include "content/public/common/resource_request.h"
#include "content/public/common/resource_request_body.h"
#include "content/public/common/service_worker_modes.h"
#include "content/public/common/url_loader.mojom.h"
#include "net/base/data_url.h"
#include "net/base/filename_util.h"
#include "net/base/net_errors.h"
#include "net/cert/cert_status_flags.h"
#include "net/cert/ct_sct_to_string.h"
#include "net/cert/x509_util.h"
#include "net/http/http_response_headers.h"
#include "net/http/http_util.h"
#include "net/ssl/ssl_cipher_suite_names.h"
#include "net/ssl/ssl_connection_status_flags.h"
#include "net/url_request/url_request_data_job.h"
#include "third_party/WebKit/common/mime_util/mime_util.h"
#include "third_party/WebKit/public/platform/FilePathConversion.h"
#include "third_party/WebKit/public/platform/WebHTTPLoadInfo.h"
#include "third_party/WebKit/public/platform/WebSecurityOrigin.h"
#include "third_party/WebKit/public/platform/WebSecurityStyle.h"
#include "third_party/WebKit/public/platform/WebURL.h"
#include "third_party/WebKit/public/platform/WebURLError.h"
#include "third_party/WebKit/public/platform/WebURLLoadTiming.h"
#include "third_party/WebKit/public/platform/WebURLLoaderClient.h"
#include "third_party/WebKit/public/platform/WebURLRequest.h"
#include "third_party/WebKit/public/platform/WebURLResponse.h"
#include "third_party/WebKit/public/web/WebSecurityPolicy.h"
#include "third_party/boringssl/src/include/openssl/ssl.h"
using base::Time;
using base::TimeTicks;
using blink::WebData;
using blink::WebHTTPBody;
using blink::WebHTTPHeaderVisitor;
using blink::WebHTTPLoadInfo;
using blink::WebReferrerPolicy;
using blink::WebSecurityPolicy;
using blink::WebString;
using blink::WebURL;
using blink::WebURLError;
using blink::WebURLLoadTiming;
using blink::WebURLLoader;
using blink::WebURLLoaderClient;
using blink::WebURLRequest;
using blink::WebURLResponse;
namespace content {
// Utilities ------------------------------------------------------------------
namespace {
using HeadersVector = ResourceDevToolsInfo::HeadersVector;
// TODO(estark): Figure out a way for the embedder to provide the
// security style for a resource. Ideally, the logic for assigning
// per-resource security styles should live in the same place as the
// logic for assigning per-page security styles (which lives in the
// embedder). It would also be nice for the embedder to have the chance
// to control the per-resource security style beyond the simple logic
// here. (For example, the embedder might want to mark certain resources
// differently if they use SHA1 signatures.) https://crbug.com/648326
blink::WebSecurityStyle GetSecurityStyleForResource(
const GURL& url,
net::CertStatus cert_status) {
if (!url.SchemeIsCryptographic())
return blink::kWebSecurityStyleNeutral;
// Minor errors don't lower the security style to
// WebSecurityStyleAuthenticationBroken.
if (net::IsCertStatusError(cert_status) &&
!net::IsCertStatusMinorError(cert_status)) {
return blink::kWebSecurityStyleInsecure;
}
return blink::kWebSecurityStyleSecure;
}
// Converts timing data from |load_timing| to the format used by WebKit.
void PopulateURLLoadTiming(const net::LoadTimingInfo& load_timing,
WebURLLoadTiming* url_timing) {
DCHECK(!load_timing.request_start.is_null());
const TimeTicks kNullTicks;
url_timing->Initialize();
url_timing->SetRequestTime(
(load_timing.request_start - kNullTicks).InSecondsF());
url_timing->SetProxyStart(
(load_timing.proxy_resolve_start - kNullTicks).InSecondsF());
url_timing->SetProxyEnd(
(load_timing.proxy_resolve_end - kNullTicks).InSecondsF());
url_timing->SetDNSStart(
(load_timing.connect_timing.dns_start - kNullTicks).InSecondsF());
url_timing->SetDNSEnd(
(load_timing.connect_timing.dns_end - kNullTicks).InSecondsF());
url_timing->SetConnectStart(
(load_timing.connect_timing.connect_start - kNullTicks).InSecondsF());
url_timing->SetConnectEnd(
(load_timing.connect_timing.connect_end - kNullTicks).InSecondsF());
url_timing->SetSSLStart(
(load_timing.connect_timing.ssl_start - kNullTicks).InSecondsF());
url_timing->SetSSLEnd(
(load_timing.connect_timing.ssl_end - kNullTicks).InSecondsF());
url_timing->SetSendStart((load_timing.send_start - kNullTicks).InSecondsF());
url_timing->SetSendEnd((load_timing.send_end - kNullTicks).InSecondsF());
url_timing->SetReceiveHeadersEnd(
(load_timing.receive_headers_end - kNullTicks).InSecondsF());
url_timing->SetPushStart((load_timing.push_start - kNullTicks).InSecondsF());
url_timing->SetPushEnd((load_timing.push_end - kNullTicks).InSecondsF());
}
net::RequestPriority ConvertWebKitPriorityToNetPriority(
const WebURLRequest::Priority& priority) {
switch (priority) {
case WebURLRequest::kPriorityVeryHigh:
return net::HIGHEST;
case WebURLRequest::kPriorityHigh:
return net::MEDIUM;
case WebURLRequest::kPriorityMedium:
return net::LOW;
case WebURLRequest::kPriorityLow:
return net::LOWEST;
case WebURLRequest::kPriorityVeryLow:
return net::IDLE;
case WebURLRequest::kPriorityUnresolved:
default:
NOTREACHED();
return net::LOW;
}
}
blink::WebReferrerPolicy NetReferrerPolicyToBlinkReferrerPolicy(
net::URLRequest::ReferrerPolicy net_policy) {
switch (net_policy) {
case net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE:
return blink::kWebReferrerPolicyNoReferrerWhenDowngrade;
case net::URLRequest::
REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN:
return blink::
kWebReferrerPolicyNoReferrerWhenDowngradeOriginWhenCrossOrigin;
case net::URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN:
return blink::kWebReferrerPolicyOriginWhenCrossOrigin;
case net::URLRequest::NEVER_CLEAR_REFERRER:
return blink::kWebReferrerPolicyAlways;
case net::URLRequest::ORIGIN:
return blink::kWebReferrerPolicyOrigin;
case net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_CROSS_ORIGIN:
return blink::kWebReferrerPolicySameOrigin;
case net::URLRequest::ORIGIN_CLEAR_ON_TRANSITION_FROM_SECURE_TO_INSECURE:
return blink::kWebReferrerPolicyStrictOrigin;
case net::URLRequest::NO_REFERRER:
return blink::kWebReferrerPolicyNever;
case net::URLRequest::MAX_REFERRER_POLICY:
NOTREACHED();
return blink::kWebReferrerPolicyDefault;
}
NOTREACHED();
return blink::kWebReferrerPolicyDefault;
}
// Extracts info from a data scheme URL |url| into |info| and |data|. Returns
// net::OK if successful. Returns a net error code otherwise.
int GetInfoFromDataURL(const GURL& url,
ResourceResponseInfo* info,
std::string* data) {
// Assure same time for all time fields of data: URLs.
Time now = Time::Now();
info->load_timing.request_start = TimeTicks::Now();
info->load_timing.request_start_time = now;
info->request_time = now;
info->response_time = now;
std::string mime_type;
std::string charset;
scoped_refptr<net::HttpResponseHeaders> headers(
new net::HttpResponseHeaders(std::string()));
int result = net::URLRequestDataJob::BuildResponse(
url, &mime_type, &charset, data, headers.get());
if (result != net::OK)
return result;
info->headers = headers;
info->mime_type.swap(mime_type);
info->charset.swap(charset);
info->content_length = data->length();
info->encoded_data_length = 0;
info->encoded_body_length = 0;
return net::OK;
}
// Convert a net::SignedCertificateTimestampAndStatus object to a
// blink::WebURLResponse::SignedCertificateTimestamp object.
blink::WebURLResponse::SignedCertificateTimestamp NetSCTToBlinkSCT(
const net::SignedCertificateTimestampAndStatus& sct_and_status) {
return blink::WebURLResponse::SignedCertificateTimestamp(
WebString::FromASCII(net::ct::StatusToString(sct_and_status.status)),
WebString::FromASCII(net::ct::OriginToString(sct_and_status.sct->origin)),
WebString::FromUTF8(sct_and_status.sct->log_description),
WebString::FromASCII(
base::HexEncode(sct_and_status.sct->log_id.c_str(),
sct_and_status.sct->log_id.length())),
sct_and_status.sct->timestamp.ToJavaTime(),
WebString::FromASCII(net::ct::HashAlgorithmToString(
sct_and_status.sct->signature.hash_algorithm)),
WebString::FromASCII(net::ct::SignatureAlgorithmToString(
sct_and_status.sct->signature.signature_algorithm)),
WebString::FromASCII(base::HexEncode(
sct_and_status.sct->signature.signature_data.c_str(),
sct_and_status.sct->signature.signature_data.length())));
}
void SetSecurityStyleAndDetails(const GURL& url,
const ResourceResponseInfo& info,
WebURLResponse* response,
bool report_security_info) {
if (!report_security_info) {
response->SetSecurityStyle(blink::kWebSecurityStyleUnknown);
return;
}
if (!url.SchemeIsCryptographic()) {
response->SetSecurityStyle(blink::kWebSecurityStyleNeutral);
return;
}
// The resource loader does not provide a guarantee that requests always have
// security info (such as a certificate) attached. Use WebSecurityStyleUnknown
// in this case where there isn't enough information to be useful.
if (info.certificate.empty()) {
response->SetSecurityStyle(blink::kWebSecurityStyleUnknown);
return;
}
int ssl_version =
net::SSLConnectionStatusToVersion(info.ssl_connection_status);
const char* protocol;
net::SSLVersionToString(&protocol, ssl_version);
const char* key_exchange;
const char* cipher;
const char* mac;
bool is_aead;
bool is_tls13;
uint16_t cipher_suite =
net::SSLConnectionStatusToCipherSuite(info.ssl_connection_status);
net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead,
&is_tls13, cipher_suite);
if (key_exchange == nullptr) {
DCHECK(is_tls13);
key_exchange = "";
}
if (mac == nullptr) {
DCHECK(is_aead);
mac = "";
}
const char* key_exchange_group = "";
if (info.ssl_key_exchange_group != 0) {
// Historically the field was named 'curve' rather than 'group'.
key_exchange_group = SSL_get_curve_name(info.ssl_key_exchange_group);
if (!key_exchange_group) {
NOTREACHED();
key_exchange_group = "";
}
}
response->SetSecurityStyle(
GetSecurityStyleForResource(url, info.cert_status));
blink::WebURLResponse::SignedCertificateTimestampList sct_list(
info.signed_certificate_timestamps.size());
for (size_t i = 0; i < sct_list.size(); ++i)
sct_list[i] = NetSCTToBlinkSCT(info.signed_certificate_timestamps[i]);
std::string subject, issuer;
base::Time valid_start, valid_expiry;
std::vector<std::string> san;
bool rv = net::x509_util::ParseCertificateSandboxed(
info.certificate[0], &subject, &issuer, &valid_start, &valid_expiry, &san,
&san);
if (!rv) {
NOTREACHED();
response->SetSecurityStyle(blink::kWebSecurityStyleUnknown);
return;
}
blink::WebVector<blink::WebString> web_san(san.size());
std::transform(
san.begin(), san.end(), web_san.begin(),
[](const std::string& h) { return blink::WebString::FromLatin1(h); });
blink::WebVector<blink::WebString> web_cert(info.certificate.size());
std::transform(
info.certificate.begin(), info.certificate.end(), web_cert.begin(),
[](const std::string& h) { return blink::WebString::FromLatin1(h); });
blink::WebURLResponse::WebSecurityDetails webSecurityDetails(
WebString::FromASCII(protocol), WebString::FromASCII(key_exchange),
WebString::FromASCII(key_exchange_group), WebString::FromASCII(cipher),
WebString::FromASCII(mac), WebString::FromUTF8(subject), web_san,
WebString::FromUTF8(issuer), valid_start.ToDoubleT(),
valid_expiry.ToDoubleT(), web_cert, sct_list);
response->SetSecurityDetails(webSecurityDetails);
}
} // namespace
StreamOverrideParameters::StreamOverrideParameters() {}
StreamOverrideParameters::~StreamOverrideParameters() {
if (on_delete)
std::move(on_delete).Run(stream_url);
}
// This inner class exists since the WebURLLoader may be deleted while inside a
// call to WebURLLoaderClient. Refcounting is to keep the context from being
// deleted if it may have work to do after calling into the client.
class WebURLLoaderImpl::Context : public base::RefCounted<Context> {
public:
using ReceivedData = RequestPeer::ReceivedData;
Context(WebURLLoaderImpl* loader,
ResourceDispatcher* resource_dispatcher,
scoped_refptr<base::SingleThreadTaskRunner> task_runner,
mojom::URLLoaderFactory* factory);
WebURLLoaderClient* client() const { return client_; }
void set_client(WebURLLoaderClient* client) { client_ = client; }
void Cancel();
void SetDefersLoading(bool value);
void DidChangePriority(WebURLRequest::Priority new_priority,
int intra_priority_value);
void Start(const WebURLRequest& request,
SyncLoadResponse* sync_load_response);
void OnUploadProgress(uint64_t position, uint64_t size);
bool OnReceivedRedirect(const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info);
void OnReceivedResponse(const ResourceResponseInfo& info);
void OnDownloadedData(int len, int encoded_data_length);
void OnReceivedData(std::unique_ptr<ReceivedData> data);
void OnTransferSizeUpdated(int transfer_size_diff);
void OnReceivedCachedMetadata(const char* data, int len);
void OnCompletedRequest(int error_code,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size);
private:
friend class base::RefCounted<Context>;
~Context();
// Called when the body data stream is detached from the reader side.
void CancelBodyStreaming();
// We can optimize the handling of data URLs in most cases.
bool CanHandleDataURLRequestLocally(const WebURLRequest& request) const;
void HandleDataURL();
WebURLLoaderImpl* loader_;
WebURL url_;
bool use_stream_on_response_;
// Controls SetSecurityStyleAndDetails() in PopulateURLResponse(). Initially
// set to WebURLRequest::ReportRawHeaders() in Start() and gets updated in
// WillFollowRedirect() (by the InspectorNetworkAgent) while the new
// ReportRawHeaders() value won't be propagated to the browser process.
//
// TODO(tyoshino): Investigate whether it's worth propagating the new value.
bool report_raw_headers_;
WebURLLoaderClient* client_;
ResourceDispatcher* resource_dispatcher_;
scoped_refptr<base::SingleThreadTaskRunner> task_runner_;
std::unique_ptr<FtpDirectoryListingResponseDelegate> ftp_listing_delegate_;
std::unique_ptr<StreamOverrideParameters> stream_override_;
std::unique_ptr<SharedMemoryDataConsumerHandle::Writer> body_stream_writer_;
enum DeferState {NOT_DEFERRING, SHOULD_DEFER, DEFERRED_DATA};
DeferState defers_loading_;
int request_id_;
// These are owned by the Blink::Platform singleton.
mojom::URLLoaderFactory* url_loader_factory_;
};
// A thin wrapper class for Context to ensure its lifetime while it is
// handling IPC messages coming from ResourceDispatcher. Owns one ref to
// Context and held by ResourceDispatcher.
class WebURLLoaderImpl::RequestPeerImpl : public RequestPeer {
public:
explicit RequestPeerImpl(Context* context);
// RequestPeer methods:
void OnUploadProgress(uint64_t position, uint64_t size) override;
bool OnReceivedRedirect(const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info) override;
void OnReceivedResponse(const ResourceResponseInfo& info) override;
void OnDownloadedData(int len, int encoded_data_length) override;
void OnReceivedData(std::unique_ptr<ReceivedData> data) override;
void OnTransferSizeUpdated(int transfer_size_diff) override;
void OnReceivedCachedMetadata(const char* data, int len) override;
void OnCompletedRequest(int error_code,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size) override;
private:
scoped_refptr<Context> context_;
DISALLOW_COPY_AND_ASSIGN(RequestPeerImpl);
};
// WebURLLoaderImpl::Context --------------------------------------------------
WebURLLoaderImpl::Context::Context(
WebURLLoaderImpl* loader,
ResourceDispatcher* resource_dispatcher,
scoped_refptr<base::SingleThreadTaskRunner> task_runner,
mojom::URLLoaderFactory* url_loader_factory)
: loader_(loader),
use_stream_on_response_(false),
report_raw_headers_(false),
client_(NULL),
resource_dispatcher_(resource_dispatcher),
task_runner_(std::move(task_runner)),
defers_loading_(NOT_DEFERRING),
request_id_(-1),
url_loader_factory_(url_loader_factory) {
#if DCHECK_IS_ON()
const bool mojo_loading_enabled =
base::FeatureList::IsEnabled(features::kLoadingWithMojo);
DCHECK(url_loader_factory_ || !mojo_loading_enabled);
#endif
}
void WebURLLoaderImpl::Context::Cancel() {
TRACE_EVENT_WITH_FLOW0("loading", "WebURLLoaderImpl::Context::Cancel", this,
TRACE_EVENT_FLAG_FLOW_IN);
if (resource_dispatcher_ && // NULL in unittest.
request_id_ != -1) {
resource_dispatcher_->Cancel(request_id_);
request_id_ = -1;
}
if (body_stream_writer_)
body_stream_writer_->Fail();
// Ensure that we do not notify the delegate anymore as it has
// its own pointer to the client.
if (ftp_listing_delegate_)
ftp_listing_delegate_->Cancel();
// Do not make any further calls to the client.
client_ = NULL;
loader_ = NULL;
}
void WebURLLoaderImpl::Context::SetDefersLoading(bool value) {
if (request_id_ != -1)
resource_dispatcher_->SetDefersLoading(request_id_, value);
if (value && defers_loading_ == NOT_DEFERRING) {
defers_loading_ = SHOULD_DEFER;
} else if (!value && defers_loading_ != NOT_DEFERRING) {
if (defers_loading_ == DEFERRED_DATA) {
task_runner_->PostTask(FROM_HERE,
base::Bind(&Context::HandleDataURL, this));
}
defers_loading_ = NOT_DEFERRING;
}
}
void WebURLLoaderImpl::Context::DidChangePriority(
WebURLRequest::Priority new_priority, int intra_priority_value) {
if (request_id_ != -1) {
resource_dispatcher_->DidChangePriority(
request_id_,
ConvertWebKitPriorityToNetPriority(new_priority),
intra_priority_value);
}
}
void WebURLLoaderImpl::Context::Start(const WebURLRequest& request,
SyncLoadResponse* sync_load_response) {
DCHECK(request_id_ == -1);
url_ = request.Url();
use_stream_on_response_ = request.UseStreamOnResponse();
report_raw_headers_ = request.ReportRawHeaders();
if (CanHandleDataURLRequestLocally(request)) {
if (sync_load_response) {
// This is a sync load. Do the work now.
sync_load_response->url = url_;
sync_load_response->error_code =
GetInfoFromDataURL(sync_load_response->url, sync_load_response,
&sync_load_response->data);
} else {
task_runner_->PostTask(FROM_HERE,
base::Bind(&Context::HandleDataURL, this));
}
return;
}
if (request.GetExtraData()) {
RequestExtraData* extra_data =
static_cast<RequestExtraData*>(request.GetExtraData());
stream_override_ = extra_data->TakeStreamOverrideOwnership();
}
// PlzNavigate: outside of tests, the only navigation requests going through
// the WebURLLoader are the ones created by CommitNavigation. Several browser
// tests load HTML directly through a data url which will be handled by the
// block above.
DCHECK(!IsBrowserSideNavigationEnabled() || stream_override_ ||
request.GetFrameType() == WebURLRequest::kFrameTypeNone);
GURL referrer_url(
request.HttpHeaderField(WebString::FromASCII("Referer")).Latin1());
const std::string& method = request.HttpMethod().Latin1();
// TODO(brettw) this should take parameter encoding into account when
// creating the GURLs.
// TODO(horo): Check credentials flag is unset when credentials mode is omit.
// Check credentials flag is set when credentials mode is include.
std::unique_ptr<ResourceRequest> resource_request(new ResourceRequest);
resource_request->method = method;
resource_request->url = url_;
resource_request->first_party_for_cookies = request.FirstPartyForCookies();
resource_request->request_initiator =
request.RequestorOrigin().IsNull()
? base::Optional<url::Origin>()
: base::Optional<url::Origin>(request.RequestorOrigin());
resource_request->referrer = referrer_url;
resource_request->referrer_policy = request.GetReferrerPolicy();
resource_request->headers = GetWebURLRequestHeaders(request);
resource_request->load_flags = GetLoadFlagsForWebURLRequest(request);
// origin_pid only needs to be non-zero if the request originates outside
// the render process, so we can use requestorProcessID even for requests
// from in-process plugins.
resource_request->origin_pid = request.RequestorProcessID();
resource_request->resource_type = WebURLRequestToResourceType(request);
resource_request->priority =
ConvertWebKitPriorityToNetPriority(request.GetPriority());
resource_request->appcache_host_id = request.AppCacheHostID();
resource_request->should_reset_appcache = request.ShouldResetAppCache();
resource_request->service_worker_mode =
GetServiceWorkerModeForWebURLRequest(request);
resource_request->fetch_request_mode =
GetFetchRequestModeForWebURLRequest(request);
resource_request->fetch_credentials_mode =
GetFetchCredentialsModeForWebURLRequest(request);
resource_request->fetch_redirect_mode =
GetFetchRedirectModeForWebURLRequest(request);
resource_request->fetch_integrity =
GetFetchIntegrityForWebURLRequest(request);
resource_request->fetch_request_context_type =
GetRequestContextTypeForWebURLRequest(request);
resource_request->fetch_mixed_content_context_type =
GetMixedContentContextTypeForWebURLRequest(request);
resource_request->fetch_frame_type =
GetRequestContextFrameTypeForWebURLRequest(request);
resource_request->request_body =
GetRequestBodyForWebURLRequest(request).get();
resource_request->download_to_file = request.DownloadToFile();
resource_request->has_user_gesture = request.HasUserGesture();
resource_request->enable_load_timing = true;
resource_request->enable_upload_progress = request.ReportUploadProgress();
GURL gurl(url_);
if (request.GetRequestContext() ==
WebURLRequest::kRequestContextXMLHttpRequest &&
(gurl.has_username() || gurl.has_password())) {
resource_request->do_not_prompt_for_login = true;
}
resource_request->report_raw_headers = request.ReportRawHeaders();
resource_request->previews_state =
static_cast<PreviewsState>(request.GetPreviewsState());
// PlzNavigate: during navigation, the renderer should request a stream which
// contains the body of the response. The network request has already been
// made by the browser.
mojo::ScopedDataPipeConsumerHandle consumer_handle;
if (stream_override_) {
CHECK(IsBrowserSideNavigationEnabled());
DCHECK(!sync_load_response);
DCHECK_NE(WebURLRequest::kFrameTypeNone, request.GetFrameType());
if (stream_override_->consumer_handle.is_valid()) {
consumer_handle = std::move(stream_override_->consumer_handle);
} else {
resource_request->resource_body_stream_url = stream_override_->stream_url;
}
}
RequestExtraData empty_extra_data;
RequestExtraData* extra_data;
if (request.GetExtraData())
extra_data = static_cast<RequestExtraData*>(request.GetExtraData());
else
extra_data = &empty_extra_data;
extra_data->CopyToResourceRequest(resource_request.get());
if (sync_load_response) {
DCHECK(defers_loading_ == NOT_DEFERRING);
resource_dispatcher_->StartSync(
std::move(resource_request), request.RequestorID(), sync_load_response,
request.GetLoadingIPCType(), url_loader_factory_,
extra_data->TakeURLLoaderThrottles());
return;
}
TRACE_EVENT_WITH_FLOW0("loading", "WebURLLoaderImpl::Context::Start", this,
TRACE_EVENT_FLAG_FLOW_OUT);
request_id_ = resource_dispatcher_->StartAsync(
std::move(resource_request), request.RequestorID(), task_runner_,
extra_data->frame_origin(),
base::MakeUnique<WebURLLoaderImpl::RequestPeerImpl>(this),
request.GetLoadingIPCType(), url_loader_factory_,
extra_data->TakeURLLoaderThrottles(), std::move(consumer_handle));
if (defers_loading_ != NOT_DEFERRING)
resource_dispatcher_->SetDefersLoading(request_id_, true);
}
void WebURLLoaderImpl::Context::OnUploadProgress(uint64_t position,
uint64_t size) {
if (client_)
client_->DidSendData(position, size);
}
bool WebURLLoaderImpl::Context::OnReceivedRedirect(
const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info) {
if (!client_)
return false;
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedRedirect",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
WebURLResponse response;
PopulateURLResponse(url_, info, &response, report_raw_headers_);
url_ = WebURL(redirect_info.new_url);
return client_->WillFollowRedirect(
url_, redirect_info.new_first_party_for_cookies,
WebString::FromUTF8(redirect_info.new_referrer),
NetReferrerPolicyToBlinkReferrerPolicy(redirect_info.new_referrer_policy),
WebString::FromUTF8(redirect_info.new_method), response,
report_raw_headers_);
}
void WebURLLoaderImpl::Context::OnReceivedResponse(
const ResourceResponseInfo& initial_info) {
if (!client_)
return;
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedResponse",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
ResourceResponseInfo info = initial_info;
// PlzNavigate: during navigations, the ResourceResponse has already been
// received on the browser side, and has been passed down to the renderer.
if (stream_override_) {
CHECK(IsBrowserSideNavigationEnabled());
// Compute the delta between the response sizes so that the accurate
// transfer size can be reported at the end of the request.
stream_override_->total_transfer_size_delta =
stream_override_->response.encoded_data_length -
initial_info.encoded_data_length;
info = stream_override_->response;
// Replay the redirects that happened during navigation.
DCHECK_EQ(stream_override_->redirect_responses.size(),
stream_override_->redirect_infos.size());
for (size_t i = 0; i < stream_override_->redirect_responses.size(); ++i) {
bool result = OnReceivedRedirect(stream_override_->redirect_infos[i],
stream_override_->redirect_responses[i]);
if (!result)
return;
}
}
WebURLResponse response;
PopulateURLResponse(url_, info, &response, report_raw_headers_);
bool show_raw_listing = false;
if (info.mime_type == "text/vnd.chromium.ftp-dir") {
if (GURL(url_).query_piece() == "raw") {
// Set the MIME type to plain text to prevent any active content.
response.SetMIMEType("text/plain");
show_raw_listing = true;
} else {
// We're going to produce a parsed listing in HTML.
response.SetMIMEType("text/html");
}
}
if (info.headers.get() && info.mime_type == "multipart/x-mixed-replace") {
std::string content_type;
info.headers->EnumerateHeader(NULL, "content-type", &content_type);
std::string mime_type;
std::string charset;
bool had_charset = false;
std::string boundary;
net::HttpUtil::ParseContentType(content_type, &mime_type, &charset,
&had_charset, &boundary);
base::TrimString(boundary, " \"", &boundary);
response.SetMultipartBoundary(boundary.data(), boundary.size());
}
if (use_stream_on_response_) {
SharedMemoryDataConsumerHandle::BackpressureMode mode =
SharedMemoryDataConsumerHandle::kDoNotApplyBackpressure;
if (info.headers &&
info.headers->HasHeaderValue("Cache-Control", "no-store")) {
mode = SharedMemoryDataConsumerHandle::kApplyBackpressure;
}
auto read_handle = base::MakeUnique<SharedMemoryDataConsumerHandle>(
mode, base::Bind(&Context::CancelBodyStreaming, this),
&body_stream_writer_);
// Here |body_stream_writer_| has an indirect reference to |this| and that
// creates a reference cycle, but it is not a problem because the cycle
// will break if one of the following happens:
// 1) The body data transfer is done (with or without an error).
// 2) |read_handle| (and its reader) is detached.
client_->DidReceiveResponse(response, std::move(read_handle));
// TODO(yhirano): Support ftp listening and multipart
return;
}
client_->DidReceiveResponse(response);
// DidReceiveResponse() may have triggered a cancel, causing the |client_| to
// go away.
if (!client_)
return;
DCHECK(!ftp_listing_delegate_);
if (info.mime_type == "text/vnd.chromium.ftp-dir" && !show_raw_listing) {
ftp_listing_delegate_ =
base::MakeUnique<FtpDirectoryListingResponseDelegate>(client_, loader_,
response);
}
}
void WebURLLoaderImpl::Context::OnDownloadedData(int len,
int encoded_data_length) {
if (client_)
client_->DidDownloadData(len, encoded_data_length);
}
void WebURLLoaderImpl::Context::OnReceivedData(
std::unique_ptr<ReceivedData> data) {
const char* payload = data->payload();
int data_length = data->length();
if (!client_)
return;
if (stream_override_ && stream_override_->stream_url.is_empty()) {
// Since ResourceDispatcher::ContinueForNavigation called OnComplete
// immediately, it didn't have the size of the resource immediately. So as
// data is read off the data pipe, keep track of how much we're reading.
stream_override_->total_transferred += data_length;
}
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedData",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
if (ftp_listing_delegate_) {
// The FTP listing delegate will make the appropriate calls to
// client_->didReceiveData and client_->didReceiveResponse.
ftp_listing_delegate_->OnReceivedData(payload, data_length);
return;
}
// We dispatch the data even when |useStreamOnResponse()| is set, in order
// to make Devtools work.
client_->DidReceiveData(payload, data_length);
if (use_stream_on_response_) {
// We don't support |ftp_listing_delegate_| for now.
// TODO(yhirano): Support ftp listening.
body_stream_writer_->AddData(std::move(data));
}
}
void WebURLLoaderImpl::Context::OnTransferSizeUpdated(int transfer_size_diff) {
client_->DidReceiveTransferSizeUpdate(transfer_size_diff);
}
void WebURLLoaderImpl::Context::OnReceivedCachedMetadata(
const char* data, int len) {
if (!client_)
return;
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedCachedMetadata",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
client_->DidReceiveCachedMetadata(data, len);
}
void WebURLLoaderImpl::Context::OnCompletedRequest(
int error_code,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size) {
if (stream_override_ && stream_override_->stream_url.is_empty()) {
// TODO(kinuko|scottmg|jam): This is wrong. https://crbug.com/705744.
total_transfer_size = stream_override_->total_transferred;
encoded_body_size = stream_override_->total_transferred;
}
if (ftp_listing_delegate_) {
ftp_listing_delegate_->OnCompletedRequest();
ftp_listing_delegate_.reset(NULL);
}
if (body_stream_writer_ && error_code != net::OK)
body_stream_writer_->Fail();
body_stream_writer_.reset();
if (client_) {
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnCompletedRequest",
this, TRACE_EVENT_FLAG_FLOW_IN);
if (error_code != net::OK) {
WebURLError error(url_, stale_copy_in_cache, error_code);
client_->DidFail(error, total_transfer_size, encoded_body_size,
decoded_body_size);
} else {
// PlzNavigate: compute the accurate transfer size for navigations.
if (stream_override_) {
DCHECK(IsBrowserSideNavigationEnabled());
total_transfer_size += stream_override_->total_transfer_size_delta;
}
client_->DidFinishLoading((completion_time - TimeTicks()).InSecondsF(),
total_transfer_size, encoded_body_size,
decoded_body_size);
}
}
}
WebURLLoaderImpl::Context::~Context() {
// We must be already cancelled at this point.
DCHECK_LT(request_id_, 0);
}
void WebURLLoaderImpl::Context::CancelBodyStreaming() {
scoped_refptr<Context> protect(this);
// Notify renderer clients that the request is canceled.
if (ftp_listing_delegate_) {
ftp_listing_delegate_->OnCompletedRequest();
ftp_listing_delegate_.reset(NULL);
}
if (body_stream_writer_) {
body_stream_writer_->Fail();
body_stream_writer_.reset();
}
if (client_) {
// TODO(yhirano): Set |stale_copy_in_cache| appropriately if possible.
client_->DidFail(WebURLError(url_, false, net::ERR_ABORTED),
WebURLLoaderClient::kUnknownEncodedDataLength, 0, 0);
}
// Notify the browser process that the request is canceled.
Cancel();
}
bool WebURLLoaderImpl::Context::CanHandleDataURLRequestLocally(
const WebURLRequest& request) const {
if (!request.Url().ProtocolIs(url::kDataScheme))
return false;
// The fast paths for data URL, Start() and HandleDataURL(), don't support
// the downloadToFile option.
if (request.DownloadToFile())
return false;
// Data url requests from object tags may need to be intercepted as streams
// and so need to be sent to the browser.
if (request.GetRequestContext() == WebURLRequest::kRequestContextObject)
return false;
// Optimize for the case where we can handle a data URL locally. We must
// skip this for data URLs targetted at frames since those could trigger a
// download.
//
// NOTE: We special case MIME types we can render both for performance
// reasons as well as to support unit tests.
#if defined(OS_ANDROID)
// For compatibility reasons on Android we need to expose top-level data://
// to the browser. In tests resource_dispatcher_ can be null, and test pages
// need to be loaded locally.
// For PlzNavigate, navigation requests were already checked in the browser.
if (resource_dispatcher_ &&
request.GetFrameType() == WebURLRequest::kFrameTypeTopLevel) {
if (!IsBrowserSideNavigationEnabled())
return false;
}
#endif
if (request.GetFrameType() != WebURLRequest::kFrameTypeTopLevel &&
request.GetFrameType() != WebURLRequest::kFrameTypeNested)
return true;
std::string mime_type, unused_charset;
if (net::DataURL::Parse(request.Url(), &mime_type, &unused_charset, NULL) &&
blink::IsSupportedMimeType(mime_type))
return true;
return false;
}
void WebURLLoaderImpl::Context::HandleDataURL() {
DCHECK_NE(defers_loading_, DEFERRED_DATA);
if (defers_loading_ == SHOULD_DEFER) {
defers_loading_ = DEFERRED_DATA;
return;
}
ResourceResponseInfo info;
std::string data;
int error_code = GetInfoFromDataURL(url_, &info, &data);
if (error_code == net::OK) {
OnReceivedResponse(info);
auto size = data.size();
if (size != 0)
OnReceivedData(base::MakeUnique<FixedReceivedData>(data.data(), size));
}
OnCompletedRequest(error_code, false, base::TimeTicks::Now(), 0, data.size(),
data.size());
}
// WebURLLoaderImpl::RequestPeerImpl ------------------------------------------
WebURLLoaderImpl::RequestPeerImpl::RequestPeerImpl(Context* context)
: context_(context) {}
void WebURLLoaderImpl::RequestPeerImpl::OnUploadProgress(uint64_t position,
uint64_t size) {
context_->OnUploadProgress(position, size);
}
bool WebURLLoaderImpl::RequestPeerImpl::OnReceivedRedirect(
const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info) {
return context_->OnReceivedRedirect(redirect_info, info);
}
void WebURLLoaderImpl::RequestPeerImpl::OnReceivedResponse(
const ResourceResponseInfo& info) {
context_->OnReceivedResponse(info);
}
void WebURLLoaderImpl::RequestPeerImpl::OnDownloadedData(
int len,
int encoded_data_length) {
context_->OnDownloadedData(len, encoded_data_length);
}
void WebURLLoaderImpl::RequestPeerImpl::OnReceivedData(
std::unique_ptr<ReceivedData> data) {
context_->OnReceivedData(std::move(data));
}
void WebURLLoaderImpl::RequestPeerImpl::OnTransferSizeUpdated(
int transfer_size_diff) {
context_->OnTransferSizeUpdated(transfer_size_diff);
}
void WebURLLoaderImpl::RequestPeerImpl::OnReceivedCachedMetadata(
const char* data,
int len) {
context_->OnReceivedCachedMetadata(data, len);
}
void WebURLLoaderImpl::RequestPeerImpl::OnCompletedRequest(
int error_code,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size) {
context_->OnCompletedRequest(error_code, stale_copy_in_cache, completion_time,
total_transfer_size, encoded_body_size,
decoded_body_size);
}
// WebURLLoaderImpl -----------------------------------------------------------
WebURLLoaderImpl::WebURLLoaderImpl(
ResourceDispatcher* resource_dispatcher,
scoped_refptr<base::SingleThreadTaskRunner> task_runner,
mojom::URLLoaderFactory* url_loader_factory)
: context_(new Context(this,
resource_dispatcher,
std::move(task_runner),
url_loader_factory)) {}
WebURLLoaderImpl::~WebURLLoaderImpl() {
Cancel();
}
void WebURLLoaderImpl::PopulateURLResponse(const WebURL& url,
const ResourceResponseInfo& info,
WebURLResponse* response,
bool report_security_info) {
response->SetURL(url);
response->SetResponseTime(info.response_time);
response->SetMIMEType(WebString::FromUTF8(info.mime_type));
response->SetTextEncodingName(WebString::FromUTF8(info.charset));
response->SetExpectedContentLength(info.content_length);
response->SetHasMajorCertificateErrors(info.has_major_certificate_errors);
response->SetAppCacheID(info.appcache_id);
response->SetAppCacheManifestURL(info.appcache_manifest_url);
response->SetWasCached(!info.load_timing.request_start_time.is_null() &&
info.response_time <
info.load_timing.request_start_time);
response->SetRemoteIPAddress(
WebString::FromUTF8(info.socket_address.HostForURL()));
response->SetRemotePort(info.socket_address.port());
response->SetConnectionID(info.load_timing.socket_log_id);
response->SetConnectionReused(info.load_timing.socket_reused);
response->SetDownloadFilePath(
blink::FilePathToWebString(info.download_file_path));
response->SetWasFetchedViaSPDY(info.was_fetched_via_spdy);
response->SetWasFetchedViaServiceWorker(info.was_fetched_via_service_worker);
response->SetWasFetchedViaForeignFetch(info.was_fetched_via_foreign_fetch);
response->SetWasFallbackRequiredByServiceWorker(
info.was_fallback_required_by_service_worker);
response->SetResponseTypeViaServiceWorker(
info.response_type_via_service_worker);
response->SetURLListViaServiceWorker(info.url_list_via_service_worker);
response->SetCacheStorageCacheName(
info.is_in_cache_storage
? blink::WebString::FromUTF8(info.cache_storage_cache_name)
: blink::WebString());
blink::WebVector<blink::WebString> cors_exposed_header_names(
info.cors_exposed_header_names.size());
std::transform(
info.cors_exposed_header_names.begin(),
info.cors_exposed_header_names.end(), cors_exposed_header_names.begin(),
[](const std::string& h) { return blink::WebString::FromLatin1(h); });
response->SetCorsExposedHeaderNames(cors_exposed_header_names);
response->SetDidServiceWorkerNavigationPreload(
info.did_service_worker_navigation_preload);
response->SetEncodedDataLength(info.encoded_data_length);
response->SetAlpnNegotiatedProtocol(
WebString::FromUTF8(info.alpn_negotiated_protocol));
response->SetConnectionInfo(info.connection_info);
SetSecurityStyleAndDetails(url, info, response, report_security_info);
WebURLResponseExtraDataImpl* extra_data = new WebURLResponseExtraDataImpl();
response->SetExtraData(extra_data);
extra_data->set_was_fetched_via_spdy(info.was_fetched_via_spdy);
extra_data->set_was_alpn_negotiated(info.was_alpn_negotiated);
extra_data->set_was_alternate_protocol_available(
info.was_alternate_protocol_available);
extra_data->set_previews_state(info.previews_state);
extra_data->set_effective_connection_type(info.effective_connection_type);
// If there's no received headers end time, don't set load timing. This is
// the case for non-HTTP requests, requests that don't go over the wire, and
// certain error cases.
if (!info.load_timing.receive_headers_end.is_null()) {
WebURLLoadTiming timing;
PopulateURLLoadTiming(info.load_timing, &timing);
const TimeTicks kNullTicks;
timing.SetWorkerStart(
(info.service_worker_start_time - kNullTicks).InSecondsF());
timing.SetWorkerReady(
(info.service_worker_ready_time - kNullTicks).InSecondsF());
response->SetLoadTiming(timing);
}
if (info.devtools_info.get()) {
WebHTTPLoadInfo load_info;
load_info.SetHTTPStatusCode(info.devtools_info->http_status_code);
load_info.SetHTTPStatusText(
WebString::FromLatin1(info.devtools_info->http_status_text));
load_info.SetRequestHeadersText(
WebString::FromLatin1(info.devtools_info->request_headers_text));
load_info.SetResponseHeadersText(
WebString::FromLatin1(info.devtools_info->response_headers_text));
const HeadersVector& request_headers = info.devtools_info->request_headers;
for (HeadersVector::const_iterator it = request_headers.begin();
it != request_headers.end(); ++it) {
load_info.AddRequestHeader(WebString::FromLatin1(it->first),
WebString::FromLatin1(it->second));
}
const HeadersVector& response_headers =
info.devtools_info->response_headers;
for (HeadersVector::const_iterator it = response_headers.begin();
it != response_headers.end(); ++it) {
load_info.AddResponseHeader(WebString::FromLatin1(it->first),
WebString::FromLatin1(it->second));
}
load_info.SetNPNNegotiatedProtocol(
WebString::FromLatin1(info.alpn_negotiated_protocol));
response->SetHTTPLoadInfo(load_info);
}
const net::HttpResponseHeaders* headers = info.headers.get();
if (!headers)
return;
WebURLResponse::HTTPVersion version = WebURLResponse::kHTTPVersionUnknown;
if (headers->GetHttpVersion() == net::HttpVersion(0, 9))
version = WebURLResponse::kHTTPVersion_0_9;
else if (headers->GetHttpVersion() == net::HttpVersion(1, 0))
version = WebURLResponse::kHTTPVersion_1_0;
else if (headers->GetHttpVersion() == net::HttpVersion(1, 1))
version = WebURLResponse::kHTTPVersion_1_1;
else if (headers->GetHttpVersion() == net::HttpVersion(2, 0))
version = WebURLResponse::kHTTPVersion_2_0;
response->SetHTTPVersion(version);
response->SetHTTPStatusCode(headers->response_code());
response->SetHTTPStatusText(WebString::FromLatin1(headers->GetStatusText()));
// Build up the header map.
size_t iter = 0;
std::string name;
std::string value;
while (headers->EnumerateHeaderLines(&iter, &name, &value)) {
response->AddHTTPHeaderField(WebString::FromLatin1(name),
WebString::FromLatin1(value));
}
}
void WebURLLoaderImpl::LoadSynchronously(const WebURLRequest& request,
WebURLResponse& response,
WebURLError& error,
WebData& data,
int64_t& encoded_data_length,
int64_t& encoded_body_length) {
TRACE_EVENT0("loading", "WebURLLoaderImpl::loadSynchronously");
SyncLoadResponse sync_load_response;
context_->Start(request, &sync_load_response);
const GURL& final_url = sync_load_response.url;
// TODO(tc): For file loads, we may want to include a more descriptive
// status code or status text.
int error_code = sync_load_response.error_code;
if (error_code != net::OK) {
error = WebURLError(final_url, false, error_code);
if (error_code == net::ERR_ABORTED) {
// SyncResourceHandler returns ERR_ABORTED for CORS redirect errors,
// so we treat the error as a web security violation.
error.is_web_security_violation = true;
}
return;
}
PopulateURLResponse(final_url, sync_load_response, &response,
request.ReportRawHeaders());
encoded_data_length = sync_load_response.encoded_data_length;
encoded_body_length = sync_load_response.encoded_body_length;
data.Assign(sync_load_response.data.data(), sync_load_response.data.size());
}
void WebURLLoaderImpl::LoadAsynchronously(const WebURLRequest& request,
WebURLLoaderClient* client) {
TRACE_EVENT_WITH_FLOW0("loading", "WebURLLoaderImpl::loadAsynchronously",
this, TRACE_EVENT_FLAG_FLOW_OUT);
DCHECK(!context_->client());
context_->set_client(client);
context_->Start(request, NULL);
}
void WebURLLoaderImpl::Cancel() {
context_->Cancel();
}
void WebURLLoaderImpl::SetDefersLoading(bool value) {
context_->SetDefersLoading(value);
}
void WebURLLoaderImpl::DidChangePriority(WebURLRequest::Priority new_priority,
int intra_priority_value) {
context_->DidChangePriority(new_priority, intra_priority_value);
}
} // namespace content