diff options
author | jcampan@chromium.org <jcampan@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-12-20 01:18:59 +0000 |
---|---|---|
committer | jcampan@chromium.org <jcampan@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-12-20 01:18:59 +0000 |
commit | fe54944f6080ed9f48619899ad342924754b19a9 (patch) | |
tree | 7959716d0543c6699cd254af29ba963b48fecd69 /chrome/browser/renderer_host | |
parent | 6995f1dfc7d50b1296221b3875d79d31a978eb6a (diff) | |
download | chromium_src-fe54944f6080ed9f48619899ad342924754b19a9.zip chromium_src-fe54944f6080ed9f48619899ad342924754b19a9.tar.gz chromium_src-fe54944f6080ed9f48619899ad342924754b19a9.tar.bz2 |
This CL moves the different resource handlers from resource_dispatcher_host.cc into their own files, into a new renderer_host directory.
Their is no functionality change in this CL.
The motivation for doing that was:
- resource_dispatcher_host.cc has become very long and more than 1/3 of the code is for the resource handler.
- having the resource handler in their own file allows having unit tests for them.
BUG=none
TEST=run all unit tests and UI tests.
Review URL: http://codereview.chromium.org/14487
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@7336 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/renderer_host')
21 files changed, 3998 insertions, 0 deletions
diff --git a/chrome/browser/renderer_host/async_resource_handler.cc b/chrome/browser/renderer_host/async_resource_handler.cc new file mode 100644 index 0000000..2708a22 --- /dev/null +++ b/chrome/browser/renderer_host/async_resource_handler.cc @@ -0,0 +1,109 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/async_resource_handler.h" + +base::SharedMemory* AsyncResourceHandler::spare_read_buffer_; + +AsyncResourceHandler::AsyncResourceHandler( + ResourceDispatcherHost::Receiver* receiver, + int render_process_host_id, + int routing_id, + HANDLE render_process, + const GURL& url, + ResourceDispatcherHost* resource_dispatcher_host) + : receiver_(receiver), + render_process_host_id_(render_process_host_id), + routing_id_(routing_id), + render_process_(render_process), + rdh_(resource_dispatcher_host) { +} + +bool AsyncResourceHandler::OnUploadProgress(int request_id, + uint64 position, + uint64 size) { + return receiver_->Send(new ViewMsg_Resource_UploadProgress(routing_id_, + request_id, + position, size)); +} + +bool AsyncResourceHandler::OnRequestRedirected(int request_id, + const GURL& new_url) { + return receiver_->Send(new ViewMsg_Resource_ReceivedRedirect(routing_id_, + request_id, + new_url)); +} + +bool AsyncResourceHandler::OnResponseStarted(int request_id, + ResourceResponse* response) { + receiver_->Send(new ViewMsg_Resource_ReceivedResponse( + routing_id_, request_id, response->response_head)); + return true; +} + +bool AsyncResourceHandler::OnWillRead(int request_id, + char** buf, int* buf_size, + int min_size) { + DCHECK(min_size == -1); + static const int kReadBufSize = 32768; + if (spare_read_buffer_) { + read_buffer_.reset(spare_read_buffer_); + spare_read_buffer_ = NULL; + } else { + read_buffer_.reset(new base::SharedMemory); + if (!read_buffer_->Create(std::wstring(), false, false, kReadBufSize)) + return false; + if (!read_buffer_->Map(kReadBufSize)) + return false; + } + *buf = static_cast<char*>(read_buffer_->memory()); + *buf_size = kReadBufSize; + return true; +} + +bool AsyncResourceHandler::OnReadCompleted(int request_id, int* bytes_read) { + if (!*bytes_read) + return true; + DCHECK(read_buffer_.get()); + + if (!rdh_->WillSendData(render_process_host_id_, request_id)) { + // We should not send this data now, we have too many pending requests. + return true; + } + + base::SharedMemoryHandle handle; + if (!read_buffer_->GiveToProcess(render_process_, &handle)) { + // We wrongfully incremented the pending data count. Fake an ACK message + // to fix this. We can't move this call above the WillSendData because + // it's killing our read_buffer_, and we don't want that when we pause + // the request. + rdh_->OnDataReceivedACK(render_process_host_id_, request_id); + return false; + } + + receiver_->Send(new ViewMsg_Resource_DataReceived( + routing_id_, request_id, handle, *bytes_read)); + + return true; +} + +bool AsyncResourceHandler::OnResponseCompleted(int request_id, + const URLRequestStatus& status) { + receiver_->Send(new ViewMsg_Resource_RequestComplete(routing_id_, + request_id, status)); + + // If we still have a read buffer, then see about caching it for later... + if (spare_read_buffer_) { + read_buffer_.reset(); + } else if (read_buffer_.get() && read_buffer_->memory()) { + spare_read_buffer_ = read_buffer_.release(); + } + return true; +} + +// static +void AsyncResourceHandler::GlobalCleanup() { + delete spare_read_buffer_; + spare_read_buffer_ = NULL; +} diff --git a/chrome/browser/renderer_host/async_resource_handler.h b/chrome/browser/renderer_host/async_resource_handler.h new file mode 100644 index 0000000..5d24b75 --- /dev/null +++ b/chrome/browser/renderer_host/async_resource_handler.h @@ -0,0 +1,50 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_ASYNC_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_ASYNC_RESOURCE_HANDLER_H_ + +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" +#include "chrome/browser/renderer_host/resource_handler.h" + +class base::SharedMemory; + +// Used to complete an asynchronous resource request in response to resource +// load events from the resource dispatcher host. +class AsyncResourceHandler : public ResourceHandler { + public: + AsyncResourceHandler(ResourceDispatcherHost::Receiver* receiver, + int render_process_host_id, + int routing_id, + HANDLE render_process, + const GURL& url, + ResourceDispatcherHost* resource_dispatcher_host); + + // ResourceHandler implementation: + bool OnUploadProgress(int request_id, uint64 position, uint64 size); + bool OnRequestRedirected(int request_id, const GURL& new_url); + bool OnResponseStarted(int request_id, ResourceResponse* response); + bool OnWillRead(int request_id, char** buf, int* buf_size, int min_size); + bool OnReadCompleted(int request_id, int* bytes_read); + bool OnResponseCompleted(int request_id, const URLRequestStatus& status); + + static void GlobalCleanup(); + + private: + // When reading, we don't know if we are going to get EOF (0 bytes read), so + // we typically have a buffer that we allocated but did not use. We keep + // this buffer around for the next read as a small optimization. + static base::SharedMemory* spare_read_buffer_; + + scoped_ptr<base::SharedMemory> read_buffer_; + ResourceDispatcherHost::Receiver* receiver_; + int render_process_host_id_; + int routing_id_; + HANDLE render_process_; + ResourceDispatcherHost* rdh_; + + DISALLOW_COPY_AND_ASSIGN(AsyncResourceHandler); +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_ASYNC_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/buffered_resource_handler.cc b/chrome/browser/renderer_host/buffered_resource_handler.cc new file mode 100644 index 0000000..ae9fa35 --- /dev/null +++ b/chrome/browser/renderer_host/buffered_resource_handler.cc @@ -0,0 +1,231 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/buffered_resource_handler.h" + +#include "net/base/mime_sniffer.h" +#include "chrome/browser/renderer_host/download_throttling_resource_handler.h" +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" + +BufferedResourceHandler::BufferedResourceHandler(ResourceHandler* handler, + ResourceDispatcherHost* host, + URLRequest* request) + : real_handler_(handler), + host_(host), + request_(request), + bytes_read_(0), + sniff_content_(false), + should_buffer_(false), + buffering_(false), + finished_(false) { +} + +bool BufferedResourceHandler::OnUploadProgress(int request_id, + uint64 position, + uint64 size) { + return real_handler_->OnUploadProgress(request_id, position, size); +} + +bool BufferedResourceHandler::OnRequestRedirected(int request_id, + const GURL& new_url) { + return real_handler_->OnRequestRedirected(request_id, new_url); +} + +bool BufferedResourceHandler::OnResponseStarted(int request_id, + ResourceResponse* response) { + response_ = response; + if (!DelayResponse()) + return CompleteResponseStarted(request_id, false); + return true; +} + + +bool BufferedResourceHandler::OnResponseCompleted( + int request_id, const URLRequestStatus& status) { + return real_handler_->OnResponseCompleted(request_id, status); +} + +// We'll let the original event handler provide a buffer, and reuse it for +// subsequent reads until we're done buffering. +bool BufferedResourceHandler::OnWillRead(int request_id, + char** buf, int* buf_size, + int min_size) { + if (buffering_) { + *buf = read_buffer_ + bytes_read_; + *buf_size = read_buffer_size_ - bytes_read_; + DCHECK(*buf_size > 0); + return true; + } + + if (finished_) + return false; + + bool ret = real_handler_->OnWillRead(request_id, buf, buf_size, min_size); + read_buffer_ = *buf; + read_buffer_size_ = *buf_size; + bytes_read_ = 0; + return ret; +} + +bool BufferedResourceHandler::OnReadCompleted(int request_id, int* bytes_read) { + ResourceDispatcherHost::ExtraRequestInfo* info = + ResourceDispatcherHost::ExtraInfoForRequest(request_); + + if (sniff_content_ || should_buffer_) { + if (KeepBuffering(*bytes_read)) + return true; + + LOG(INFO) << "Finished buffering " << request_->url().spec(); + sniff_content_ = should_buffer_ = false; + *bytes_read = bytes_read_; + + // Done buffering, send the pending ResponseStarted event. + if (!CompleteResponseStarted(request_id, true)) + return false; + } + + return real_handler_->OnReadCompleted(request_id, bytes_read); +} + +bool BufferedResourceHandler::DelayResponse() { + std::string mime_type; + request_->GetMimeType(&mime_type); + + std::string content_type_options; + request_->GetResponseHeaderByName("x-content-type-options", + &content_type_options); + if (content_type_options != "nosniff" && + net::ShouldSniffMimeType(request_->url(), mime_type)) { + // We're going to look at the data before deciding what the content type + // is. That means we need to delay sending the ResponseStarted message + // over the IPC channel. + sniff_content_ = true; + LOG(INFO) << "To buffer: " << request_->url().spec(); + return true; + } + + if (ShouldBuffer(request_->url(), mime_type)) { + // This is a temporary fix for the fact that webkit expects to have + // enough data to decode the doctype in order to select the rendering + // mode. + should_buffer_ = true; + LOG(INFO) << "To buffer: " << request_->url().spec(); + return true; + } + return false; +} + +bool BufferedResourceHandler::ShouldBuffer(const GURL& url, + const std::string& mime_type) { + // We are willing to buffer for HTTP and HTTPS. + bool sniffable_scheme = url.is_empty() || + url.SchemeIs("http") || + url.SchemeIs("https"); + if (!sniffable_scheme) + return false; + + // Today, the only reason to buffer the request is to fix the doctype decoding + // performed by webkit: if there is not enough data it will go to quirks mode. + // We only expect the doctype check to apply to html documents. + return mime_type == "text/html"; +} + +bool BufferedResourceHandler::KeepBuffering(int bytes_read) { + DCHECK(read_buffer_); + bytes_read_ += bytes_read; + finished_ = (bytes_read == 0); + + if (sniff_content_) { + std::string type_hint, new_type; + request_->GetMimeType(&type_hint); + + if (!net::SniffMimeType(read_buffer_, bytes_read_, request_->url(), + type_hint, &new_type)) { + // SniffMimeType() returns false if there is not enough data to determine + // the mime type. However, even if it returns false, it returns a new type + // that is probably better than the current one. + DCHECK(bytes_read_ < 512 /*kMaxBytesToSniff*/); + if (!finished_) { + buffering_ = true; + return true; + } + } + sniff_content_ = false; + response_->response_head.mime_type.assign(new_type); + + // We just sniffed the mime type, maybe there is a doctype to process. + if (ShouldBuffer(request_->url(), new_type)) + should_buffer_ = true; + } + + if (!finished_ && should_buffer_) { + if (!DidBufferEnough(bytes_read_)) { + buffering_ = true; + return true; + } + } + buffering_ = false; + return false; +} + +bool BufferedResourceHandler::CompleteResponseStarted(int request_id, + bool in_complete) { + // Check to see if we should forward the data from this request to the + // download thread. + // TODO(paulg): Only download if the context from the renderer allows it. + std::string content_disposition; + request_->GetResponseHeaderByName("content-disposition", + &content_disposition); + + ResourceDispatcherHost::ExtraRequestInfo* info = + ResourceDispatcherHost::ExtraInfoForRequest(request_); + + if (info->allow_download && + host_->ShouldDownload(response_->response_head.mime_type, + content_disposition)) { + if (response_->response_head.headers && // Can be NULL if FTP. + response_->response_head.headers->response_code() / 100 != 2) { + // The response code indicates that this is an error page, but we don't + // know how to display the content. We follow Firefox here and show our + // own error page instead of triggering a download. + // TODO(abarth): We should abstract the response_code test, but this kind + // of check is scattered throughout our codebase. + request_->CancelWithError(net::ERR_FILE_NOT_FOUND); + return false; + } + + info->is_download = true; + + scoped_refptr<DownloadThrottlingResourceHandler> download_handler = + new DownloadThrottlingResourceHandler(host_, + request_, + request_->url().spec(), + info->render_process_host_id, + info->render_view_id, + request_id, + in_complete); + if (bytes_read_) { + // a Read has already occurred and we need to copy the data into the + // EventHandler. + char *buf = NULL; + int buf_len = 0; + download_handler->OnWillRead(request_id, &buf, &buf_len, bytes_read_); + CHECK((buf_len >= bytes_read_) && (bytes_read_ >= 0)); + memcpy(buf, read_buffer_, bytes_read_); + } + // Update the renderer with the response headers which will cause it to + // cancel the request. + // TODO(paulg): Send the renderer a response that indicates that the request + // will be handled by an external source (the browser). + real_handler_->OnResponseStarted(info->request_id, response_); + real_handler_ = download_handler; + } + return real_handler_->OnResponseStarted(request_id, response_); +} + +bool BufferedResourceHandler::DidBufferEnough(int bytes_read) { + const int kRequiredLength = 256; + + return bytes_read >= kRequiredLength; +} diff --git a/chrome/browser/renderer_host/buffered_resource_handler.h b/chrome/browser/renderer_host/buffered_resource_handler.h new file mode 100644 index 0000000..0b832a9 --- /dev/null +++ b/chrome/browser/renderer_host/buffered_resource_handler.h @@ -0,0 +1,62 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_BUFFERED_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_BUFFERED_RESOURCE_HANDLER_H_ + +#include <string> + +#include "chrome/browser/renderer_host/resource_handler.h" + +class ResourceDispatcherHost; + +// Used to buffer a request until enough data has been received. +class BufferedResourceHandler : public ResourceHandler { + public: + BufferedResourceHandler(ResourceHandler* handler, + ResourceDispatcherHost* host, + URLRequest* request); + + // ResourceHandler implementation: + bool OnUploadProgress(int request_id, uint64 position, uint64 size); + bool OnRequestRedirected(int request_id, const GURL& new_url); + bool OnResponseStarted(int request_id, ResourceResponse* response); + bool OnWillRead(int request_id, char** buf, int* buf_size, int min_size); + bool OnReadCompleted(int request_id, int* bytes_read); + bool OnResponseCompleted(int request_id, const URLRequestStatus& status); + + private: + // Returns true if we should delay OnResponseStarted forwarding. + bool DelayResponse(); + + // Returns true if there will be a need to parse the DocType of the document + // to determine the right way to handle it. + bool ShouldBuffer(const GURL& url, const std::string& mime_type); + + // Returns true if there is enough information to process the DocType. + bool DidBufferEnough(int bytes_read); + + // Returns true if we have to keep buffering data. + bool KeepBuffering(int bytes_read); + + // Sends a pending OnResponseStarted notification. |in_complete| is true if + // this is invoked from |OnResponseCompleted|. + bool CompleteResponseStarted(int request_id, bool in_complete); + + scoped_refptr<ResourceHandler> real_handler_; + scoped_refptr<ResourceResponse> response_; + ResourceDispatcherHost* host_; + URLRequest* request_; + char* read_buffer_; + int read_buffer_size_; + int bytes_read_; + bool sniff_content_; + bool should_buffer_; + bool buffering_; + bool finished_; + + DISALLOW_COPY_AND_ASSIGN(BufferedResourceHandler); +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_BUFFERED_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/cross_site_resource_handler.cc b/chrome/browser/renderer_host/cross_site_resource_handler.cc new file mode 100644 index 0000000..aaf579b --- /dev/null +++ b/chrome/browser/renderer_host/cross_site_resource_handler.cc @@ -0,0 +1,218 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/cross_site_resource_handler.h" + +#include "chrome/browser/render_view_host.h" + +namespace { +// Task to notify the WebContents that a cross-site response has begun, so that +// WebContents can tell the old page to run its onunload handler. +class CrossSiteNotifyTabTask : public Task { + public: + CrossSiteNotifyTabTask(int render_process_host_id, + int render_view_id, + int request_id) + : render_process_host_id_(render_process_host_id), + render_view_id_(render_view_id), + request_id_(request_id) {} + + void Run() { + RenderViewHost* view = + RenderViewHost::FromID(render_process_host_id_, render_view_id_); + if (view) { + view->OnCrossSiteResponse(render_process_host_id_, request_id_); + } else { + // The view couldn't be found. + // TODO(creis): Should notify the IO thread to proceed anyway, using + // ResourceDispatcherHost::OnClosePageACK. + } + } + + private: + int render_process_host_id_; + int render_view_id_; + int request_id_; +}; +} + +CrossSiteResourceHandler::CrossSiteResourceHandler( + ResourceHandler* handler, + int render_process_host_id, + int render_view_id, + ResourceDispatcherHost* resource_dispatcher_host) + : next_handler_(handler), + render_process_host_id_(render_process_host_id), + render_view_id_(render_view_id), + has_started_response_(false), + in_cross_site_transition_(false), + request_id_(-1), + completed_during_transition_(false), + completed_status_(), + response_(NULL), + rdh_(resource_dispatcher_host) {} + +bool CrossSiteResourceHandler::OnRequestRedirected(int request_id, + const GURL& new_url) { + // We should not have started the transition before being redirected. + DCHECK(!in_cross_site_transition_); + return next_handler_->OnRequestRedirected(request_id, new_url); +} + +bool CrossSiteResourceHandler::OnResponseStarted(int request_id, + ResourceResponse* response) { + // At this point, we know that the response is safe to send back to the + // renderer: it is not a download, and it has passed the SSL and safe + // browsing checks. + // We should not have already started the transition before now. + DCHECK(!in_cross_site_transition_); + has_started_response_ = true; + + // Look up the request and associated info. + ResourceDispatcherHost::GlobalRequestID global_id(render_process_host_id_, + request_id); + URLRequest* request = rdh_->GetURLRequest(global_id); + if (!request) { + DLOG(WARNING) << "Request wasn't found"; + return false; + } + ResourceDispatcherHost::ExtraRequestInfo* info = + ResourceDispatcherHost::ExtraInfoForRequest(request); + + // If this is a download, just pass the response through without doing a + // cross-site check. The renderer will see it is a download and abort the + // request. + if (info->is_download) { + return next_handler_->OnResponseStarted(request_id, response); + } + + // Tell the renderer to run the onunload event handler, and wait for the + // reply. + StartCrossSiteTransition(request_id, response, global_id); + return true; +} + +bool CrossSiteResourceHandler::OnWillRead(int request_id, + char** buf, int* buf_size, + int min_size) { + return next_handler_->OnWillRead(request_id, buf, buf_size, min_size); +} + +bool CrossSiteResourceHandler::OnReadCompleted(int request_id, + int* bytes_read) { + if (!in_cross_site_transition_) { + return next_handler_->OnReadCompleted(request_id, bytes_read); + } + return true; +} + +bool CrossSiteResourceHandler::OnResponseCompleted( + int request_id, + const URLRequestStatus& status) { + if (!in_cross_site_transition_) { + if (has_started_response_) { + // We've already completed the transition, so just pass it through. + return next_handler_->OnResponseCompleted(request_id, status); + } else { + // Some types of failures will call OnResponseCompleted without calling + // CrossSiteResourceHandler::OnResponseStarted. We should wait now for + // the cross-site transition. Also continue with the logic below to + // remember that we completed during the cross-site transition. + ResourceDispatcherHost::GlobalRequestID global_id(render_process_host_id_, + request_id); + StartCrossSiteTransition(request_id, NULL, global_id); + } + } + + // We have to buffer the call until after the transition completes. + completed_during_transition_ = true; + completed_status_ = status; + + // Return false to tell RDH not to notify the world or clean up the + // pending request. We will do so in ResumeResponse. + return false; +} + +// We can now send the response to the new renderer, which will cause +// WebContents to swap in the new renderer and destroy the old one. +void CrossSiteResourceHandler::ResumeResponse() { + DCHECK(request_id_ != -1); + DCHECK(in_cross_site_transition_); + in_cross_site_transition_ = false; + + // Find the request for this response. + ResourceDispatcherHost::GlobalRequestID global_id(render_process_host_id_, + request_id_); + URLRequest* request = rdh_->GetURLRequest(global_id); + if (!request) { + DLOG(WARNING) << "Resuming a request that wasn't found"; + return; + } + ResourceDispatcherHost::ExtraRequestInfo* info = + ResourceDispatcherHost::ExtraInfoForRequest(request); + + if (has_started_response_) { + // Send OnResponseStarted to the new renderer. + DCHECK(response_); + next_handler_->OnResponseStarted(request_id_, response_); + + // Unpause the request to resume reading. Any further reads will be + // directed toward the new renderer. + rdh_->PauseRequest(render_process_host_id_, request_id_, false); + } + + // Remove ourselves from the ExtraRequestInfo. + info->cross_site_handler = NULL; + + // If the response completed during the transition, notify the next + // event handler. + if (completed_during_transition_) { + next_handler_->OnResponseCompleted(request_id_, completed_status_); + + // Since we didn't notify the world or clean up the pending request in + // RDH::OnResponseCompleted during the transition, we should do it now. + rdh_->NotifyResponseCompleted(request, render_process_host_id_); + rdh_->RemovePendingRequest(render_process_host_id_, request_id_); + } +} + +// Prepare to render the cross-site response in a new RenderViewHost, by +// telling the old RenderViewHost to run its onunload handler. +void CrossSiteResourceHandler::StartCrossSiteTransition( + int request_id, + ResourceResponse* response, + ResourceDispatcherHost::GlobalRequestID global_id) { + in_cross_site_transition_ = true; + request_id_ = request_id; + response_ = response; + + // Store this handler on the ExtraRequestInfo, so that RDH can call our + // ResumeResponse method when the close ACK is received. + URLRequest* request = rdh_->GetURLRequest(global_id); + if (!request) { + DLOG(WARNING) << "Cross site response for a request that wasn't found"; + return; + } + ResourceDispatcherHost::ExtraRequestInfo* info = + ResourceDispatcherHost::ExtraInfoForRequest(request); + info->cross_site_handler = this; + + if (has_started_response_) { + // Pause the request until the old renderer is finished and the new + // renderer is ready. + rdh_->PauseRequest(render_process_host_id_, request_id, true); + } + // If our OnResponseStarted wasn't called, then we're being called by + // OnResponseCompleted after a failure. We don't need to pause, because + // there will be no reads. + + // Tell the tab responsible for this request that a cross-site response is + // starting, so that it can tell its old renderer to run its onunload + // handler now. We will wait to hear the corresponding ClosePage_ACK. + CrossSiteNotifyTabTask* task = + new CrossSiteNotifyTabTask(render_process_host_id_, + render_view_id_, + request_id); + rdh_->ui_loop()->PostTask(FROM_HERE, task); +} diff --git a/chrome/browser/renderer_host/cross_site_resource_handler.h b/chrome/browser/renderer_host/cross_site_resource_handler.h new file mode 100644 index 0000000..7801352 --- /dev/null +++ b/chrome/browser/renderer_host/cross_site_resource_handler.h @@ -0,0 +1,57 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_CROSS_SITE_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_CROSS_SITE_RESOURCE_HANDLER_H_ + +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" +#include "chrome/browser/renderer_host/resource_handler.h" + +// Ensures that cross-site responses are delayed until the onunload handler of +// the previous page is allowed to run. This handler wraps an +// AsyncEventHandler, and it sits inside SafeBrowsing and Buffered event +// handlers. This is important, so that it can intercept OnResponseStarted +// after we determine that a response is safe and not a download. +class CrossSiteResourceHandler : public ResourceHandler { + public: + CrossSiteResourceHandler(ResourceHandler* handler, + int render_process_host_id, + int render_view_id, + ResourceDispatcherHost* resource_dispatcher_host); + + // ResourceHandler implementation: + bool OnRequestRedirected(int request_id, const GURL& new_url); + bool OnResponseStarted(int request_id, + ResourceResponse* response); + bool OnWillRead(int request_id, char** buf, int* buf_size, int min_size); + bool OnReadCompleted(int request_id, int* bytes_read); + bool OnResponseCompleted(int request_id, const URLRequestStatus& status); + + // We can now send the response to the new renderer, which will cause + // WebContents to swap in the new renderer and destroy the old one. + void ResumeResponse(); + + private: + // Prepare to render the cross-site response in a new RenderViewHost, by + // telling the old RenderViewHost to run its onunload handler. + void StartCrossSiteTransition( + int request_id, + ResourceResponse* response, + ResourceDispatcherHost::GlobalRequestID global_id); + + scoped_refptr<ResourceHandler> next_handler_; + int render_process_host_id_; + int render_view_id_; + bool has_started_response_; + bool in_cross_site_transition_; + int request_id_; + bool completed_during_transition_; + URLRequestStatus completed_status_; + ResourceResponse* response_; + ResourceDispatcherHost* rdh_; + + DISALLOW_COPY_AND_ASSIGN(CrossSiteResourceHandler); +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_CROSS_SITE_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/download_resource_handler.cc b/chrome/browser/renderer_host/download_resource_handler.cc new file mode 100644 index 0000000..13e7457 --- /dev/null +++ b/chrome/browser/renderer_host/download_resource_handler.cc @@ -0,0 +1,169 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/download_resource_handler.h" + +#include "chrome/browser/download/download_file.h" +#include "chrome/browser/download/download_manager.h" +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" + +DownloadResourceHandler::DownloadResourceHandler(ResourceDispatcherHost* rdh, + int render_process_host_id, + int render_view_id, + int request_id, + const std::string& url, + DownloadFileManager* manager, + URLRequest* request, + bool save_as) + : download_id_(-1), + global_id_(ResourceDispatcherHost::GlobalRequestID(render_process_host_id, + request_id)), + render_view_id_(render_view_id), + read_buffer_(NULL), + url_(UTF8ToWide(url)), + content_length_(0), + download_manager_(manager), + request_(request), + save_as_(save_as), + buffer_(new DownloadBuffer), + rdh_(rdh), + is_paused_(false) { +} + +// Not needed, as this event handler ought to be the final resource. +bool DownloadResourceHandler::OnRequestRedirected(int request_id, + const GURL& url) { + url_ = UTF8ToWide(url.spec()); + return true; +} + +// Send the download creation information to the download thread. +bool DownloadResourceHandler::OnResponseStarted(int request_id, + ResourceResponse* response) { + std::string content_disposition; + request_->GetResponseHeaderByName("content-disposition", + &content_disposition); + set_content_disposition(content_disposition); + set_content_length(response->response_head.content_length); + + download_id_ = download_manager_->GetNextId(); + // |download_manager_| consumes (deletes): + DownloadCreateInfo* info = new DownloadCreateInfo; + info->url = url_; + info->start_time = base::Time::Now(); + info->received_bytes = 0; + info->total_bytes = content_length_; + info->state = DownloadItem::IN_PROGRESS; + info->download_id = download_id_; + info->render_process_id = global_id_.render_process_host_id; + info->render_view_id = render_view_id_; + info->request_id = global_id_.request_id; + info->content_disposition = content_disposition_; + info->mime_type = response->response_head.mime_type; + info->save_as = save_as_; + info->is_dangerous = false; + download_manager_->file_loop()->PostTask(FROM_HERE, + NewRunnableMethod(download_manager_, + &DownloadFileManager::StartDownload, + info)); + return true; +} + +// Create a new buffer, which will be handed to the download thread for file +// writing and deletion. +bool DownloadResourceHandler::OnWillRead(int request_id, + char** buf, int* buf_size, + int min_size) { + DCHECK(buf && buf_size); + if (!read_buffer_) { + *buf_size = min_size < 0 ? kReadBufSize : min_size; + read_buffer_ = new char[*buf_size]; + } + *buf = read_buffer_; + return true; +} + +// Pass the buffer to the download file writer. +bool DownloadResourceHandler::OnReadCompleted(int request_id, int* bytes_read) { + if (!*bytes_read) + return true; + DCHECK(read_buffer_); + AutoLock auto_lock(buffer_->lock); + bool need_update = buffer_->contents.empty(); + buffer_->contents.push_back(std::make_pair(read_buffer_, *bytes_read)); + if (need_update) { + download_manager_->file_loop()->PostTask(FROM_HERE, + NewRunnableMethod(download_manager_, + &DownloadFileManager::UpdateDownload, + download_id_, + buffer_)); + } + read_buffer_ = NULL; + + // We schedule a pause outside of the read loop if there is too much file + // writing work to do. + if (buffer_->contents.size() > kLoadsToWrite) + StartPauseTimer(); + + return true; +} + +bool DownloadResourceHandler::OnResponseCompleted( + int request_id, + const URLRequestStatus& status) { + download_manager_->file_loop()->PostTask(FROM_HERE, + NewRunnableMethod(download_manager_, + &DownloadFileManager::DownloadFinished, + download_id_, + buffer_)); + delete [] read_buffer_; + + // 'buffer_' is deleted by the DownloadFileManager. + buffer_ = NULL; + return true; +} + +// If the content-length header is not present (or contains something other +// than numbers), the incoming content_length is -1 (unknown size). +// Set the content length to 0 to indicate unknown size to DownloadManager. +void DownloadResourceHandler::set_content_length(const int64& content_length) { + content_length_ = 0; + if (content_length > 0) + content_length_ = content_length; +} + +void DownloadResourceHandler::set_content_disposition( + const std::string& content_disposition) { + content_disposition_ = content_disposition; +} + +void DownloadResourceHandler::CheckWriteProgress() { + if (!buffer_) + return; // The download completed while we were waiting to run. + + size_t contents_size; + { + AutoLock lock(buffer_->lock); + contents_size = buffer_->contents.size(); + } + + bool should_pause = contents_size > kLoadsToWrite; + + // We'll come back later and see if it's okay to unpause the request. + if (should_pause) + StartPauseTimer(); + + if (is_paused_ != should_pause) { + rdh_->PauseRequest(global_id_.render_process_host_id, + global_id_.request_id, + should_pause); + is_paused_ = should_pause; + } +} + +void DownloadResourceHandler::StartPauseTimer() { + if (!pause_timer_.IsRunning()) + pause_timer_.Start(base::TimeDelta::FromMilliseconds(kThrottleTimeMs), this, + &DownloadResourceHandler::CheckWriteProgress); +} diff --git a/chrome/browser/renderer_host/download_resource_handler.h b/chrome/browser/renderer_host/download_resource_handler.h new file mode 100644 index 0000000..52f6c94 --- /dev/null +++ b/chrome/browser/renderer_host/download_resource_handler.h @@ -0,0 +1,75 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_DOWNLOAD_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_DOWNLOAD_RESOURCE_HANDLER_H_ + +#include <string> + +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" +#include "chrome/browser/renderer_host/resource_handler.h" + +struct DownloadBuffer; + +// Forwards data to the download thread. +class DownloadResourceHandler : public ResourceHandler { + public: + DownloadResourceHandler(ResourceDispatcherHost* rdh, + int render_process_host_id, + int render_view_id, + int request_id, + const std::string& url, + DownloadFileManager* manager, + URLRequest* request, + bool save_as); + + // Not needed, as this event handler ought to be the final resource. + bool OnRequestRedirected(int request_id, const GURL& url); + + // Send the download creation information to the download thread. + bool OnResponseStarted(int request_id, ResourceResponse* response); + + // Create a new buffer, which will be handed to the download thread for file + // writing and deletion. + bool OnWillRead(int request_id, char** buf, int* buf_size, int min_size); + + bool OnReadCompleted(int request_id, int* bytes_read); + + bool OnResponseCompleted(int request_id, const URLRequestStatus& status); + + // If the content-length header is not present (or contains something other + // than numbers), the incoming content_length is -1 (unknown size). + // Set the content length to 0 to indicate unknown size to DownloadManager. + void set_content_length(const int64& content_length); + + void set_content_disposition(const std::string& content_disposition); + + void CheckWriteProgress(); + + private: + void StartPauseTimer(); + + int download_id_; + ResourceDispatcherHost::GlobalRequestID global_id_; + int render_view_id_; + char* read_buffer_; + std::string content_disposition_; + std::wstring url_; + int64 content_length_; + DownloadFileManager* download_manager_; + URLRequest* request_; + bool save_as_; // Request was initiated via "Save As" by the user. + DownloadBuffer* buffer_; + ResourceDispatcherHost* rdh_; + bool is_paused_; + base::OneShotTimer<DownloadResourceHandler> pause_timer_; + + static const int kReadBufSize = 32768; // bytes + static const int kLoadsToWrite = 100; // number of data buffers queued + static const int kThrottleTimeMs = 200; // milliseconds + + DISALLOW_COPY_AND_ASSIGN(DownloadResourceHandler); +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_DOWNLOAD_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/download_throttling_resource_handler.cc b/chrome/browser/renderer_host/download_throttling_resource_handler.cc new file mode 100644 index 0000000..07b8164 --- /dev/null +++ b/chrome/browser/renderer_host/download_throttling_resource_handler.cc @@ -0,0 +1,145 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/download_throttling_resource_handler.h" + +#include "chrome/browser/renderer_host/download_resource_handler.h" + +DownloadThrottlingResourceHandler::DownloadThrottlingResourceHandler( + ResourceDispatcherHost* host, + URLRequest* request, + const std::string& url, + int render_process_host_id, + int render_view_id, + int request_id, + bool in_complete) + : host_(host), + request_(request), + url_(url), + render_process_host_id_(render_process_host_id), + render_view_id_(render_view_id), + request_id_(request_id), + tmp_buffer_length_(0), + ignore_on_read_complete_(in_complete) { + // Pause the request. + host_->PauseRequest(render_process_host_id_, request_id_, true); + host_->download_request_manager()->CanDownloadOnIOThread( + render_process_host_id_, render_view_id, this); + } + +DownloadThrottlingResourceHandler::~DownloadThrottlingResourceHandler() { +} + +bool DownloadThrottlingResourceHandler::OnUploadProgress(int request_id, + uint64 position, + uint64 size) { + if (download_handler_.get()) + return download_handler_->OnUploadProgress(request_id, position, size); + return true; +} + +bool DownloadThrottlingResourceHandler::OnRequestRedirected(int request_id, + const GURL& url) { + if (download_handler_.get()) + return download_handler_->OnRequestRedirected(request_id, url); + url_ = url.spec(); + return true; +} + +bool DownloadThrottlingResourceHandler::OnResponseStarted( + int request_id, + ResourceResponse* response) { + if (download_handler_.get()) + return download_handler_->OnResponseStarted(request_id, response); + response_ = response; + return true; +} + +bool DownloadThrottlingResourceHandler::OnWillRead(int request_id, + char** buf, + int* buf_size, + int min_size) { + if (download_handler_.get()) + return download_handler_->OnWillRead(request_id, buf, buf_size, min_size); + + // We should only have this invoked once, as such we only deal with one + // tmp buffer. + DCHECK(!tmp_buffer_.get()); + if (min_size < 0) + min_size = 1024; + tmp_buffer_.reset(new char[min_size]); + *buf = tmp_buffer_.get(); + *buf_size = min_size; + return true; +} + +bool DownloadThrottlingResourceHandler::OnReadCompleted(int request_id, + int* bytes_read) { + if (ignore_on_read_complete_) { + // See comments above definition for details on this. + ignore_on_read_complete_ = false; + return true; + } + if (!*bytes_read) + return true; + + if (tmp_buffer_.get()) { + DCHECK(!tmp_buffer_length_); + tmp_buffer_length_ = *bytes_read; + if (download_handler_.get()) + CopyTmpBufferToDownloadHandler(); + return true; + } + if (download_handler_.get()) + return download_handler_->OnReadCompleted(request_id, bytes_read); + return true; +} + +bool DownloadThrottlingResourceHandler::OnResponseCompleted( + int request_id, + const URLRequestStatus& status) { + if (download_handler_.get()) + return download_handler_->OnResponseCompleted(request_id, status); + NOTREACHED(); + return true; +} + +void DownloadThrottlingResourceHandler::CancelDownload() { + host_->CancelRequest(render_process_host_id_, request_id_, false); +} + +void DownloadThrottlingResourceHandler::ContinueDownload() { + DCHECK(!download_handler_.get()); + download_handler_ = + new DownloadResourceHandler(host_, + render_process_host_id_, + render_view_id_, + request_id_, + url_, + host_->download_file_manager(), + request_, + false); + if (response_.get()) + download_handler_->OnResponseStarted(request_id_, response_.get()); + + if (tmp_buffer_length_) + CopyTmpBufferToDownloadHandler(); + + // And let the request continue. + host_->PauseRequest(render_process_host_id_, request_id_, false); +} + +void DownloadThrottlingResourceHandler::CopyTmpBufferToDownloadHandler() { + // Copy over the tmp buffer. + char* buffer; + int buf_size; + if (download_handler_->OnWillRead(request_id_, &buffer, &buf_size, + tmp_buffer_length_)) { + CHECK(buf_size >= tmp_buffer_length_); + memcpy(buffer, tmp_buffer_.get(), tmp_buffer_length_); + download_handler_->OnReadCompleted(request_id_, &tmp_buffer_length_); + } + tmp_buffer_length_ = 0; + tmp_buffer_.reset(); +} diff --git a/chrome/browser/renderer_host/download_throttling_resource_handler.h b/chrome/browser/renderer_host/download_throttling_resource_handler.h new file mode 100644 index 0000000..177f4fd --- /dev/null +++ b/chrome/browser/renderer_host/download_throttling_resource_handler.h @@ -0,0 +1,87 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_DOWNLOAD_THROTTLING_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_DOWNLOAD_THROTTLING_RESOURCE_HANDLER_H_ + +#include <string> + +#include "chrome/browser/renderer_host/resource_handler.h" +#include "chrome/browser/download/download_request_manager.h" + +class DownloadResourceHandler; +class ResourceDispatcherHost; + +// DownloadThrottlingResourceHandler is used to determine if a download should +// be allowed. When a DownloadThrottlingResourceHandler is created it pauses the +// download and asks the DownloadRequestManager if the download should be +// allowed. The DownloadRequestManager notifies us asynchronously as to whether +// the download is allowed or not. If the download is allowed the request is +// resumed, a DownloadResourceHandler is created and all EventHandler methods +// are delegated to it. If the download is not allowed the request is canceled. + +class DownloadThrottlingResourceHandler + : public ResourceHandler, + public DownloadRequestManager::Callback { + public: + DownloadThrottlingResourceHandler(ResourceDispatcherHost* host, + URLRequest* request, + const std::string& url, + int render_process_host_id, + int render_view_id, + int request_id, + bool in_complete); + virtual ~DownloadThrottlingResourceHandler(); + + // ResourceHanlder implementation: + virtual bool OnUploadProgress(int request_id, + uint64 position, + uint64 size); + virtual bool OnRequestRedirected(int request_id, const GURL& url); + virtual bool OnResponseStarted(int request_id, ResourceResponse* response); + virtual bool OnWillRead(int request_id, + char** buf, + int* buf_size, + int min_size); + virtual bool OnReadCompleted(int request_id, int* bytes_read); + virtual bool OnResponseCompleted(int request_id, + const URLRequestStatus& status); + + // DownloadRequestManager::Callback implementation: + void CancelDownload(); + void ContinueDownload(); + + private: + void CopyTmpBufferToDownloadHandler(); + + ResourceDispatcherHost* host_; + URLRequest* request_; + std::string url_; + int render_process_host_id_; + int render_view_id_; + int request_id_; + + // Handles the actual download. This is only created if the download is + // allowed to continue. + scoped_refptr<DownloadResourceHandler> download_handler_; + + // Response supplied to OnResponseStarted. Only non-null if OnResponseStarted + // is invoked. + scoped_refptr<ResourceResponse> response_; + + // If we're created by way of BufferedEventHandler we'll get one request for + // a buffer. This is that buffer. + scoped_array<char> tmp_buffer_; + int tmp_buffer_length_; + + // If true the next call to OnReadCompleted is ignored. This is used if we're + // paused during a call to OnReadCompleted. Pausing during OnReadCompleted + // results in two calls to OnReadCompleted for the same data. This make sure + // we ignore one of them. + bool ignore_on_read_complete_; + + DISALLOW_COPY_AND_ASSIGN(DownloadThrottlingResourceHandler); +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_DOWNLOAD_THROTTLING_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/resource_dispatcher_host.cc b/chrome/browser/renderer_host/resource_dispatcher_host.cc new file mode 100644 index 0000000..f746429 --- /dev/null +++ b/chrome/browser/renderer_host/resource_dispatcher_host.cc @@ -0,0 +1,1217 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +// See http://dev.chromium.org/developers/design-documents/multi-process-resource-loading + +#include <vector> + +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" + +#include "base/message_loop.h" +#include "base/scoped_ptr.h" +#include "base/time.h" +#include "chrome/browser/cert_store.h" +#include "chrome/browser/cross_site_request_manager.h" +#include "chrome/browser/download/download_file.h" +#include "chrome/browser/download/download_manager.h" +#include "chrome/browser/download/download_request_manager.h" +#include "chrome/browser/download/save_file_manager.h" +#include "chrome/browser/external_protocol_handler.h" +#include "chrome/browser/login_prompt.h" +#include "chrome/browser/plugin_service.h" +#include "chrome/browser/render_view_host.h" +#include "chrome/browser/render_view_host_delegate.h" +#include "chrome/browser/renderer_host/async_resource_handler.h" +#include "chrome/browser/renderer_host/buffered_resource_handler.h" +#include "chrome/browser/renderer_host/cross_site_resource_handler.h" +#include "chrome/browser/renderer_host/download_resource_handler.h" +#include "chrome/browser/renderer_host/safe_browsing_resource_handler.h" +#include "chrome/browser/renderer_host/save_file_resource_handler.h" +#include "chrome/browser/renderer_host/sync_resource_handler.h" +#include "chrome/browser/renderer_security_policy.h" +#include "chrome/browser/resource_request_details.h" +#include "chrome/browser/safe_browsing/safe_browsing_service.h" +#include "chrome/browser/tab_util.h" +#include "chrome/browser/web_contents.h" +#include "chrome/common/notification_source.h" +#include "chrome/common/notification_types.h" +#include "chrome/common/render_messages.h" +#include "chrome/common/stl_util-inl.h" +#include "net/base/auth.h" +#include "net/base/cert_status_flags.h" +#include "net/base/load_flags.h" +#include "net/base/mime_util.h" +#include "net/base/net_errors.h" +#include "net/url_request/url_request.h" + +// Uncomment to enable logging of request traffic. +//#define LOG_RESOURCE_DISPATCHER_REQUESTS + +#ifdef LOG_RESOURCE_DISPATCHER_REQUESTS +# define RESOURCE_LOG(stuff) LOG(INFO) << stuff +#else +# define RESOURCE_LOG(stuff) +#endif + +using base::Time; +using base::TimeDelta; +using base::TimeTicks; + +// ---------------------------------------------------------------------------- + +// The interval for calls to ResourceDispatcherHost::UpdateLoadStates +static const int kUpdateLoadStatesIntervalMsec = 100; + +// Maximum number of pending data messages sent to the renderer at any +// given time for a given request. +static const int kMaxPendingDataMessages = 20; + +// A ShutdownTask proxies a shutdown task from the UI thread to the IO thread. +// It should be constructed on the UI thread and run in the IO thread. +class ResourceDispatcherHost::ShutdownTask : public Task { + public: + explicit ShutdownTask(ResourceDispatcherHost* resource_dispatcher_host) + : rdh_(resource_dispatcher_host) { } + + void Run() { + rdh_->OnShutdown(); + } + + private: + ResourceDispatcherHost* rdh_; +}; + +namespace { + +// Consults the RendererSecurity policy to determine whether the +// ResourceDispatcherHost should service this request. A request might be +// disallowed if the renderer is not authorized to restrive the request URL or +// if the renderer is attempting to upload an unauthorized file. +bool ShouldServiceRequest(int render_process_host_id, + const ViewHostMsg_Resource_Request& request_data) { + // TODO(mpcomplete): remove this when http://b/viewIssue?id=1080959 is fixed. + if (render_process_host_id == -1) + return true; + + RendererSecurityPolicy* policy = RendererSecurityPolicy::GetInstance(); + + // Check if the renderer is permitted to request the requested URL. + if (!policy->CanRequestURL(render_process_host_id, request_data.url)) { + LOG(INFO) << "Denied unauthorized request for " << + request_data.url.possibly_invalid_spec(); + return false; + } + + // Check if the renderer is permitted to upload the requested files. + const std::vector<net::UploadData::Element>& uploads = + request_data.upload_content; + std::vector<net::UploadData::Element>::const_iterator iter; + for (iter = uploads.begin(); iter != uploads.end(); ++iter) { + if (iter->type() == net::UploadData::TYPE_FILE && + !policy->CanUploadFile(render_process_host_id, iter->file_path())) { + NOTREACHED() << "Denied unauthorized upload of " << iter->file_path(); + return false; + } + } + + return true; +} + +} // namespace + +ResourceDispatcherHost::ResourceDispatcherHost(MessageLoop* io_loop) + : ui_loop_(MessageLoop::current()), + io_loop_(io_loop), + download_file_manager_(new DownloadFileManager(ui_loop_, this)), + download_request_manager_(new DownloadRequestManager(io_loop, ui_loop_)), + save_file_manager_(new SaveFileManager(ui_loop_, io_loop, this)), + safe_browsing_(new SafeBrowsingService), + request_id_(-1), + plugin_service_(PluginService::GetInstance()), + method_runner_(this), + is_shutdown_(false) { +} + +ResourceDispatcherHost::~ResourceDispatcherHost() { + AsyncResourceHandler::GlobalCleanup(); + STLDeleteValues(&pending_requests_); +} + +void ResourceDispatcherHost::Initialize() { + DCHECK(MessageLoop::current() == ui_loop_); + download_file_manager_->Initialize(); + safe_browsing_->Initialize(io_loop_); +} + +void ResourceDispatcherHost::Shutdown() { + DCHECK(MessageLoop::current() == ui_loop_); + io_loop_->PostTask(FROM_HERE, new ShutdownTask(this)); +} + +void ResourceDispatcherHost::OnShutdown() { + DCHECK(MessageLoop::current() == io_loop_); + is_shutdown_ = true; + STLDeleteValues(&pending_requests_); + // Make sure we shutdown the timer now, otherwise by the time our destructor + // runs if the timer is still running the Task is deleted twice (once by + // the MessageLoop and the second time by RepeatingTimer). + update_load_states_timer_.Stop(); +} + +bool ResourceDispatcherHost::HandleExternalProtocol(int request_id, + int render_process_host_id, + int tab_contents_id, + const GURL& url, + ResourceType::Type type, + ResourceHandler* handler) { + if (!ResourceType::IsFrame(type) || URLRequest::IsHandledURL(url)) + return false; + + ui_loop_->PostTask(FROM_HERE, NewRunnableFunction( + &ExternalProtocolHandler::LaunchUrl, url, render_process_host_id, + tab_contents_id)); + + handler->OnResponseCompleted(request_id, URLRequestStatus( + URLRequestStatus::FAILED, + net::ERR_ABORTED)); + return true; +} + +void ResourceDispatcherHost::BeginRequest( + Receiver* receiver, + HANDLE render_process_handle, + int render_process_host_id, + int render_view_id, + int request_id, + const ViewHostMsg_Resource_Request& request_data, + URLRequestContext* request_context, + IPC::Message* sync_result) { + if (is_shutdown_ || + !ShouldServiceRequest(render_process_host_id, request_data)) { + // Tell the renderer that this request was disallowed. + receiver->Send(new ViewMsg_Resource_RequestComplete( + render_view_id, + request_id, + URLRequestStatus(URLRequestStatus::FAILED, net::ERR_ABORTED))); + return; + } + + // Ensure the Chrome plugins are loaded, as they may intercept network + // requests. Does nothing if they are already loaded. + // TODO(mpcomplete): This takes 200 ms! Investigate parallelizing this by + // starting the load earlier in a BG thread. + plugin_service_->LoadChromePlugins(this); + + // Construct the event handler. + scoped_refptr<ResourceHandler> handler; + if (sync_result) { + handler = new SyncResourceHandler(receiver, request_data.url, sync_result); + } else { + handler = new AsyncResourceHandler(receiver, + render_process_host_id, + render_view_id, + render_process_handle, + request_data.url, + this); + } + + if (HandleExternalProtocol(request_id, render_process_host_id, render_view_id, + request_data.url, request_data.resource_type, + handler)) { + return; + } + + // Construct the request. + URLRequest* request = new URLRequest(request_data.url, this); + request->set_method(request_data.method); + request->set_policy_url(request_data.policy_url); + request->set_referrer(request_data.referrer.spec()); + request->SetExtraRequestHeaders(request_data.headers); + request->set_load_flags(request_data.load_flags); + request->set_context(request_context); + request->set_origin_pid(request_data.origin_pid); + + // Set upload data. + uint64 upload_size = 0; + if (!request_data.upload_content.empty()) { + scoped_refptr<net::UploadData> upload = new net::UploadData(); + upload->set_elements(request_data.upload_content); // Deep copy. + request->set_upload(upload); + upload_size = upload->GetContentLength(); + } + + // Install a CrossSiteResourceHandler if this request is coming from a + // RenderViewHost with a pending cross-site request. We only check this for + // MAIN_FRAME requests. + // TODO(mpcomplete): remove "render_process_host_id != -1" + // when http://b/viewIssue?id=1080959 is fixed. + if (request_data.resource_type == ResourceType::MAIN_FRAME && + render_process_host_id != -1 && + Singleton<CrossSiteRequestManager>::get()-> + HasPendingCrossSiteRequest(render_process_host_id, render_view_id)) { + // Wrap the event handler to be sure the current page's onunload handler + // has a chance to run before we render the new page. + handler = new CrossSiteResourceHandler(handler, + render_process_host_id, + render_view_id, + this); + } + + if (safe_browsing_->enabled() && + safe_browsing_->CanCheckUrl(request_data.url)) { + handler = new SafeBrowsingResourceHandler(handler, + render_process_host_id, + render_view_id, + request_data.url, + request_data.resource_type, + safe_browsing_, + this); + } + + // Insert a buffered event handler before the actual one. + handler = new BufferedResourceHandler(handler, this, request); + + // Make extra info and read footer (contains request ID). + ExtraRequestInfo* extra_info = + new ExtraRequestInfo(handler, + request_id, + render_process_host_id, + render_view_id, + request_data.mixed_content, + request_data.resource_type, + upload_size); + extra_info->allow_download = + ResourceType::IsFrame(request_data.resource_type); + request->set_user_data(extra_info); // takes pointer ownership + + BeginRequestInternal(request, request_data.mixed_content); +} + +// We are explicitly forcing the download of 'url'. +void ResourceDispatcherHost::BeginDownload(const GURL& url, + const GURL& referrer, + int render_process_host_id, + int render_view_id, + URLRequestContext* request_context) { + if (is_shutdown_) + return; + + // Check if the renderer is permitted to request the requested URL. + // + // TODO(mpcomplete): remove "render_process_host_id != -1" + // when http://b/viewIssue?id=1080959 is fixed. + if (render_process_host_id != -1 && + !RendererSecurityPolicy::GetInstance()-> + CanRequestURL(render_process_host_id, url)) { + LOG(INFO) << "Denied unauthorized download request for " << + url.possibly_invalid_spec(); + return; + } + + // Ensure the Chrome plugins are loaded, as they may intercept network + // requests. Does nothing if they are already loaded. + plugin_service_->LoadChromePlugins(this); + URLRequest* request = new URLRequest(url, this); + + request_id_--; + + scoped_refptr<ResourceHandler> handler = + new DownloadResourceHandler(this, + render_process_host_id, + render_view_id, + request_id_, + url.spec(), + download_file_manager_.get(), + request, + true); + + + if (safe_browsing_->enabled() && safe_browsing_->CanCheckUrl(url)) { + handler = new SafeBrowsingResourceHandler(handler, + render_process_host_id, + render_view_id, + url, + ResourceType::MAIN_FRAME, + safe_browsing_, + this); + } + + bool known_proto = URLRequest::IsHandledURL(url); + if (!known_proto) { + CHECK(false); + } + + request->set_method("GET"); + request->set_referrer(referrer.spec()); + request->set_context(request_context); + + ExtraRequestInfo* extra_info = + new ExtraRequestInfo(handler, + request_id_, + render_process_host_id, + render_view_id, + false, // Downloads are not considered mixed-content + ResourceType::SUB_RESOURCE, + 0 /* upload_size */ ); + extra_info->allow_download = true; + extra_info->is_download = true; + request->set_user_data(extra_info); // Takes pointer ownership. + + BeginRequestInternal(request, false); +} + +// This function is only used for saving feature. +void ResourceDispatcherHost::BeginSaveFile(const GURL& url, + const GURL& referrer, + int render_process_host_id, + int render_view_id, + URLRequestContext* request_context) { + if (is_shutdown_) + return; + + // Ensure the Chrome plugins are loaded, as they may intercept network + // requests. Does nothing if they are already loaded. + plugin_service_->LoadChromePlugins(this); + + scoped_refptr<ResourceHandler> handler = + new SaveFileResourceHandler(render_process_host_id, + render_view_id, + url.spec(), + save_file_manager_.get()); + request_id_--; + + bool known_proto = URLRequest::IsHandledURL(url); + if (!known_proto) { + // Since any URLs which have non-standard scheme have been filtered + // by save manager(see GURL::SchemeIsStandard). This situation + // should not happen. + NOTREACHED(); + return; + } + + URLRequest* request = new URLRequest(url, this); + request->set_method("GET"); + request->set_referrer(referrer.spec()); + // So far, for saving page, we need fetch content from cache, in the + // future, maybe we can use a configuration to configure this behavior. + request->set_load_flags(net::LOAD_ONLY_FROM_CACHE); + request->set_context(request_context); + + ExtraRequestInfo* extra_info = + new ExtraRequestInfo(handler, + request_id_, + render_process_host_id, + render_view_id, + false, + ResourceType::SUB_RESOURCE, + 0 /* upload_size */); + // Just saving some resources we need, disallow downloading. + extra_info->allow_download = false; + extra_info->is_download = false; + request->set_user_data(extra_info); // Takes pointer ownership. + + BeginRequestInternal(request, false); +} + +void ResourceDispatcherHost::CancelRequest(int render_process_host_id, + int request_id, + bool from_renderer) { + CancelRequest(render_process_host_id, request_id, from_renderer, true); +} + +void ResourceDispatcherHost::CancelRequest(int render_process_host_id, + int request_id, + bool from_renderer, + bool allow_delete) { + PendingRequestList::iterator i = pending_requests_.find( + GlobalRequestID(render_process_host_id, request_id)); + if (i == pending_requests_.end()) { + // We probably want to remove this warning eventually, but I wanted to be + // able to notice when this happens during initial development since it + // should be rare and may indicate a bug. + DLOG(WARNING) << "Canceling a request that wasn't found"; + return; + } + + // WebKit will send us a cancel for downloads since it no longer handles them. + // In this case, ignore the cancel since we handle downloads in the browser. + ExtraRequestInfo* info = ExtraInfoForRequest(i->second); + if (!from_renderer || !info->is_download) { + if (info->login_handler) { + info->login_handler->OnRequestCancelled(); + info->login_handler = NULL; + } + if (!i->second->is_pending() && allow_delete) { + // No io is pending, canceling the request won't notify us of anything, + // so we explicitly remove it. + // TODO: removing the request in this manner means we're not notifying + // anyone. We need make sure the event handlers and others are notified + // so that everything is cleaned up properly. + RemovePendingRequest(info->render_process_host_id, info->request_id); + } else { + i->second->Cancel(); + } + } + + // Do not remove from the pending requests, as the request will still + // call AllDataReceived, and may even have more data before it does + // that. +} + +void ResourceDispatcherHost::OnDataReceivedACK(int render_process_host_id, + int request_id) { + PendingRequestList::iterator i = pending_requests_.find( + GlobalRequestID(render_process_host_id, request_id)); + if (i == pending_requests_.end()) + return; + + ExtraRequestInfo* info = ExtraInfoForRequest(i->second); + + // Decrement the number of pending data messages. + info->pending_data_count--; + + // If the pending data count was higher than the max, resume the request. + if (info->pending_data_count == kMaxPendingDataMessages) { + // Decrement the pending data count one more time because we also + // incremented it before pausing the request. + info->pending_data_count--; + + // Resume the request. + PauseRequest(render_process_host_id, request_id, false); + } +} + +void ResourceDispatcherHost::OnUploadProgressACK(int render_process_host_id, + int request_id) { + PendingRequestList::iterator i = pending_requests_.find( + GlobalRequestID(render_process_host_id, request_id)); + if (i == pending_requests_.end()) + return; + + ExtraRequestInfo* info = ExtraInfoForRequest(i->second); + info->waiting_for_upload_progress_ack = false; +} + +bool ResourceDispatcherHost::WillSendData(int render_process_host_id, + int request_id) { + PendingRequestList::iterator i = pending_requests_.find( + GlobalRequestID(render_process_host_id, request_id)); + if (i == pending_requests_.end()) { + NOTREACHED() << L"WillSendData for invalid request"; + return false; + } + + ExtraRequestInfo* info = ExtraInfoForRequest(i->second); + + info->pending_data_count++; + if (info->pending_data_count > kMaxPendingDataMessages) { + // We reached the max number of data messages that can be sent to + // the renderer for a given request. Pause the request and wait for + // the renderer to start processing them before resuming it. + PauseRequest(render_process_host_id, request_id, true); + return false; + } + + return true; +} + +void ResourceDispatcherHost::PauseRequest(int render_process_host_id, + int request_id, + bool pause) { + GlobalRequestID global_id(render_process_host_id, request_id); + PendingRequestList::iterator i = pending_requests_.find(global_id); + if (i == pending_requests_.end()) { + DLOG(WARNING) << "Pausing a request that wasn't found"; + return; + } + + ExtraRequestInfo* info = ExtraInfoForRequest(i->second); + + int pause_count = info->pause_count + (pause ? 1 : -1); + if (pause_count < 0) { + NOTREACHED(); // Unbalanced call to pause. + return; + } + info->pause_count = pause_count; + + RESOURCE_LOG("To pause (" << pause << "): " << i->second->url().spec()); + + // If we're resuming, kick the request to start reading again. Run the read + // asynchronously to avoid recursion problems. + if (info->pause_count == 0) { + MessageLoop::current()->PostTask(FROM_HERE, + method_runner_.NewRunnableMethod( + &ResourceDispatcherHost::ResumeRequest, global_id)); + } +} + +void ResourceDispatcherHost::OnClosePageACK(int render_process_host_id, + int request_id) { + GlobalRequestID global_id(render_process_host_id, request_id); + PendingRequestList::iterator i = pending_requests_.find(global_id); + if (i == pending_requests_.end()) { + // If there are no matching pending requests, then this is not a + // cross-site navigation and we are just closing the tab/browser. + ui_loop_->PostTask(FROM_HERE, NewRunnableFunction( + &RenderViewHost::ClosePageIgnoringUnloadEvents, + render_process_host_id, + request_id)); + return; + } + + ExtraRequestInfo* info = ExtraInfoForRequest(i->second); + if (info->cross_site_handler) { + info->cross_site_handler->ResumeResponse(); + } +} + +// The object died, so cancel and detach all requests associated with it except +// for downloads, which belong to the browser process even if initiated via a +// renderer. +void ResourceDispatcherHost::CancelRequestsForProcess( + int render_process_host_id) { + CancelRequestsForRenderView(render_process_host_id, -1 /* cancel all */); +} + +void ResourceDispatcherHost::CancelRequestsForRenderView( + int render_process_host_id, + int render_view_id) { + // Since pending_requests_ is a map, we first build up a list of all of the + // matching requests to be cancelled, and then we cancel them. Since there + // may be more than one request to cancel, we cannot simply hold onto the map + // iterators found in the first loop. + + // Find the global ID of all matching elements. + std::vector<GlobalRequestID> matching_requests; + for (PendingRequestList::const_iterator i = pending_requests_.begin(); + i != pending_requests_.end(); ++i) { + if (i->first.render_process_host_id == render_process_host_id) { + ExtraRequestInfo* info = ExtraInfoForRequest(i->second); + if (!info->is_download && (render_view_id == -1 || + render_view_id == info->render_view_id)) { + matching_requests.push_back( + GlobalRequestID(render_process_host_id, i->first.request_id)); + } + } + } + + // Remove matches. + for (size_t i = 0; i < matching_requests.size(); ++i) { + PendingRequestList::iterator iter = + pending_requests_.find(matching_requests[i]); + // Although every matching request was in pending_requests_ when we built + // matching_requests, it is normal for a matching request to be not found + // in pending_requests_ after we have removed some matching requests from + // pending_requests_. For example, deleting a URLRequest that has + // exclusive (write) access to an HTTP cache entry may unblock another + // URLRequest that needs exclusive access to the same cache entry, and + // that URLRequest may complete and remove itself from pending_requests_. + // So we need to check that iter is not equal to pending_requests_.end(). + if (iter != pending_requests_.end()) + RemovePendingRequest(iter); + } +} + +// Cancels the request and removes it from the list. +void ResourceDispatcherHost::RemovePendingRequest(int render_process_host_id, + int request_id) { + PendingRequestList::iterator i = pending_requests_.find( + GlobalRequestID(render_process_host_id, request_id)); + if (i == pending_requests_.end()) { + NOTREACHED() << "Trying to remove a request that's not here"; + return; + } + RemovePendingRequest(i); +} + +void ResourceDispatcherHost::RemovePendingRequest( + const PendingRequestList::iterator& iter) { + // Notify the login handler that this request object is going away. + ExtraRequestInfo* info = ExtraInfoForRequest(iter->second); + if (info && info->login_handler) + info->login_handler->OnRequestCancelled(); + + delete iter->second; + pending_requests_.erase(iter); + + // If we have no more pending requests, then stop the load state monitor + if (pending_requests_.empty()) + update_load_states_timer_.Stop(); +} + +// URLRequest::Delegate ------------------------------------------------------- + +void ResourceDispatcherHost::OnReceivedRedirect(URLRequest* request, + const GURL& new_url) { + RESOURCE_LOG("OnReceivedRedirect: " << request->url().spec()); + ExtraRequestInfo* info = ExtraInfoForRequest(request); + + DCHECK(request->status().is_success()); + + // TODO(mpcomplete): remove this when http://b/viewIssue?id=1080959 is fixed. + if (info->render_process_host_id != -1 && + !RendererSecurityPolicy::GetInstance()-> + CanRequestURL(info->render_process_host_id, new_url)) { + LOG(INFO) << "Denied unauthorized request for " << + new_url.possibly_invalid_spec(); + + // Tell the renderer that this request was disallowed. + CancelRequest(info->render_process_host_id, info->request_id, false); + return; + } + + NofityReceivedRedirect(request, info->render_process_host_id, new_url); + + if (HandleExternalProtocol(info->request_id, info->render_process_host_id, + info->render_view_id, new_url, + info->resource_type, info->resource_handler)) { + // The request is complete so we can remove it. + RemovePendingRequest(info->render_process_host_id, info->request_id); + return; + } + + if (!info->resource_handler->OnRequestRedirected(info->request_id, new_url)) + CancelRequest(info->render_process_host_id, info->request_id, false); +} + +void ResourceDispatcherHost::OnAuthRequired( + URLRequest* request, + net::AuthChallengeInfo* auth_info) { + // Create a login dialog on the UI thread to get authentication data, + // or pull from cache and continue on the IO thread. + // TODO(mpcomplete): We should block the parent tab while waiting for + // authentication. + // That would also solve the problem of the URLRequest being cancelled + // before we receive authentication. + ExtraRequestInfo* info = ExtraInfoForRequest(request); + DCHECK(!info->login_handler) << + "OnAuthRequired called with login_handler pending"; + info->login_handler = CreateLoginPrompt(auth_info, request, ui_loop_); +} + +void ResourceDispatcherHost::OnSSLCertificateError( + URLRequest* request, + int cert_error, + net::X509Certificate* cert) { + DCHECK(request); + SSLManager::OnSSLCertificateError(this, request, cert_error, cert, ui_loop_); +} + +void ResourceDispatcherHost::OnResponseStarted(URLRequest* request) { + RESOURCE_LOG("OnResponseStarted: " << request->url().spec()); + ExtraRequestInfo* info = ExtraInfoForRequest(request); + if (PauseRequestIfNeeded(info)) { + RESOURCE_LOG("OnResponseStarted pausing: " << request->url().spec()); + return; + } + + if (request->status().is_success()) { + // We want to send a final upload progress message prior to sending + // the response complete message even if we're waiting for an ack to + // to a previous upload progress message. + info->waiting_for_upload_progress_ack = false; + MaybeUpdateUploadProgress(info, request); + + if (!CompleteResponseStarted(request)) { + CancelRequest(info->render_process_host_id, info->request_id, false); + } else { + // Start reading. + int bytes_read = 0; + if (Read(request, &bytes_read)) { + OnReadCompleted(request, bytes_read); + } else if (!request->status().is_io_pending()) { + DCHECK(!info->is_paused); + // If the error is not an IO pending, then we're done reading. + OnResponseCompleted(request); + } + } + } else { + OnResponseCompleted(request); + } +} + +bool ResourceDispatcherHost::CompleteResponseStarted(URLRequest* request) { + ExtraRequestInfo* info = ExtraInfoForRequest(request); + + scoped_refptr<ResourceResponse> response(new ResourceResponse); + + response->response_head.status = request->status(); + response->response_head.request_time = request->request_time(); + response->response_head.response_time = request->response_time(); + response->response_head.headers = request->response_headers(); + request->GetCharset(&response->response_head.charset); + response->response_head.filter_policy = info->filter_policy; + response->response_head.content_length = request->GetExpectedContentSize(); + request->GetMimeType(&response->response_head.mime_type); + + if (request->ssl_info().cert) { + int cert_id = + CertStore::GetSharedInstance()->StoreCert( + request->ssl_info().cert, + info->render_process_host_id); + int cert_status = request->ssl_info().cert_status; + // EV certificate verification could be expensive. We don't want to spend + // time performing EV certificate verification on all resources because + // EV status is irrelevant to sub-frames and sub-resources. So we call + // IsEV here rather than in the network layer because the network layer + // doesn't know the resource type. + if (info->resource_type == ResourceType::MAIN_FRAME && + request->ssl_info().cert->IsEV(cert_status)) + cert_status |= net::CERT_STATUS_IS_EV; + + response->response_head.security_info = + SSLManager::SerializeSecurityInfo(cert_id, + cert_status, + request->ssl_info().security_bits); + } else { + // We should not have any SSL state. + DCHECK(!request->ssl_info().cert_status && + (request->ssl_info().security_bits == -1 || + request->ssl_info().security_bits == 0)); + } + + NotifyResponseStarted(request, info->render_process_host_id); + return info->resource_handler->OnResponseStarted(info->request_id, + response.get()); +} + +void ResourceDispatcherHost::BeginRequestInternal(URLRequest* request, + bool mixed_content) { + ExtraRequestInfo* info = ExtraInfoForRequest(request); + GlobalRequestID global_id(info->render_process_host_id, info->request_id); + pending_requests_[global_id] = request; + if (mixed_content) { + // We don't start the request in that case. The SSLManager will potentially + // change the request (potentially to indicate its content should be + // filtered) and start it itself. + SSLManager::OnMixedContentRequest(this, request, ui_loop_); + return; + } + request->Start(); + + // Make sure we have the load state monitor running + if (!update_load_states_timer_.IsRunning()) { + update_load_states_timer_.Start( + TimeDelta::FromMilliseconds(kUpdateLoadStatesIntervalMsec), + this, &ResourceDispatcherHost::UpdateLoadStates); + } +} + +// This test mirrors the decision that WebKit makes in +// WebFrameLoaderClient::dispatchDecidePolicyForMIMEType. +// static. +bool ResourceDispatcherHost::ShouldDownload( + const std::string& mime_type, const std::string& content_disposition) { + std::string type = StringToLowerASCII(mime_type); + std::string disposition = StringToLowerASCII(content_disposition); + + // First, examine content-disposition. + if (!disposition.empty()) { + bool should_download = true; + + // Some broken sites just send ... + // Content-Disposition: ; filename="file" + // ... screen those out here. + if (disposition[0] == ';') + should_download = false; + + if (disposition.compare(0, 6, "inline") == 0) + should_download = false; + + // Some broken sites just send ... + // Content-Disposition: filename="file" + // ... without a disposition token... Screen those out. + if (disposition.compare(0, 8, "filename") == 0) + should_download = false; + + // Also in use is Content-Disposition: name="file" + if (disposition.compare(0, 4, "name") == 0) + should_download = false; + + // We have a content-disposition of "attachment" or unknown. + // RFC 2183, section 2.8 says that an unknown disposition + // value should be treated as "attachment". + if (should_download) + return true; + } + + // MIME type checking. + if (net::IsSupportedMimeType(type)) + return false; + + // Finally, check the plugin service. + bool allow_wildcard = false; + return !plugin_service_->HavePluginFor(type, allow_wildcard); +} + +bool ResourceDispatcherHost::PauseRequestIfNeeded(ExtraRequestInfo* info) { + if (info->pause_count > 0) + info->is_paused = true; + + return info->is_paused; +} + +void ResourceDispatcherHost::ResumeRequest(const GlobalRequestID& request_id) { + PendingRequestList::iterator i = pending_requests_.find(request_id); + if (i == pending_requests_.end()) // The request may have been destroyed + return; + + URLRequest* request = i->second; + ExtraRequestInfo* info = ExtraInfoForRequest(request); + if (!info->is_paused) + return; + + RESOURCE_LOG("Resuming: " << i->second->url().spec()); + + info->is_paused = false; + + if (info->has_started_reading) + OnReadCompleted(i->second, info->paused_read_bytes); + else + OnResponseStarted(i->second); +} + +bool ResourceDispatcherHost::Read(URLRequest* request, int* bytes_read) { + ExtraRequestInfo* info = ExtraInfoForRequest(request); + DCHECK(!info->is_paused); + + char* buf; + int buf_size; + if (!info->resource_handler->OnWillRead(info->request_id, + &buf, &buf_size, -1)) { + return false; + } + + DCHECK(buf); + DCHECK(buf_size > 0); + + info->has_started_reading = true; + return request->Read(buf, buf_size, bytes_read); +} + +void ResourceDispatcherHost::OnReadCompleted(URLRequest* request, + int bytes_read) { + DCHECK(request); + RESOURCE_LOG("OnReadCompleted: " << request->url().spec()); + ExtraRequestInfo* info = ExtraInfoForRequest(request); + if (PauseRequestIfNeeded(info)) { + info->paused_read_bytes = bytes_read; + RESOURCE_LOG("OnReadCompleted pausing: " << request->url().spec()); + return; + } + + if (request->status().is_success() && CompleteRead(request, &bytes_read)) { + // The request can be paused if we realize that the renderer is not + // servicing messages fast enough. + if (info->pause_count == 0 && + Read(request, &bytes_read) && + request->status().is_success()) { + if (bytes_read == 0) { + CompleteRead(request, &bytes_read); + } else { + // Force the next CompleteRead / Read pair to run as a separate task. + // This avoids a fast, large network request from monopolizing the IO + // thread and starving other IO operations from running. + info->paused_read_bytes = bytes_read; + info->is_paused = true; + GlobalRequestID id(info->render_process_host_id, info->request_id); + MessageLoop::current()->PostTask( + FROM_HERE, + method_runner_.NewRunnableMethod( + &ResourceDispatcherHost::ResumeRequest, id)); + return; + } + } + } + + if (PauseRequestIfNeeded(info)) { + info->paused_read_bytes = bytes_read; + RESOURCE_LOG("OnReadCompleted (CompleteRead) pausing: " << + request->url().spec()); + return; + } + + // If the status is not IO pending then we've either finished (success) or we + // had an error. Either way, we're done! + if (!request->status().is_io_pending()) + OnResponseCompleted(request); +} + +bool ResourceDispatcherHost::CompleteRead(URLRequest* request, + int* bytes_read) { + if (!request->status().is_success()) { + NOTREACHED(); + return false; + } + + ExtraRequestInfo* info = ExtraInfoForRequest(request); + + if (!info->resource_handler->OnReadCompleted(info->request_id, bytes_read)) { + // Pass in false as the last arg to indicate we don't want |request| + // deleted. We do this as callers of us assume |request| is valid after we + // return. + CancelRequest(info->render_process_host_id, info->request_id, false, false); + return false; + } + + return *bytes_read != 0; +} + +void ResourceDispatcherHost::OnResponseCompleted(URLRequest* request) { + RESOURCE_LOG("OnResponseCompleted: " << request->url().spec()); + ExtraRequestInfo* info = ExtraInfoForRequest(request); + + if (info->resource_handler->OnResponseCompleted(info->request_id, + request->status())) { + NotifyResponseCompleted(request, info->render_process_host_id); + + // The request is complete so we can remove it. + RemovePendingRequest(info->render_process_host_id, info->request_id); + } + // If the handler's OnResponseCompleted returns false, we are deferring the + // call until later. We will notify the world and clean up when we resume. +} + +void ResourceDispatcherHost::AddObserver(Observer* obs) { + observer_list_.AddObserver(obs); +} + +void ResourceDispatcherHost::RemoveObserver(Observer* obs) { + observer_list_.RemoveObserver(obs); +} + +URLRequest* ResourceDispatcherHost::GetURLRequest( + GlobalRequestID request_id) const { + // This should be running in the IO loop. io_loop_ can be NULL during the + // unit_tests. + DCHECK(MessageLoop::current() == io_loop_ && io_loop_); + + PendingRequestList::const_iterator i = pending_requests_.find(request_id); + if (i == pending_requests_.end()) + return NULL; + + return i->second; +} + +// A NotificationTask proxies a resource dispatcher notification from the IO +// thread to the UI thread. It should be constructed on the IO thread and run +// in the UI thread. Takes ownership of |details|. +class NotificationTask : public Task { + public: + NotificationTask(NotificationType type, + URLRequest* request, + ResourceRequestDetails* details) + : type_(type), + details_(details) { + if (!tab_util::GetTabContentsID(request, + &render_process_host_id_, + &tab_contents_id_)) + NOTREACHED(); + } + + void Run() { + // Find the tab associated with this request. + TabContents* tab_contents = + tab_util::GetWebContentsByID(render_process_host_id_, tab_contents_id_); + + if (tab_contents) { + // Issue the notification. + NotificationService::current()-> + Notify(type_, + Source<NavigationController>(tab_contents->controller()), + Details<ResourceRequestDetails>(details_.get())); + } + } + + private: + // These IDs let us find the correct tab on the UI thread. + int render_process_host_id_; + int tab_contents_id_; + + // The type and details of the notification. + NotificationType type_; + scoped_ptr<ResourceRequestDetails> details_; +}; + +static int GetCertID(URLRequest* request, int render_process_host_id) { + if (request->ssl_info().cert) { + return CertStore::GetSharedInstance()->StoreCert(request->ssl_info().cert, + render_process_host_id); + } + // If there is no SSL info attached to this request, we must either be a non + // secure request, or the request has been canceled or failed (before the SSL + // info was populated), or the response is an error (we have seen 403, 404, + // and 501) made up by the proxy. + DCHECK(!request->url().SchemeIsSecure() || + (request->status().status() == URLRequestStatus::CANCELED) || + (request->status().status() == URLRequestStatus::FAILED) || + ((request->response_headers()->response_code() >= 400) && + (request->response_headers()->response_code() <= 599))); + return 0; +} + +void ResourceDispatcherHost::NotifyResponseStarted(URLRequest* request, + int render_process_host_id) { + // Notify the observers on the IO thread. + FOR_EACH_OBSERVER(Observer, observer_list_, OnRequestStarted(this, request)); + + // Notify the observers on the UI thread. + ui_loop_->PostTask(FROM_HERE, + new NotificationTask(NOTIFY_RESOURCE_RESPONSE_STARTED, request, + new ResourceRequestDetails(request, + GetCertID(request, render_process_host_id)))); +} + +void ResourceDispatcherHost::NotifyResponseCompleted( + URLRequest* request, + int render_process_host_id) { + // Notify the observers on the IO thread. + FOR_EACH_OBSERVER(Observer, observer_list_, + OnResponseCompleted(this, request)); + + // Notify the observers on the UI thread. + ui_loop_->PostTask(FROM_HERE, + new NotificationTask(NOTIFY_RESOURCE_RESPONSE_COMPLETED, request, + new ResourceRequestDetails(request, + GetCertID(request, render_process_host_id)))); +} + +void ResourceDispatcherHost::NofityReceivedRedirect(URLRequest* request, + int render_process_host_id, + const GURL& new_url) { + // Notify the observers on the IO thread. + FOR_EACH_OBSERVER(Observer, observer_list_, + OnReceivedRedirect(this, request, new_url)); + + int cert_id = GetCertID(request, render_process_host_id); + + // Notify the observers on the UI thread. + ui_loop_->PostTask(FROM_HERE, + new NotificationTask(NOTIFY_RESOURCE_RECEIVED_REDIRECT, request, + new ResourceRedirectDetails(request, + cert_id, + new_url))); +} + +namespace { + +// This function attempts to return the "more interesting" load state of |a| +// and |b|. We don't have temporal information about these load states +// (meaning we don't know when we transitioned into these states), so we just +// rank them according to how "interesting" the states are. +// +// We take advantage of the fact that the load states are an enumeration listed +// in the order in which they occur during the lifetime of a request, so we can +// regard states with larger numeric values as being further along toward +// completion. We regard those states as more interesting to report since they +// represent progress. +// +// For example, by this measure "tranferring data" is a more interesting state +// than "resolving host" because when we are transferring data we are actually +// doing something that corresponds to changes that the user might observe, +// whereas waiting for a host name to resolve implies being stuck. +// +net::LoadState MoreInterestingLoadState(net::LoadState a, net::LoadState b) { + return (a < b) ? b : a; +} + +// Carries information about a load state change. +struct LoadInfo { + GURL url; + net::LoadState load_state; +}; + +// Map from ProcessID+ViewID pair to LoadState +typedef std::map<std::pair<int, int>, LoadInfo> LoadInfoMap; + +// Used to marshall calls to LoadStateChanged from the IO to UI threads. We do +// them all as a single task to avoid spamming the UI thread. +class LoadInfoUpdateTask : public Task { + public: + virtual void Run() { + LoadInfoMap::const_iterator i; + for (i = info_map.begin(); i != info_map.end(); ++i) { + RenderViewHost* view = + RenderViewHost::FromID(i->first.first, i->first.second); + if (view) // The view could be gone at this point. + view->LoadStateChanged(i->second.url, i->second.load_state); + } + } + LoadInfoMap info_map; +}; + +} // namespace + +void ResourceDispatcherHost::UpdateLoadStates() { + // Populate this map with load state changes, and then send them on to the UI + // thread where they can be passed along to the respective RVHs. + LoadInfoMap info_map; + + PendingRequestList::const_iterator i; + for (i = pending_requests_.begin(); i != pending_requests_.end(); ++i) { + URLRequest* request = i->second; + net::LoadState load_state = request->GetLoadState(); + ExtraRequestInfo* info = ExtraInfoForRequest(request); + + // We also poll for upload progress on this timer and send upload + // progress ipc messages to the plugin process. + MaybeUpdateUploadProgress(info, request); + + if (info->last_load_state != load_state) { + info->last_load_state = load_state; + + std::pair<int, int> key(info->render_process_host_id, + info->render_view_id); + net::LoadState to_insert; + LoadInfoMap::iterator existing = info_map.find(key); + if (existing == info_map.end()) { + to_insert = load_state; + } else { + to_insert = + MoreInterestingLoadState(existing->second.load_state, load_state); + if (to_insert == existing->second.load_state) + continue; + } + LoadInfo& load_info = info_map[key]; + load_info.url = request->url(); + load_info.load_state = to_insert; + } + } + + if (info_map.empty()) + return; + + LoadInfoUpdateTask* task = new LoadInfoUpdateTask; + task->info_map.swap(info_map); + ui_loop_->PostTask(FROM_HERE, task); +} + +void ResourceDispatcherHost::MaybeUpdateUploadProgress(ExtraRequestInfo *info, + URLRequest *request) { + if (!info->upload_size || info->waiting_for_upload_progress_ack || + !(request->load_flags() & net::LOAD_ENABLE_UPLOAD_PROGRESS)) + return; + + uint64 size = info->upload_size; + uint64 position = request->GetUploadProgress(); + if (position == info->last_upload_position) + return; // no progress made since last time + + const uint64 kHalfPercentIncrements = 200; + const TimeDelta kOneSecond = TimeDelta::FromMilliseconds(1000); + + uint64 amt_since_last = position - info->last_upload_position; + TimeDelta time_since_last = TimeTicks::Now() - info->last_upload_ticks; + + bool is_finished = (size == position); + bool enough_new_progress = (amt_since_last > (size / kHalfPercentIncrements)); + bool too_much_time_passed = time_since_last > kOneSecond; + + if (is_finished || enough_new_progress || too_much_time_passed) { + info->resource_handler->OnUploadProgress(info->request_id, position, size); + info->waiting_for_upload_progress_ack = true; + info->last_upload_ticks = TimeTicks::Now(); + info->last_upload_position = position; + } +} diff --git a/chrome/browser/renderer_host/resource_dispatcher_host.h b/chrome/browser/renderer_host/resource_dispatcher_host.h new file mode 100644 index 0000000..f0b7f94 --- /dev/null +++ b/chrome/browser/renderer_host/resource_dispatcher_host.h @@ -0,0 +1,446 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +// This is the browser side of the resource dispatcher, it receives requests +// from the RenderProcessHosts, and dispatches them to URLRequests. It then +// fowards the messages from the URLRequests back to the correct process for +// handling. +// +// See http://dev.chromium.org/developers/design-documents/multi-process-resource-loading + +#ifndef CHROME_BROWSER_RENDERER_HOST_RESOURCE_DISPATCHER_HOST_H_ +#define CHROME_BROWSER_RENDERER_HOST_RESOURCE_DISPATCHER_HOST_H_ + +#include <map> +#include <string> + +#include "base/logging.h" +#include "base/observer_list.h" +#include "base/ref_counted.h" +#include "base/timer.h" +#include "chrome/browser/renderer_host/resource_handler.h" +#include "chrome/common/filter_policy.h" +#include "chrome/common/ipc_message.h" +#include "net/url_request/url_request.h" +#include "webkit/glue/resource_type.h" + +class CrossSiteResourceHandler; +class DownloadFileManager; +class DownloadRequestManager; +class LoginHandler; +class MessageLoop; +class PluginService; +class SafeBrowsingService; +class SaveFileManager; +class URLRequestContext; +struct ViewHostMsg_Resource_Request; + +class ResourceDispatcherHost : public URLRequest::Delegate { + public: + // Implemented by the client of ResourceDispatcherHost to receive messages in + // response to a resource load. The messages are intended to be forwarded to + // the ResourceDispatcher in the renderer process via an IPC channel that the + // client manages. + // + // NOTE: This class unfortunately cannot be named 'Delegate' because that + // conflicts with the name of ResourceDispatcherHost's base class. + // + // If the receiver is unable to send a given message (i.e., if Send returns + // false), then the ResourceDispatcherHost assumes the receiver has failed, + // and the given request will be dropped. (This happens, for example, when a + // renderer crashes and the channel dies). + typedef IPC::Message::Sender Receiver; + + // Holds the data we would like to associate with each request + class ExtraRequestInfo : public URLRequest::UserData { + friend class ResourceDispatcherHost; + public: + ExtraRequestInfo(ResourceHandler* handler, + int request_id, + int render_process_host_id, + int render_view_id, + bool mixed_content, + ResourceType::Type resource_type, + uint64 upload_size) + : resource_handler(handler), + cross_site_handler(NULL), + login_handler(NULL), + request_id(request_id), + render_process_host_id(render_process_host_id), + render_view_id(render_view_id), + is_download(false), + pause_count(0), + mixed_content(mixed_content), + resource_type(resource_type), + filter_policy(FilterPolicy::DONT_FILTER), + last_load_state(net::LOAD_STATE_IDLE), + pending_data_count(0), + upload_size(upload_size), + last_upload_position(0), + waiting_for_upload_progress_ack(false), + is_paused(false), + has_started_reading(false), + paused_read_bytes(0) { + } + + // Top-level ResourceHandler servicing this request. + scoped_refptr<ResourceHandler> resource_handler; + + // CrossSiteResourceHandler for this request, if it is a cross-site request. + // (NULL otherwise.) This handler is part of the chain of ResourceHandlers + // pointed to by resource_handler. + CrossSiteResourceHandler* cross_site_handler; + + LoginHandler* login_handler; + + int request_id; + + int render_process_host_id; + + int render_view_id; + + int pending_data_count; + + // Downloads allowed only as a top level request. + bool allow_download; + + // Whether this is a download. + bool is_download; + + // The number of clients that have called pause on this request. + int pause_count; + + // Whether this request is served over HTTP and the main page was served + // over HTTPS. + bool mixed_content; + + ResourceType::Type resource_type; + + // Whether the content for this request should be filtered (on the renderer + // side) to make it more secure: images are stamped, frame content is + // replaced with an error message and all other resources are entirely + // filtered out. + FilterPolicy::Type filter_policy; + + net::LoadState last_load_state; + + uint64 upload_size; + + uint64 last_upload_position; + + base::TimeTicks last_upload_ticks; + + bool waiting_for_upload_progress_ack; + + private: + // Request is temporarily not handling network data. Should be used only + // by the ResourceDispatcherHost, not the event handlers. + bool is_paused; + + // Whether this request has started reading any bytes from the response + // yet. Will be true after the first (unpaused) call to Read. + bool has_started_reading; + + // How many bytes have been read while this request has been paused. + int paused_read_bytes; + }; + + class Observer { + public: + virtual void OnRequestStarted(ResourceDispatcherHost* resource_dispatcher, + URLRequest* request) = 0; + virtual void OnResponseCompleted(ResourceDispatcherHost* resource_dispatcher, + URLRequest* request) = 0; + virtual void OnReceivedRedirect(ResourceDispatcherHost* resource_dispatcher, + URLRequest* request, + const GURL& new_url) = 0; + }; + + // Uniquely identifies a URLRequest. + struct GlobalRequestID { + GlobalRequestID() : render_process_host_id(-1), request_id(-1) { + } + GlobalRequestID(int render_process_host_id, int request_id) + : render_process_host_id(render_process_host_id), + request_id(request_id) { + } + + int render_process_host_id; + int request_id; + + bool operator<(const GlobalRequestID& other) const { + if (render_process_host_id == other.render_process_host_id) + return request_id < other.request_id; + return render_process_host_id < other.render_process_host_id; + } + }; + + explicit ResourceDispatcherHost(MessageLoop* io_loop); + ~ResourceDispatcherHost(); + + void Initialize(); + + // Puts the resource dispatcher host in an inactive state (unable to begin + // new requests). Cancels all pending requests. + void Shutdown(); + + // Begins a resource request with the given params on behalf of the specified + // render view. Responses will be dispatched through the given receiver. The + // RenderProcessHost ID is used to lookup TabContents from routing_id's. + // request_context is the cookie/cache context to be used for this request. + // + // If sync_result is non-null, then a SyncLoad reply will be generated, else + // a normal asynchronous set of response messages will be generated. + // + void BeginRequest(Receiver* receiver, + HANDLE render_process_handle, + int render_process_host_id, + int render_view_id, + int request_id, + const ViewHostMsg_Resource_Request& request, + URLRequestContext* request_context, + IPC::Message* sync_result); + + // Initiate a download from the browser process (as opposed to a resource + // request from the renderer). + void BeginDownload(const GURL& url, + const GURL& referrer, + int render_process_host_id, + int render_view_id, + URLRequestContext* request_context); + + // Initiate a save file from the browser process (as opposed to a resource + // request from the renderer). + void BeginSaveFile(const GURL& url, + const GURL& referrer, + int render_process_host_id, + int render_view_id, + URLRequestContext* request_context); + + // Cancels the given request if it still exists. We ignore cancels from the + // renderer in the event of a download. + void CancelRequest(int render_process_host_id, + int request_id, + bool from_renderer); + + // Decrements the pending_data_count for the request and resumes + // the request if it was paused due to too many pending data + // messages sent. + void OnDataReceivedACK(int render_process_host_id, int request_id); + + // Resets the waiting_for_upload_progress_ack flag. + void OnUploadProgressACK(int render_process_host_id, int request_id); + + // Returns true if it's ok to send the data. If there are already too many + // data messages pending, it pauses the request and returns false. In this + // case the caller should not send the data. + bool WillSendData(int render_process_host_id, int request_id); + + // Pauses or resumes network activity for a particular request. + void PauseRequest(int render_process_host_id, int request_id, bool pause); + + // Returns the number of pending requests. This is designed for the unittests + int pending_requests() const { + return static_cast<int>(pending_requests_.size()); + } + + DownloadFileManager* download_file_manager() const { + return download_file_manager_; + } + + DownloadRequestManager* download_request_manager() const { + return download_request_manager_.get(); + } + + SaveFileManager* save_file_manager() const { + return save_file_manager_; + } + + SafeBrowsingService* safe_browsing_service() const { + return safe_browsing_; + } + + MessageLoop* ui_loop() const { return ui_loop_; } + + // Called when the onunload handler for a cross-site request has finished. + void OnClosePageACK(int render_process_host_id, int request_id); + + // Force cancels any pending requests for the given process. + void CancelRequestsForProcess(int render_process_host_id); + + // Force cancels any pending requests for the given render view. This method + // acts like CancelRequestsForProcess when render_view_id is -1. + void CancelRequestsForRenderView(int render_process_host_id, + int render_view_id); + + // URLRequest::Delegate + virtual void OnReceivedRedirect(URLRequest* request, + const GURL& new_url); + virtual void OnAuthRequired(URLRequest* request, + net::AuthChallengeInfo* auth_info); + virtual void OnSSLCertificateError(URLRequest* request, + int cert_error, + net::X509Certificate* cert); + virtual void OnResponseStarted(URLRequest* request); + virtual void OnReadCompleted(URLRequest* request, int bytes_read); + void OnResponseCompleted(URLRequest* request); + + // Helper function to get our extra data out of a request. The given request + // must have been one we created so that it has the proper extra data pointer. + static ExtraRequestInfo* ExtraInfoForRequest(URLRequest* request) { + ExtraRequestInfo* r = static_cast<ExtraRequestInfo*>(request->user_data()); + DLOG_IF(WARNING, !r) << "Request doesn't seem to have our data"; + return r; + } + + static const ExtraRequestInfo* ExtraInfoForRequest(const URLRequest* request) { + const ExtraRequestInfo* r = + static_cast<const ExtraRequestInfo*>(request->user_data()); + DLOG_IF(WARNING, !r) << "Request doesn't seem to have our data"; + return r; + } + + // Add an observer. The observer will be called on the IO thread. To + // observe resource events on the UI thread, subscribe to the + // NOTIFY_RESOURCE_* notifications of the notification service. + void AddObserver(Observer* obs); + + // Remove an observer. + void RemoveObserver(Observer* obs); + + // Retrieves a URLRequest. Must be called from the IO thread. + URLRequest* GetURLRequest(GlobalRequestID request_id) const; + + // A test to determining whether a given request should be forwarded to the + // download thread. + bool ShouldDownload(const std::string& mime_type, + const std::string& content_disposition); + + // Notify our observers that a request has been cancelled. + void NotifyResponseCompleted(URLRequest* request, int render_process_host_id); + + void RemovePendingRequest(int render_process_host_id, int request_id); + + private: + class ShutdownTask; + + friend class ShutdownTask; + + // A shutdown helper that runs on the IO thread. + void OnShutdown(); + + // Returns true if the request is paused. + bool PauseRequestIfNeeded(ExtraRequestInfo* info); + + // Resumes the given request by calling OnResponseStarted or OnReadCompleted. + void ResumeRequest(const GlobalRequestID& request_id); + + // Reads data from the response using our internal buffer as async IO. + // Returns true if data is available immediately, false otherwise. If the + // return value is false, we will receive a OnReadComplete() callback later. + bool Read(URLRequest* request, int* bytes_read); + + // Internal function to finish an async IO which has completed. Returns + // true if there is more data to read (e.g. we haven't read EOF yet and + // no errors have occurred). + bool CompleteRead(URLRequest *, int* bytes_read); + + // Internal function to finish handling the ResponseStarted message. Returns + // true on success. + bool CompleteResponseStarted(URLRequest* request); + + // Cancels the given request if it still exists. We ignore cancels from the + // renderer in the event of a download. If |allow_delete| is true and no IO + // is pending, the request is removed and deleted. + void CancelRequest(int render_process_host_id, + int request_id, + bool from_renderer, + bool allow_delete); + + // Helper function for regular and download requests. + void BeginRequestInternal(URLRequest* request, bool mixed_content); + + // The list of all requests that we have pending. This list is not really + // optimized, and assumes that we have relatively few requests pending at once + // since some operations require brute-force searching of the list. + // + // It may be enhanced in the future to provide some kind of prioritization + // mechanism. We should also consider a hashtable or binary tree if it turns + // out we have a lot of things here. + typedef std::map<GlobalRequestID,URLRequest*> PendingRequestList; + + // Deletes the pending request identified by the iterator passed in. + // This function will invalidate the iterator passed in. Callers should + // not rely on this iterator being valid on return. + void RemovePendingRequest(const PendingRequestList::iterator& iter); + + // Notify our observers that we started receiving a response for a request. + void NotifyResponseStarted(URLRequest* request, int render_process_host_id); + + // Notify our observers that a request has been redirected. + void NofityReceivedRedirect(URLRequest* request, + int render_process_host_id, + const GURL& new_url); + + // Tries to handle the url with an external protocol. If the request is + // handled, the function returns true. False otherwise. + bool HandleExternalProtocol(int request_id, + int render_process_host_id, + int tab_contents_id, + const GURL& url, + ResourceType::Type resource_type, + ResourceHandler* handler); + + void UpdateLoadStates(); + + void MaybeUpdateUploadProgress(ExtraRequestInfo *info, URLRequest *request); + + PendingRequestList pending_requests_; + + // We cache the UI message loop so we can create new UI-related objects on it. + MessageLoop* ui_loop_; + + // We cache the IO loop to ensure that GetURLRequest is only called from the + // IO thread. + MessageLoop* io_loop_; + + // A timer that periodically calls UpdateLoadStates while pending_requests_ + // is not empty. + base::RepeatingTimer<ResourceDispatcherHost> update_load_states_timer_; + + // We own the download file writing thread and manager + scoped_refptr<DownloadFileManager> download_file_manager_; + + // Determines whether a download is allowed. + scoped_refptr<DownloadRequestManager> download_request_manager_; + + // We own the save file manager. + scoped_refptr<SaveFileManager> save_file_manager_; + + scoped_refptr<SafeBrowsingService> safe_browsing_; + + // Request ID for non-renderer initiated requests. request_ids generated by + // the renderer process are counted up from 0, while browser created requests + // start at -2 and go down from there. (We need to start at -2 because -1 is + // used as a special value all over the resource_dispatcher_host for + // uninitialized variables.) This way, we no longer have the unlikely (but + // observed in the real world!) event where we have two requests with the same + // request_id_. + int request_id_; + + // List of objects observing resource dispatching. + ObserverList<Observer> observer_list_; + + PluginService* plugin_service_; + + // For running tasks. + ScopedRunnableMethodFactory<ResourceDispatcherHost> method_runner_; + + // True if the resource dispatcher host has been shut down. + bool is_shutdown_; + + DISALLOW_COPY_AND_ASSIGN(ResourceDispatcherHost); +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_RESOURCE_DISPATCHER_HOST_H_ diff --git a/chrome/browser/renderer_host/resource_dispatcher_host_uitest.cc b/chrome/browser/renderer_host/resource_dispatcher_host_uitest.cc new file mode 100644 index 0000000..6d276ee --- /dev/null +++ b/chrome/browser/renderer_host/resource_dispatcher_host_uitest.cc @@ -0,0 +1,270 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include <sstream> +#include <string> + +#include "base/command_line.h" +#include "base/file_util.h" +#include "base/path_service.h" +#include "base/string_util.h" +#include "chrome/browser/automation/url_request_failed_dns_job.h" +#include "chrome/browser/automation/url_request_mock_http_job.h" +#include "chrome/common/chrome_switches.h" +#include "chrome/test/automation/browser_proxy.h" +#include "chrome/test/automation/tab_proxy.h" +#include "chrome/test/ui/ui_test.h" +#include "net/base/net_util.h" +#include "net/url_request/url_request_unittest.h" + +namespace { + +class ResourceDispatcherTest : public UITest { + public: + void CheckTitleTest(const std::wstring& file, + const std::wstring& expected_title) { + NavigateToURL(URLRequestMockHTTPJob::GetMockUrl(file)); + const int kCheckDelayMs = 100; + int max_wait_time = 5000; + while (max_wait_time > 0) { + max_wait_time -= kCheckDelayMs; + Sleep(kCheckDelayMs); + if (expected_title == GetActiveTabTitle()) + break; + } + + EXPECT_EQ(expected_title, GetActiveTabTitle()); + } + + protected: + ResourceDispatcherTest() : UITest() { + dom_automation_enabled_ = true; + } +}; + +} // namespace + +TEST_F(ResourceDispatcherTest, SniffHTMLWithNoContentType) { + CheckTitleTest(L"content-sniffer-test0.html", + L"Content Sniffer Test 0"); +} + +TEST_F(ResourceDispatcherTest, RespectNoSniffDirective) { + CheckTitleTest(L"nosniff-test.html", L""); +} + +TEST_F(ResourceDispatcherTest, DoNotSniffHTMLFromTextPlain) { + CheckTitleTest(L"content-sniffer-test1.html", L""); +} + +TEST_F(ResourceDispatcherTest, DoNotSniffHTMLFromImageGIF) { + CheckTitleTest(L"content-sniffer-test2.html", L""); +} + +TEST_F(ResourceDispatcherTest, SniffNoContentTypeNoData) { + CheckTitleTest(L"content-sniffer-test3.html", + L"Content Sniffer Test 3"); + Sleep(kWaitForActionMaxMsec / 2); + EXPECT_EQ(1, GetTabCount()); + + // Make sure the download shelf is not showing. + scoped_ptr<BrowserProxy> window(automation()->GetBrowserWindow(0)); + scoped_ptr<TabProxy> dl_tab(window->GetTab(0)); + ASSERT_TRUE(dl_tab.get()); + + bool visible = false; + ASSERT_TRUE(dl_tab->IsShelfVisible(&visible)); + EXPECT_FALSE(visible); +} + +TEST_F(ResourceDispatcherTest, ContentDispositionEmpty) { + CheckTitleTest(L"content-disposition-empty.html", L"success"); +} + +TEST_F(ResourceDispatcherTest, ContentDispositionInline) { + CheckTitleTest(L"content-disposition-inline.html", L"success"); +} + +// Test for bug #1091358. +TEST_F(ResourceDispatcherTest, SyncXMLHttpRequest) { + const wchar_t kDocRoot[] = L"chrome/test/data"; + TestServer server(kDocRoot); + + scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); + EXPECT_TRUE(browser_proxy.get()); + scoped_ptr<TabProxy> tab(browser_proxy->GetActiveTab()); + tab->NavigateToURL(server.TestServerPageW(L"files/sync_xmlhttprequest.html")); + + // Let's check the XMLHttpRequest ran successfully. + bool success = false; + EXPECT_TRUE(tab->ExecuteAndExtractBool(L"", + L"window.domAutomationController.send(DidSyncRequestSucceed());", + &success)); + EXPECT_TRUE(success); +} + +// Test for bug #1159553 -- A synchronous xhr (whose content-type is +// downloadable) would trigger download and hang the renderer process, +// if executed while navigating to a new page. +TEST_F(ResourceDispatcherTest, SyncXMLHttpRequestDuringUnload) { + const wchar_t kDocRoot[] = L"chrome/test/data"; + TestServer server(kDocRoot); + + scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); + EXPECT_TRUE(browser_proxy.get()); + scoped_ptr<TabProxy> tab(browser_proxy->GetActiveTab()); + + tab->NavigateToURL( + server.TestServerPageW(L"files/sync_xmlhttprequest_during_unload.html")); + + // Confirm that the page has loaded (since it changes its title during load). + std::wstring tab_title; + EXPECT_TRUE(tab->GetTabTitle(&tab_title)); + EXPECT_EQ(L"sync xhr on unload", tab_title); + + // Navigate to a new page, to dispatch unload event and trigger xhr. + // (the bug would make this step hang the renderer). + bool timed_out = false; + tab->NavigateToURLWithTimeout(server.TestServerPageW(L"files/title2.html"), + kWaitForActionMaxMsec, + &timed_out); + EXPECT_FALSE(timed_out); + + // Check that the new page got loaded, and that no download was triggered. + bool shelf_is_visible = false; + EXPECT_TRUE(tab->GetTabTitle(&tab_title)); + EXPECT_TRUE(tab->IsShelfVisible(&shelf_is_visible)); + EXPECT_EQ(L"Title Of Awesomeness", tab_title); + EXPECT_FALSE(shelf_is_visible); +} + +// Tests that onunload is run for cross-site requests. (Bug 1114994) +TEST_F(ResourceDispatcherTest, CrossSiteOnunloadCookie) { + const wchar_t kDocRoot[] = L"chrome/test/data"; + TestServer server(kDocRoot); + + scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); + EXPECT_TRUE(browser_proxy.get()); + scoped_ptr<TabProxy> tab(browser_proxy->GetActiveTab()); + + GURL url(server.TestServerPageW(L"files/onunload_cookie.html")); + tab->NavigateToURL(url); + + // Confirm that the page has loaded (since it changes its title during load). + std::wstring tab_title; + EXPECT_TRUE(tab->GetTabTitle(&tab_title)); + EXPECT_EQ(L"set cookie on unload", tab_title); + + // Navigate to a new cross-site page, to dispatch unload event and set the + // cookie. + CheckTitleTest(L"content-sniffer-test0.html", + L"Content Sniffer Test 0"); + + // Check that the cookie was set. + std::string value_result; + ASSERT_TRUE(tab->GetCookieByName(url, "onunloadCookie", &value_result)); + ASSERT_FALSE(value_result.empty()); + ASSERT_STREQ("foo", value_result.c_str()); +} + +// Tests that the onbeforeunload and onunload logic is shortcutted if the old +// renderer is gone. In that case, we don't want to wait for the old renderer +// to run the handlers. +TEST_F(ResourceDispatcherTest, CrossSiteAfterCrash) { + // This test only works in multi-process mode + if (in_process_renderer()) + return; + + scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); + EXPECT_TRUE(browser_proxy.get()); + scoped_ptr<TabProxy> tab(browser_proxy->GetActiveTab()); + + // Cause the renderer to crash. + expected_crashes_ = 1; + tab->NavigateToURLAsync(GURL("about:crash")); + Sleep(kWaitForActionMsec); // Wait for browser to notice the renderer crash. + + // Navigate to a new cross-site page. The browser should not wait around for + // the old renderer's on{before}unload handlers to run. + CheckTitleTest(L"content-sniffer-test0.html", + L"Content Sniffer Test 0"); +} + +// Tests that cross-site navigations work when the new page does not go through +// the BufferedEventHandler (e.g., non-http{s} URLs). (Bug 1225872) +TEST_F(ResourceDispatcherTest, CrossSiteNavigationNonBuffered) { + scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); + EXPECT_TRUE(browser_proxy.get()); + scoped_ptr<TabProxy> tab(browser_proxy->GetActiveTab()); + + // Start with an HTTP page. + CheckTitleTest(L"content-sniffer-test0.html", + L"Content Sniffer Test 0"); + + // Now load a file:// page, which does not use the BufferedEventHandler. + // Make sure that the page loads and displays a title, and doesn't get stuck. + std::wstring test_file = test_data_directory_; + file_util::AppendToPath(&test_file, L"title2.html"); + bool timed_out = false; + tab->NavigateToURLWithTimeout(net::FilePathToFileURL(test_file), + kWaitForActionMaxMsec, + &timed_out); + EXPECT_FALSE(timed_out); + EXPECT_EQ(L"Title Of Awesomeness", GetActiveTabTitle()); +} + +// Tests that a cross-site navigation to an error page (resulting in the link +// doctor page) still runs the onunload handler and can support navigations +// away from the link doctor page. (Bug 1235537) +TEST_F(ResourceDispatcherTest, CrossSiteNavigationErrorPage) { + const wchar_t kDocRoot[] = L"chrome/test/data"; + TestServer server(kDocRoot); + + scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); + EXPECT_TRUE(browser_proxy.get()); + scoped_ptr<TabProxy> tab(browser_proxy->GetActiveTab()); + + GURL url(server.TestServerPageW(L"files/onunload_cookie.html")); + tab->NavigateToURL(url); + + // Confirm that the page has loaded (since it changes its title during load). + std::wstring tab_title; + EXPECT_TRUE(tab->GetTabTitle(&tab_title)); + EXPECT_EQ(L"set cookie on unload", tab_title); + + // Navigate to a new cross-site URL that results in an error page. We must + // wait for the error page to update the title. + // TODO(creis): If this causes crashes or hangs, it might be for the same + // reason as ErrorPageTest::DNSError. See bug 1199491. + tab->NavigateToURL(GURL(URLRequestFailedDnsJob::kTestUrl)); + for (int i = 0; i < 10; ++i) { + Sleep(kWaitForActionMaxMsec / 10); + if (GetActiveTabTitle() != L"set cookie on unload") { + // Success, bail out. + break; + } + } + EXPECT_NE(L"set cookie on unload", GetActiveTabTitle()); + + // Check that the cookie was set, meaning that the onunload handler ran. + std::string value_result; + EXPECT_TRUE(tab->GetCookieByName(url, "onunloadCookie", &value_result)); + EXPECT_FALSE(value_result.empty()); + EXPECT_STREQ("foo", value_result.c_str()); + + // Check that renderer-initiated navigations still work. In a previous bug, + // the ResourceDispatcherHost would think that such navigations were + // cross-site, because we didn't clean up from the previous request. Since + // WebContents was in the NORMAL state, it would ignore the attempt to run + // the onunload handler, and the navigation would fail. + // (Test by redirecting to javascript:window.location='someURL'.) + GURL test_url(server.TestServerPageW(L"files/title2.html")); + std::wstring redirect_url = L"javascript:window.location='" + + ASCIIToWide(test_url.possibly_invalid_spec()) + L"'"; + tab->NavigateToURLAsync(GURL(redirect_url)); + Sleep(kWaitForActionMsec); // Wait for JavaScript redirect to happen. + EXPECT_TRUE(tab->GetTabTitle(&tab_title)); + EXPECT_EQ(L"Title Of Awesomeness", tab_title); +} + diff --git a/chrome/browser/renderer_host/resource_dispatcher_host_unittest.cc b/chrome/browser/renderer_host/resource_dispatcher_host_unittest.cc new file mode 100644 index 0000000..8ae6e1a --- /dev/null +++ b/chrome/browser/renderer_host/resource_dispatcher_host_unittest.cc @@ -0,0 +1,316 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include <vector> + +#include "base/message_loop.h" +#include "chrome/browser/renderer_security_policy.h" +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" +#include "chrome/common/render_messages.h" +#include "net/url_request/url_request.h" +#include "net/url_request/url_request_job.h" +#include "net/url_request/url_request_test_job.h" +#include "testing/gtest/include/gtest/gtest.h" + +static int RequestIDForMessage(const IPC::Message& msg) { + int request_id = -1; + switch (msg.type()) { + case ViewMsg_Resource_UploadProgress::ID: + case ViewMsg_Resource_ReceivedResponse::ID: + case ViewMsg_Resource_ReceivedRedirect::ID: + case ViewMsg_Resource_DataReceived::ID: + case ViewMsg_Resource_RequestComplete::ID: + request_id = IPC::MessageIterator(msg).NextInt(); + break; + } + return request_id; +} + +static ViewHostMsg_Resource_Request CreateResourceRequest(const char* method, + const GURL& url) { + ViewHostMsg_Resource_Request request; + request.method = std::string(method); + request.url = url; + request.policy_url = url; // bypass third-party cookie blocking + // init the rest to default values to prevent getting UMR. + request.load_flags = 0; + request.origin_pid = 0; + request.resource_type = ResourceType::SUB_RESOURCE; + request.mixed_content = false; + return request; +} + +// We may want to move this to a shared space if it is useful for something else +class ResourceIPCAccumulator { + public: + void AddMessage(const IPC::Message& msg) { + messages_.push_back(msg); + } + + // This groups the messages by their request ID. The groups will be in order + // that the first message for each request ID was received, and the messages + // within the groups will be in the order that they appeared. + typedef std::vector< std::vector<IPC::Message> > ClassifiedMessages; + void GetClassifiedMessages(ClassifiedMessages* msgs); + + std::vector<IPC::Message> messages_; +}; + +// This is very inefficient as a result of repeatedly extracting the ID, use +// only for tests! +void ResourceIPCAccumulator::GetClassifiedMessages(ClassifiedMessages* msgs) { + while (!messages_.empty()) { + std::vector<IPC::Message> cur_requests; + cur_requests.push_back(messages_[0]); + int cur_id = RequestIDForMessage(messages_[0]); + + // find all other messages with this ID + for (int i = 1; i < static_cast<int>(messages_.size()); i++) { + int id = RequestIDForMessage(messages_[i]); + if (id == cur_id) { + cur_requests.push_back(messages_[i]); + messages_.erase(messages_.begin() + i); + i --; + } + } + messages_.erase(messages_.begin()); + msgs->push_back(cur_requests); + } +} + +class ResourceDispatcherHostTest : public testing::Test, + public ResourceDispatcherHost::Receiver { + public: + ResourceDispatcherHostTest() : host_(NULL) { + } + // ResourceDispatcherHost::Delegate implementation + virtual bool Send(IPC::Message* msg) { + accum_.AddMessage(*msg); + delete msg; + return true; + } + + protected: + // testing::Test + virtual void SetUp() { + RendererSecurityPolicy::GetInstance()->Add(0); + URLRequest::RegisterProtocolFactory("test", &URLRequestTestJob::Factory); + EnsureTestSchemeIsAllowed(); + } + virtual void TearDown() { + URLRequest::RegisterProtocolFactory("test", NULL); + RendererSecurityPolicy::GetInstance()->Remove(0); + + // Flush the message loop to make Purify happy. + message_loop_.RunAllPending(); + } + + void MakeTestRequest(int request_id, const GURL& url); + void MakeCancelRequest(int request_id); + + void EnsureTestSchemeIsAllowed() { + static bool have_white_listed_test_scheme = false; + + if (!have_white_listed_test_scheme) { + RendererSecurityPolicy::GetInstance()->RegisterWebSafeScheme("test"); + have_white_listed_test_scheme = true; + } + } + + MessageLoopForIO message_loop_; + ResourceDispatcherHost host_; + ResourceIPCAccumulator accum_; +}; + +// Spin up the message loop to kick off the request. +static void KickOffRequest() { + MessageLoop::current()->RunAllPending(); +} + +void ResourceDispatcherHostTest::MakeTestRequest(int request_id, + const GURL& url) { + ViewHostMsg_Resource_Request request = CreateResourceRequest("GET", url); + + host_.BeginRequest(this, GetCurrentProcess(), 0, MSG_ROUTING_NONE, + request_id, request, NULL, NULL); + KickOffRequest(); +} + +void ResourceDispatcherHostTest::MakeCancelRequest(int request_id) { + host_.CancelRequest(0, request_id, false); +} + +void CheckSuccessfulRequest(const std::vector<IPC::Message>& messages, + const std::string& reference_data) { + // A successful request will have received 4 messages: + // ReceivedResponse (indicates headers received) + // DataReceived (data) + // XXX DataReceived (0 bytes remaining from a read) + // RequestComplete (request is done) + // + // This function verifies that we received 4 messages and that they + // are appropriate. + ASSERT_EQ(messages.size(), 3); + + // The first messages should be received response + ASSERT_EQ(ViewMsg_Resource_ReceivedResponse::ID, messages[0].type()); + + // followed by the data, currently we only do the data in one chunk, but + // should probably test multiple chunks later + ASSERT_EQ(ViewMsg_Resource_DataReceived::ID, messages[1].type()); + + void* iter = NULL; + int request_id; + ASSERT_TRUE(IPC::ReadParam(&messages[1], &iter, &request_id)); + base::SharedMemoryHandle shm_handle; + ASSERT_TRUE(IPC::ReadParam(&messages[1], &iter, &shm_handle)); + int data_len; + ASSERT_TRUE(IPC::ReadParam(&messages[1], &iter, &data_len)); + + ASSERT_EQ(reference_data.size(), data_len); + base::SharedMemory shared_mem(shm_handle, true); // read only + shared_mem.Map(data_len); + const char* data = static_cast<char*>(shared_mem.memory()); + ASSERT_EQ(0, memcmp(reference_data.c_str(), data, data_len)); + + // followed by a 0-byte read + //ASSERT_EQ(ViewMsg_Resource_DataReceived::ID, messages[2].type()); + + // the last message should be all data received + ASSERT_EQ(ViewMsg_Resource_RequestComplete::ID, messages[2].type()); +} + +// Tests whether many messages get dispatched properly. +TEST_F(ResourceDispatcherHostTest, TestMany) { + MakeTestRequest(1, URLRequestTestJob::test_url_1()); + MakeTestRequest(2, URLRequestTestJob::test_url_2()); + MakeTestRequest(3, URLRequestTestJob::test_url_3()); + + // flush all the pending requests + while (URLRequestTestJob::ProcessOnePendingMessage()); + + // sorts out all the messages we saw by request + ResourceIPCAccumulator::ClassifiedMessages msgs; + accum_.GetClassifiedMessages(&msgs); + + // there are three requests, so we should have gotten them classified as such + ASSERT_EQ(3, msgs.size()); + + CheckSuccessfulRequest(msgs[0], URLRequestTestJob::test_data_1()); + CheckSuccessfulRequest(msgs[1], URLRequestTestJob::test_data_2()); + CheckSuccessfulRequest(msgs[2], URLRequestTestJob::test_data_3()); +} + +// Tests whether messages get canceled properly. We issue three requests, +// cancel one of them, and make sure that each sent the proper notifications. +TEST_F(ResourceDispatcherHostTest, Cancel) { + ResourceDispatcherHost host(NULL); + + MakeTestRequest(1, URLRequestTestJob::test_url_1()); + MakeTestRequest(2, URLRequestTestJob::test_url_2()); + MakeTestRequest(3, URLRequestTestJob::test_url_3()); + MakeCancelRequest(2); + + // flush all the pending requests + while (URLRequestTestJob::ProcessOnePendingMessage()); + + ResourceIPCAccumulator::ClassifiedMessages msgs; + accum_.GetClassifiedMessages(&msgs); + + // there are three requests, so we should have gotten them classified as such + ASSERT_EQ(3, msgs.size()); + + CheckSuccessfulRequest(msgs[0], URLRequestTestJob::test_data_1()); + CheckSuccessfulRequest(msgs[2], URLRequestTestJob::test_data_3()); + + // Check that request 2 got canceled before it finished reading, which gives + // us 1 ReceivedResponse message. + ASSERT_EQ(1, msgs[1].size()); + ASSERT_EQ(ViewMsg_Resource_ReceivedResponse::ID, msgs[1][0].type()); + + // TODO(mbelshe): + // Now that the async IO path is in place, the IO always completes on the + // initial call; so the cancel doesn't arrive until after we finished. + // This basically means the test doesn't work. +#if 0 + int request_id; + URLRequestStatus status; + + // The message should be all data received with an error. + ASSERT_EQ(ViewMsg_Resource_RequestComplete::ID, msgs[1][2].type()); + + void* iter = NULL; + ASSERT_TRUE(IPC::ReadParam(&msgs[1][2], &iter, &request_id)); + ASSERT_TRUE(IPC::ReadParam(&msgs[1][2], &iter, &status)); + + EXPECT_EQ(URLRequestStatus::CANCELED, status.status()); +#endif +} + +// Tests CancelRequestsForProcess +TEST_F(ResourceDispatcherHostTest, TestProcessCancel) { + // the host delegate acts as a second one so we can have some requests + // pending and some canceled + class TestReceiver : public ResourceDispatcherHost::Receiver { + public: + TestReceiver() : has_canceled_(false), received_after_canceled_(0) { + } + virtual bool Send(IPC::Message* msg) { + // no messages should be received when the process has been canceled + if (has_canceled_) + received_after_canceled_ ++; + delete msg; + return true; + } + bool has_canceled_; + int received_after_canceled_; + }; + TestReceiver test_receiver; + + // request 1 goes to the test delegate + ViewHostMsg_Resource_Request request = + CreateResourceRequest("GET", URLRequestTestJob::test_url_1()); + + host_.BeginRequest(&test_receiver, GetCurrentProcess(), 0, MSG_ROUTING_NONE, + 1, request, NULL, NULL); + KickOffRequest(); + + // request 2 goes to us + MakeTestRequest(2, URLRequestTestJob::test_url_2()); + + // request 3 goes to the test delegate + request.url = URLRequestTestJob::test_url_3(); + host_.BeginRequest(&test_receiver, GetCurrentProcess(), 0, MSG_ROUTING_NONE, + 3, request, NULL, NULL); + KickOffRequest(); + + // TODO: mbelshe + // Now that the async IO path is in place, the IO always completes on the + // initial call; so the requests have already completed. This basically + // breaks the whole test. + //EXPECT_EQ(3, host_.pending_requests()); + + // process each request for one level so one callback is called + for (int i = 0; i < 3; i++) + EXPECT_TRUE(URLRequestTestJob::ProcessOnePendingMessage()); + + // cancel the requests to the test process + host_.CancelRequestsForProcess(0); + test_receiver.has_canceled_ = true; + + // flush all the pending requests + while (URLRequestTestJob::ProcessOnePendingMessage()); + + EXPECT_EQ(0, host_.pending_requests()); + + // the test delegate should not have gotten any messages after being canceled + ASSERT_EQ(0, test_receiver.received_after_canceled_); + + // we should have gotten exactly one result + ResourceIPCAccumulator::ClassifiedMessages msgs; + accum_.GetClassifiedMessages(&msgs); + ASSERT_EQ(1, msgs.size()); + CheckSuccessfulRequest(msgs[0], URLRequestTestJob::test_data_2()); +} + diff --git a/chrome/browser/renderer_host/resource_handler.h b/chrome/browser/renderer_host/resource_handler.h new file mode 100644 index 0000000..a6955c7 --- /dev/null +++ b/chrome/browser/renderer_host/resource_handler.h @@ -0,0 +1,67 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +// This is the browser side of the resource dispatcher, it receives requests +// from the RenderProcessHosts, and dispatches them to URLRequests. It then +// fowards the messages from the URLRequests back to the correct process for +// handling. +// +// See http://dev.chromium.org/developers/design-documents/multi-process-resource-loading + +#ifndef CHROME_BROWSER_RENDERER_HOST_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_RESOURCE_HANDLER_H_ + +#include "base/basictypes.h" +#include "base/ref_counted.h" +#include "chrome/common/render_messages.h" +#include "googleurl/src/gurl.h" +#include "net/url_request/url_request.h" + +// Simple wrapper that refcounts ViewMsg_Resource_ResponseHead. +struct ResourceResponse : public base::RefCounted<ResourceResponse> { + ViewMsg_Resource_ResponseHead response_head; +}; + +// The resource dispatcher host uses this interface to push load events to the +// renderer, allowing for differences in the types of IPC messages generated. +// See the implementations of this interface defined below. +class ResourceHandler : public base::RefCounted<ResourceHandler> { + public: + virtual ~ResourceHandler() {} + + // Called as upload progress is made. + virtual bool OnUploadProgress(int request_id, + uint64 position, + uint64 size) { + return true; + } + + // The request was redirected to a new URL. + virtual bool OnRequestRedirected(int request_id, const GURL& url) = 0; + + // Response headers and meta data are available. + virtual bool OnResponseStarted(int request_id, + ResourceResponse* response) = 0; + + // Data will be read for the response. Upon success, this method places the + // size and address of the buffer where the data is to be written in its + // out-params. This call will be followed by either OnReadCompleted or + // OnResponseCompleted, at which point the buffer may be recycled. + virtual bool OnWillRead(int request_id, + char** buf, + int* buf_size, + int min_size) = 0; + + // Data (*bytes_read bytes) was written into the buffer provided by + // OnWillRead. A return value of false cancels the request, true continues + // reading data. + virtual bool OnReadCompleted(int request_id, int* bytes_read) = 0; + + // The response is complete. The final response status is given. + // Returns false if the handler is deferring the call to a later time. + virtual bool OnResponseCompleted(int request_id, + const URLRequestStatus& status) = 0; +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/safe_browsing_resource_handler.cc b/chrome/browser/renderer_host/safe_browsing_resource_handler.cc new file mode 100644 index 0000000..d9e70a4 --- /dev/null +++ b/chrome/browser/renderer_host/safe_browsing_resource_handler.cc @@ -0,0 +1,179 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/safe_browsing_resource_handler.h" + +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" + +// Maximum time to wait for a gethash response from the Safe Browsing servers. +static const int kMaxGetHashMs = 1000; + +SafeBrowsingResourceHandler::SafeBrowsingResourceHandler( + ResourceHandler* handler, + int render_process_host_id, + int render_view_id, + const GURL& url, + ResourceType::Type resource_type, + SafeBrowsingService* safe_browsing, + ResourceDispatcherHost* resource_dispatcher_host) + : next_handler_(handler), + render_process_host_id_(render_process_host_id), + render_view_id_(render_view_id), + paused_request_id_(-1), + safe_browsing_(safe_browsing), + in_safe_browsing_check_(false), + displaying_blocking_page_(false), + rdh_(resource_dispatcher_host), + queued_error_request_id_(-1), + resource_type_(resource_type) { + if (safe_browsing_->CheckUrl(url, this)) { + safe_browsing_result_ = SafeBrowsingService::URL_SAFE; + safe_browsing_->LogPauseDelay(base::TimeDelta()); // No delay. + } else { + AddRef(); + in_safe_browsing_check_ = true; + // Can't pause now because it's too early, so we'll do it in OnWillRead. + } +} + +bool SafeBrowsingResourceHandler::OnUploadProgress(int request_id, + uint64 position, + uint64 size) { + return next_handler_->OnUploadProgress(request_id, position, size); +} + +bool SafeBrowsingResourceHandler::OnRequestRedirected(int request_id, + const GURL& new_url) { + if (in_safe_browsing_check_) { + Release(); + in_safe_browsing_check_ = false; + safe_browsing_->CancelCheck(this); + } + + if (safe_browsing_->CheckUrl(new_url, this)) { + safe_browsing_result_ = SafeBrowsingService::URL_SAFE; + safe_browsing_->LogPauseDelay(base::TimeDelta()); // No delay. + } else { + AddRef(); + in_safe_browsing_check_ = true; + // Can't pause now because it's too early, so we'll do it in OnWillRead. + } + + return next_handler_->OnRequestRedirected(request_id, new_url); +} + +bool SafeBrowsingResourceHandler::OnResponseStarted( + int request_id, ResourceResponse* response) { + return next_handler_->OnResponseStarted(request_id, response); +} + +void SafeBrowsingResourceHandler::OnGetHashTimeout() { + if (!in_safe_browsing_check_) + return; + + safe_browsing_->CancelCheck(this); + OnUrlCheckResult(GURL::EmptyGURL(), SafeBrowsingService::URL_SAFE); +} + +bool SafeBrowsingResourceHandler::OnWillRead(int request_id, + char** buf, int* buf_size, + int min_size) { + if (in_safe_browsing_check_ && pause_time_.is_null()) { + pause_time_ = base::Time::Now(); + MessageLoop::current()->PostDelayedTask( + FROM_HERE, + NewRunnableMethod(this, &SafeBrowsingResourceHandler::OnGetHashTimeout), + kMaxGetHashMs); + } + + if (in_safe_browsing_check_ || displaying_blocking_page_) { + rdh_->PauseRequest(render_process_host_id_, request_id, true); + paused_request_id_ = request_id; + } + + return next_handler_->OnWillRead(request_id, buf, buf_size, min_size); +} + +bool SafeBrowsingResourceHandler::OnReadCompleted(int request_id, + int* bytes_read) { + return next_handler_->OnReadCompleted(request_id, bytes_read); +} + +bool SafeBrowsingResourceHandler::OnResponseCompleted( + int request_id, const URLRequestStatus& status) { + if ((in_safe_browsing_check_ || + safe_browsing_result_ != SafeBrowsingService::URL_SAFE) && + status.status() == URLRequestStatus::FAILED && + status.os_error() == net::ERR_NAME_NOT_RESOLVED) { + // Got a DNS error while the safebrowsing check is in progress or we + // already know that the site is unsafe. Don't show the the dns error + // page. + queued_error_.reset(new URLRequestStatus(status)); + queued_error_request_id_ = request_id; + return true; + } + + return next_handler_->OnResponseCompleted(request_id, status); +} + +// SafeBrowsingService::Client implementation, called on the IO thread once +// the URL has been classified. +void SafeBrowsingResourceHandler::OnUrlCheckResult( + const GURL& url, SafeBrowsingService::UrlCheckResult result) { + DCHECK(in_safe_browsing_check_); + DCHECK(!displaying_blocking_page_); + + safe_browsing_result_ = result; + in_safe_browsing_check_ = false; + + if (result == SafeBrowsingService::URL_SAFE) { + if (paused_request_id_ != -1) { + rdh_->PauseRequest(render_process_host_id_, paused_request_id_, false); + paused_request_id_ = -1; + } + + base::TimeDelta pause_delta; + if (!pause_time_.is_null()) + pause_delta = base::Time::Now() - pause_time_; + safe_browsing_->LogPauseDelay(pause_delta); + + if (queued_error_.get()) { + next_handler_->OnResponseCompleted( + queued_error_request_id_, *queued_error_.get()); + queued_error_.reset(); + } + + Release(); + } else { + displaying_blocking_page_ = true; + safe_browsing_->DisplayBlockingPage( + url, resource_type_, result, this, rdh_->ui_loop(), + render_process_host_id_, render_view_id_); + } +} + +// SafeBrowsingService::Client implementation, called on the IO thread when +// the user has decided to proceed with the current request, or go back. +void SafeBrowsingResourceHandler::OnBlockingPageComplete(bool proceed) { + DCHECK(displaying_blocking_page_); + displaying_blocking_page_ = false; + + if (proceed) { + safe_browsing_result_ = SafeBrowsingService::URL_SAFE; + if (paused_request_id_ != -1) { + rdh_->PauseRequest(render_process_host_id_, paused_request_id_, false); + paused_request_id_ = -1; + } + + if (queued_error_.get()) { + next_handler_->OnResponseCompleted( + queued_error_request_id_, *queued_error_.get()); + queued_error_.reset(); + } + } else { + rdh_->CancelRequest(render_process_host_id_, paused_request_id_, false); + } + + Release(); +} diff --git a/chrome/browser/renderer_host/safe_browsing_resource_handler.h b/chrome/browser/renderer_host/safe_browsing_resource_handler.h new file mode 100644 index 0000000..244df8b --- /dev/null +++ b/chrome/browser/renderer_host/safe_browsing_resource_handler.h @@ -0,0 +1,63 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_SAFE_BROWSING_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_SAFE_BROWSING_RESOURCE_HANDLER_H_ + +#include "base/time.h" +#include "chrome/browser/renderer_host/resource_handler.h" +#include "chrome/browser/safe_browsing/safe_browsing_service.h" + +class ResourceDispatcherHost; + +// Checks that a url is safe. +class SafeBrowsingResourceHandler : public ResourceHandler, + public SafeBrowsingService::Client { + public: + SafeBrowsingResourceHandler(ResourceHandler* handler, + int render_process_host_id, + int render_view_id, + const GURL& url, + ResourceType::Type resource_type, + SafeBrowsingService* safe_browsing, + ResourceDispatcherHost* resource_dispatcher_host); + + // ResourceHandler implementation: + bool OnUploadProgress(int request_id, uint64 position, uint64 size); + bool OnRequestRedirected(int request_id, const GURL& new_url); + bool OnResponseStarted(int request_id, ResourceResponse* response); + void OnGetHashTimeout(); + bool OnWillRead(int request_id, char** buf, int* buf_size, int min_size); + bool OnReadCompleted(int request_id, int* bytes_read); + bool OnResponseCompleted(int request_id, const URLRequestStatus& status); + + // SafeBrowsingService::Client implementation, called on the IO thread once + // the URL has been classified. + void OnUrlCheckResult(const GURL& url, + SafeBrowsingService::UrlCheckResult result); + + // SafeBrowsingService::Client implementation, called on the IO thread when + // the user has decided to proceed with the current request, or go back. + void OnBlockingPageComplete(bool proceed); + + private: + scoped_refptr<ResourceHandler> next_handler_; + int render_process_host_id_; + int render_view_id_; + int paused_request_id_; // -1 if not paused + bool in_safe_browsing_check_; + bool displaying_blocking_page_; + SafeBrowsingService::UrlCheckResult safe_browsing_result_; + scoped_refptr<SafeBrowsingService> safe_browsing_; + scoped_ptr<URLRequestStatus> queued_error_; + int queued_error_request_id_; + ResourceDispatcherHost* rdh_; + base::Time pause_time_; + ResourceType::Type resource_type_; + + DISALLOW_COPY_AND_ASSIGN(SafeBrowsingResourceHandler); +}; + + +#endif // CHROME_BROWSER_RENDERER_HOST_SAFE_BROWSING_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/save_file_resource_handler.cc b/chrome/browser/renderer_host/save_file_resource_handler.cc new file mode 100644 index 0000000..420b28a --- /dev/null +++ b/chrome/browser/renderer_host/save_file_resource_handler.cc @@ -0,0 +1,85 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/save_file_resource_handler.h" + +#include "chrome/browser/download/save_file_manager.h" + +SaveFileResourceHandler::SaveFileResourceHandler(int render_process_host_id, + int render_view_id, + const std::string& url, + SaveFileManager* manager) + : save_id_(-1), + render_process_id_(render_process_host_id), + render_view_id_(render_view_id), + read_buffer_(NULL), + url_(UTF8ToWide(url)), + content_length_(0), + save_manager_(manager) { +} + +bool SaveFileResourceHandler::OnRequestRedirected(int request_id, + const GURL& url) { + final_url_ = UTF8ToWide(url.spec()); + return true; +} + +bool SaveFileResourceHandler::OnResponseStarted(int request_id, + ResourceResponse* response) { + save_id_ = save_manager_->GetNextId(); + // |save_manager_| consumes (deletes): + SaveFileCreateInfo* info = new SaveFileCreateInfo; + info->url = url_; + info->final_url = final_url_; + info->total_bytes = content_length_; + info->save_id = save_id_; + info->render_process_id = render_process_id_; + info->render_view_id = render_view_id_; + info->request_id = request_id; + info->content_disposition = content_disposition_; + info->save_source = SaveFileCreateInfo::SAVE_FILE_FROM_NET; + save_manager_->GetSaveLoop()->PostTask(FROM_HERE, + NewRunnableMethod(save_manager_, + &SaveFileManager::StartSave, + info)); + return true; +} + +bool SaveFileResourceHandler::OnWillRead(int request_id, + char** buf, int* buf_size, + int min_size) { + DCHECK(buf && buf_size); + if (!read_buffer_) { + *buf_size = min_size < 0 ? kReadBufSize : min_size; + read_buffer_ = new char[*buf_size]; + } + *buf = read_buffer_; + return true; +} + +bool SaveFileResourceHandler::OnReadCompleted(int request_id, int* bytes_read) { + DCHECK(read_buffer_); + save_manager_->GetSaveLoop()->PostTask(FROM_HERE, + NewRunnableMethod(save_manager_, + &SaveFileManager::UpdateSaveProgress, + save_id_, + read_buffer_, + *bytes_read)); + read_buffer_ = NULL; + return true; +} + +bool SaveFileResourceHandler::OnResponseCompleted( + int request_id, + const URLRequestStatus& status) { + save_manager_->GetSaveLoop()->PostTask(FROM_HERE, + NewRunnableMethod(save_manager_, + &SaveFileManager::SaveFinished, + save_id_, + url_, + render_process_id_, + status.is_success() && !status.is_io_pending())); + delete [] read_buffer_; + return true; +} diff --git a/chrome/browser/renderer_host/save_file_resource_handler.h b/chrome/browser/renderer_host/save_file_resource_handler.h new file mode 100644 index 0000000..87f06ae --- /dev/null +++ b/chrome/browser/renderer_host/save_file_resource_handler.h @@ -0,0 +1,64 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_SAVE_FILE_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_SAVE_FILE_RESOURCE_HANDLER_H_ + +#include <string> + +#include "chrome/browser/renderer_host/resource_handler.h" + +class SaveFileManager; + +// Forwards data to the save thread. +class SaveFileResourceHandler : public ResourceHandler { + public: + SaveFileResourceHandler(int render_process_host_id, + int render_view_id, + const std::string& url, + SaveFileManager* manager); + + // Saves the redirected URL to final_url_, we need to use the original + // URL to match original request. + bool OnRequestRedirected(int request_id, const GURL& url); + + // Sends the download creation information to the download thread. + bool OnResponseStarted(int request_id, ResourceResponse* response); + + // Creates a new buffer, which will be handed to the download thread for file + // writing and deletion. + bool OnWillRead(int request_id, char** buf, int* buf_size, int min_size); + + // Passes the buffer to the download file writer. + bool OnReadCompleted(int request_id, int* bytes_read); + + bool OnResponseCompleted(int request_id, const URLRequestStatus& status); + + // If the content-length header is not present (or contains something other + // than numbers), StringToInt64 returns 0, which indicates 'unknown size' and + // is handled correctly by the SaveManager. + void set_content_length(const std::string& content_length) { + content_length_ = StringToInt64(content_length); + } + + void set_content_disposition(const std::string& content_disposition) { + content_disposition_ = content_disposition; + } + + private: + int save_id_; + int render_process_id_; + int render_view_id_; + char* read_buffer_; + std::string content_disposition_; + std::wstring url_; + std::wstring final_url_; + int64 content_length_; + SaveFileManager* save_manager_; + + static const int kReadBufSize = 32768; // bytes + + DISALLOW_COPY_AND_ASSIGN(SaveFileResourceHandler); +}; +#endif // CHROME_BROWSER_RENDERER_HOST_SAVE_FILE_RESOURCE_HANDLER_H_ diff --git a/chrome/browser/renderer_host/sync_resource_handler.cc b/chrome/browser/renderer_host/sync_resource_handler.cc new file mode 100644 index 0000000..aace1c1 --- /dev/null +++ b/chrome/browser/renderer_host/sync_resource_handler.cc @@ -0,0 +1,54 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/renderer_host/sync_resource_handler.h" + +SyncResourceHandler::SyncResourceHandler( + ResourceDispatcherHost::Receiver* receiver, + const GURL& url, + IPC::Message* result_message) + : receiver_(receiver), + result_message_(result_message) { + result_.final_url = url; + result_.filter_policy = FilterPolicy::DONT_FILTER; +} + +bool SyncResourceHandler::OnRequestRedirected(int request_id, + const GURL& new_url) { + result_.final_url = new_url; + return true; +} + +bool SyncResourceHandler::OnResponseStarted(int request_id, + ResourceResponse* response) { + // We don't care about copying the status here. + result_.headers = response->response_head.headers; + result_.mime_type = response->response_head.mime_type; + result_.charset = response->response_head.charset; + return true; +} + +bool SyncResourceHandler::OnWillRead(int request_id, + char** buf, int* buf_size, int min_size) { + DCHECK(min_size == -1); + *buf = read_buffer_; + *buf_size = kReadBufSize; + return true; +} + +bool SyncResourceHandler::OnReadCompleted(int request_id, int* bytes_read) { + if (!*bytes_read) + return true; + result_.data.append(read_buffer_, *bytes_read); + return true; +} + +bool SyncResourceHandler::OnResponseCompleted(int request_id, + const URLRequestStatus& status) { + result_.status = status; + + ViewHostMsg_SyncLoad::WriteReplyParams(result_message_, result_); + receiver_->Send(result_message_); + return true; +} diff --git a/chrome/browser/renderer_host/sync_resource_handler.h b/chrome/browser/renderer_host/sync_resource_handler.h new file mode 100644 index 0000000..81a6078 --- /dev/null +++ b/chrome/browser/renderer_host/sync_resource_handler.h @@ -0,0 +1,34 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_RENDERER_HOST_SYNC_RESOURCE_HANDLER_H_ +#define CHROME_BROWSER_RENDERER_HOST_SYNC_RESOURCE_HANDLER_H_ + +#include "chrome/browser/renderer_host/resource_dispatcher_host.h" +#include "chrome/browser/renderer_host/resource_handler.h" + +// Used to complete a synchronous resource request in response to resource load +// events from the resource dispatcher host. +class SyncResourceHandler : public ResourceHandler { + public: + SyncResourceHandler(ResourceDispatcherHost::Receiver* receiver, + const GURL& url, + IPC::Message* result_message); + + bool OnRequestRedirected(int request_id, const GURL& new_url); + bool OnResponseStarted(int request_id, ResourceResponse* response); + bool OnWillRead(int request_id, char** buf, int* buf_size, int min_size); + bool OnReadCompleted(int request_id, int* bytes_read); + bool OnResponseCompleted(int request_id, const URLRequestStatus& status); + + private: + enum { kReadBufSize = 3840 }; + char read_buffer_[kReadBufSize]; + + ViewHostMsg_SyncLoad_Result result_; + ResourceDispatcherHost::Receiver* receiver_; + IPC::Message* result_message_; +}; + +#endif // CHROME_BROWSER_RENDERER_HOST_SYNC_RESOURCE_HANDLER_H_ |