mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-12-05 03:36:08 +03:00
475 lines
15 KiB
C++
475 lines
15 KiB
C++
// Copyright 2012 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "net/http/partial_data.h"
|
|
|
|
#include <limits>
|
|
#include <utility>
|
|
|
|
#include "base/format_macros.h"
|
|
#include "base/functional/bind.h"
|
|
#include "base/functional/callback_helpers.h"
|
|
#include "base/logging.h"
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "base/strings/stringprintf.h"
|
|
#include "net/base/net_errors.h"
|
|
#include "net/disk_cache/disk_cache.h"
|
|
#include "net/http/http_response_headers.h"
|
|
#include "net/http/http_status_code.h"
|
|
#include "net/http/http_util.h"
|
|
|
|
namespace net {
|
|
|
|
namespace {
|
|
|
|
// The headers that we have to process.
|
|
const char kLengthHeader[] = "Content-Length";
|
|
const char kRangeHeader[] = "Content-Range";
|
|
const int kDataStream = 1;
|
|
|
|
} // namespace
|
|
|
|
PartialData::PartialData() = default;
|
|
|
|
PartialData::~PartialData() = default;
|
|
|
|
bool PartialData::Init(const HttpRequestHeaders& headers) {
|
|
std::optional<std::string> range_header =
|
|
headers.GetHeader(HttpRequestHeaders::kRange);
|
|
if (!range_header) {
|
|
range_requested_ = false;
|
|
return false;
|
|
}
|
|
range_requested_ = true;
|
|
|
|
std::vector<HttpByteRange> ranges;
|
|
if (!HttpUtil::ParseRangeHeader(range_header.value(), &ranges) ||
|
|
ranges.size() != 1) {
|
|
return false;
|
|
}
|
|
|
|
// We can handle this range request.
|
|
byte_range_ = ranges[0];
|
|
user_byte_range_ = byte_range_;
|
|
if (!byte_range_.IsValid())
|
|
return false;
|
|
|
|
current_range_start_ = byte_range_.first_byte_position();
|
|
|
|
DVLOG(1) << "Range start: " << current_range_start_ << " end: " <<
|
|
byte_range_.last_byte_position();
|
|
return true;
|
|
}
|
|
|
|
void PartialData::SetHeaders(const HttpRequestHeaders& headers) {
|
|
DCHECK(extra_headers_.IsEmpty());
|
|
extra_headers_ = headers;
|
|
}
|
|
|
|
void PartialData::RestoreHeaders(HttpRequestHeaders* headers) const {
|
|
DCHECK(current_range_start_ >= 0 || byte_range_.IsSuffixByteRange());
|
|
int64_t end = byte_range_.IsSuffixByteRange()
|
|
? byte_range_.suffix_length()
|
|
: byte_range_.last_byte_position();
|
|
|
|
*headers = extra_headers_;
|
|
if (truncated_ || !byte_range_.IsValid())
|
|
return;
|
|
|
|
if (current_range_start_ < 0) {
|
|
headers->SetHeader(HttpRequestHeaders::kRange,
|
|
HttpByteRange::Suffix(end).GetHeaderValue());
|
|
} else {
|
|
headers->SetHeader(HttpRequestHeaders::kRange,
|
|
HttpByteRange::Bounded(
|
|
current_range_start_, end).GetHeaderValue());
|
|
}
|
|
}
|
|
|
|
int PartialData::ShouldValidateCache(disk_cache::Entry* entry,
|
|
CompletionOnceCallback callback) {
|
|
DCHECK_GE(current_range_start_, 0);
|
|
|
|
// Scan the disk cache for the first cached portion within this range.
|
|
int len = GetNextRangeLen();
|
|
if (!len)
|
|
return 0;
|
|
|
|
DVLOG(3) << "ShouldValidateCache len: " << len;
|
|
|
|
if (sparse_entry_) {
|
|
DCHECK(callback_.is_null());
|
|
disk_cache::RangeResultCallback cb = base::BindOnce(
|
|
&PartialData::GetAvailableRangeCompleted, weak_factory_.GetWeakPtr());
|
|
disk_cache::RangeResult range =
|
|
entry->GetAvailableRange(current_range_start_, len, std::move(cb));
|
|
|
|
cached_min_len_ =
|
|
range.net_error == OK ? range.available_len : range.net_error;
|
|
if (cached_min_len_ == ERR_IO_PENDING) {
|
|
callback_ = std::move(callback);
|
|
return ERR_IO_PENDING;
|
|
} else {
|
|
cached_start_ = range.start;
|
|
}
|
|
} else if (!truncated_) {
|
|
if (byte_range_.HasFirstBytePosition() &&
|
|
byte_range_.first_byte_position() >= resource_size_) {
|
|
// The caller should take care of this condition because we should have
|
|
// failed IsRequestedRangeOK(), but it's better to be consistent here.
|
|
len = 0;
|
|
}
|
|
cached_min_len_ = len;
|
|
cached_start_ = current_range_start_;
|
|
}
|
|
|
|
if (cached_min_len_ < 0)
|
|
return cached_min_len_;
|
|
|
|
// Return a positive number to indicate success (versus error or finished).
|
|
return 1;
|
|
}
|
|
|
|
void PartialData::PrepareCacheValidation(disk_cache::Entry* entry,
|
|
HttpRequestHeaders* headers) {
|
|
DCHECK_GE(current_range_start_, 0);
|
|
DCHECK_GE(cached_min_len_, 0);
|
|
|
|
int len = GetNextRangeLen();
|
|
if (!len) {
|
|
// Stored body is empty, so just use the original range header.
|
|
headers->SetHeader(HttpRequestHeaders::kRange,
|
|
user_byte_range_.GetHeaderValue());
|
|
return;
|
|
}
|
|
range_present_ = false;
|
|
|
|
*headers = extra_headers_;
|
|
|
|
if (!cached_min_len_) {
|
|
// We don't have anything else stored.
|
|
final_range_ = true;
|
|
cached_start_ =
|
|
byte_range_.HasLastBytePosition() ? current_range_start_ + len : 0;
|
|
}
|
|
|
|
if (current_range_start_ == cached_start_) {
|
|
// The data lives in the cache.
|
|
range_present_ = true;
|
|
current_range_end_ = cached_start_ + cached_min_len_ - 1;
|
|
if (len == cached_min_len_)
|
|
final_range_ = true;
|
|
} else {
|
|
// This range is not in the cache.
|
|
current_range_end_ = cached_start_ - 1;
|
|
}
|
|
headers->SetHeader(
|
|
HttpRequestHeaders::kRange,
|
|
HttpByteRange::Bounded(current_range_start_, current_range_end_)
|
|
.GetHeaderValue());
|
|
}
|
|
|
|
bool PartialData::IsCurrentRangeCached() const {
|
|
return range_present_;
|
|
}
|
|
|
|
bool PartialData::IsLastRange() const {
|
|
return final_range_;
|
|
}
|
|
|
|
bool PartialData::UpdateFromStoredHeaders(const HttpResponseHeaders* headers,
|
|
disk_cache::Entry* entry,
|
|
bool truncated,
|
|
bool writing_in_progress) {
|
|
resource_size_ = 0;
|
|
if (truncated) {
|
|
DCHECK_EQ(headers->response_code(), 200);
|
|
// We don't have the real length and the user may be trying to create a
|
|
// sparse entry so let's not write to this entry.
|
|
if (byte_range_.IsValid())
|
|
return false;
|
|
|
|
if (!headers->HasStrongValidators())
|
|
return false;
|
|
|
|
// Now we avoid resume if there is no content length, but that was not
|
|
// always the case so double check here.
|
|
int64_t total_length = headers->GetContentLength();
|
|
if (total_length <= 0)
|
|
return false;
|
|
|
|
// In case we see a truncated entry, we first send a network request for
|
|
// 1 byte range with If-Range: to probe server support for resumption.
|
|
// The setting of |current_range_start_| and |cached_start_| below (with any
|
|
// positive value of |cached_min_len_|) results in that.
|
|
//
|
|
// Setting |initial_validation_| to true is how this communicates to
|
|
// HttpCache::Transaction that we're doing that (and that it's not the user
|
|
// asking for one byte), so if it sees a 206 with that flag set it will call
|
|
// SetRangeToStartDownload(), and then restart the process looking for the
|
|
// entire file (which is what the user wanted), with the cache handling
|
|
// the previous portion, and then a second network request for the entire
|
|
// rest of the range. A 200 in response to the probe request can be simply
|
|
// returned directly to the user.
|
|
truncated_ = true;
|
|
initial_validation_ = true;
|
|
sparse_entry_ = false;
|
|
int current_len = entry->GetDataSize(kDataStream);
|
|
byte_range_.set_first_byte_position(current_len);
|
|
resource_size_ = total_length;
|
|
current_range_start_ = current_len;
|
|
cached_min_len_ = current_len;
|
|
cached_start_ = current_len + 1;
|
|
return true;
|
|
}
|
|
|
|
sparse_entry_ = (headers->response_code() == HTTP_PARTIAL_CONTENT);
|
|
|
|
if (writing_in_progress || sparse_entry_) {
|
|
// |writing_in_progress| means another Transaction is still fetching the
|
|
// body, so the only way we can see the length is if the server sent it
|
|
// in Content-Length -- GetDataSize would just return what got written
|
|
// thus far.
|
|
//
|
|
// |sparse_entry_| means a 206, and for those FixContentLength arranges it
|
|
// so that Content-Length written to the cache has the full length (on wire
|
|
// it's for a particular range only); while GetDataSize would be unusable
|
|
// since the data is stored using WriteSparseData, and not in the usual data
|
|
// stream.
|
|
resource_size_ = headers->GetContentLength();
|
|
if (resource_size_ <= 0)
|
|
return false;
|
|
} else {
|
|
// If we can safely use GetDataSize, it's preferrable since it's usable for
|
|
// things w/o Content-Length, such as chunked content.
|
|
resource_size_ = entry->GetDataSize(kDataStream);
|
|
}
|
|
|
|
DVLOG(2) << "UpdateFromStoredHeaders size: " << resource_size_;
|
|
|
|
if (sparse_entry_) {
|
|
// If our previous is a 206, we need strong validators as we may be
|
|
// stiching the cached data and network data together.
|
|
if (!headers->HasStrongValidators())
|
|
return false;
|
|
// Make sure that this is really a sparse entry.
|
|
return entry->CouldBeSparse();
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void PartialData::SetRangeToStartDownload() {
|
|
DCHECK(truncated_);
|
|
DCHECK(!sparse_entry_);
|
|
current_range_start_ = 0;
|
|
cached_start_ = 0;
|
|
initial_validation_ = false;
|
|
}
|
|
|
|
bool PartialData::IsRequestedRangeOK() {
|
|
if (byte_range_.IsValid()) {
|
|
if (!byte_range_.ComputeBounds(resource_size_))
|
|
return false;
|
|
if (truncated_)
|
|
return true;
|
|
|
|
if (current_range_start_ < 0)
|
|
current_range_start_ = byte_range_.first_byte_position();
|
|
} else {
|
|
// This is not a range request but we have partial data stored.
|
|
current_range_start_ = 0;
|
|
byte_range_.set_last_byte_position(resource_size_ - 1);
|
|
}
|
|
|
|
bool rv = current_range_start_ >= 0;
|
|
if (!rv)
|
|
current_range_start_ = 0;
|
|
|
|
return rv;
|
|
}
|
|
|
|
bool PartialData::ResponseHeadersOK(const HttpResponseHeaders* headers) {
|
|
if (headers->response_code() == HTTP_NOT_MODIFIED) {
|
|
if (!byte_range_.IsValid() || truncated_)
|
|
return true;
|
|
|
|
// We must have a complete range here.
|
|
return byte_range_.HasFirstBytePosition() &&
|
|
byte_range_.HasLastBytePosition();
|
|
}
|
|
|
|
int64_t start, end, total_length;
|
|
if (!headers->GetContentRangeFor206(&start, &end, &total_length))
|
|
return false;
|
|
if (total_length <= 0)
|
|
return false;
|
|
|
|
DCHECK_EQ(headers->response_code(), 206);
|
|
|
|
// A server should return a valid content length with a 206 (per the standard)
|
|
// but relax the requirement because some servers don't do that.
|
|
int64_t content_length = headers->GetContentLength();
|
|
if (content_length > 0 && content_length != end - start + 1)
|
|
return false;
|
|
|
|
if (!resource_size_) {
|
|
// First response. Update our values with the ones provided by the server.
|
|
resource_size_ = total_length;
|
|
if (!byte_range_.HasFirstBytePosition()) {
|
|
byte_range_.set_first_byte_position(start);
|
|
current_range_start_ = start;
|
|
}
|
|
if (!byte_range_.HasLastBytePosition())
|
|
byte_range_.set_last_byte_position(end);
|
|
} else if (resource_size_ != total_length) {
|
|
return false;
|
|
}
|
|
|
|
if (truncated_) {
|
|
if (!byte_range_.HasLastBytePosition())
|
|
byte_range_.set_last_byte_position(end);
|
|
}
|
|
|
|
if (start != current_range_start_)
|
|
return false;
|
|
|
|
if (!current_range_end_) {
|
|
// There is nothing in the cache.
|
|
DCHECK(byte_range_.HasLastBytePosition());
|
|
current_range_end_ = byte_range_.last_byte_position();
|
|
if (current_range_end_ >= resource_size_) {
|
|
// We didn't know the real file size, and the server is saying that the
|
|
// requested range goes beyond the size. Fix it.
|
|
current_range_end_ = end;
|
|
byte_range_.set_last_byte_position(end);
|
|
}
|
|
}
|
|
|
|
// If we received a range, but it's not exactly the range we asked for, avoid
|
|
// trouble and signal an error.
|
|
if (end != current_range_end_)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
// We are making multiple requests to complete the range requested by the user.
|
|
// Just assume that everything is fine and say that we are returning what was
|
|
// requested.
|
|
void PartialData::FixResponseHeaders(HttpResponseHeaders* headers,
|
|
bool success) {
|
|
if (truncated_)
|
|
return;
|
|
|
|
if (!success) {
|
|
headers->ReplaceStatusLine("HTTP/1.1 416 Requested Range Not Satisfiable");
|
|
headers->SetHeader(
|
|
kRangeHeader, base::StringPrintf("bytes 0-0/%" PRId64, resource_size_));
|
|
headers->SetHeader(kLengthHeader, "0");
|
|
return;
|
|
}
|
|
|
|
if (byte_range_.IsValid() && resource_size_) {
|
|
headers->UpdateWithNewRange(byte_range_, resource_size_, !sparse_entry_);
|
|
} else {
|
|
if (headers->response_code() == HTTP_PARTIAL_CONTENT) {
|
|
// TODO(rvargas): Is it safe to change the protocol version?
|
|
headers->ReplaceStatusLine("HTTP/1.1 200 OK");
|
|
}
|
|
headers->RemoveHeader(kRangeHeader);
|
|
headers->SetHeader(kLengthHeader,
|
|
base::StringPrintf("%" PRId64, resource_size_));
|
|
}
|
|
}
|
|
|
|
void PartialData::FixContentLength(HttpResponseHeaders* headers) {
|
|
headers->SetHeader(kLengthHeader,
|
|
base::StringPrintf("%" PRId64, resource_size_));
|
|
}
|
|
|
|
int PartialData::CacheRead(disk_cache::Entry* entry,
|
|
IOBuffer* data,
|
|
int data_len,
|
|
CompletionOnceCallback callback) {
|
|
int read_len = std::min(data_len, cached_min_len_);
|
|
if (!read_len)
|
|
return 0;
|
|
|
|
int rv = 0;
|
|
if (sparse_entry_) {
|
|
rv = entry->ReadSparseData(current_range_start_, data, read_len,
|
|
std::move(callback));
|
|
} else {
|
|
if (current_range_start_ > std::numeric_limits<int32_t>::max())
|
|
return ERR_INVALID_ARGUMENT;
|
|
|
|
rv = entry->ReadData(kDataStream, static_cast<int>(current_range_start_),
|
|
data, read_len, std::move(callback));
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
int PartialData::CacheWrite(disk_cache::Entry* entry,
|
|
IOBuffer* data,
|
|
int data_len,
|
|
CompletionOnceCallback callback) {
|
|
DVLOG(3) << "To write: " << data_len;
|
|
if (sparse_entry_) {
|
|
return entry->WriteSparseData(current_range_start_, data, data_len,
|
|
std::move(callback));
|
|
} else {
|
|
if (current_range_start_ > std::numeric_limits<int32_t>::max())
|
|
return ERR_INVALID_ARGUMENT;
|
|
|
|
return entry->WriteData(kDataStream, static_cast<int>(current_range_start_),
|
|
data, data_len, std::move(callback), true);
|
|
}
|
|
}
|
|
|
|
void PartialData::OnCacheReadCompleted(int result) {
|
|
DVLOG(3) << "Read: " << result;
|
|
if (result > 0) {
|
|
current_range_start_ += result;
|
|
cached_min_len_ -= result;
|
|
DCHECK_GE(cached_min_len_, 0);
|
|
}
|
|
}
|
|
|
|
void PartialData::OnNetworkReadCompleted(int result) {
|
|
if (result > 0)
|
|
current_range_start_ += result;
|
|
}
|
|
|
|
int PartialData::GetNextRangeLen() {
|
|
if (!resource_size_) {
|
|
return 0;
|
|
}
|
|
int64_t range_len =
|
|
byte_range_.HasLastBytePosition()
|
|
? byte_range_.last_byte_position() - current_range_start_ + 1
|
|
: std::numeric_limits<int32_t>::max();
|
|
if (range_len > std::numeric_limits<int32_t>::max())
|
|
range_len = std::numeric_limits<int32_t>::max();
|
|
return static_cast<int32_t>(range_len);
|
|
}
|
|
|
|
void PartialData::GetAvailableRangeCompleted(
|
|
const disk_cache::RangeResult& result) {
|
|
DCHECK(!callback_.is_null());
|
|
DCHECK_NE(ERR_IO_PENDING, result.net_error);
|
|
|
|
int len_or_error =
|
|
result.net_error == OK ? result.available_len : result.net_error;
|
|
cached_start_ = result.start;
|
|
cached_min_len_ = len_or_error;
|
|
|
|
// ShouldValidateCache has an unusual convention where 0 denotes EOF,
|
|
// so convert end of range to success (since there may be things that need
|
|
// fetching from network or other ranges).
|
|
std::move(callback_).Run(len_or_error >= 0 ? 1 : len_or_error);
|
|
}
|
|
|
|
} // namespace net
|