summaryrefslogtreecommitdiff
path: root/chromium/net/http/partial_data.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/http/partial_data.cc')
-rw-r--r--chromium/net/http/partial_data.cc496
1 files changed, 496 insertions, 0 deletions
diff --git a/chromium/net/http/partial_data.cc b/chromium/net/http/partial_data.cc
new file mode 100644
index 00000000000..02fda6cc9b1
--- /dev/null
+++ b/chromium/net/http/partial_data.cc
@@ -0,0 +1,496 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/http/partial_data.h"
+
+#include "base/bind.h"
+#include "base/bind_helpers.h"
+#include "base/format_macros.h"
+#include "base/logging.h"
+#include "base/strings/string_number_conversions.h"
+#include "base/strings/string_util.h"
+#include "base/strings/stringprintf.h"
+#include "net/base/net_errors.h"
+#include "net/disk_cache/disk_cache.h"
+#include "net/http/http_response_headers.h"
+#include "net/http/http_util.h"
+
+namespace net {
+
+namespace {
+
+// The headers that we have to process.
+const char kLengthHeader[] = "Content-Length";
+const char kRangeHeader[] = "Content-Range";
+const int kDataStream = 1;
+
+void AddRangeHeader(int64 start, int64 end, HttpRequestHeaders* headers) {
+ DCHECK(start >= 0 || end >= 0);
+ std::string my_start, my_end;
+ if (start >= 0)
+ my_start = base::Int64ToString(start);
+ if (end >= 0)
+ my_end = base::Int64ToString(end);
+
+ headers->SetHeader(
+ HttpRequestHeaders::kRange,
+ base::StringPrintf("bytes=%s-%s", my_start.c_str(), my_end.c_str()));
+}
+
+} // namespace
+
+// A core object that can be detached from the Partialdata object at destruction
+// so that asynchronous operations cleanup can be performed.
+class PartialData::Core {
+ public:
+ // Build a new core object. Lifetime management is automatic.
+ static Core* CreateCore(PartialData* owner) {
+ return new Core(owner);
+ }
+
+ // Wrapper for Entry::GetAvailableRange. If this method returns ERR_IO_PENDING
+ // PartialData::GetAvailableRangeCompleted() will be invoked on the owner
+ // object when finished (unless Cancel() is called first).
+ int GetAvailableRange(disk_cache::Entry* entry, int64 offset, int len,
+ int64* start);
+
+ // Cancels a pending operation. It is a mistake to call this method if there
+ // is no operation in progress; in fact, there will be no object to do so.
+ void Cancel();
+
+ private:
+ explicit Core(PartialData* owner);
+ ~Core();
+
+ // Pending io completion routine.
+ void OnIOComplete(int result);
+
+ PartialData* owner_;
+ int64 start_;
+
+ DISALLOW_COPY_AND_ASSIGN(Core);
+};
+
+PartialData::Core::Core(PartialData* owner)
+ : owner_(owner), start_(0) {
+ DCHECK(!owner_->core_);
+ owner_->core_ = this;
+}
+
+PartialData::Core::~Core() {
+ if (owner_)
+ owner_->core_ = NULL;
+}
+
+void PartialData::Core::Cancel() {
+ DCHECK(owner_);
+ owner_ = NULL;
+}
+
+int PartialData::Core::GetAvailableRange(disk_cache::Entry* entry, int64 offset,
+ int len, int64* start) {
+ int rv = entry->GetAvailableRange(
+ offset, len, &start_, base::Bind(&PartialData::Core::OnIOComplete,
+ base::Unretained(this)));
+ if (rv != net::ERR_IO_PENDING) {
+ // The callback will not be invoked. Lets cleanup.
+ *start = start_;
+ delete this;
+ }
+ return rv;
+}
+
+void PartialData::Core::OnIOComplete(int result) {
+ if (owner_)
+ owner_->GetAvailableRangeCompleted(result, start_);
+ delete this;
+}
+
+// -----------------------------------------------------------------------------
+
+PartialData::PartialData()
+ : range_present_(false),
+ final_range_(false),
+ sparse_entry_(true),
+ truncated_(false),
+ initial_validation_(false),
+ core_(NULL) {
+}
+
+PartialData::~PartialData() {
+ if (core_)
+ core_->Cancel();
+}
+
+bool PartialData::Init(const HttpRequestHeaders& headers) {
+ std::string range_header;
+ if (!headers.GetHeader(HttpRequestHeaders::kRange, &range_header))
+ return false;
+
+ std::vector<HttpByteRange> ranges;
+ if (!HttpUtil::ParseRangeHeader(range_header, &ranges) || ranges.size() != 1)
+ return false;
+
+ // We can handle this range request.
+ byte_range_ = ranges[0];
+ if (!byte_range_.IsValid())
+ return false;
+
+ resource_size_ = 0;
+ current_range_start_ = byte_range_.first_byte_position();
+
+ DVLOG(1) << "Range start: " << current_range_start_ << " end: " <<
+ byte_range_.last_byte_position();
+ return true;
+}
+
+void PartialData::SetHeaders(const HttpRequestHeaders& headers) {
+ DCHECK(extra_headers_.IsEmpty());
+ extra_headers_.CopyFrom(headers);
+}
+
+void PartialData::RestoreHeaders(HttpRequestHeaders* headers) const {
+ DCHECK(current_range_start_ >= 0 || byte_range_.IsSuffixByteRange());
+ int64 end = byte_range_.IsSuffixByteRange() ?
+ byte_range_.suffix_length() : byte_range_.last_byte_position();
+
+ headers->CopyFrom(extra_headers_);
+ if (!truncated_ && byte_range_.IsValid())
+ AddRangeHeader(current_range_start_, end, headers);
+}
+
+int PartialData::ShouldValidateCache(disk_cache::Entry* entry,
+ const CompletionCallback& callback) {
+ DCHECK_GE(current_range_start_, 0);
+
+ // Scan the disk cache for the first cached portion within this range.
+ int len = GetNextRangeLen();
+ if (!len)
+ return 0;
+
+ DVLOG(3) << "ShouldValidateCache len: " << len;
+
+ if (sparse_entry_) {
+ DCHECK(callback_.is_null());
+ Core* core = Core::CreateCore(this);
+ cached_min_len_ = core->GetAvailableRange(entry, current_range_start_, len,
+ &cached_start_);
+
+ if (cached_min_len_ == ERR_IO_PENDING) {
+ callback_ = callback;
+ return ERR_IO_PENDING;
+ }
+ } else if (!truncated_) {
+ if (byte_range_.HasFirstBytePosition() &&
+ byte_range_.first_byte_position() >= resource_size_) {
+ // The caller should take care of this condition because we should have
+ // failed IsRequestedRangeOK(), but it's better to be consistent here.
+ len = 0;
+ }
+ cached_min_len_ = len;
+ cached_start_ = current_range_start_;
+ }
+
+ if (cached_min_len_ < 0)
+ return cached_min_len_;
+
+ // Return a positive number to indicate success (versus error or finished).
+ return 1;
+}
+
+void PartialData::PrepareCacheValidation(disk_cache::Entry* entry,
+ HttpRequestHeaders* headers) {
+ DCHECK_GE(current_range_start_, 0);
+ DCHECK_GE(cached_min_len_, 0);
+
+ int len = GetNextRangeLen();
+ DCHECK_NE(0, len);
+ range_present_ = false;
+
+ headers->CopyFrom(extra_headers_);
+
+ if (!cached_min_len_) {
+ // We don't have anything else stored.
+ final_range_ = true;
+ cached_start_ =
+ byte_range_.HasLastBytePosition() ? current_range_start_ + len : 0;
+ }
+
+ if (current_range_start_ == cached_start_) {
+ // The data lives in the cache.
+ range_present_ = true;
+ if (len == cached_min_len_)
+ final_range_ = true;
+ AddRangeHeader(current_range_start_, cached_start_ + cached_min_len_ - 1,
+ headers);
+ } else {
+ // This range is not in the cache.
+ AddRangeHeader(current_range_start_, cached_start_ - 1, headers);
+ }
+}
+
+bool PartialData::IsCurrentRangeCached() const {
+ return range_present_;
+}
+
+bool PartialData::IsLastRange() const {
+ return final_range_;
+}
+
+bool PartialData::UpdateFromStoredHeaders(const HttpResponseHeaders* headers,
+ disk_cache::Entry* entry,
+ bool truncated) {
+ resource_size_ = 0;
+ if (truncated) {
+ DCHECK_EQ(headers->response_code(), 200);
+ // We don't have the real length and the user may be trying to create a
+ // sparse entry so let's not write to this entry.
+ if (byte_range_.IsValid())
+ return false;
+
+ if (!headers->HasStrongValidators())
+ return false;
+
+ // Now we avoid resume if there is no content length, but that was not
+ // always the case so double check here.
+ int64 total_length = headers->GetContentLength();
+ if (total_length <= 0)
+ return false;
+
+ truncated_ = true;
+ initial_validation_ = true;
+ sparse_entry_ = false;
+ int current_len = entry->GetDataSize(kDataStream);
+ byte_range_.set_first_byte_position(current_len);
+ resource_size_ = total_length;
+ current_range_start_ = current_len;
+ cached_min_len_ = current_len;
+ cached_start_ = current_len + 1;
+ return true;
+ }
+
+ if (headers->response_code() != 206) {
+ DCHECK(byte_range_.IsValid());
+ sparse_entry_ = false;
+ resource_size_ = entry->GetDataSize(kDataStream);
+ DVLOG(2) << "UpdateFromStoredHeaders size: " << resource_size_;
+ return true;
+ }
+
+ if (!headers->HasStrongValidators())
+ return false;
+
+ int64 length_value = headers->GetContentLength();
+ if (length_value <= 0)
+ return false; // We must have stored the resource length.
+
+ resource_size_ = length_value;
+
+ // Make sure that this is really a sparse entry.
+ return entry->CouldBeSparse();
+}
+
+void PartialData::SetRangeToStartDownload() {
+ DCHECK(truncated_);
+ DCHECK(!sparse_entry_);
+ current_range_start_ = 0;
+ cached_start_ = 0;
+ initial_validation_ = false;
+}
+
+bool PartialData::IsRequestedRangeOK() {
+ if (byte_range_.IsValid()) {
+ if (!byte_range_.ComputeBounds(resource_size_))
+ return false;
+ if (truncated_)
+ return true;
+
+ if (current_range_start_ < 0)
+ current_range_start_ = byte_range_.first_byte_position();
+ } else {
+ // This is not a range request but we have partial data stored.
+ current_range_start_ = 0;
+ byte_range_.set_last_byte_position(resource_size_ - 1);
+ }
+
+ bool rv = current_range_start_ >= 0;
+ if (!rv)
+ current_range_start_ = 0;
+
+ return rv;
+}
+
+bool PartialData::ResponseHeadersOK(const HttpResponseHeaders* headers) {
+ if (headers->response_code() == 304) {
+ if (!byte_range_.IsValid() || truncated_)
+ return true;
+
+ // We must have a complete range here.
+ return byte_range_.HasFirstBytePosition() &&
+ byte_range_.HasLastBytePosition();
+ }
+
+ int64 start, end, total_length;
+ if (!headers->GetContentRange(&start, &end, &total_length))
+ return false;
+ if (total_length <= 0)
+ return false;
+
+ int64 content_length = headers->GetContentLength();
+ if (content_length < 0 || content_length != end - start + 1)
+ return false;
+
+ if (!resource_size_) {
+ // First response. Update our values with the ones provided by the server.
+ resource_size_ = total_length;
+ if (!byte_range_.HasFirstBytePosition()) {
+ byte_range_.set_first_byte_position(start);
+ current_range_start_ = start;
+ }
+ if (!byte_range_.HasLastBytePosition())
+ byte_range_.set_last_byte_position(end);
+ } else if (resource_size_ != total_length) {
+ return false;
+ }
+
+ if (truncated_) {
+ if (!byte_range_.HasLastBytePosition())
+ byte_range_.set_last_byte_position(end);
+ }
+
+ if (start != current_range_start_)
+ return false;
+
+ if (byte_range_.IsValid() && end > byte_range_.last_byte_position())
+ return false;
+
+ return true;
+}
+
+// We are making multiple requests to complete the range requested by the user.
+// Just assume that everything is fine and say that we are returning what was
+// requested.
+void PartialData::FixResponseHeaders(HttpResponseHeaders* headers,
+ bool success) {
+ if (truncated_)
+ return;
+
+ headers->RemoveHeader(kLengthHeader);
+ headers->RemoveHeader(kRangeHeader);
+
+ int64 range_len, start, end;
+ if (byte_range_.IsValid()) {
+ if (success) {
+ if (!sparse_entry_)
+ headers->ReplaceStatusLine("HTTP/1.1 206 Partial Content");
+
+ DCHECK(byte_range_.HasFirstBytePosition());
+ DCHECK(byte_range_.HasLastBytePosition());
+ start = byte_range_.first_byte_position();
+ end = byte_range_.last_byte_position();
+ range_len = end - start + 1;
+ } else {
+ headers->ReplaceStatusLine(
+ "HTTP/1.1 416 Requested Range Not Satisfiable");
+ start = 0;
+ end = 0;
+ range_len = 0;
+ }
+
+ headers->AddHeader(
+ base::StringPrintf("%s: bytes %" PRId64 "-%" PRId64 "/%" PRId64,
+ kRangeHeader, start, end, resource_size_));
+ } else {
+ // TODO(rvargas): Is it safe to change the protocol version?
+ headers->ReplaceStatusLine("HTTP/1.1 200 OK");
+ DCHECK_NE(resource_size_, 0);
+ range_len = resource_size_;
+ }
+
+ headers->AddHeader(base::StringPrintf("%s: %" PRId64, kLengthHeader,
+ range_len));
+}
+
+void PartialData::FixContentLength(HttpResponseHeaders* headers) {
+ headers->RemoveHeader(kLengthHeader);
+ headers->AddHeader(base::StringPrintf("%s: %" PRId64, kLengthHeader,
+ resource_size_));
+}
+
+int PartialData::CacheRead(
+ disk_cache::Entry* entry, IOBuffer* data, int data_len,
+ const net::CompletionCallback& callback) {
+ int read_len = std::min(data_len, cached_min_len_);
+ if (!read_len)
+ return 0;
+
+ int rv = 0;
+ if (sparse_entry_) {
+ rv = entry->ReadSparseData(current_range_start_, data, read_len,
+ callback);
+ } else {
+ if (current_range_start_ > kint32max)
+ return ERR_INVALID_ARGUMENT;
+
+ rv = entry->ReadData(kDataStream, static_cast<int>(current_range_start_),
+ data, read_len, callback);
+ }
+ return rv;
+}
+
+int PartialData::CacheWrite(
+ disk_cache::Entry* entry, IOBuffer* data, int data_len,
+ const net::CompletionCallback& callback) {
+ DVLOG(3) << "To write: " << data_len;
+ if (sparse_entry_) {
+ return entry->WriteSparseData(
+ current_range_start_, data, data_len, callback);
+ } else {
+ if (current_range_start_ > kint32max)
+ return ERR_INVALID_ARGUMENT;
+
+ return entry->WriteData(kDataStream, static_cast<int>(current_range_start_),
+ data, data_len, callback, true);
+ }
+}
+
+void PartialData::OnCacheReadCompleted(int result) {
+ DVLOG(3) << "Read: " << result;
+ if (result > 0) {
+ current_range_start_ += result;
+ cached_min_len_ -= result;
+ DCHECK_GE(cached_min_len_, 0);
+ }
+}
+
+void PartialData::OnNetworkReadCompleted(int result) {
+ if (result > 0)
+ current_range_start_ += result;
+}
+
+int PartialData::GetNextRangeLen() {
+ int64 range_len =
+ byte_range_.HasLastBytePosition() ?
+ byte_range_.last_byte_position() - current_range_start_ + 1 :
+ kint32max;
+ if (range_len > kint32max)
+ range_len = kint32max;
+ return static_cast<int32>(range_len);
+}
+
+void PartialData::GetAvailableRangeCompleted(int result, int64 start) {
+ DCHECK(!callback_.is_null());
+ DCHECK_NE(ERR_IO_PENDING, result);
+
+ cached_start_ = start;
+ cached_min_len_ = result;
+ if (result >= 0)
+ result = 1; // Return success, go ahead and validate the entry.
+
+ CompletionCallback cb = callback_;
+ callback_.Reset();
+ cb.Run(result);
+}
+
+} // namespace net