2019-05-14 23:29:58 +00:00
|
|
|
// Copyright (c) 2019 GitHub, Inc.
|
|
|
|
// Use of this source code is governed by the MIT license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/net/asar/asar_url_loader.h"
|
2019-05-14 23:29:58 +00:00
|
|
|
|
2021-09-09 21:49:01 +00:00
|
|
|
#include <algorithm>
|
2019-05-14 23:29:58 +00:00
|
|
|
#include <memory>
|
|
|
|
#include <string>
|
|
|
|
#include <utility>
|
|
|
|
#include <vector>
|
|
|
|
|
|
|
|
#include "base/strings/stringprintf.h"
|
2020-03-09 16:13:59 +00:00
|
|
|
#include "base/task/thread_pool.h"
|
2019-05-14 23:29:58 +00:00
|
|
|
#include "content/public/browser/file_url_loader.h"
|
2021-09-09 21:49:01 +00:00
|
|
|
#include "electron/fuses.h"
|
2019-11-05 23:41:20 +00:00
|
|
|
#include "mojo/public/cpp/bindings/receiver.h"
|
2019-12-11 00:22:35 +00:00
|
|
|
#include "mojo/public/cpp/bindings/remote.h"
|
2019-07-24 22:58:51 +00:00
|
|
|
#include "mojo/public/cpp/system/data_pipe_producer.h"
|
|
|
|
#include "mojo/public/cpp/system/file_data_source.h"
|
2019-05-14 23:29:58 +00:00
|
|
|
#include "net/base/filename_util.h"
|
|
|
|
#include "net/base/mime_sniffer.h"
|
|
|
|
#include "net/base/mime_util.h"
|
|
|
|
#include "net/http/http_byte_range.h"
|
|
|
|
#include "net/http/http_util.h"
|
2019-12-13 20:13:12 +00:00
|
|
|
#include "services/network/public/mojom/url_response_head.mojom.h"
|
2021-09-09 21:49:01 +00:00
|
|
|
#include "shell/browser/net/asar/asar_file_validator.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/common/asar/archive.h"
|
|
|
|
#include "shell/common/asar/asar_util.h"
|
2019-05-14 23:29:58 +00:00
|
|
|
|
|
|
|
namespace asar {
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2019-08-02 23:56:46 +00:00
|
|
|
net::Error ConvertMojoResultToNetError(MojoResult result) {
|
|
|
|
switch (result) {
|
|
|
|
case MOJO_RESULT_OK:
|
|
|
|
return net::OK;
|
|
|
|
case MOJO_RESULT_NOT_FOUND:
|
|
|
|
return net::ERR_FILE_NOT_FOUND;
|
|
|
|
case MOJO_RESULT_PERMISSION_DENIED:
|
|
|
|
return net::ERR_ACCESS_DENIED;
|
|
|
|
case MOJO_RESULT_RESOURCE_EXHAUSTED:
|
|
|
|
return net::ERR_INSUFFICIENT_RESOURCES;
|
|
|
|
case MOJO_RESULT_ABORTED:
|
|
|
|
return net::ERR_ABORTED;
|
|
|
|
default:
|
|
|
|
return net::ERR_FAILED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-14 23:29:58 +00:00
|
|
|
constexpr size_t kDefaultFileUrlPipeSize = 65536;
|
|
|
|
|
|
|
|
// Because this makes things simpler.
|
|
|
|
static_assert(kDefaultFileUrlPipeSize >= net::kMaxBytesToSniff,
|
|
|
|
"Default file data pipe size must be at least as large as a MIME-"
|
|
|
|
"type sniffing buffer.");
|
|
|
|
|
|
|
|
// Modified from the |FileURLLoader| in |file_url_loader_factory.cc|, to serve
|
|
|
|
// asar files instead of normal files.
|
|
|
|
class AsarURLLoader : public network::mojom::URLLoader {
|
|
|
|
public:
|
|
|
|
static void CreateAndStart(
|
|
|
|
const network::ResourceRequest& request,
|
2022-03-25 01:39:03 +00:00
|
|
|
mojo::PendingReceiver<network::mojom::URLLoader> loader,
|
2019-12-11 00:22:35 +00:00
|
|
|
mojo::PendingRemote<network::mojom::URLLoaderClient> client,
|
2019-05-14 23:29:58 +00:00
|
|
|
scoped_refptr<net::HttpResponseHeaders> extra_response_headers) {
|
|
|
|
// Owns itself. Will live as long as its URLLoader and URLLoaderClientPtr
|
|
|
|
// bindings are alive - essentially until either the client gives up or all
|
|
|
|
// file data has been sent to it.
|
|
|
|
auto* asar_url_loader = new AsarURLLoader;
|
2019-12-11 00:22:35 +00:00
|
|
|
asar_url_loader->Start(request, std::move(loader), std::move(client),
|
2019-05-14 23:29:58 +00:00
|
|
|
std::move(extra_response_headers));
|
|
|
|
}
|
|
|
|
|
|
|
|
// network::mojom::URLLoader:
|
2020-05-26 20:06:26 +00:00
|
|
|
void FollowRedirect(
|
|
|
|
const std::vector<std::string>& removed_headers,
|
|
|
|
const net::HttpRequestHeaders& modified_headers,
|
|
|
|
const net::HttpRequestHeaders& modified_cors_exempt_headers,
|
2021-06-03 08:05:04 +00:00
|
|
|
const absl::optional<GURL>& new_url) override {}
|
2019-05-14 23:29:58 +00:00
|
|
|
void SetPriority(net::RequestPriority priority,
|
|
|
|
int32_t intra_priority_value) override {}
|
|
|
|
void PauseReadingBodyFromNet() override {}
|
|
|
|
void ResumeReadingBodyFromNet() override {}
|
|
|
|
|
2021-11-03 11:41:45 +00:00
|
|
|
// disable copy
|
|
|
|
AsarURLLoader(const AsarURLLoader&) = delete;
|
|
|
|
AsarURLLoader& operator=(const AsarURLLoader&) = delete;
|
|
|
|
|
2019-05-14 23:29:58 +00:00
|
|
|
private:
|
2021-06-04 04:16:13 +00:00
|
|
|
AsarURLLoader() = default;
|
2019-05-14 23:29:58 +00:00
|
|
|
~AsarURLLoader() override = default;
|
|
|
|
|
|
|
|
void Start(const network::ResourceRequest& request,
|
2019-11-05 23:41:20 +00:00
|
|
|
mojo::PendingReceiver<network::mojom::URLLoader> loader,
|
2019-12-11 00:22:35 +00:00
|
|
|
mojo::PendingRemote<network::mojom::URLLoaderClient> client,
|
2019-05-14 23:29:58 +00:00
|
|
|
scoped_refptr<net::HttpResponseHeaders> extra_response_headers) {
|
2019-12-13 20:13:12 +00:00
|
|
|
auto head = network::mojom::URLResponseHead::New();
|
|
|
|
head->request_start = base::TimeTicks::Now();
|
|
|
|
head->response_start = base::TimeTicks::Now();
|
|
|
|
head->headers = extra_response_headers;
|
2019-05-14 23:29:58 +00:00
|
|
|
|
|
|
|
base::FilePath path;
|
|
|
|
if (!net::FileURLToFilePath(request.url, &path)) {
|
2019-12-11 00:22:35 +00:00
|
|
|
mojo::Remote<network::mojom::URLLoaderClient> client_remote(
|
|
|
|
std::move(client));
|
|
|
|
client_remote->OnComplete(
|
|
|
|
network::URLLoaderCompletionStatus(net::ERR_FAILED));
|
|
|
|
MaybeDeleteSelf();
|
2019-05-14 23:29:58 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Determine whether it is an asar file.
|
|
|
|
base::FilePath asar_path, relative_path;
|
|
|
|
if (!GetAsarArchivePath(path, &asar_path, &relative_path)) {
|
2020-01-17 18:41:52 +00:00
|
|
|
content::CreateFileURLLoaderBypassingSecurityChecks(
|
|
|
|
request, std::move(loader), std::move(client), nullptr, false,
|
|
|
|
extra_response_headers);
|
2019-05-14 23:29:58 +00:00
|
|
|
MaybeDeleteSelf();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-12-11 00:22:35 +00:00
|
|
|
client_.Bind(std::move(client));
|
2019-11-05 23:41:20 +00:00
|
|
|
receiver_.Bind(std::move(loader));
|
|
|
|
receiver_.set_disconnect_handler(base::BindOnce(
|
|
|
|
&AsarURLLoader::OnConnectionError, base::Unretained(this)));
|
|
|
|
|
2019-05-14 23:29:58 +00:00
|
|
|
// Parse asar archive.
|
|
|
|
std::shared_ptr<Archive> archive = GetOrCreateAsarArchive(asar_path);
|
|
|
|
Archive::FileInfo info;
|
|
|
|
if (!archive || !archive->GetFileInfo(relative_path, &info)) {
|
|
|
|
OnClientComplete(net::ERR_FILE_NOT_FOUND);
|
|
|
|
return;
|
|
|
|
}
|
2021-09-09 21:49:01 +00:00
|
|
|
bool is_verifying_file = info.integrity.has_value();
|
2019-05-14 23:29:58 +00:00
|
|
|
|
|
|
|
// For unpacked path, read like normal file.
|
|
|
|
base::FilePath real_path;
|
|
|
|
if (info.unpacked) {
|
|
|
|
archive->CopyFileOut(relative_path, &real_path);
|
|
|
|
info.offset = 0;
|
|
|
|
}
|
|
|
|
|
2021-03-04 17:27:05 +00:00
|
|
|
mojo::ScopedDataPipeProducerHandle producer_handle;
|
|
|
|
mojo::ScopedDataPipeConsumerHandle consumer_handle;
|
|
|
|
if (mojo::CreateDataPipe(kDefaultFileUrlPipeSize, producer_handle,
|
|
|
|
consumer_handle) != MOJO_RESULT_OK) {
|
2019-05-14 23:29:58 +00:00
|
|
|
OnClientComplete(net::ERR_FAILED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Note that while the |Archive| already opens a |base::File|, we still need
|
|
|
|
// to create a new |base::File| here, as it might be accessed by multiple
|
|
|
|
// requests at the same time.
|
|
|
|
base::File file(info.unpacked ? real_path : archive->path(),
|
|
|
|
base::File::FLAG_OPEN | base::File::FLAG_READ);
|
2019-08-02 23:56:46 +00:00
|
|
|
auto file_data_source =
|
2021-09-09 21:49:01 +00:00
|
|
|
std::make_unique<mojo::FileDataSource>(file.Duplicate());
|
|
|
|
std::unique_ptr<mojo::DataPipeProducer::DataSource> readable_data_source;
|
|
|
|
mojo::FileDataSource* file_data_source_raw = file_data_source.get();
|
|
|
|
AsarFileValidator* file_validator_raw = nullptr;
|
2021-09-10 02:52:23 +00:00
|
|
|
uint32_t block_size = 0;
|
2021-09-09 21:49:01 +00:00
|
|
|
if (info.integrity.has_value()) {
|
2021-09-10 02:52:23 +00:00
|
|
|
block_size = info.integrity.value().block_size;
|
2021-09-09 21:49:01 +00:00
|
|
|
auto asar_validator = std::make_unique<AsarFileValidator>(
|
|
|
|
std::move(info.integrity.value()), std::move(file));
|
|
|
|
file_validator_raw = asar_validator.get();
|
2023-04-26 14:09:54 +00:00
|
|
|
readable_data_source = std::make_unique<mojo::FilteredDataSource>(
|
|
|
|
std::move(file_data_source), std::move(asar_validator));
|
2021-09-09 21:49:01 +00:00
|
|
|
} else {
|
|
|
|
readable_data_source = std::move(file_data_source);
|
|
|
|
}
|
2019-08-02 23:56:46 +00:00
|
|
|
|
2021-09-09 21:49:01 +00:00
|
|
|
std::vector<char> initial_read_buffer(
|
|
|
|
std::min(static_cast<uint32_t>(net::kMaxBytesToSniff), info.size));
|
|
|
|
auto read_result = readable_data_source.get()->Read(
|
|
|
|
info.offset, base::span<char>(initial_read_buffer));
|
2019-08-02 23:56:46 +00:00
|
|
|
if (read_result.result != MOJO_RESULT_OK) {
|
|
|
|
OnClientComplete(ConvertMojoResultToNetError(read_result.result));
|
2019-05-14 23:29:58 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string range_header;
|
|
|
|
net::HttpByteRange byte_range;
|
|
|
|
if (request.headers.GetHeader(net::HttpRequestHeaders::kRange,
|
|
|
|
&range_header)) {
|
|
|
|
// Handle a simple Range header for a single range.
|
|
|
|
std::vector<net::HttpByteRange> ranges;
|
|
|
|
bool fail = false;
|
|
|
|
if (net::HttpUtil::ParseRangeHeader(range_header, &ranges) &&
|
|
|
|
ranges.size() == 1) {
|
|
|
|
byte_range = ranges[0];
|
|
|
|
if (!byte_range.ComputeBounds(info.size))
|
|
|
|
fail = true;
|
|
|
|
} else {
|
|
|
|
fail = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fail) {
|
|
|
|
OnClientComplete(net::ERR_REQUEST_RANGE_NOT_SATISFIABLE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-02 23:56:46 +00:00
|
|
|
uint64_t first_byte_to_send = 0;
|
2021-09-09 21:49:01 +00:00
|
|
|
uint64_t total_bytes_dropped_from_head = initial_read_buffer.size();
|
2019-08-02 23:56:46 +00:00
|
|
|
uint64_t total_bytes_to_send = info.size;
|
2019-05-14 23:29:58 +00:00
|
|
|
|
|
|
|
if (byte_range.IsValid()) {
|
2019-08-02 23:56:46 +00:00
|
|
|
first_byte_to_send = byte_range.first_byte_position();
|
2019-05-14 23:29:58 +00:00
|
|
|
total_bytes_to_send =
|
2019-08-02 23:56:46 +00:00
|
|
|
byte_range.last_byte_position() - first_byte_to_send + 1;
|
2019-05-14 23:29:58 +00:00
|
|
|
}
|
|
|
|
|
2019-08-02 23:56:46 +00:00
|
|
|
total_bytes_written_ = total_bytes_to_send;
|
2019-05-14 23:29:58 +00:00
|
|
|
|
2019-12-13 20:13:12 +00:00
|
|
|
head->content_length = base::saturated_cast<int64_t>(total_bytes_to_send);
|
2019-05-14 23:29:58 +00:00
|
|
|
|
2019-08-02 23:56:46 +00:00
|
|
|
if (first_byte_to_send < read_result.bytes_read) {
|
2019-05-14 23:29:58 +00:00
|
|
|
// Write any data we read for MIME sniffing, constraining by range where
|
|
|
|
// applicable. This will always fit in the pipe (see assertion near
|
|
|
|
// |kDefaultFileUrlPipeSize| definition).
|
|
|
|
uint32_t write_size = std::min(
|
2019-08-02 23:56:46 +00:00
|
|
|
static_cast<uint32_t>(read_result.bytes_read - first_byte_to_send),
|
2019-05-14 23:29:58 +00:00
|
|
|
static_cast<uint32_t>(total_bytes_to_send));
|
|
|
|
const uint32_t expected_write_size = write_size;
|
2021-03-04 17:27:05 +00:00
|
|
|
MojoResult result =
|
|
|
|
producer_handle->WriteData(&initial_read_buffer[first_byte_to_send],
|
|
|
|
&write_size, MOJO_WRITE_DATA_FLAG_NONE);
|
2019-05-14 23:29:58 +00:00
|
|
|
if (result != MOJO_RESULT_OK || write_size != expected_write_size) {
|
|
|
|
OnFileWritten(result);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Discount the bytes we just sent from the total range.
|
2019-08-02 23:56:46 +00:00
|
|
|
first_byte_to_send = read_result.bytes_read;
|
2019-05-14 23:29:58 +00:00
|
|
|
total_bytes_to_send -= write_size;
|
2021-09-09 21:49:01 +00:00
|
|
|
} else if (is_verifying_file &&
|
2021-09-10 02:52:23 +00:00
|
|
|
first_byte_to_send >= static_cast<uint64_t>(block_size)) {
|
2021-09-09 21:49:01 +00:00
|
|
|
// If validation is active and the range of bytes the request wants starts
|
|
|
|
// beyond the first block we need to read the next 4MB-1KB to validate
|
|
|
|
// that block. Then we can skip ahead to the target block in the SetRange
|
|
|
|
// call below If we hit this case it is assumed that none of the data read
|
|
|
|
// will be needed by the producer
|
2021-09-10 02:52:23 +00:00
|
|
|
uint64_t bytes_to_drop = block_size - net::kMaxBytesToSniff;
|
2021-09-09 21:49:01 +00:00
|
|
|
total_bytes_dropped_from_head += bytes_to_drop;
|
|
|
|
std::vector<char> abandoned_buffer(bytes_to_drop);
|
|
|
|
auto abandon_read_result =
|
|
|
|
readable_data_source.get()->Read(info.offset + net::kMaxBytesToSniff,
|
|
|
|
base::span<char>(abandoned_buffer));
|
|
|
|
if (abandon_read_result.result != MOJO_RESULT_OK) {
|
|
|
|
OnClientComplete(
|
|
|
|
ConvertMojoResultToNetError(abandon_read_result.result));
|
|
|
|
return;
|
|
|
|
}
|
2019-05-14 23:29:58 +00:00
|
|
|
}
|
|
|
|
|
2019-12-13 20:13:12 +00:00
|
|
|
if (!net::GetMimeTypeFromFile(path, &head->mime_type)) {
|
2019-05-14 23:29:58 +00:00
|
|
|
std::string new_type;
|
2020-09-21 08:00:36 +00:00
|
|
|
net::SniffMimeType(
|
|
|
|
base::StringPiece(initial_read_buffer.data(), read_result.bytes_read),
|
|
|
|
request.url, head->mime_type,
|
|
|
|
net::ForceSniffFileUrlsForHtml::kDisabled, &new_type);
|
2019-12-13 20:13:12 +00:00
|
|
|
head->mime_type.assign(new_type);
|
|
|
|
head->did_mime_sniff = true;
|
2019-05-14 23:29:58 +00:00
|
|
|
}
|
2019-12-13 20:13:12 +00:00
|
|
|
if (head->headers) {
|
2020-04-30 20:20:44 +00:00
|
|
|
head->headers->AddHeader(net::HttpRequestHeaders::kContentType,
|
|
|
|
head->mime_type.c_str());
|
2019-05-14 23:29:58 +00:00
|
|
|
}
|
2022-09-07 07:46:37 +00:00
|
|
|
client_->OnReceiveResponse(std::move(head), std::move(consumer_handle),
|
|
|
|
absl::nullopt);
|
2019-05-14 23:29:58 +00:00
|
|
|
|
|
|
|
if (total_bytes_to_send == 0) {
|
|
|
|
// There's definitely no more data, so we're already done.
|
2021-09-09 21:49:01 +00:00
|
|
|
// We provide the range data to the file validator so that
|
|
|
|
// it can validate the tiny amount of data we did send
|
|
|
|
if (file_validator_raw)
|
|
|
|
file_validator_raw->SetRange(info.offset + first_byte_to_send,
|
|
|
|
total_bytes_dropped_from_head,
|
|
|
|
info.offset + info.size);
|
2019-05-14 23:29:58 +00:00
|
|
|
OnFileWritten(MOJO_RESULT_OK);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-09-09 21:49:01 +00:00
|
|
|
if (is_verifying_file) {
|
|
|
|
int start_block = first_byte_to_send / block_size;
|
|
|
|
|
|
|
|
// If we're starting from the first block, we might not be starting from
|
|
|
|
// where we sniffed. We might be a few KB into a file so we need to read
|
|
|
|
// the data in the middle so it gets hashed.
|
|
|
|
//
|
|
|
|
// If we're starting from a later block we might be starting half-way
|
|
|
|
// through the block regardless of what was sniffed. We need to read the
|
|
|
|
// data from the start of our initial block up to the start of our actual
|
|
|
|
// read point so it gets hashed.
|
|
|
|
uint64_t bytes_to_drop =
|
|
|
|
start_block == 0 ? first_byte_to_send - net::kMaxBytesToSniff
|
|
|
|
: first_byte_to_send - (start_block * block_size);
|
|
|
|
if (file_validator_raw)
|
|
|
|
file_validator_raw->SetCurrentBlock(start_block);
|
|
|
|
|
|
|
|
if (bytes_to_drop > 0) {
|
|
|
|
uint64_t dropped_bytes_offset =
|
|
|
|
info.offset + (start_block * block_size);
|
|
|
|
if (start_block == 0)
|
|
|
|
dropped_bytes_offset += net::kMaxBytesToSniff;
|
|
|
|
total_bytes_dropped_from_head += bytes_to_drop;
|
|
|
|
std::vector<char> abandoned_buffer(bytes_to_drop);
|
|
|
|
auto abandon_read_result = readable_data_source.get()->Read(
|
|
|
|
dropped_bytes_offset, base::span<char>(abandoned_buffer));
|
|
|
|
if (abandon_read_result.result != MOJO_RESULT_OK) {
|
|
|
|
OnClientComplete(
|
|
|
|
ConvertMojoResultToNetError(abandon_read_result.result));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-14 23:29:58 +00:00
|
|
|
// In case of a range request, seek to the appropriate position before
|
|
|
|
// sending the remaining bytes asynchronously. Under normal conditions
|
|
|
|
// (i.e., no range request) this Seek is effectively a no-op.
|
|
|
|
//
|
|
|
|
// Note that in Electron we also need to add file offset.
|
2021-09-09 21:49:01 +00:00
|
|
|
file_data_source_raw->SetRange(
|
2019-08-02 23:56:46 +00:00
|
|
|
first_byte_to_send + info.offset,
|
|
|
|
first_byte_to_send + info.offset + total_bytes_to_send);
|
2021-09-09 21:49:01 +00:00
|
|
|
if (file_validator_raw)
|
|
|
|
file_validator_raw->SetRange(info.offset + first_byte_to_send,
|
|
|
|
total_bytes_dropped_from_head,
|
|
|
|
info.offset + info.size);
|
2019-05-14 23:29:58 +00:00
|
|
|
|
2021-03-04 17:27:05 +00:00
|
|
|
data_producer_ =
|
|
|
|
std::make_unique<mojo::DataPipeProducer>(std::move(producer_handle));
|
2019-07-24 22:58:51 +00:00
|
|
|
data_producer_->Write(
|
2021-09-09 21:49:01 +00:00
|
|
|
std::move(readable_data_source),
|
2019-05-14 23:29:58 +00:00
|
|
|
base::BindOnce(&AsarURLLoader::OnFileWritten, base::Unretained(this)));
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnConnectionError() {
|
2019-11-05 23:41:20 +00:00
|
|
|
receiver_.reset();
|
2019-05-14 23:29:58 +00:00
|
|
|
MaybeDeleteSelf();
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnClientComplete(net::Error net_error) {
|
|
|
|
client_->OnComplete(network::URLLoaderCompletionStatus(net_error));
|
|
|
|
client_.reset();
|
|
|
|
MaybeDeleteSelf();
|
|
|
|
}
|
|
|
|
|
|
|
|
void MaybeDeleteSelf() {
|
2019-11-05 23:41:20 +00:00
|
|
|
if (!receiver_.is_bound() && !client_.is_bound())
|
2019-05-14 23:29:58 +00:00
|
|
|
delete this;
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnFileWritten(MojoResult result) {
|
|
|
|
// All the data has been written now. Close the data pipe. The consumer will
|
|
|
|
// be notified that there will be no more data to read from now.
|
|
|
|
data_producer_.reset();
|
|
|
|
|
|
|
|
if (result == MOJO_RESULT_OK) {
|
|
|
|
network::URLLoaderCompletionStatus status(net::OK);
|
|
|
|
status.encoded_data_length = total_bytes_written_;
|
|
|
|
status.encoded_body_length = total_bytes_written_;
|
|
|
|
status.decoded_body_length = total_bytes_written_;
|
|
|
|
client_->OnComplete(status);
|
|
|
|
} else {
|
|
|
|
client_->OnComplete(network::URLLoaderCompletionStatus(net::ERR_FAILED));
|
|
|
|
}
|
|
|
|
client_.reset();
|
|
|
|
MaybeDeleteSelf();
|
|
|
|
}
|
|
|
|
|
2019-07-24 22:58:51 +00:00
|
|
|
std::unique_ptr<mojo::DataPipeProducer> data_producer_;
|
2019-11-05 23:41:20 +00:00
|
|
|
mojo::Receiver<network::mojom::URLLoader> receiver_{this};
|
2019-12-11 00:22:35 +00:00
|
|
|
mojo::Remote<network::mojom::URLLoaderClient> client_;
|
2019-05-14 23:29:58 +00:00
|
|
|
|
|
|
|
// In case of successful loads, this holds the total number of bytes written
|
|
|
|
// to the response (this may be smaller than the total size of the file when
|
|
|
|
// a byte range was requested).
|
|
|
|
// It is used to set some of the URLLoaderCompletionStatus data passed back
|
|
|
|
// to the URLLoaderClients (eg SimpleURLLoader).
|
|
|
|
size_t total_bytes_written_ = 0;
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
void CreateAsarURLLoader(
|
|
|
|
const network::ResourceRequest& request,
|
2022-03-25 01:39:03 +00:00
|
|
|
mojo::PendingReceiver<network::mojom::URLLoader> loader,
|
2019-12-11 00:22:35 +00:00
|
|
|
mojo::PendingRemote<network::mojom::URLLoaderClient> client,
|
2019-05-14 23:29:58 +00:00
|
|
|
scoped_refptr<net::HttpResponseHeaders> extra_response_headers) {
|
2020-03-09 16:13:59 +00:00
|
|
|
auto task_runner = base::ThreadPool::CreateSequencedTaskRunner(
|
|
|
|
{base::MayBlock(), base::TaskPriority::USER_VISIBLE,
|
2019-05-14 23:29:58 +00:00
|
|
|
base::TaskShutdownBehavior::SKIP_ON_SHUTDOWN});
|
|
|
|
task_runner->PostTask(
|
2019-12-11 00:22:35 +00:00
|
|
|
FROM_HERE,
|
|
|
|
base::BindOnce(&AsarURLLoader::CreateAndStart, request, std::move(loader),
|
|
|
|
std::move(client), std::move(extra_response_headers)));
|
2019-05-14 23:29:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace asar
|