[email protected] | 26b997396 | 2012-01-28 00:57:00 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 4 | |
[email protected] | 8693361 | 2010-10-16 23:10:33 | [diff] [blame] | 5 | #include "net/proxy/proxy_script_fetcher_impl.h" |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 6 | |
| 7 | #include "base/compiler_specific.h" |
[email protected] | d6e58c6e | 2009-10-10 20:40:50 | [diff] [blame] | 8 | #include "base/i18n/icu_string_conversions.h" |
[email protected] | 13a279e | 2009-04-13 17:32:37 | [diff] [blame] | 9 | #include "base/logging.h" |
[email protected] | 18b57741 | 2013-07-18 04:19:15 | [diff] [blame] | 10 | #include "base/message_loop/message_loop.h" |
[email protected] | fc9be580 | 2013-06-11 10:56:51 | [diff] [blame] | 11 | #include "base/strings/string_util.h" |
[email protected] | d9d71e08 | 2011-02-16 11:44:28 | [diff] [blame] | 12 | #include "net/base/data_url.h" |
[email protected] | 9dea9e1f | 2009-01-29 00:30:47 | [diff] [blame] | 13 | #include "net/base/io_buffer.h" |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 14 | #include "net/base/load_flags.h" |
[email protected] | 597cf6e | 2009-05-29 09:43:26 | [diff] [blame] | 15 | #include "net/base/net_errors.h" |
[email protected] | 2ca01e5 | 2013-10-31 22:05:19 | [diff] [blame^] | 16 | #include "net/base/request_priority.h" |
[email protected] | 6e7845ae | 2013-03-29 21:48:11 | [diff] [blame] | 17 | #include "net/cert/cert_status_flags.h" |
[email protected] | e0ef2c2 | 2009-06-03 23:54:44 | [diff] [blame] | 18 | #include "net/http/http_response_headers.h" |
[email protected] | 8693361 | 2010-10-16 23:10:33 | [diff] [blame] | 19 | #include "net/url_request/url_request_context.h" |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 20 | |
[email protected] | f0a51fb5 | 2009-03-05 12:46:38 | [diff] [blame] | 21 | // TODO(eroman): |
[email protected] | 33abb68 | 2011-03-29 03:58:42 | [diff] [blame] | 22 | // - Support auth-prompts (http://crbug.com/77366) |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 23 | |
| 24 | namespace net { |
| 25 | |
| 26 | namespace { |
| 27 | |
| 28 | // The maximum size (in bytes) allowed for a PAC script. Responses exceeding |
| 29 | // this will fail with ERR_FILE_TOO_BIG. |
[email protected] | 8693361 | 2010-10-16 23:10:33 | [diff] [blame] | 30 | const int kDefaultMaxResponseBytes = 1048576; // 1 megabyte |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 31 | |
| 32 | // The maximum duration (in milliseconds) allowed for fetching the PAC script. |
| 33 | // Responses exceeding this will fail with ERR_TIMED_OUT. |
[email protected] | 8693361 | 2010-10-16 23:10:33 | [diff] [blame] | 34 | const int kDefaultMaxDurationMs = 300000; // 5 minutes |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 35 | |
[email protected] | 13a279e | 2009-04-13 17:32:37 | [diff] [blame] | 36 | // Returns true if |mime_type| is one of the known PAC mime type. |
| 37 | bool IsPacMimeType(const std::string& mime_type) { |
| 38 | static const char * const kSupportedPacMimeTypes[] = { |
| 39 | "application/x-ns-proxy-autoconfig", |
| 40 | "application/x-javascript-config", |
| 41 | }; |
| 42 | for (size_t i = 0; i < arraysize(kSupportedPacMimeTypes); ++i) { |
| 43 | if (LowerCaseEqualsASCII(mime_type, kSupportedPacMimeTypes[i])) |
| 44 | return true; |
| 45 | } |
| 46 | return false; |
| 47 | } |
| 48 | |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 49 | // Converts |bytes| (which is encoded by |charset|) to UTF16, saving the resul |
| 50 | // to |*utf16|. |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 51 | // If |charset| is empty, then we don't know what it was and guess. |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 52 | void ConvertResponseToUTF16(const std::string& charset, |
| 53 | const std::string& bytes, |
[email protected] | 42cba2fb | 2013-03-29 19:58:57 | [diff] [blame] | 54 | base::string16* utf16) { |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 55 | const char* codepage; |
| 56 | |
| 57 | if (charset.empty()) { |
| 58 | // Assume ISO-8859-1 if no charset was specified. |
[email protected] | d6e58c6e | 2009-10-10 20:40:50 | [diff] [blame] | 59 | codepage = base::kCodepageLatin1; |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 60 | } else { |
| 61 | // Otherwise trust the charset that was provided. |
| 62 | codepage = charset.c_str(); |
| 63 | } |
| 64 | |
| 65 | // We will be generous in the conversion -- if any characters lie |
| 66 | // outside of |charset| (i.e. invalid), then substitute them with |
| 67 | // U+FFFD rather than failing. |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 68 | base::CodepageToUTF16(bytes, codepage, |
| 69 | base::OnStringConversionError::SUBSTITUTE, |
| 70 | utf16); |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 71 | } |
| 72 | |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 73 | } // namespace |
| 74 | |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 75 | ProxyScriptFetcherImpl::ProxyScriptFetcherImpl( |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 76 | URLRequestContext* url_request_context) |
[email protected] | aa249b5 | 2013-04-30 01:04:32 | [diff] [blame] | 77 | : weak_factory_(this), |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 78 | url_request_context_(url_request_context), |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 79 | buf_(new IOBuffer(kBufSize)), |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 80 | next_id_(0), |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 81 | cur_request_id_(0), |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 82 | result_code_(OK), |
[email protected] | 8693361 | 2010-10-16 23:10:33 | [diff] [blame] | 83 | result_text_(NULL), |
| 84 | max_response_bytes_(kDefaultMaxResponseBytes), |
| 85 | max_duration_(base::TimeDelta::FromMilliseconds(kDefaultMaxDurationMs)) { |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 86 | DCHECK(url_request_context); |
| 87 | } |
| 88 | |
| 89 | ProxyScriptFetcherImpl::~ProxyScriptFetcherImpl() { |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 90 | // The URLRequest's destructor will cancel the outstanding request, and |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 91 | // ensure that the delegate (this) is not called again. |
| 92 | } |
| 93 | |
[email protected] | 7aefb15 | 2011-01-21 23:46:49 | [diff] [blame] | 94 | base::TimeDelta ProxyScriptFetcherImpl::SetTimeoutConstraint( |
| 95 | base::TimeDelta timeout) { |
| 96 | base::TimeDelta prev = max_duration_; |
| 97 | max_duration_ = timeout; |
| 98 | return prev; |
| 99 | } |
| 100 | |
| 101 | size_t ProxyScriptFetcherImpl::SetSizeConstraint(size_t size_bytes) { |
| 102 | size_t prev = max_response_bytes_; |
| 103 | max_response_bytes_ = size_bytes; |
| 104 | return prev; |
| 105 | } |
| 106 | |
| 107 | void ProxyScriptFetcherImpl::OnResponseCompleted(URLRequest* request) { |
| 108 | DCHECK_EQ(request, cur_request_.get()); |
| 109 | |
| 110 | // Use |result_code_| as the request's error if we have already set it to |
| 111 | // something specific. |
| 112 | if (result_code_ == OK && !request->status().is_success()) |
[email protected] | d0cc35b | 2011-09-08 12:02:05 | [diff] [blame] | 113 | result_code_ = request->status().error(); |
[email protected] | 7aefb15 | 2011-01-21 23:46:49 | [diff] [blame] | 114 | |
| 115 | FetchCompleted(); |
| 116 | } |
| 117 | |
[email protected] | 23578681 | 2011-12-20 02:15:31 | [diff] [blame] | 118 | int ProxyScriptFetcherImpl::Fetch( |
[email protected] | 42cba2fb | 2013-03-29 19:58:57 | [diff] [blame] | 119 | const GURL& url, base::string16* text, const CompletionCallback& callback) { |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 120 | // It is invalid to call Fetch() while a request is already in progress. |
| 121 | DCHECK(!cur_request_.get()); |
[email protected] | 23578681 | 2011-12-20 02:15:31 | [diff] [blame] | 122 | DCHECK(!callback.is_null()); |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 123 | DCHECK(text); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 124 | |
[email protected] | d9d71e08 | 2011-02-16 11:44:28 | [diff] [blame] | 125 | // Handle base-64 encoded data-urls that contain custom PAC scripts. |
| 126 | if (url.SchemeIs("data")) { |
| 127 | std::string mime_type; |
| 128 | std::string charset; |
| 129 | std::string data; |
| 130 | if (!DataURL::Parse(url, &mime_type, &charset, &data)) |
| 131 | return ERR_FAILED; |
| 132 | |
| 133 | ConvertResponseToUTF16(charset, data, text); |
| 134 | return OK; |
| 135 | } |
| 136 | |
[email protected] | 2ca01e5 | 2013-10-31 22:05:19 | [diff] [blame^] | 137 | cur_request_ = |
| 138 | url_request_context_->CreateRequest(url, DEFAULT_PRIORITY, this); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 139 | cur_request_->set_method("GET"); |
| 140 | |
| 141 | // Make sure that the PAC script is downloaded using a direct connection, |
| 142 | // to avoid circular dependencies (fetching is a part of proxy resolution). |
[email protected] | e0ef2c2 | 2009-06-03 23:54:44 | [diff] [blame] | 143 | // Also disable the use of the disk cache. The cache is disabled so that if |
| 144 | // the user switches networks we don't potentially use the cached response |
| 145 | // from old network when we should in fact be re-fetching on the new network. |
[email protected] | 6fbac16 | 2011-06-20 00:29:04 | [diff] [blame] | 146 | // If the PAC script is hosted on an HTTPS server we bypass revocation |
| 147 | // checking in order to avoid a circular dependency when attempting to fetch |
| 148 | // the OCSP response or CRL. We could make the revocation check go direct but |
| 149 | // the proxy might be the only way to the outside world. |
| 150 | cur_request_->set_load_flags(LOAD_BYPASS_PROXY | LOAD_DISABLE_CACHE | |
| 151 | LOAD_DISABLE_CERT_REVOCATION_CHECKING); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 152 | |
| 153 | // Save the caller's info for notification on completion. |
| 154 | callback_ = callback; |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 155 | result_text_ = text; |
| 156 | |
| 157 | bytes_read_so_far_.clear(); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 158 | |
| 159 | // Post a task to timeout this request if it takes too long. |
| 160 | cur_request_id_ = ++next_id_; |
[email protected] | 2da659e | 2013-05-23 20:51:34 | [diff] [blame] | 161 | base::MessageLoop::current()->PostDelayedTask( |
[email protected] | 23578681 | 2011-12-20 02:15:31 | [diff] [blame] | 162 | FROM_HERE, |
[email protected] | 2da659e | 2013-05-23 20:51:34 | [diff] [blame] | 163 | base::Bind(&ProxyScriptFetcherImpl::OnTimeout, |
| 164 | weak_factory_.GetWeakPtr(), |
[email protected] | 23578681 | 2011-12-20 02:15:31 | [diff] [blame] | 165 | cur_request_id_), |
[email protected] | 26b997396 | 2012-01-28 00:57:00 | [diff] [blame] | 166 | max_duration_); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 167 | |
| 168 | // Start the request. |
| 169 | cur_request_->Start(); |
[email protected] | 620f571 | 2009-08-04 22:43:12 | [diff] [blame] | 170 | return ERR_IO_PENDING; |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 171 | } |
| 172 | |
| 173 | void ProxyScriptFetcherImpl::Cancel() { |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 174 | // ResetCurRequestState will free the URLRequest, which will cause |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 175 | // cancellation. |
| 176 | ResetCurRequestState(); |
| 177 | } |
| 178 | |
[email protected] | 7258def | 2011-05-17 19:53:00 | [diff] [blame] | 179 | URLRequestContext* ProxyScriptFetcherImpl::GetRequestContext() const { |
[email protected] | 20d296ddc | 2009-11-18 23:07:08 | [diff] [blame] | 180 | return url_request_context_; |
| 181 | } |
| 182 | |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 183 | void ProxyScriptFetcherImpl::OnAuthRequired(URLRequest* request, |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 184 | AuthChallengeInfo* auth_info) { |
[email protected] | 096724916 | 2010-11-20 00:13:32 | [diff] [blame] | 185 | DCHECK_EQ(request, cur_request_.get()); |
[email protected] | 33abb68 | 2011-03-29 03:58:42 | [diff] [blame] | 186 | // TODO(eroman): http://crbug.com/77366 |
[email protected] | 13a279e | 2009-04-13 17:32:37 | [diff] [blame] | 187 | LOG(WARNING) << "Auth required to fetch PAC script, aborting."; |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 188 | result_code_ = ERR_NOT_IMPLEMENTED; |
| 189 | request->CancelAuth(); |
| 190 | } |
| 191 | |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 192 | void ProxyScriptFetcherImpl::OnSSLCertificateError(URLRequest* request, |
[email protected] | e5624f0 | 2011-09-27 19:43:53 | [diff] [blame] | 193 | const SSLInfo& ssl_info, |
[email protected] | 46d117e | 2012-01-18 01:53:14 | [diff] [blame] | 194 | bool fatal) { |
[email protected] | 096724916 | 2010-11-20 00:13:32 | [diff] [blame] | 195 | DCHECK_EQ(request, cur_request_.get()); |
[email protected] | 5db5a73d | 2011-10-12 16:19:36 | [diff] [blame] | 196 | // Revocation check failures are not fatal. |
| 197 | if (IsCertStatusMinorError(ssl_info.cert_status)) { |
| 198 | request->ContinueDespiteLastError(); |
| 199 | return; |
| 200 | } |
[email protected] | 13a279e | 2009-04-13 17:32:37 | [diff] [blame] | 201 | LOG(WARNING) << "SSL certificate error when fetching PAC script, aborting."; |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 202 | // Certificate errors are in same space as net errors. |
[email protected] | e5624f0 | 2011-09-27 19:43:53 | [diff] [blame] | 203 | result_code_ = MapCertStatusToNetError(ssl_info.cert_status); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 204 | request->Cancel(); |
| 205 | } |
| 206 | |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 207 | void ProxyScriptFetcherImpl::OnResponseStarted(URLRequest* request) { |
[email protected] | 096724916 | 2010-11-20 00:13:32 | [diff] [blame] | 208 | DCHECK_EQ(request, cur_request_.get()); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 209 | |
| 210 | if (!request->status().is_success()) { |
| 211 | OnResponseCompleted(request); |
| 212 | return; |
| 213 | } |
| 214 | |
| 215 | // Require HTTP responses to have a success status code. |
[email protected] | 91f568903 | 2013-08-22 01:43:33 | [diff] [blame] | 216 | if (request->url().SchemeIsHTTPOrHTTPS()) { |
[email protected] | f0a51fb5 | 2009-03-05 12:46:38 | [diff] [blame] | 217 | // NOTE about status codes: We are like Firefox 3 in this respect. |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 218 | // {IE 7, Safari 3, Opera 9.5} do not care about the status code. |
| 219 | if (request->GetResponseCode() != 200) { |
[email protected] | b30a3f5 | 2010-10-16 01:05:46 | [diff] [blame] | 220 | VLOG(1) << "Fetched PAC script had (bad) status line: " |
| 221 | << request->response_headers()->GetStatusLine(); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 222 | result_code_ = ERR_PAC_STATUS_NOT_OK; |
| 223 | request->Cancel(); |
| 224 | return; |
| 225 | } |
[email protected] | 13a279e | 2009-04-13 17:32:37 | [diff] [blame] | 226 | |
| 227 | // NOTE about mime types: We do not enforce mime types on PAC files. |
| 228 | // This is for compatibility with {IE 7, Firefox 3, Opera 9.5}. We will |
| 229 | // however log mismatches to help with debugging. |
[email protected] | e0ef2c2 | 2009-06-03 23:54:44 | [diff] [blame] | 230 | std::string mime_type; |
| 231 | cur_request_->GetMimeType(&mime_type); |
| 232 | if (!IsPacMimeType(mime_type)) { |
[email protected] | b30a3f5 | 2010-10-16 01:05:46 | [diff] [blame] | 233 | VLOG(1) << "Fetched PAC script does not have a proper mime type: " |
| 234 | << mime_type; |
[email protected] | 13a279e | 2009-04-13 17:32:37 | [diff] [blame] | 235 | } |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 236 | } |
| 237 | |
| 238 | ReadBody(request); |
| 239 | } |
| 240 | |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 241 | void ProxyScriptFetcherImpl::OnReadCompleted(URLRequest* request, |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 242 | int num_bytes) { |
[email protected] | 096724916 | 2010-11-20 00:13:32 | [diff] [blame] | 243 | DCHECK_EQ(request, cur_request_.get()); |
| 244 | if (ConsumeBytesRead(request, num_bytes)) { |
| 245 | // Keep reading. |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 246 | ReadBody(request); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 247 | } |
| 248 | } |
| 249 | |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 250 | void ProxyScriptFetcherImpl::ReadBody(URLRequest* request) { |
[email protected] | 096724916 | 2010-11-20 00:13:32 | [diff] [blame] | 251 | // Read as many bytes as are available synchronously. |
| 252 | while (true) { |
| 253 | int num_bytes; |
[email protected] | 9049948 | 2013-06-01 00:39:50 | [diff] [blame] | 254 | if (!request->Read(buf_.get(), kBufSize, &num_bytes)) { |
[email protected] | 096724916 | 2010-11-20 00:13:32 | [diff] [blame] | 255 | // Check whether the read failed synchronously. |
| 256 | if (!request->status().is_io_pending()) |
| 257 | OnResponseCompleted(request); |
| 258 | return; |
| 259 | } |
| 260 | if (!ConsumeBytesRead(request, num_bytes)) |
| 261 | return; |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 262 | } |
| 263 | } |
| 264 | |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 265 | bool ProxyScriptFetcherImpl::ConsumeBytesRead(URLRequest* request, |
[email protected] | 096724916 | 2010-11-20 00:13:32 | [diff] [blame] | 266 | int num_bytes) { |
| 267 | if (num_bytes <= 0) { |
| 268 | // Error while reading, or EOF. |
| 269 | OnResponseCompleted(request); |
| 270 | return false; |
| 271 | } |
| 272 | |
| 273 | // Enforce maximum size bound. |
| 274 | if (num_bytes + bytes_read_so_far_.size() > |
| 275 | static_cast<size_t>(max_response_bytes_)) { |
| 276 | result_code_ = ERR_FILE_TOO_BIG; |
| 277 | request->Cancel(); |
| 278 | return false; |
| 279 | } |
| 280 | |
| 281 | bytes_read_so_far_.append(buf_->data(), num_bytes); |
| 282 | return true; |
| 283 | } |
| 284 | |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 285 | void ProxyScriptFetcherImpl::FetchCompleted() { |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 286 | if (result_code_ == OK) { |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 287 | // The caller expects the response to be encoded as UTF16. |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 288 | std::string charset; |
| 289 | cur_request_->GetCharset(&charset); |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 290 | ConvertResponseToUTF16(charset, bytes_read_so_far_, result_text_); |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 291 | } else { |
| 292 | // On error, the caller expects empty string for bytes. |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 293 | result_text_->clear(); |
[email protected] | 8f3c9634 | 2009-09-22 03:06:54 | [diff] [blame] | 294 | } |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 295 | |
| 296 | int result_code = result_code_; |
[email protected] | 23578681 | 2011-12-20 02:15:31 | [diff] [blame] | 297 | CompletionCallback callback = callback_; |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 298 | |
| 299 | ResetCurRequestState(); |
| 300 | |
[email protected] | 23578681 | 2011-12-20 02:15:31 | [diff] [blame] | 301 | callback.Run(result_code); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 302 | } |
| 303 | |
| 304 | void ProxyScriptFetcherImpl::ResetCurRequestState() { |
| 305 | cur_request_.reset(); |
| 306 | cur_request_id_ = 0; |
[email protected] | 23578681 | 2011-12-20 02:15:31 | [diff] [blame] | 307 | callback_.Reset(); |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 308 | result_code_ = OK; |
[email protected] | 9b9ae955 | 2010-07-01 22:20:50 | [diff] [blame] | 309 | result_text_ = NULL; |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 310 | } |
| 311 | |
| 312 | void ProxyScriptFetcherImpl::OnTimeout(int id) { |
[email protected] | da968bc | 2011-01-19 11:48:19 | [diff] [blame] | 313 | // Timeout tasks may outlive the URLRequest they reference. Make sure it |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 314 | // is still applicable. |
| 315 | if (cur_request_id_ != id) |
| 316 | return; |
| 317 | |
| 318 | DCHECK(cur_request_.get()); |
| 319 | result_code_ = ERR_TIMED_OUT; |
| 320 | cur_request_->Cancel(); |
| 321 | } |
| 322 | |
[email protected] | 677c9057 | 2008-12-10 09:03:15 | [diff] [blame] | 323 | } // namespace net |