1 /*
2 * Copyright (C) 2004, 2005, 2006, 2007, 2009 Apple Inc. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY
14 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
16 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
17 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
18 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
19 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
20 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
21 * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26 #include "config.h"
27
28 #if USE(CFNETWORK)
29
30 #include "ResourceHandle.h"
31 #include "ResourceHandleClient.h"
32 #include "ResourceHandleInternal.h"
33
34 #include "AuthenticationCF.h"
35 #include "AuthenticationChallenge.h"
36 #include "Base64.h"
37 #include "CookieStorageCFNet.h"
38 #include "CredentialStorage.h"
39 #include "CachedResourceLoader.h"
40 #include "FormDataStreamCFNet.h"
41 #include "Frame.h"
42 #include "FrameLoader.h"
43 #include "LoaderRunLoopCF.h"
44 #include "Logging.h"
45 #include "MIMETypeRegistry.h"
46 #include "ResourceError.h"
47 #include "ResourceResponse.h"
48 #include "SharedBuffer.h"
49 #include <CFNetwork/CFNetwork.h>
50 #include <WebKitSystemInterface/WebKitSystemInterface.h>
51 #include <process.h> // for _beginthread()
52 #include <sys/stat.h>
53 #include <sys/types.h>
54 #include <wtf/HashMap.h>
55 #include <wtf/Threading.h>
56 #include <wtf/text/CString.h>
57
58 // FIXME: Remove this declaration once it's in WebKitSupportLibrary.
59 extern "C" {
60 __declspec(dllimport) CFURLConnectionRef CFURLConnectionCreateWithProperties(
61 CFAllocatorRef alloc,
62 CFURLRequestRef request,
63 CFURLConnectionClient * client,
64 CFDictionaryRef properties);
65 }
66
67 namespace WebCore {
68
69 static CFStringRef WebCoreSynchronousLoaderRunLoopMode = CFSTR("WebCoreSynchronousLoaderRunLoopMode");
70
71 class WebCoreSynchronousLoaderClient : public ResourceHandleClient {
72 public:
create(ResourceResponse & response,ResourceError & error)73 static PassOwnPtr<WebCoreSynchronousLoaderClient> create(ResourceResponse& response, ResourceError& error)
74 {
75 return adoptPtr(new WebCoreSynchronousLoaderClient(response, error));
76 }
77
setAllowStoredCredentials(bool allow)78 void setAllowStoredCredentials(bool allow) { m_allowStoredCredentials = allow; }
isDone()79 bool isDone() { return m_isDone; }
80
data()81 CFMutableDataRef data() { return m_data.get(); }
82
83 private:
WebCoreSynchronousLoaderClient(ResourceResponse & response,ResourceError & error)84 WebCoreSynchronousLoaderClient(ResourceResponse& response, ResourceError& error)
85 : m_allowStoredCredentials(false)
86 , m_response(response)
87 , m_error(error)
88 , m_isDone(false)
89 {
90 }
91
92 virtual void willSendRequest(ResourceHandle*, ResourceRequest&, const ResourceResponse& /*redirectResponse*/);
93 virtual bool shouldUseCredentialStorage(ResourceHandle*);
94 virtual void didReceiveAuthenticationChallenge(ResourceHandle*, const AuthenticationChallenge&);
95 virtual void didReceiveResponse(ResourceHandle*, const ResourceResponse&);
96 virtual void didReceiveData(ResourceHandle*, const char*, int, int /*encodedDataLength*/);
97 virtual void didFinishLoading(ResourceHandle*, double /*finishTime*/);
98 virtual void didFail(ResourceHandle*, const ResourceError&);
99
100 bool m_allowStoredCredentials;
101 ResourceResponse& m_response;
102 RetainPtr<CFMutableDataRef> m_data;
103 ResourceError& m_error;
104 bool m_isDone;
105 };
106
allowsAnyHTTPSCertificateHosts()107 static HashSet<String>& allowsAnyHTTPSCertificateHosts()
108 {
109 static HashSet<String> hosts;
110
111 return hosts;
112 }
113
clientCerts()114 static HashMap<String, RetainPtr<CFDataRef> >& clientCerts()
115 {
116 static HashMap<String, RetainPtr<CFDataRef> > certs;
117 return certs;
118 }
119
setDefaultMIMEType(CFURLResponseRef response)120 static void setDefaultMIMEType(CFURLResponseRef response)
121 {
122 static CFStringRef defaultMIMETypeString = defaultMIMEType().createCFString();
123
124 CFURLResponseSetMIMEType(response, defaultMIMETypeString);
125 }
126
encodeBasicAuthorization(const String & user,const String & password)127 static String encodeBasicAuthorization(const String& user, const String& password)
128 {
129 return base64Encode((user + ":" + password).utf8());
130 }
131
willSendRequest(CFURLConnectionRef conn,CFURLRequestRef cfRequest,CFURLResponseRef cfRedirectResponse,const void * clientInfo)132 CFURLRequestRef willSendRequest(CFURLConnectionRef conn, CFURLRequestRef cfRequest, CFURLResponseRef cfRedirectResponse, const void* clientInfo)
133 {
134 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
135
136 if (!cfRedirectResponse) {
137 CFRetain(cfRequest);
138 return cfRequest;
139 }
140
141 LOG(Network, "CFNet - willSendRequest(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
142
143 ResourceRequest request;
144 if (cfRedirectResponse) {
145 CFHTTPMessageRef httpMessage = CFURLResponseGetHTTPResponse(cfRedirectResponse);
146 if (httpMessage && CFHTTPMessageGetResponseStatusCode(httpMessage) == 307) {
147 RetainPtr<CFStringRef> lastHTTPMethod(AdoptCF, handle->lastHTTPMethod().createCFString());
148 RetainPtr<CFStringRef> newMethod(AdoptCF, CFURLRequestCopyHTTPRequestMethod(cfRequest));
149 if (CFStringCompareWithOptions(lastHTTPMethod.get(), newMethod.get(), CFRangeMake(0, CFStringGetLength(lastHTTPMethod.get())), kCFCompareCaseInsensitive)) {
150 RetainPtr<CFMutableURLRequestRef> mutableRequest(AdoptCF, CFURLRequestCreateMutableCopy(0, cfRequest));
151 CFURLRequestSetHTTPRequestMethod(mutableRequest.get(), lastHTTPMethod.get());
152
153 FormData* body = handle->firstRequest().httpBody();
154 if (!equalIgnoringCase(handle->firstRequest().httpMethod(), "GET") && body && !body->isEmpty())
155 WebCore::setHTTPBody(mutableRequest.get(), body);
156
157 String originalContentType = handle->firstRequest().httpContentType();
158 RetainPtr<CFStringRef> originalContentTypeCF(AdoptCF, originalContentType.createCFString());
159 if (!originalContentType.isEmpty())
160 CFURLRequestSetHTTPHeaderFieldValue(mutableRequest.get(), CFSTR("Content-Type"), originalContentTypeCF.get());
161
162 request = mutableRequest.get();
163 }
164 }
165 }
166 if (request.isNull())
167 request = cfRequest;
168
169 // Should not set Referer after a redirect from a secure resource to non-secure one.
170 if (!request.url().protocolIs("https") && protocolIs(request.httpReferrer(), "https"))
171 request.clearHTTPReferrer();
172
173 handle->willSendRequest(request, cfRedirectResponse);
174
175 if (request.isNull())
176 return 0;
177
178 cfRequest = request.cfURLRequest();
179
180 CFRetain(cfRequest);
181 return cfRequest;
182 }
183
didReceiveResponse(CFURLConnectionRef conn,CFURLResponseRef cfResponse,const void * clientInfo)184 void didReceiveResponse(CFURLConnectionRef conn, CFURLResponseRef cfResponse, const void* clientInfo)
185 {
186 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
187
188 LOG(Network, "CFNet - didReceiveResponse(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
189
190 if (!handle->client())
191 return;
192
193 if (!CFURLResponseGetMIMEType(cfResponse)) {
194 // We should never be applying the default MIMEType if we told the networking layer to do content sniffing for handle.
195 ASSERT(!handle->shouldContentSniff());
196 setDefaultMIMEType(cfResponse);
197 }
198
199 handle->client()->didReceiveResponse(handle, cfResponse);
200 }
201
didReceiveData(CFURLConnectionRef conn,CFDataRef data,CFIndex originalLength,const void * clientInfo)202 void didReceiveData(CFURLConnectionRef conn, CFDataRef data, CFIndex originalLength, const void* clientInfo)
203 {
204 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
205 const UInt8* bytes = CFDataGetBytePtr(data);
206 CFIndex length = CFDataGetLength(data);
207
208 LOG(Network, "CFNet - didReceiveData(conn=%p, handle=%p, bytes=%d) (%s)", conn, handle, length, handle->firstRequest().url().string().utf8().data());
209
210 if (handle->client())
211 handle->client()->didReceiveData(handle, (const char*)bytes, length, originalLength);
212 }
213
didSendBodyData(CFURLConnectionRef conn,CFIndex bytesWritten,CFIndex totalBytesWritten,CFIndex totalBytesExpectedToWrite,const void * clientInfo)214 static void didSendBodyData(CFURLConnectionRef conn, CFIndex bytesWritten, CFIndex totalBytesWritten, CFIndex totalBytesExpectedToWrite, const void *clientInfo)
215 {
216 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
217 if (!handle || !handle->client())
218 return;
219 handle->client()->didSendData(handle, totalBytesWritten, totalBytesExpectedToWrite);
220 }
221
shouldUseCredentialStorageCallback(CFURLConnectionRef conn,const void * clientInfo)222 static Boolean shouldUseCredentialStorageCallback(CFURLConnectionRef conn, const void* clientInfo)
223 {
224 ResourceHandle* handle = const_cast<ResourceHandle*>(static_cast<const ResourceHandle*>(clientInfo));
225
226 LOG(Network, "CFNet - shouldUseCredentialStorage(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
227
228 if (!handle)
229 return false;
230
231 return handle->shouldUseCredentialStorage();
232 }
233
didFinishLoading(CFURLConnectionRef conn,const void * clientInfo)234 void didFinishLoading(CFURLConnectionRef conn, const void* clientInfo)
235 {
236 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
237
238 LOG(Network, "CFNet - didFinishLoading(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
239
240 if (handle->client())
241 handle->client()->didFinishLoading(handle, 0);
242 }
243
didFail(CFURLConnectionRef conn,CFErrorRef error,const void * clientInfo)244 void didFail(CFURLConnectionRef conn, CFErrorRef error, const void* clientInfo)
245 {
246 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
247
248 LOG(Network, "CFNet - didFail(conn=%p, handle=%p, error = %p) (%s)", conn, handle, error, handle->firstRequest().url().string().utf8().data());
249
250 if (handle->client())
251 handle->client()->didFail(handle, ResourceError(error));
252 }
253
willCacheResponse(CFURLConnectionRef conn,CFCachedURLResponseRef cachedResponse,const void * clientInfo)254 CFCachedURLResponseRef willCacheResponse(CFURLConnectionRef conn, CFCachedURLResponseRef cachedResponse, const void* clientInfo)
255 {
256 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
257
258 if (handle->client() && !handle->client()->shouldCacheResponse(handle, cachedResponse))
259 return 0;
260
261 CacheStoragePolicy policy = static_cast<CacheStoragePolicy>(CFCachedURLResponseGetStoragePolicy(cachedResponse));
262
263 if (handle->client())
264 handle->client()->willCacheResponse(handle, policy);
265
266 if (static_cast<CFURLCacheStoragePolicy>(policy) != CFCachedURLResponseGetStoragePolicy(cachedResponse))
267 cachedResponse = CFCachedURLResponseCreateWithUserInfo(kCFAllocatorDefault,
268 CFCachedURLResponseGetWrappedResponse(cachedResponse),
269 CFCachedURLResponseGetReceiverData(cachedResponse),
270 CFCachedURLResponseGetUserInfo(cachedResponse),
271 static_cast<CFURLCacheStoragePolicy>(policy));
272 CFRetain(cachedResponse);
273
274 return cachedResponse;
275 }
276
didReceiveChallenge(CFURLConnectionRef conn,CFURLAuthChallengeRef challenge,const void * clientInfo)277 void didReceiveChallenge(CFURLConnectionRef conn, CFURLAuthChallengeRef challenge, const void* clientInfo)
278 {
279 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
280 ASSERT(handle);
281 LOG(Network, "CFNet - didReceiveChallenge(conn=%p, handle=%p (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
282
283 handle->didReceiveAuthenticationChallenge(AuthenticationChallenge(challenge, handle));
284 }
285
addHeadersFromHashMap(CFMutableURLRequestRef request,const HTTPHeaderMap & requestHeaders)286 void addHeadersFromHashMap(CFMutableURLRequestRef request, const HTTPHeaderMap& requestHeaders)
287 {
288 if (!requestHeaders.size())
289 return;
290
291 HTTPHeaderMap::const_iterator end = requestHeaders.end();
292 for (HTTPHeaderMap::const_iterator it = requestHeaders.begin(); it != end; ++it) {
293 CFStringRef key = it->first.createCFString();
294 CFStringRef value = it->second.createCFString();
295 CFURLRequestSetHTTPHeaderFieldValue(request, key, value);
296 CFRelease(key);
297 CFRelease(value);
298 }
299 }
300
~ResourceHandleInternal()301 ResourceHandleInternal::~ResourceHandleInternal()
302 {
303 if (m_connection) {
304 LOG(Network, "CFNet - Cancelling connection %p (%s)", m_connection, m_firstRequest.url().string().utf8().data());
305 CFURLConnectionCancel(m_connection.get());
306 }
307 }
308
~ResourceHandle()309 ResourceHandle::~ResourceHandle()
310 {
311 LOG(Network, "CFNet - Destroying job %p (%s)", this, d->m_firstRequest.url().string().utf8().data());
312 }
313
arrayFromFormData(const FormData & d)314 CFArrayRef arrayFromFormData(const FormData& d)
315 {
316 size_t size = d.elements().size();
317 CFMutableArrayRef a = CFArrayCreateMutable(0, d.elements().size(), &kCFTypeArrayCallBacks);
318 for (size_t i = 0; i < size; ++i) {
319 const FormDataElement& e = d.elements()[i];
320 if (e.m_type == FormDataElement::data) {
321 CFDataRef data = CFDataCreate(0, (const UInt8*)e.m_data.data(), e.m_data.size());
322 CFArrayAppendValue(a, data);
323 CFRelease(data);
324 } else {
325 ASSERT(e.m_type == FormDataElement::encodedFile);
326 CFStringRef filename = e.m_filename.createCFString();
327 CFArrayAppendValue(a, filename);
328 CFRelease(filename);
329 }
330 }
331 return a;
332 }
333
makeFinalRequest(const ResourceRequest & request,bool shouldContentSniff)334 static CFURLRequestRef makeFinalRequest(const ResourceRequest& request, bool shouldContentSniff)
335 {
336 CFMutableURLRequestRef newRequest = CFURLRequestCreateMutableCopy(kCFAllocatorDefault, request.cfURLRequest());
337
338 #if USE(CFURLSTORAGESESSIONS)
339 if (CFURLStorageSessionRef storageSession = ResourceHandle::privateBrowsingStorageSession())
340 wkSetRequestStorageSession(storageSession, newRequest);
341 #endif
342
343 if (!shouldContentSniff)
344 wkSetCFURLRequestShouldContentSniff(newRequest, false);
345
346 RetainPtr<CFMutableDictionaryRef> sslProps;
347
348 if (allowsAnyHTTPSCertificateHosts().contains(request.url().host().lower())) {
349 sslProps.adoptCF(CFDictionaryCreateMutable(kCFAllocatorDefault, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks));
350 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLAllowsAnyRoot, kCFBooleanTrue);
351 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLAllowsExpiredRoots, kCFBooleanTrue);
352 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLAllowsExpiredCertificates, kCFBooleanTrue);
353 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLValidatesCertificateChain, kCFBooleanFalse);
354 }
355
356 HashMap<String, RetainPtr<CFDataRef> >::iterator clientCert = clientCerts().find(request.url().host().lower());
357 if (clientCert != clientCerts().end()) {
358 if (!sslProps)
359 sslProps.adoptCF(CFDictionaryCreateMutable(kCFAllocatorDefault, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks));
360 wkSetClientCertificateInSSLProperties(sslProps.get(), (clientCert->second).get());
361 }
362
363 if (sslProps)
364 CFURLRequestSetSSLProperties(newRequest, sslProps.get());
365
366 if (CFHTTPCookieStorageRef cookieStorage = currentCookieStorage()) {
367 CFURLRequestSetHTTPCookieStorage(newRequest, cookieStorage);
368 CFHTTPCookieStorageAcceptPolicy policy = CFHTTPCookieStorageGetCookieAcceptPolicy(cookieStorage);
369 CFURLRequestSetHTTPCookieStorageAcceptPolicy(newRequest, policy);
370
371 // If a URL already has cookies, then we'll relax the 3rd party cookie policy and accept new cookies.
372 if (policy == CFHTTPCookieStorageAcceptPolicyOnlyFromMainDocumentDomain) {
373 CFURLRef url = CFURLRequestGetURL(newRequest);
374 RetainPtr<CFArrayRef> cookies(AdoptCF, CFHTTPCookieStorageCopyCookiesForURL(cookieStorage, url, false));
375 if (CFArrayGetCount(cookies.get()))
376 CFURLRequestSetMainDocumentURL(newRequest, url);
377 }
378 }
379
380 return newRequest;
381 }
382
createConnectionProperties(bool shouldUseCredentialStorage)383 static CFDictionaryRef createConnectionProperties(bool shouldUseCredentialStorage)
384 {
385 static const CFStringRef webKitPrivateSessionCF = CFSTR("WebKitPrivateSession");
386 static const CFStringRef _kCFURLConnectionSessionID = CFSTR("_kCFURLConnectionSessionID");
387 static const CFStringRef kCFURLConnectionSocketStreamProperties = CFSTR("kCFURLConnectionSocketStreamProperties");
388
389 CFDictionaryRef sessionID = shouldUseCredentialStorage ?
390 CFDictionaryCreate(0, 0, 0, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks) :
391 CFDictionaryCreate(0, (const void**)&_kCFURLConnectionSessionID, (const void**)&webKitPrivateSessionCF, 1, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
392
393 CFDictionaryRef propertiesDictionary = CFDictionaryCreate(0, (const void**)&kCFURLConnectionSocketStreamProperties, (const void**)&sessionID, 1, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
394
395 CFRelease(sessionID);
396 return propertiesDictionary;
397 }
398
createCFURLConnection(bool shouldUseCredentialStorage,bool shouldContentSniff)399 void ResourceHandle::createCFURLConnection(bool shouldUseCredentialStorage, bool shouldContentSniff)
400 {
401 if ((!d->m_user.isEmpty() || !d->m_pass.isEmpty()) && !firstRequest().url().protocolInHTTPFamily()) {
402 // Credentials for ftp can only be passed in URL, the didReceiveAuthenticationChallenge delegate call won't be made.
403 KURL urlWithCredentials(firstRequest().url());
404 urlWithCredentials.setUser(d->m_user);
405 urlWithCredentials.setPass(d->m_pass);
406 firstRequest().setURL(urlWithCredentials);
407 }
408
409 // <rdar://problem/7174050> - For URLs that match the paths of those previously challenged for HTTP Basic authentication,
410 // try and reuse the credential preemptively, as allowed by RFC 2617.
411 if (shouldUseCredentialStorage && firstRequest().url().protocolInHTTPFamily()) {
412 if (d->m_user.isEmpty() && d->m_pass.isEmpty()) {
413 // <rdar://problem/7174050> - For URLs that match the paths of those previously challenged for HTTP Basic authentication,
414 // try and reuse the credential preemptively, as allowed by RFC 2617.
415 d->m_initialCredential = CredentialStorage::get(firstRequest().url());
416 } else {
417 // If there is already a protection space known for the URL, update stored credentials before sending a request.
418 // This makes it possible to implement logout by sending an XMLHttpRequest with known incorrect credentials, and aborting it immediately
419 // (so that an authentication dialog doesn't pop up).
420 CredentialStorage::set(Credential(d->m_user, d->m_pass, CredentialPersistenceNone), firstRequest().url());
421 }
422 }
423
424 if (!d->m_initialCredential.isEmpty()) {
425 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password());
426 firstRequest().addHTTPHeaderField("Authorization", authHeader);
427 }
428
429 RetainPtr<CFURLRequestRef> request(AdoptCF, makeFinalRequest(firstRequest(), shouldContentSniff));
430
431 CFURLConnectionClient_V3 client = { 3, this, 0, 0, 0, WebCore::willSendRequest, didReceiveResponse, didReceiveData, 0, didFinishLoading, didFail, willCacheResponse, didReceiveChallenge, didSendBodyData, shouldUseCredentialStorageCallback, 0};
432 RetainPtr<CFDictionaryRef> connectionProperties(AdoptCF, createConnectionProperties(shouldUseCredentialStorage));
433
434 d->m_connection.adoptCF(CFURLConnectionCreateWithProperties(0, request.get(), reinterpret_cast<CFURLConnectionClient*>(&client), connectionProperties.get()));
435 }
436
start(NetworkingContext * context)437 bool ResourceHandle::start(NetworkingContext* context)
438 {
439 if (!context)
440 return false;
441
442 // If NetworkingContext is invalid then we are no longer attached to a Page,
443 // this must be an attempted load from an unload handler, so let's just block it.
444 if (!context->isValid())
445 return false;
446
447 bool shouldUseCredentialStorage = !client() || client()->shouldUseCredentialStorage(this);
448
449 createCFURLConnection(shouldUseCredentialStorage, d->m_shouldContentSniff);
450
451 CFURLConnectionScheduleWithCurrentMessageQueue(d->m_connection.get());
452 CFURLConnectionScheduleDownloadWithRunLoop(d->m_connection.get(), loaderRunLoop(), kCFRunLoopDefaultMode);
453 CFURLConnectionStart(d->m_connection.get());
454
455 LOG(Network, "CFNet - Starting URL %s (handle=%p, conn=%p)", firstRequest().url().string().utf8().data(), this, d->m_connection);
456
457 return true;
458 }
459
cancel()460 void ResourceHandle::cancel()
461 {
462 if (d->m_connection) {
463 CFURLConnectionCancel(d->m_connection.get());
464 d->m_connection = 0;
465 }
466 }
467
bufferedData()468 PassRefPtr<SharedBuffer> ResourceHandle::bufferedData()
469 {
470 ASSERT_NOT_REACHED();
471 return 0;
472 }
473
supportsBufferedData()474 bool ResourceHandle::supportsBufferedData()
475 {
476 return false;
477 }
478
willSendRequest(ResourceRequest & request,const ResourceResponse & redirectResponse)479 void ResourceHandle::willSendRequest(ResourceRequest& request, const ResourceResponse& redirectResponse)
480 {
481 const KURL& url = request.url();
482 d->m_user = url.user();
483 d->m_pass = url.pass();
484 d->m_lastHTTPMethod = request.httpMethod();
485 request.removeCredentials();
486 if (!protocolHostAndPortAreEqual(request.url(), redirectResponse.url()))
487 request.clearHTTPAuthorization();
488
489 #if USE(CFURLSTORAGESESSIONS)
490 if (CFURLStorageSessionRef storageSession = privateBrowsingStorageSession())
491 request.setStorageSession(storageSession);
492 #endif
493
494 client()->willSendRequest(this, request, redirectResponse);
495 }
496
shouldUseCredentialStorage()497 bool ResourceHandle::shouldUseCredentialStorage()
498 {
499 LOG(Network, "CFNet - shouldUseCredentialStorage()");
500 if (client())
501 return client()->shouldUseCredentialStorage(this);
502
503 return false;
504 }
505
didReceiveAuthenticationChallenge(const AuthenticationChallenge & challenge)506 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge)
507 {
508 LOG(Network, "CFNet - didReceiveAuthenticationChallenge()");
509 ASSERT(d->m_currentWebChallenge.isNull());
510 // Since CFURLConnection networking relies on keeping a reference to the original CFURLAuthChallengeRef,
511 // we make sure that is actually present
512 ASSERT(challenge.cfURLAuthChallengeRef());
513 ASSERT(challenge.authenticationClient() == this); // Should be already set.
514
515 if (!d->m_user.isNull() && !d->m_pass.isNull()) {
516 RetainPtr<CFStringRef> user(AdoptCF, d->m_user.createCFString());
517 RetainPtr<CFStringRef> pass(AdoptCF, d->m_pass.createCFString());
518 RetainPtr<CFURLCredentialRef> credential(AdoptCF,
519 CFURLCredentialCreate(kCFAllocatorDefault, user.get(), pass.get(), 0, kCFURLCredentialPersistenceNone));
520
521 KURL urlToStore;
522 if (challenge.failureResponse().httpStatusCode() == 401)
523 urlToStore = firstRequest().url();
524 CredentialStorage::set(core(credential.get()), challenge.protectionSpace(), urlToStore);
525
526 CFURLConnectionUseCredential(d->m_connection.get(), credential.get(), challenge.cfURLAuthChallengeRef());
527 d->m_user = String();
528 d->m_pass = String();
529 // FIXME: Per the specification, the user shouldn't be asked for credentials if there were incorrect ones provided explicitly.
530 return;
531 }
532
533 if (!client() || client()->shouldUseCredentialStorage(this)) {
534 if (!d->m_initialCredential.isEmpty() || challenge.previousFailureCount()) {
535 // The stored credential wasn't accepted, stop using it.
536 // There is a race condition here, since a different credential might have already been stored by another ResourceHandle,
537 // but the observable effect should be very minor, if any.
538 CredentialStorage::remove(challenge.protectionSpace());
539 }
540
541 if (!challenge.previousFailureCount()) {
542 Credential credential = CredentialStorage::get(challenge.protectionSpace());
543 if (!credential.isEmpty() && credential != d->m_initialCredential) {
544 ASSERT(credential.persistence() == CredentialPersistenceNone);
545 if (challenge.failureResponse().httpStatusCode() == 401) {
546 // Store the credential back, possibly adding it as a default for this directory.
547 CredentialStorage::set(credential, challenge.protectionSpace(), firstRequest().url());
548 }
549 RetainPtr<CFURLCredentialRef> cfCredential(AdoptCF, createCF(credential));
550 CFURLConnectionUseCredential(d->m_connection.get(), cfCredential.get(), challenge.cfURLAuthChallengeRef());
551 return;
552 }
553 }
554 }
555
556 d->m_currentWebChallenge = challenge;
557
558 if (client())
559 client()->didReceiveAuthenticationChallenge(this, d->m_currentWebChallenge);
560 }
561
receivedCredential(const AuthenticationChallenge & challenge,const Credential & credential)562 void ResourceHandle::receivedCredential(const AuthenticationChallenge& challenge, const Credential& credential)
563 {
564 LOG(Network, "CFNet - receivedCredential()");
565 ASSERT(!challenge.isNull());
566 ASSERT(challenge.cfURLAuthChallengeRef());
567 if (challenge != d->m_currentWebChallenge)
568 return;
569
570 // FIXME: Support empty credentials. Currently, an empty credential cannot be stored in WebCore credential storage, as that's empty value for its map.
571 if (credential.isEmpty()) {
572 receivedRequestToContinueWithoutCredential(challenge);
573 return;
574 }
575
576 if (credential.persistence() == CredentialPersistenceForSession) {
577 // Manage per-session credentials internally, because once NSURLCredentialPersistencePerSession is used, there is no way
578 // to ignore it for a particular request (short of removing it altogether).
579 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceNone);
580 RetainPtr<CFURLCredentialRef> cfCredential(AdoptCF, createCF(webCredential));
581
582 KURL urlToStore;
583 if (challenge.failureResponse().httpStatusCode() == 401)
584 urlToStore = firstRequest().url();
585 CredentialStorage::set(webCredential, challenge.protectionSpace(), urlToStore);
586
587 CFURLConnectionUseCredential(d->m_connection.get(), cfCredential.get(), challenge.cfURLAuthChallengeRef());
588 } else {
589 RetainPtr<CFURLCredentialRef> cfCredential(AdoptCF, createCF(credential));
590 CFURLConnectionUseCredential(d->m_connection.get(), cfCredential.get(), challenge.cfURLAuthChallengeRef());
591 }
592
593 clearAuthentication();
594 }
595
receivedRequestToContinueWithoutCredential(const AuthenticationChallenge & challenge)596 void ResourceHandle::receivedRequestToContinueWithoutCredential(const AuthenticationChallenge& challenge)
597 {
598 LOG(Network, "CFNet - receivedRequestToContinueWithoutCredential()");
599 ASSERT(!challenge.isNull());
600 ASSERT(challenge.cfURLAuthChallengeRef());
601 if (challenge != d->m_currentWebChallenge)
602 return;
603
604 CFURLConnectionUseCredential(d->m_connection.get(), 0, challenge.cfURLAuthChallengeRef());
605
606 clearAuthentication();
607 }
608
receivedCancellation(const AuthenticationChallenge & challenge)609 void ResourceHandle::receivedCancellation(const AuthenticationChallenge& challenge)
610 {
611 LOG(Network, "CFNet - receivedCancellation()");
612 if (challenge != d->m_currentWebChallenge)
613 return;
614
615 if (client())
616 client()->receivedCancellation(this, challenge);
617 }
618
connection() const619 CFURLConnectionRef ResourceHandle::connection() const
620 {
621 return d->m_connection.get();
622 }
623
releaseConnectionForDownload()624 CFURLConnectionRef ResourceHandle::releaseConnectionForDownload()
625 {
626 LOG(Network, "CFNet - Job %p releasing connection %p for download", this, d->m_connection.get());
627 return d->m_connection.releaseRef();
628 }
629
loadResourceSynchronously(NetworkingContext * context,const ResourceRequest & request,StoredCredentials storedCredentials,ResourceError & error,ResourceResponse & response,Vector<char> & vector)630 void ResourceHandle::loadResourceSynchronously(NetworkingContext* context, const ResourceRequest& request, StoredCredentials storedCredentials, ResourceError& error, ResourceResponse& response, Vector<char>& vector)
631 {
632 LOG(Network, "ResourceHandle::loadResourceSynchronously:%s allowStoredCredentials:%u", request.url().string().utf8().data(), storedCredentials);
633
634 ASSERT(!request.isEmpty());
635
636 ASSERT(response.isNull());
637 ASSERT(error.isNull());
638
639 OwnPtr<WebCoreSynchronousLoaderClient> client = WebCoreSynchronousLoaderClient::create(response, error);
640 client->setAllowStoredCredentials(storedCredentials == AllowStoredCredentials);
641
642 RefPtr<ResourceHandle> handle = adoptRef(new ResourceHandle(request, client.get(), false /*defersLoading*/, true /*shouldContentSniff*/));
643
644 if (context && handle->d->m_scheduledFailureType != NoFailure) {
645 error = context->blockedError(request);
646 return;
647 }
648
649 RetainPtr<CFDictionaryRef> connectionProperties(AdoptCF, createConnectionProperties(storedCredentials == AllowStoredCredentials));
650
651 handle->createCFURLConnection(storedCredentials == AllowStoredCredentials, ResourceHandle::shouldContentSniffURL(request.url()));
652
653 CFURLConnectionScheduleWithRunLoop(handle->connection(), CFRunLoopGetCurrent(), WebCoreSynchronousLoaderRunLoopMode);
654 CFURLConnectionScheduleDownloadWithRunLoop(handle->connection(), CFRunLoopGetCurrent(), WebCoreSynchronousLoaderRunLoopMode);
655 CFURLConnectionStart(handle->connection());
656
657 while (!client->isDone())
658 CFRunLoopRunInMode(WebCoreSynchronousLoaderRunLoopMode, UINT_MAX, true);
659
660 CFURLConnectionCancel(handle->connection());
661
662 if (error.isNull() && response.mimeType().isNull())
663 setDefaultMIMEType(response.cfURLResponse());
664
665 RetainPtr<CFDataRef> data = client->data();
666
667 if (!error.isNull()) {
668 response = ResourceResponse(request.url(), String(), 0, String(), String());
669
670 CFErrorRef cfError = error;
671 CFStringRef domain = CFErrorGetDomain(cfError);
672 // FIXME: Return the actual response for failed authentication.
673 if (domain == kCFErrorDomainCFNetwork)
674 response.setHTTPStatusCode(CFErrorGetCode(cfError));
675 else
676 response.setHTTPStatusCode(404);
677 }
678
679 if (data) {
680 ASSERT(vector.isEmpty());
681 vector.append(CFDataGetBytePtr(data.get()), CFDataGetLength(data.get()));
682 }
683 }
684
setHostAllowsAnyHTTPSCertificate(const String & host)685 void ResourceHandle::setHostAllowsAnyHTTPSCertificate(const String& host)
686 {
687 allowsAnyHTTPSCertificateHosts().add(host.lower());
688 }
689
setClientCertificate(const String & host,CFDataRef cert)690 void ResourceHandle::setClientCertificate(const String& host, CFDataRef cert)
691 {
692 clientCerts().set(host.lower(), cert);
693 }
694
platformSetDefersLoading(bool defers)695 void ResourceHandle::platformSetDefersLoading(bool defers)
696 {
697 if (!d->m_connection)
698 return;
699
700 if (defers)
701 CFURLConnectionHalt(d->m_connection.get());
702 else
703 CFURLConnectionResume(d->m_connection.get());
704 }
705
loadsBlocked()706 bool ResourceHandle::loadsBlocked()
707 {
708 return false;
709 }
710
willLoadFromCache(ResourceRequest & request,Frame * frame)711 bool ResourceHandle::willLoadFromCache(ResourceRequest& request, Frame* frame)
712 {
713 request.setCachePolicy(ReturnCacheDataDontLoad);
714
715 CFURLResponseRef cfResponse = 0;
716 CFErrorRef cfError = 0;
717 RetainPtr<CFURLRequestRef> cfRequest(AdoptCF, makeFinalRequest(request, true));
718 RetainPtr<CFDataRef> data(AdoptCF, CFURLConnectionSendSynchronousRequest(cfRequest.get(), &cfResponse, &cfError, request.timeoutInterval()));
719 bool cached = cfResponse && !cfError;
720
721 if (cfError)
722 CFRelease(cfError);
723 if (cfResponse)
724 CFRelease(cfResponse);
725
726 return cached;
727 }
728
729 #if USE(CFURLSTORAGESESSIONS)
730
createPrivateBrowsingStorageSession(CFStringRef identifier)731 RetainPtr<CFURLStorageSessionRef> ResourceHandle::createPrivateBrowsingStorageSession(CFStringRef identifier)
732 {
733 return RetainPtr<CFURLStorageSessionRef>(AdoptCF, wkCreatePrivateStorageSession(identifier));
734 }
735
privateBrowsingStorageSessionIdentifierDefaultBase()736 String ResourceHandle::privateBrowsingStorageSessionIdentifierDefaultBase()
737 {
738 return String(reinterpret_cast<CFStringRef>(CFBundleGetValueForInfoDictionaryKey(CFBundleGetMainBundle(), kCFBundleIdentifierKey)));
739 }
740
741 #endif
742
willSendRequest(ResourceHandle * handle,ResourceRequest & request,const ResourceResponse &)743 void WebCoreSynchronousLoaderClient::willSendRequest(ResourceHandle* handle, ResourceRequest& request, const ResourceResponse& /*redirectResponse*/)
744 {
745 // FIXME: This needs to be fixed to follow the redirect correctly even for cross-domain requests.
746 if (!protocolHostAndPortAreEqual(handle->firstRequest().url(), request.url())) {
747 ASSERT(!m_error);
748 RetainPtr<CFErrorRef> cfError(AdoptCF, CFErrorCreate(kCFAllocatorDefault, kCFErrorDomainCFNetwork, kCFURLErrorBadServerResponse, 0));
749 m_error = cfError.get();
750 m_isDone = true;
751 request = 0;
752 return;
753 }
754 }
didReceiveResponse(ResourceHandle *,const ResourceResponse & response)755 void WebCoreSynchronousLoaderClient::didReceiveResponse(ResourceHandle*, const ResourceResponse& response)
756 {
757 m_response = response;
758 }
759
didReceiveData(ResourceHandle *,const char * data,int length,int)760 void WebCoreSynchronousLoaderClient::didReceiveData(ResourceHandle*, const char* data, int length, int /*encodedDataLength*/)
761 {
762 if (!m_data)
763 m_data.adoptCF(CFDataCreateMutable(kCFAllocatorDefault, 0));
764 CFDataAppendBytes(m_data.get(), reinterpret_cast<const UInt8*>(data), length);
765 }
766
didFinishLoading(ResourceHandle *,double)767 void WebCoreSynchronousLoaderClient::didFinishLoading(ResourceHandle*, double)
768 {
769 m_isDone = true;
770 }
771
didFail(ResourceHandle *,const ResourceError & error)772 void WebCoreSynchronousLoaderClient::didFail(ResourceHandle*, const ResourceError& error)
773 {
774 m_error = error;
775 m_isDone = true;
776 }
777
didReceiveAuthenticationChallenge(ResourceHandle * handle,const AuthenticationChallenge & challenge)778 void WebCoreSynchronousLoaderClient::didReceiveAuthenticationChallenge(ResourceHandle* handle, const AuthenticationChallenge& challenge)
779 {
780 // FIXME: The user should be asked for credentials, as in async case.
781 CFURLConnectionUseCredential(handle->connection(), 0, challenge.cfURLAuthChallengeRef());
782 }
783
shouldUseCredentialStorage(ResourceHandle *)784 bool WebCoreSynchronousLoaderClient::shouldUseCredentialStorage(ResourceHandle*)
785 {
786 // FIXME: We should ask FrameLoaderClient whether using credential storage is globally forbidden.
787 return m_allowStoredCredentials;
788 }
789
790 } // namespace WebCore
791
792 #endif // USE(CFNETWORK)
793