blob: 678cfb4706abb9ba9b4d5f5fbd9b5f05769251b1 [file] [log] [blame]
/*
* Copyright (C) 2004-2017 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "ResourceHandle.h"
#include "ResourceHandleInternal.h"
#include "Logging.h"
#include "NetworkingContext.h"
#include "NotImplemented.h"
#include "ResourceHandleClient.h"
#include "SecurityOrigin.h"
#include "Timer.h"
#include "TimingAllowOrigin.h"
#include <algorithm>
#include <wtf/CompletionHandler.h>
#include <wtf/MainThread.h>
#include <wtf/NeverDestroyed.h>
#include <wtf/text/AtomStringHash.h>
#include <wtf/text/CString.h>
namespace WebCore {
static bool shouldForceContentSniffing;
DEFINE_ALLOCATOR_WITH_HEAP_IDENTIFIER(ResourceHandleInternal);
typedef HashMap<AtomString, ResourceHandle::BuiltinConstructor> BuiltinResourceHandleConstructorMap;
static BuiltinResourceHandleConstructorMap& builtinResourceHandleConstructorMap()
{
#if PLATFORM(IOS_FAMILY)
ASSERT(WebThreadIsLockedOrDisabled());
#else
ASSERT(isMainThread());
#endif
static NeverDestroyed<BuiltinResourceHandleConstructorMap> map;
return map;
}
void ResourceHandle::registerBuiltinConstructor(const AtomString& protocol, ResourceHandle::BuiltinConstructor constructor)
{
builtinResourceHandleConstructorMap().add(protocol, constructor);
}
typedef HashMap<AtomString, ResourceHandle::BuiltinSynchronousLoader> BuiltinResourceHandleSynchronousLoaderMap;
static BuiltinResourceHandleSynchronousLoaderMap& builtinResourceHandleSynchronousLoaderMap()
{
ASSERT(isMainThread());
static NeverDestroyed<BuiltinResourceHandleSynchronousLoaderMap> map;
return map;
}
void ResourceHandle::registerBuiltinSynchronousLoader(const AtomString& protocol, ResourceHandle::BuiltinSynchronousLoader loader)
{
builtinResourceHandleSynchronousLoaderMap().add(protocol, loader);
}
ResourceHandle::ResourceHandle(NetworkingContext* context, const ResourceRequest& request, ResourceHandleClient* client, bool defersLoading, bool shouldContentSniff, bool shouldContentEncodingSniff, RefPtr<SecurityOrigin>&& sourceOrigin, bool isMainFrameNavigation)
: d(makeUnique<ResourceHandleInternal>(this, context, request, client, defersLoading, shouldContentSniff && shouldContentSniffURL(request.url()), shouldContentEncodingSniff, WTFMove(sourceOrigin), isMainFrameNavigation))
{
if (!request.url().isValid()) {
scheduleFailure(InvalidURLFailure);
return;
}
if (!portAllowed(request.url())) {
scheduleFailure(BlockedFailure);
return;
}
}
RefPtr<ResourceHandle> ResourceHandle::create(NetworkingContext* context, const ResourceRequest& request, ResourceHandleClient* client, bool defersLoading, bool shouldContentSniff, bool shouldContentEncodingSniff, RefPtr<SecurityOrigin>&& sourceOrigin, bool isMainFrameNavigation)
{
if (auto protocol = request.url().protocol().toExistingAtomString(); !protocol.isNull()) {
if (auto constructor = builtinResourceHandleConstructorMap().get(protocol))
return constructor(request, client);
}
auto newHandle = adoptRef(*new ResourceHandle(context, request, client, defersLoading, shouldContentSniff, shouldContentEncodingSniff, WTFMove(sourceOrigin), isMainFrameNavigation));
if (newHandle->d->m_scheduledFailureType != NoFailure)
return newHandle;
if (newHandle->start())
return newHandle;
return nullptr;
}
void ResourceHandle::scheduleFailure(FailureType type)
{
d->m_scheduledFailureType = type;
d->m_failureTimer.startOneShot(0_s);
}
void ResourceHandle::failureTimerFired()
{
if (!client())
return;
switch (d->m_scheduledFailureType) {
case NoFailure:
ASSERT_NOT_REACHED();
return;
case BlockedFailure:
d->m_scheduledFailureType = NoFailure;
client()->wasBlocked(this);
return;
case InvalidURLFailure:
d->m_scheduledFailureType = NoFailure;
client()->cannotShowURL(this);
return;
}
ASSERT_NOT_REACHED();
}
void ResourceHandle::loadResourceSynchronously(NetworkingContext* context, const ResourceRequest& request, StoredCredentialsPolicy storedCredentialsPolicy, SecurityOrigin* sourceOrigin, ResourceError& error, ResourceResponse& response, Vector<uint8_t>& data)
{
if (auto protocol = request.url().protocol().toExistingAtomString(); !protocol.isNull()) {
if (auto constructor = builtinResourceHandleSynchronousLoaderMap().get(protocol)) {
constructor(context, request, storedCredentialsPolicy, error, response, data);
return;
}
}
platformLoadResourceSynchronously(context, request, storedCredentialsPolicy, sourceOrigin, error, response, data);
}
ResourceHandleClient* ResourceHandle::client() const
{
return d->m_client;
}
void ResourceHandle::clearClient()
{
d->m_client = nullptr;
}
void ResourceHandle::didReceiveResponse(ResourceResponse&& response, CompletionHandler<void()>&& completionHandler)
{
if (response.isHTTP09()) {
auto url = response.url();
std::optional<uint16_t> port = url.port();
if (port && !WTF::isDefaultPortForProtocol(port.value(), url.protocol())) {
cancel();
String message = "Cancelled load from '" + url.stringCenterEllipsizedToLength() + "' because it is using HTTP/0.9.";
d->m_client->didFail(this, { String(), 0, url, message });
completionHandler();
return;
}
}
client()->didReceiveResponseAsync(this, WTFMove(response), WTFMove(completionHandler));
}
#if !USE(SOUP) && !USE(CURL)
void ResourceHandle::platformContinueSynchronousDidReceiveResponse()
{
// Do nothing.
}
#endif
ResourceRequest& ResourceHandle::firstRequest()
{
return d->m_firstRequest;
}
NetworkingContext* ResourceHandle::context() const
{
return d->m_context.get();
}
const String& ResourceHandle::lastHTTPMethod() const
{
return d->m_lastHTTPMethod;
}
bool ResourceHandle::hasAuthenticationChallenge() const
{
return !d->m_currentWebChallenge.isNull();
}
void ResourceHandle::clearAuthentication()
{
#if PLATFORM(COCOA)
d->m_currentMacChallenge = nil;
#endif
d->m_currentWebChallenge.nullify();
}
bool ResourceHandle::failsTAOCheck() const
{
return d->m_failsTAOCheck;
}
void ResourceHandle::checkTAO(const ResourceResponse& response)
{
if (d->m_failsTAOCheck)
return;
RefPtr<SecurityOrigin> origin;
if (d->m_isMainFrameNavigation)
origin = SecurityOrigin::create(firstRequest().url());
else
origin = d->m_sourceOrigin;
if (origin)
d->m_failsTAOCheck = !passesTimingAllowOriginCheck(response, *origin);
}
bool ResourceHandle::hasCrossOriginRedirect() const
{
return d->m_hasCrossOriginRedirect;
}
void ResourceHandle::markAsHavingCrossOriginRedirect()
{
d->m_hasCrossOriginRedirect = true;
}
void ResourceHandle::incrementRedirectCount()
{
d->m_redirectCount++;
}
uint16_t ResourceHandle::redirectCount() const
{
return d->m_redirectCount;
}
MonotonicTime ResourceHandle::startTimeBeforeRedirects() const
{
return d->m_startTime;
}
NetworkLoadMetrics* ResourceHandle::networkLoadMetrics()
{
return d->m_networkLoadMetrics.get();
}
void ResourceHandle::setNetworkLoadMetrics(Box<NetworkLoadMetrics>&& metrics)
{
d->m_networkLoadMetrics = WTFMove(metrics);
}
bool ResourceHandle::shouldContentSniff() const
{
return d->m_shouldContentSniff;
}
bool ResourceHandle::shouldContentEncodingSniff() const
{
return d->m_shouldContentEncodingSniff;
}
bool ResourceHandle::shouldContentSniffURL(const URL& url)
{
#if PLATFORM(COCOA)
if (shouldForceContentSniffing)
return true;
#endif
// We shouldn't content sniff file URLs as their MIME type should be established via their extension.
return !url.protocolIs("file"_s);
}
void ResourceHandle::forceContentSniffing()
{
shouldForceContentSniffing = true;
}
void ResourceHandle::setDefersLoading(bool defers)
{
LOG(Network, "Handle %p setDefersLoading(%s)", this, defers ? "true" : "false");
ASSERT(d->m_defersLoading != defers); // Deferring is not counted, so calling setDefersLoading() repeatedly is likely to be in error.
d->m_defersLoading = defers;
if (defers) {
ASSERT(d->m_failureTimer.isActive() == (d->m_scheduledFailureType != NoFailure));
if (d->m_failureTimer.isActive())
d->m_failureTimer.stop();
} else if (d->m_scheduledFailureType != NoFailure) {
ASSERT(!d->m_failureTimer.isActive());
d->m_failureTimer.startOneShot(0_s);
}
platformSetDefersLoading(defers);
}
} // namespace WebCore