blob: 46c8d45b362857c1b3c12055c32e7facfd48733b [file] [log] [blame]
/*
* Copyright (C) 2014 Igalia S.L.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#if USE(SOUP)
#include "SoupNetworkSession.h"
#include "AuthenticationChallenge.h"
#include "GUniquePtrSoup.h"
#include "Logging.h"
#include "SoupNetworkProxySettings.h"
#include <glib/gstdio.h>
#include <libsoup/soup.h>
#include <pal/crypto/CryptoDigest.h>
#include <wtf/FileSystem.h>
#include <wtf/HashSet.h>
#include <wtf/NeverDestroyed.h>
#include <wtf/text/Base64.h>
#include <wtf/text/CString.h>
namespace WebCore {
static bool gIgnoreTLSErrors;
static CString& initialAcceptLanguages()
{
static NeverDestroyed<CString> storage;
return storage.get();
}
static SoupNetworkProxySettings& proxySettings()
{
static NeverDestroyed<SoupNetworkProxySettings> settings;
return settings.get();
}
static CString& hstsStorageDirectory()
{
static NeverDestroyed<CString> directory;
return directory.get();
}
#if !LOG_DISABLED
inline static void soupLogPrinter(SoupLogger*, SoupLoggerLogLevel, char direction, const char* data, gpointer)
{
LOG(Network, "%c %s", direction, data);
}
#endif
class HostTLSCertificateSet {
public:
void add(GTlsCertificate* certificate)
{
String certificateHash = computeCertificateHash(certificate);
if (!certificateHash.isEmpty())
m_certificates.add(certificateHash);
}
bool contains(GTlsCertificate* certificate) const
{
return m_certificates.contains(computeCertificateHash(certificate));
}
private:
static String computeCertificateHash(GTlsCertificate* certificate)
{
GRefPtr<GByteArray> certificateData;
g_object_get(G_OBJECT(certificate), "certificate", &certificateData.outPtr(), nullptr);
if (!certificateData)
return String();
auto digest = PAL::CryptoDigest::create(PAL::CryptoDigest::Algorithm::SHA_256);
digest->addBytes(certificateData->data, certificateData->len);
auto hash = digest->computeHash();
return base64Encode(reinterpret_cast<const char*>(hash.data()), hash.size());
}
HashSet<String> m_certificates;
};
using AllowedCertificatesMap = HashMap<String, HostTLSCertificateSet, ASCIICaseInsensitiveHash>;
static AllowedCertificatesMap& allowedCertificates()
{
static NeverDestroyed<AllowedCertificatesMap> certificates;
return certificates;
}
SoupNetworkSession::SoupNetworkSession(PAL::SessionID sessionID)
: m_soupSession(adoptGRef(soup_session_new()))
, m_sessionID(sessionID)
{
// Values taken from http://www.browserscope.org/ following
// the rule "Do What Every Other Modern Browser Is Doing". They seem
// to significantly improve page loading time compared to soup's
// default values.
static const int maxConnections = 17;
static const int maxConnectionsPerHost = 6;
g_object_set(m_soupSession.get(),
SOUP_SESSION_MAX_CONNS, maxConnections,
SOUP_SESSION_MAX_CONNS_PER_HOST, maxConnectionsPerHost,
SOUP_SESSION_TIMEOUT, 0,
SOUP_SESSION_IDLE_TIMEOUT, 0,
SOUP_SESSION_ADD_FEATURE_BY_TYPE, SOUP_TYPE_CONTENT_SNIFFER,
#if SOUP_CHECK_VERSION(2, 67, 90)
SOUP_SESSION_ADD_FEATURE_BY_TYPE, SOUP_TYPE_WEBSOCKET_EXTENSION_MANAGER,
#endif
nullptr);
if (!initialAcceptLanguages().isNull())
setAcceptLanguages(initialAcceptLanguages());
if (soup_auth_negotiate_supported() && !m_sessionID.isEphemeral()) {
g_object_set(m_soupSession.get(),
SOUP_SESSION_ADD_FEATURE_BY_TYPE, SOUP_TYPE_AUTH_NEGOTIATE,
nullptr);
}
if (proxySettings().mode != SoupNetworkProxySettings::Mode::Default)
setupProxy();
setupLogger();
setupHSTSEnforcer();
}
SoupNetworkSession::~SoupNetworkSession() = default;
void SoupNetworkSession::setupLogger()
{
#if !LOG_DISABLED
if (LogNetwork.state != WTFLogChannelState::On || soup_session_get_feature(m_soupSession.get(), SOUP_TYPE_LOGGER))
return;
GRefPtr<SoupLogger> logger = adoptGRef(soup_logger_new(SOUP_LOGGER_LOG_BODY, -1));
soup_session_add_feature(m_soupSession.get(), SOUP_SESSION_FEATURE(logger.get()));
soup_logger_set_printer(logger.get(), soupLogPrinter, nullptr, nullptr);
#endif
}
void SoupNetworkSession::setCookieJar(SoupCookieJar* jar)
{
if (SoupCookieJar* currentJar = cookieJar())
soup_session_remove_feature(m_soupSession.get(), SOUP_SESSION_FEATURE(currentJar));
soup_session_add_feature(m_soupSession.get(), SOUP_SESSION_FEATURE(jar));
}
SoupCookieJar* SoupNetworkSession::cookieJar() const
{
return SOUP_COOKIE_JAR(soup_session_get_feature(m_soupSession.get(), SOUP_TYPE_COOKIE_JAR));
}
void SoupNetworkSession::setHSTSPersistentStorage(const CString& directory)
{
hstsStorageDirectory() = directory;
}
void SoupNetworkSession::setupHSTSEnforcer()
{
#if SOUP_CHECK_VERSION(2, 67, 1)
if (soup_session_has_feature(m_soupSession.get(), SOUP_TYPE_HSTS_ENFORCER))
soup_session_remove_feature_by_type(m_soupSession.get(), SOUP_TYPE_HSTS_ENFORCER);
GRefPtr<SoupHSTSEnforcer> enforcer;
if (m_sessionID.isEphemeral() || hstsStorageDirectory().isNull())
enforcer = adoptGRef(soup_hsts_enforcer_new());
else {
if (FileSystem::makeAllDirectories(hstsStorageDirectory().data())) {
CString storagePath = FileSystem::fileSystemRepresentation(hstsStorageDirectory().data());
GUniquePtr<char> dbFilename(g_build_filename(storagePath.data(), "hsts-storage.sqlite", nullptr));
enforcer = adoptGRef(soup_hsts_enforcer_db_new(dbFilename.get()));
} else {
RELEASE_LOG_ERROR(Network, "Unable to create the HSTS storage directory \"%s\". Using a memory enforcer instead.", hstsStorageDirectory().data());
enforcer = adoptGRef(soup_hsts_enforcer_new());
}
}
soup_session_add_feature(m_soupSession.get(), SOUP_SESSION_FEATURE(enforcer.get()));
#endif
}
void SoupNetworkSession::getHostNamesWithHSTSCache(HashSet<String>& hostNames)
{
#if SOUP_CHECK_VERSION(2, 67, 91)
SoupHSTSEnforcer* enforcer = SOUP_HSTS_ENFORCER(soup_session_get_feature(m_soupSession.get(), SOUP_TYPE_HSTS_ENFORCER));
if (!enforcer)
return;
GUniquePtr<GList> domains(soup_hsts_enforcer_get_domains(enforcer, FALSE));
for (GList* iter = domains.get(); iter; iter = iter->next) {
GUniquePtr<gchar> domain(static_cast<gchar*>(iter->data));
hostNames.add(String::fromUTF8(domain.get()));
}
#else
UNUSED_PARAM(hostNames);
#endif
}
void SoupNetworkSession::deleteHSTSCacheForHostNames(const Vector<String>& hostNames)
{
#if SOUP_CHECK_VERSION(2, 67, 1)
SoupHSTSEnforcer* enforcer = SOUP_HSTS_ENFORCER(soup_session_get_feature(m_soupSession.get(), SOUP_TYPE_HSTS_ENFORCER));
if (!enforcer)
return;
for (const auto& hostName : hostNames) {
GUniquePtr<SoupHSTSPolicy> policy(soup_hsts_policy_new(hostName.utf8().data(), SOUP_HSTS_POLICY_MAX_AGE_PAST, FALSE));
soup_hsts_enforcer_set_policy(enforcer, policy.get());
}
#else
UNUSED_PARAM(hostNames);
#endif
}
void SoupNetworkSession::clearHSTSCache(WallTime modifiedSince)
{
#if SOUP_CHECK_VERSION(2, 67, 91)
SoupHSTSEnforcer* enforcer = SOUP_HSTS_ENFORCER(soup_session_get_feature(m_soupSession.get(), SOUP_TYPE_HSTS_ENFORCER));
if (!enforcer)
return;
GUniquePtr<GList> policies(soup_hsts_enforcer_get_policies(enforcer, FALSE));
for (GList* iter = policies.get(); iter != nullptr; iter = iter->next) {
GUniquePtr<SoupHSTSPolicy> policy(static_cast<SoupHSTSPolicy*>(iter->data));
auto modified = soup_date_to_time_t(policy.get()->expires) - policy.get()->max_age;
if (modified >= modifiedSince.secondsSinceEpoch().seconds()) {
GUniquePtr<SoupHSTSPolicy> newPolicy(soup_hsts_policy_new(policy.get()->domain, SOUP_HSTS_POLICY_MAX_AGE_PAST, FALSE));
soup_hsts_enforcer_set_policy(enforcer, newPolicy.get());
}
}
#else
UNUSED_PARAM(modifiedSince);
#endif
}
static inline bool stringIsNumeric(const char* str)
{
while (*str) {
if (!g_ascii_isdigit(*str))
return false;
str++;
}
return true;
}
// Old versions of WebKit created this cache.
void SoupNetworkSession::clearOldSoupCache(const String& cacheDirectory)
{
CString cachePath = FileSystem::fileSystemRepresentation(cacheDirectory);
GUniquePtr<char> cacheFile(g_build_filename(cachePath.data(), "soup.cache2", nullptr));
if (!g_file_test(cacheFile.get(), G_FILE_TEST_IS_REGULAR))
return;
GUniquePtr<GDir> dir(g_dir_open(cachePath.data(), 0, nullptr));
if (!dir)
return;
while (const char* name = g_dir_read_name(dir.get())) {
if (!g_str_has_prefix(name, "soup.cache") && !stringIsNumeric(name))
continue;
GUniquePtr<gchar> filename(g_build_filename(cachePath.data(), name, nullptr));
if (g_file_test(filename.get(), G_FILE_TEST_IS_REGULAR))
g_unlink(filename.get());
}
}
void SoupNetworkSession::setupProxy()
{
GRefPtr<GProxyResolver> resolver;
switch (proxySettings().mode) {
case SoupNetworkProxySettings::Mode::Default: {
GRefPtr<GProxyResolver> currentResolver;
g_object_get(m_soupSession.get(), SOUP_SESSION_PROXY_RESOLVER, &currentResolver.outPtr(), nullptr);
GProxyResolver* defaultResolver = g_proxy_resolver_get_default();
if (currentResolver.get() == defaultResolver)
return;
resolver = defaultResolver;
break;
}
case SoupNetworkProxySettings::Mode::NoProxy:
// Do nothing in this case, resolver is nullptr so that when set it will disable proxies.
break;
case SoupNetworkProxySettings::Mode::Custom:
resolver = adoptGRef(g_simple_proxy_resolver_new(nullptr, nullptr));
if (!proxySettings().defaultProxyURL.isNull())
g_simple_proxy_resolver_set_default_proxy(G_SIMPLE_PROXY_RESOLVER(resolver.get()), proxySettings().defaultProxyURL.data());
if (proxySettings().ignoreHosts)
g_simple_proxy_resolver_set_ignore_hosts(G_SIMPLE_PROXY_RESOLVER(resolver.get()), proxySettings().ignoreHosts.get());
for (const auto& iter : proxySettings().proxyMap)
g_simple_proxy_resolver_set_uri_proxy(G_SIMPLE_PROXY_RESOLVER(resolver.get()), iter.key.data(), iter.value.data());
break;
}
g_object_set(m_soupSession.get(), SOUP_SESSION_PROXY_RESOLVER, resolver.get(), nullptr);
soup_session_abort(m_soupSession.get());
}
void SoupNetworkSession::setProxySettings(const SoupNetworkProxySettings& settings)
{
proxySettings() = settings;
}
void SoupNetworkSession::setInitialAcceptLanguages(const CString& languages)
{
initialAcceptLanguages() = languages;
}
void SoupNetworkSession::setAcceptLanguages(const CString& languages)
{
g_object_set(m_soupSession.get(), "accept-language", languages.data(), nullptr);
}
void SoupNetworkSession::setShouldIgnoreTLSErrors(bool ignoreTLSErrors)
{
gIgnoreTLSErrors = ignoreTLSErrors;
}
Optional<ResourceError> SoupNetworkSession::checkTLSErrors(const URL& requestURL, GTlsCertificate* certificate, GTlsCertificateFlags tlsErrors)
{
if (gIgnoreTLSErrors)
return WTF::nullopt;
if (!tlsErrors)
return WTF::nullopt;
auto it = allowedCertificates().find(requestURL.host().toStringWithoutCopying());
if (it != allowedCertificates().end() && it->value.contains(certificate))
return WTF::nullopt;
return ResourceError::tlsError(requestURL, tlsErrors, certificate);
}
void SoupNetworkSession::allowSpecificHTTPSCertificateForHost(const CertificateInfo& certificateInfo, const String& host)
{
allowedCertificates().add(host, HostTLSCertificateSet()).iterator->value.add(certificateInfo.certificate());
}
} // namespace WebCore
#endif