| /* |
| * Copyright (C) 2012-2014 Apple Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' |
| * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, |
| * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS |
| * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF |
| * THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "config.h" |
| #include "NetworkResourceLoader.h" |
| |
| #if ENABLE(NETWORK_PROCESS) |
| |
| #include "AuthenticationManager.h" |
| #include "DataReference.h" |
| #include "Logging.h" |
| #include "NetworkBlobRegistry.h" |
| #include "NetworkConnectionToWebProcess.h" |
| #include "NetworkProcess.h" |
| #include "NetworkProcessConnectionMessages.h" |
| #include "NetworkResourceLoadParameters.h" |
| #include "RemoteNetworkingContext.h" |
| #include "ShareableResource.h" |
| #include "SharedMemory.h" |
| #include "WebCoreArgumentCoders.h" |
| #include "WebErrors.h" |
| #include "WebResourceLoaderMessages.h" |
| #include <WebCore/BlobDataFileReference.h> |
| #include <WebCore/CertificateInfo.h> |
| #include <WebCore/NotImplemented.h> |
| #include <WebCore/ResourceHandle.h> |
| #include <WebCore/SharedBuffer.h> |
| #include <WebCore/SynchronousLoaderClient.h> |
| #include <wtf/CurrentTime.h> |
| #include <wtf/MainThread.h> |
| |
| using namespace WebCore; |
| |
| namespace WebKit { |
| |
| struct NetworkResourceLoader::SynchronousLoadData { |
| SynchronousLoadData(PassRefPtr<Messages::NetworkConnectionToWebProcess::PerformSynchronousLoad::DelayedReply> reply) |
| : delayedReply(reply) |
| { |
| ASSERT(delayedReply); |
| } |
| WebCore::ResourceRequest currentRequest; |
| RefPtr<Messages::NetworkConnectionToWebProcess::PerformSynchronousLoad::DelayedReply> delayedReply; |
| WebCore::ResourceResponse response; |
| WebCore::ResourceError error; |
| }; |
| |
| static void sendReplyToSynchronousRequest(NetworkResourceLoader::SynchronousLoadData& data, WebCore::SharedBuffer* buffer) |
| { |
| ASSERT(data.delayedReply); |
| ASSERT(!data.response.isNull() || !data.error.isNull()); |
| |
| Vector<char> responseBuffer; |
| if (buffer && buffer->size()) |
| responseBuffer.append(buffer->data(), buffer->size()); |
| |
| data.delayedReply->send(data.error, data.response, responseBuffer); |
| data.delayedReply = nullptr; |
| } |
| |
| NetworkResourceLoader::NetworkResourceLoader(const NetworkResourceLoadParameters& parameters, NetworkConnectionToWebProcess* connection, PassRefPtr<Messages::NetworkConnectionToWebProcess::PerformSynchronousLoad::DelayedReply> synchronousReply) |
| : m_parameters(parameters) |
| , m_connection(connection) |
| , m_bytesReceived(0) |
| , m_bufferedDataEncodedDataLength(0) |
| , m_didConvertHandleToDownload(false) |
| , m_didConsumeSandboxExtensions(false) |
| , m_defersLoading(parameters.defersLoading) |
| , m_bufferingTimer(this, &NetworkResourceLoader::bufferingTimerFired) |
| { |
| ASSERT(RunLoop::isMain()); |
| // FIXME: This is necessary because of the existence of EmptyFrameLoaderClient in WebCore. |
| // Once bug 116233 is resolved, this ASSERT can just be "m_webPageID && m_webFrameID" |
| ASSERT((m_parameters.webPageID && m_parameters.webFrameID) || m_parameters.clientCredentialPolicy == DoNotAskClientForAnyCredentials); |
| |
| if (originalRequest().httpBody()) { |
| for (const FormDataElement& element : originalRequest().httpBody()->elements()) { |
| if (element.m_type == FormDataElement::Type::EncodedBlob) |
| m_fileReferences.appendVector(NetworkBlobRegistry::shared().filesInBlob(connection, element.m_url)); |
| } |
| } |
| |
| if (originalRequest().url().protocolIs("blob")) { |
| ASSERT(!m_parameters.resourceSandboxExtension); |
| m_fileReferences.appendVector(NetworkBlobRegistry::shared().filesInBlob(connection, originalRequest().url())); |
| } |
| |
| if (synchronousReply) |
| m_synchronousLoadData = std::make_unique<SynchronousLoadData>(synchronousReply); |
| } |
| |
| NetworkResourceLoader::~NetworkResourceLoader() |
| { |
| ASSERT(RunLoop::isMain()); |
| ASSERT(!m_handle); |
| ASSERT(!isSynchronous() || !m_synchronousLoadData->delayedReply); |
| } |
| |
| bool NetworkResourceLoader::isSynchronous() const |
| { |
| return !!m_synchronousLoadData; |
| } |
| |
| void NetworkResourceLoader::start() |
| { |
| ASSERT(RunLoop::isMain()); |
| |
| if (m_defersLoading) |
| return; |
| |
| // Explicit ref() balanced by a deref() in NetworkResourceLoader::cleanup() |
| ref(); |
| |
| m_networkingContext = RemoteNetworkingContext::create(sessionID(), m_parameters.shouldClearReferrerOnHTTPSToHTTPRedirect); |
| |
| consumeSandboxExtensions(); |
| |
| m_currentRequest = originalRequest(); |
| |
| if (isSynchronous() || m_parameters.maximumBufferingTime > 0_ms) |
| m_bufferedData = WebCore::SharedBuffer::create(); |
| |
| bool shouldSniff = m_parameters.contentSniffingPolicy == SniffContent; |
| m_handle = ResourceHandle::create(m_networkingContext.get(), m_currentRequest, this, false /* defersLoading */, shouldSniff); |
| } |
| |
| void NetworkResourceLoader::setDefersLoading(bool defers) |
| { |
| if (m_defersLoading == defers) |
| return; |
| m_defersLoading = defers; |
| if (m_handle) { |
| m_handle->setDefersLoading(defers); |
| return; |
| } |
| if (!m_defersLoading) |
| start(); |
| } |
| |
| void NetworkResourceLoader::cleanup() |
| { |
| ASSERT(RunLoop::isMain()); |
| |
| m_bufferingTimer.stop(); |
| |
| invalidateSandboxExtensions(); |
| |
| NetworkProcess::shared().networkResourceLoadScheduler().removeLoader(this); |
| |
| if (m_handle) { |
| // Explicit deref() balanced by a ref() in NetworkResourceLoader::start() |
| // This might cause the NetworkResourceLoader to be destroyed and therefore we do it last. |
| m_handle = 0; |
| deref(); |
| } |
| } |
| |
| void NetworkResourceLoader::didConvertHandleToDownload() |
| { |
| ASSERT(m_handle); |
| m_didConvertHandleToDownload = true; |
| } |
| |
| void NetworkResourceLoader::abort() |
| { |
| ASSERT(RunLoop::isMain()); |
| |
| if (m_handle && !m_didConvertHandleToDownload) |
| m_handle->cancel(); |
| |
| cleanup(); |
| } |
| |
| void NetworkResourceLoader::didReceiveResponseAsync(ResourceHandle* handle, const ResourceResponse& response) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| if (m_parameters.needsCertificateInfo) |
| response.includeCertificateInfo(); |
| |
| if (isSynchronous()) |
| m_synchronousLoadData->response = response; |
| else |
| sendAbortingOnFailure(Messages::WebResourceLoader::DidReceiveResponse(response, m_parameters.isMainResource)); |
| |
| // m_handle will be null if the request got aborted above. |
| if (!m_handle) |
| return; |
| |
| // For main resources, the web process is responsible for sending back a NetworkResourceLoader::ContinueDidReceiveResponse message. |
| if (m_parameters.isMainResource) |
| return; |
| |
| m_handle->continueDidReceiveResponse(); |
| } |
| |
| void NetworkResourceLoader::didReceiveData(ResourceHandle*, const char* /* data */, unsigned /* length */, int /* encodedDataLength */) |
| { |
| // The NetworkProcess should never get a didReceiveData callback. |
| // We should always be using didReceiveBuffer. |
| ASSERT_NOT_REACHED(); |
| } |
| |
| void NetworkResourceLoader::didReceiveBuffer(ResourceHandle* handle, PassRefPtr<SharedBuffer> buffer, int reportedEncodedDataLength) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| // FIXME: At least on OS X Yosemite we always get -1 from the resource handle. |
| unsigned encodedDataLength = reportedEncodedDataLength >= 0 ? reportedEncodedDataLength : buffer->size(); |
| |
| m_bytesReceived += buffer->size(); |
| if (m_bufferedData) { |
| m_bufferedData->append(buffer.get()); |
| m_bufferedDataEncodedDataLength += encodedDataLength; |
| startBufferingTimerIfNeeded(); |
| return; |
| } |
| sendBuffer(buffer.get(), encodedDataLength); |
| } |
| |
| void NetworkResourceLoader::didFinishLoading(ResourceHandle* handle, double finishTime) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| if (isSynchronous()) |
| sendReplyToSynchronousRequest(*m_synchronousLoadData, m_bufferedData.get()); |
| else { |
| if (m_bufferedData && m_bufferedData->size()) |
| sendBuffer(m_bufferedData.get(), -1); |
| send(Messages::WebResourceLoader::DidFinishResourceLoad(finishTime)); |
| } |
| |
| cleanup(); |
| } |
| |
| void NetworkResourceLoader::didFail(ResourceHandle* handle, const ResourceError& error) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| if (isSynchronous()) { |
| m_synchronousLoadData->error = error; |
| sendReplyToSynchronousRequest(*m_synchronousLoadData, nullptr); |
| } else |
| send(Messages::WebResourceLoader::DidFailResourceLoad(error)); |
| |
| cleanup(); |
| } |
| |
| void NetworkResourceLoader::willSendRequestAsync(ResourceHandle* handle, const ResourceRequest& request, const ResourceResponse& redirectResponse) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| // We only expect to get the willSendRequest callback from ResourceHandle as the result of a redirect. |
| ASSERT(!redirectResponse.isNull()); |
| ASSERT(RunLoop::isMain()); |
| |
| m_currentRequest = request; |
| |
| if (isSynchronous()) { |
| // FIXME: This needs to be fixed to follow the redirect correctly even for cross-domain requests. |
| // This includes at least updating host records, and comparing the current request instead of the original request here. |
| if (!protocolHostAndPortAreEqual(originalRequest().url(), request.url())) { |
| ASSERT(m_synchronousLoadData->error.isNull()); |
| m_synchronousLoadData->error = SynchronousLoaderClient::platformBadResponseError(); |
| m_currentRequest = ResourceRequest(); |
| } |
| continueWillSendRequest(m_currentRequest); |
| return; |
| } |
| sendAbortingOnFailure(Messages::WebResourceLoader::WillSendRequest(request, redirectResponse)); |
| } |
| |
| void NetworkResourceLoader::continueWillSendRequest(const ResourceRequest& newRequest) |
| { |
| #if PLATFORM(COCOA) |
| m_currentRequest.updateFromDelegatePreservingOldProperties(newRequest.nsURLRequest(DoNotUpdateHTTPBody)); |
| #elif USE(SOUP) |
| // FIXME: Implement ResourceRequest::updateFromDelegatePreservingOldProperties. See https://bugs.webkit.org/show_bug.cgi?id=126127. |
| m_currentRequest.updateFromDelegatePreservingOldProperties(newRequest); |
| #endif |
| |
| m_handle->continueWillSendRequest(m_currentRequest); |
| |
| if (m_currentRequest.isNull()) { |
| m_handle->cancel(); |
| didFail(m_handle.get(), cancelledError(m_currentRequest)); |
| } |
| } |
| |
| void NetworkResourceLoader::continueDidReceiveResponse() |
| { |
| // FIXME: Remove this check once BlobResourceHandle implements didReceiveResponseAsync correctly. |
| // Currently, it does not wait for response, so the load is likely to finish before continueDidReceiveResponse. |
| if (!m_handle) |
| return; |
| |
| m_handle->continueDidReceiveResponse(); |
| } |
| |
| void NetworkResourceLoader::didSendData(ResourceHandle* handle, unsigned long long bytesSent, unsigned long long totalBytesToBeSent) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| if (!isSynchronous()) |
| send(Messages::WebResourceLoader::DidSendData(bytesSent, totalBytesToBeSent)); |
| } |
| |
| void NetworkResourceLoader::wasBlocked(ResourceHandle* handle) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| didFail(handle, WebKit::blockedError(m_currentRequest)); |
| } |
| |
| void NetworkResourceLoader::cannotShowURL(ResourceHandle* handle) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| didFail(handle, WebKit::cannotShowURLError(m_currentRequest)); |
| } |
| |
| bool NetworkResourceLoader::shouldUseCredentialStorage(ResourceHandle* handle) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle || !m_handle); // m_handle will be 0 if called from ResourceHandle::start(). |
| |
| // When the WebProcess is handling loading a client is consulted each time this shouldUseCredentialStorage question is asked. |
| // In NetworkProcess mode we ask the WebProcess client up front once and then reuse the cached answer. |
| |
| // We still need this sync version, because ResourceHandle itself uses it internally, even when the delegate uses an async one. |
| |
| return m_parameters.allowStoredCredentials == AllowStoredCredentials; |
| } |
| |
| void NetworkResourceLoader::didReceiveAuthenticationChallenge(ResourceHandle* handle, const AuthenticationChallenge& challenge) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| // NetworkResourceLoader does not know whether the request is cross origin, so Web process computes an applicable credential policy for it. |
| ASSERT(m_parameters.clientCredentialPolicy != DoNotAskClientForCrossOriginCredentials); |
| |
| if (m_parameters.clientCredentialPolicy == DoNotAskClientForAnyCredentials) { |
| challenge.authenticationClient()->receivedRequestToContinueWithoutCredential(challenge); |
| return; |
| } |
| |
| NetworkProcess::shared().authenticationManager().didReceiveAuthenticationChallenge(m_parameters.webPageID, m_parameters.webFrameID, challenge); |
| } |
| |
| void NetworkResourceLoader::didCancelAuthenticationChallenge(ResourceHandle* handle, const AuthenticationChallenge&) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| // This function is probably not needed (see <rdar://problem/8960124>). |
| notImplemented(); |
| } |
| |
| void NetworkResourceLoader::receivedCancellation(ResourceHandle* handle, const AuthenticationChallenge&) |
| { |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| m_handle->cancel(); |
| didFail(m_handle.get(), cancelledError(m_currentRequest)); |
| } |
| |
| void NetworkResourceLoader::startBufferingTimerIfNeeded() |
| { |
| if (isSynchronous()) |
| return; |
| if (m_bufferingTimer.isActive()) |
| return; |
| m_bufferingTimer.startOneShot(m_parameters.maximumBufferingTime); |
| } |
| |
| void NetworkResourceLoader::bufferingTimerFired(Timer<NetworkResourceLoader>&) |
| { |
| ASSERT(m_bufferedData); |
| ASSERT(m_handle); |
| if (!m_bufferedData->size()) |
| return; |
| |
| IPC::SharedBufferDataReference dataReference(m_bufferedData.get()); |
| sendAbortingOnFailure(Messages::WebResourceLoader::DidReceiveData(dataReference, m_bufferedDataEncodedDataLength)); |
| |
| m_bufferedData = WebCore::SharedBuffer::create(); |
| m_bufferedDataEncodedDataLength = 0; |
| } |
| |
| void NetworkResourceLoader::sendBuffer(WebCore::SharedBuffer* buffer, int encodedDataLength) |
| { |
| ASSERT(buffer); |
| ASSERT(!isSynchronous()); |
| |
| #if PLATFORM(IOS) || (PLATFORM(MAC) && __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090) |
| ShareableResource::Handle shareableResourceHandle; |
| NetworkResourceLoader::tryGetShareableHandleFromSharedBuffer(shareableResourceHandle, *buffer); |
| if (!shareableResourceHandle.isNull()) { |
| // Since we're delivering this resource by ourselves all at once and don't need any more data or callbacks from the network layer, abort the loader. |
| abort(); |
| send(Messages::WebResourceLoader::DidReceiveResource(shareableResourceHandle, currentTime())); |
| return; |
| } |
| #endif |
| |
| IPC::SharedBufferDataReference dataReference(buffer); |
| sendAbortingOnFailure(Messages::WebResourceLoader::DidReceiveData(dataReference, encodedDataLength)); |
| } |
| |
| IPC::Connection* NetworkResourceLoader::messageSenderConnection() |
| { |
| return connectionToWebProcess()->connection(); |
| } |
| |
| void NetworkResourceLoader::consumeSandboxExtensions() |
| { |
| for (auto& extension : m_parameters.requestBodySandboxExtensions) |
| extension->consume(); |
| |
| if (auto& extension = m_parameters.resourceSandboxExtension) |
| extension->consume(); |
| |
| for (auto& fileReference : m_fileReferences) |
| fileReference->prepareForFileAccess(); |
| |
| m_didConsumeSandboxExtensions = true; |
| } |
| |
| void NetworkResourceLoader::invalidateSandboxExtensions() |
| { |
| if (m_didConsumeSandboxExtensions) { |
| for (auto& extension : m_parameters.requestBodySandboxExtensions) |
| extension->revoke(); |
| if (auto& extension = m_parameters.resourceSandboxExtension) |
| extension->revoke(); |
| for (auto& fileReference : m_fileReferences) |
| fileReference->revokeFileAccess(); |
| } |
| |
| m_fileReferences.clear(); |
| |
| m_didConsumeSandboxExtensions = false; |
| } |
| |
| template<typename T> |
| bool NetworkResourceLoader::sendAbortingOnFailure(T&& message, unsigned messageSendFlags) |
| { |
| bool result = messageSenderConnection()->send(std::forward<T>(message), messageSenderDestinationID(), messageSendFlags); |
| if (!result) |
| abort(); |
| return result; |
| } |
| |
| #if USE(PROTECTION_SPACE_AUTH_CALLBACK) |
| void NetworkResourceLoader::canAuthenticateAgainstProtectionSpaceAsync(ResourceHandle* handle, const ProtectionSpace& protectionSpace) |
| { |
| ASSERT(RunLoop::isMain()); |
| ASSERT_UNUSED(handle, handle == m_handle); |
| |
| // Handle server trust evaluation at platform-level if requested, for performance reasons. |
| if (protectionSpace.authenticationScheme() == ProtectionSpaceAuthenticationSchemeServerTrustEvaluationRequested |
| && !NetworkProcess::shared().canHandleHTTPSServerTrustEvaluation()) { |
| continueCanAuthenticateAgainstProtectionSpace(false); |
| return; |
| } |
| |
| if (isSynchronous()) { |
| // FIXME: We should ask the WebProcess like the asynchronous case below does. |
| // This is currently impossible as the WebProcess is blocked waiting on this synchronous load. |
| // It's possible that we can jump straight to the UI process to resolve this. |
| continueCanAuthenticateAgainstProtectionSpace(true); |
| return; |
| } |
| sendAbortingOnFailure(Messages::WebResourceLoader::CanAuthenticateAgainstProtectionSpace(protectionSpace)); |
| } |
| |
| void NetworkResourceLoader::continueCanAuthenticateAgainstProtectionSpace(bool result) |
| { |
| m_handle->continueCanAuthenticateAgainstProtectionSpace(result); |
| } |
| #endif |
| |
| #if USE(NETWORK_CFDATA_ARRAY_CALLBACK) |
| bool NetworkResourceLoader::supportsDataArray() |
| { |
| notImplemented(); |
| return false; |
| } |
| |
| void NetworkResourceLoader::didReceiveDataArray(ResourceHandle*, CFArrayRef) |
| { |
| ASSERT_NOT_REACHED(); |
| notImplemented(); |
| } |
| #endif |
| |
| } // namespace WebKit |
| |
| #endif // ENABLE(NETWORK_PROCESS) |