blob: 64ee5ddbc825925ee504917e8e3325c414654cc1 [file] [log] [blame]
oliver@apple.comee5b1dd2009-01-22 00:22:45 +00001/*
bbudge@chromium.orga5963922012-03-27 07:38:47 +00002 * Copyright (C) 2011, 2012 Google Inc. All rights reserved.
oliver@apple.comee5b1dd2009-01-22 00:22:45 +00003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are
6 * met:
7 *
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above
11 * copyright notice, this list of conditions and the following disclaimer
12 * in the documentation and/or other materials provided with the
13 * distribution.
14 * * Neither the name of Google Inc. nor the names of its
15 * contributors may be used to endorse or promote products derived from
16 * this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#include "config.h"
32#include "DocumentThreadableLoader.h"
33
japhet@chromium.org43f85fe2011-10-25 19:50:25 +000034#include "CachedRawResource.h"
35#include "CachedResourceLoader.h"
commit-queue@webkit.org5e7ea1b2012-10-22 23:35:28 +000036#include "CachedResourceRequest.h"
cdumez@apple.com9ba621d2015-03-13 17:58:50 +000037#include "CachedResourceRequestInitiators.h"
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +000038#include "CrossOriginAccessControl.h"
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +000039#include "CrossOriginPreflightChecker.h"
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +000040#include "CrossOriginPreflightResultCache.h"
joepeck@webkit.org301376e2017-02-16 19:18:32 +000041#include "DOMWindow.h"
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000042#include "Document.h"
levin@chromium.org682c11a2009-02-25 18:06:20 +000043#include "Frame.h"
44#include "FrameLoader.h"
vsevik@chromium.orgeb15eaa2012-09-14 11:24:01 +000045#include "InspectorInstrumentation.h"
achristensen@apple.comd40fd882019-10-04 19:30:08 +000046#include "LegacySchemeRegistry.h"
joepeck@webkit.org301376e2017-02-16 19:18:32 +000047#include "LoadTiming.h"
youenn@apple.comb9709cc2018-04-16 21:50:26 +000048#include "LoaderStrategy.h"
joepeck@webkit.org301376e2017-02-16 19:18:32 +000049#include "Performance.h"
commit-queue@webkit.org1d992932018-09-11 17:14:07 +000050#include "PlatformStrategies.h"
ossy@webkit.orgd77a3142015-01-21 08:45:11 +000051#include "ProgressTracker.h"
japhet@chromium.org43f85fe2011-10-25 19:50:25 +000052#include "ResourceError.h"
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000053#include "ResourceRequest.h"
joepeck@webkit.org301376e2017-02-16 19:18:32 +000054#include "ResourceTiming.h"
achristensen@apple.com84fc9522018-08-01 03:57:07 +000055#include "RuntimeApplicationChecks.h"
yoav@yoav.ws4ea6dc82016-05-02 08:21:50 +000056#include "RuntimeEnabledFeatures.h"
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000057#include "SecurityOrigin.h"
cdumez@apple.comfc8fdf32019-12-06 21:05:12 +000058#include "Settings.h"
annulen@yandex.rudd15e812017-06-23 16:11:24 +000059#include "SharedBuffer.h"
weinig@apple.comb50adaa2017-05-09 22:53:13 +000060#include "SubresourceIntegrity.h"
vsevik@chromium.orgc5c37b92012-09-14 10:41:35 +000061#include "SubresourceLoader.h"
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000062#include "ThreadableLoaderClient.h"
japhet@chromium.org43f85fe2011-10-25 19:50:25 +000063#include <wtf/Assertions.h>
akling@apple.comf8515982013-09-02 18:50:01 +000064#include <wtf/Ref.h>
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000065
ap@apple.com1e8475922018-10-18 21:38:50 +000066#if PLATFORM(IOS_FAMILY)
achristensen@apple.com84fc9522018-08-01 03:57:07 +000067#include <wtf/spi/darwin/dyldSPI.h>
68#endif
69
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000070namespace WebCore {
71
commit-queue@webkit.org9b579572016-08-01 07:02:35 +000072void DocumentThreadableLoader::loadResourceSynchronously(Document& document, ResourceRequest&& request, ThreadableLoaderClient& client, const ThreadableLoaderOptions& options, RefPtr<SecurityOrigin>&& origin, std::unique_ptr<ContentSecurityPolicy>&& contentSecurityPolicy)
levin@chromium.org682c11a2009-02-25 18:06:20 +000073{
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +000074 // The loader will be deleted as soon as this function exits.
commit-queue@webkit.org45376692016-12-16 11:51:16 +000075 Ref<DocumentThreadableLoader> loader = adoptRef(*new DocumentThreadableLoader(document, client, LoadSynchronously, WTFMove(request), options, WTFMove(origin), WTFMove(contentSecurityPolicy), String(), ShouldLogError::Yes));
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +000076 ASSERT(loader->hasOneRef());
levin@chromium.org682c11a2009-02-25 18:06:20 +000077}
78
commit-queue@webkit.org9b579572016-08-01 07:02:35 +000079void DocumentThreadableLoader::loadResourceSynchronously(Document& document, ResourceRequest&& request, ThreadableLoaderClient& client, const ThreadableLoaderOptions& options)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000080{
commit-queue@webkit.org9b579572016-08-01 07:02:35 +000081 loadResourceSynchronously(document, WTFMove(request), client, options, nullptr, nullptr);
dbates@webkit.org25ec4da2016-02-09 01:26:56 +000082}
83
commit-queue@webkit.org45376692016-12-16 11:51:16 +000084RefPtr<DocumentThreadableLoader> DocumentThreadableLoader::create(Document& document, ThreadableLoaderClient& client,
85ResourceRequest&& request, const ThreadableLoaderOptions& options, RefPtr<SecurityOrigin>&& origin,
86std::unique_ptr<ContentSecurityPolicy>&& contentSecurityPolicy, String&& referrer, ShouldLogError shouldLogError)
dbates@webkit.org25ec4da2016-02-09 01:26:56 +000087{
commit-queue@webkit.org45376692016-12-16 11:51:16 +000088 RefPtr<DocumentThreadableLoader> loader = adoptRef(new DocumentThreadableLoader(document, client, LoadAsynchronously, WTFMove(request), options, WTFMove(origin), WTFMove(contentSecurityPolicy), WTFMove(referrer), shouldLogError));
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +000089 if (!loader->isLoading())
cdumez@apple.comd839ea12015-07-04 19:42:18 +000090 loader = nullptr;
youenn.fablet@crf.canon.fr02d10552016-03-04 08:27:36 +000091 return loader;
oliver@apple.comee5b1dd2009-01-22 00:22:45 +000092}
93
commit-queue@webkit.org15265232016-09-16 07:33:44 +000094RefPtr<DocumentThreadableLoader> DocumentThreadableLoader::create(Document& document, ThreadableLoaderClient& client, ResourceRequest&& request, const ThreadableLoaderOptions& options, String&& referrer)
dbates@webkit.org25ec4da2016-02-09 01:26:56 +000095{
commit-queue@webkit.org45376692016-12-16 11:51:16 +000096 return create(document, client, WTFMove(request), options, nullptr, nullptr, WTFMove(referrer), ShouldLogError::Yes);
dbates@webkit.org25ec4da2016-02-09 01:26:56 +000097}
98
dbates@webkit.org2d7873d2018-05-11 05:34:20 +000099static inline bool shouldPerformSecurityChecks()
youenn@apple.comc37e6222018-04-27 18:10:18 +0000100{
dbates@webkit.org2d7873d2018-05-11 05:34:20 +0000101 return platformStrategies()->loaderStrategy()->shouldPerformSecurityChecks();
youenn@apple.comc37e6222018-04-27 18:10:18 +0000102}
103
104bool DocumentThreadableLoader::shouldSetHTTPHeadersToKeep() const
105{
dbates@webkit.org2d7873d2018-05-11 05:34:20 +0000106 if (m_options.mode == FetchOptions::Mode::Cors && shouldPerformSecurityChecks())
youenn@apple.comc37e6222018-04-27 18:10:18 +0000107 return true;
108
109#if ENABLE(SERVICE_WORKER)
110 if (m_options.serviceWorkersMode == ServiceWorkersMode::All && m_async)
111 return m_options.serviceWorkerRegistrationIdentifier || m_document.activeServiceWorker();
112#endif
113
114 return false;
115}
116
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000117DocumentThreadableLoader::DocumentThreadableLoader(Document& document, ThreadableLoaderClient& client, BlockingBehavior blockingBehavior, ResourceRequest&& request, const ThreadableLoaderOptions& options, RefPtr<SecurityOrigin>&& origin, std::unique_ptr<ContentSecurityPolicy>&& contentSecurityPolicy, String&& referrer, ShouldLogError shouldLogError)
akling@apple.com4cd57b52014-02-07 12:02:15 +0000118 : m_client(&client)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000119 , m_document(document)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000120 , m_options(options)
commit-queue@webkit.org996973b2016-06-29 06:25:59 +0000121 , m_origin(WTFMove(origin))
commit-queue@webkit.orgf89b11d2016-08-02 07:20:23 +0000122 , m_referrer(WTFMove(referrer))
ryanhaddad@apple.com439d09f2017-10-26 17:45:19 +0000123 , m_sameOriginRequest(securityOrigin().canRequest(request.url()))
bbudge@chromium.orga5963922012-03-27 07:38:47 +0000124 , m_simpleRequest(true)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000125 , m_async(blockingBehavior == LoadAsynchronously)
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000126 , m_delayCallbacksForIntegrityCheck(!m_options.integrity.isEmpty())
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000127 , m_contentSecurityPolicy(WTFMove(contentSecurityPolicy))
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000128 , m_shouldLogError(shouldLogError)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000129{
beidson@apple.coma7ce3be2017-02-15 00:20:37 +0000130 relaxAdoptionRequirement();
131
commit-queue@webkit.org15265232016-09-16 07:33:44 +0000132 // Setting a referrer header is only supported in the async code path.
133 ASSERT(m_async || m_referrer.isEmpty());
134
cdumez@apple.comfc8fdf32019-12-06 21:05:12 +0000135 if (document.settings().disallowSyncXHRDuringPageDismissalEnabled() && !m_async && (!document.page() || !document.page()->areSynchronousLoadsAllowed())) {
cdumez@apple.com3ed77642020-01-15 23:55:04 +0000136 document.didRejectSyncXHRDuringPageDismissal();
cdumez@apple.comfc8fdf32019-12-06 21:05:12 +0000137 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, request.url(), "Synchronous loads are not allowed at this time"));
138 return;
139 }
140
commit-queue@webkit.org15265232016-09-16 07:33:44 +0000141 // Referrer and Origin headers should be set after the preflight if any.
142 ASSERT(!request.hasHTTPReferrer() && !request.hasHTTPOrigin());
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000143
commit-queue@webkit.org03af1952016-09-22 08:28:37 +0000144 ASSERT_WITH_SECURITY_IMPLICATION(isAllowedByContentSecurityPolicy(request.url(), ContentSecurityPolicy::RedirectResponseReceived::No));
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000145
cdumez@apple.com22964df2017-09-25 21:17:43 +0000146 m_options.storedCredentialsPolicy = (m_options.credentials == FetchOptions::Credentials::Include || (m_options.credentials == FetchOptions::Credentials::SameOrigin && m_sameOriginRequest)) ? StoredCredentialsPolicy::Use : StoredCredentialsPolicy::DoNotUse;
commit-queue@webkit.orgbfb64e22016-07-29 14:12:03 +0000147
commit-queue@webkit.org1a5288b2016-08-21 13:36:48 +0000148 ASSERT(!request.httpHeaderFields().contains(HTTPHeaderName::Origin));
149
150 // Copy headers if we need to replay the request after a redirection.
youenn@apple.comc37e6222018-04-27 18:10:18 +0000151 if (m_options.mode == FetchOptions::Mode::Cors)
commit-queue@webkit.org1a5288b2016-08-21 13:36:48 +0000152 m_originalHeaders = request.httpHeaderFields();
153
youenn@apple.comc37e6222018-04-27 18:10:18 +0000154 if (shouldSetHTTPHeadersToKeep())
commit-queue@webkit.org88b80fc2017-12-19 18:37:44 +0000155 m_options.httpHeadersToKeep = httpHeadersToKeepFromCleaning(request.httpHeaderFields());
commit-queue@webkit.org88b80fc2017-12-19 18:37:44 +0000156
achristensen@apple.com2170fa42020-01-02 21:14:02 +0000157 bool shouldDisableCORS = document.isRunningUserScripts() && LegacySchemeRegistry::isUserExtensionScheme(request.url().protocol().toStringWithoutCopying());
158 if (auto* page = document.page())
159 shouldDisableCORS |= page->shouldDisableCorsForRequestTo(request.url());
160
161 if (shouldDisableCORS) {
commit-queue@webkit.org5bd2ba62017-02-07 00:25:00 +0000162 m_options.mode = FetchOptions::Mode::NoCors;
163 m_options.filteringPolicy = ResponseFilteringPolicy::Disable;
164 }
165
youenn@apple.comc37e6222018-04-27 18:10:18 +0000166 m_options.cspResponseHeaders = m_options.contentSecurityPolicyEnforcement != ContentSecurityPolicyEnforcement::DoNotEnforce ? this->contentSecurityPolicy().responseHeaders() : ContentSecurityPolicyResponseHeaders { };
youenn@apple.com14b2bc62018-04-24 03:22:53 +0000167
commit-queue@webkit.org416274f2016-08-29 08:06:28 +0000168 // As per step 11 of https://fetch.spec.whatwg.org/#main-fetch, data scheme (if same-origin data-URL flag is set) and about scheme are considered same-origin.
169 if (request.url().protocolIsData())
170 m_sameOriginRequest = options.sameOriginDataURLFlag == SameOriginDataURLFlag::Set;
171
commit-queue@webkit.org53c2e482017-12-12 20:43:32 +0000172 if (m_sameOriginRequest || m_options.mode == FetchOptions::Mode::NoCors || m_options.mode == FetchOptions::Mode::Navigate) {
simon.fraser@apple.com90e96252018-07-09 23:54:18 +0000173 loadRequest(WTFMove(request), SecurityCheckPolicy::DoSecurityCheck);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000174 return;
175 }
176
commit-queue@webkit.org449ca6b2016-07-21 06:12:13 +0000177 if (m_options.mode == FetchOptions::Mode::SameOrigin) {
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000178 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, request.url(), "Cross origin requests are not allowed when using same-origin fetch mode."));
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000179 return;
180 }
bbudge@chromium.orga5963922012-03-27 07:38:47 +0000181
commit-queue@webkit.org9b579572016-08-01 07:02:35 +0000182 makeCrossOriginAccessRequest(WTFMove(request));
bbudge@chromium.org79360d92012-04-03 08:45:26 +0000183}
184
youenn@apple.comc37e6222018-04-27 18:10:18 +0000185bool DocumentThreadableLoader::checkURLSchemeAsCORSEnabled(const URL& url)
186{
187 // Cross-origin requests are only allowed for HTTP and registered schemes. We would catch this when checking response headers later, but there is no reason to send a request that's guaranteed to be denied.
achristensen@apple.comd40fd882019-10-04 19:30:08 +0000188 if (!LegacySchemeRegistry::shouldTreatURLSchemeAsCORSEnabled(url.protocol().toStringWithoutCopying())) {
youenn@apple.comc37e6222018-04-27 18:10:18 +0000189 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, url, "Cross origin requests are only supported for HTTP.", ResourceError::Type::AccessControl));
190 return false;
191 }
192 return true;
193}
194
commit-queue@webkit.org9b579572016-08-01 07:02:35 +0000195void DocumentThreadableLoader::makeCrossOriginAccessRequest(ResourceRequest&& request)
bbudge@chromium.org79360d92012-04-03 08:45:26 +0000196{
commit-queue@webkit.org449ca6b2016-07-21 06:12:13 +0000197 ASSERT(m_options.mode == FetchOptions::Mode::Cors);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000198
ap@apple.com1e8475922018-10-18 21:38:50 +0000199#if PLATFORM(IOS_FAMILY)
achristensen@apple.com84fc9522018-08-01 03:57:07 +0000200 bool needsPreflightQuirk = IOSApplication::isMoviStarPlus() && applicationSDKVersion() < DYLD_IOS_VERSION_12_0 && (m_options.preflightPolicy == PreflightPolicy::Consider || m_options.preflightPolicy == PreflightPolicy::Force);
201#else
202 bool needsPreflightQuirk = false;
203#endif
204
205 if ((m_options.preflightPolicy == PreflightPolicy::Consider && isSimpleCrossOriginAccessRequest(request.httpMethod(), request.httpHeaderFields())) || m_options.preflightPolicy == PreflightPolicy::Prevent || (shouldPerformSecurityChecks() && !needsPreflightQuirk)) {
youenn@apple.comc37e6222018-04-27 18:10:18 +0000206 if (checkURLSchemeAsCORSEnabled(request.url()))
207 makeSimpleCrossOriginAccessRequest(WTFMove(request));
208 } else {
commit-queue@webkit.org8a6ce4a2017-11-03 23:09:28 +0000209#if ENABLE(SERVICE_WORKER)
210 if (m_options.serviceWorkersMode == ServiceWorkersMode::All && m_async) {
commit-queue@webkit.org3e869332018-01-12 19:43:35 +0000211 if (m_options.serviceWorkerRegistrationIdentifier || document().activeServiceWorker()) {
commit-queue@webkit.org8a6ce4a2017-11-03 23:09:28 +0000212 ASSERT(!m_bypassingPreflightForServiceWorkerRequest);
213 m_bypassingPreflightForServiceWorkerRequest = WTFMove(request);
214 m_options.serviceWorkersMode = ServiceWorkersMode::Only;
simon.fraser@apple.com90e96252018-07-09 23:54:18 +0000215 loadRequest(ResourceRequest { m_bypassingPreflightForServiceWorkerRequest.value() }, SecurityCheckPolicy::SkipSecurityCheck);
commit-queue@webkit.org8a6ce4a2017-11-03 23:09:28 +0000216 return;
217 }
218 }
219#endif
achristensen@apple.com84fc9522018-08-01 03:57:07 +0000220 if (!needsPreflightQuirk && !checkURLSchemeAsCORSEnabled(request.url()))
youenn@apple.comc37e6222018-04-27 18:10:18 +0000221 return;
222
bbudge@chromium.orga5963922012-03-27 07:38:47 +0000223 m_simpleRequest = false;
cdumez@apple.com22964df2017-09-25 21:17:43 +0000224 if (CrossOriginPreflightResultCache::singleton().canSkipPreflight(securityOrigin().toString(), request.url(), m_options.storedCredentialsPolicy, request.httpMethod(), request.httpHeaderFields()))
commit-queue@webkit.org9b579572016-08-01 07:02:35 +0000225 preflightSuccess(WTFMove(request));
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000226 else
commit-queue@webkit.org9b579572016-08-01 07:02:35 +0000227 makeCrossOriginAccessRequestWithPreflight(WTFMove(request));
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000228 }
229}
230
commit-queue@webkit.org9b579572016-08-01 07:02:35 +0000231void DocumentThreadableLoader::makeSimpleCrossOriginAccessRequest(ResourceRequest&& request)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000232{
dbates@webkit.org2d7873d2018-05-11 05:34:20 +0000233 ASSERT(m_options.preflightPolicy != PreflightPolicy::Force || shouldPerformSecurityChecks());
234 ASSERT(m_options.preflightPolicy == PreflightPolicy::Prevent || isSimpleCrossOriginAccessRequest(request.httpMethod(), request.httpHeaderFields()) || shouldPerformSecurityChecks());
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000235
cdumez@apple.com22964df2017-09-25 21:17:43 +0000236 updateRequestForAccessControl(request, securityOrigin(), m_options.storedCredentialsPolicy);
simon.fraser@apple.com90e96252018-07-09 23:54:18 +0000237 loadRequest(WTFMove(request), SecurityCheckPolicy::DoSecurityCheck);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000238}
239
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000240void DocumentThreadableLoader::makeCrossOriginAccessRequestWithPreflight(ResourceRequest&& request)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000241{
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000242 if (m_async) {
utatane.tea@gmail.com43926962016-11-27 06:08:16 +0000243 m_preflightChecker.emplace(*this, WTFMove(request));
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000244 m_preflightChecker->startPreflight();
245 return;
246 }
247 CrossOriginPreflightChecker::doPreflight(*this, WTFMove(request));
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000248}
249
250DocumentThreadableLoader::~DocumentThreadableLoader()
251{
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000252 if (m_resource)
commit-queue@webkit.org0396ac02016-10-06 16:53:58 +0000253 m_resource->removeClient(*this);
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000254}
255
256void DocumentThreadableLoader::cancel()
257{
beidson@apple.com7bd3d3b2016-05-13 23:42:17 +0000258 Ref<DocumentThreadableLoader> protectedThis(*this);
japhet@chromium.orge7a4ca72012-07-03 21:37:28 +0000259
260 // Cancel can re-enter and m_resource might be null here as a result.
japhet@chromium.orga1c96322012-06-20 18:42:51 +0000261 if (m_client && m_resource) {
ap@apple.com5828b842013-02-15 00:27:57 +0000262 // FIXME: This error is sent to the client in didFail(), so it should not be an internal one. Use FrameLoaderClient::cancelledError() instead.
youenn.fablet@crf.canon.fr156f9bb2016-06-09 06:55:26 +0000263 ResourceError error(errorDomainWebKitInternal, 0, m_resource->url(), "Load cancelled", ResourceError::Type::Cancellation);
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000264 m_client->didFail(error);
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000265 }
266 clearResource();
hs85.jeong@samsung.com13179142015-10-21 02:12:32 +0000267 m_client = nullptr;
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000268}
269
commit-queue@webkit.org7c4021c2011-02-17 04:11:38 +0000270void DocumentThreadableLoader::setDefersLoading(bool value)
271{
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000272 if (m_resource)
273 m_resource->setDefersLoading(value);
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000274 if (m_preflightChecker)
275 m_preflightChecker->setDefersLoading(value);
commit-queue@webkit.org7c4021c2011-02-17 04:11:38 +0000276}
277
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000278void DocumentThreadableLoader::clearResource()
279{
japhet@chromium.orga1c96322012-06-20 18:42:51 +0000280 // Script can cancel and restart a request reentrantly within removeClient(),
281 // which could lead to calling CachedResource::removeClient() multiple times for
282 // this DocumentThreadableLoader. Save off a copy of m_resource and clear it to
283 // prevent the reentrancy.
284 if (CachedResourceHandle<CachedRawResource> resource = m_resource) {
hs85.jeong@samsung.com13179142015-10-21 02:12:32 +0000285 m_resource = nullptr;
commit-queue@webkit.org0396ac02016-10-06 16:53:58 +0000286 resource->removeClient(*this);
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000287 }
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000288 if (m_preflightChecker)
cdumez@apple.com8b7a0222018-12-20 04:41:11 +0000289 m_preflightChecker = WTF::nullopt;
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000290}
291
achristensen@apple.com858fb9c2017-11-10 19:23:13 +0000292void DocumentThreadableLoader::redirectReceived(CachedResource& resource, ResourceRequest&& request, const ResourceResponse& redirectResponse, CompletionHandler<void(ResourceRequest&&)>&& completionHandler)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000293{
294 ASSERT(m_client);
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000295 ASSERT_UNUSED(resource, &resource == m_resource);
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000296
beidson@apple.com7bd3d3b2016-05-13 23:42:17 +0000297 Ref<DocumentThreadableLoader> protectedThis(*this);
commit-queue@webkit.org0958d332017-05-26 17:08:30 +0000298 --m_options.maxRedirectCount;
commit-queue@webkit.orge2e5fd42016-10-06 10:00:28 +0000299
300 // FIXME: We restrict this check to Fetch API for the moment, as this might disrupt WorkerScriptLoader.
301 // Reassess this check based on https://github.com/whatwg/fetch/issues/393 discussions.
302 // We should also disable that check in navigation mode.
303 if (!request.url().protocolIsInHTTPFamily() && m_options.initiator == cachedResourceRequestInitiators().fetch) {
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000304 reportRedirectionWithBadScheme(request.url());
commit-queue@webkit.orge2e5fd42016-10-06 10:00:28 +0000305 clearResource();
achristensen@apple.com858fb9c2017-11-10 19:23:13 +0000306 return completionHandler(WTFMove(request));
commit-queue@webkit.orge2e5fd42016-10-06 10:00:28 +0000307 }
308
dbates@webkit.orgae77ef42018-05-21 23:15:11 +0000309 if (platformStrategies()->loaderStrategy()->havePerformedSecurityChecks(redirectResponse)) {
310 completionHandler(WTFMove(request));
311 return;
312 }
313
commit-queue@webkit.org03af1952016-09-22 08:28:37 +0000314 if (!isAllowedByContentSecurityPolicy(request.url(), redirectResponse.isNull() ? ContentSecurityPolicy::RedirectResponseReceived::No : ContentSecurityPolicy::RedirectResponseReceived::Yes)) {
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000315 reportContentSecurityPolicyError(redirectResponse.url());
commit-queue@webkit.org72abba72016-09-06 16:03:39 +0000316 clearResource();
achristensen@apple.com858fb9c2017-11-10 19:23:13 +0000317 return completionHandler(WTFMove(request));
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000318 }
319
bbudge@chromium.org79360d92012-04-03 08:45:26 +0000320 // Allow same origin requests to continue after allowing clients to audit the redirect.
ryuan.choi@samsung.comea0c44652014-05-28 11:43:11 +0000321 if (isAllowedRedirect(request.url()))
achristensen@apple.com858fb9c2017-11-10 19:23:13 +0000322 return completionHandler(WTFMove(request));
bbudge@chromium.org79360d92012-04-03 08:45:26 +0000323
commit-queue@webkit.org9df46b92016-08-04 07:56:37 +0000324 // Force any subsequent request to use these checks.
325 m_sameOriginRequest = false;
bbudge@chromium.orga5963922012-03-27 07:38:47 +0000326
commit-queue@webkit.org9df46b92016-08-04 07:56:37 +0000327 ASSERT(m_resource);
commit-queue@webkit.orga23e2892016-08-23 10:18:38 +0000328 ASSERT(m_originalHeaders);
bbudge@chromium.org79360d92012-04-03 08:45:26 +0000329
cdumez@apple.comfc984762017-05-25 20:53:49 +0000330 // Use a unique for subsequent loads if needed.
331 // https://fetch.spec.whatwg.org/#concept-http-redirect-fetch (Step 10).
332 ASSERT(m_options.mode == FetchOptions::Mode::Cors);
commit-queue@webkit.org0958d332017-05-26 17:08:30 +0000333 if (!securityOrigin().canRequest(redirectResponse.url()) && !protocolHostAndPortAreEqual(redirectResponse.url(), request.url()))
cdumez@apple.comfc984762017-05-25 20:53:49 +0000334 m_origin = SecurityOrigin::createUnique();
commit-queue@webkit.org9df46b92016-08-04 07:56:37 +0000335
336 // Except in case where preflight is needed, loading should be able to continue on its own.
337 // But we also handle credentials here if it is restricted to SameOrigin.
commit-queue@webkit.orga23e2892016-08-23 10:18:38 +0000338 if (m_options.credentials != FetchOptions::Credentials::SameOrigin && m_simpleRequest && isSimpleCrossOriginAccessRequest(request.httpMethod(), *m_originalHeaders))
achristensen@apple.com858fb9c2017-11-10 19:23:13 +0000339 return completionHandler(WTFMove(request));
commit-queue@webkit.org9df46b92016-08-04 07:56:37 +0000340
youenn@apple.com42c49b22018-03-23 18:06:34 +0000341 if (m_options.credentials == FetchOptions::Credentials::SameOrigin)
342 m_options.storedCredentialsPolicy = StoredCredentialsPolicy::DoNotUse;
commit-queue@webkit.org9df46b92016-08-04 07:56:37 +0000343
344 clearResource();
345
youenn@apple.com727d8672018-07-11 02:50:58 +0000346 m_referrer = request.httpReferrer();
347 if (m_referrer.isNull())
348 m_options.referrerPolicy = ReferrerPolicy::NoReferrer;
349
commit-queue@webkit.org1a5288b2016-08-21 13:36:48 +0000350 // Let's fetch the request with the original headers (equivalent to request cloning specified by fetch algorithm).
351 // Do not copy the Authorization header if removed by the network layer.
352 if (!request.httpHeaderFields().contains(HTTPHeaderName::Authorization))
353 m_originalHeaders->remove(HTTPHeaderName::Authorization);
354 request.setHTTPHeaderFields(*m_originalHeaders);
355
commit-queue@webkit.orgd1a81bd2018-01-25 21:27:32 +0000356#if ENABLE(SERVICE_WORKER)
357 if (redirectResponse.source() != ResourceResponse::Source::ServiceWorker && redirectResponse.source() != ResourceResponse::Source::MemoryCache)
358 m_options.serviceWorkersMode = ServiceWorkersMode::None;
359#endif
commit-queue@webkit.org9df46b92016-08-04 07:56:37 +0000360 makeCrossOriginAccessRequest(ResourceRequest(request));
achristensen@apple.com858fb9c2017-11-10 19:23:13 +0000361 completionHandler(WTFMove(request));
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000362}
363
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000364void DocumentThreadableLoader::dataSent(CachedResource& resource, unsigned long long bytesSent, unsigned long long totalBytesToBeSent)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000365{
366 ASSERT(m_client);
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000367 ASSERT_UNUSED(resource, &resource == m_resource);
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000368 m_client->didSendData(bytesSent, totalBytesToBeSent);
369}
370
cdumez@apple.com20771b92018-03-16 18:33:48 +0000371void DocumentThreadableLoader::responseReceived(CachedResource& resource, const ResourceResponse& response, CompletionHandler<void()>&& completionHandler)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000372{
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000373 ASSERT_UNUSED(resource, &resource == m_resource);
commit-queue@webkit.orgd1c8b432017-08-05 22:11:28 +0000374 didReceiveResponse(m_resource->identifier(), response);
cdumez@apple.com20771b92018-03-16 18:33:48 +0000375
376 if (completionHandler)
377 completionHandler();
pfeldman@chromium.orgc2baad02011-06-16 16:53:03 +0000378}
379
commit-queue@webkit.orgd1c8b432017-08-05 22:11:28 +0000380void DocumentThreadableLoader::didReceiveResponse(unsigned long identifier, const ResourceResponse& response)
pfeldman@chromium.orgc2baad02011-06-16 16:53:03 +0000381{
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000382 ASSERT(m_client);
commit-queue@webkit.org619ae672017-01-09 18:26:58 +0000383 ASSERT(response.type() != ResourceResponse::Type::Error);
ap@webkit.orgd43a99282009-04-14 08:11:42 +0000384
joepeck@webkit.org5e45a192016-12-09 22:12:08 +0000385 InspectorInstrumentation::didReceiveThreadableLoaderResponse(*this, identifier);
386
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000387 if (m_delayCallbacksForIntegrityCheck)
388 return;
389
commit-queue@webkit.org619ae672017-01-09 18:26:58 +0000390 if (options().filteringPolicy == ResponseFilteringPolicy::Disable) {
391 m_client->didReceiveResponse(identifier, response);
392 return;
393 }
394
commit-queue@webkit.org7965ee72016-08-27 20:47:35 +0000395 if (response.type() == ResourceResponse::Type::Default) {
commit-queue@webkit.orgd1c8b432017-08-05 22:11:28 +0000396 m_client->didReceiveResponse(identifier, ResourceResponseBase::filter(response));
397 if (response.tainting() == ResourceResponse::Tainting::Opaque) {
commit-queue@webkit.org7965ee72016-08-27 20:47:35 +0000398 clearResource();
399 if (m_client)
joepeck@webkit.orgff39b7b2017-02-25 05:48:51 +0000400 m_client->didFinishLoading(identifier);
commit-queue@webkit.org7965ee72016-08-27 20:47:35 +0000401 }
commit-queue@webkit.org5101c2b2017-11-14 23:25:28 +0000402 return;
commit-queue@webkit.org53223502016-07-28 08:30:14 +0000403 }
commit-queue@webkit.org8dcc61f2018-01-24 18:08:02 +0000404 ASSERT(response.type() == ResourceResponse::Type::Opaqueredirect || response.source() == ResourceResponse::Source::ServiceWorker || response.source() == ResourceResponse::Source::MemoryCache);
commit-queue@webkit.org5101c2b2017-11-14 23:25:28 +0000405 m_client->didReceiveResponse(identifier, response);
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000406}
407
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000408void DocumentThreadableLoader::dataReceived(CachedResource& resource, const char* data, int dataLength)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000409{
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000410 ASSERT_UNUSED(resource, &resource == m_resource);
ap@apple.com5828b842013-02-15 00:27:57 +0000411 didReceiveData(m_resource->identifier(), data, dataLength);
412}
ap@webkit.orgd43a99282009-04-14 08:11:42 +0000413
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000414void DocumentThreadableLoader::didReceiveData(unsigned long, const char* data, int dataLength)
ap@apple.com5828b842013-02-15 00:27:57 +0000415{
416 ASSERT(m_client);
vsevik@chromium.org84ef3092011-07-03 15:58:38 +0000417
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000418 if (m_delayCallbacksForIntegrityCheck)
419 return;
420
commit-queue@webkit.org9f623592011-04-19 16:56:17 +0000421 m_client->didReceiveData(data, dataLength);
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000422}
423
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000424void DocumentThreadableLoader::finishedTimingForWorkerLoad(CachedResource& resource, const ResourceTiming& resourceTiming)
425{
426 ASSERT(m_client);
427 ASSERT_UNUSED(resource, &resource == m_resource);
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000428
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000429 finishedTimingForWorkerLoad(resourceTiming);
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000430}
431
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000432void DocumentThreadableLoader::finishedTimingForWorkerLoad(const ResourceTiming& resourceTiming)
433{
434 ASSERT(m_options.initiatorContext == InitiatorContext::Worker);
435
436 m_client->didFinishTiming(resourceTiming);
437}
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000438
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000439void DocumentThreadableLoader::notifyFinished(CachedResource& resource)
commit-queue@webkit.org7c4021c2011-02-17 04:11:38 +0000440{
441 ASSERT(m_client);
commit-queue@webkit.org4c0caf32016-10-07 07:02:02 +0000442 ASSERT_UNUSED(resource, &resource == m_resource);
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000443
ap@apple.com5828b842013-02-15 00:27:57 +0000444 if (m_resource->errorOccurred())
445 didFail(m_resource->identifier(), m_resource->resourceError());
japhet@chromium.orga6364212012-11-01 06:20:00 +0000446 else
joepeck@webkit.orgff39b7b2017-02-25 05:48:51 +0000447 didFinishLoading(m_resource->identifier());
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000448}
449
joepeck@webkit.orgff39b7b2017-02-25 05:48:51 +0000450void DocumentThreadableLoader::didFinishLoading(unsigned long identifier)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000451{
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000452 ASSERT(m_client);
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000453
454 if (m_delayCallbacksForIntegrityCheck) {
455 if (!matchIntegrityMetadata(*m_resource, m_options.integrity)) {
commit-queue@webkit.orgfd264c22019-10-25 05:05:54 +0000456 reportIntegrityMetadataError(*m_resource, m_options.integrity);
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000457 return;
458 }
459
460 auto response = m_resource->response();
461
462 if (options().filteringPolicy == ResponseFilteringPolicy::Disable) {
463 m_client->didReceiveResponse(identifier, response);
commit-queue@webkit.org95b4cad2018-08-07 23:26:48 +0000464 if (m_resource->resourceBuffer())
465 m_client->didReceiveData(m_resource->resourceBuffer()->data(), m_resource->resourceBuffer()->size());
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000466 } else {
467 ASSERT(response.type() == ResourceResponse::Type::Default);
commit-queue@webkit.orgd1c8b432017-08-05 22:11:28 +0000468
469 m_client->didReceiveResponse(identifier, ResourceResponseBase::filter(response));
commit-queue@webkit.org95b4cad2018-08-07 23:26:48 +0000470 if (m_resource->resourceBuffer())
471 m_client->didReceiveData(m_resource->resourceBuffer()->data(), m_resource->resourceBuffer()->size());
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000472 }
473 }
474
joepeck@webkit.orgff39b7b2017-02-25 05:48:51 +0000475 m_client->didFinishLoading(identifier);
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000476}
477
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000478void DocumentThreadableLoader::didFail(unsigned long, const ResourceError& error)
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000479{
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000480 ASSERT(m_client);
commit-queue@webkit.org8a6ce4a2017-11-03 23:09:28 +0000481#if ENABLE(SERVICE_WORKER)
commit-queue@webkit.orgd070d6d2017-12-08 22:45:21 +0000482 if (m_bypassingPreflightForServiceWorkerRequest && error.isCancellation()) {
commit-queue@webkit.org6974fbf2017-12-06 20:51:59 +0000483 clearResource();
484
commit-queue@webkit.org8a6ce4a2017-11-03 23:09:28 +0000485 m_options.serviceWorkersMode = ServiceWorkersMode::None;
commit-queue@webkit.org6974fbf2017-12-06 20:51:59 +0000486 makeCrossOriginAccessRequestWithPreflight(WTFMove(m_bypassingPreflightForServiceWorkerRequest.value()));
commit-queue@webkit.orgee144152017-12-07 23:30:33 +0000487 ASSERT(m_bypassingPreflightForServiceWorkerRequest->isNull());
cdumez@apple.com8b7a0222018-12-20 04:41:11 +0000488 m_bypassingPreflightForServiceWorkerRequest = WTF::nullopt;
commit-queue@webkit.org8a6ce4a2017-11-03 23:09:28 +0000489 return;
490 }
491#endif
youenn@apple.comc37e6222018-04-27 18:10:18 +0000492
youenn@apple.com36b74c32018-04-25 17:57:56 +0000493 if (m_shouldLogError == ShouldLogError::Yes)
494 logError(m_document, error, m_options.initiator);
495
496 m_client->didFail(error);
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000497}
498
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000499void DocumentThreadableLoader::preflightSuccess(ResourceRequest&& request)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000500{
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000501 ResourceRequest actualRequest(WTFMove(request));
cdumez@apple.com22964df2017-09-25 21:17:43 +0000502 updateRequestForAccessControl(actualRequest, securityOrigin(), m_options.storedCredentialsPolicy);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000503
cdumez@apple.com8b7a0222018-12-20 04:41:11 +0000504 m_preflightChecker = WTF::nullopt;
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000505
japhet@chromium.orga330a3e2009-12-15 23:02:11 +0000506 // It should be ok to skip the security check since we already asked about the preflight request.
simon.fraser@apple.com90e96252018-07-09 23:54:18 +0000507 loadRequest(WTFMove(actualRequest), SecurityCheckPolicy::SkipSecurityCheck);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000508}
509
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000510void DocumentThreadableLoader::preflightFailure(unsigned long identifier, const ResourceError& error)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000511{
cdumez@apple.com8b7a0222018-12-20 04:41:11 +0000512 m_preflightChecker = WTF::nullopt;
burg@cs.washington.edudbacfc12015-01-05 21:30:33 +0000513
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000514 InspectorInstrumentation::didFailLoading(m_document.frame(), m_document.frame()->loader().documentLoader(), identifier, error);
youenn@apple.com36b74c32018-04-25 17:57:56 +0000515
516 if (m_shouldLogError == ShouldLogError::Yes)
517 logError(m_document, error, m_options.initiator);
518
519 m_client->didFail(error);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000520}
521
commit-queue@webkit.org9b579572016-08-01 07:02:35 +0000522void DocumentThreadableLoader::loadRequest(ResourceRequest&& request, SecurityCheckPolicy securityCheck)
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000523{
beidson@apple.com2b846a42017-02-14 23:26:38 +0000524 Ref<DocumentThreadableLoader> protectedThis(*this);
525
jchaffraix@webkit.org5ace1592010-04-28 16:29:22 +0000526 // Any credential should have been removed from the cross-site requests.
darin@apple.com5ffbb5c2013-09-27 16:39:41 +0000527 const URL& requestURL = request.url();
commit-queue@webkit.org877e1492016-08-02 06:46:57 +0000528 m_options.securityCheck = securityCheck;
jchaffraix@webkit.org5ace1592010-04-28 16:29:22 +0000529 ASSERT(m_sameOriginRequest || requestURL.user().isEmpty());
530 ASSERT(m_sameOriginRequest || requestURL.pass().isEmpty());
531
commit-queue@webkit.orgf89b11d2016-08-02 07:20:23 +0000532 if (!m_referrer.isNull())
533 request.setHTTPReferrer(m_referrer);
534
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000535 if (m_async) {
commit-queue@webkit.org7bf75362016-09-21 08:43:23 +0000536 ResourceLoaderOptions options = m_options;
commit-queue@webkit.orgba1c71b2016-07-26 16:23:09 +0000537 options.clientCredentialPolicy = m_sameOriginRequest ? ClientCredentialPolicy::MayAskClientForCredentials : ClientCredentialPolicy::CannotAskClientForCredentials;
commit-queue@webkit.org7bf75362016-09-21 08:43:23 +0000538 options.contentSecurityPolicyImposition = ContentSecurityPolicyImposition::SkipPolicyCheck;
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000539
540 // If there is integrity metadata to validate, we must buffer.
541 if (!m_options.integrity.isEmpty())
simon.fraser@apple.com90e96252018-07-09 23:54:18 +0000542 options.dataBufferingPolicy = DataBufferingPolicy::BufferData;
levin@chromium.org1e06d8b2009-08-26 03:02:16 +0000543
cdumez@apple.com22964df2017-09-25 21:17:43 +0000544 request.setAllowCookies(m_options.storedCredentialsPolicy == StoredCredentialsPolicy::Use);
commit-queue@webkit.org9b579572016-08-01 07:02:35 +0000545 CachedResourceRequest newRequest(WTFMove(request), options);
yoav@yoav.ws4ea6dc82016-05-02 08:21:50 +0000546 if (RuntimeEnabledFeatures::sharedFeatures().resourceTimingEnabled())
547 newRequest.setInitiator(m_options.initiator);
akling@apple.com6be0e972017-01-18 19:35:49 +0000548 newRequest.setOrigin(securityOrigin());
commit-queue@webkit.orgbfb64e22016-07-29 14:12:03 +0000549
japhet@chromium.org43f85fe2011-10-25 19:50:25 +0000550 ASSERT(!m_resource);
beidson@apple.com2b846a42017-02-14 23:26:38 +0000551 if (m_resource) {
552 CachedResourceHandle<CachedRawResource> resource = std::exchange(m_resource, nullptr);
553 resource->removeClient(*this);
554 }
555
cdumez@apple.comd038ecf2017-08-15 21:15:09 +0000556 auto cachedResource = m_document.cachedResourceLoader().requestRawResource(WTFMove(newRequest));
jfbastien@apple.combcea9872017-12-04 23:34:57 +0000557 m_resource = cachedResource.value_or(nullptr);
yoav@yoav.ws1e8ae3a2016-05-26 05:33:58 +0000558 if (m_resource)
commit-queue@webkit.org0396ac02016-10-06 16:53:58 +0000559 m_resource->addClient(*this);
cdumez@apple.comd038ecf2017-08-15 21:15:09 +0000560 else
561 logErrorAndFail(cachedResource.error());
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000562 return;
563 }
youenn.fablet@crf.canon.frbba97932016-06-10 13:26:30 +0000564
commit-queue@webkit.orgbfb64e22016-07-29 14:12:03 +0000565 // If credentials mode is 'Omit', we should disable cookie sending.
566 ASSERT(m_options.credentials != FetchOptions::Credentials::Omit);
567
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000568 LoadTiming loadTiming;
569 loadTiming.markStartTimeAndFetchStart();
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000570
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000571 // FIXME: ThreadableLoaderOptions.sniffContent is not supported for synchronous requests.
youenn.fablet@crf.canon.fr0aef67f2015-04-29 08:18:10 +0000572 RefPtr<SharedBuffer> data;
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000573 ResourceError error;
574 ResourceResponse response;
575 unsigned long identifier = std::numeric_limits<unsigned long>::max();
wilander@apple.combcbaaca2016-07-22 00:44:27 +0000576 if (m_document.frame()) {
577 auto& frameLoader = m_document.frame()->loader();
578 if (!frameLoader.mixedContentChecker().canRunInsecureContent(m_document.securityOrigin(), requestURL))
579 return;
youenn@apple.comb9709cc2018-04-16 21:50:26 +0000580 identifier = frameLoader.loadResourceSynchronously(request, m_options.clientCredentialPolicy, m_options, *m_originalHeaders, error, response, data);
wilander@apple.combcbaaca2016-07-22 00:44:27 +0000581 }
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000582
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000583 loadTiming.setResponseEnd(MonotonicTime::now());
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000584
mmaxfield@apple.com46278cb2014-05-23 03:59:11 +0000585 if (!error.isNull() && response.httpStatusCode() <= 0) {
586 if (requestURL.isLocalFile()) {
587 // We don't want XMLHttpRequest to raise an exception for file:// resources, see <rdar://problem/4962298>.
588 // FIXME: XMLHttpRequest quirks should be in XMLHttpRequest code, not in DocumentThreadableLoader.cpp.
commit-queue@webkit.orgd1c8b432017-08-05 22:11:28 +0000589 didReceiveResponse(identifier, response);
joepeck@webkit.orgff39b7b2017-02-25 05:48:51 +0000590 didFinishLoading(identifier);
mmaxfield@apple.com46278cb2014-05-23 03:59:11 +0000591 return;
592 }
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000593 logErrorAndFail(error);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000594 return;
595 }
596
dbates@webkit.org2d7873d2018-05-11 05:34:20 +0000597 if (!shouldPerformSecurityChecks()) {
youenn@apple.comb9709cc2018-04-16 21:50:26 +0000598 // FIXME: FrameLoader::loadSynchronously() does not tell us whether a redirect happened or not, so we guess by comparing the
599 // request and response URLs. This isn't a perfect test though, since a server can serve a redirect to the same URL that was
600 // requested. Also comparing the request and response URLs as strings will fail if the requestURL still has its credentials.
601 bool didRedirect = requestURL != response.url();
602 if (didRedirect) {
603 if (!isAllowedByContentSecurityPolicy(response.url(), ContentSecurityPolicy::RedirectResponseReceived::Yes)) {
604 reportContentSecurityPolicyError(requestURL);
commit-queue@webkit.org0c8dff42016-09-06 11:06:52 +0000605 return;
606 }
youenn@apple.comb9709cc2018-04-16 21:50:26 +0000607 if (!isAllowedRedirect(response.url())) {
608 reportCrossOriginResourceSharingError(requestURL);
609 return;
610 }
611 }
612
613 if (!m_sameOriginRequest) {
614 if (m_options.mode == FetchOptions::Mode::NoCors)
615 response.setTainting(ResourceResponse::Tainting::Opaque);
616 else {
617 ASSERT(m_options.mode == FetchOptions::Mode::Cors);
618 response.setTainting(ResourceResponse::Tainting::Cors);
619 String accessControlErrorDescription;
620 if (!passesAccessControlCheck(response, m_options.storedCredentialsPolicy, securityOrigin(), accessControlErrorDescription)) {
621 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, response.url(), accessControlErrorDescription, ResourceError::Type::AccessControl));
622 return;
623 }
624 }
commit-queue@webkit.org0c8dff42016-09-06 11:06:52 +0000625 }
626 }
commit-queue@webkit.orgd1c8b432017-08-05 22:11:28 +0000627 didReceiveResponse(identifier, response);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000628
youenn.fablet@crf.canon.fr0aef67f2015-04-29 08:18:10 +0000629 if (data)
630 didReceiveData(identifier, data->data(), data->size());
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000631
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000632 if (RuntimeEnabledFeatures::sharedFeatures().resourceTimingEnabled()) {
commit-queue@webkit.orgd8ebc6a2017-05-02 01:16:26 +0000633 auto resourceTiming = ResourceTiming::fromSynchronousLoad(requestURL, m_options.initiator, loadTiming, response.deprecatedNetworkLoadMetrics(), response, securityOrigin());
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000634 if (options().initiatorContext == InitiatorContext::Worker)
635 finishedTimingForWorkerLoad(resourceTiming);
636 else {
cdumez@apple.com6ad592b2018-10-17 18:11:18 +0000637 if (auto* window = document().domWindow())
638 window->performance().addResourceTiming(WTFMove(resourceTiming));
bburg@apple.com2e0ba232017-07-26 18:40:50 +0000639 }
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000640 }
joepeck@webkit.org301376e2017-02-16 19:18:32 +0000641
joepeck@webkit.orgff39b7b2017-02-25 05:48:51 +0000642 didFinishLoading(identifier);
eric@webkit.orgfba1b6b2009-08-14 19:25:37 +0000643}
644
commit-queue@webkit.org03af1952016-09-22 08:28:37 +0000645bool DocumentThreadableLoader::isAllowedByContentSecurityPolicy(const URL& url, ContentSecurityPolicy::RedirectResponseReceived redirectResponseReceived)
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000646{
647 switch (m_options.contentSecurityPolicyEnforcement) {
648 case ContentSecurityPolicyEnforcement::DoNotEnforce:
649 return true;
dbates@webkit.org8c34a382016-02-13 00:18:40 +0000650 case ContentSecurityPolicyEnforcement::EnforceChildSrcDirective:
commit-queue@webkit.org03af1952016-09-22 08:28:37 +0000651 return contentSecurityPolicy().allowChildContextFromSource(url, redirectResponseReceived);
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000652 case ContentSecurityPolicyEnforcement::EnforceConnectSrcDirective:
commit-queue@webkit.org03af1952016-09-22 08:28:37 +0000653 return contentSecurityPolicy().allowConnectToSource(url, redirectResponseReceived);
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000654 case ContentSecurityPolicyEnforcement::EnforceScriptSrcDirective:
commit-queue@webkit.org03af1952016-09-22 08:28:37 +0000655 return contentSecurityPolicy().allowScriptFromSource(url, redirectResponseReceived);
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000656 }
657 ASSERT_NOT_REACHED();
658 return false;
659}
660
darin@apple.com5ffbb5c2013-09-27 16:39:41 +0000661bool DocumentThreadableLoader::isAllowedRedirect(const URL& url)
eric@webkit.org92721792009-08-17 20:43:57 +0000662{
commit-queue@webkit.org449ca6b2016-07-21 06:12:13 +0000663 if (m_options.mode == FetchOptions::Mode::NoCors)
eric@webkit.org92721792009-08-17 20:43:57 +0000664 return true;
665
commit-queue@webkit.org6827a7a2016-06-30 06:28:58 +0000666 return m_sameOriginRequest && securityOrigin().canRequest(url);
mihaip@chromium.org7ef8e032011-05-26 19:53:00 +0000667}
668
commit-queue@webkit.org6827a7a2016-06-30 06:28:58 +0000669SecurityOrigin& DocumentThreadableLoader::securityOrigin() const
mihaip@chromium.org7ef8e032011-05-26 19:53:00 +0000670{
akling@apple.com6be0e972017-01-18 19:35:49 +0000671 return m_origin ? *m_origin : m_document.securityOrigin();
eric@webkit.org92721792009-08-17 20:43:57 +0000672}
673
dbates@webkit.org25ec4da2016-02-09 01:26:56 +0000674const ContentSecurityPolicy& DocumentThreadableLoader::contentSecurityPolicy() const
675{
676 if (m_contentSecurityPolicy)
677 return *m_contentSecurityPolicy.get();
678 ASSERT(m_document.contentSecurityPolicy());
679 return *m_document.contentSecurityPolicy();
680}
681
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000682void DocumentThreadableLoader::reportRedirectionWithBadScheme(const URL& url)
683{
utatane.tea@gmail.com84077632018-06-23 08:39:34 +0000684 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, url, "Redirection to URL with a scheme that is not HTTP(S)."_s, ResourceError::Type::AccessControl));
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000685}
686
687void DocumentThreadableLoader::reportContentSecurityPolicyError(const URL& url)
688{
utatane.tea@gmail.com84077632018-06-23 08:39:34 +0000689 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, url, "Blocked by Content Security Policy."_s, ResourceError::Type::AccessControl));
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000690}
691
692void DocumentThreadableLoader::reportCrossOriginResourceSharingError(const URL& url)
693{
utatane.tea@gmail.com84077632018-06-23 08:39:34 +0000694 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, url, "Cross-origin redirection denied by Cross-Origin Resource Sharing policy."_s, ResourceError::Type::AccessControl));
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000695}
696
commit-queue@webkit.orgfd264c22019-10-25 05:05:54 +0000697void DocumentThreadableLoader::reportIntegrityMetadataError(const CachedResource& resource, const String& expectedMetadata)
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000698{
commit-queue@webkit.orgfd264c22019-10-25 05:05:54 +0000699 logErrorAndFail(ResourceError(errorDomainWebKitInternal, 0, resource.url(), makeString("Failed integrity metadata check. "_s, integrityMismatchDescription(resource, expectedMetadata)), ResourceError::Type::General));
weinig@apple.comb50adaa2017-05-09 22:53:13 +0000700}
701
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000702void DocumentThreadableLoader::logErrorAndFail(const ResourceError& error)
703{
youenn@apple.com36b74c32018-04-25 17:57:56 +0000704 if (m_shouldLogError == ShouldLogError::Yes) {
705 if (error.isAccessControl() && !error.localizedDescription().isEmpty())
706 m_document.addConsoleMessage(MessageSource::Security, MessageLevel::Error, error.localizedDescription());
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000707 logError(m_document, error, m_options.initiator);
youenn@apple.com36b74c32018-04-25 17:57:56 +0000708 }
commit-queue@webkit.org45376692016-12-16 11:51:16 +0000709 ASSERT(m_client);
710 m_client->didFail(error);
711}
712
oliver@apple.comee5b1dd2009-01-22 00:22:45 +0000713} // namespace WebCore