2 * Copyright (C) 2004, 2005, 2006, 2007, 2009 Apple Inc. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
13 * THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY
14 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
16 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
17 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
18 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
19 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
20 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
21 * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 #include "ResourceHandle.h"
31 #include "ResourceHandleClient.h"
32 #include "ResourceHandleInternal.h"
34 #include "AuthenticationCF.h"
35 #include "AuthenticationChallenge.h"
37 #include "CookieStorageCFNet.h"
38 #include "CredentialStorage.h"
39 #include "CachedResourceLoader.h"
40 #include "FormDataStreamCFNet.h"
42 #include "FrameLoader.h"
43 #include "LoaderRunLoopCF.h"
45 #include "MIMETypeRegistry.h"
46 #include "ResourceError.h"
47 #include "ResourceResponse.h"
48 #include "SharedBuffer.h"
49 #include <CFNetwork/CFNetwork.h>
50 #include <WebKitSystemInterface/WebKitSystemInterface.h>
51 #include <process.h> // for _beginthread()
53 #include <sys/types.h>
54 #include <wtf/HashMap.h>
55 #include <wtf/Threading.h>
56 #include <wtf/text/CString.h>
58 // FIXME: Remove this declaration once it's in WebKitSupportLibrary.
60 __declspec(dllimport) CFURLConnectionRef CFURLConnectionCreateWithProperties(
62 CFURLRequestRef request,
63 CFURLConnectionClient * client,
64 CFDictionaryRef properties);
69 static CFStringRef WebCoreSynchronousLoaderRunLoopMode = CFSTR("WebCoreSynchronousLoaderRunLoopMode");
71 class WebCoreSynchronousLoaderClient : public ResourceHandleClient {
73 static PassOwnPtr<WebCoreSynchronousLoaderClient> create(ResourceResponse& response, ResourceError& error)
75 return adoptPtr(new WebCoreSynchronousLoaderClient(response, error));
78 void setAllowStoredCredentials(bool allow) { m_allowStoredCredentials = allow; }
79 bool isDone() { return m_isDone; }
81 CFMutableDataRef data() { return m_data.get(); }
84 WebCoreSynchronousLoaderClient(ResourceResponse& response, ResourceError& error)
85 : m_allowStoredCredentials(false)
86 , m_response(response)
92 virtual void willSendRequest(ResourceHandle*, ResourceRequest&, const ResourceResponse& /*redirectResponse*/);
93 virtual bool shouldUseCredentialStorage(ResourceHandle*);
94 virtual void didReceiveAuthenticationChallenge(ResourceHandle*, const AuthenticationChallenge&);
95 virtual void didReceiveResponse(ResourceHandle*, const ResourceResponse&);
96 virtual void didReceiveData(ResourceHandle*, const char*, int, int /*encodedDataLength*/);
97 virtual void didFinishLoading(ResourceHandle*, double /*finishTime*/);
98 virtual void didFail(ResourceHandle*, const ResourceError&);
100 bool m_allowStoredCredentials;
101 ResourceResponse& m_response;
102 RetainPtr<CFMutableDataRef> m_data;
103 ResourceError& m_error;
107 static HashSet<String>& allowsAnyHTTPSCertificateHosts()
109 static HashSet<String> hosts;
114 static HashMap<String, RetainPtr<CFDataRef> >& clientCerts()
116 static HashMap<String, RetainPtr<CFDataRef> > certs;
120 static void setDefaultMIMEType(CFURLResponseRef response)
122 static CFStringRef defaultMIMETypeString = defaultMIMEType().createCFString();
124 CFURLResponseSetMIMEType(response, defaultMIMETypeString);
127 static String encodeBasicAuthorization(const String& user, const String& password)
129 return base64Encode((user + ":" + password).utf8());
132 CFURLRequestRef willSendRequest(CFURLConnectionRef conn, CFURLRequestRef cfRequest, CFURLResponseRef cfRedirectResponse, const void* clientInfo)
134 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
136 if (!cfRedirectResponse) {
141 LOG(Network, "CFNet - willSendRequest(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
143 ResourceRequest request;
144 if (cfRedirectResponse) {
145 CFHTTPMessageRef httpMessage = CFURLResponseGetHTTPResponse(cfRedirectResponse);
146 if (httpMessage && CFHTTPMessageGetResponseStatusCode(httpMessage) == 307) {
147 RetainPtr<CFStringRef> lastHTTPMethod(AdoptCF, handle->lastHTTPMethod().createCFString());
148 RetainPtr<CFStringRef> newMethod(AdoptCF, CFURLRequestCopyHTTPRequestMethod(cfRequest));
149 if (CFStringCompareWithOptions(lastHTTPMethod.get(), newMethod.get(), CFRangeMake(0, CFStringGetLength(lastHTTPMethod.get())), kCFCompareCaseInsensitive)) {
150 RetainPtr<CFMutableURLRequestRef> mutableRequest(AdoptCF, CFURLRequestCreateMutableCopy(0, cfRequest));
151 CFURLRequestSetHTTPRequestMethod(mutableRequest.get(), lastHTTPMethod.get());
153 FormData* body = handle->firstRequest().httpBody();
154 if (!equalIgnoringCase(handle->firstRequest().httpMethod(), "GET") && body && !body->isEmpty())
155 WebCore::setHTTPBody(mutableRequest.get(), body);
157 String originalContentType = handle->firstRequest().httpContentType();
158 RetainPtr<CFStringRef> originalContentTypeCF(AdoptCF, originalContentType.createCFString());
159 if (!originalContentType.isEmpty())
160 CFURLRequestSetHTTPHeaderFieldValue(mutableRequest.get(), CFSTR("Content-Type"), originalContentTypeCF.get());
162 request = mutableRequest.get();
166 if (request.isNull())
169 // Should not set Referer after a redirect from a secure resource to non-secure one.
170 if (!request.url().protocolIs("https") && protocolIs(request.httpReferrer(), "https"))
171 request.clearHTTPReferrer();
173 handle->willSendRequest(request, cfRedirectResponse);
175 if (request.isNull())
178 cfRequest = request.cfURLRequest();
184 void didReceiveResponse(CFURLConnectionRef conn, CFURLResponseRef cfResponse, const void* clientInfo)
186 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
188 LOG(Network, "CFNet - didReceiveResponse(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
190 if (!handle->client())
193 if (!CFURLResponseGetMIMEType(cfResponse)) {
194 // We should never be applying the default MIMEType if we told the networking layer to do content sniffing for handle.
195 ASSERT(!handle->shouldContentSniff());
196 setDefaultMIMEType(cfResponse);
199 handle->client()->didReceiveResponse(handle, cfResponse);
202 void didReceiveData(CFURLConnectionRef conn, CFDataRef data, CFIndex originalLength, const void* clientInfo)
204 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
205 const UInt8* bytes = CFDataGetBytePtr(data);
206 CFIndex length = CFDataGetLength(data);
208 LOG(Network, "CFNet - didReceiveData(conn=%p, handle=%p, bytes=%d) (%s)", conn, handle, length, handle->firstRequest().url().string().utf8().data());
210 if (handle->client())
211 handle->client()->didReceiveData(handle, (const char*)bytes, length, originalLength);
214 static void didSendBodyData(CFURLConnectionRef conn, CFIndex bytesWritten, CFIndex totalBytesWritten, CFIndex totalBytesExpectedToWrite, const void *clientInfo)
216 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
217 if (!handle || !handle->client())
219 handle->client()->didSendData(handle, totalBytesWritten, totalBytesExpectedToWrite);
222 static Boolean shouldUseCredentialStorageCallback(CFURLConnectionRef conn, const void* clientInfo)
224 ResourceHandle* handle = const_cast<ResourceHandle*>(static_cast<const ResourceHandle*>(clientInfo));
226 LOG(Network, "CFNet - shouldUseCredentialStorage(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
231 return handle->shouldUseCredentialStorage();
234 void didFinishLoading(CFURLConnectionRef conn, const void* clientInfo)
236 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
238 LOG(Network, "CFNet - didFinishLoading(conn=%p, handle=%p) (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
240 if (handle->client())
241 handle->client()->didFinishLoading(handle, 0);
244 void didFail(CFURLConnectionRef conn, CFErrorRef error, const void* clientInfo)
246 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
248 LOG(Network, "CFNet - didFail(conn=%p, handle=%p, error = %p) (%s)", conn, handle, error, handle->firstRequest().url().string().utf8().data());
250 if (handle->client())
251 handle->client()->didFail(handle, ResourceError(error));
254 static CFCachedURLResponseRef willCacheResponse(CFURLConnectionRef, CFCachedURLResponseRef cachedResponse, const void* clientInfo)
256 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
259 if (handle->client() && !handle->client()->shouldCacheResponse(handle, cachedResponse))
262 CFCachedURLResponseRef newResponse = handle->client()->willCacheResponse(handle, cachedResponse);
263 if (newResponse != cachedResponse)
267 CacheStoragePolicy policy = static_cast<CacheStoragePolicy>(CFCachedURLResponseGetStoragePolicy(cachedResponse));
269 if (handle->client())
270 handle->client()->willCacheResponse(handle, policy);
272 if (static_cast<CFURLCacheStoragePolicy>(policy) != CFCachedURLResponseGetStoragePolicy(cachedResponse))
273 cachedResponse = CFCachedURLResponseCreateWithUserInfo(kCFAllocatorDefault,
274 CFCachedURLResponseGetWrappedResponse(cachedResponse),
275 CFCachedURLResponseGetReceiverData(cachedResponse),
276 CFCachedURLResponseGetUserInfo(cachedResponse),
277 static_cast<CFURLCacheStoragePolicy>(policy));
278 CFRetain(cachedResponse);
280 return cachedResponse;
283 void didReceiveChallenge(CFURLConnectionRef conn, CFURLAuthChallengeRef challenge, const void* clientInfo)
285 ResourceHandle* handle = static_cast<ResourceHandle*>(const_cast<void*>(clientInfo));
287 LOG(Network, "CFNet - didReceiveChallenge(conn=%p, handle=%p (%s)", conn, handle, handle->firstRequest().url().string().utf8().data());
289 handle->didReceiveAuthenticationChallenge(AuthenticationChallenge(challenge, handle));
292 void addHeadersFromHashMap(CFMutableURLRequestRef request, const HTTPHeaderMap& requestHeaders)
294 if (!requestHeaders.size())
297 HTTPHeaderMap::const_iterator end = requestHeaders.end();
298 for (HTTPHeaderMap::const_iterator it = requestHeaders.begin(); it != end; ++it) {
299 CFStringRef key = it->first.createCFString();
300 CFStringRef value = it->second.createCFString();
301 CFURLRequestSetHTTPHeaderFieldValue(request, key, value);
307 ResourceHandleInternal::~ResourceHandleInternal()
310 LOG(Network, "CFNet - Cancelling connection %p (%s)", m_connection, m_firstRequest.url().string().utf8().data());
311 CFURLConnectionCancel(m_connection.get());
315 ResourceHandle::~ResourceHandle()
317 LOG(Network, "CFNet - Destroying job %p (%s)", this, d->m_firstRequest.url().string().utf8().data());
320 CFArrayRef arrayFromFormData(const FormData& d)
322 size_t size = d.elements().size();
323 CFMutableArrayRef a = CFArrayCreateMutable(0, d.elements().size(), &kCFTypeArrayCallBacks);
324 for (size_t i = 0; i < size; ++i) {
325 const FormDataElement& e = d.elements()[i];
326 if (e.m_type == FormDataElement::data) {
327 CFDataRef data = CFDataCreate(0, (const UInt8*)e.m_data.data(), e.m_data.size());
328 CFArrayAppendValue(a, data);
331 ASSERT(e.m_type == FormDataElement::encodedFile);
332 CFStringRef filename = e.m_filename.createCFString();
333 CFArrayAppendValue(a, filename);
340 static CFURLRequestRef makeFinalRequest(const ResourceRequest& request, bool shouldContentSniff)
342 CFMutableURLRequestRef newRequest = CFURLRequestCreateMutableCopy(kCFAllocatorDefault, request.cfURLRequest());
344 #if USE(CFURLSTORAGESESSIONS)
345 if (CFURLStorageSessionRef storageSession = ResourceHandle::privateBrowsingStorageSession())
346 wkSetRequestStorageSession(storageSession, newRequest);
349 if (!shouldContentSniff)
350 wkSetCFURLRequestShouldContentSniff(newRequest, false);
352 RetainPtr<CFMutableDictionaryRef> sslProps;
354 if (allowsAnyHTTPSCertificateHosts().contains(request.url().host().lower())) {
355 sslProps.adoptCF(CFDictionaryCreateMutable(kCFAllocatorDefault, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks));
356 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLAllowsAnyRoot, kCFBooleanTrue);
357 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLAllowsExpiredRoots, kCFBooleanTrue);
358 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLAllowsExpiredCertificates, kCFBooleanTrue);
359 CFDictionaryAddValue(sslProps.get(), kCFStreamSSLValidatesCertificateChain, kCFBooleanFalse);
362 HashMap<String, RetainPtr<CFDataRef> >::iterator clientCert = clientCerts().find(request.url().host().lower());
363 if (clientCert != clientCerts().end()) {
365 sslProps.adoptCF(CFDictionaryCreateMutable(kCFAllocatorDefault, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks));
366 wkSetClientCertificateInSSLProperties(sslProps.get(), (clientCert->second).get());
370 CFURLRequestSetSSLProperties(newRequest, sslProps.get());
372 if (CFHTTPCookieStorageRef cookieStorage = currentCookieStorage()) {
373 CFURLRequestSetHTTPCookieStorage(newRequest, cookieStorage);
374 CFHTTPCookieStorageAcceptPolicy policy = CFHTTPCookieStorageGetCookieAcceptPolicy(cookieStorage);
375 CFURLRequestSetHTTPCookieStorageAcceptPolicy(newRequest, policy);
377 // If a URL already has cookies, then we'll relax the 3rd party cookie policy and accept new cookies.
378 if (policy == CFHTTPCookieStorageAcceptPolicyOnlyFromMainDocumentDomain) {
379 CFURLRef url = CFURLRequestGetURL(newRequest);
380 RetainPtr<CFArrayRef> cookies(AdoptCF, CFHTTPCookieStorageCopyCookiesForURL(cookieStorage, url, false));
381 if (CFArrayGetCount(cookies.get()))
382 CFURLRequestSetMainDocumentURL(newRequest, url);
389 static CFDictionaryRef createConnectionProperties(bool shouldUseCredentialStorage)
391 static const CFStringRef webKitPrivateSessionCF = CFSTR("WebKitPrivateSession");
392 static const CFStringRef _kCFURLConnectionSessionID = CFSTR("_kCFURLConnectionSessionID");
393 static const CFStringRef kCFURLConnectionSocketStreamProperties = CFSTR("kCFURLConnectionSocketStreamProperties");
395 CFDictionaryRef sessionID = shouldUseCredentialStorage ?
396 CFDictionaryCreate(0, 0, 0, 0, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks) :
397 CFDictionaryCreate(0, (const void**)&_kCFURLConnectionSessionID, (const void**)&webKitPrivateSessionCF, 1, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
399 CFDictionaryRef propertiesDictionary = CFDictionaryCreate(0, (const void**)&kCFURLConnectionSocketStreamProperties, (const void**)&sessionID, 1, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
401 CFRelease(sessionID);
402 return propertiesDictionary;
405 void ResourceHandle::createCFURLConnection(bool shouldUseCredentialStorage, bool shouldContentSniff)
407 if ((!d->m_user.isEmpty() || !d->m_pass.isEmpty()) && !firstRequest().url().protocolInHTTPFamily()) {
408 // Credentials for ftp can only be passed in URL, the didReceiveAuthenticationChallenge delegate call won't be made.
409 KURL urlWithCredentials(firstRequest().url());
410 urlWithCredentials.setUser(d->m_user);
411 urlWithCredentials.setPass(d->m_pass);
412 firstRequest().setURL(urlWithCredentials);
415 // <rdar://problem/7174050> - For URLs that match the paths of those previously challenged for HTTP Basic authentication,
416 // try and reuse the credential preemptively, as allowed by RFC 2617.
417 if (shouldUseCredentialStorage && firstRequest().url().protocolInHTTPFamily()) {
418 if (d->m_user.isEmpty() && d->m_pass.isEmpty()) {
419 // <rdar://problem/7174050> - For URLs that match the paths of those previously challenged for HTTP Basic authentication,
420 // try and reuse the credential preemptively, as allowed by RFC 2617.
421 d->m_initialCredential = CredentialStorage::get(firstRequest().url());
423 // If there is already a protection space known for the URL, update stored credentials before sending a request.
424 // This makes it possible to implement logout by sending an XMLHttpRequest with known incorrect credentials, and aborting it immediately
425 // (so that an authentication dialog doesn't pop up).
426 CredentialStorage::set(Credential(d->m_user, d->m_pass, CredentialPersistenceNone), firstRequest().url());
430 if (!d->m_initialCredential.isEmpty()) {
431 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password());
432 firstRequest().addHTTPHeaderField("Authorization", authHeader);
435 RetainPtr<CFURLRequestRef> request(AdoptCF, makeFinalRequest(firstRequest(), shouldContentSniff));
437 CFURLConnectionClient_V3 client = { 3, this, 0, 0, 0, WebCore::willSendRequest, didReceiveResponse, didReceiveData, 0, didFinishLoading, didFail, willCacheResponse, didReceiveChallenge, didSendBodyData, shouldUseCredentialStorageCallback, 0};
438 RetainPtr<CFDictionaryRef> connectionProperties(AdoptCF, createConnectionProperties(shouldUseCredentialStorage));
440 d->m_connection.adoptCF(CFURLConnectionCreateWithProperties(0, request.get(), reinterpret_cast<CFURLConnectionClient*>(&client), connectionProperties.get()));
443 bool ResourceHandle::start(NetworkingContext* context)
448 // If NetworkingContext is invalid then we are no longer attached to a Page,
449 // this must be an attempted load from an unload handler, so let's just block it.
450 if (!context->isValid())
453 bool shouldUseCredentialStorage = !client() || client()->shouldUseCredentialStorage(this);
455 createCFURLConnection(shouldUseCredentialStorage, d->m_shouldContentSniff);
457 CFURLConnectionScheduleWithCurrentMessageQueue(d->m_connection.get());
458 CFURLConnectionScheduleDownloadWithRunLoop(d->m_connection.get(), loaderRunLoop(), kCFRunLoopDefaultMode);
459 CFURLConnectionStart(d->m_connection.get());
461 LOG(Network, "CFNet - Starting URL %s (handle=%p, conn=%p)", firstRequest().url().string().utf8().data(), this, d->m_connection);
466 void ResourceHandle::cancel()
468 if (d->m_connection) {
469 CFURLConnectionCancel(d->m_connection.get());
474 PassRefPtr<SharedBuffer> ResourceHandle::bufferedData()
476 ASSERT_NOT_REACHED();
480 bool ResourceHandle::supportsBufferedData()
485 void ResourceHandle::willSendRequest(ResourceRequest& request, const ResourceResponse& redirectResponse)
487 const KURL& url = request.url();
488 d->m_user = url.user();
489 d->m_pass = url.pass();
490 d->m_lastHTTPMethod = request.httpMethod();
491 request.removeCredentials();
492 if (!protocolHostAndPortAreEqual(request.url(), redirectResponse.url()))
493 request.clearHTTPAuthorization();
495 #if USE(CFURLSTORAGESESSIONS)
496 if (CFURLStorageSessionRef storageSession = privateBrowsingStorageSession())
497 request.setStorageSession(storageSession);
500 client()->willSendRequest(this, request, redirectResponse);
503 bool ResourceHandle::shouldUseCredentialStorage()
505 LOG(Network, "CFNet - shouldUseCredentialStorage()");
507 return client()->shouldUseCredentialStorage(this);
512 void ResourceHandle::didReceiveAuthenticationChallenge(const AuthenticationChallenge& challenge)
514 LOG(Network, "CFNet - didReceiveAuthenticationChallenge()");
515 ASSERT(d->m_currentWebChallenge.isNull());
516 // Since CFURLConnection networking relies on keeping a reference to the original CFURLAuthChallengeRef,
517 // we make sure that is actually present
518 ASSERT(challenge.cfURLAuthChallengeRef());
519 ASSERT(challenge.authenticationClient() == this); // Should be already set.
521 if (!d->m_user.isNull() && !d->m_pass.isNull()) {
522 RetainPtr<CFStringRef> user(AdoptCF, d->m_user.createCFString());
523 RetainPtr<CFStringRef> pass(AdoptCF, d->m_pass.createCFString());
524 RetainPtr<CFURLCredentialRef> credential(AdoptCF,
525 CFURLCredentialCreate(kCFAllocatorDefault, user.get(), pass.get(), 0, kCFURLCredentialPersistenceNone));
528 if (challenge.failureResponse().httpStatusCode() == 401)
529 urlToStore = firstRequest().url();
530 CredentialStorage::set(core(credential.get()), challenge.protectionSpace(), urlToStore);
532 CFURLConnectionUseCredential(d->m_connection.get(), credential.get(), challenge.cfURLAuthChallengeRef());
533 d->m_user = String();
534 d->m_pass = String();
535 // FIXME: Per the specification, the user shouldn't be asked for credentials if there were incorrect ones provided explicitly.
539 if (!client() || client()->shouldUseCredentialStorage(this)) {
540 if (!d->m_initialCredential.isEmpty() || challenge.previousFailureCount()) {
541 // The stored credential wasn't accepted, stop using it.
542 // There is a race condition here, since a different credential might have already been stored by another ResourceHandle,
543 // but the observable effect should be very minor, if any.
544 CredentialStorage::remove(challenge.protectionSpace());
547 if (!challenge.previousFailureCount()) {
548 Credential credential = CredentialStorage::get(challenge.protectionSpace());
549 if (!credential.isEmpty() && credential != d->m_initialCredential) {
550 ASSERT(credential.persistence() == CredentialPersistenceNone);
551 if (challenge.failureResponse().httpStatusCode() == 401) {
552 // Store the credential back, possibly adding it as a default for this directory.
553 CredentialStorage::set(credential, challenge.protectionSpace(), firstRequest().url());
555 RetainPtr<CFURLCredentialRef> cfCredential(AdoptCF, createCF(credential));
556 CFURLConnectionUseCredential(d->m_connection.get(), cfCredential.get(), challenge.cfURLAuthChallengeRef());
562 d->m_currentWebChallenge = challenge;
565 client()->didReceiveAuthenticationChallenge(this, d->m_currentWebChallenge);
568 void ResourceHandle::receivedCredential(const AuthenticationChallenge& challenge, const Credential& credential)
570 LOG(Network, "CFNet - receivedCredential()");
571 ASSERT(!challenge.isNull());
572 ASSERT(challenge.cfURLAuthChallengeRef());
573 if (challenge != d->m_currentWebChallenge)
576 // FIXME: Support empty credentials. Currently, an empty credential cannot be stored in WebCore credential storage, as that's empty value for its map.
577 if (credential.isEmpty()) {
578 receivedRequestToContinueWithoutCredential(challenge);
582 if (credential.persistence() == CredentialPersistenceForSession) {
583 // Manage per-session credentials internally, because once NSURLCredentialPersistencePerSession is used, there is no way
584 // to ignore it for a particular request (short of removing it altogether).
585 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceNone);
586 RetainPtr<CFURLCredentialRef> cfCredential(AdoptCF, createCF(webCredential));
589 if (challenge.failureResponse().httpStatusCode() == 401)
590 urlToStore = firstRequest().url();
591 CredentialStorage::set(webCredential, challenge.protectionSpace(), urlToStore);
593 CFURLConnectionUseCredential(d->m_connection.get(), cfCredential.get(), challenge.cfURLAuthChallengeRef());
595 RetainPtr<CFURLCredentialRef> cfCredential(AdoptCF, createCF(credential));
596 CFURLConnectionUseCredential(d->m_connection.get(), cfCredential.get(), challenge.cfURLAuthChallengeRef());
599 clearAuthentication();
602 void ResourceHandle::receivedRequestToContinueWithoutCredential(const AuthenticationChallenge& challenge)
604 LOG(Network, "CFNet - receivedRequestToContinueWithoutCredential()");
605 ASSERT(!challenge.isNull());
606 ASSERT(challenge.cfURLAuthChallengeRef());
607 if (challenge != d->m_currentWebChallenge)
610 CFURLConnectionUseCredential(d->m_connection.get(), 0, challenge.cfURLAuthChallengeRef());
612 clearAuthentication();
615 void ResourceHandle::receivedCancellation(const AuthenticationChallenge& challenge)
617 LOG(Network, "CFNet - receivedCancellation()");
618 if (challenge != d->m_currentWebChallenge)
622 client()->receivedCancellation(this, challenge);
625 CFURLConnectionRef ResourceHandle::connection() const
627 return d->m_connection.get();
630 CFURLConnectionRef ResourceHandle::releaseConnectionForDownload()
632 LOG(Network, "CFNet - Job %p releasing connection %p for download", this, d->m_connection.get());
633 return d->m_connection.releaseRef();
636 void ResourceHandle::loadResourceSynchronously(NetworkingContext* context, const ResourceRequest& request, StoredCredentials storedCredentials, ResourceError& error, ResourceResponse& response, Vector<char>& vector)
638 LOG(Network, "ResourceHandle::loadResourceSynchronously:%s allowStoredCredentials:%u", request.url().string().utf8().data(), storedCredentials);
640 ASSERT(!request.isEmpty());
642 ASSERT(response.isNull());
643 ASSERT(error.isNull());
645 OwnPtr<WebCoreSynchronousLoaderClient> client = WebCoreSynchronousLoaderClient::create(response, error);
646 client->setAllowStoredCredentials(storedCredentials == AllowStoredCredentials);
648 RefPtr<ResourceHandle> handle = adoptRef(new ResourceHandle(request, client.get(), false /*defersLoading*/, true /*shouldContentSniff*/));
650 if (context && handle->d->m_scheduledFailureType != NoFailure) {
651 error = context->blockedError(request);
655 RetainPtr<CFDictionaryRef> connectionProperties(AdoptCF, createConnectionProperties(storedCredentials == AllowStoredCredentials));
657 handle->createCFURLConnection(storedCredentials == AllowStoredCredentials, ResourceHandle::shouldContentSniffURL(request.url()));
659 CFURLConnectionScheduleWithRunLoop(handle->connection(), CFRunLoopGetCurrent(), WebCoreSynchronousLoaderRunLoopMode);
660 CFURLConnectionScheduleDownloadWithRunLoop(handle->connection(), CFRunLoopGetCurrent(), WebCoreSynchronousLoaderRunLoopMode);
661 CFURLConnectionStart(handle->connection());
663 while (!client->isDone())
664 CFRunLoopRunInMode(WebCoreSynchronousLoaderRunLoopMode, UINT_MAX, true);
666 CFURLConnectionCancel(handle->connection());
668 if (error.isNull() && response.mimeType().isNull())
669 setDefaultMIMEType(response.cfURLResponse());
671 RetainPtr<CFDataRef> data = client->data();
673 if (!error.isNull()) {
674 response = ResourceResponse(request.url(), String(), 0, String(), String());
676 CFErrorRef cfError = error;
677 CFStringRef domain = CFErrorGetDomain(cfError);
678 // FIXME: Return the actual response for failed authentication.
679 if (domain == kCFErrorDomainCFNetwork)
680 response.setHTTPStatusCode(CFErrorGetCode(cfError));
682 response.setHTTPStatusCode(404);
686 ASSERT(vector.isEmpty());
687 vector.append(CFDataGetBytePtr(data.get()), CFDataGetLength(data.get()));
691 void ResourceHandle::setHostAllowsAnyHTTPSCertificate(const String& host)
693 allowsAnyHTTPSCertificateHosts().add(host.lower());
696 void ResourceHandle::setClientCertificate(const String& host, CFDataRef cert)
698 clientCerts().set(host.lower(), cert);
701 void ResourceHandle::platformSetDefersLoading(bool defers)
703 if (!d->m_connection)
707 CFURLConnectionHalt(d->m_connection.get());
709 CFURLConnectionResume(d->m_connection.get());
712 bool ResourceHandle::loadsBlocked()
717 bool ResourceHandle::willLoadFromCache(ResourceRequest& request, Frame* frame)
719 request.setCachePolicy(ReturnCacheDataDontLoad);
721 CFURLResponseRef cfResponse = 0;
722 CFErrorRef cfError = 0;
723 RetainPtr<CFURLRequestRef> cfRequest(AdoptCF, makeFinalRequest(request, true));
724 RetainPtr<CFDataRef> data(AdoptCF, CFURLConnectionSendSynchronousRequest(cfRequest.get(), &cfResponse, &cfError, request.timeoutInterval()));
725 bool cached = cfResponse && !cfError;
730 CFRelease(cfResponse);
735 #if USE(CFURLSTORAGESESSIONS)
737 RetainPtr<CFURLStorageSessionRef> ResourceHandle::createPrivateBrowsingStorageSession(CFStringRef identifier)
739 return RetainPtr<CFURLStorageSessionRef>(AdoptCF, wkCreatePrivateStorageSession(identifier));
742 String ResourceHandle::privateBrowsingStorageSessionIdentifierDefaultBase()
744 return String(reinterpret_cast<CFStringRef>(CFBundleGetValueForInfoDictionaryKey(CFBundleGetMainBundle(), kCFBundleIdentifierKey)));
749 void WebCoreSynchronousLoaderClient::willSendRequest(ResourceHandle* handle, ResourceRequest& request, const ResourceResponse& /*redirectResponse*/)
751 // FIXME: This needs to be fixed to follow the redirect correctly even for cross-domain requests.
752 if (!protocolHostAndPortAreEqual(handle->firstRequest().url(), request.url())) {
754 RetainPtr<CFErrorRef> cfError(AdoptCF, CFErrorCreate(kCFAllocatorDefault, kCFErrorDomainCFNetwork, kCFURLErrorBadServerResponse, 0));
755 m_error = cfError.get();
761 void WebCoreSynchronousLoaderClient::didReceiveResponse(ResourceHandle*, const ResourceResponse& response)
763 m_response = response;
766 void WebCoreSynchronousLoaderClient::didReceiveData(ResourceHandle*, const char* data, int length, int /*encodedDataLength*/)
769 m_data.adoptCF(CFDataCreateMutable(kCFAllocatorDefault, 0));
770 CFDataAppendBytes(m_data.get(), reinterpret_cast<const UInt8*>(data), length);
773 void WebCoreSynchronousLoaderClient::didFinishLoading(ResourceHandle*, double)
778 void WebCoreSynchronousLoaderClient::didFail(ResourceHandle*, const ResourceError& error)
784 void WebCoreSynchronousLoaderClient::didReceiveAuthenticationChallenge(ResourceHandle* handle, const AuthenticationChallenge& challenge)
786 // FIXME: The user should be asked for credentials, as in async case.
787 CFURLConnectionUseCredential(handle->connection(), 0, challenge.cfURLAuthChallengeRef());
790 bool WebCoreSynchronousLoaderClient::shouldUseCredentialStorage(ResourceHandle*)
792 // FIXME: We should ask FrameLoaderClient whether using credential storage is globally forbidden.
793 return m_allowStoredCredentials;
796 } // namespace WebCore
798 #endif // USE(CFNETWORK)