Index: net/http/http_auth_controller.h |
diff --git a/net/http/http_auth_controller.h b/net/http/http_auth_controller.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..bc1395fed0432af04b3c5d688a82c3ed8d8cdd27 |
--- /dev/null |
+++ b/net/http/http_auth_controller.h |
@@ -0,0 +1,134 @@ |
+// Copyright (c) 2010 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef NET_HTTP_HTTP_AUTH_CONTROLLER_H_ |
+#define NET_HTTP_HTTP_AUTH_CONTROLLER_H_ |
+ |
+#include <string> |
+ |
+#include "base/basictypes.h" |
+#include "base/ref_counted.h" |
+#include "base/scoped_ptr.h" |
+#include "googleurl/src/gurl.h" |
+#include "net/base/completion_callback.h" |
+#include "net/base/net_log.h" |
+#include "net/http/http_auth.h" |
+ |
+namespace net { |
+ |
+class AuthChallengeInfo; |
+class HostResolver; |
+class HttpNetworkSession; |
+class HttpRequestHeaders; |
+struct HttpRequestInfo; |
+ |
+class HttpAuthController { |
+ public: |
+ // The arguments are self explanatory except possibly for |auth_url|, which |
+ // should be both the auth target and auth path in a single url argument. |
+ HttpAuthController(HttpAuth::Target target, const GURL& auth_url, |
+ scoped_refptr<HttpNetworkSession> session, |
+ const BoundNetLog& net_log); |
+ |
+ // Generate an authentication token for |target| if necessary. The return |
+ // value is a net error code. |OK| will be returned both in the case that |
+ // a token is correctly generated synchronously, as well as when no tokens |
+ // were necessary. |
+ int MaybeGenerateAuthToken(const HttpRequestInfo* request, |
+ CompletionCallback* callback); |
+ |
+ // Adds either the proxy auth header, or the origin server auth header, |
+ // as specified by |target_|. |
+ void AddAuthorizationHeader(HttpRequestHeaders* authorization_headers); |
+ |
+ // Checks for and handles HTTP status code 401 or 407. |
+ // |HandleAuthChallenge()| returns OK on success, |
+ // ERR_AUTH_NEEDS_CANONICAL_NAME if the handler needs the canonical name |
+ // resolved, or a network error code. It may also populate |auth_info_|. |
+ int HandleAuthChallenge(scoped_refptr<HttpResponseHeaders> headers, |
+ int load_flags, bool establishing_tunnel); |
+ |
+ int ResolveCanonicalName(CompletionCallback* callback); |
+ |
+ // Store the supplied credentials and prepare to restart the auth. |
+ void ResetAuth(const std::wstring& username, const std::wstring& password); |
+ |
+ bool HaveAuthHandler() const { |
+ return handler_.get() != NULL; |
+ } |
+ |
+ bool HaveAuth() const { |
+ return handler_.get() && !identity_.invalid; |
+ } |
+ |
+ scoped_refptr<AuthChallengeInfo> auth_info() { |
+ return auth_info_; |
+ } |
+ |
+ private: |
+ // Searches the auth cache for an entry that encompasses the request's path. |
+ // If such an entry is found, updates |identity_| and |handler_| with the |
+ // cache entry's data and returns true. |
+ bool SelectPreemptiveAuth(); |
+ |
+ // Invalidates any auth cache entries after authentication has failed. |
+ // The identity that was rejected is |identity_|. |
+ void InvalidateRejectedAuthFromCache(); |
+ |
+ // Sets |identity_| to the next identity that the transaction should try. It |
+ // chooses candidates by searching the auth cache and the URL for a |
+ // username:password. Returns true if an identity was found. |
+ bool SelectNextAuthIdentityToTry(); |
+ |
+ // Populates auth_info_ with the challenge information, so that |
+ // URLRequestHttpJob can prompt for a username/password. |
+ void PopulateAuthChallenge(); |
+ |
+ // Indicates if this handler is for Proxy auth or Server auth. |
+ HttpAuth::Target target_; |
+ |
+ // Holds the {scheme, host, path, port} for the authentication target. |
+ const GURL auth_url_; |
+ |
+ // Holds the {scheme, host, port} for the authentication target. |
+ const GURL auth_origin_; |
+ |
+ // The absolute path of the resource needing authentication. |
+ // For proxy authentication the path is empty. |
+ const std::string auth_path_; |
+ |
+ // |handler_| encapsulates the logic for the particular auth-scheme. |
+ // This includes the challenge's parameters. If NULL, then there is no |
+ // associated auth handler. |
+ scoped_ptr<HttpAuthHandler> handler_; |
+ |
+ // |identity_| holds the (username/password) that should be used by |
+ // the handler_ to generate credentials. This identity can come from |
+ // a number of places (url, cache, prompt). |
+ HttpAuth::Identity identity_; |
+ |
+ // |auth_token_| contains the opaque string to pass to the proxy or |
+ // server to authenticate the client. |
+ std::string auth_token_; |
+ |
+ // Contains information about the auth challenge. |
+ scoped_refptr<AuthChallengeInfo> auth_info_; |
+ |
+ // True if we've used the username/password embedded in the URL. This |
+ // makes sure we use the embedded identity only once for the transaction, |
+ // preventing an infinite auth restart loop. |
+ bool embedded_identity_used_; |
+ |
+ // True if default credentials have already been tried for this transaction |
+ // in response to an HTTP authentication challenge. |
+ bool default_credentials_used_; |
+ |
+ scoped_refptr<HttpNetworkSession> session_; |
+ |
+ BoundNetLog net_log_; |
+}; |
+ |
+} // namespace net |
+ |
+#endif // NET_HTTP_HTTP_AUTH_CONTROLLER_H_ |