| OLD | NEW |
| (Empty) |
| 1 /* | |
| 2 * Copyright (C) 2010, 2011, 2012 Google Inc. All rights reserved. | |
| 3 * | |
| 4 * Redistribution and use in source and binary forms, with or without | |
| 5 * modification, are permitted provided that the following conditions are | |
| 6 * met: | |
| 7 * | |
| 8 * * Redistributions of source code must retain the above copyright | |
| 9 * notice, this list of conditions and the following disclaimer. | |
| 10 * * Redistributions in binary form must reproduce the above | |
| 11 * copyright notice, this list of conditions and the following disclaimer | |
| 12 * in the documentation and/or other materials provided with the | |
| 13 * distribution. | |
| 14 * * Neither the name of Google Inc. nor the names of its | |
| 15 * contributors may be used to endorse or promote products derived from | |
| 16 * this software without specific prior written permission. | |
| 17 * | |
| 18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | |
| 19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | |
| 20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | |
| 21 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT | |
| 22 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
| 23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | |
| 24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | |
| 25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | |
| 26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
| 27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | |
| 28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
| 29 */ | |
| 30 | |
| 31 #include "web/AssociatedURLLoader.h" | |
| 32 | |
| 33 #include "core/dom/ContextLifecycleObserver.h" | |
| 34 #include "core/fetch/CrossOriginAccessControl.h" | |
| 35 #include "core/fetch/FetchUtils.h" | |
| 36 #include "core/loader/DocumentThreadableLoader.h" | |
| 37 #include "core/loader/DocumentThreadableLoaderClient.h" | |
| 38 #include "platform/Timer.h" | |
| 39 #include "platform/exported/WrappedResourceRequest.h" | |
| 40 #include "platform/exported/WrappedResourceResponse.h" | |
| 41 #include "platform/network/HTTPParsers.h" | |
| 42 #include "platform/network/ResourceError.h" | |
| 43 #include "public/platform/WebHTTPHeaderVisitor.h" | |
| 44 #include "public/platform/WebString.h" | |
| 45 #include "public/platform/WebURLError.h" | |
| 46 #include "public/platform/WebURLLoaderClient.h" | |
| 47 #include "public/platform/WebURLRequest.h" | |
| 48 #include "public/web/WebDataSource.h" | |
| 49 #include "web/WebLocalFrameImpl.h" | |
| 50 #include "wtf/HashSet.h" | |
| 51 #include "wtf/PtrUtil.h" | |
| 52 #include "wtf/text/WTFString.h" | |
| 53 #include <limits.h> | |
| 54 #include <memory> | |
| 55 | |
| 56 namespace blink { | |
| 57 | |
| 58 namespace { | |
| 59 | |
| 60 class HTTPRequestHeaderValidator : public WebHTTPHeaderVisitor { | |
| 61 WTF_MAKE_NONCOPYABLE(HTTPRequestHeaderValidator); | |
| 62 | |
| 63 public: | |
| 64 HTTPRequestHeaderValidator() : m_isSafe(true) {} | |
| 65 ~HTTPRequestHeaderValidator() override {} | |
| 66 | |
| 67 void visitHeader(const WebString& name, const WebString& value) override; | |
| 68 bool isSafe() const { return m_isSafe; } | |
| 69 | |
| 70 private: | |
| 71 bool m_isSafe; | |
| 72 }; | |
| 73 | |
| 74 void HTTPRequestHeaderValidator::visitHeader(const WebString& name, | |
| 75 const WebString& value) { | |
| 76 m_isSafe = m_isSafe && isValidHTTPToken(name) && | |
| 77 !FetchUtils::isForbiddenHeaderName(name) && | |
| 78 isValidHTTPHeaderValue(value); | |
| 79 } | |
| 80 | |
| 81 } // namespace | |
| 82 | |
| 83 // This class bridges the interface differences between WebCore and WebKit | |
| 84 // loader clients. | |
| 85 // It forwards its ThreadableLoaderClient notifications to a WebURLLoaderClient. | |
| 86 class AssociatedURLLoader::ClientAdapter final | |
| 87 : public DocumentThreadableLoaderClient { | |
| 88 WTF_MAKE_NONCOPYABLE(ClientAdapter); | |
| 89 | |
| 90 public: | |
| 91 static std::unique_ptr<ClientAdapter> create(AssociatedURLLoader*, | |
| 92 WebURLLoaderClient*, | |
| 93 const WebURLLoaderOptions&); | |
| 94 | |
| 95 // ThreadableLoaderClient | |
| 96 void didSendData(unsigned long long /*bytesSent*/, | |
| 97 unsigned long long /*totalBytesToBeSent*/) override; | |
| 98 void didReceiveResponse(unsigned long, | |
| 99 const ResourceResponse&, | |
| 100 std::unique_ptr<WebDataConsumerHandle>) override; | |
| 101 void didDownloadData(int /*dataLength*/) override; | |
| 102 void didReceiveData(const char*, unsigned /*dataLength*/) override; | |
| 103 void didReceiveCachedMetadata(const char*, int /*dataLength*/) override; | |
| 104 void didFinishLoading(unsigned long /*identifier*/, | |
| 105 double /*finishTime*/) override; | |
| 106 void didFail(const ResourceError&) override; | |
| 107 void didFailRedirectCheck() override; | |
| 108 | |
| 109 // DocumentThreadableLoaderClient | |
| 110 bool willFollowRedirect( | |
| 111 const ResourceRequest& /*newRequest*/, | |
| 112 const ResourceResponse& /*redirectResponse*/) override; | |
| 113 | |
| 114 // Sets an error to be reported back to the client, asychronously. | |
| 115 void setDelayedError(const ResourceError&); | |
| 116 | |
| 117 // Enables forwarding of error notifications to the WebURLLoaderClient. These | |
| 118 // must be deferred until after the call to | |
| 119 // AssociatedURLLoader::loadAsynchronously() completes. | |
| 120 void enableErrorNotifications(); | |
| 121 | |
| 122 // Stops loading and releases the DocumentThreadableLoader as early as | |
| 123 // possible. | |
| 124 WebURLLoaderClient* releaseClient() { | |
| 125 WebURLLoaderClient* client = m_client; | |
| 126 m_client = nullptr; | |
| 127 return client; | |
| 128 } | |
| 129 | |
| 130 private: | |
| 131 ClientAdapter(AssociatedURLLoader*, | |
| 132 WebURLLoaderClient*, | |
| 133 const WebURLLoaderOptions&); | |
| 134 | |
| 135 void notifyError(TimerBase*); | |
| 136 | |
| 137 AssociatedURLLoader* m_loader; | |
| 138 WebURLLoaderClient* m_client; | |
| 139 WebURLLoaderOptions m_options; | |
| 140 WebURLError m_error; | |
| 141 | |
| 142 Timer<ClientAdapter> m_errorTimer; | |
| 143 bool m_enableErrorNotifications; | |
| 144 bool m_didFail; | |
| 145 }; | |
| 146 | |
| 147 std::unique_ptr<AssociatedURLLoader::ClientAdapter> | |
| 148 AssociatedURLLoader::ClientAdapter::create(AssociatedURLLoader* loader, | |
| 149 WebURLLoaderClient* client, | |
| 150 const WebURLLoaderOptions& options) { | |
| 151 return wrapUnique(new ClientAdapter(loader, client, options)); | |
| 152 } | |
| 153 | |
| 154 AssociatedURLLoader::ClientAdapter::ClientAdapter( | |
| 155 AssociatedURLLoader* loader, | |
| 156 WebURLLoaderClient* client, | |
| 157 const WebURLLoaderOptions& options) | |
| 158 : m_loader(loader), | |
| 159 m_client(client), | |
| 160 m_options(options), | |
| 161 m_errorTimer(this, &ClientAdapter::notifyError), | |
| 162 m_enableErrorNotifications(false), | |
| 163 m_didFail(false) { | |
| 164 DCHECK(m_loader); | |
| 165 DCHECK(m_client); | |
| 166 } | |
| 167 | |
| 168 bool AssociatedURLLoader::ClientAdapter::willFollowRedirect( | |
| 169 const ResourceRequest& newRequest, | |
| 170 const ResourceResponse& redirectResponse) { | |
| 171 if (!m_client) | |
| 172 return true; | |
| 173 | |
| 174 WrappedResourceRequest wrappedNewRequest(newRequest); | |
| 175 WrappedResourceResponse wrappedRedirectResponse(redirectResponse); | |
| 176 return m_client->willFollowRedirect(m_loader, wrappedNewRequest, | |
| 177 wrappedRedirectResponse); | |
| 178 } | |
| 179 | |
| 180 void AssociatedURLLoader::ClientAdapter::didSendData( | |
| 181 unsigned long long bytesSent, | |
| 182 unsigned long long totalBytesToBeSent) { | |
| 183 if (!m_client) | |
| 184 return; | |
| 185 | |
| 186 m_client->didSendData(m_loader, bytesSent, totalBytesToBeSent); | |
| 187 } | |
| 188 | |
| 189 void AssociatedURLLoader::ClientAdapter::didReceiveResponse( | |
| 190 unsigned long, | |
| 191 const ResourceResponse& response, | |
| 192 std::unique_ptr<WebDataConsumerHandle> handle) { | |
| 193 DCHECK(!handle); | |
| 194 if (!m_client) | |
| 195 return; | |
| 196 | |
| 197 if (m_options.exposeAllResponseHeaders || | |
| 198 m_options.crossOriginRequestPolicy != | |
| 199 WebURLLoaderOptions::CrossOriginRequestPolicyUseAccessControl) { | |
| 200 // Use the original ResourceResponse. | |
| 201 m_client->didReceiveResponse(m_loader, WrappedResourceResponse(response)); | |
| 202 return; | |
| 203 } | |
| 204 | |
| 205 HTTPHeaderSet exposedHeaders; | |
| 206 extractCorsExposedHeaderNamesList(response, exposedHeaders); | |
| 207 HTTPHeaderSet blockedHeaders; | |
| 208 for (const auto& header : response.httpHeaderFields()) { | |
| 209 if (FetchUtils::isForbiddenResponseHeaderName(header.key) || | |
| 210 (!isOnAccessControlResponseHeaderWhitelist(header.key) && | |
| 211 !exposedHeaders.contains(header.key))) | |
| 212 blockedHeaders.add(header.key); | |
| 213 } | |
| 214 | |
| 215 if (blockedHeaders.isEmpty()) { | |
| 216 // Use the original ResourceResponse. | |
| 217 m_client->didReceiveResponse(m_loader, WrappedResourceResponse(response)); | |
| 218 return; | |
| 219 } | |
| 220 | |
| 221 // If there are blocked headers, copy the response so we can remove them. | |
| 222 WebURLResponse validatedResponse = WrappedResourceResponse(response); | |
| 223 for (const auto& header : blockedHeaders) | |
| 224 validatedResponse.clearHTTPHeaderField(header); | |
| 225 m_client->didReceiveResponse(m_loader, validatedResponse); | |
| 226 } | |
| 227 | |
| 228 void AssociatedURLLoader::ClientAdapter::didDownloadData(int dataLength) { | |
| 229 if (!m_client) | |
| 230 return; | |
| 231 | |
| 232 m_client->didDownloadData(m_loader, dataLength, -1); | |
| 233 } | |
| 234 | |
| 235 void AssociatedURLLoader::ClientAdapter::didReceiveData(const char* data, | |
| 236 unsigned dataLength) { | |
| 237 if (!m_client) | |
| 238 return; | |
| 239 | |
| 240 CHECK_LE(dataLength, static_cast<unsigned>(std::numeric_limits<int>::max())); | |
| 241 | |
| 242 m_client->didReceiveData(m_loader, data, dataLength, -1, dataLength); | |
| 243 } | |
| 244 | |
| 245 void AssociatedURLLoader::ClientAdapter::didReceiveCachedMetadata( | |
| 246 const char* data, | |
| 247 int dataLength) { | |
| 248 if (!m_client) | |
| 249 return; | |
| 250 | |
| 251 m_client->didReceiveCachedMetadata(m_loader, data, dataLength); | |
| 252 } | |
| 253 | |
| 254 void AssociatedURLLoader::ClientAdapter::didFinishLoading( | |
| 255 unsigned long identifier, | |
| 256 double finishTime) { | |
| 257 if (!m_client) | |
| 258 return; | |
| 259 | |
| 260 m_loader->clientAdapterDone(); | |
| 261 | |
| 262 releaseClient()->didFinishLoading( | |
| 263 m_loader, finishTime, WebURLLoaderClient::kUnknownEncodedDataLength); | |
| 264 // |this| may be dead here. | |
| 265 } | |
| 266 | |
| 267 void AssociatedURLLoader::ClientAdapter::didFail(const ResourceError& error) { | |
| 268 if (!m_client) | |
| 269 return; | |
| 270 | |
| 271 m_loader->clientAdapterDone(); | |
| 272 | |
| 273 m_didFail = true; | |
| 274 m_error = WebURLError(error); | |
| 275 if (m_enableErrorNotifications) | |
| 276 notifyError(&m_errorTimer); | |
| 277 } | |
| 278 | |
| 279 void AssociatedURLLoader::ClientAdapter::didFailRedirectCheck() { | |
| 280 didFail(ResourceError()); | |
| 281 } | |
| 282 | |
| 283 void AssociatedURLLoader::ClientAdapter::enableErrorNotifications() { | |
| 284 m_enableErrorNotifications = true; | |
| 285 // If an error has already been received, start a timer to report it to the | |
| 286 // client after AssociatedURLLoader::loadAsynchronously has returned to the | |
| 287 // caller. | |
| 288 if (m_didFail) | |
| 289 m_errorTimer.startOneShot(0, BLINK_FROM_HERE); | |
| 290 } | |
| 291 | |
| 292 void AssociatedURLLoader::ClientAdapter::notifyError(TimerBase* timer) { | |
| 293 DCHECK_EQ(timer, &m_errorTimer); | |
| 294 | |
| 295 if (m_client) | |
| 296 releaseClient()->didFail(m_loader, m_error); | |
| 297 // |this| may be dead here. | |
| 298 } | |
| 299 | |
| 300 class AssociatedURLLoader::Observer final : public GarbageCollected<Observer>, | |
| 301 public ContextLifecycleObserver { | |
| 302 USING_GARBAGE_COLLECTED_MIXIN(Observer); | |
| 303 | |
| 304 public: | |
| 305 Observer(AssociatedURLLoader* parent, Document* document) | |
| 306 : ContextLifecycleObserver(document), m_parent(parent) {} | |
| 307 | |
| 308 void dispose() { | |
| 309 m_parent = nullptr; | |
| 310 clearContext(); | |
| 311 } | |
| 312 | |
| 313 void contextDestroyed() override { | |
| 314 if (m_parent) | |
| 315 m_parent->documentDestroyed(); | |
| 316 } | |
| 317 | |
| 318 DEFINE_INLINE_VIRTUAL_TRACE() { ContextLifecycleObserver::trace(visitor); } | |
| 319 | |
| 320 AssociatedURLLoader* m_parent; | |
| 321 }; | |
| 322 | |
| 323 AssociatedURLLoader::AssociatedURLLoader(WebLocalFrameImpl* frameImpl, | |
| 324 const WebURLLoaderOptions& options) | |
| 325 : m_client(nullptr), | |
| 326 m_options(options), | |
| 327 m_observer(new Observer(this, frameImpl->frame()->document())) {} | |
| 328 | |
| 329 AssociatedURLLoader::~AssociatedURLLoader() { | |
| 330 cancel(); | |
| 331 } | |
| 332 | |
| 333 #define STATIC_ASSERT_ENUM(a, b) \ | |
| 334 static_assert(static_cast<int>(a) == static_cast<int>(b), \ | |
| 335 "mismatching enum: " #a) | |
| 336 | |
| 337 STATIC_ASSERT_ENUM(WebURLLoaderOptions::CrossOriginRequestPolicyDeny, | |
| 338 DenyCrossOriginRequests); | |
| 339 STATIC_ASSERT_ENUM( | |
| 340 WebURLLoaderOptions::CrossOriginRequestPolicyUseAccessControl, | |
| 341 UseAccessControl); | |
| 342 STATIC_ASSERT_ENUM(WebURLLoaderOptions::CrossOriginRequestPolicyAllow, | |
| 343 AllowCrossOriginRequests); | |
| 344 | |
| 345 STATIC_ASSERT_ENUM(WebURLLoaderOptions::ConsiderPreflight, ConsiderPreflight); | |
| 346 STATIC_ASSERT_ENUM(WebURLLoaderOptions::ForcePreflight, ForcePreflight); | |
| 347 STATIC_ASSERT_ENUM(WebURLLoaderOptions::PreventPreflight, PreventPreflight); | |
| 348 | |
| 349 void AssociatedURLLoader::loadSynchronously(const WebURLRequest& request, | |
| 350 WebURLResponse& response, | |
| 351 WebURLError& error, | |
| 352 WebData& data, | |
| 353 int64_t& encodedDataLength) { | |
| 354 DCHECK(0); // Synchronous loading is not supported. | |
| 355 } | |
| 356 | |
| 357 void AssociatedURLLoader::loadAsynchronously(const WebURLRequest& request, | |
| 358 WebURLLoaderClient* client) { | |
| 359 DCHECK(!m_client); | |
| 360 DCHECK(!m_loader); | |
| 361 DCHECK(!m_clientAdapter); | |
| 362 | |
| 363 DCHECK(client); | |
| 364 | |
| 365 bool allowLoad = true; | |
| 366 WebURLRequest newRequest(request); | |
| 367 if (m_options.untrustedHTTP) { | |
| 368 WebString method = newRequest.httpMethod(); | |
| 369 allowLoad = m_observer && isValidHTTPToken(method) && | |
| 370 FetchUtils::isUsefulMethod(method); | |
| 371 if (allowLoad) { | |
| 372 newRequest.setHTTPMethod(FetchUtils::normalizeMethod(method)); | |
| 373 HTTPRequestHeaderValidator validator; | |
| 374 newRequest.visitHTTPHeaderFields(&validator); | |
| 375 allowLoad = validator.isSafe(); | |
| 376 } | |
| 377 } | |
| 378 | |
| 379 m_client = client; | |
| 380 m_clientAdapter = ClientAdapter::create(this, client, m_options); | |
| 381 | |
| 382 if (allowLoad) { | |
| 383 ThreadableLoaderOptions options; | |
| 384 options.preflightPolicy = | |
| 385 static_cast<PreflightPolicy>(m_options.preflightPolicy); | |
| 386 options.crossOriginRequestPolicy = static_cast<CrossOriginRequestPolicy>( | |
| 387 m_options.crossOriginRequestPolicy); | |
| 388 | |
| 389 ResourceLoaderOptions resourceLoaderOptions; | |
| 390 resourceLoaderOptions.allowCredentials = m_options.allowCredentials | |
| 391 ? AllowStoredCredentials | |
| 392 : DoNotAllowStoredCredentials; | |
| 393 resourceLoaderOptions.dataBufferingPolicy = DoNotBufferData; | |
| 394 | |
| 395 const ResourceRequest& webcoreRequest = newRequest.toResourceRequest(); | |
| 396 if (webcoreRequest.requestContext() == | |
| 397 WebURLRequest::RequestContextUnspecified) { | |
| 398 // FIXME: We load URLs without setting a TargetType (and therefore a | |
| 399 // request context) in several places in content/ | |
| 400 // (P2PPortAllocatorSession::AllocateLegacyRelaySession, for example). | |
| 401 // Remove this once those places are patched up. | |
| 402 newRequest.setRequestContext(WebURLRequest::RequestContextInternal); | |
| 403 } | |
| 404 | |
| 405 Document* document = toDocument(m_observer->lifecycleContext()); | |
| 406 DCHECK(document); | |
| 407 m_loader = DocumentThreadableLoader::create( | |
| 408 *document, m_clientAdapter.get(), options, resourceLoaderOptions); | |
| 409 m_loader->start(webcoreRequest); | |
| 410 } | |
| 411 | |
| 412 if (!m_loader) { | |
| 413 // FIXME: return meaningful error codes. | |
| 414 m_clientAdapter->didFail(ResourceError()); | |
| 415 } | |
| 416 m_clientAdapter->enableErrorNotifications(); | |
| 417 } | |
| 418 | |
| 419 void AssociatedURLLoader::cancel() { | |
| 420 disposeObserver(); | |
| 421 cancelLoader(); | |
| 422 releaseClient(); | |
| 423 } | |
| 424 | |
| 425 void AssociatedURLLoader::clientAdapterDone() { | |
| 426 disposeObserver(); | |
| 427 releaseClient(); | |
| 428 } | |
| 429 | |
| 430 void AssociatedURLLoader::cancelLoader() { | |
| 431 if (!m_clientAdapter) | |
| 432 return; | |
| 433 | |
| 434 // Prevent invocation of the WebURLLoaderClient methods. | |
| 435 m_clientAdapter->releaseClient(); | |
| 436 | |
| 437 if (m_loader) { | |
| 438 m_loader->cancel(); | |
| 439 m_loader = nullptr; | |
| 440 } | |
| 441 m_clientAdapter.reset(); | |
| 442 } | |
| 443 | |
| 444 void AssociatedURLLoader::setDefersLoading(bool defersLoading) { | |
| 445 if (m_loader) | |
| 446 m_loader->setDefersLoading(defersLoading); | |
| 447 } | |
| 448 | |
| 449 void AssociatedURLLoader::setLoadingTaskRunner(blink::WebTaskRunner*) { | |
| 450 // TODO(alexclarke): Maybe support this one day if it proves worthwhile. | |
| 451 } | |
| 452 | |
| 453 void AssociatedURLLoader::documentDestroyed() { | |
| 454 disposeObserver(); | |
| 455 cancelLoader(); | |
| 456 | |
| 457 if (!m_client) | |
| 458 return; | |
| 459 | |
| 460 releaseClient()->didFail(this, ResourceError()); | |
| 461 // |this| may be dead here. | |
| 462 } | |
| 463 | |
| 464 void AssociatedURLLoader::disposeObserver() { | |
| 465 if (!m_observer) | |
| 466 return; | |
| 467 | |
| 468 // TODO(tyoshino): Remove this assert once Document is fixed so that | |
| 469 // contextDestroyed() is invoked for all kinds of Documents. | |
| 470 // | |
| 471 // Currently, the method of detecting Document destruction implemented here | |
| 472 // doesn't work for all kinds of Documents. In case we reached here after | |
| 473 // the Oilpan is destroyed, we just crash the renderer process to prevent | |
| 474 // UaF. | |
| 475 // | |
| 476 // We could consider just skipping the rest of code in case | |
| 477 // ThreadState::current() is null. However, the fact we reached here | |
| 478 // without cancelling the loader means that it's possible there're some | |
| 479 // non-Blink non-on-heap objects still facing on-heap Blink objects. E.g. | |
| 480 // there could be a WebURLLoader instance behind the | |
| 481 // DocumentThreadableLoader instance. So, for safety, we chose to just | |
| 482 // crash here. | |
| 483 RELEASE_ASSERT(ThreadState::current()); | |
| 484 | |
| 485 m_observer->dispose(); | |
| 486 m_observer = nullptr; | |
| 487 } | |
| 488 | |
| 489 } // namespace blink | |
| OLD | NEW |