1/*
2 * Copyright (C) 2006-2018 Apple Inc. All rights reserved.
3 * (C) 2007 Graham Dennis (graham.dennis@gmail.com)
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. Neither the name of Apple Inc. ("Apple") nor the names of
15 * its contributors may be used to endorse or promote products derived
16 * from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY
19 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
21 * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
22 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
23 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
24 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
25 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
30#include "config.h"
31#include "ResourceLoader.h"
32
33#include "ApplicationCacheHost.h"
34#include "AuthenticationChallenge.h"
35#include "ContentRuleListResults.h"
36#include "DataURLDecoder.h"
37#include "DiagnosticLoggingClient.h"
38#include "DiagnosticLoggingKeys.h"
39#include "DocumentLoader.h"
40#include "Frame.h"
41#include "FrameLoader.h"
42#include "FrameLoaderClient.h"
43#include "InspectorInstrumentation.h"
44#include "LoaderStrategy.h"
45#include "Logging.h"
46#include "Page.h"
47#include "PlatformStrategies.h"
48#include "ProgressTracker.h"
49#include "ResourceError.h"
50#include "ResourceHandle.h"
51#include "SecurityOrigin.h"
52#include "SharedBuffer.h"
53#include <wtf/CompletionHandler.h>
54#include <wtf/Ref.h>
55
56#if ENABLE(CONTENT_EXTENSIONS)
57#include "UserContentController.h"
58#endif
59
60#if USE(QUICK_LOOK)
61#include "PreviewConverter.h"
62#include "PreviewLoader.h"
63#endif
64
65#undef RELEASE_LOG_IF_ALLOWED
66#define RELEASE_LOG_IF_ALLOWED(fmt, ...) RELEASE_LOG_IF(isAlwaysOnLoggingAllowed(), Network, "%p - ResourceLoader::" fmt, this, ##__VA_ARGS__)
67
68namespace WebCore {
69
70ResourceLoader::ResourceLoader(Frame& frame, ResourceLoaderOptions options)
71 : m_frame { &frame }
72 , m_documentLoader { frame.loader().activeDocumentLoader() }
73 , m_defersLoading { options.defersLoadingPolicy == DefersLoadingPolicy::AllowDefersLoading && frame.page()->defersLoading() }
74 , m_options { options }
75{
76}
77
78ResourceLoader::~ResourceLoader()
79{
80 ASSERT(m_reachedTerminalState);
81}
82
83void ResourceLoader::finishNetworkLoad()
84{
85 platformStrategies()->loaderStrategy()->remove(this);
86
87 if (m_handle) {
88 ASSERT(m_handle->client() == this);
89 m_handle->clearClient();
90 m_handle = nullptr;
91 }
92}
93
94void ResourceLoader::releaseResources()
95{
96 ASSERT(!m_reachedTerminalState);
97
98 // It's possible that when we release the handle, it will be
99 // deallocated and release the last reference to this object.
100 // We need to retain to avoid accessing the object after it
101 // has been deallocated and also to avoid reentering this method.
102 Ref<ResourceLoader> protectedThis(*this);
103
104 m_frame = nullptr;
105 m_documentLoader = nullptr;
106
107 // We need to set reachedTerminalState to true before we release
108 // the resources to prevent a double dealloc of WebView <rdar://problem/4372628>
109 m_reachedTerminalState = true;
110
111 finishNetworkLoad();
112
113 m_identifier = 0;
114
115 m_resourceData = nullptr;
116 m_deferredRequest = ResourceRequest();
117}
118
119void ResourceLoader::init(ResourceRequest&& clientRequest, CompletionHandler<void(bool)>&& completionHandler)
120{
121 ASSERT(!m_handle);
122 ASSERT(m_request.isNull());
123 ASSERT(m_deferredRequest.isNull());
124 ASSERT(!m_documentLoader->isSubstituteLoadPending(this));
125
126 m_loadTiming.markStartTimeAndFetchStart();
127
128#if PLATFORM(IOS_FAMILY)
129 // If the documentLoader was detached while this ResourceLoader was waiting its turn
130 // in ResourceLoadScheduler queue, don't continue.
131 if (!m_documentLoader->frame()) {
132 cancel();
133 return completionHandler(false);
134 }
135#endif
136
137 m_defersLoading = m_options.defersLoadingPolicy == DefersLoadingPolicy::AllowDefersLoading && m_frame->page()->defersLoading();
138
139 if (m_options.securityCheck == SecurityCheckPolicy::DoSecurityCheck && !m_frame->document()->securityOrigin().canDisplay(clientRequest.url())) {
140 FrameLoader::reportLocalLoadFailed(m_frame.get(), clientRequest.url().string());
141 releaseResources();
142 return completionHandler(false);
143 }
144
145 // The various plug-in implementations call directly to ResourceLoader::load() instead of piping requests
146 // through FrameLoader. As a result, they miss the FrameLoader::addExtraFieldsToRequest() step which sets
147 // up the 1st party for cookies URL and Same-Site info. Until plug-in implementations can be reigned in
148 // to pipe through that method, we need to make sure there is always both a 1st party for cookies set and
149 // Same-Site info. See <https://bugs.webkit.org/show_bug.cgi?id=26391>.
150 if (clientRequest.firstPartyForCookies().isNull()) {
151 if (Document* document = m_frame->document())
152 clientRequest.setFirstPartyForCookies(document->firstPartyForCookies());
153 }
154 FrameLoader::addSameSiteInfoToRequestIfNeeded(clientRequest, m_frame->document());
155
156 willSendRequestInternal(WTFMove(clientRequest), ResourceResponse(), [this, protectedThis = makeRef(*this), completionHandler = WTFMove(completionHandler)](ResourceRequest&& request) mutable {
157
158#if PLATFORM(IOS_FAMILY)
159 // If this ResourceLoader was stopped as a result of willSendRequest, bail out.
160 if (m_reachedTerminalState)
161 return completionHandler(false);
162#endif
163
164 if (request.isNull()) {
165 cancel();
166 return completionHandler(false);
167 }
168
169 m_request = WTFMove(request);
170 m_originalRequest = m_request;
171 completionHandler(true);
172 });
173}
174
175void ResourceLoader::deliverResponseAndData(const ResourceResponse& response, RefPtr<SharedBuffer>&& buffer)
176{
177 didReceiveResponse(response, [this, protectedThis = makeRef(*this), buffer = WTFMove(buffer)]() mutable {
178 if (reachedTerminalState())
179 return;
180
181 if (buffer) {
182 unsigned size = buffer->size();
183 didReceiveBuffer(buffer.releaseNonNull(), size, DataPayloadWholeResource);
184 if (reachedTerminalState())
185 return;
186 }
187
188 NetworkLoadMetrics emptyMetrics;
189 didFinishLoading(emptyMetrics);
190 });
191}
192
193void ResourceLoader::start()
194{
195 ASSERT(!m_handle);
196 ASSERT(!m_request.isNull());
197 ASSERT(m_deferredRequest.isNull());
198 ASSERT(frameLoader());
199
200#if ENABLE(WEB_ARCHIVE) || ENABLE(MHTML)
201 if (m_documentLoader->scheduleArchiveLoad(*this, m_request))
202 return;
203#endif
204
205 if (m_documentLoader->applicationCacheHost().maybeLoadResource(*this, m_request, m_request.url()))
206 return;
207
208 if (m_defersLoading) {
209 m_deferredRequest = m_request;
210 return;
211 }
212
213 if (m_reachedTerminalState)
214 return;
215
216 if (m_request.url().protocolIsData()) {
217 loadDataURL();
218 return;
219 }
220
221#if USE(SOUP)
222 if (m_request.url().protocolIs("resource")) {
223 loadGResource();
224 return;
225 }
226#endif
227
228 m_handle = ResourceHandle::create(frameLoader()->networkingContext(), m_request, this, m_defersLoading, m_options.sniffContent == ContentSniffingPolicy::SniffContent, m_options.sniffContentEncoding == ContentEncodingSniffingPolicy::Sniff);
229}
230
231void ResourceLoader::setDefersLoading(bool defers)
232{
233 if (m_options.defersLoadingPolicy == DefersLoadingPolicy::DisallowDefersLoading)
234 return;
235
236 m_defersLoading = defers;
237 if (m_handle)
238 m_handle->setDefersLoading(defers);
239
240 platformStrategies()->loaderStrategy()->setDefersLoading(*this, defers);
241}
242
243FrameLoader* ResourceLoader::frameLoader() const
244{
245 if (!m_frame)
246 return nullptr;
247 return &m_frame->loader();
248}
249
250void ResourceLoader::loadDataURL()
251{
252 auto url = m_request.url();
253 ASSERT(url.protocolIsData());
254
255 DataURLDecoder::ScheduleContext scheduleContext;
256#if HAVE(RUNLOOP_TIMER)
257 if (auto* scheduledPairs = m_frame->page()->scheduledRunLoopPairs())
258 scheduleContext.scheduledPairs = *scheduledPairs;
259#endif
260 DataURLDecoder::decode(url, scheduleContext, [this, protectedThis = makeRef(*this), url](auto decodeResult) mutable {
261 if (this->reachedTerminalState())
262 return;
263 if (!decodeResult) {
264 RELEASE_LOG_IF_ALLOWED("loadDataURL: decoding of data failed (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
265 protectedThis->didFail(ResourceError(errorDomainWebKitInternal, 0, url, "Data URL decoding failed"));
266 return;
267 }
268 if (this->wasCancelled())
269 return;
270 auto& result = decodeResult.value();
271 auto dataSize = result.data ? result.data->size() : 0;
272
273 ResourceResponse dataResponse { url, result.mimeType, static_cast<long long>(dataSize), result.charset };
274 dataResponse.setHTTPStatusCode(200);
275 dataResponse.setHTTPStatusText("OK"_s);
276 dataResponse.setHTTPHeaderField(HTTPHeaderName::ContentType, result.contentType);
277 dataResponse.setSource(ResourceResponse::Source::Network);
278 this->didReceiveResponse(dataResponse, [this, protectedThis = WTFMove(protectedThis), dataSize, data = result.data.releaseNonNull()]() mutable {
279 if (!this->reachedTerminalState() && dataSize)
280 this->didReceiveBuffer(WTFMove(data), dataSize, DataPayloadWholeResource);
281
282 if (!this->reachedTerminalState()) {
283 NetworkLoadMetrics emptyMetrics;
284 this->didFinishLoading(emptyMetrics);
285 }
286 });
287 });
288}
289
290void ResourceLoader::setDataBufferingPolicy(DataBufferingPolicy dataBufferingPolicy)
291{
292 m_options.dataBufferingPolicy = dataBufferingPolicy;
293
294 // Reset any already buffered data
295 if (dataBufferingPolicy == DataBufferingPolicy::DoNotBufferData)
296 m_resourceData = nullptr;
297}
298
299void ResourceLoader::willSwitchToSubstituteResource()
300{
301 ASSERT(!m_documentLoader->isSubstituteLoadPending(this));
302 platformStrategies()->loaderStrategy()->remove(this);
303 if (m_handle)
304 m_handle->cancel();
305}
306
307void ResourceLoader::addDataOrBuffer(const char* data, unsigned length, SharedBuffer* buffer, DataPayloadType dataPayloadType)
308{
309 if (m_options.dataBufferingPolicy == DataBufferingPolicy::DoNotBufferData)
310 return;
311
312 if (!m_resourceData || dataPayloadType == DataPayloadWholeResource) {
313 if (buffer)
314 m_resourceData = buffer;
315 else
316 m_resourceData = SharedBuffer::create(data, length);
317 return;
318 }
319
320 if (buffer)
321 m_resourceData->append(*buffer);
322 else
323 m_resourceData->append(data, length);
324}
325
326void ResourceLoader::clearResourceData()
327{
328 if (m_resourceData)
329 m_resourceData->clear();
330}
331
332bool ResourceLoader::isSubresourceLoader() const
333{
334 return false;
335}
336
337void ResourceLoader::willSendRequestInternal(ResourceRequest&& request, const ResourceResponse& redirectResponse, CompletionHandler<void(ResourceRequest&&)>&& completionHandler)
338{
339 // Protect this in this delegate method since the additional processing can do
340 // anything including possibly derefing this; one example of this is Radar 3266216.
341 Ref<ResourceLoader> protectedThis(*this);
342
343 ASSERT(!m_reachedTerminalState);
344#if ENABLE(CONTENT_EXTENSIONS)
345 ASSERT(m_resourceType != ContentExtensions::ResourceType::Invalid);
346#endif
347
348 // We need a resource identifier for all requests, even if FrameLoader is never going to see it (such as with CORS preflight requests).
349 bool createdResourceIdentifier = false;
350 if (!m_identifier) {
351 m_identifier = m_frame->page()->progress().createUniqueIdentifier();
352 createdResourceIdentifier = true;
353 }
354
355#if ENABLE(CONTENT_EXTENSIONS)
356 if (!redirectResponse.isNull() && frameLoader()) {
357 Page* page = frameLoader()->frame().page();
358 if (page && m_documentLoader) {
359 auto results = page->userContentProvider().processContentRuleListsForLoad(request.url(), m_resourceType, *m_documentLoader);
360 bool blockedLoad = results.summary.blockedLoad;
361 ContentExtensions::applyResultsToRequest(WTFMove(results), page, request);
362 if (blockedLoad) {
363 RELEASE_LOG_IF_ALLOWED("willSendRequestinternal: resource load canceled because of content blocker (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
364 didFail(blockedByContentBlockerError());
365 completionHandler({ });
366 return;
367 }
368 }
369 }
370#endif
371
372 if (request.isNull()) {
373 RELEASE_LOG_IF_ALLOWED("willSendRequestinternal: resource load canceled because of empty request (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
374 didFail(cannotShowURLError());
375 completionHandler({ });
376 return;
377 }
378
379 if (m_options.sendLoadCallbacks == SendCallbackPolicy::SendCallbacks) {
380 if (createdResourceIdentifier)
381 frameLoader()->notifier().assignIdentifierToInitialRequest(m_identifier, documentLoader(), request);
382
383#if PLATFORM(IOS_FAMILY)
384 // If this ResourceLoader was stopped as a result of assignIdentifierToInitialRequest, bail out
385 if (m_reachedTerminalState) {
386 completionHandler(WTFMove(request));
387 return;
388 }
389#endif
390
391 frameLoader()->notifier().willSendRequest(this, request, redirectResponse);
392 }
393 else
394 InspectorInstrumentation::willSendRequest(m_frame.get(), m_identifier, m_frame->loader().documentLoader(), request, redirectResponse);
395
396#if USE(QUICK_LOOK)
397 if (auto previewConverter = m_documentLoader->previewConverter())
398 request = previewConverter->safeRequest(request);
399#endif
400
401 bool isRedirect = !redirectResponse.isNull();
402 if (isRedirect)
403 platformStrategies()->loaderStrategy()->crossOriginRedirectReceived(this, request.url());
404
405 m_request = request;
406
407 if (isRedirect) {
408 auto& redirectURL = request.url();
409 if (!m_documentLoader->isCommitted())
410 frameLoader()->client().dispatchDidReceiveServerRedirectForProvisionalLoad();
411
412 if (redirectURL.protocolIsData()) {
413 // Handle data URL decoding locally.
414 finishNetworkLoad();
415 loadDataURL();
416 }
417 }
418 completionHandler(WTFMove(request));
419}
420
421void ResourceLoader::willSendRequest(ResourceRequest&& request, const ResourceResponse& redirectResponse, CompletionHandler<void(ResourceRequest&&)>&& completionHandler)
422{
423 willSendRequestInternal(WTFMove(request), redirectResponse, WTFMove(completionHandler));
424}
425
426void ResourceLoader::didSendData(unsigned long long, unsigned long long)
427{
428}
429
430static void logResourceResponseSource(Frame* frame, ResourceResponse::Source source)
431{
432 if (!frame || !frame->page())
433 return;
434
435 String sourceKey;
436 switch (source) {
437 case ResourceResponse::Source::Network:
438 sourceKey = DiagnosticLoggingKeys::networkKey();
439 break;
440 case ResourceResponse::Source::DiskCache:
441 sourceKey = DiagnosticLoggingKeys::diskCacheKey();
442 break;
443 case ResourceResponse::Source::DiskCacheAfterValidation:
444 sourceKey = DiagnosticLoggingKeys::diskCacheAfterValidationKey();
445 break;
446 case ResourceResponse::Source::ServiceWorker:
447 sourceKey = DiagnosticLoggingKeys::serviceWorkerKey();
448 break;
449 case ResourceResponse::Source::MemoryCache:
450 case ResourceResponse::Source::MemoryCacheAfterValidation:
451 case ResourceResponse::Source::ApplicationCache:
452 case ResourceResponse::Source::Unknown:
453 return;
454 }
455
456 frame->page()->diagnosticLoggingClient().logDiagnosticMessage(DiagnosticLoggingKeys::resourceResponseSourceKey(), sourceKey, ShouldSample::Yes);
457}
458
459bool ResourceLoader::shouldAllowResourceToAskForCredentials() const
460{
461 return m_canCrossOriginRequestsAskUserForCredentials || m_frame->tree().top().document()->securityOrigin().canRequest(m_request.url());
462}
463
464void ResourceLoader::didBlockAuthenticationChallenge()
465{
466 m_wasAuthenticationChallengeBlocked = true;
467 if (m_options.clientCredentialPolicy == ClientCredentialPolicy::CannotAskClientForCredentials)
468 return;
469 ASSERT(!shouldAllowResourceToAskForCredentials());
470 FrameLoader::reportAuthenticationChallengeBlocked(m_frame.get(), m_request.url(), "it is a cross-origin request"_s);
471}
472
473void ResourceLoader::didReceiveResponse(const ResourceResponse& r, CompletionHandler<void()>&& policyCompletionHandler)
474{
475 ASSERT(!m_reachedTerminalState);
476 CompletionHandlerCallingScope completionHandlerCaller(WTFMove(policyCompletionHandler));
477
478 // Protect this in this delegate method since the additional processing can do
479 // anything including possibly derefing this; one example of this is Radar 3266216.
480 Ref<ResourceLoader> protectedThis(*this);
481
482 logResourceResponseSource(m_frame.get(), r.source());
483
484 m_response = r;
485
486 if (FormData* data = m_request.httpBody())
487 data->removeGeneratedFilesIfNeeded();
488
489 if (m_options.sendLoadCallbacks == SendCallbackPolicy::SendCallbacks)
490 frameLoader()->notifier().didReceiveResponse(this, m_response);
491}
492
493void ResourceLoader::didReceiveData(const char* data, unsigned length, long long encodedDataLength, DataPayloadType dataPayloadType)
494{
495 // The following assertions are not quite valid here, since a subclass
496 // might override didReceiveData in a way that invalidates them. This
497 // happens with the steps listed in 3266216
498 // ASSERT(con == connection);
499 // ASSERT(!m_reachedTerminalState);
500
501 didReceiveDataOrBuffer(data, length, nullptr, encodedDataLength, dataPayloadType);
502}
503
504void ResourceLoader::didReceiveBuffer(Ref<SharedBuffer>&& buffer, long long encodedDataLength, DataPayloadType dataPayloadType)
505{
506 didReceiveDataOrBuffer(nullptr, 0, WTFMove(buffer), encodedDataLength, dataPayloadType);
507}
508
509void ResourceLoader::didReceiveDataOrBuffer(const char* data, unsigned length, RefPtr<SharedBuffer>&& buffer, long long encodedDataLength, DataPayloadType dataPayloadType)
510{
511 // This method should only get data+length *OR* a SharedBuffer.
512 ASSERT(!buffer || (!data && !length));
513
514 // Protect this in this delegate method since the additional processing can do
515 // anything including possibly derefing this; one example of this is Radar 3266216.
516 Ref<ResourceLoader> protectedThis(*this);
517
518 addDataOrBuffer(data, length, buffer.get(), dataPayloadType);
519
520 // FIXME: If we get a resource with more than 2B bytes, this code won't do the right thing.
521 // However, with today's computers and networking speeds, this won't happen in practice.
522 // Could be an issue with a giant local file.
523 if (m_options.sendLoadCallbacks == SendCallbackPolicy::SendCallbacks && m_frame)
524 frameLoader()->notifier().didReceiveData(this, buffer ? buffer->data() : data, buffer ? buffer->size() : length, static_cast<int>(encodedDataLength));
525}
526
527void ResourceLoader::didFinishLoading(const NetworkLoadMetrics& networkLoadMetrics)
528{
529 RELEASE_LOG_IF_ALLOWED("didFinishLoading: (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
530
531 didFinishLoadingOnePart(networkLoadMetrics);
532
533 // If the load has been cancelled by a delegate in response to didFinishLoad(), do not release
534 // the resources a second time, they have been released by cancel.
535 if (wasCancelled())
536 return;
537 releaseResources();
538}
539
540void ResourceLoader::didFinishLoadingOnePart(const NetworkLoadMetrics& networkLoadMetrics)
541{
542 // If load has been cancelled after finishing (which could happen with a
543 // JavaScript that changes the window location), do nothing.
544 if (wasCancelled())
545 return;
546 ASSERT(!m_reachedTerminalState);
547
548 if (m_notifiedLoadComplete)
549 return;
550 m_notifiedLoadComplete = true;
551 if (m_options.sendLoadCallbacks == SendCallbackPolicy::SendCallbacks)
552 frameLoader()->notifier().didFinishLoad(this, networkLoadMetrics);
553}
554
555void ResourceLoader::didFail(const ResourceError& error)
556{
557 RELEASE_LOG_IF_ALLOWED("didFail: (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
558
559 if (wasCancelled())
560 return;
561 ASSERT(!m_reachedTerminalState);
562
563 // Protect this in this delegate method since the additional processing can do
564 // anything including possibly derefing this; one example of this is Radar 3266216.
565 Ref<ResourceLoader> protectedThis(*this);
566
567 cleanupForError(error);
568 releaseResources();
569}
570
571void ResourceLoader::cleanupForError(const ResourceError& error)
572{
573 if (FormData* data = m_request.httpBody())
574 data->removeGeneratedFilesIfNeeded();
575
576 if (m_notifiedLoadComplete)
577 return;
578 m_notifiedLoadComplete = true;
579 if (m_options.sendLoadCallbacks == SendCallbackPolicy::SendCallbacks && m_identifier)
580 frameLoader()->notifier().didFailToLoad(this, error);
581}
582
583void ResourceLoader::cancel()
584{
585 cancel(ResourceError());
586}
587
588void ResourceLoader::cancel(const ResourceError& error)
589{
590 // If the load has already completed - succeeded, failed, or previously cancelled - do nothing.
591 if (m_reachedTerminalState)
592 return;
593
594 ResourceError nonNullError = error.isNull() ? cancelledError() : error;
595
596 // willCancel() and didFailToLoad() both call out to clients that might do
597 // something causing the last reference to this object to go away.
598 Ref<ResourceLoader> protectedThis(*this);
599
600 // If we re-enter cancel() from inside willCancel(), we want to pick up from where we left
601 // off without re-running willCancel()
602 if (m_cancellationStatus == NotCancelled) {
603 m_cancellationStatus = CalledWillCancel;
604
605 willCancel(nonNullError);
606 }
607
608 // If we re-enter cancel() from inside didFailToLoad(), we want to pick up from where we
609 // left off without redoing any of this work.
610 if (m_cancellationStatus == CalledWillCancel) {
611 m_cancellationStatus = Cancelled;
612
613 if (m_handle)
614 m_handle->clearAuthentication();
615
616 m_documentLoader->cancelPendingSubstituteLoad(this);
617 if (m_handle) {
618 m_handle->cancel();
619 m_handle = nullptr;
620 }
621 cleanupForError(nonNullError);
622 }
623
624 // If cancel() completed from within the call to willCancel() or didFailToLoad(),
625 // we don't want to redo didCancel() or releasesResources().
626 if (m_reachedTerminalState)
627 return;
628
629 didCancel(nonNullError);
630
631 if (m_cancellationStatus == FinishedCancel)
632 return;
633 m_cancellationStatus = FinishedCancel;
634
635 releaseResources();
636}
637
638ResourceError ResourceLoader::cancelledError()
639{
640 return frameLoader()->cancelledError(m_request);
641}
642
643ResourceError ResourceLoader::blockedError()
644{
645 return frameLoader()->client().blockedError(m_request);
646}
647
648ResourceError ResourceLoader::blockedByContentBlockerError()
649{
650 return frameLoader()->client().blockedByContentBlockerError(m_request);
651}
652
653ResourceError ResourceLoader::cannotShowURLError()
654{
655 return frameLoader()->client().cannotShowURLError(m_request);
656}
657
658void ResourceLoader::willSendRequestAsync(ResourceHandle* handle, ResourceRequest&& request, ResourceResponse&& redirectResponse, CompletionHandler<void(ResourceRequest&&)>&& completionHandler)
659{
660 RefPtr<ResourceHandle> protectedHandle(handle);
661 if (documentLoader()->applicationCacheHost().maybeLoadFallbackForRedirect(this, request, redirectResponse)) {
662 RELEASE_LOG_IF_ALLOWED("willSendRequestAsync: exiting early because maybeLoadFallbackForRedirect returned false (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
663 completionHandler(WTFMove(request));
664 return;
665 }
666 willSendRequestInternal(WTFMove(request), redirectResponse, WTFMove(completionHandler));
667}
668
669void ResourceLoader::didSendData(ResourceHandle*, unsigned long long bytesSent, unsigned long long totalBytesToBeSent)
670{
671 didSendData(bytesSent, totalBytesToBeSent);
672}
673
674void ResourceLoader::didReceiveResponseAsync(ResourceHandle*, ResourceResponse&& response, CompletionHandler<void()>&& completionHandler)
675{
676 if (documentLoader()->applicationCacheHost().maybeLoadFallbackForResponse(this, response)) {
677 completionHandler();
678 return;
679 }
680 didReceiveResponse(response, WTFMove(completionHandler));
681}
682
683void ResourceLoader::didReceiveData(ResourceHandle*, const char* data, unsigned length, int encodedDataLength)
684{
685 didReceiveData(data, length, encodedDataLength, DataPayloadBytes);
686}
687
688void ResourceLoader::didReceiveBuffer(ResourceHandle*, Ref<SharedBuffer>&& buffer, int encodedDataLength)
689{
690 didReceiveBuffer(WTFMove(buffer), encodedDataLength, DataPayloadBytes);
691}
692
693void ResourceLoader::didFinishLoading(ResourceHandle*)
694{
695 NetworkLoadMetrics emptyMetrics;
696 didFinishLoading(emptyMetrics);
697}
698
699void ResourceLoader::didFail(ResourceHandle*, const ResourceError& error)
700{
701 if (documentLoader()->applicationCacheHost().maybeLoadFallbackForError(this, error))
702 return;
703 didFail(error);
704}
705
706void ResourceLoader::wasBlocked(ResourceHandle*)
707{
708 RELEASE_LOG_IF_ALLOWED("wasBlocked: resource load canceled because of content blocker (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
709 didFail(blockedError());
710}
711
712void ResourceLoader::cannotShowURL(ResourceHandle*)
713{
714 RELEASE_LOG_IF_ALLOWED("wasBlocked: resource load canceled because of invalid URL (frame = %p, frameLoader = %p, resourceID = %lu)", frame(), frameLoader(), identifier());
715 didFail(cannotShowURLError());
716}
717
718bool ResourceLoader::shouldUseCredentialStorage()
719{
720 if (m_options.storedCredentialsPolicy != StoredCredentialsPolicy::Use)
721 return false;
722
723 Ref<ResourceLoader> protectedThis(*this);
724 return frameLoader()->client().shouldUseCredentialStorage(documentLoader(), identifier());
725}
726
727bool ResourceLoader::isAllowedToAskUserForCredentials() const
728{
729 if (m_options.clientCredentialPolicy == ClientCredentialPolicy::CannotAskClientForCredentials)
730 return false;
731 if (!shouldAllowResourceToAskForCredentials())
732 return false;
733 return m_options.credentials == FetchOptions::Credentials::Include || (m_options.credentials == FetchOptions::Credentials::SameOrigin && m_frame->document()->securityOrigin().canRequest(originalRequest().url()));
734}
735
736bool ResourceLoader::shouldIncludeCertificateInfo() const
737{
738 if (m_options.certificateInfoPolicy == CertificateInfoPolicy::IncludeCertificateInfo)
739 return true;
740 if (UNLIKELY(InspectorInstrumentation::hasFrontends()))
741 return true;
742 return false;
743}
744
745void ResourceLoader::didReceiveAuthenticationChallenge(ResourceHandle* handle, const AuthenticationChallenge& challenge)
746{
747 ASSERT_UNUSED(handle, handle == m_handle);
748 ASSERT(m_handle->hasAuthenticationChallenge());
749
750 // Protect this in this delegate method since the additional processing can do
751 // anything including possibly derefing this; one example of this is Radar 3266216.
752 Ref<ResourceLoader> protectedThis(*this);
753
754 if (m_options.storedCredentialsPolicy == StoredCredentialsPolicy::Use) {
755 if (isAllowedToAskUserForCredentials()) {
756 frameLoader()->notifier().didReceiveAuthenticationChallenge(this, challenge);
757 return;
758 }
759 didBlockAuthenticationChallenge();
760 }
761 challenge.authenticationClient()->receivedRequestToContinueWithoutCredential(challenge);
762 ASSERT(!m_handle || !m_handle->hasAuthenticationChallenge());
763}
764
765#if USE(PROTECTION_SPACE_AUTH_CALLBACK)
766void ResourceLoader::canAuthenticateAgainstProtectionSpaceAsync(ResourceHandle*, const ProtectionSpace& protectionSpace, CompletionHandler<void(bool)>&& completionHandler)
767{
768 completionHandler(canAuthenticateAgainstProtectionSpace(protectionSpace));
769}
770
771bool ResourceLoader::canAuthenticateAgainstProtectionSpace(const ProtectionSpace& protectionSpace)
772{
773 Ref<ResourceLoader> protectedThis(*this);
774 return frameLoader()->client().canAuthenticateAgainstProtectionSpace(documentLoader(), identifier(), protectionSpace);
775}
776
777#endif
778
779#if PLATFORM(IOS_FAMILY)
780
781RetainPtr<CFDictionaryRef> ResourceLoader::connectionProperties(ResourceHandle*)
782{
783 return frameLoader()->connectionProperties(this);
784}
785
786#endif
787
788void ResourceLoader::receivedCancellation(const AuthenticationChallenge&)
789{
790 cancel();
791}
792
793#if PLATFORM(COCOA)
794
795void ResourceLoader::schedule(SchedulePair& pair)
796{
797 if (m_handle)
798 m_handle->schedule(pair);
799}
800
801void ResourceLoader::unschedule(SchedulePair& pair)
802{
803 if (m_handle)
804 m_handle->unschedule(pair);
805}
806
807#endif
808
809#if USE(QUICK_LOOK)
810bool ResourceLoader::isQuickLookResource() const
811{
812 return !!m_previewLoader;
813}
814#endif
815
816bool ResourceLoader::isAlwaysOnLoggingAllowed() const
817{
818 return frameLoader() && frameLoader()->isAlwaysOnLoggingAllowed();
819}
820
821}
822