1 | /* |
2 | * Copyright (C) 2013 Apple Inc. All rights reserved. |
3 | * Copyright (C) 2013 University of Szeged. All rights reserved. |
4 | * Copyright (C) 2016 Igalia S.L. |
5 | * Copyright (C) 2017 Endless Mobile, Inc. |
6 | * |
7 | * Redistribution and use in source and binary forms, with or without |
8 | * modification, are permitted provided that the following conditions |
9 | * are met: |
10 | * 1. Redistributions of source code must retain the above copyright |
11 | * notice, this list of conditions and the following disclaimer. |
12 | * 2. Redistributions in binary form must reproduce the above copyright |
13 | * notice, this list of conditions and the following disclaimer in the |
14 | * documentation and/or other materials provided with the distribution. |
15 | * |
16 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS ``AS IS'' |
17 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, |
18 | * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
19 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS |
20 | * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
21 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
22 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
23 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
24 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
25 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF |
26 | * THE POSSIBILITY OF SUCH DAMAGE. |
27 | */ |
28 | |
29 | #include "config.h" |
30 | #include "NetworkStorageSession.h" |
31 | |
32 | #if USE(SOUP) |
33 | |
34 | #include "Cookie.h" |
35 | #include "CookieRequestHeaderFieldProxy.h" |
36 | #include "GUniquePtrSoup.h" |
37 | #include "ResourceHandle.h" |
38 | #include "SoupNetworkSession.h" |
39 | #include "URLSoup.h" |
40 | #include <libsoup/soup.h> |
41 | #include <wtf/DateMath.h> |
42 | #include <wtf/MainThread.h> |
43 | #include <wtf/NeverDestroyed.h> |
44 | #include <wtf/glib/GUniquePtr.h> |
45 | |
46 | #if USE(LIBSECRET) |
47 | #include "GRefPtrGtk.h" |
48 | #include <glib/gi18n-lib.h> |
49 | #define SECRET_WITH_UNSTABLE 1 |
50 | #define SECRET_API_SUBJECT_TO_CHANGE 1 |
51 | #include <libsecret/secret.h> |
52 | #endif |
53 | |
54 | namespace WebCore { |
55 | |
56 | NetworkStorageSession::NetworkStorageSession(PAL::SessionID sessionID, std::unique_ptr<SoupNetworkSession>&& session) |
57 | : m_sessionID(sessionID) |
58 | , m_session(WTFMove(session)) |
59 | { |
60 | ASSERT(m_session->cookieJar()); |
61 | g_signal_connect_swapped(m_session->cookieJar(), "changed" , G_CALLBACK(cookiesDidChange), this); |
62 | } |
63 | |
64 | NetworkStorageSession::~NetworkStorageSession() |
65 | { |
66 | clearSoupNetworkSession(); |
67 | } |
68 | |
69 | SoupNetworkSession& NetworkStorageSession::soupNetworkSession() const |
70 | { |
71 | ASSERT(m_session); |
72 | return *m_session.get(); |
73 | }; |
74 | |
75 | void NetworkStorageSession::clearSoupNetworkSession() |
76 | { |
77 | if (m_session) { |
78 | ASSERT(m_session->cookieJar()); |
79 | g_signal_handlers_disconnect_matched(m_session->cookieJar(), G_SIGNAL_MATCH_DATA, 0, 0, nullptr, nullptr, this); |
80 | } |
81 | |
82 | m_session = nullptr; |
83 | m_cookieObserverHandler = nullptr; |
84 | } |
85 | |
86 | void NetworkStorageSession::cookiesDidChange(NetworkStorageSession* session) |
87 | { |
88 | if (session->m_cookieObserverHandler) |
89 | session->m_cookieObserverHandler(); |
90 | } |
91 | |
92 | SoupCookieJar* NetworkStorageSession::cookieStorage() const |
93 | { |
94 | ASSERT(m_session); |
95 | ASSERT(m_session->cookieJar()); |
96 | return m_session->cookieJar(); |
97 | } |
98 | |
99 | void NetworkStorageSession::setCookieStorage(SoupCookieJar* jar) |
100 | { |
101 | ASSERT(jar); |
102 | ASSERT(m_session); |
103 | ASSERT(m_session->cookieJar()); |
104 | |
105 | if (m_session->cookieJar() == jar) |
106 | return; |
107 | |
108 | g_signal_handlers_disconnect_matched(m_session->cookieJar(), G_SIGNAL_MATCH_DATA, 0, 0, nullptr, nullptr, this); |
109 | m_session->setCookieJar(jar); |
110 | g_signal_connect_swapped(m_session->cookieJar(), "changed" , G_CALLBACK(cookiesDidChange), this); |
111 | } |
112 | |
113 | void NetworkStorageSession::setCookieObserverHandler(Function<void ()>&& handler) |
114 | { |
115 | m_cookieObserverHandler = WTFMove(handler); |
116 | } |
117 | |
118 | #if USE(LIBSECRET) |
119 | static const char* schemeFromProtectionSpaceServerType(ProtectionSpaceServerType serverType) |
120 | { |
121 | switch (serverType) { |
122 | case ProtectionSpaceServerHTTP: |
123 | case ProtectionSpaceProxyHTTP: |
124 | return SOUP_URI_SCHEME_HTTP; |
125 | case ProtectionSpaceServerHTTPS: |
126 | case ProtectionSpaceProxyHTTPS: |
127 | return SOUP_URI_SCHEME_HTTPS; |
128 | case ProtectionSpaceServerFTP: |
129 | case ProtectionSpaceProxyFTP: |
130 | return SOUP_URI_SCHEME_FTP; |
131 | case ProtectionSpaceServerFTPS: |
132 | case ProtectionSpaceProxySOCKS: |
133 | break; |
134 | } |
135 | |
136 | ASSERT_NOT_REACHED(); |
137 | return SOUP_URI_SCHEME_HTTP; |
138 | } |
139 | |
140 | static const char* authTypeFromProtectionSpaceAuthenticationScheme(ProtectionSpaceAuthenticationScheme scheme) |
141 | { |
142 | switch (scheme) { |
143 | case ProtectionSpaceAuthenticationSchemeDefault: |
144 | case ProtectionSpaceAuthenticationSchemeHTTPBasic: |
145 | return "Basic" ; |
146 | case ProtectionSpaceAuthenticationSchemeHTTPDigest: |
147 | return "Digest" ; |
148 | case ProtectionSpaceAuthenticationSchemeNTLM: |
149 | return "NTLM" ; |
150 | case ProtectionSpaceAuthenticationSchemeNegotiate: |
151 | return "Negotiate" ; |
152 | case ProtectionSpaceAuthenticationSchemeHTMLForm: |
153 | case ProtectionSpaceAuthenticationSchemeClientCertificateRequested: |
154 | case ProtectionSpaceAuthenticationSchemeServerTrustEvaluationRequested: |
155 | ASSERT_NOT_REACHED(); |
156 | break; |
157 | case ProtectionSpaceAuthenticationSchemeOAuth: |
158 | return "OAuth" ; |
159 | case ProtectionSpaceAuthenticationSchemeUnknown: |
160 | return "unknown" ; |
161 | } |
162 | |
163 | ASSERT_NOT_REACHED(); |
164 | return "unknown" ; |
165 | } |
166 | |
167 | struct SecretServiceSearchData { |
168 | SecretServiceSearchData(GCancellable* cancellable, Function<void (Credential&&)>&& completionHandler) |
169 | : cancellable(cancellable) |
170 | , completionHandler(WTFMove(completionHandler)) |
171 | { |
172 | } |
173 | |
174 | ~SecretServiceSearchData() = default; |
175 | |
176 | GRefPtr<GCancellable> cancellable; |
177 | Function<void (Credential&&)> completionHandler; |
178 | }; |
179 | #endif // USE(LIBSECRET) |
180 | |
181 | void NetworkStorageSession::getCredentialFromPersistentStorage(const ProtectionSpace& protectionSpace, GCancellable* cancellable, Function<void (Credential&&)>&& completionHandler) |
182 | { |
183 | #if USE(LIBSECRET) |
184 | if (m_sessionID.isEphemeral()) { |
185 | completionHandler({ }); |
186 | return; |
187 | } |
188 | |
189 | const String& realm = protectionSpace.realm(); |
190 | if (realm.isEmpty()) { |
191 | completionHandler({ }); |
192 | return; |
193 | } |
194 | |
195 | GRefPtr<GHashTable> attributes = adoptGRef(secret_attributes_build(SECRET_SCHEMA_COMPAT_NETWORK, |
196 | "domain" , realm.utf8().data(), |
197 | "server" , protectionSpace.host().utf8().data(), |
198 | "port" , protectionSpace.port(), |
199 | "protocol" , schemeFromProtectionSpaceServerType(protectionSpace.serverType()), |
200 | "authtype" , authTypeFromProtectionSpaceAuthenticationScheme(protectionSpace.authenticationScheme()), |
201 | nullptr)); |
202 | if (!attributes) { |
203 | completionHandler({ }); |
204 | return; |
205 | } |
206 | |
207 | auto data = std::make_unique<SecretServiceSearchData>(cancellable, WTFMove(completionHandler)); |
208 | secret_service_search(nullptr, SECRET_SCHEMA_COMPAT_NETWORK, attributes.get(), |
209 | static_cast<SecretSearchFlags>(SECRET_SEARCH_UNLOCK | SECRET_SEARCH_LOAD_SECRETS), cancellable, |
210 | [](GObject* source, GAsyncResult* result, gpointer userData) { |
211 | auto data = std::unique_ptr<SecretServiceSearchData>(static_cast<SecretServiceSearchData*>(userData)); |
212 | GUniqueOutPtr<GError> error; |
213 | GUniquePtr<GList> elements(secret_service_search_finish(SECRET_SERVICE(source), result, &error.outPtr())); |
214 | if (g_cancellable_is_cancelled(data->cancellable.get()) || error || !elements || !elements->data) { |
215 | data->completionHandler({ }); |
216 | return; |
217 | } |
218 | |
219 | GRefPtr<SecretItem> secretItem = static_cast<SecretItem*>(elements->data); |
220 | g_list_foreach(elements.get(), reinterpret_cast<GFunc>(reinterpret_cast<GCallback>(g_object_unref)), nullptr); |
221 | GRefPtr<GHashTable> attributes = adoptGRef(secret_item_get_attributes(secretItem.get())); |
222 | String user = String::fromUTF8(static_cast<const char*>(g_hash_table_lookup(attributes.get(), "user" ))); |
223 | if (user.isEmpty()) { |
224 | data->completionHandler({ }); |
225 | return; |
226 | } |
227 | |
228 | size_t length; |
229 | GRefPtr<SecretValue> secretValue = adoptGRef(secret_item_get_secret(secretItem.get())); |
230 | const char* passwordData = secret_value_get(secretValue.get(), &length); |
231 | data->completionHandler(Credential(user, String::fromUTF8(passwordData, length), CredentialPersistencePermanent)); |
232 | }, data.release()); |
233 | #else |
234 | UNUSED_PARAM(protectionSpace); |
235 | UNUSED_PARAM(cancellable); |
236 | completionHandler({ }); |
237 | #endif |
238 | } |
239 | |
240 | void NetworkStorageSession::saveCredentialToPersistentStorage(const ProtectionSpace& protectionSpace, const Credential& credential) |
241 | { |
242 | #if USE(LIBSECRET) |
243 | if (m_sessionID.isEphemeral()) |
244 | return; |
245 | |
246 | if (credential.isEmpty()) |
247 | return; |
248 | |
249 | const String& realm = protectionSpace.realm(); |
250 | if (realm.isEmpty()) |
251 | return; |
252 | |
253 | GRefPtr<GHashTable> attributes = adoptGRef(secret_attributes_build(SECRET_SCHEMA_COMPAT_NETWORK, |
254 | "domain" , realm.utf8().data(), |
255 | "server" , protectionSpace.host().utf8().data(), |
256 | "port" , protectionSpace.port(), |
257 | "protocol" , schemeFromProtectionSpaceServerType(protectionSpace.serverType()), |
258 | "authtype" , authTypeFromProtectionSpaceAuthenticationScheme(protectionSpace.authenticationScheme()), |
259 | nullptr)); |
260 | if (!attributes) |
261 | return; |
262 | |
263 | g_hash_table_insert(attributes.get(), g_strdup("user" ), g_strdup(credential.user().utf8().data())); |
264 | CString utf8Password = credential.password().utf8(); |
265 | GRefPtr<SecretValue> newSecretValue = adoptGRef(secret_value_new(utf8Password.data(), utf8Password.length(), "text/plain" )); |
266 | secret_service_store(nullptr, SECRET_SCHEMA_COMPAT_NETWORK, attributes.get(), SECRET_COLLECTION_DEFAULT, _("WebKitGTK+ password" ), |
267 | newSecretValue.get(), nullptr, nullptr, nullptr); |
268 | #else |
269 | UNUSED_PARAM(protectionSpace); |
270 | UNUSED_PARAM(credential); |
271 | #endif |
272 | } |
273 | |
274 | bool NetworkStorageSession::cookiesEnabled() const |
275 | { |
276 | auto policy = soup_cookie_jar_get_accept_policy(cookieStorage()); |
277 | return policy == SOUP_COOKIE_JAR_ACCEPT_ALWAYS || policy == SOUP_COOKIE_JAR_ACCEPT_NO_THIRD_PARTY; |
278 | } |
279 | |
280 | static inline bool httpOnlyCookieExists(const GSList* cookies, const gchar* name, const gchar* path) |
281 | { |
282 | for (const GSList* iter = cookies; iter; iter = g_slist_next(iter)) { |
283 | SoupCookie* cookie = static_cast<SoupCookie*>(iter->data); |
284 | if (!strcmp(soup_cookie_get_name(cookie), name) |
285 | && !g_strcmp0(soup_cookie_get_path(cookie), path)) { |
286 | if (soup_cookie_get_http_only(cookie)) |
287 | return true; |
288 | break; |
289 | } |
290 | } |
291 | return false; |
292 | } |
293 | |
294 | void NetworkStorageSession::setCookiesFromDOM(const URL& firstParty, const SameSiteInfo&, const URL& url, Optional<uint64_t> frameID, Optional<uint64_t> pageID, const String& value) const |
295 | { |
296 | UNUSED_PARAM(frameID); |
297 | UNUSED_PARAM(pageID); |
298 | GUniquePtr<SoupURI> origin = urlToSoupURI(url); |
299 | if (!origin) |
300 | return; |
301 | |
302 | GUniquePtr<SoupURI> firstPartyURI = urlToSoupURI(firstParty); |
303 | if (!firstPartyURI) |
304 | return; |
305 | |
306 | // Get existing cookies for this origin. |
307 | SoupCookieJar* jar = cookieStorage(); |
308 | GSList* existingCookies = soup_cookie_jar_get_cookie_list(jar, origin.get(), TRUE); |
309 | |
310 | for (auto& cookieString : value.split('\n')) { |
311 | GUniquePtr<SoupCookie> cookie(soup_cookie_parse(cookieString.utf8().data(), origin.get())); |
312 | |
313 | if (!cookie) |
314 | continue; |
315 | |
316 | // Make sure the cookie is not httpOnly since such cookies should not be set from JavaScript. |
317 | if (soup_cookie_get_http_only(cookie.get())) |
318 | continue; |
319 | |
320 | // Make sure we do not overwrite httpOnly cookies from JavaScript. |
321 | if (httpOnlyCookieExists(existingCookies, soup_cookie_get_name(cookie.get()), soup_cookie_get_path(cookie.get()))) |
322 | continue; |
323 | |
324 | soup_cookie_jar_add_cookie_with_first_party(jar, firstPartyURI.get(), cookie.release()); |
325 | } |
326 | |
327 | soup_cookies_free(existingCookies); |
328 | } |
329 | |
330 | void NetworkStorageSession::setCookies(const Vector<Cookie>& cookies, const URL&, const URL&) |
331 | { |
332 | for (auto cookie : cookies) |
333 | soup_cookie_jar_add_cookie(cookieStorage(), cookie.toSoupCookie()); |
334 | } |
335 | |
336 | void NetworkStorageSession::setCookie(const Cookie& cookie) |
337 | { |
338 | soup_cookie_jar_add_cookie(cookieStorage(), cookie.toSoupCookie()); |
339 | } |
340 | |
341 | void NetworkStorageSession::deleteCookie(const Cookie& cookie) |
342 | { |
343 | GUniquePtr<SoupCookie> targetCookie(cookie.toSoupCookie()); |
344 | soup_cookie_jar_delete_cookie(cookieStorage(), targetCookie.get()); |
345 | } |
346 | |
347 | void NetworkStorageSession::deleteCookie(const URL& url, const String& name) const |
348 | { |
349 | GUniquePtr<SoupURI> uri = urlToSoupURI(url); |
350 | if (!uri) |
351 | return; |
352 | |
353 | SoupCookieJar* jar = cookieStorage(); |
354 | GUniquePtr<GSList> cookies(soup_cookie_jar_get_cookie_list(jar, uri.get(), TRUE)); |
355 | if (!cookies) |
356 | return; |
357 | |
358 | CString cookieName = name.utf8(); |
359 | bool wasDeleted = false; |
360 | for (GSList* iter = cookies.get(); iter; iter = g_slist_next(iter)) { |
361 | SoupCookie* cookie = static_cast<SoupCookie*>(iter->data); |
362 | if (!wasDeleted && cookieName == cookie->name) { |
363 | soup_cookie_jar_delete_cookie(jar, cookie); |
364 | wasDeleted = true; |
365 | } |
366 | soup_cookie_free(cookie); |
367 | } |
368 | } |
369 | |
370 | void NetworkStorageSession::deleteAllCookies() |
371 | { |
372 | SoupCookieJar* cookieJar = cookieStorage(); |
373 | GUniquePtr<GSList> cookies(soup_cookie_jar_all_cookies(cookieJar)); |
374 | for (GSList* item = cookies.get(); item; item = g_slist_next(item)) { |
375 | SoupCookie* cookie = static_cast<SoupCookie*>(item->data); |
376 | soup_cookie_jar_delete_cookie(cookieJar, cookie); |
377 | soup_cookie_free(cookie); |
378 | } |
379 | } |
380 | |
381 | void NetworkStorageSession::deleteAllCookiesModifiedSince(WallTime timestamp) |
382 | { |
383 | // FIXME: Add support for deleting cookies modified since the given timestamp. It should probably be added to libsoup. |
384 | if (timestamp == WallTime::fromRawSeconds(0)) |
385 | deleteAllCookies(); |
386 | else |
387 | g_warning("Deleting cookies modified since a given time span is not supported yet" ); |
388 | } |
389 | |
390 | void NetworkStorageSession::deleteCookiesForHostnames(const Vector<String>& hostnames, IncludeHttpOnlyCookies includeHttpOnlyCookies) |
391 | { |
392 | // FIXME: Not yet implemented. |
393 | UNUSED_PARAM(includeHttpOnlyCookies); |
394 | deleteCookiesForHostnames(hostnames); |
395 | } |
396 | |
397 | void NetworkStorageSession::deleteCookiesForHostnames(const Vector<String>& hostnames) |
398 | { |
399 | SoupCookieJar* cookieJar = cookieStorage(); |
400 | |
401 | for (const auto& hostname : hostnames) { |
402 | CString hostNameString = hostname.utf8(); |
403 | |
404 | GUniquePtr<GSList> cookies(soup_cookie_jar_all_cookies(cookieJar)); |
405 | for (GSList* item = cookies.get(); item; item = g_slist_next(item)) { |
406 | SoupCookie* cookie = static_cast<SoupCookie*>(item->data); |
407 | if (soup_cookie_domain_matches(cookie, hostNameString.data())) |
408 | soup_cookie_jar_delete_cookie(cookieJar, cookie); |
409 | soup_cookie_free(cookie); |
410 | } |
411 | } |
412 | } |
413 | |
414 | void NetworkStorageSession::getHostnamesWithCookies(HashSet<String>& hostnames) |
415 | { |
416 | GUniquePtr<GSList> cookies(soup_cookie_jar_all_cookies(cookieStorage())); |
417 | for (GSList* item = cookies.get(); item; item = g_slist_next(item)) { |
418 | SoupCookie* cookie = static_cast<SoupCookie*>(item->data); |
419 | if (cookie->domain) |
420 | hostnames.add(String::fromUTF8(cookie->domain)); |
421 | soup_cookie_free(cookie); |
422 | } |
423 | } |
424 | |
425 | Vector<Cookie> NetworkStorageSession::getAllCookies() |
426 | { |
427 | // FIXME: Implement for WK2 to use. |
428 | return { }; |
429 | } |
430 | |
431 | Vector<Cookie> NetworkStorageSession::getCookies(const URL& url) |
432 | { |
433 | Vector<Cookie> cookies; |
434 | GUniquePtr<SoupURI> uri = urlToSoupURI(url); |
435 | if (!uri) |
436 | return cookies; |
437 | |
438 | GUniquePtr<GSList> cookiesList(soup_cookie_jar_get_cookie_list(cookieStorage(), uri.get(), TRUE)); |
439 | for (GSList* item = cookiesList.get(); item; item = g_slist_next(item)) { |
440 | GUniquePtr<SoupCookie> soupCookie(static_cast<SoupCookie*>(item->data)); |
441 | cookies.append(WebCore::Cookie(soupCookie.get())); |
442 | } |
443 | |
444 | return cookies; |
445 | } |
446 | |
447 | bool NetworkStorageSession::getRawCookies(const URL& firstParty, const SameSiteInfo&, const URL& url, Optional<uint64_t> frameID, Optional<uint64_t> pageID, Vector<Cookie>& rawCookies) const |
448 | { |
449 | UNUSED_PARAM(firstParty); |
450 | UNUSED_PARAM(frameID); |
451 | UNUSED_PARAM(pageID); |
452 | rawCookies.clear(); |
453 | GUniquePtr<SoupURI> uri = urlToSoupURI(url); |
454 | if (!uri) |
455 | return false; |
456 | |
457 | GUniquePtr<GSList> cookies(soup_cookie_jar_get_cookie_list(cookieStorage(), uri.get(), TRUE)); |
458 | if (!cookies) |
459 | return false; |
460 | |
461 | for (GSList* iter = cookies.get(); iter; iter = g_slist_next(iter)) { |
462 | SoupCookie* soupCookie = static_cast<SoupCookie*>(iter->data); |
463 | Cookie cookie; |
464 | cookie.name = String::fromUTF8(soupCookie->name); |
465 | cookie.value = String::fromUTF8(soupCookie->value); |
466 | cookie.domain = String::fromUTF8(soupCookie->domain); |
467 | cookie.path = String::fromUTF8(soupCookie->path); |
468 | cookie.created = 0; |
469 | cookie.expires = soupCookie->expires ? static_cast<double>(soup_date_to_time_t(soupCookie->expires)) * 1000 : 0; |
470 | cookie.httpOnly = soupCookie->http_only; |
471 | cookie.secure = soupCookie->secure; |
472 | cookie.session = !soupCookie->expires; |
473 | rawCookies.append(WTFMove(cookie)); |
474 | soup_cookie_free(soupCookie); |
475 | } |
476 | |
477 | return true; |
478 | } |
479 | |
480 | static std::pair<String, bool> cookiesForSession(const NetworkStorageSession& session, const URL& url, bool , IncludeSecureCookies includeSecureCookies) |
481 | { |
482 | GUniquePtr<SoupURI> uri = urlToSoupURI(url); |
483 | if (!uri) |
484 | return { { }, false }; |
485 | |
486 | GSList* cookies = soup_cookie_jar_get_cookie_list(session.cookieStorage(), uri.get(), forHTTPHeader); |
487 | bool didAccessSecureCookies = false; |
488 | |
489 | // libsoup should omit secure cookies itself if the protocol is not https. |
490 | if (url.protocolIs("https" )) { |
491 | GSList* item = cookies; |
492 | while (item) { |
493 | auto cookie = static_cast<SoupCookie*>(item->data); |
494 | if (soup_cookie_get_secure(cookie)) { |
495 | didAccessSecureCookies = true; |
496 | if (includeSecureCookies == IncludeSecureCookies::No) { |
497 | GSList* next = item->next; |
498 | soup_cookie_free(static_cast<SoupCookie*>(item->data)); |
499 | cookies = g_slist_remove_link(cookies, item); |
500 | item = next; |
501 | continue; |
502 | } |
503 | } |
504 | item = item->next; |
505 | } |
506 | } |
507 | |
508 | if (!cookies) |
509 | return { { }, false }; |
510 | |
511 | GUniquePtr<char> (soup_cookies_to_cookie_header(cookies)); |
512 | soup_cookies_free(cookies); |
513 | |
514 | return { String::fromUTF8(cookieHeader.get()), didAccessSecureCookies }; |
515 | } |
516 | |
517 | std::pair<String, bool> NetworkStorageSession::cookiesForDOM(const URL& firstParty, const SameSiteInfo&, const URL& url, Optional<uint64_t> frameID, Optional<uint64_t> pageID, IncludeSecureCookies includeSecureCookies) const |
518 | { |
519 | UNUSED_PARAM(firstParty); |
520 | UNUSED_PARAM(frameID); |
521 | UNUSED_PARAM(pageID); |
522 | return cookiesForSession(*this, url, false, includeSecureCookies); |
523 | } |
524 | |
525 | std::pair<String, bool> NetworkStorageSession::(const URL& firstParty, const SameSiteInfo&, const URL& url, Optional<uint64_t> frameID, Optional<uint64_t> pageID, IncludeSecureCookies includeSecureCookies) const |
526 | { |
527 | UNUSED_PARAM(firstParty); |
528 | UNUSED_PARAM(frameID); |
529 | UNUSED_PARAM(pageID); |
530 | // Secure cookies will still only be included if url's protocol is https. |
531 | return cookiesForSession(*this, url, true, includeSecureCookies); |
532 | } |
533 | |
534 | std::pair<String, bool> NetworkStorageSession::(const CookieRequestHeaderFieldProxy& ) const |
535 | { |
536 | return cookieRequestHeaderFieldValue(headerFieldProxy.firstParty, headerFieldProxy.sameSiteInfo, headerFieldProxy.url, headerFieldProxy.frameID, headerFieldProxy.pageID, headerFieldProxy.includeSecureCookies); |
537 | } |
538 | |
539 | void NetworkStorageSession::flushCookieStore() |
540 | { |
541 | // FIXME: Implement for WK2 to use. |
542 | } |
543 | |
544 | } // namespace WebCore |
545 | |
546 | #endif // USE(SOUP) |
547 | |