blob: 6292218dda41ed2948cf051d95440557cfd3af11 [file] [log] [blame]
/*
* Copyright (C) 2016 Canon Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following disclaimer
* in the documentation and/or other materials provided with the
* distribution.
* * Neither the name of Canon Inc. nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "CrossOriginPreflightChecker.h"
#include "CachedRawResource.h"
#include "CachedResourceRequest.h"
#include "ContentSecurityPolicy.h"
#include "CrossOriginAccessControl.h"
#include "CrossOriginPreflightResultCache.h"
#include "DocumentLoader.h"
#include "DocumentPage.h"
#include "DocumentQuirks.h"
#include "DocumentResourceLoader.h"
#include "DocumentThreadableLoader.h"
#include "DocumentView.h"
#include "FrameDestructionObserverInlines.h"
#include "FrameLoader.h"
#include "InspectorInstrumentation.h"
#include "NetworkLoadMetrics.h"
#include "SharedBuffer.h"
#include <wtf/text/MakeString.h>
namespace WebCore {
Ref<CrossOriginPreflightChecker> CrossOriginPreflightChecker::create(DocumentThreadableLoader& loader, ResourceRequest&& request)
{
return adoptRef(*new CrossOriginPreflightChecker(loader, WTF::move(request)));
}
CrossOriginPreflightChecker::CrossOriginPreflightChecker(DocumentThreadableLoader& loader, ResourceRequest&& request)
: m_loader(loader)
, m_request(WTF::move(request))
{
}
CrossOriginPreflightChecker::~CrossOriginPreflightChecker()
{
if (CachedResourceHandle resource = m_resource)
resource->removeClient(*this);
}
void CrossOriginPreflightChecker::validatePreflightResponse(DocumentThreadableLoader& loader, ResourceRequest&& request, std::optional<ResourceLoaderIdentifier> identifier, const ResourceResponse& response)
{
RefPtr frame = loader.document().frame();
if (!frame) {
ASSERT_NOT_REACHED();
return;
}
RefPtr page = loader.document().page();
if (!page) {
ASSERT_NOT_REACHED();
return;
}
auto result = WebCore::validatePreflightResponse(page->sessionID(), request, response, loader.options().storedCredentialsPolicy, loader.topOrigin(), loader.securityOrigin(), &CrossOriginAccessControlCheckDisabler::singleton());
if (!result) {
loader.document().addConsoleMessage(MessageSource::Security, MessageLevel::Error, result.error());
loader.preflightFailure(identifier, ResourceError(errorDomainWebKitInternal, 0, request.url(), result.error(), ResourceError::Type::AccessControl));
return;
}
// FIXME: <https://webkit.org/b/164889> Web Inspector: Show Preflight Request information in inspector
// This is only showing success preflight requests and responses but we should show network events
// for preflight failures and distinguish them better from non-preflight requests.
NetworkLoadMetrics emptyMetrics;
RefPtr documentLoader = frame->loader().documentLoader();
InspectorInstrumentation::didReceiveResourceResponse(*frame, *identifier, documentLoader.get(), response, nullptr);
InspectorInstrumentation::didFinishLoading(frame.get(), documentLoader.get(), *identifier, emptyMetrics, nullptr);
loader.preflightSuccess(WTF::move(request));
}
void CrossOriginPreflightChecker::notifyFinished(CachedResource& resource, const NetworkLoadMetrics&, LoadWillContinueInAnotherProcess)
{
ASSERT_UNUSED(resource, &resource == m_resource);
RefPtr loader = m_loader.get();
if (!loader)
return;
if (m_resource->loadFailedOrCanceled()) {
ResourceError preflightError = m_resource->resourceError();
// If the preflight was cancelled by underlying code, it probably means the request was blocked due to some access control policy.
// FIXME:: According fetch, we should just pass the error to the layer above. But this may impact some clients like XHR or EventSource.
if (preflightError.isNull() || preflightError.isCancellation() || preflightError.isGeneral())
preflightError.setType(ResourceError::Type::AccessControl);
if (!preflightError.isTimeout())
loader->document().addConsoleMessage(MessageSource::Security, MessageLevel::Error, "CORS-preflight request was blocked"_s);
loader->preflightFailure(m_resource->resourceLoaderIdentifier(), preflightError);
return;
}
validatePreflightResponse(*loader, WTF::move(m_request), *m_resource->resourceLoaderIdentifier(), m_resource->response());
}
void CrossOriginPreflightChecker::redirectReceived(CachedResource& resource, ResourceRequest&&, const ResourceResponse& response, CompletionHandler<void(ResourceRequest&&)>&& completionHandler)
{
ASSERT_UNUSED(resource, &resource == m_resource);
if (RefPtr loader = m_loader.get())
validatePreflightResponse(*loader, WTF::move(m_request), m_resource->resourceLoaderIdentifier(), response);
completionHandler(ResourceRequest { });
}
void CrossOriginPreflightChecker::startPreflight()
{
RefPtr loader = m_loader.get();
ResourceLoaderOptions options;
options.referrerPolicy = loader->options().referrerPolicy;
options.contentSecurityPolicyImposition = ContentSecurityPolicyImposition::SkipPolicyCheck;
options.serviceWorkersMode = ServiceWorkersMode::None;
options.initiatorContext = loader->options().initiatorContext;
bool includeFetchMetadata = !loader->document().quirks().shouldDisableFetchMetadata();
CachedResourceRequest preflightRequest(createAccessControlPreflightRequest(m_request, loader->securityOrigin(), loader->referrer(), includeFetchMetadata), options);
preflightRequest.setInitiatorType(AtomString { loader->options().initiatorType });
ASSERT(!m_resource);
m_resource = loader->document().protectedCachedResourceLoader()->requestRawResource(WTF::move(preflightRequest)).value_or(nullptr);
if (CachedResourceHandle resource = m_resource)
resource->addClient(*this);
}
void CrossOriginPreflightChecker::doPreflight(DocumentThreadableLoader& loader, ResourceRequest&& request)
{
if (!loader.document().frame())
return;
bool includeFetchMetadata = !loader.document().quirks().shouldDisableFetchMetadata();
ResourceRequest preflightRequest = createAccessControlPreflightRequest(request, loader.securityOrigin(), loader.referrer(), includeFetchMetadata);
ResourceError error;
ResourceResponse response;
RefPtr<SharedBuffer> data;
auto identifier = loader.document().protectedFrame()->loader().loadResourceSynchronously(preflightRequest, ClientCredentialPolicy::CannotAskClientForCredentials, FetchOptions { }, { }, error, response, data);
if (!error.isNull()) {
// If the preflight was cancelled by underlying code, it probably means the request was blocked due to some access control policy.
// FIXME:: According fetch, we should just pass the error to the layer above. But this may impact some clients like XHR or EventSource.
if (error.isCancellation() || error.isGeneral())
error.setType(ResourceError::Type::AccessControl);
if (!error.isTimeout())
loader.protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, "CORS-preflight request was blocked"_s);
loader.preflightFailure(identifier, error);
return;
}
// FIXME: Ideally, we should ask platformLoadResourceSynchronously to set ResourceResponse isRedirected and use it here.
bool isRedirect = preflightRequest.url().strippedForUseAsReferrer().string != response.url().strippedForUseAsReferrer().string;
if (isRedirect || !response.isSuccessful()) {
auto errorMessage = makeString("Preflight response is not successful. Status code: "_s, response.httpStatusCode());
loader.protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, errorMessage);
loader.preflightFailure(identifier, ResourceError { errorDomainWebKitInternal, 0, request.url(), errorMessage, ResourceError::Type::AccessControl });
return;
}
validatePreflightResponse(loader, WTF::move(request), identifier, response);
}
void CrossOriginPreflightChecker::setDefersLoading(bool value)
{
if (CachedResourceHandle resource = m_resource)
resource->setDefersLoading(value);
}
} // namespace WebCore