blob: 9f209fd76709ed3eb7770d4100b18535bfa7ae27 [file] [log] [blame]
/*
* Copyright (C) 2014 Igalia S.L
* Copyright (C) 2016-2025 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "MediaResourceLoader.h"
#if ENABLE(VIDEO)
#include "CachedRawResource.h"
#include "CachedResourceRequest.h"
#include "CrossOriginAccessControl.h"
#include "DocumentQuirks.h"
#include "DocumentResourceLoader.h"
#include "DocumentSecurityOrigin.h"
#include "Element.h"
#include "FrameDestructionObserverInlines.h"
#include "HTTPHeaderNames.h"
#include "InspectorInstrumentation.h"
#include "LocalFrameLoaderClient.h"
#include "OriginAccessPatterns.h"
#include "SecurityOrigin.h"
#include <wtf/NeverDestroyed.h>
#include <wtf/SortedArrayMap.h>
#include <wtf/TZoneMallocInlines.h>
namespace WebCore {
WTF_MAKE_TZONE_ALLOCATED_IMPL(MediaResourceLoader);
WTF_MAKE_TZONE_ALLOCATED_IMPL(MediaResource);
static bool shouldRecordResponsesForTesting = false;
void MediaResourceLoader::recordResponsesForTesting()
{
shouldRecordResponsesForTesting = true;
}
MediaResourceLoader::MediaResourceLoader(Document& document, Element& element, const String& crossOriginMode, FetchOptions::Destination destination)
: ContextDestructionObserver(&document)
, m_document(document)
, m_element(element)
, m_crossOriginMode(crossOriginMode)
, m_destination(destination)
{
assertIsMainThread();
}
MediaResourceLoader::~MediaResourceLoader()
{
assertIsMainThread();
ASSERT(m_resources.isEmptyIgnoringNullReferences());
}
void MediaResourceLoader::contextDestroyed()
{
assertIsMainThread();
ContextDestructionObserver::contextDestroyed();
m_document = nullptr;
m_element = nullptr;
}
void MediaResourceLoader::sendH2Ping(const URL& url, CompletionHandler<void(Expected<Seconds, ResourceError>&&)>&& completionHandler)
{
assertIsMainThread();
RefPtr document = this->document();
if (!document)
return completionHandler(makeUnexpected(internalError(url)));
RefPtr frame = document->frame();
if (!frame)
return completionHandler(makeUnexpected(internalError(url)));
frame->loader().client().sendH2Ping(url, WTF::move(completionHandler));
}
static LoadedFromOpaqueSource computeLoadedFromOpaqueSource(const Document& document, const HashSet<URL>& nonOpaqueLoadURLs, const URL& url, const std::optional<LoadedFromOpaqueSource> loadedFromOpaqueSource)
{
if (!document.settings().enableOpaqueLoadingForMedia() || url.isEmpty())
return LoadedFromOpaqueSource::No;
if (loadedFromOpaqueSource.value_or(LoadedFromOpaqueSource::No) == LoadedFromOpaqueSource::No)
return LoadedFromOpaqueSource::No;
return nonOpaqueLoadURLs.contains(url) ? LoadedFromOpaqueSource::No : LoadedFromOpaqueSource::Yes;
}
RefPtr<PlatformMediaResource> MediaResourceLoader::requestResource(ResourceRequest&& request, LoadOptions options)
{
assertIsMainThread();
RefPtr document = this->document();
if (!document)
return nullptr;
if (!m_loadedFromOpaqueSource && !request.url().isEmpty())
m_nonOpaqueLoadURLs.add(request.url());
DataBufferingPolicy bufferingPolicy = options & LoadOption::BufferData ? DataBufferingPolicy::BufferData : DataBufferingPolicy::DoNotBufferData;
auto cachingPolicy = options & LoadOption::DisallowCaching ? CachingPolicy::DisallowCaching : CachingPolicy::AllowCaching;
request.setRequester(ResourceRequestRequester::Media);
if (RefPtr element = m_element.get())
request.setInspectorInitiatorNodeIdentifier(InspectorInstrumentation::identifierForNode(*element));
#if PLATFORM(MAC)
// FIXME: Workaround for <rdar://problem/26071607>. We are not able to do CORS checking on 304 responses because they are usually missing the headers we need.
if (!m_crossOriginMode.isNull())
request.makeUnconditional();
#endif
if (document->quirks().shouldRewriteMediaRangeRequestForURL(request.url()))
request.removeHTTPHeaderField(HTTPHeaderName::Range);
ContentSecurityPolicyImposition contentSecurityPolicyImposition = m_element && m_element->isInUserAgentShadowTree() ? ContentSecurityPolicyImposition::SkipPolicyCheck : ContentSecurityPolicyImposition::DoPolicyCheck;
ResourceLoaderOptions loaderOptions {
SendCallbackPolicy::SendCallbacks,
ContentSniffingPolicy::DoNotSniffContent,
bufferingPolicy,
StoredCredentialsPolicy::Use,
ClientCredentialPolicy::MayAskClientForCredentials,
FetchOptions::Credentials::Include,
SecurityCheckPolicy::DoSecurityCheck,
FetchOptions::Mode::NoCors,
CertificateInfoPolicy::DoNotIncludeCertificateInfo,
contentSecurityPolicyImposition,
DefersLoadingPolicy::AllowDefersLoading,
cachingPolicy };
loaderOptions.sameOriginDataURLFlag = SameOriginDataURLFlag::Set;
loaderOptions.destination = m_destination;
loaderOptions.loadedFromOpaqueSource = computeLoadedFromOpaqueSource(*document, m_nonOpaqueLoadURLs, request.url(), m_loadedFromOpaqueSource);
auto cachedRequest = createPotentialAccessControlRequest(WTF::move(request), WTF::move(loaderOptions), *document, m_crossOriginMode);
if (RefPtr element = m_element.get())
cachedRequest.setInitiator(*element);
auto resource = document->protectedCachedResourceLoader()->requestMedia(WTF::move(cachedRequest)).value_or(nullptr);
if (!resource)
return nullptr;
Ref mediaResource = MediaResource::create(*this, WTF::move(resource));
m_resources.add(mediaResource.get());
return mediaResource;
}
void MediaResourceLoader::removeResource(MediaResource& mediaResource)
{
assertIsMainThread();
ASSERT(m_resources.contains(mediaResource));
m_resources.remove(mediaResource);
}
void MediaResourceLoader::addResponseForTesting(const ResourceResponse& response)
{
assertIsMainThread();
const auto maximumResponsesForTesting = 5;
if (!shouldRecordResponsesForTesting || m_responsesForTesting.size() > maximumResponsesForTesting)
return;
m_responsesForTesting.append(response);
}
Document* MediaResourceLoader::document()
{
assertIsMainThread();
return m_document.get();
}
RefPtr<Document> MediaResourceLoader::protectedDocument()
{
return document();
}
const String& MediaResourceLoader::crossOriginMode() const
{
assertIsMainThread();
IGNORE_CLANG_WARNINGS_BEGIN("thread-safety-reference-return")
return m_crossOriginMode;
IGNORE_CLANG_WARNINGS_END
}
Vector<ResourceResponse> MediaResourceLoader::responsesForTesting() const
{
assertIsMainThread();
return m_responsesForTesting;
}
static bool isManifestMIMEType(const URL& url, const String& mimeType)
{
static constexpr SortedArraySet staticManifestMIMETypesSet { std::to_array<ComparableLettersLiteral>({
"application/json"_s,
"application/vnd.apple.mpegurl"_s,
"application/vnd.apple.steering-list"_s,
"application/x-mpegurl"_s,
"audio/mpegurl"_s,
"audio/x-mpegurl"_s
}) };
if (mimeType.isEmpty() || equalLettersIgnoringASCIICase(mimeType, "application/octet-stream"_s))
return staticManifestMIMETypesSet.contains(ContentType::fromURL(url).containerType());
return staticManifestMIMETypesSet.contains(mimeType);
}
bool MediaResourceLoader::verifyMediaResponse(const URL& requestURL, const ResourceResponse& response, const SecurityOrigin* contextOrigin)
{
assertIsMainThread();
bool isNotAlreadyLoadingFromOpaqueSource = m_loadedFromOpaqueSource.value_or(LoadedFromOpaqueSource::No) == LoadedFromOpaqueSource::No;
if (isNotAlreadyLoadingFromOpaqueSource && response.tainting() == ResourceResponse::Tainting::Opaque && isManifestMIMEType(response.url(), response.mimeType()))
m_loadedFromOpaqueSource = LoadedFromOpaqueSource::Yes;
// FIXME: We should probably implement https://html.spec.whatwg.org/multipage/media.html#verify-a-media-response
if (!requestURL.protocolIsInHTTPFamily() || response.httpStatusCode() != 206 || !response.contentRange().isValid() || !contextOrigin)
return true;
auto ensureResult = m_validationLoadInformations.ensure(requestURL, [&] () -> ValidationInformation {
// Synthetic responses, whose origin is the service worker origin, have basic tainting but their url is the request URL, which may have a different origin
bool hasContextOrigin = response.source() == ResourceResponse::Source::ServiceWorker && response.tainting() == ResourceResponse::Tainting::Basic;
Ref origin = hasContextOrigin ? *contextOrigin : SecurityOrigin::create(response.url());
return { WTF::move(origin), response.tainting() == ResourceResponse::Tainting::Opaque, response.source() == ResourceResponse::Source::ServiceWorker };
});
if (ensureResult.isNewEntry)
return true;
auto& validationInformation = ensureResult.iterator->value;
if (!validationInformation.origin->isOpaque() && !validationInformation.origin->canRequest(response.url(), OriginAccessPatternsForWebProcess::singleton()))
validationInformation.origin = SecurityOrigin::createOpaque();
if (response.tainting() == ResourceResponse::Tainting::Opaque)
validationInformation.usedOpaqueResponse = true;
if (response.source() == ResourceResponse::Source::ServiceWorker)
validationInformation.usedServiceWorker = true;
if (!validationInformation.usedServiceWorker || !validationInformation.usedOpaqueResponse)
return true;
return validationInformation.origin->canRequest(response.url(), OriginAccessPatternsForWebProcess::singleton());
}
void MediaResourceLoader::redirectReceived(const URL& url)
{
ASSERT(!url.isEmpty());
if (!m_loadedFromOpaqueSource)
m_nonOpaqueLoadURLs.add(url);
}
Ref<MediaResource> MediaResource::create(MediaResourceLoader& loader, CachedResourceHandle<CachedRawResource>&& resource)
{
return adoptRef(*new MediaResource(loader, WTF::move(resource)));
}
MediaResource::MediaResource(MediaResourceLoader& loader, CachedResourceHandle<CachedRawResource>&& resource)
: m_loader(loader)
, m_resource(WTF::move(resource))
{
assertIsMainThread();
ASSERT(resource);
protectedResource()->addClient(*this);
}
CachedResourceHandle<CachedRawResource> MediaResource::protectedResource() const
{
return m_resource;
}
MediaResource::~MediaResource()
{
assertIsMainThread();
if (m_resource)
protectedResource()->removeClient(*this);
m_loader->removeResource(*this);
}
void MediaResource::shutdown()
{
assertIsMainThread();
setClient(nullptr);
if (CachedResourceHandle resource = std::exchange(m_resource, nullptr))
resource->removeClient(*this);
}
void MediaResource::responseReceived(const CachedResource& resource, const ResourceResponse& response, CompletionHandler<void()>&& completionHandler)
{
assertIsMainThread();
ASSERT_UNUSED(resource, &resource == m_resource);
CompletionHandlerCallingScope completionHandlerCaller(WTF::move(completionHandler));
if (!m_loader->document())
return;
Ref protectedThis { *this };
if (m_resource->resourceError().isAccessControl()) {
static NeverDestroyed<const String> consoleMessage("Cross-origin media resource load denied by Cross-Origin Resource Sharing policy."_s);
m_loader->protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, consoleMessage.get());
m_didPassAccessControlCheck.store(false);
if (RefPtr client = this->client())
client->accessControlCheckFailed(*this, ResourceError(errorDomainWebKitInternal, 0, response.url(), consoleMessage.get()));
ensureShutdown();
return;
}
if (!m_loader->verifyMediaResponse(resource.url(), response, resource.protectedOrigin().get())) {
static NeverDestroyed<const String> consoleMessage("Media response origin validation failed."_s);
m_loader->protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, consoleMessage.get());
if (RefPtr client = this->client())
client->loadFailed(*this, ResourceError(errorDomainWebKitInternal, 0, response.url(), consoleMessage.get()));
ensureShutdown();
return;
}
m_didPassAccessControlCheck.store(m_resource->options().mode == FetchOptions::Mode::Cors);
if (RefPtr client = this->client()) {
client->responseReceived(*this, response, [this, protectedThis = Ref { *this }, completionHandler = completionHandlerCaller.release()] (auto shouldContinue) mutable {
if (completionHandler)
completionHandler();
if (shouldContinue == ShouldContinuePolicyCheck::No)
ensureShutdown();
});
}
m_loader->addResponseForTesting(response);
}
bool MediaResource::shouldCacheResponse(CachedResource& resource, const ResourceResponse& response)
{
assertIsMainThread();
ASSERT_UNUSED(resource, &resource == m_resource);
Ref protectedThis { *this };
if (RefPtr client = this->client())
return client->shouldCacheResponse(*this, response);
return true;
}
void MediaResource::redirectReceived(CachedResource& resource, ResourceRequest&& request, const ResourceResponse& response, CompletionHandler<void(ResourceRequest&&)>&& completionHandler)
{
assertIsMainThread();
ASSERT_UNUSED(resource, &resource == m_resource);
m_loader->redirectReceived(request.url());
Ref protectedThis { *this };
if (RefPtr client = this->client())
client->redirectReceived(*this, WTF::move(request), response, WTF::move(completionHandler));
else
completionHandler(WTF::move(request));
}
void MediaResource::dataSent(CachedResource& resource, unsigned long long bytesSent, unsigned long long totalBytesToBeSent)
{
assertIsMainThread();
ASSERT_UNUSED(resource, &resource == m_resource);
Ref protectedThis { *this };
if (RefPtr client = this->client())
client->dataSent(*this, bytesSent, totalBytesToBeSent);
}
void MediaResource::dataReceived(CachedResource& resource, const SharedBuffer& buffer)
{
assertIsMainThread();
ASSERT_UNUSED(resource, &resource == m_resource);
Ref protectedThis { *this };
if (RefPtr client = this->client())
client->dataReceived(*this, buffer);
}
void MediaResource::notifyFinished(CachedResource& resource, const NetworkLoadMetrics& metrics, LoadWillContinueInAnotherProcess)
{
assertIsMainThread();
ASSERT_UNUSED(resource, &resource == m_resource);
Ref protectedThis { *this };
if (RefPtr client = this->client()) {
if (m_resource->loadFailedOrCanceled())
client->loadFailed(*this, m_resource->resourceError());
else
client->loadFinished(*this, metrics);
}
ensureShutdown();
}
void MediaResource::ensureShutdown()
{
ensureOnMainThread([protectedThis = Ref { *this }] {
protectedThis->shutdown();
});
}
} // namespace WebCore
#endif