/src/3rdparty/webkit/Source/WebCore/xml/XMLHttpRequest.cpp

https://bitbucket.org/ultra_iter/qt-vtl · C++ · 1131 lines · 855 code · 193 blank · 83 comment · 298 complexity · ab4872046641c6075421621a212cbb48 MD5 · raw file

  1. /*
  2. * Copyright (C) 2004, 2006, 2008 Apple Inc. All rights reserved.
  3. * Copyright (C) 2005-2007 Alexey Proskuryakov <ap@webkit.org>
  4. * Copyright (C) 2007, 2008 Julien Chaffraix <jchaffraix@webkit.org>
  5. * Copyright (C) 2008 David Levin <levin@chromium.org>
  6. *
  7. * This library is free software; you can redistribute it and/or
  8. * modify it under the terms of the GNU Lesser General Public
  9. * License as published by the Free Software Foundation; either
  10. * version 2 of the License, or (at your option) any later version.
  11. *
  12. * This library is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  15. * Lesser General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU Lesser General Public
  18. * License along with this library; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  20. */
  21. #include "config.h"
  22. #include "XMLHttpRequest.h"
  23. #include "ArrayBuffer.h"
  24. #include "Blob.h"
  25. #include "MemoryCache.h"
  26. #include "CrossOriginAccessControl.h"
  27. #include "DOMFormData.h"
  28. #include "DOMImplementation.h"
  29. #include "Document.h"
  30. #include "Event.h"
  31. #include "EventException.h"
  32. #include "EventListener.h"
  33. #include "EventNames.h"
  34. #include "File.h"
  35. #include "HTTPParsers.h"
  36. #include "InspectorInstrumentation.h"
  37. #include "ResourceError.h"
  38. #include "ResourceRequest.h"
  39. #include "ScriptCallStack.h"
  40. #include "SecurityOrigin.h"
  41. #include "Settings.h"
  42. #include "SharedBuffer.h"
  43. #include "TextResourceDecoder.h"
  44. #include "ThreadableLoader.h"
  45. #include "XMLHttpRequestException.h"
  46. #include "XMLHttpRequestProgressEvent.h"
  47. #include "XMLHttpRequestUpload.h"
  48. #include "markup.h"
  49. #include <wtf/text/CString.h>
  50. #include <wtf/StdLibExtras.h>
  51. #include <wtf/RefCountedLeakCounter.h>
  52. #include <wtf/UnusedParam.h>
  53. #if USE(JSC)
  54. #include "JSDOMBinding.h"
  55. #include "JSDOMWindow.h"
  56. #include <heap/Strong.h>
  57. #include <runtime/JSLock.h>
  58. #endif
  59. namespace WebCore {
  60. #ifndef NDEBUG
  61. static WTF::RefCountedLeakCounter xmlHttpRequestCounter("XMLHttpRequest");
  62. #endif
  63. struct XMLHttpRequestStaticData {
  64. WTF_MAKE_NONCOPYABLE(XMLHttpRequestStaticData); WTF_MAKE_FAST_ALLOCATED;
  65. public:
  66. XMLHttpRequestStaticData();
  67. String m_proxyHeaderPrefix;
  68. String m_secHeaderPrefix;
  69. HashSet<String, CaseFoldingHash> m_forbiddenRequestHeaders;
  70. };
  71. XMLHttpRequestStaticData::XMLHttpRequestStaticData()
  72. : m_proxyHeaderPrefix("proxy-")
  73. , m_secHeaderPrefix("sec-")
  74. {
  75. m_forbiddenRequestHeaders.add("accept-charset");
  76. m_forbiddenRequestHeaders.add("accept-encoding");
  77. m_forbiddenRequestHeaders.add("access-control-request-headers");
  78. m_forbiddenRequestHeaders.add("access-control-request-method");
  79. m_forbiddenRequestHeaders.add("connection");
  80. m_forbiddenRequestHeaders.add("content-length");
  81. m_forbiddenRequestHeaders.add("content-transfer-encoding");
  82. m_forbiddenRequestHeaders.add("cookie");
  83. m_forbiddenRequestHeaders.add("cookie2");
  84. m_forbiddenRequestHeaders.add("date");
  85. m_forbiddenRequestHeaders.add("expect");
  86. m_forbiddenRequestHeaders.add("host");
  87. m_forbiddenRequestHeaders.add("keep-alive");
  88. m_forbiddenRequestHeaders.add("origin");
  89. m_forbiddenRequestHeaders.add("referer");
  90. m_forbiddenRequestHeaders.add("te");
  91. m_forbiddenRequestHeaders.add("trailer");
  92. m_forbiddenRequestHeaders.add("transfer-encoding");
  93. m_forbiddenRequestHeaders.add("upgrade");
  94. m_forbiddenRequestHeaders.add("user-agent");
  95. m_forbiddenRequestHeaders.add("via");
  96. }
  97. // Determines if a string is a valid token, as defined by
  98. // "token" in section 2.2 of RFC 2616.
  99. static bool isValidToken(const String& name)
  100. {
  101. unsigned length = name.length();
  102. for (unsigned i = 0; i < length; i++) {
  103. UChar c = name[i];
  104. if (c >= 127 || c <= 32)
  105. return false;
  106. if (c == '(' || c == ')' || c == '<' || c == '>' || c == '@' ||
  107. c == ',' || c == ';' || c == ':' || c == '\\' || c == '\"' ||
  108. c == '/' || c == '[' || c == ']' || c == '?' || c == '=' ||
  109. c == '{' || c == '}')
  110. return false;
  111. }
  112. return length > 0;
  113. }
  114. static bool isValidHeaderValue(const String& name)
  115. {
  116. // FIXME: This should really match name against
  117. // field-value in section 4.2 of RFC 2616.
  118. return !name.contains('\r') && !name.contains('\n');
  119. }
  120. static bool isSetCookieHeader(const AtomicString& name)
  121. {
  122. return equalIgnoringCase(name, "set-cookie") || equalIgnoringCase(name, "set-cookie2");
  123. }
  124. static void replaceCharsetInMediaType(String& mediaType, const String& charsetValue)
  125. {
  126. unsigned int pos = 0, len = 0;
  127. findCharsetInMediaType(mediaType, pos, len);
  128. if (!len) {
  129. // When no charset found, do nothing.
  130. return;
  131. }
  132. // Found at least one existing charset, replace all occurrences with new charset.
  133. while (len) {
  134. mediaType.replace(pos, len, charsetValue);
  135. unsigned int start = pos + charsetValue.length();
  136. findCharsetInMediaType(mediaType, pos, len, start);
  137. }
  138. }
  139. static const XMLHttpRequestStaticData* staticData = 0;
  140. static const XMLHttpRequestStaticData* createXMLHttpRequestStaticData()
  141. {
  142. staticData = new XMLHttpRequestStaticData;
  143. return staticData;
  144. }
  145. static const XMLHttpRequestStaticData* initializeXMLHttpRequestStaticData()
  146. {
  147. // Uses dummy to avoid warnings about an unused variable.
  148. AtomicallyInitializedStatic(const XMLHttpRequestStaticData*, dummy = createXMLHttpRequestStaticData());
  149. return dummy;
  150. }
  151. XMLHttpRequest::XMLHttpRequest(ScriptExecutionContext* context)
  152. : ActiveDOMObject(context, this)
  153. , m_async(true)
  154. , m_includeCredentials(false)
  155. , m_state(UNSENT)
  156. , m_createdDocument(false)
  157. , m_error(false)
  158. , m_uploadEventsAllowed(true)
  159. , m_uploadComplete(false)
  160. , m_sameOriginRequest(true)
  161. , m_receivedLength(0)
  162. , m_lastSendLineNumber(0)
  163. , m_exceptionCode(0)
  164. , m_progressEventThrottle(this)
  165. , m_responseTypeCode(ResponseTypeDefault)
  166. {
  167. initializeXMLHttpRequestStaticData();
  168. #ifndef NDEBUG
  169. xmlHttpRequestCounter.increment();
  170. #endif
  171. }
  172. XMLHttpRequest::~XMLHttpRequest()
  173. {
  174. #ifndef NDEBUG
  175. xmlHttpRequestCounter.decrement();
  176. #endif
  177. }
  178. Document* XMLHttpRequest::document() const
  179. {
  180. ASSERT(scriptExecutionContext()->isDocument());
  181. return static_cast<Document*>(scriptExecutionContext());
  182. }
  183. #if ENABLE(DASHBOARD_SUPPORT)
  184. bool XMLHttpRequest::usesDashboardBackwardCompatibilityMode() const
  185. {
  186. if (scriptExecutionContext()->isWorkerContext())
  187. return false;
  188. Settings* settings = document()->settings();
  189. return settings && settings->usesDashboardBackwardCompatibilityMode();
  190. }
  191. #endif
  192. XMLHttpRequest::State XMLHttpRequest::readyState() const
  193. {
  194. return m_state;
  195. }
  196. String XMLHttpRequest::responseText(ExceptionCode& ec)
  197. {
  198. if (responseTypeCode() != ResponseTypeDefault && responseTypeCode() != ResponseTypeText) {
  199. ec = INVALID_STATE_ERR;
  200. return "";
  201. }
  202. return m_responseBuilder.toStringPreserveCapacity();
  203. }
  204. Document* XMLHttpRequest::responseXML(ExceptionCode& ec)
  205. {
  206. if (responseTypeCode() != ResponseTypeDefault && responseTypeCode() != ResponseTypeText && responseTypeCode() != ResponseTypeDocument) {
  207. ec = INVALID_STATE_ERR;
  208. return 0;
  209. }
  210. if (m_state != DONE)
  211. return 0;
  212. if (!m_createdDocument) {
  213. if ((m_response.isHTTP() && !responseIsXML()) || scriptExecutionContext()->isWorkerContext()) {
  214. // The W3C spec requires this.
  215. m_responseXML = 0;
  216. } else {
  217. m_responseXML = Document::create(0, m_url);
  218. // FIXME: Set Last-Modified.
  219. m_responseXML->setContent(m_responseBuilder.toStringPreserveCapacity());
  220. m_responseXML->setSecurityOrigin(document()->securityOrigin());
  221. if (!m_responseXML->wellFormed())
  222. m_responseXML = 0;
  223. }
  224. m_createdDocument = true;
  225. }
  226. return m_responseXML.get();
  227. }
  228. #if ENABLE(XHR_RESPONSE_BLOB)
  229. Blob* XMLHttpRequest::responseBlob(ExceptionCode& ec) const
  230. {
  231. if (responseTypeCode() != ResponseTypeBlob) {
  232. ec = INVALID_STATE_ERR;
  233. return 0;
  234. }
  235. return m_responseBlob.get();
  236. }
  237. #endif
  238. ArrayBuffer* XMLHttpRequest::responseArrayBuffer(ExceptionCode& ec)
  239. {
  240. if (m_responseTypeCode != ResponseTypeArrayBuffer) {
  241. ec = INVALID_STATE_ERR;
  242. return 0;
  243. }
  244. if (m_state != DONE)
  245. return 0;
  246. if (!m_responseArrayBuffer.get() && m_binaryResponseBuilder.get() && m_binaryResponseBuilder->size() > 0) {
  247. m_responseArrayBuffer = ArrayBuffer::create(const_cast<char*>(m_binaryResponseBuilder->data()), static_cast<unsigned>(m_binaryResponseBuilder->size()));
  248. m_binaryResponseBuilder.clear();
  249. }
  250. if (m_responseArrayBuffer.get())
  251. return m_responseArrayBuffer.get();
  252. return 0;
  253. }
  254. void XMLHttpRequest::setResponseType(const String& responseType, ExceptionCode& ec)
  255. {
  256. if (m_state != OPENED || m_loader) {
  257. ec = INVALID_STATE_ERR;
  258. return;
  259. }
  260. if (responseType == "")
  261. m_responseTypeCode = ResponseTypeDefault;
  262. else if (responseType == "text")
  263. m_responseTypeCode = ResponseTypeText;
  264. else if (responseType == "document")
  265. m_responseTypeCode = ResponseTypeDocument;
  266. else if (responseType == "blob") {
  267. #if ENABLE(XHR_RESPONSE_BLOB)
  268. m_responseTypeCode = ResponseTypeBlob;
  269. #endif
  270. } else if (responseType == "arraybuffer") {
  271. m_responseTypeCode = ResponseTypeArrayBuffer;
  272. } else
  273. ec = SYNTAX_ERR;
  274. }
  275. String XMLHttpRequest::responseType()
  276. {
  277. switch (m_responseTypeCode) {
  278. case ResponseTypeDefault:
  279. return "";
  280. case ResponseTypeText:
  281. return "text";
  282. case ResponseTypeDocument:
  283. return "document";
  284. case ResponseTypeBlob:
  285. return "blob";
  286. case ResponseTypeArrayBuffer:
  287. return "arraybuffer";
  288. }
  289. return "";
  290. }
  291. XMLHttpRequestUpload* XMLHttpRequest::upload()
  292. {
  293. if (!m_upload)
  294. m_upload = XMLHttpRequestUpload::create(this);
  295. return m_upload.get();
  296. }
  297. void XMLHttpRequest::changeState(State newState)
  298. {
  299. if (m_state != newState) {
  300. m_state = newState;
  301. callReadyStateChangeListener();
  302. }
  303. }
  304. void XMLHttpRequest::callReadyStateChangeListener()
  305. {
  306. if (!scriptExecutionContext())
  307. return;
  308. InspectorInstrumentationCookie cookie = InspectorInstrumentation::willChangeXHRReadyState(scriptExecutionContext(), this);
  309. if (m_async || (m_state <= OPENED || m_state == DONE))
  310. m_progressEventThrottle.dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().readystatechangeEvent), m_state == DONE ? FlushProgressEvent : DoNotFlushProgressEvent);
  311. InspectorInstrumentation::didChangeXHRReadyState(cookie);
  312. if (m_state == DONE && !m_error) {
  313. InspectorInstrumentationCookie cookie = InspectorInstrumentation::willLoadXHR(scriptExecutionContext(), this);
  314. m_progressEventThrottle.dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().loadEvent));
  315. InspectorInstrumentation::didLoadXHR(cookie);
  316. }
  317. }
  318. void XMLHttpRequest::setWithCredentials(bool value, ExceptionCode& ec)
  319. {
  320. if (m_state != OPENED || m_loader) {
  321. ec = INVALID_STATE_ERR;
  322. return;
  323. }
  324. m_includeCredentials = value;
  325. }
  326. #if ENABLE(XHR_RESPONSE_BLOB)
  327. void XMLHttpRequest::setAsBlob(bool value, ExceptionCode& ec)
  328. {
  329. if (m_state != OPENED || m_loader) {
  330. ec = INVALID_STATE_ERR;
  331. return;
  332. }
  333. m_responseTypeCode = value ? ResponseTypeBlob : ResponseTypeDefault;
  334. }
  335. #endif
  336. void XMLHttpRequest::open(const String& method, const KURL& url, ExceptionCode& ec)
  337. {
  338. open(method, url, true, ec);
  339. }
  340. void XMLHttpRequest::open(const String& method, const KURL& url, bool async, ExceptionCode& ec)
  341. {
  342. internalAbort();
  343. State previousState = m_state;
  344. m_state = UNSENT;
  345. m_error = false;
  346. m_responseTypeCode = ResponseTypeDefault;
  347. m_uploadComplete = false;
  348. // clear stuff from possible previous load
  349. clearResponse();
  350. clearRequest();
  351. ASSERT(m_state == UNSENT);
  352. if (!isValidToken(method)) {
  353. ec = SYNTAX_ERR;
  354. return;
  355. }
  356. // Method names are case sensitive. But since Firefox uppercases method names it knows, we'll do the same.
  357. String methodUpper(method.upper());
  358. if (methodUpper == "TRACE" || methodUpper == "TRACK" || methodUpper == "CONNECT") {
  359. ec = SECURITY_ERR;
  360. return;
  361. }
  362. m_url = url;
  363. if (methodUpper == "COPY" || methodUpper == "DELETE" || methodUpper == "GET" || methodUpper == "HEAD"
  364. || methodUpper == "INDEX" || methodUpper == "LOCK" || methodUpper == "M-POST" || methodUpper == "MKCOL" || methodUpper == "MOVE"
  365. || methodUpper == "OPTIONS" || methodUpper == "POST" || methodUpper == "PROPFIND" || methodUpper == "PROPPATCH" || methodUpper == "PUT"
  366. || methodUpper == "UNLOCK")
  367. m_method = methodUpper;
  368. else
  369. m_method = method;
  370. m_async = async;
  371. ASSERT(!m_loader);
  372. // Check previous state to avoid dispatching readyState event
  373. // when calling open several times in a row.
  374. if (previousState != OPENED)
  375. changeState(OPENED);
  376. else
  377. m_state = OPENED;
  378. }
  379. void XMLHttpRequest::open(const String& method, const KURL& url, bool async, const String& user, ExceptionCode& ec)
  380. {
  381. KURL urlWithCredentials(url);
  382. urlWithCredentials.setUser(user);
  383. open(method, urlWithCredentials, async, ec);
  384. }
  385. void XMLHttpRequest::open(const String& method, const KURL& url, bool async, const String& user, const String& password, ExceptionCode& ec)
  386. {
  387. KURL urlWithCredentials(url);
  388. urlWithCredentials.setUser(user);
  389. urlWithCredentials.setPass(password);
  390. open(method, urlWithCredentials, async, ec);
  391. }
  392. bool XMLHttpRequest::initSend(ExceptionCode& ec)
  393. {
  394. if (!scriptExecutionContext())
  395. return false;
  396. if (m_state != OPENED || m_loader) {
  397. ec = INVALID_STATE_ERR;
  398. return false;
  399. }
  400. m_error = false;
  401. return true;
  402. }
  403. void XMLHttpRequest::send(ExceptionCode& ec)
  404. {
  405. send(String(), ec);
  406. }
  407. void XMLHttpRequest::send(Document* document, ExceptionCode& ec)
  408. {
  409. ASSERT(document);
  410. if (!initSend(ec))
  411. return;
  412. if (m_method != "GET" && m_method != "HEAD" && m_url.protocolInHTTPFamily()) {
  413. String contentType = getRequestHeader("Content-Type");
  414. if (contentType.isEmpty()) {
  415. #if ENABLE(DASHBOARD_SUPPORT)
  416. if (usesDashboardBackwardCompatibilityMode())
  417. setRequestHeaderInternal("Content-Type", "application/x-www-form-urlencoded");
  418. else
  419. #endif
  420. // FIXME: this should include the charset used for encoding.
  421. setRequestHeaderInternal("Content-Type", "application/xml");
  422. }
  423. // FIXME: According to XMLHttpRequest Level 2, this should use the Document.innerHTML algorithm
  424. // from the HTML5 specification to serialize the document.
  425. String body = createMarkup(document);
  426. // FIXME: this should use value of document.inputEncoding to determine the encoding to use.
  427. TextEncoding encoding = UTF8Encoding();
  428. m_requestEntityBody = FormData::create(encoding.encode(body.characters(), body.length(), EntitiesForUnencodables));
  429. if (m_upload)
  430. m_requestEntityBody->setAlwaysStream(true);
  431. }
  432. createRequest(ec);
  433. }
  434. void XMLHttpRequest::send(const String& body, ExceptionCode& ec)
  435. {
  436. if (!initSend(ec))
  437. return;
  438. if (!body.isNull() && m_method != "GET" && m_method != "HEAD" && m_url.protocolInHTTPFamily()) {
  439. String contentType = getRequestHeader("Content-Type");
  440. if (contentType.isEmpty()) {
  441. #if ENABLE(DASHBOARD_SUPPORT)
  442. if (usesDashboardBackwardCompatibilityMode())
  443. setRequestHeaderInternal("Content-Type", "application/x-www-form-urlencoded");
  444. else
  445. #endif
  446. setRequestHeaderInternal("Content-Type", "application/xml");
  447. } else {
  448. replaceCharsetInMediaType(contentType, "UTF-8");
  449. m_requestHeaders.set("Content-Type", contentType);
  450. }
  451. m_requestEntityBody = FormData::create(UTF8Encoding().encode(body.characters(), body.length(), EntitiesForUnencodables));
  452. if (m_upload)
  453. m_requestEntityBody->setAlwaysStream(true);
  454. }
  455. createRequest(ec);
  456. }
  457. void XMLHttpRequest::send(Blob* body, ExceptionCode& ec)
  458. {
  459. if (!initSend(ec))
  460. return;
  461. if (m_method != "GET" && m_method != "HEAD" && m_url.protocolInHTTPFamily()) {
  462. // FIXME: Should we set a Content-Type if one is not set.
  463. // FIXME: add support for uploading bundles.
  464. m_requestEntityBody = FormData::create();
  465. if (body->isFile())
  466. m_requestEntityBody->appendFile(static_cast<File*>(body)->path());
  467. #if ENABLE(BLOB)
  468. else
  469. m_requestEntityBody->appendBlob(body->url());
  470. #endif
  471. }
  472. createRequest(ec);
  473. }
  474. void XMLHttpRequest::send(DOMFormData* body, ExceptionCode& ec)
  475. {
  476. if (!initSend(ec))
  477. return;
  478. if (m_method != "GET" && m_method != "HEAD" && m_url.protocolInHTTPFamily()) {
  479. m_requestEntityBody = FormData::createMultiPart(*(static_cast<FormDataList*>(body)), body->encoding(), document());
  480. // We need to ask the client to provide the generated file names if needed. When FormData fills the element
  481. // for the file, it could set a flag to use the generated file name, i.e. a package file on Mac.
  482. m_requestEntityBody->generateFiles(document());
  483. String contentType = getRequestHeader("Content-Type");
  484. if (contentType.isEmpty()) {
  485. contentType = "multipart/form-data; boundary=";
  486. contentType += m_requestEntityBody->boundary().data();
  487. setRequestHeaderInternal("Content-Type", contentType);
  488. }
  489. }
  490. createRequest(ec);
  491. }
  492. void XMLHttpRequest::send(ArrayBuffer* body, ExceptionCode& ec)
  493. {
  494. if (!initSend(ec))
  495. return;
  496. if (m_method != "GET" && m_method != "HEAD" && m_url.protocolInHTTPFamily()) {
  497. m_requestEntityBody = FormData::create(body->data(), body->byteLength());
  498. if (m_upload)
  499. m_requestEntityBody->setAlwaysStream(true);
  500. }
  501. createRequest(ec);
  502. }
  503. void XMLHttpRequest::createRequest(ExceptionCode& ec)
  504. {
  505. #if ENABLE(BLOB)
  506. // Only GET request is supported for blob URL.
  507. if (m_url.protocolIs("blob") && m_method != "GET") {
  508. ec = XMLHttpRequestException::NETWORK_ERR;
  509. return;
  510. }
  511. #endif
  512. // The presence of upload event listeners forces us to use preflighting because POSTing to an URL that does not
  513. // permit cross origin requests should look exactly like POSTing to an URL that does not respond at all.
  514. // Also, only async requests support upload progress events.
  515. bool uploadEvents = false;
  516. if (m_async) {
  517. m_progressEventThrottle.dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().loadstartEvent));
  518. if (m_requestEntityBody && m_upload) {
  519. uploadEvents = m_upload->hasEventListeners();
  520. m_upload->dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().loadstartEvent));
  521. }
  522. }
  523. m_sameOriginRequest = scriptExecutionContext()->securityOrigin()->canRequest(m_url);
  524. // We also remember whether upload events should be allowed for this request in case the upload listeners are
  525. // added after the request is started.
  526. m_uploadEventsAllowed = m_sameOriginRequest || uploadEvents || !isSimpleCrossOriginAccessRequest(m_method, m_requestHeaders);
  527. ResourceRequest request(m_url);
  528. request.setHTTPMethod(m_method);
  529. if (m_requestEntityBody) {
  530. ASSERT(m_method != "GET");
  531. ASSERT(m_method != "HEAD");
  532. request.setHTTPBody(m_requestEntityBody.release());
  533. }
  534. if (m_requestHeaders.size() > 0)
  535. request.addHTTPHeaderFields(m_requestHeaders);
  536. ThreadableLoaderOptions options;
  537. options.sendLoadCallbacks = true;
  538. options.sniffContent = false;
  539. options.forcePreflight = uploadEvents;
  540. options.allowCredentials = m_sameOriginRequest || m_includeCredentials;
  541. options.crossOriginRequestPolicy = UseAccessControl;
  542. m_exceptionCode = 0;
  543. m_error = false;
  544. if (m_async) {
  545. if (m_upload)
  546. request.setReportUploadProgress(true);
  547. // ThreadableLoader::create can return null here, for example if we're no longer attached to a page.
  548. // This is true while running onunload handlers.
  549. // FIXME: Maybe we need to be able to send XMLHttpRequests from onunload, <http://bugs.webkit.org/show_bug.cgi?id=10904>.
  550. // FIXME: Maybe create() can return null for other reasons too?
  551. m_loader = ThreadableLoader::create(scriptExecutionContext(), this, request, options);
  552. if (m_loader) {
  553. // Neither this object nor the JavaScript wrapper should be deleted while
  554. // a request is in progress because we need to keep the listeners alive,
  555. // and they are referenced by the JavaScript wrapper.
  556. setPendingActivity(this);
  557. }
  558. } else
  559. ThreadableLoader::loadResourceSynchronously(scriptExecutionContext(), request, *this, options);
  560. if (!m_exceptionCode && m_error)
  561. m_exceptionCode = XMLHttpRequestException::NETWORK_ERR;
  562. ec = m_exceptionCode;
  563. }
  564. void XMLHttpRequest::abort()
  565. {
  566. // internalAbort() calls dropProtection(), which may release the last reference.
  567. RefPtr<XMLHttpRequest> protect(this);
  568. bool sendFlag = m_loader;
  569. internalAbort();
  570. clearResponseBuffers();
  571. // Clear headers as required by the spec
  572. m_requestHeaders.clear();
  573. if ((m_state <= OPENED && !sendFlag) || m_state == DONE)
  574. m_state = UNSENT;
  575. else {
  576. ASSERT(!m_loader);
  577. changeState(DONE);
  578. m_state = UNSENT;
  579. }
  580. m_progressEventThrottle.dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().abortEvent));
  581. if (!m_uploadComplete) {
  582. m_uploadComplete = true;
  583. if (m_upload && m_uploadEventsAllowed)
  584. m_upload->dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().abortEvent));
  585. }
  586. }
  587. void XMLHttpRequest::internalAbort()
  588. {
  589. bool hadLoader = m_loader;
  590. m_error = true;
  591. // FIXME: when we add the support for multi-part XHR, we will have to think be careful with this initialization.
  592. m_receivedLength = 0;
  593. if (hadLoader) {
  594. m_loader->cancel();
  595. m_loader = 0;
  596. }
  597. m_decoder = 0;
  598. if (hadLoader)
  599. dropProtection();
  600. }
  601. void XMLHttpRequest::clearResponse()
  602. {
  603. m_response = ResourceResponse();
  604. clearResponseBuffers();
  605. }
  606. void XMLHttpRequest::clearResponseBuffers()
  607. {
  608. m_responseBuilder.clear();
  609. m_createdDocument = false;
  610. m_responseXML = 0;
  611. #if ENABLE(XHR_RESPONSE_BLOB)
  612. m_responseBlob = 0;
  613. #endif
  614. m_binaryResponseBuilder.clear();
  615. m_responseArrayBuffer.clear();
  616. }
  617. void XMLHttpRequest::clearRequest()
  618. {
  619. m_requestHeaders.clear();
  620. m_requestEntityBody = 0;
  621. }
  622. void XMLHttpRequest::genericError()
  623. {
  624. clearResponse();
  625. clearRequest();
  626. m_error = true;
  627. changeState(DONE);
  628. }
  629. void XMLHttpRequest::networkError()
  630. {
  631. genericError();
  632. m_progressEventThrottle.dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().errorEvent));
  633. if (!m_uploadComplete) {
  634. m_uploadComplete = true;
  635. if (m_upload && m_uploadEventsAllowed)
  636. m_upload->dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().errorEvent));
  637. }
  638. internalAbort();
  639. }
  640. void XMLHttpRequest::abortError()
  641. {
  642. genericError();
  643. m_progressEventThrottle.dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().abortEvent));
  644. if (!m_uploadComplete) {
  645. m_uploadComplete = true;
  646. if (m_upload && m_uploadEventsAllowed)
  647. m_upload->dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().abortEvent));
  648. }
  649. }
  650. void XMLHttpRequest::dropProtection()
  651. {
  652. #if USE(JSC)
  653. // The XHR object itself holds on to the responseText, and
  654. // thus has extra cost even independent of any
  655. // responseText or responseXML objects it has handed
  656. // out. But it is protected from GC while loading, so this
  657. // can't be recouped until the load is done, so only
  658. // report the extra cost at that point.
  659. JSC::JSLock lock(JSC::SilenceAssertionsOnly);
  660. JSC::JSGlobalData* globalData = scriptExecutionContext()->globalData();
  661. globalData->heap.reportExtraMemoryCost(m_responseBuilder.length() * 2);
  662. #endif
  663. unsetPendingActivity(this);
  664. }
  665. void XMLHttpRequest::overrideMimeType(const String& override)
  666. {
  667. m_mimeTypeOverride = override;
  668. }
  669. static void reportUnsafeUsage(ScriptExecutionContext* context, const String& message)
  670. {
  671. if (!context)
  672. return;
  673. // FIXME: It's not good to report the bad usage without indicating what source line it came from.
  674. // We should pass additional parameters so we can tell the console where the mistake occurred.
  675. context->addMessage(JSMessageSource, LogMessageType, ErrorMessageLevel, message, 1, String(), 0);
  676. }
  677. void XMLHttpRequest::setRequestHeader(const AtomicString& name, const String& value, ExceptionCode& ec)
  678. {
  679. if (m_state != OPENED || m_loader) {
  680. #if ENABLE(DASHBOARD_SUPPORT)
  681. if (usesDashboardBackwardCompatibilityMode())
  682. return;
  683. #endif
  684. ec = INVALID_STATE_ERR;
  685. return;
  686. }
  687. if (!isValidToken(name) || !isValidHeaderValue(value)) {
  688. ec = SYNTAX_ERR;
  689. return;
  690. }
  691. // A privileged script (e.g. a Dashboard widget) can set any headers.
  692. if (!scriptExecutionContext()->securityOrigin()->canLoadLocalResources() && !isSafeRequestHeader(name)) {
  693. reportUnsafeUsage(scriptExecutionContext(), "Refused to set unsafe header \"" + name + "\"");
  694. return;
  695. }
  696. setRequestHeaderInternal(name, value);
  697. }
  698. void XMLHttpRequest::setRequestHeaderInternal(const AtomicString& name, const String& value)
  699. {
  700. pair<HTTPHeaderMap::iterator, bool> result = m_requestHeaders.add(name, value);
  701. if (!result.second)
  702. result.first->second += ", " + value;
  703. }
  704. bool XMLHttpRequest::isSafeRequestHeader(const String& name) const
  705. {
  706. return !staticData->m_forbiddenRequestHeaders.contains(name) && !name.startsWith(staticData->m_proxyHeaderPrefix, false)
  707. && !name.startsWith(staticData->m_secHeaderPrefix, false);
  708. }
  709. String XMLHttpRequest::getRequestHeader(const AtomicString& name) const
  710. {
  711. return m_requestHeaders.get(name);
  712. }
  713. String XMLHttpRequest::getAllResponseHeaders(ExceptionCode& ec) const
  714. {
  715. if (m_state < HEADERS_RECEIVED) {
  716. ec = INVALID_STATE_ERR;
  717. return "";
  718. }
  719. Vector<UChar> stringBuilder;
  720. HTTPHeaderMap::const_iterator end = m_response.httpHeaderFields().end();
  721. for (HTTPHeaderMap::const_iterator it = m_response.httpHeaderFields().begin(); it!= end; ++it) {
  722. // Hide Set-Cookie header fields from the XMLHttpRequest client for these reasons:
  723. // 1) If the client did have access to the fields, then it could read HTTP-only
  724. // cookies; those cookies are supposed to be hidden from scripts.
  725. // 2) There's no known harm in hiding Set-Cookie header fields entirely; we don't
  726. // know any widely used technique that requires access to them.
  727. // 3) Firefox has implemented this policy.
  728. if (isSetCookieHeader(it->first) && !scriptExecutionContext()->securityOrigin()->canLoadLocalResources())
  729. continue;
  730. if (!m_sameOriginRequest && !isOnAccessControlResponseHeaderWhitelist(it->first))
  731. continue;
  732. stringBuilder.append(it->first.characters(), it->first.length());
  733. stringBuilder.append(':');
  734. stringBuilder.append(' ');
  735. stringBuilder.append(it->second.characters(), it->second.length());
  736. stringBuilder.append('\r');
  737. stringBuilder.append('\n');
  738. }
  739. return String::adopt(stringBuilder);
  740. }
  741. String XMLHttpRequest::getResponseHeader(const AtomicString& name, ExceptionCode& ec) const
  742. {
  743. if (m_state < HEADERS_RECEIVED) {
  744. ec = INVALID_STATE_ERR;
  745. return String();
  746. }
  747. // See comment in getAllResponseHeaders above.
  748. if (isSetCookieHeader(name) && !scriptExecutionContext()->securityOrigin()->canLoadLocalResources()) {
  749. reportUnsafeUsage(scriptExecutionContext(), "Refused to get unsafe header \"" + name + "\"");
  750. return String();
  751. }
  752. if (!m_sameOriginRequest && !isOnAccessControlResponseHeaderWhitelist(name)) {
  753. reportUnsafeUsage(scriptExecutionContext(), "Refused to get unsafe header \"" + name + "\"");
  754. return String();
  755. }
  756. return m_response.httpHeaderField(name);
  757. }
  758. String XMLHttpRequest::responseMIMEType() const
  759. {
  760. String mimeType = extractMIMETypeFromMediaType(m_mimeTypeOverride);
  761. if (mimeType.isEmpty()) {
  762. if (m_response.isHTTP())
  763. mimeType = extractMIMETypeFromMediaType(m_response.httpHeaderField("Content-Type"));
  764. else
  765. mimeType = m_response.mimeType();
  766. }
  767. if (mimeType.isEmpty())
  768. mimeType = "text/xml";
  769. return mimeType;
  770. }
  771. bool XMLHttpRequest::responseIsXML() const
  772. {
  773. return DOMImplementation::isXMLMIMEType(responseMIMEType());
  774. }
  775. int XMLHttpRequest::status(ExceptionCode& ec) const
  776. {
  777. if (m_response.httpStatusCode())
  778. return m_response.httpStatusCode();
  779. if (m_state == OPENED) {
  780. // Firefox only raises an exception in this state; we match it.
  781. // Note the case of local file requests, where we have no HTTP response code! Firefox never raises an exception for those, but we match HTTP case for consistency.
  782. ec = INVALID_STATE_ERR;
  783. }
  784. return 0;
  785. }
  786. String XMLHttpRequest::statusText(ExceptionCode& ec) const
  787. {
  788. if (!m_response.httpStatusText().isNull())
  789. return m_response.httpStatusText();
  790. if (m_state == OPENED) {
  791. // See comments in status() above.
  792. ec = INVALID_STATE_ERR;
  793. }
  794. return String();
  795. }
  796. void XMLHttpRequest::didFail(const ResourceError& error)
  797. {
  798. // If we are already in an error state, for instance we called abort(), bail out early.
  799. if (m_error)
  800. return;
  801. if (error.isCancellation()) {
  802. m_exceptionCode = XMLHttpRequestException::ABORT_ERR;
  803. abortError();
  804. return;
  805. }
  806. // Network failures are already reported to Web Inspector by ResourceLoader.
  807. if (error.domain() == errorDomainWebKitInternal)
  808. reportUnsafeUsage(scriptExecutionContext(), "XMLHttpRequest cannot load " + error.failingURL() + ". " + error.localizedDescription());
  809. m_exceptionCode = XMLHttpRequestException::NETWORK_ERR;
  810. networkError();
  811. }
  812. void XMLHttpRequest::didFailRedirectCheck()
  813. {
  814. networkError();
  815. }
  816. void XMLHttpRequest::didFinishLoading(unsigned long identifier, double)
  817. {
  818. if (m_error)
  819. return;
  820. if (m_state < HEADERS_RECEIVED)
  821. changeState(HEADERS_RECEIVED);
  822. if (m_decoder)
  823. m_responseBuilder.append(m_decoder->flush());
  824. m_responseBuilder.shrinkToFit();
  825. #if ENABLE(XHR_RESPONSE_BLOB)
  826. // FIXME: Set m_responseBlob to something here in the ResponseTypeBlob case.
  827. #endif
  828. InspectorInstrumentation::resourceRetrievedByXMLHttpRequest(scriptExecutionContext(), identifier, m_responseBuilder.toStringPreserveCapacity(), m_url, m_lastSendURL, m_lastSendLineNumber);
  829. bool hadLoader = m_loader;
  830. m_loader = 0;
  831. changeState(DONE);
  832. m_decoder = 0;
  833. if (hadLoader)
  834. dropProtection();
  835. }
  836. void XMLHttpRequest::didSendData(unsigned long long bytesSent, unsigned long long totalBytesToBeSent)
  837. {
  838. if (!m_upload)
  839. return;
  840. if (m_uploadEventsAllowed)
  841. m_upload->dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().progressEvent, true, bytesSent, totalBytesToBeSent));
  842. if (bytesSent == totalBytesToBeSent && !m_uploadComplete) {
  843. m_uploadComplete = true;
  844. if (m_uploadEventsAllowed)
  845. m_upload->dispatchEvent(XMLHttpRequestProgressEvent::create(eventNames().loadEvent));
  846. }
  847. }
  848. void XMLHttpRequest::didReceiveResponse(const ResourceResponse& response)
  849. {
  850. m_response = response;
  851. m_responseEncoding = extractCharsetFromMediaType(m_mimeTypeOverride);
  852. if (m_responseEncoding.isEmpty())
  853. m_responseEncoding = response.textEncodingName();
  854. }
  855. void XMLHttpRequest::didReceiveAuthenticationCancellation(const ResourceResponse& failureResponse)
  856. {
  857. m_response = failureResponse;
  858. }
  859. void XMLHttpRequest::didReceiveData(const char* data, int len)
  860. {
  861. if (m_error)
  862. return;
  863. if (m_state < HEADERS_RECEIVED)
  864. changeState(HEADERS_RECEIVED);
  865. bool useDecoder = responseTypeCode() == ResponseTypeDefault || responseTypeCode() == ResponseTypeText || responseTypeCode() == ResponseTypeDocument;
  866. if (useDecoder && !m_decoder) {
  867. if (!m_responseEncoding.isEmpty())
  868. m_decoder = TextResourceDecoder::create("text/plain", m_responseEncoding);
  869. // allow TextResourceDecoder to look inside the m_response if it's XML or HTML
  870. else if (responseIsXML()) {
  871. m_decoder = TextResourceDecoder::create("application/xml");
  872. // Don't stop on encoding errors, unlike it is done for other kinds of XML resources. This matches the behavior of previous WebKit versions, Firefox and Opera.
  873. m_decoder->useLenientXMLDecoding();
  874. } else if (responseMIMEType() == "text/html")
  875. m_decoder = TextResourceDecoder::create("text/html", "UTF-8");
  876. else
  877. m_decoder = TextResourceDecoder::create("text/plain", "UTF-8");
  878. }
  879. if (!len)
  880. return;
  881. if (len == -1)
  882. len = strlen(data);
  883. if (useDecoder)
  884. m_responseBuilder.append(m_decoder->decode(data, len));
  885. else if (responseTypeCode() == ResponseTypeArrayBuffer) {
  886. // Buffer binary data.
  887. if (!m_binaryResponseBuilder)
  888. m_binaryResponseBuilder = SharedBuffer::create();
  889. m_binaryResponseBuilder->append(data, len);
  890. }
  891. if (!m_error) {
  892. long long expectedLength = m_response.expectedContentLength();
  893. m_receivedLength += len;
  894. if (m_async) {
  895. bool lengthComputable = expectedLength && m_receivedLength <= expectedLength;
  896. m_progressEventThrottle.dispatchProgressEvent(lengthComputable, m_receivedLength, expectedLength);
  897. }
  898. if (m_state != LOADING)
  899. changeState(LOADING);
  900. else
  901. // Firefox calls readyStateChanged every time it receives data, 4449442
  902. callReadyStateChangeListener();
  903. }
  904. }
  905. bool XMLHttpRequest::canSuspend() const
  906. {
  907. return !m_loader;
  908. }
  909. void XMLHttpRequest::suspend(ReasonForSuspension)
  910. {
  911. m_progressEventThrottle.suspend();
  912. }
  913. void XMLHttpRequest::resume()
  914. {
  915. m_progressEventThrottle.resume();
  916. }
  917. void XMLHttpRequest::stop()
  918. {
  919. internalAbort();
  920. }
  921. void XMLHttpRequest::contextDestroyed()
  922. {
  923. ASSERT(!m_loader);
  924. ActiveDOMObject::contextDestroyed();
  925. }
  926. ScriptExecutionContext* XMLHttpRequest::scriptExecutionContext() const
  927. {
  928. return ActiveDOMObject::scriptExecutionContext();
  929. }
  930. EventTargetData* XMLHttpRequest::eventTargetData()
  931. {
  932. return &m_eventTargetData;
  933. }
  934. EventTargetData* XMLHttpRequest::ensureEventTargetData()
  935. {
  936. return &m_eventTargetData;
  937. }
  938. } // namespace WebCore