ResourceLoader.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424
  1. /*
  2. * Copyright (c) 2018-2023, Andreas Kling <kling@serenityos.org>
  3. * Copyright (c) 2022, Dex♪ <dexes.ttp@gmail.com>
  4. *
  5. * SPDX-License-Identifier: BSD-2-Clause
  6. */
  7. #include <AK/Debug.h>
  8. #include <AK/JsonObject.h>
  9. #include <LibCore/Directory.h>
  10. #include <LibCore/ElapsedTimer.h>
  11. #include <LibCore/MimeData.h>
  12. #include <LibWeb/Cookie/Cookie.h>
  13. #include <LibWeb/Cookie/ParsedCookie.h>
  14. #include <LibWeb/Loader/ContentFilter.h>
  15. #include <LibWeb/Loader/FileDirectoryLoader.h>
  16. #include <LibWeb/Loader/LoadRequest.h>
  17. #include <LibWeb/Loader/ProxyMappings.h>
  18. #include <LibWeb/Loader/Resource.h>
  19. #include <LibWeb/Loader/ResourceLoader.h>
  20. #include <LibWeb/Platform/EventLoopPlugin.h>
  21. #include <LibWeb/Platform/Timer.h>
  22. #ifdef AK_OS_SERENITY
  23. # include <serenity.h>
  24. #endif
  25. namespace Web {
  26. ResourceLoaderConnectorRequest::ResourceLoaderConnectorRequest() = default;
  27. ResourceLoaderConnectorRequest::~ResourceLoaderConnectorRequest() = default;
  28. ResourceLoaderConnector::ResourceLoaderConnector() = default;
  29. ResourceLoaderConnector::~ResourceLoaderConnector() = default;
  30. static RefPtr<ResourceLoader> s_resource_loader;
  31. void ResourceLoader::initialize(RefPtr<ResourceLoaderConnector> connector)
  32. {
  33. if (connector)
  34. s_resource_loader = ResourceLoader::try_create(connector.release_nonnull()).release_value_but_fixme_should_propagate_errors();
  35. }
  36. ResourceLoader& ResourceLoader::the()
  37. {
  38. if (!s_resource_loader) {
  39. dbgln("Web::ResourceLoader was not initialized");
  40. VERIFY_NOT_REACHED();
  41. }
  42. return *s_resource_loader;
  43. }
  44. ErrorOr<NonnullRefPtr<ResourceLoader>> ResourceLoader::try_create(NonnullRefPtr<ResourceLoaderConnector> connector)
  45. {
  46. return adopt_nonnull_ref_or_enomem(new (nothrow) ResourceLoader(move(connector)));
  47. }
  48. ResourceLoader::ResourceLoader(NonnullRefPtr<ResourceLoaderConnector> connector)
  49. : m_connector(move(connector))
  50. , m_user_agent(default_user_agent)
  51. , m_platform(default_platform)
  52. {
  53. }
  54. void ResourceLoader::prefetch_dns(AK::URL const& url)
  55. {
  56. if (ContentFilter::the().is_filtered(url)) {
  57. dbgln("ResourceLoader: Refusing to prefetch DNS for '{}': \033[31;1mURL was filtered\033[0m", url);
  58. return;
  59. }
  60. m_connector->prefetch_dns(url);
  61. }
  62. void ResourceLoader::preconnect(AK::URL const& url)
  63. {
  64. if (ContentFilter::the().is_filtered(url)) {
  65. dbgln("ResourceLoader: Refusing to pre-connect to '{}': \033[31;1mURL was filtered\033[0m", url);
  66. return;
  67. }
  68. m_connector->preconnect(url);
  69. }
  70. static HashMap<LoadRequest, NonnullRefPtr<Resource>> s_resource_cache;
  71. RefPtr<Resource> ResourceLoader::load_resource(Resource::Type type, LoadRequest& request)
  72. {
  73. if (!request.is_valid())
  74. return nullptr;
  75. bool use_cache = request.url().scheme() != "file";
  76. if (use_cache) {
  77. auto it = s_resource_cache.find(request);
  78. if (it != s_resource_cache.end()) {
  79. if (it->value->type() != type) {
  80. dbgln("FIXME: Not using cached resource for {} since there's a type mismatch.", request.url());
  81. } else {
  82. dbgln_if(CACHE_DEBUG, "Reusing cached resource for: {}", request.url());
  83. return it->value;
  84. }
  85. }
  86. }
  87. auto resource = Resource::create({}, type, request);
  88. if (use_cache)
  89. s_resource_cache.set(request, resource);
  90. load(
  91. request,
  92. [=](auto data, auto& headers, auto status_code) {
  93. const_cast<Resource&>(*resource).did_load({}, data, headers, status_code);
  94. },
  95. [=](auto& error, auto status_code) {
  96. const_cast<Resource&>(*resource).did_fail({}, error, status_code);
  97. });
  98. return resource;
  99. }
  100. static DeprecatedString sanitized_url_for_logging(AK::URL const& url)
  101. {
  102. if (url.scheme() == "data"sv)
  103. return "[data URL]"sv;
  104. return url.to_deprecated_string();
  105. }
  106. static void emit_signpost(DeprecatedString const& message, int id)
  107. {
  108. #ifdef AK_OS_SERENITY
  109. auto string_id = perf_register_string(message.characters(), message.length());
  110. perf_event(PERF_EVENT_SIGNPOST, string_id, id);
  111. #else
  112. (void)message;
  113. (void)id;
  114. #endif
  115. }
  116. static void store_response_cookies(Page& page, AK::URL const& url, DeprecatedString const& cookies)
  117. {
  118. auto set_cookie_json_value = MUST(JsonValue::from_string(cookies));
  119. VERIFY(set_cookie_json_value.type() == JsonValue::Type::Array);
  120. for (auto const& set_cookie_entry : set_cookie_json_value.as_array().values()) {
  121. VERIFY(set_cookie_entry.type() == JsonValue::Type::String);
  122. auto cookie = Cookie::parse_cookie(set_cookie_entry.as_string());
  123. if (!cookie.has_value())
  124. continue;
  125. page.client().page_did_set_cookie(url, cookie.value(), Cookie::Source::Http); // FIXME: Determine cookie source correctly
  126. }
  127. }
  128. static size_t resource_id = 0;
  129. void ResourceLoader::load(LoadRequest& request, Function<void(ReadonlyBytes, HashMap<DeprecatedString, DeprecatedString, CaseInsensitiveStringTraits> const& response_headers, Optional<u32> status_code)> success_callback, Function<void(DeprecatedString const&, Optional<u32> status_code)> error_callback, Optional<u32> timeout, Function<void()> timeout_callback)
  130. {
  131. auto& url = request.url();
  132. request.start_timer();
  133. auto id = resource_id++;
  134. auto url_for_logging = sanitized_url_for_logging(url);
  135. emit_signpost(DeprecatedString::formatted("Starting load: {}", url_for_logging), id);
  136. dbgln("ResourceLoader: Starting load of: \"{}\"", url_for_logging);
  137. auto const log_success = [url_for_logging, id](auto const& request) {
  138. auto load_time_ms = request.load_time().to_milliseconds();
  139. emit_signpost(DeprecatedString::formatted("Finished load: {}", url_for_logging), id);
  140. dbgln("ResourceLoader: Finished load of: \"{}\", Duration: {}ms", url_for_logging, load_time_ms);
  141. };
  142. auto const log_failure = [url_for_logging, id](auto const& request, auto const& error_message) {
  143. auto load_time_ms = request.load_time().to_milliseconds();
  144. emit_signpost(DeprecatedString::formatted("Failed load: {}", url_for_logging), id);
  145. dbgln("ResourceLoader: Failed load of: \"{}\", \033[31;1mError: {}\033[0m, Duration: {}ms", url_for_logging, error_message, load_time_ms);
  146. };
  147. if (is_port_blocked(url.port_or_default())) {
  148. log_failure(request, DeprecatedString::formatted("The port #{} is blocked", url.port_or_default()));
  149. return;
  150. }
  151. if (ContentFilter::the().is_filtered(url)) {
  152. auto filter_message = "URL was filtered"sv;
  153. log_failure(request, filter_message);
  154. error_callback(filter_message, {});
  155. return;
  156. }
  157. if (url.scheme() == "about") {
  158. dbgln_if(SPAM_DEBUG, "Loading about: URL {}", url);
  159. log_success(request);
  160. HashMap<DeprecatedString, DeprecatedString, CaseInsensitiveStringTraits> response_headers;
  161. response_headers.set("Content-Type", "text/html; charset=UTF-8");
  162. Platform::EventLoopPlugin::the().deferred_invoke([success_callback = move(success_callback), response_headers = move(response_headers)] {
  163. success_callback(DeprecatedString::empty().to_byte_buffer(), response_headers, {});
  164. });
  165. return;
  166. }
  167. if (url.scheme() == "data") {
  168. auto data_url_or_error = url.process_data_url();
  169. if (data_url_or_error.is_error()) {
  170. auto error_message = data_url_or_error.error().string_literal();
  171. log_failure(request, error_message);
  172. error_callback(error_message, {});
  173. return;
  174. }
  175. auto data_url = data_url_or_error.release_value();
  176. dbgln_if(SPAM_DEBUG, "ResourceLoader loading a data URL with mime-type: '{}', payload='{}'",
  177. data_url.mime_type,
  178. StringView(data_url.body.bytes()));
  179. HashMap<DeprecatedString, DeprecatedString, CaseInsensitiveStringTraits> response_headers;
  180. response_headers.set("Content-Type", data_url.mime_type.to_deprecated_string());
  181. log_success(request);
  182. Platform::EventLoopPlugin::the().deferred_invoke([data = move(data_url.body), response_headers = move(response_headers), success_callback = move(success_callback)] {
  183. success_callback(data, response_headers, {});
  184. });
  185. return;
  186. }
  187. if (url.scheme() == "file") {
  188. if (request.page().has_value())
  189. m_page = request.page().value();
  190. if (!m_page.has_value())
  191. return;
  192. FileRequest file_request(url.serialize_path(), [this, success_callback = move(success_callback), error_callback = move(error_callback), log_success, log_failure, request](ErrorOr<i32> file_or_error) {
  193. --m_pending_loads;
  194. if (on_load_counter_change)
  195. on_load_counter_change();
  196. if (file_or_error.is_error()) {
  197. log_failure(request, file_or_error.error());
  198. if (error_callback) {
  199. auto status = file_or_error.error().code() == ENOENT ? 404u : 500u;
  200. error_callback(DeprecatedString::formatted("{}", file_or_error.error()), status);
  201. }
  202. return;
  203. }
  204. auto const fd = file_or_error.value();
  205. // When local file is a directory use file directory loader to generate response
  206. auto maybe_is_valid_directory = Core::Directory::is_valid_directory(fd);
  207. if (!maybe_is_valid_directory.is_error() && maybe_is_valid_directory.value()) {
  208. auto maybe_response = load_file_directory_page(request);
  209. if (maybe_response.is_error()) {
  210. log_failure(request, maybe_response.error());
  211. if (error_callback)
  212. error_callback(DeprecatedString::formatted("{}", maybe_response.error()), 500u);
  213. return;
  214. }
  215. log_success(request);
  216. HashMap<DeprecatedString, DeprecatedString, CaseInsensitiveStringTraits> response_headers;
  217. response_headers.set("Content-Type"sv, "text/html"sv);
  218. success_callback(maybe_response.release_value().bytes(), response_headers, {});
  219. return;
  220. }
  221. // Try to read file normally
  222. auto maybe_file = Core::File::adopt_fd(fd, Core::File::OpenMode::Read);
  223. if (maybe_file.is_error()) {
  224. log_failure(request, maybe_file.error());
  225. if (error_callback)
  226. error_callback(DeprecatedString::formatted("{}", maybe_file.error()), 500u);
  227. return;
  228. }
  229. auto file = maybe_file.release_value();
  230. auto maybe_data = file->read_until_eof();
  231. if (maybe_data.is_error()) {
  232. log_failure(request, maybe_data.error());
  233. if (error_callback)
  234. error_callback(DeprecatedString::formatted("{}", maybe_data.error()), 500u);
  235. return;
  236. }
  237. auto data = maybe_data.release_value();
  238. log_success(request);
  239. // NOTE: For file:// URLs, we have to guess the MIME type, since there's no HTTP header to tell us what this is.
  240. // We insert a fake Content-Type header here, so that clients can use it to learn the MIME type.
  241. HashMap<DeprecatedString, DeprecatedString, CaseInsensitiveStringTraits> response_headers;
  242. auto mime_type = Core::guess_mime_type_based_on_filename(request.url().serialize_path());
  243. response_headers.set("Content-Type"sv, mime_type);
  244. success_callback(data, response_headers, {});
  245. });
  246. m_page->client().request_file(move(file_request));
  247. ++m_pending_loads;
  248. if (on_load_counter_change)
  249. on_load_counter_change();
  250. return;
  251. }
  252. if (url.scheme() == "http" || url.scheme() == "https" || url.scheme() == "gemini") {
  253. auto proxy = ProxyMappings::the().proxy_for_url(url);
  254. HashMap<DeprecatedString, DeprecatedString> headers;
  255. headers.set("User-Agent", m_user_agent);
  256. headers.set("Accept-Encoding", "gzip, deflate, br");
  257. for (auto& it : request.headers()) {
  258. headers.set(it.key, it.value);
  259. }
  260. auto protocol_request = m_connector->start_request(request.method(), url, headers, request.body(), proxy);
  261. if (!protocol_request) {
  262. auto start_request_failure_msg = "Failed to initiate load"sv;
  263. log_failure(request, start_request_failure_msg);
  264. if (error_callback)
  265. error_callback(start_request_failure_msg, {});
  266. return;
  267. }
  268. if (timeout.has_value() && timeout.value() > 0) {
  269. auto timer = Platform::Timer::create_single_shot(timeout.value(), nullptr);
  270. timer->on_timeout = [timer, protocol_request, timeout_callback = move(timeout_callback)] {
  271. protocol_request->stop();
  272. if (timeout_callback)
  273. timeout_callback();
  274. };
  275. timer->start();
  276. }
  277. m_active_requests.set(*protocol_request);
  278. protocol_request->on_buffered_request_finish = [this, success_callback = move(success_callback), error_callback = move(error_callback), log_success, log_failure, request, &protocol_request = *protocol_request](bool success, auto, auto& response_headers, auto status_code, ReadonlyBytes payload) mutable {
  279. --m_pending_loads;
  280. if (on_load_counter_change)
  281. on_load_counter_change();
  282. if (request.page().has_value()) {
  283. if (auto set_cookie = response_headers.get("Set-Cookie"); set_cookie.has_value())
  284. store_response_cookies(request.page().value(), request.url(), *set_cookie);
  285. if (auto cache_control = response_headers.get("cache-control"); cache_control.has_value()) {
  286. if (cache_control.value().contains("no-store"sv)) {
  287. s_resource_cache.remove(request);
  288. }
  289. }
  290. }
  291. if (!success || (status_code.has_value() && *status_code >= 400 && *status_code <= 599 && (payload.is_empty() || !request.is_main_resource()))) {
  292. StringBuilder error_builder;
  293. if (status_code.has_value())
  294. error_builder.appendff("Load failed: {}", *status_code);
  295. else
  296. error_builder.append("Load failed"sv);
  297. log_failure(request, error_builder.string_view());
  298. if (error_callback)
  299. error_callback(error_builder.to_deprecated_string(), status_code);
  300. return;
  301. }
  302. log_success(request);
  303. success_callback(payload, response_headers, status_code);
  304. Platform::EventLoopPlugin::the().deferred_invoke([this, &protocol_request] {
  305. m_active_requests.remove(protocol_request);
  306. });
  307. };
  308. protocol_request->set_should_buffer_all_input(true);
  309. protocol_request->on_certificate_requested = []() -> ResourceLoaderConnectorRequest::CertificateAndKey {
  310. return {};
  311. };
  312. ++m_pending_loads;
  313. if (on_load_counter_change)
  314. on_load_counter_change();
  315. return;
  316. }
  317. auto not_implemented_error = DeprecatedString::formatted("Protocol not implemented: {}", url.scheme());
  318. log_failure(request, not_implemented_error);
  319. if (error_callback)
  320. error_callback(not_implemented_error, {});
  321. }
  322. void ResourceLoader::load(const AK::URL& url, Function<void(ReadonlyBytes, HashMap<DeprecatedString, DeprecatedString, CaseInsensitiveStringTraits> const& response_headers, Optional<u32> status_code)> success_callback, Function<void(DeprecatedString const&, Optional<u32> status_code)> error_callback, Optional<u32> timeout, Function<void()> timeout_callback)
  323. {
  324. LoadRequest request;
  325. request.set_url(url);
  326. load(request, move(success_callback), move(error_callback), timeout, move(timeout_callback));
  327. }
  328. bool ResourceLoader::is_port_blocked(int port)
  329. {
  330. int ports[] { 1, 7, 9, 11, 13, 15, 17, 19, 20, 21, 22, 23, 25, 37, 42,
  331. 43, 53, 77, 79, 87, 95, 101, 102, 103, 104, 109, 110, 111, 113,
  332. 115, 117, 119, 123, 135, 139, 143, 179, 389, 465, 512, 513, 514,
  333. 515, 526, 530, 531, 532, 540, 556, 563, 587, 601, 636, 993, 995,
  334. 2049, 3659, 4045, 6000, 6379, 6665, 6666, 6667, 6668, 6669, 9000 };
  335. for (auto blocked_port : ports)
  336. if (port == blocked_port)
  337. return true;
  338. return false;
  339. }
  340. void ResourceLoader::clear_cache()
  341. {
  342. dbgln_if(CACHE_DEBUG, "Clearing {} items from ResourceLoader cache", s_resource_cache.size());
  343. s_resource_cache.clear();
  344. }
  345. void ResourceLoader::evict_from_cache(LoadRequest const& request)
  346. {
  347. dbgln_if(CACHE_DEBUG, "Removing resource {} from cache", request.url());
  348. s_resource_cache.remove(request);
  349. }
  350. }