Fetching.cpp 114 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930
  1. /*
  2. * Copyright (c) 2022-2023, Linus Groh <linusg@serenityos.org>
  3. * Copyright (c) 2023, Luke Wilde <lukew@serenityos.org>
  4. * Copyright (c) 2023, Sam Atkins <atkinssj@serenityos.org>
  5. *
  6. * SPDX-License-Identifier: BSD-2-Clause
  7. */
  8. #include <AK/Base64.h>
  9. #include <AK/Debug.h>
  10. #include <AK/ScopeGuard.h>
  11. #include <LibJS/Runtime/Completion.h>
  12. #include <LibWeb/Bindings/MainThreadVM.h>
  13. #include <LibWeb/Cookie/Cookie.h>
  14. #include <LibWeb/DOM/Document.h>
  15. #include <LibWeb/Fetch/BodyInit.h>
  16. #include <LibWeb/Fetch/Fetching/Checks.h>
  17. #include <LibWeb/Fetch/Fetching/Fetching.h>
  18. #include <LibWeb/Fetch/Fetching/PendingResponse.h>
  19. #include <LibWeb/Fetch/Fetching/RefCountedFlag.h>
  20. #include <LibWeb/Fetch/Infrastructure/FetchAlgorithms.h>
  21. #include <LibWeb/Fetch/Infrastructure/FetchController.h>
  22. #include <LibWeb/Fetch/Infrastructure/FetchParams.h>
  23. #include <LibWeb/Fetch/Infrastructure/FetchTimingInfo.h>
  24. #include <LibWeb/Fetch/Infrastructure/HTTP/Methods.h>
  25. #include <LibWeb/Fetch/Infrastructure/HTTP/Requests.h>
  26. #include <LibWeb/Fetch/Infrastructure/HTTP/Responses.h>
  27. #include <LibWeb/Fetch/Infrastructure/HTTP/Statuses.h>
  28. #include <LibWeb/Fetch/Infrastructure/MimeTypeBlocking.h>
  29. #include <LibWeb/Fetch/Infrastructure/NoSniffBlocking.h>
  30. #include <LibWeb/Fetch/Infrastructure/PortBlocking.h>
  31. #include <LibWeb/Fetch/Infrastructure/Task.h>
  32. #include <LibWeb/Fetch/Infrastructure/URL.h>
  33. #include <LibWeb/HTML/EventLoop/EventLoop.h>
  34. #include <LibWeb/HTML/Scripting/Environments.h>
  35. #include <LibWeb/HTML/Window.h>
  36. #include <LibWeb/HighResolutionTime/TimeOrigin.h>
  37. #include <LibWeb/Loader/LoadRequest.h>
  38. #include <LibWeb/Loader/ResourceLoader.h>
  39. #include <LibWeb/Platform/EventLoopPlugin.h>
  40. #include <LibWeb/ReferrerPolicy/AbstractOperations.h>
  41. #include <LibWeb/SRI/SRI.h>
  42. #include <LibWeb/URL/URL.h>
  43. #include <LibWeb/WebIDL/DOMException.h>
  44. namespace Web::Fetch::Fetching {
  45. #define TRY_OR_IGNORE(expression) \
  46. ({ \
  47. auto&& _temporary_result = (expression); \
  48. if (_temporary_result.is_error()) \
  49. return; \
  50. static_assert(!::AK::Detail::IsLvalueReference<decltype(_temporary_result.release_value())>, \
  51. "Do not return a reference from a fallible expression"); \
  52. _temporary_result.release_value(); \
  53. })
  54. // https://fetch.spec.whatwg.org/#concept-fetch
  55. WebIDL::ExceptionOr<JS::NonnullGCPtr<Infrastructure::FetchController>> fetch(JS::Realm& realm, Infrastructure::Request& request, Infrastructure::FetchAlgorithms const& algorithms, UseParallelQueue use_parallel_queue)
  56. {
  57. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'fetch' with: request @ {}", &request);
  58. auto& vm = realm.vm();
  59. // 1. Assert: request’s mode is "navigate" or processEarlyHintsResponse is null.
  60. VERIFY(request.mode() == Infrastructure::Request::Mode::Navigate || !algorithms.process_early_hints_response().has_value());
  61. // 2. Let taskDestination be null.
  62. JS::GCPtr<JS::Object> task_destination;
  63. // 3. Let crossOriginIsolatedCapability be false.
  64. auto cross_origin_isolated_capability = HTML::CanUseCrossOriginIsolatedAPIs::No;
  65. // 4. If request’s client is non-null, then:
  66. if (request.client() != nullptr) {
  67. // 1. Set taskDestination to request’s client’s global object.
  68. task_destination = request.client()->global_object();
  69. // 2. Set crossOriginIsolatedCapability to request’s client’s cross-origin isolated capability.
  70. cross_origin_isolated_capability = request.client()->cross_origin_isolated_capability();
  71. }
  72. // FIXME: 5. If useParallelQueue is true, then set taskDestination to the result of starting a new parallel queue.
  73. (void)use_parallel_queue;
  74. (void)task_destination;
  75. // 6. Let timingInfo be a new fetch timing info whose start time and post-redirect start time are the coarsened
  76. // shared current time given crossOriginIsolatedCapability, and render-blocking is set to request’s
  77. // render-blocking.
  78. auto timing_info = Infrastructure::FetchTimingInfo::create(vm);
  79. auto now = HighResolutionTime::coarsened_shared_current_time(cross_origin_isolated_capability == HTML::CanUseCrossOriginIsolatedAPIs::Yes);
  80. timing_info->set_start_time(now);
  81. timing_info->set_post_redirect_start_time(now);
  82. timing_info->set_render_blocking(request.render_blocking());
  83. // 7. Let fetchParams be a new fetch params whose request is request, timing info is timingInfo, process request
  84. // body chunk length is processRequestBodyChunkLength, process request end-of-body is processRequestEndOfBody,
  85. // process early hints response is processEarlyHintsResponse, process response is processResponse, process
  86. // response consume body is processResponseConsumeBody, process response end-of-body is processResponseEndOfBody,
  87. // task destination is taskDestination, and cross-origin isolated capability is crossOriginIsolatedCapability.
  88. auto fetch_params = Infrastructure::FetchParams::create(vm, request, timing_info);
  89. fetch_params->set_algorithms(algorithms);
  90. if (task_destination)
  91. fetch_params->set_task_destination({ *task_destination });
  92. fetch_params->set_cross_origin_isolated_capability(cross_origin_isolated_capability);
  93. // 8. If request’s body is a byte sequence, then set request’s body to request’s body as a body.
  94. if (auto const* buffer = request.body().get_pointer<ByteBuffer>())
  95. request.set_body(TRY(Infrastructure::byte_sequence_as_body(realm, buffer->bytes())));
  96. // 9. If request’s window is "client", then set request’s window to request’s client, if request’s client’s global
  97. // object is a Window object; otherwise "no-window".
  98. auto const* window = request.window().get_pointer<Infrastructure::Request::Window>();
  99. if (window && *window == Infrastructure::Request::Window::Client) {
  100. if (is<HTML::Window>(request.client()->global_object())) {
  101. request.set_window(request.client());
  102. } else {
  103. request.set_window(Infrastructure::Request::Window::NoWindow);
  104. }
  105. }
  106. // 10. If request’s origin is "client", then set request’s origin to request’s client’s origin.
  107. auto const* origin = request.origin().get_pointer<Infrastructure::Request::Origin>();
  108. if (origin && *origin == Infrastructure::Request::Origin::Client)
  109. request.set_origin(request.client()->origin());
  110. // 12. If request’s policy container is "client", then:
  111. auto const* policy_container = request.policy_container().get_pointer<Infrastructure::Request::PolicyContainer>();
  112. if (policy_container) {
  113. VERIFY(*policy_container == Infrastructure::Request::PolicyContainer::Client);
  114. // 1. If request’s client is non-null, then set request’s policy container to a clone of request’s client’s
  115. // policy container.
  116. if (request.client() != nullptr)
  117. request.set_policy_container(request.client()->policy_container());
  118. // 2. Otherwise, set request’s policy container to a new policy container.
  119. else
  120. request.set_policy_container(HTML::PolicyContainer {});
  121. }
  122. // 13. If request’s header list does not contain `Accept`, then:
  123. if (!request.header_list()->contains("Accept"sv.bytes())) {
  124. // 1. Let value be `*/*`.
  125. auto value = "*/*"sv;
  126. // 2. A user agent should set value to the first matching statement, if any, switching on request’s
  127. // destination:
  128. if (request.destination().has_value()) {
  129. switch (*request.destination()) {
  130. // -> "document"
  131. // -> "frame"
  132. // -> "iframe"
  133. case Infrastructure::Request::Destination::Document:
  134. case Infrastructure::Request::Destination::Frame:
  135. case Infrastructure::Request::Destination::IFrame:
  136. // `text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8`
  137. value = "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"sv;
  138. break;
  139. // -> "image"
  140. case Infrastructure::Request::Destination::Image:
  141. // `image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5`
  142. value = "image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5"sv;
  143. break;
  144. // -> "style"
  145. case Infrastructure::Request::Destination::Style:
  146. // `text/css,*/*;q=0.1`
  147. value = "text/css,*/*;q=0.1"sv;
  148. break;
  149. default:
  150. break;
  151. }
  152. }
  153. // 3. Append (`Accept`, value) to request’s header list.
  154. auto header = TRY_OR_THROW_OOM(vm, Infrastructure::Header::from_string_pair("Accept"sv, value.bytes()));
  155. TRY_OR_THROW_OOM(vm, request.header_list()->append(move(header)));
  156. }
  157. // 14. If request’s header list does not contain `Accept-Language`, then user agents should append
  158. // (`Accept-Language, an appropriate header value) to request’s header list.
  159. if (!request.header_list()->contains("Accept-Language"sv.bytes())) {
  160. auto header = MUST(Infrastructure::Header::from_string_pair("Accept-Language"sv, "*"sv));
  161. TRY_OR_THROW_OOM(vm, request.header_list()->append(move(header)));
  162. }
  163. // 15. If request’s priority is null, then use request’s initiator, destination, and render-blocking appropriately
  164. // in setting request’s priority to a user-agent-defined object.
  165. // NOTE: The user-agent-defined object could encompass stream weight and dependency for HTTP/2, and equivalent
  166. // information used to prioritize dispatch and processing of HTTP/1 fetches.
  167. // 16. If request is a subresource request, then:
  168. if (request.is_subresource_request()) {
  169. // FIXME: 1. Let record be a new fetch record whose request is request and controller is fetchParams’s controller.
  170. // FIXME: 2. Append record to request’s client’s fetch group list of fetch records.
  171. }
  172. // 17. Run main fetch given fetchParams.
  173. (void)TRY(main_fetch(realm, fetch_params));
  174. // 18. Return fetchParams’s controller.
  175. return fetch_params->controller();
  176. }
  177. // https://fetch.spec.whatwg.org/#concept-main-fetch
  178. WebIDL::ExceptionOr<Optional<JS::NonnullGCPtr<PendingResponse>>> main_fetch(JS::Realm& realm, Infrastructure::FetchParams const& fetch_params, Recursive recursive)
  179. {
  180. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'main fetch' with: fetch_params @ {}", &fetch_params);
  181. auto& vm = realm.vm();
  182. // 1. Let request be fetchParams’s request.
  183. auto request = fetch_params.request();
  184. // 2. Let response be null.
  185. JS::GCPtr<Infrastructure::Response> response;
  186. // 3. If request’s local-URLs-only flag is set and request’s current URL is not local, then set response to a
  187. // network error.
  188. if (request->local_urls_only() && !Infrastructure::is_local_url(request->current_url()))
  189. response = Infrastructure::Response::network_error(vm, "Request with 'local-URLs-only' flag must have a local URL"sv);
  190. // FIXME: 4. Run report Content Security Policy violations for request.
  191. // FIXME: 5. Upgrade request to a potentially trustworthy URL, if appropriate.
  192. // FIXME: 6. Upgrade a mixed content request to a potentially trustworthy URL, if appropriate.
  193. // 7. If should request be blocked due to a bad port, should fetching request be blocked as mixed content, or
  194. // should request be blocked by Content Security Policy returns blocked, then set response to a network error.
  195. if (Infrastructure::block_bad_port(request) == Infrastructure::RequestOrResponseBlocking::Blocked
  196. || false // FIXME: "should fetching request be blocked as mixed content"
  197. || false // FIXME: "should request be blocked by Content Security Policy returns blocked"
  198. ) {
  199. response = Infrastructure::Response::network_error(vm, "Request was blocked"sv);
  200. }
  201. // 8. If request’s referrer policy is the empty string, then set request’s referrer policy to request’s policy
  202. // container’s referrer policy.
  203. if (!request->referrer_policy().has_value()) {
  204. VERIFY(request->policy_container().has<HTML::PolicyContainer>());
  205. request->set_referrer_policy(request->policy_container().get<HTML::PolicyContainer>().referrer_policy);
  206. }
  207. // 9. If request’s referrer is not "no-referrer", then set request’s referrer to the result of invoking determine
  208. // request’s referrer.
  209. // NOTE: As stated in Referrer Policy, user agents can provide the end user with options to override request’s
  210. // referrer to "no-referrer" or have it expose less sensitive information.
  211. auto const* referrer = request->referrer().get_pointer<Infrastructure::Request::Referrer>();
  212. if (!referrer || *referrer != Infrastructure::Request::Referrer::NoReferrer) {
  213. auto determined_referrer = ReferrerPolicy::determine_requests_referrer(request);
  214. if (determined_referrer.has_value())
  215. request->set_referrer(*determined_referrer);
  216. else
  217. request->set_referrer(Infrastructure::Request::Referrer::NoReferrer);
  218. }
  219. // 10. Set request’s current URL’s scheme to "https" if all of the following conditions are true:
  220. if (
  221. // - request’s current URL’s scheme is "http"
  222. request->current_url().scheme() == "http"sv
  223. // - request’s current URL’s host is a domain
  224. && URL::host_is_domain(request->current_url().host())
  225. // FIXME: - Matching request’s current URL’s host per Known HSTS Host Domain Name Matching results in either a
  226. // superdomain match with an asserted includeSubDomains directive or a congruent match (with or without an
  227. // asserted includeSubDomains directive) [HSTS]; or DNS resolution for the request finds a matching HTTPS RR
  228. // per section 9.5 of [SVCB].
  229. && false
  230. ) {
  231. request->current_url().set_scheme("https"sv);
  232. }
  233. JS::SafeFunction<WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>>()> get_response = [&realm, &vm, &fetch_params, request]() -> WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>> {
  234. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'main fetch' get_response() function");
  235. // -> fetchParams’s preloaded response candidate is not null
  236. if (!fetch_params.preloaded_response_candidate().has<Empty>()) {
  237. // 1. Wait until fetchParams’s preloaded response candidate is not "pending".
  238. HTML::main_thread_event_loop().spin_until([&] {
  239. return !fetch_params.preloaded_response_candidate().has<Infrastructure::FetchParams::PreloadedResponseCandidatePendingTag>();
  240. });
  241. // 2. Assert: fetchParams’s preloaded response candidate is a response.
  242. VERIFY(fetch_params.preloaded_response_candidate().has<JS::NonnullGCPtr<Infrastructure::Response>>());
  243. // 3. Return fetchParams’s preloaded response candidate.
  244. return PendingResponse::create(vm, request, fetch_params.preloaded_response_candidate().get<JS::NonnullGCPtr<Infrastructure::Response>>());
  245. }
  246. // -> request’s current URL’s origin is same origin with request’s origin, and request’s response tainting
  247. // is "basic"
  248. // -> request’s current URL’s scheme is "data"
  249. // -> request’s mode is "navigate" or "websocket"
  250. else if (
  251. (request->origin().has<HTML::Origin>() && URL::url_origin(request->current_url()).is_same_origin(request->origin().get<HTML::Origin>()) && request->response_tainting() == Infrastructure::Request::ResponseTainting::Basic)
  252. || request->current_url().scheme() == "data"sv
  253. || (request->mode() == Infrastructure::Request::Mode::Navigate || request->mode() == Infrastructure::Request::Mode::WebSocket)) {
  254. // 1. Set request’s response tainting to "basic".
  255. request->set_response_tainting(Infrastructure::Request::ResponseTainting::Basic);
  256. // 2. Return the result of running scheme fetch given fetchParams.
  257. return scheme_fetch(realm, fetch_params);
  258. // NOTE: HTML assigns any documents and workers created from URLs whose scheme is "data" a unique
  259. // opaque origin. Service workers can only be created from URLs whose scheme is an HTTP(S) scheme.
  260. }
  261. // -> request’s mode is "same-origin"
  262. else if (request->mode() == Infrastructure::Request::Mode::SameOrigin) {
  263. // Return a network error.
  264. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request with 'same-origin' mode must have same URL and request origin"sv));
  265. }
  266. // -> request’s mode is "no-cors"
  267. else if (request->mode() == Infrastructure::Request::Mode::NoCORS) {
  268. // 1. If request’s redirect mode is not "follow", then return a network error.
  269. if (request->redirect_mode() != Infrastructure::Request::RedirectMode::Follow)
  270. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request with 'no-cors' mode must have redirect mode set to 'follow'"sv));
  271. // 2. Set request’s response tainting to "opaque".
  272. request->set_response_tainting(Infrastructure::Request::ResponseTainting::Opaque);
  273. // 3. Return the result of running scheme fetch given fetchParams.
  274. return scheme_fetch(realm, fetch_params);
  275. }
  276. // -> request’s current URL’s scheme is not an HTTP(S) scheme
  277. else if (!Infrastructure::is_http_or_https_scheme(request->current_url().scheme())) {
  278. // NOTE: At this point all other request modes have been handled. Ensure we're not lying in the error message :^)
  279. VERIFY(request->mode() == Infrastructure::Request::Mode::CORS);
  280. // Return a network error.
  281. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request with 'cors' mode must have URL with HTTP or HTTPS scheme"sv));
  282. }
  283. // -> request’s use-CORS-preflight flag is set
  284. // -> request’s unsafe-request flag is set and either request’s method is not a CORS-safelisted method or
  285. // CORS-unsafe request-header names with request’s header list is not empty
  286. else if (
  287. request->use_cors_preflight()
  288. || (request->unsafe_request()
  289. && (!Infrastructure::is_cors_safelisted_method(request->method())
  290. || !TRY_OR_THROW_OOM(vm, Infrastructure::get_cors_unsafe_header_names(request->header_list())).is_empty()))) {
  291. // 1. Set request’s response tainting to "cors".
  292. request->set_response_tainting(Infrastructure::Request::ResponseTainting::CORS);
  293. auto returned_pending_response = PendingResponse::create(vm, request);
  294. // 2. Let corsWithPreflightResponse be the result of running HTTP fetch given fetchParams and true.
  295. auto cors_with_preflight_response = TRY(http_fetch(realm, fetch_params, MakeCORSPreflight::Yes));
  296. cors_with_preflight_response->when_loaded([returned_pending_response](JS::NonnullGCPtr<Infrastructure::Response> cors_with_preflight_response) {
  297. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'main fetch' cors_with_preflight_response load callback");
  298. // 3. If corsWithPreflightResponse is a network error, then clear cache entries using request.
  299. if (cors_with_preflight_response->is_network_error()) {
  300. // FIXME: Clear cache entries
  301. }
  302. // 4. Return corsWithPreflightResponse.
  303. returned_pending_response->resolve(cors_with_preflight_response);
  304. });
  305. return returned_pending_response;
  306. }
  307. // -> Otherwise
  308. else {
  309. // 1. Set request’s response tainting to "cors".
  310. request->set_response_tainting(Infrastructure::Request::ResponseTainting::CORS);
  311. // 2. Return the result of running HTTP fetch given fetchParams.
  312. return http_fetch(realm, fetch_params);
  313. }
  314. };
  315. if (recursive == Recursive::Yes) {
  316. // 12. If response is null, then set response to the result of running the steps corresponding to the first
  317. // matching statement:
  318. auto pending_response = !response
  319. ? TRY(get_response())
  320. : PendingResponse::create(vm, request, *response);
  321. // 13. If recursive is true, then return response.
  322. return pending_response;
  323. }
  324. // 11. If recursive is false, then run the remaining steps in parallel.
  325. Platform::EventLoopPlugin::the().deferred_invoke([&realm, &vm, &fetch_params, request, response, get_response = move(get_response)] {
  326. // 12. If response is null, then set response to the result of running the steps corresponding to the first
  327. // matching statement:
  328. auto pending_response = PendingResponse::create(vm, request, Infrastructure::Response::create(vm));
  329. if (!response) {
  330. auto pending_response_or_error = get_response();
  331. if (pending_response_or_error.is_error())
  332. return;
  333. pending_response = pending_response_or_error.release_value();
  334. }
  335. pending_response->when_loaded([&realm, &vm, &fetch_params, request, response, response_was_null = !response](JS::NonnullGCPtr<Infrastructure::Response> resolved_response) mutable {
  336. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'main fetch' pending_response load callback");
  337. if (response_was_null)
  338. response = resolved_response;
  339. // 14. If response is not a network error and response is not a filtered response, then:
  340. if (!response->is_network_error() && !is<Infrastructure::FilteredResponse>(*response)) {
  341. // 1. If request’s response tainting is "cors", then:
  342. if (request->response_tainting() == Infrastructure::Request::ResponseTainting::CORS) {
  343. // FIXME: 1. Let headerNames be the result of extracting header list values given
  344. // `Access-Control-Expose-Headers` and response’s header list.
  345. // FIXME: 2. If request’s credentials mode is not "include" and headerNames contains `*`, then set
  346. // response’s CORS-exposed header-name list to all unique header names in response’s header
  347. // list.
  348. // FIXME: 3. Otherwise, if headerNames is not null or failure, then set response’s CORS-exposed
  349. // header-name list to headerNames.
  350. }
  351. // 2. Set response to the following filtered response with response as its internal response, depending
  352. // on request’s response tainting:
  353. response = TRY_OR_IGNORE([&]() -> WebIDL::ExceptionOr<JS::NonnullGCPtr<Infrastructure::Response>> {
  354. switch (request->response_tainting()) {
  355. // -> "basic"
  356. case Infrastructure::Request::ResponseTainting::Basic:
  357. // basic filtered response
  358. return TRY_OR_THROW_OOM(vm, Infrastructure::BasicFilteredResponse::create(vm, *response));
  359. // -> "cors"
  360. case Infrastructure::Request::ResponseTainting::CORS:
  361. // CORS filtered response
  362. return TRY_OR_THROW_OOM(vm, Infrastructure::CORSFilteredResponse::create(vm, *response));
  363. // -> "opaque"
  364. case Infrastructure::Request::ResponseTainting::Opaque:
  365. // opaque filtered response
  366. return Infrastructure::OpaqueFilteredResponse::create(vm, *response);
  367. default:
  368. VERIFY_NOT_REACHED();
  369. }
  370. }());
  371. }
  372. // 15. Let internalResponse be response, if response is a network error, and response’s internal response
  373. // otherwise.
  374. auto internal_response = response->is_network_error()
  375. ? JS::NonnullGCPtr { *response }
  376. : static_cast<Infrastructure::FilteredResponse&>(*response).internal_response();
  377. // 16. If internalResponse’s URL list is empty, then set it to a clone of request’s URL list.
  378. // NOTE: A response’s URL list can be empty (for example, when the response represents an about URL).
  379. if (internal_response->url_list().is_empty())
  380. internal_response->set_url_list(request->url_list());
  381. // 17. If request has a redirect-tainted origin, then set internalResponse’s has-cross-origin-redirects to true.
  382. if (request->has_redirect_tainted_origin())
  383. internal_response->set_has_cross_origin_redirects(true);
  384. // 18. If request’s timing allow failed flag is unset, then set internalResponse’s timing allow passed flag.
  385. if (!request->timing_allow_failed())
  386. internal_response->set_timing_allow_passed(true);
  387. // 19. If response is not a network error and any of the following returns blocked
  388. if (!response->is_network_error() && (
  389. // FIXME: - should internalResponse to request be blocked as mixed content
  390. false
  391. // FIXME: - should internalResponse to request be blocked by Content Security Policy
  392. || false
  393. // - should internalResponse to request be blocked due to its MIME type
  394. || TRY_OR_IGNORE(Infrastructure::should_response_to_request_be_blocked_due_to_its_mime_type(internal_response, request)) == Infrastructure::RequestOrResponseBlocking::Blocked
  395. // - should internalResponse to request be blocked due to nosniff
  396. || TRY_OR_IGNORE(Infrastructure::should_response_to_request_be_blocked_due_to_nosniff(internal_response, request)) == Infrastructure::RequestOrResponseBlocking::Blocked)) {
  397. // then set response and internalResponse to a network error.
  398. response = internal_response = Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("Response was blocked"_string));
  399. }
  400. // 20. If response’s type is "opaque", internalResponse’s status is 206, internalResponse’s range-requested
  401. // flag is set, and request’s header list does not contain `Range`, then set response and
  402. // internalResponse to a network error.
  403. // NOTE: Traditionally, APIs accept a ranged response even if a range was not requested. This prevents a
  404. // partial response from an earlier ranged request being provided to an API that did not make a range
  405. // request.
  406. if (response->type() == Infrastructure::Response::Type::Opaque
  407. && internal_response->status() == 206
  408. && internal_response->range_requested()
  409. && !request->header_list()->contains("Range"sv.bytes())) {
  410. response = internal_response = Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("Response has status 206 and 'range-requested' flag set, but request has no 'Range' header"_string));
  411. }
  412. // 21. If response is not a network error and either request’s method is `HEAD` or `CONNECT`, or
  413. // internalResponse’s status is a null body status, set internalResponse’s body to null and disregard
  414. // any enqueuing toward it (if any).
  415. // NOTE: This standardizes the error handling for servers that violate HTTP.
  416. if (!response->is_network_error() && (StringView { request->method() }.is_one_of("HEAD"sv, "CONNECT"sv) || Infrastructure::is_null_body_status(internal_response->status())))
  417. internal_response->set_body({});
  418. // 22. If request’s integrity metadata is not the empty string, then:
  419. if (!request->integrity_metadata().is_empty()) {
  420. // 1. Let processBodyError be this step: run fetch response handover given fetchParams and a network
  421. // error.
  422. Infrastructure::Body::ProcessBodyErrorCallback process_body_error = [&realm, &vm, &fetch_params](auto) {
  423. TRY_OR_IGNORE(fetch_response_handover(realm, fetch_params, Infrastructure::Response::network_error(vm, "Response body could not be processed"sv)));
  424. };
  425. // 2. If response’s body is null, then run processBodyError and abort these steps.
  426. if (!response->body().has_value()) {
  427. process_body_error({});
  428. return;
  429. }
  430. // 3. Let processBody given bytes be these steps:
  431. Infrastructure::Body::ProcessBodyCallback process_body = [&realm, request, response, &fetch_params, process_body_error = move(process_body_error)](ByteBuffer bytes) {
  432. // 1. If bytes do not match request’s integrity metadata, then run processBodyError and abort these steps.
  433. if (!TRY_OR_IGNORE(SRI::do_bytes_match_metadata_list(bytes, request->integrity_metadata()))) {
  434. process_body_error({});
  435. return;
  436. }
  437. // 2. Set response’s body to bytes as a body.
  438. response->set_body(TRY_OR_IGNORE(Infrastructure::byte_sequence_as_body(realm, bytes)));
  439. // 3. Run fetch response handover given fetchParams and response.
  440. TRY_OR_IGNORE(fetch_response_handover(realm, fetch_params, *response));
  441. };
  442. // 4. Fully read response’s body given processBody and processBodyError.
  443. TRY_OR_IGNORE(response->body()->fully_read(realm, move(process_body), move(process_body_error), fetch_params.task_destination()));
  444. }
  445. // 23. Otherwise, run fetch response handover given fetchParams and response.
  446. else {
  447. TRY_OR_IGNORE(fetch_response_handover(realm, fetch_params, *response));
  448. }
  449. });
  450. });
  451. return Optional<JS::NonnullGCPtr<PendingResponse>> {};
  452. }
  453. // https://fetch.spec.whatwg.org/#fetch-finale
  454. WebIDL::ExceptionOr<void> fetch_response_handover(JS::Realm& realm, Infrastructure::FetchParams const& fetch_params, Infrastructure::Response& response)
  455. {
  456. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'fetch response handover' with: fetch_params @ {}, response @ {}", &fetch_params, &response);
  457. auto& vm = realm.vm();
  458. // 1. Let timingInfo be fetchParams’s timing info.
  459. auto timing_info = fetch_params.timing_info();
  460. // 2. If response is not a network error and fetchParams’s request’s client is a secure context, then set
  461. // timingInfo’s server-timing headers to the result of getting, decoding, and splitting `Server-Timing` from
  462. // response’s header list.
  463. // The user agent may decide to expose `Server-Timing` headers to non-secure contexts requests as well.
  464. auto client = fetch_params.request()->client();
  465. if (!response.is_network_error() && client != nullptr && HTML::is_secure_context(*client)) {
  466. auto server_timing_headers = TRY_OR_THROW_OOM(vm, response.header_list()->get_decode_and_split("Server-Timing"sv.bytes()));
  467. if (server_timing_headers.has_value())
  468. timing_info->set_server_timing_headers(server_timing_headers.release_value());
  469. }
  470. // 3. Let processResponseEndOfBody be the following steps:
  471. auto process_response_end_of_body = [&vm, &response, &fetch_params, timing_info] {
  472. // 1. Let unsafeEndTime be the unsafe shared current time.
  473. auto unsafe_end_time = HighResolutionTime::unsafe_shared_current_time();
  474. // 2. If fetchParams’s request’s destination is "document", then set fetchParams’s controller’s full timing
  475. // info to fetchParams’s timing info.
  476. if (fetch_params.request()->destination() == Infrastructure::Request::Destination::Document)
  477. fetch_params.controller()->set_full_timing_info(fetch_params.timing_info());
  478. // 3. Set fetchParams’s controller’s report timing steps to the following steps given a global object global:
  479. fetch_params.controller()->set_report_timing_steps([&vm, &response, &fetch_params, timing_info, unsafe_end_time](JS::Object const& global) mutable {
  480. // 1. If fetchParams’s request’s URL’s scheme is not an HTTP(S) scheme, then return.
  481. if (!Infrastructure::is_http_or_https_scheme(fetch_params.request()->url().scheme()))
  482. return;
  483. // 2. Set timingInfo’s end time to the relative high resolution time given unsafeEndTime and global.
  484. timing_info->set_end_time(HighResolutionTime::relative_high_resolution_time(unsafe_end_time, global));
  485. // 3. Let cacheState be response’s cache state.
  486. auto cache_state = response.cache_state();
  487. // 4. Let bodyInfo be response’s body info.
  488. auto body_info = response.body_info();
  489. // 5. If response’s timing allow passed flag is not set, then set timingInfo to the result of creating an
  490. // opaque timing info for timingInfo, set bodyInfo to a new response body info, and set cacheState to
  491. // the empty string.
  492. // NOTE: This covers the case of response being a network error.
  493. if (!response.timing_allow_passed()) {
  494. timing_info = Infrastructure::create_opaque_timing_info(vm, timing_info);
  495. body_info = Infrastructure::Response::BodyInfo {};
  496. cache_state = {};
  497. }
  498. // 6. Let responseStatus be 0 if fetchParams’s request’s mode is "navigate" and response’s has-cross-origin-redirects is true; otherwise response’s status.
  499. auto response_status = fetch_params.request()->mode() == Infrastructure::Request::Mode::Navigate && response.has_cross_origin_redirects()
  500. ? 0
  501. : response.status();
  502. // FIXME: 7. If fetchParams’s request’s initiator type is not null, then mark resource timing given timingInfo,
  503. // request’s URL, request’s initiator type, global, cacheState, bodyInfo, and responseStatus.
  504. (void)timing_info;
  505. (void)global;
  506. (void)cache_state;
  507. (void)body_info;
  508. (void)response_status;
  509. });
  510. // 4. Let processResponseEndOfBodyTask be the following steps:
  511. auto process_response_end_of_body_task = [&fetch_params, &response] {
  512. // 1. Set fetchParams’s request’s done flag.
  513. fetch_params.request()->set_done(true);
  514. // 2. If fetchParams’s process response end-of-body is non-null, then run fetchParams’s process response
  515. // end-of-body given response.
  516. if (fetch_params.algorithms()->process_response_end_of_body().has_value())
  517. (*fetch_params.algorithms()->process_response_end_of_body())(response);
  518. // 3. If fetchParams’s request’s initiator type is non-null and fetchParams’s request’s client’s global
  519. // object is fetchParams’s task destination, then run fetchParams’s controller’s report timing steps
  520. // given fetchParams’s request’s client’s global object.
  521. auto client = fetch_params.request()->client();
  522. auto const* task_destination_global_object = fetch_params.task_destination().get_pointer<JS::NonnullGCPtr<JS::Object>>();
  523. if (client != nullptr && task_destination_global_object != nullptr) {
  524. if (fetch_params.request()->initiator_type().has_value() && &client->global_object() == task_destination_global_object->ptr())
  525. fetch_params.controller()->report_timing(client->global_object());
  526. }
  527. };
  528. // FIXME: Handle 'parallel queue' task destination
  529. auto task_destination = fetch_params.task_destination().get<JS::NonnullGCPtr<JS::Object>>();
  530. // 5. Queue a fetch task to run processResponseEndOfBodyTask with fetchParams’s task destination.
  531. Infrastructure::queue_fetch_task(task_destination, move(process_response_end_of_body_task));
  532. };
  533. // FIXME: Handle 'parallel queue' task destination
  534. auto task_destination = fetch_params.task_destination().get<JS::NonnullGCPtr<JS::Object>>();
  535. // 4. If fetchParams’s process response is non-null, then queue a fetch task to run fetchParams’s process response
  536. // given response, with fetchParams’s task destination.
  537. if (fetch_params.algorithms()->process_response().has_value()) {
  538. Infrastructure::queue_fetch_task(task_destination, [&fetch_params, &response]() {
  539. (*fetch_params.algorithms()->process_response())(response);
  540. });
  541. }
  542. // 5. Let internalResponse be response, if response is a network error; otherwise response’s internal response.
  543. auto internal_response = response.is_network_error() ? JS::NonnullGCPtr { response } : response.unsafe_response();
  544. // 6. If internalResponse’s body is null, then run processResponseEndOfBody.
  545. if (!internal_response->body().has_value()) {
  546. process_response_end_of_body();
  547. }
  548. // 7. Otherwise:
  549. else {
  550. // FIXME: 1. Let transformStream be a new TransformStream.
  551. // FIXME: 2. Let identityTransformAlgorithm be an algorithm which, given chunk, enqueues chunk in transformStream.
  552. // FIXME: 3. Set up transformStream with transformAlgorithm set to identityTransformAlgorithm and flushAlgorithm set
  553. // to processResponseEndOfBody.
  554. // FIXME: 4. Set internalResponse’s body’s stream to the result of internalResponse’s body’s stream piped through transformStream.
  555. }
  556. // 8. If fetchParams’s process response consume body is non-null, then:
  557. if (fetch_params.algorithms()->process_response_consume_body().has_value()) {
  558. // 1. Let processBody given nullOrBytes be this step: run fetchParams’s process response consume body given
  559. // response and nullOrBytes.
  560. auto process_body = [&fetch_params, &response](Variant<ByteBuffer, Empty> const& null_or_bytes) {
  561. (*fetch_params.algorithms()->process_response_consume_body())(response, null_or_bytes);
  562. };
  563. // 2. Let processBodyError be this step: run fetchParams’s process response consume body given response and
  564. // failure.
  565. auto process_body_error = [&fetch_params, &response](auto) {
  566. (*fetch_params.algorithms()->process_response_consume_body())(response, Infrastructure::FetchAlgorithms::ConsumeBodyFailureTag {});
  567. };
  568. // 3. If internalResponse's body is null, then queue a fetch task to run processBody given null, with
  569. // fetchParams’s task destination.
  570. if (!internal_response->body().has_value()) {
  571. Infrastructure::queue_fetch_task(task_destination, [process_body = move(process_body)]() {
  572. process_body({});
  573. });
  574. }
  575. // 4. Otherwise, fully read internalResponse body given processBody, processBodyError, and fetchParams’s task
  576. // destination.
  577. else {
  578. TRY(internal_response->body()->fully_read(realm, move(process_body), move(process_body_error), fetch_params.task_destination()));
  579. }
  580. }
  581. return {};
  582. }
  583. // https://fetch.spec.whatwg.org/#concept-scheme-fetch
  584. WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>> scheme_fetch(JS::Realm& realm, Infrastructure::FetchParams const& fetch_params)
  585. {
  586. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'scheme fetch' with: fetch_params @ {}", &fetch_params);
  587. auto& vm = realm.vm();
  588. // 1. If fetchParams is canceled, then return the appropriate network error for fetchParams.
  589. if (fetch_params.is_canceled())
  590. return PendingResponse::create(vm, fetch_params.request(), Infrastructure::Response::appropriate_network_error(vm, fetch_params));
  591. // 2. Let request be fetchParams’s request.
  592. auto request = fetch_params.request();
  593. // 3. Switch on request’s current URL’s scheme and run the associated steps:
  594. // -> "about"
  595. if (request->current_url().scheme() == "about"sv) {
  596. // If request’s current URL’s path is the string "blank", then return a new response whose status message is
  597. // `OK`, header list is « (`Content-Type`, `text/html;charset=utf-8`) », and body is the empty byte sequence as
  598. // a body.
  599. // NOTE: URLs such as "about:config" are handled during navigation and result in a network error in the context
  600. // of fetching.
  601. if (request->current_url().serialize_path() == "blank"sv) {
  602. auto response = Infrastructure::Response::create(vm);
  603. response->set_status_message(MUST(ByteBuffer::copy("OK"sv.bytes())));
  604. auto header = MUST(Infrastructure::Header::from_string_pair("Content-Type"sv, "text/html;charset=utf-8"sv));
  605. TRY_OR_THROW_OOM(vm, response->header_list()->append(move(header)));
  606. response->set_body(MUST(Infrastructure::byte_sequence_as_body(realm, ""sv.bytes())));
  607. return PendingResponse::create(vm, request, response);
  608. }
  609. }
  610. // -> "blob"
  611. else if (request->current_url().scheme() == "blob"sv) {
  612. // FIXME: Support 'blob://' URLs
  613. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request has 'blob:' URL which is currently unsupported"sv));
  614. }
  615. // -> "data"
  616. else if (request->current_url().scheme() == "data"sv) {
  617. // 1. Let dataURLStruct be the result of running the data: URL processor on request’s current URL.
  618. auto data_url_struct = request->current_url().process_data_url();
  619. // 2. If dataURLStruct is failure, then return a network error.
  620. if (data_url_struct.is_error())
  621. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Failed to process 'data:' URL"sv));
  622. // 3. Let mimeType be dataURLStruct’s MIME type, serialized.
  623. // FIXME: Serialize MIME type.
  624. auto const& mime_type = data_url_struct.value().mime_type;
  625. // 4. Return a new response whose status message is `OK`, header list is « (`Content-Type`, mimeType) », and
  626. // body is dataURLStruct’s body as a body.
  627. auto response = Infrastructure::Response::create(vm);
  628. response->set_status_message(MUST(ByteBuffer::copy("OK"sv.bytes())));
  629. auto header = TRY_OR_THROW_OOM(vm, Infrastructure::Header::from_string_pair("Content-Type"sv, mime_type));
  630. TRY_OR_THROW_OOM(vm, response->header_list()->append(move(header)));
  631. response->set_body(TRY(Infrastructure::byte_sequence_as_body(realm, data_url_struct.value().body)));
  632. return PendingResponse::create(vm, request, response);
  633. }
  634. // -> "file"
  635. else if (request->current_url().scheme() == "file"sv) {
  636. // For now, unfortunate as it is, file: URLs are left as an exercise for the reader.
  637. // When in doubt, return a network error.
  638. return TRY(nonstandard_resource_loader_file_or_http_network_fetch(realm, fetch_params));
  639. }
  640. // -> HTTP(S) scheme
  641. else if (Infrastructure::is_http_or_https_scheme(request->current_url().scheme())) {
  642. // Return the result of running HTTP fetch given fetchParams.
  643. return http_fetch(realm, fetch_params);
  644. }
  645. // 4. Return a network error.
  646. auto message = request->current_url().scheme() == "about"sv
  647. ? TRY_OR_THROW_OOM(vm, "Request has invalid 'about:' URL, only 'about:blank' can be fetched"_string)
  648. : TRY_OR_THROW_OOM(vm, "Request URL has invalid scheme, must be one of 'about', 'blob', 'data', 'file', 'http', or 'https'"_string);
  649. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, move(message)));
  650. }
  651. // https://fetch.spec.whatwg.org/#concept-http-fetch
  652. WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>> http_fetch(JS::Realm& realm, Infrastructure::FetchParams const& fetch_params, MakeCORSPreflight make_cors_preflight)
  653. {
  654. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP fetch' with: fetch_params @ {}, make_cors_preflight = {}",
  655. &fetch_params, make_cors_preflight == MakeCORSPreflight::Yes ? "Yes"sv : "No"sv);
  656. auto& vm = realm.vm();
  657. // 1. Let request be fetchParams’s request.
  658. auto request = fetch_params.request();
  659. // 2. Let response be null.
  660. JS::GCPtr<Infrastructure::Response> response;
  661. // 3. Let actualResponse be null.
  662. JS::GCPtr<Infrastructure::Response> actual_response;
  663. // 4. If request’s service-workers mode is "all", then:
  664. if (request->service_workers_mode() == Infrastructure::Request::ServiceWorkersMode::All) {
  665. // 1. Let requestForServiceWorker be a clone of request.
  666. auto request_for_service_worker = TRY(request->clone(realm));
  667. // 2. If requestForServiceWorker’s body is non-null, then:
  668. if (!request_for_service_worker->body().has<Empty>()) {
  669. // FIXME: 1. Let transformStream be a new TransformStream.
  670. // FIXME: 2. Let transformAlgorithm given chunk be these steps:
  671. // FIXME: 3. Set up transformStream with transformAlgorithm set to transformAlgorithm.
  672. // FIXME: 4. Set requestForServiceWorker’s body’s stream to the result of requestForServiceWorker’s body’s stream
  673. // piped through transformStream.
  674. }
  675. // 3. Let serviceWorkerStartTime be the coarsened shared current time given fetchParams’s cross-origin isolated
  676. // capability.
  677. auto service_worker_start_time = HighResolutionTime::coarsened_shared_current_time(fetch_params.cross_origin_isolated_capability() == HTML::CanUseCrossOriginIsolatedAPIs::Yes);
  678. // FIXME: 4. Set response to the result of invoking handle fetch for requestForServiceWorker, with fetchParams’s
  679. // controller and fetchParams’s cross-origin isolated capability.
  680. // 5. If response is not null, then:
  681. if (response) {
  682. // 1. Set fetchParams’s timing info’s final service worker start time to serviceWorkerStartTime.
  683. fetch_params.timing_info()->set_final_service_worker_start_time(service_worker_start_time);
  684. // 2. If request’s body is non-null, then cancel request’s body with undefined.
  685. if (!request->body().has<Empty>()) {
  686. // FIXME: Implement cancelling streams
  687. }
  688. // 3. Set actualResponse to response, if response is not a filtered response, and to response’s internal
  689. // response otherwise.
  690. actual_response = !is<Infrastructure::FilteredResponse>(*response)
  691. ? JS::NonnullGCPtr { *response }
  692. : static_cast<Infrastructure::FilteredResponse const&>(*response).internal_response();
  693. // 4. If one of the following is true
  694. if (
  695. // - response’s type is "error"
  696. response->type() == Infrastructure::Response::Type::Error
  697. // - request’s mode is "same-origin" and response’s type is "cors"
  698. || (request->mode() == Infrastructure::Request::Mode::SameOrigin && response->type() == Infrastructure::Response::Type::CORS)
  699. // - request’s mode is not "no-cors" and response’s type is "opaque"
  700. || (request->mode() != Infrastructure::Request::Mode::NoCORS && response->type() == Infrastructure::Response::Type::Opaque)
  701. // - request’s redirect mode is not "manual" and response’s type is "opaqueredirect"
  702. || (request->redirect_mode() != Infrastructure::Request::RedirectMode::Manual && response->type() == Infrastructure::Response::Type::OpaqueRedirect)
  703. // - request’s redirect mode is not "follow" and response’s URL list has more than one item.
  704. || (request->redirect_mode() != Infrastructure::Request::RedirectMode::Follow && response->url_list().size() > 1)) {
  705. // then return a network error.
  706. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Invalid request/response state combination"sv));
  707. }
  708. }
  709. }
  710. JS::GCPtr<PendingResponse> pending_actual_response;
  711. auto returned_pending_response = PendingResponse::create(vm, request);
  712. // 5. If response is null, then:
  713. if (!response) {
  714. // 1. If makeCORSPreflight is true and one of these conditions is true:
  715. // NOTE: This step checks the CORS-preflight cache and if there is no suitable entry it performs a
  716. // CORS-preflight fetch which, if successful, populates the cache. The purpose of the CORS-preflight
  717. // fetch is to ensure the fetched resource is familiar with the CORS protocol. The cache is there to
  718. // minimize the number of CORS-preflight fetches.
  719. JS::GCPtr<PendingResponse> pending_preflight_response;
  720. if (make_cors_preflight == MakeCORSPreflight::Yes && (
  721. // - There is no method cache entry match for request’s method using request, and either request’s
  722. // method is not a CORS-safelisted method or request’s use-CORS-preflight flag is set.
  723. // FIXME: We currently have no cache, so there will always be no method cache entry.
  724. (!Infrastructure::is_cors_safelisted_method(request->method()) || request->use_cors_preflight())
  725. // - There is at least one item in the CORS-unsafe request-header names with request’s header list for
  726. // which there is no header-name cache entry match using request.
  727. // FIXME: We currently have no cache, so there will always be no header-name cache entry.
  728. || !TRY_OR_THROW_OOM(vm, Infrastructure::get_cors_unsafe_header_names(request->header_list())).is_empty())) {
  729. // 1. Let preflightResponse be the result of running CORS-preflight fetch given request.
  730. pending_preflight_response = TRY(cors_preflight_fetch(realm, request));
  731. // NOTE: Step 2 is performed in pending_preflight_response's load callback below.
  732. }
  733. auto fetch_main_content = [request = JS::make_handle(request), realm = JS::make_handle(realm), fetch_params = JS::make_handle(fetch_params)]() -> WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>> {
  734. // 2. If request’s redirect mode is "follow", then set request’s service-workers mode to "none".
  735. // NOTE: Redirects coming from the network (as opposed to from a service worker) are not to be exposed to a
  736. // service worker.
  737. if (request->redirect_mode() == Infrastructure::Request::RedirectMode::Follow)
  738. request->set_service_workers_mode(Infrastructure::Request::ServiceWorkersMode::None);
  739. // 3. Set response and actualResponse to the result of running HTTP-network-or-cache fetch given fetchParams.
  740. return http_network_or_cache_fetch(*realm, *fetch_params);
  741. };
  742. if (pending_preflight_response) {
  743. pending_actual_response = PendingResponse::create(vm, request);
  744. pending_preflight_response->when_loaded([returned_pending_response, pending_actual_response, fetch_main_content = move(fetch_main_content)](JS::NonnullGCPtr<Infrastructure::Response> preflight_response) {
  745. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP fetch' pending_preflight_response load callback");
  746. // 2. If preflightResponse is a network error, then return preflightResponse.
  747. if (preflight_response->is_network_error()) {
  748. returned_pending_response->resolve(preflight_response);
  749. return;
  750. }
  751. auto pending_main_content_response = TRY_OR_IGNORE(fetch_main_content());
  752. pending_main_content_response->when_loaded([pending_actual_response](JS::NonnullGCPtr<Infrastructure::Response> main_content_response) {
  753. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP fetch' pending_main_content_response load callback");
  754. pending_actual_response->resolve(main_content_response);
  755. });
  756. });
  757. } else {
  758. pending_actual_response = TRY(fetch_main_content());
  759. }
  760. } else {
  761. pending_actual_response = PendingResponse::create(vm, request, Infrastructure::Response::create(vm));
  762. }
  763. pending_actual_response->when_loaded([&realm, &vm, &fetch_params, request, response, actual_response, returned_pending_response, response_was_null = !response](JS::NonnullGCPtr<Infrastructure::Response> resolved_actual_response) mutable {
  764. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP fetch' pending_actual_response load callback");
  765. if (response_was_null) {
  766. response = actual_response = resolved_actual_response;
  767. // 4. If request’s response tainting is "cors" and a CORS check for request and response returns failure,
  768. // then return a network error.
  769. // NOTE: As the CORS check is not to be applied to responses whose status is 304 or 407, or responses from
  770. // a service worker for that matter, it is applied here.
  771. if (request->response_tainting() == Infrastructure::Request::ResponseTainting::CORS
  772. && !TRY_OR_IGNORE(cors_check(request, *response))) {
  773. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("Request with 'cors' response tainting failed CORS check"_string)));
  774. return;
  775. }
  776. // 5. If the TAO check for request and response returns failure, then set request’s timing allow failed flag.
  777. if (!TRY_OR_IGNORE(tao_check(request, *response)))
  778. request->set_timing_allow_failed(true);
  779. }
  780. // 6. If either request’s response tainting or response’s type is "opaque", and the cross-origin resource
  781. // policy check with request’s origin, request’s client, request’s destination, and actualResponse returns
  782. // blocked, then return a network error.
  783. // NOTE: The cross-origin resource policy check runs for responses coming from the network and responses coming
  784. // from the service worker. This is different from the CORS check, as request’s client and the service
  785. // worker can have different embedder policies.
  786. if ((request->response_tainting() == Infrastructure::Request::ResponseTainting::Opaque || response->type() == Infrastructure::Response::Type::Opaque)
  787. && false // FIXME: "and the cross-origin resource policy check with request’s origin, request’s client, request’s destination, and actualResponse returns blocked"
  788. ) {
  789. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("Response was blocked by cross-origin resource policy check"_string)));
  790. return;
  791. }
  792. Optional<JS::NonnullGCPtr<PendingResponse>> inner_pending_response;
  793. // 7. If actualResponse’s status is a redirect status, then:
  794. if (Infrastructure::is_redirect_status(actual_response->status())) {
  795. // FIXME: 1. If actualResponse’s status is not 303, request’s body is not null, and the connection uses HTTP/2,
  796. // then user agents may, and are even encouraged to, transmit an RST_STREAM frame.
  797. // NOTE: 303 is excluded as certain communities ascribe special status to it.
  798. // 2. Switch on request’s redirect mode:
  799. switch (request->redirect_mode()) {
  800. // -> "error"
  801. case Infrastructure::Request::RedirectMode::Error:
  802. // Set response to a network error.
  803. response = Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("Request with 'error' redirect mode received redirect response"_string));
  804. break;
  805. // -> "manual"
  806. case Infrastructure::Request::RedirectMode::Manual:
  807. // 1. If request’s mode is "navigate", then set fetchParams’s controller’s next manual redirect steps
  808. // to run HTTP-redirect fetch given fetchParams and response.
  809. if (request->mode() == Infrastructure::Request::Mode::Navigate) {
  810. fetch_params.controller()->set_next_manual_redirect_steps([&realm, &fetch_params, response] {
  811. (void)http_redirect_fetch(realm, fetch_params, *response);
  812. });
  813. }
  814. // 2. Otherwise, set response to an opaque-redirect filtered response whose internal response is
  815. // actualResponse.
  816. else {
  817. response = Infrastructure::OpaqueRedirectFilteredResponse::create(vm, *actual_response);
  818. }
  819. break;
  820. // -> "follow"
  821. case Infrastructure::Request::RedirectMode::Follow:
  822. // Set response to the result of running HTTP-redirect fetch given fetchParams and response.
  823. inner_pending_response = TRY_OR_IGNORE(http_redirect_fetch(realm, fetch_params, *response));
  824. break;
  825. default:
  826. VERIFY_NOT_REACHED();
  827. }
  828. }
  829. if (inner_pending_response.has_value()) {
  830. inner_pending_response.value()->when_loaded([returned_pending_response](JS::NonnullGCPtr<Infrastructure::Response> response) {
  831. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP fetch' inner_pending_response load callback");
  832. returned_pending_response->resolve(response);
  833. });
  834. } else {
  835. returned_pending_response->resolve(*response);
  836. }
  837. });
  838. // 8. Return response.
  839. // NOTE: Typically actualResponse’s body’s stream is still being enqueued to after returning.
  840. return returned_pending_response;
  841. }
  842. // https://fetch.spec.whatwg.org/#concept-http-redirect-fetch
  843. WebIDL::ExceptionOr<Optional<JS::NonnullGCPtr<PendingResponse>>> http_redirect_fetch(JS::Realm& realm, Infrastructure::FetchParams const& fetch_params, Infrastructure::Response& response)
  844. {
  845. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP-redirect fetch' with: fetch_params @ {}, response = {}", &fetch_params, &response);
  846. auto& vm = realm.vm();
  847. // 1. Let request be fetchParams’s request.
  848. auto request = fetch_params.request();
  849. // 2. Let actualResponse be response, if response is not a filtered response, and response’s internal response
  850. // otherwise.
  851. auto actual_response = !is<Infrastructure::FilteredResponse>(response)
  852. ? JS::NonnullGCPtr { response }
  853. : static_cast<Infrastructure::FilteredResponse const&>(response).internal_response();
  854. // 3. Let locationURL be actualResponse’s location URL given request’s current URL’s fragment.
  855. auto const& fragment = request->current_url().fragment();
  856. auto fragment_string = fragment.is_null() ? Optional<String> {} : TRY_OR_THROW_OOM(vm, String::from_deprecated_string(fragment));
  857. auto location_url_or_error = actual_response->location_url(fragment_string);
  858. // 4. If locationURL is null, then return response.
  859. if (!location_url_or_error.is_error() && !location_url_or_error.value().has_value())
  860. return PendingResponse::create(vm, request, response);
  861. // 5. If locationURL is failure, then return a network error.
  862. if (location_url_or_error.is_error())
  863. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request redirect URL is invalid"sv));
  864. auto location_url = location_url_or_error.release_value().release_value();
  865. // 6. If locationURL’s scheme is not an HTTP(S) scheme, then return a network error.
  866. if (!Infrastructure::is_http_or_https_scheme(location_url.scheme()))
  867. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request redirect URL must have HTTP or HTTPS scheme"sv));
  868. // 7. If request’s redirect count is 20, then return a network error.
  869. if (request->redirect_count() == 20)
  870. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request has reached maximum redirect count of 20"sv));
  871. // 8. Increase request’s redirect count by 1.
  872. request->set_redirect_count(request->redirect_count() + 1);
  873. // 8. If request’s mode is "cors", locationURL includes credentials, and request’s origin is not same origin with
  874. // locationURL’s origin, then return a network error.
  875. if (request->mode() == Infrastructure::Request::Mode::CORS
  876. && location_url.includes_credentials()
  877. && request->origin().has<HTML::Origin>()
  878. && !request->origin().get<HTML::Origin>().is_same_origin(URL::url_origin(location_url))) {
  879. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request with 'cors' mode and different URL and request origin must not include credentials in redirect URL"sv));
  880. }
  881. // 10. If request’s response tainting is "cors" and locationURL includes credentials, then return a network error.
  882. // NOTE: This catches a cross-origin resource redirecting to a same-origin URL.
  883. if (request->response_tainting() == Infrastructure::Request::ResponseTainting::CORS && location_url.includes_credentials())
  884. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request with 'cors' response tainting must not include credentials in redirect URL"sv));
  885. // 11. If actualResponse’s status is not 303, request’s body is non-null, and request’s body’s source is null, then
  886. // return a network error.
  887. if (actual_response->status() != 303
  888. && !request->body().has<Empty>()
  889. && request->body().get<Infrastructure::Body>().source().has<Empty>()) {
  890. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request has body but no body source"sv));
  891. }
  892. // 12. If one of the following is true
  893. if (
  894. // - actualResponse’s status is 301 or 302 and request’s method is `POST`
  895. ((actual_response->status() == 301 || actual_response->status() == 302) && request->method() == "POST"sv.bytes())
  896. // - actualResponse’s status is 303 and request’s method is not `GET` or `HEAD`
  897. || (actual_response->status() == 303 && !(request->method() == "GET"sv.bytes() || request->method() == "HEAD"sv.bytes()))
  898. // then:
  899. ) {
  900. // 1. Set request’s method to `GET` and request’s body to null.
  901. request->set_method(MUST(ByteBuffer::copy("GET"sv.bytes())));
  902. request->set_body({});
  903. static constexpr Array request_body_header_names {
  904. "Content-Encoding"sv,
  905. "Content-Language"sv,
  906. "Content-Location"sv,
  907. "Content-Type"sv
  908. };
  909. // 2. For each headerName of request-body-header name, delete headerName from request’s header list.
  910. for (auto header_name : request_body_header_names.span())
  911. request->header_list()->delete_(header_name.bytes());
  912. }
  913. // 13. If request’s current URL’s origin is not same origin with locationURL’s origin, then for each headerName of
  914. // CORS non-wildcard request-header name, delete headerName from request’s header list.
  915. // NOTE: I.e., the moment another origin is seen after the initial request, the `Authorization` header is removed.
  916. if (!URL::url_origin(request->current_url()).is_same_origin(URL::url_origin(location_url))) {
  917. static constexpr Array cors_non_wildcard_request_header_names {
  918. "Authorization"sv
  919. };
  920. for (auto header_name : cors_non_wildcard_request_header_names)
  921. request->header_list()->delete_(header_name.bytes());
  922. }
  923. // 14. If request’s body is non-null, then set request’s body to the body of the result of safely extracting
  924. // request’s body’s source.
  925. // NOTE: request’s body’s source’s nullity has already been checked.
  926. if (!request->body().has<Empty>()) {
  927. auto const& source = request->body().get<Infrastructure::Body>().source();
  928. // NOTE: BodyInitOrReadableBytes is a superset of Body::SourceType
  929. auto converted_source = source.has<ByteBuffer>()
  930. ? BodyInitOrReadableBytes { source.get<ByteBuffer>() }
  931. : BodyInitOrReadableBytes { source.get<JS::Handle<FileAPI::Blob>>() };
  932. auto [body, _] = TRY(safely_extract_body(realm, converted_source));
  933. request->set_body(move(body));
  934. }
  935. // 15. Let timingInfo be fetchParams’s timing info.
  936. auto timing_info = fetch_params.timing_info();
  937. // 16. Set timingInfo’s redirect end time and post-redirect start time to the coarsened shared current time given
  938. // fetchParams’s cross-origin isolated capability.
  939. auto now = HighResolutionTime::coarsened_shared_current_time(fetch_params.cross_origin_isolated_capability() == HTML::CanUseCrossOriginIsolatedAPIs::Yes);
  940. timing_info->set_redirect_end_time(now);
  941. timing_info->set_post_redirect_start_time(now);
  942. // 17. If timingInfo’s redirect start time is 0, then set timingInfo’s redirect start time to timingInfo’s start
  943. // time.
  944. if (timing_info->redirect_start_time() == 0)
  945. timing_info->set_redirect_start_time(timing_info->start_time());
  946. // 18. Append locationURL to request’s URL list.
  947. request->url_list().append(location_url);
  948. // FIXME: 19. Invoke set request’s referrer policy on redirect on request and actualResponse.
  949. // 20. Let recursive be true.
  950. auto recursive = Recursive::Yes;
  951. // 21. If request’s redirect mode is "manual", then:
  952. if (request->redirect_mode() == Infrastructure::Request::RedirectMode::Manual) {
  953. // 1. Assert: request’s mode is "navigate".
  954. VERIFY(request->mode() == Infrastructure::Request::Mode::Navigate);
  955. // 2. Set recursive to false.
  956. recursive = Recursive::No;
  957. }
  958. // 22. Return the result of running main fetch given fetchParams and recursive.
  959. return main_fetch(realm, fetch_params, recursive);
  960. }
  961. // https://fetch.spec.whatwg.org/#concept-http-network-or-cache-fetch
  962. WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>> http_network_or_cache_fetch(JS::Realm& realm, Infrastructure::FetchParams const& fetch_params, IsAuthenticationFetch is_authentication_fetch, IsNewConnectionFetch is_new_connection_fetch)
  963. {
  964. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP-network-or-cache fetch' with: fetch_params @ {}, is_authentication_fetch = {}, is_new_connection_fetch = {}",
  965. &fetch_params, is_authentication_fetch == IsAuthenticationFetch::Yes ? "Yes"sv : "No"sv, is_new_connection_fetch == IsNewConnectionFetch::Yes ? "Yes"sv : "No"sv);
  966. auto& vm = realm.vm();
  967. // 1. Let request be fetchParams’s request.
  968. auto request = fetch_params.request();
  969. // 2. Let httpFetchParams be null.
  970. JS::GCPtr<Infrastructure::FetchParams const> http_fetch_params;
  971. // 3. Let httpRequest be null.
  972. JS::GCPtr<Infrastructure::Request> http_request;
  973. // 4. Let response be null.
  974. JS::GCPtr<Infrastructure::Response> response;
  975. // 5. Let storedResponse be null.
  976. JS::GCPtr<Infrastructure::Response> stored_response;
  977. // 6. Let httpCache be null.
  978. // (Typeless until we actually implement it, needed for checks below)
  979. void* http_cache = nullptr;
  980. // 7. Let the revalidatingFlag be unset.
  981. auto revalidating_flag = RefCountedFlag::create(false);
  982. auto include_credentials = IncludeCredentials::No;
  983. // 8. Run these steps, but abort when fetchParams is canceled:
  984. // NOTE: There's an 'if aborted' check after this anyway, so not doing this is fine and only incurs a small delay.
  985. // For now, support for aborting fetch requests is limited anyway as ResourceLoader doesn't support it.
  986. auto aborted = false;
  987. {
  988. ScopeGuard set_aborted = [&] {
  989. if (fetch_params.is_canceled())
  990. aborted = true;
  991. };
  992. // 1. If request’s window is "no-window" and request’s redirect mode is "error", then set httpFetchParams to
  993. // fetchParams and httpRequest to request.
  994. if (request->window().has<Infrastructure::Request::Window>()
  995. && request->window().get<Infrastructure::Request::Window>() == Infrastructure::Request::Window::NoWindow
  996. && request->redirect_mode() == Infrastructure::Request::RedirectMode::Error) {
  997. http_fetch_params = fetch_params;
  998. http_request = request;
  999. }
  1000. // 2. Otherwise:
  1001. else {
  1002. // 1. Set httpRequest to a clone of request.
  1003. // NOTE: Implementations are encouraged to avoid teeing request’s body’s stream when request’s body’s
  1004. // source is null as only a single body is needed in that case. E.g., when request’s body’s source
  1005. // is null, redirects and authentication will end up failing the fetch.
  1006. http_request = TRY(request->clone(realm));
  1007. // 2. Set httpFetchParams to a copy of fetchParams.
  1008. // 3. Set httpFetchParams’s request to httpRequest.
  1009. auto new_http_fetch_params = Infrastructure::FetchParams::create(vm, *http_request, fetch_params.timing_info());
  1010. new_http_fetch_params->set_algorithms(fetch_params.algorithms());
  1011. new_http_fetch_params->set_task_destination(fetch_params.task_destination());
  1012. new_http_fetch_params->set_cross_origin_isolated_capability(fetch_params.cross_origin_isolated_capability());
  1013. new_http_fetch_params->set_preloaded_response_candidate(fetch_params.preloaded_response_candidate());
  1014. http_fetch_params = new_http_fetch_params;
  1015. }
  1016. // 3. Let includeCredentials be true if one of
  1017. if (
  1018. // - request’s credentials mode is "include"
  1019. request->credentials_mode() == Infrastructure::Request::CredentialsMode::Include
  1020. // - request’s credentials mode is "same-origin" and request’s response tainting is "basic"
  1021. || (request->credentials_mode() == Infrastructure::Request::CredentialsMode::SameOrigin
  1022. && request->response_tainting() == Infrastructure::Request::ResponseTainting::Basic)
  1023. // is true; otherwise false.
  1024. ) {
  1025. include_credentials = IncludeCredentials::Yes;
  1026. } else {
  1027. include_credentials = IncludeCredentials::No;
  1028. }
  1029. // 4. If Cross-Origin-Embedder-Policy allows credentials with request returns false, then set
  1030. // includeCredentials to false.
  1031. if (!request->cross_origin_embedder_policy_allows_credentials())
  1032. include_credentials = IncludeCredentials::No;
  1033. // 5. Let contentLength be httpRequest’s body’s length, if httpRequest’s body is non-null; otherwise null.
  1034. auto content_length = http_request->body().has<Infrastructure::Body>()
  1035. ? http_request->body().get<Infrastructure::Body>().length()
  1036. : Optional<u64> {};
  1037. // 6. Let contentLengthHeaderValue be null.
  1038. auto content_length_header_value = Optional<ByteBuffer> {};
  1039. // 7. If httpRequest’s body is null and httpRequest’s method is `POST` or `PUT`, then set
  1040. // contentLengthHeaderValue to `0`.
  1041. if (http_request->body().has<Empty>() && StringView { http_request->method() }.is_one_of("POST"sv, "PUT"sv))
  1042. content_length_header_value = MUST(ByteBuffer::copy("0"sv.bytes()));
  1043. // 8. If contentLength is non-null, then set contentLengthHeaderValue to contentLength, serialized and
  1044. // isomorphic encoded.
  1045. if (content_length.has_value())
  1046. content_length_header_value = MUST(ByteBuffer::copy(TRY_OR_THROW_OOM(vm, String::number(*content_length)).bytes()));
  1047. // 9. If contentLengthHeaderValue is non-null, then append (`Content-Length`, contentLengthHeaderValue) to
  1048. // httpRequest’s header list.
  1049. if (content_length_header_value.has_value()) {
  1050. auto header = Infrastructure::Header {
  1051. .name = MUST(ByteBuffer::copy("Content-Length"sv.bytes())),
  1052. .value = content_length_header_value.release_value(),
  1053. };
  1054. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1055. }
  1056. // FIXME: 10. If contentLength is non-null and httpRequest’s keepalive is true, then:
  1057. if (content_length.has_value() && http_request->keepalive()) {
  1058. // FIXME: 1-5., requires 'fetch records' and 'fetch group' concepts.
  1059. // NOTE: The above limit ensures that requests that are allowed to outlive the environment settings object
  1060. // and contain a body, have a bounded size and are not allowed to stay alive indefinitely.
  1061. }
  1062. // 11. If httpRequest’s referrer is a URL, then:
  1063. if (http_request->referrer().has<AK::URL>()) {
  1064. // 1. Let referrerValue be httpRequest’s referrer, serialized and isomorphic encoded.
  1065. auto referrer_value = TRY_OR_THROW_OOM(vm, ByteBuffer::copy(http_request->referrer().get<AK::URL>().serialize().bytes()));
  1066. // 2. Append (`Referer`, referrerValue) to httpRequest’s header list.
  1067. auto header = Infrastructure::Header {
  1068. .name = MUST(ByteBuffer::copy("Referer"sv.bytes())),
  1069. .value = move(referrer_value),
  1070. };
  1071. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1072. }
  1073. // 12. Append a request `Origin` header for httpRequest.
  1074. TRY_OR_THROW_OOM(vm, http_request->add_origin_header());
  1075. // FIXME: 13. Append the Fetch metadata headers for httpRequest.
  1076. // 14. If httpRequest’s header list does not contain `User-Agent`, then user agents should append
  1077. // (`User-Agent`, default `User-Agent` value) to httpRequest’s header list.
  1078. if (!http_request->header_list()->contains("User-Agent"sv.bytes())) {
  1079. auto header = Infrastructure::Header {
  1080. .name = MUST(ByteBuffer::copy("User-Agent"sv.bytes())),
  1081. .value = TRY_OR_THROW_OOM(vm, Infrastructure::default_user_agent_value()),
  1082. };
  1083. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1084. }
  1085. // 15. If httpRequest’s cache mode is "default" and httpRequest’s header list contains `If-Modified-Since`,
  1086. // `If-None-Match`, `If-Unmodified-Since`, `If-Match`, or `If-Range`, then set httpRequest’s cache mode to
  1087. // "no-store".
  1088. if (http_request->cache_mode() == Infrastructure::Request::CacheMode::Default
  1089. && (http_request->header_list()->contains("If-Modified-Since"sv.bytes())
  1090. || http_request->header_list()->contains("If-None-Match"sv.bytes())
  1091. || http_request->header_list()->contains("If-Unmodified-Since"sv.bytes())
  1092. || http_request->header_list()->contains("If-Match"sv.bytes())
  1093. || http_request->header_list()->contains("If-Range"sv.bytes()))) {
  1094. http_request->set_cache_mode(Infrastructure::Request::CacheMode::NoStore);
  1095. }
  1096. // 16. If httpRequest’s cache mode is "no-cache", httpRequest’s prevent no-cache cache-control header
  1097. // modification flag is unset, and httpRequest’s header list does not contain `Cache-Control`, then append
  1098. // (`Cache-Control`, `max-age=0`) to httpRequest’s header list.
  1099. if (http_request->cache_mode() == Infrastructure::Request::CacheMode::NoCache
  1100. && !http_request->prevent_no_cache_cache_control_header_modification()
  1101. && !http_request->header_list()->contains("Cache-Control"sv.bytes())) {
  1102. auto header = MUST(Infrastructure::Header::from_string_pair("Cache-Control"sv, "max-age=0"sv));
  1103. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1104. }
  1105. // 17. If httpRequest’s cache mode is "no-store" or "reload", then:
  1106. if (http_request->cache_mode() == Infrastructure::Request::CacheMode::NoStore
  1107. || http_request->cache_mode() == Infrastructure::Request::CacheMode::Reload) {
  1108. // 1. If httpRequest’s header list does not contain `Pragma`, then append (`Pragma`, `no-cache`) to
  1109. // httpRequest’s header list.
  1110. if (!http_request->header_list()->contains("Pragma"sv.bytes())) {
  1111. auto header = MUST(Infrastructure::Header::from_string_pair("Pragma"sv, "no-cache"sv));
  1112. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1113. }
  1114. // 2. If httpRequest’s header list does not contain `Cache-Control`, then append
  1115. // (`Cache-Control`, `no-cache`) to httpRequest’s header list.
  1116. if (!http_request->header_list()->contains("Cache-Control"sv.bytes())) {
  1117. auto header = MUST(Infrastructure::Header::from_string_pair("Cache-Control"sv, "no-cache"sv));
  1118. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1119. }
  1120. }
  1121. // 18. If httpRequest’s header list contains `Range`, then append (`Accept-Encoding`, `identity`) to
  1122. // httpRequest’s header list.
  1123. // NOTE: This avoids a failure when handling content codings with a part of an encoded response.
  1124. // Additionally, many servers mistakenly ignore `Range` headers if a non-identity encoding is accepted.
  1125. if (http_request->header_list()->contains("Range"sv.bytes())) {
  1126. auto header = MUST(Infrastructure::Header::from_string_pair("Accept-Encoding"sv, "identity"sv));
  1127. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1128. }
  1129. // 19. Modify httpRequest’s header list per HTTP. Do not append a given header if httpRequest’s header list
  1130. // contains that header’s name.
  1131. // NOTE: It would be great if we could make this more normative somehow. At this point headers such as
  1132. // `Accept-Encoding`, `Connection`, `DNT`, and `Host`, are to be appended if necessary.
  1133. // `Accept`, `Accept-Charset`, and `Accept-Language` must not be included at this point.
  1134. // NOTE: `Accept` and `Accept-Language` are already included (unless fetch() is used, which does not include
  1135. // the latter by default), and `Accept-Charset` is a waste of bytes. See HTTP header layer division for
  1136. // more details.
  1137. // 20. If includeCredentials is true, then:
  1138. if (include_credentials == IncludeCredentials::Yes) {
  1139. // 1. If the user agent is not configured to block cookies for httpRequest (see section 7 of [COOKIES]),
  1140. // then:
  1141. if (true) {
  1142. // 1. Let cookies be the result of running the "cookie-string" algorithm (see section 5.4 of [COOKIES])
  1143. // with the user agent’s cookie store and httpRequest’s current URL.
  1144. auto cookies = ([&] {
  1145. // FIXME: Getting to the page client reliably is way too complicated, and going via the document won't work in workers.
  1146. auto document = Bindings::host_defined_environment_settings_object(realm).responsible_document();
  1147. if (!document)
  1148. return DeprecatedString::empty();
  1149. auto* page = document->page();
  1150. if (!page)
  1151. return DeprecatedString::empty();
  1152. return page->client().page_did_request_cookie(http_request->current_url(), Cookie::Source::Http);
  1153. })();
  1154. // 2. If cookies is not the empty string, then append (`Cookie`, cookies) to httpRequest’s header list.
  1155. if (!cookies.is_empty()) {
  1156. auto header = TRY_OR_THROW_OOM(vm, Infrastructure::Header::from_string_pair("Cookie"sv, cookies));
  1157. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1158. }
  1159. }
  1160. // 2. If httpRequest’s header list does not contain `Authorization`, then:
  1161. if (!http_request->header_list()->contains("Authorization"sv.bytes())) {
  1162. // 1. Let authorizationValue be null.
  1163. auto authorization_value = Optional<String> {};
  1164. // 2. If there’s an authentication entry for httpRequest and either httpRequest’s use-URL-credentials
  1165. // flag is unset or httpRequest’s current URL does not include credentials, then set
  1166. // authorizationValue to authentication entry.
  1167. if (false // FIXME: "If there’s an authentication entry for httpRequest"
  1168. && (!http_request->use_url_credentials() || !http_request->current_url().includes_credentials())) {
  1169. // FIXME: "set authorizationValue to authentication entry."
  1170. }
  1171. // 3. Otherwise, if httpRequest’s current URL does include credentials and isAuthenticationFetch is
  1172. // true, set authorizationValue to httpRequest’s current URL, converted to an `Authorization` value.
  1173. else if (http_request->current_url().includes_credentials() && is_authentication_fetch == IsAuthenticationFetch::Yes) {
  1174. auto const& url = http_request->current_url();
  1175. auto payload = TRY_OR_THROW_OOM(vm, String::formatted("{}:{}", url.username(), url.password()));
  1176. authorization_value = TRY_OR_THROW_OOM(vm, encode_base64(payload.bytes()));
  1177. }
  1178. // 4. If authorizationValue is non-null, then append (`Authorization`, authorizationValue) to
  1179. // httpRequest’s header list.
  1180. if (authorization_value.has_value()) {
  1181. auto header = TRY_OR_THROW_OOM(vm, Infrastructure::Header::from_string_pair("Authorization"sv, *authorization_value));
  1182. TRY_OR_THROW_OOM(vm, http_request->header_list()->append(move(header)));
  1183. }
  1184. }
  1185. }
  1186. // FIXME: 21. If there’s a proxy-authentication entry, use it as appropriate.
  1187. // NOTE: This intentionally does not depend on httpRequest’s credentials mode.
  1188. // FIXME: 22. Set httpCache to the result of determining the HTTP cache partition, given httpRequest.
  1189. // 23. If httpCache is null, then set httpRequest’s cache mode to "no-store".
  1190. if (!http_cache)
  1191. http_request->set_cache_mode(Infrastructure::Request::CacheMode::NoStore);
  1192. // 24. If httpRequest’s cache mode is neither "no-store" nor "reload", then:
  1193. if (http_request->cache_mode() != Infrastructure::Request::CacheMode::NoStore
  1194. && http_request->cache_mode() != Infrastructure::Request::CacheMode::Reload) {
  1195. // 1. Set storedResponse to the result of selecting a response from the httpCache, possibly needing
  1196. // validation, as per the "Constructing Responses from Caches" chapter of HTTP Caching [HTTP-CACHING],
  1197. // if any.
  1198. // NOTE: As mandated by HTTP, this still takes the `Vary` header into account.
  1199. stored_response = nullptr;
  1200. // 2. If storedResponse is non-null, then:
  1201. if (stored_response) {
  1202. // FIXME: Caching is not implemented yet.
  1203. VERIFY_NOT_REACHED();
  1204. }
  1205. }
  1206. }
  1207. // 9. If aborted, then return the appropriate network error for fetchParams.
  1208. if (aborted)
  1209. return PendingResponse::create(vm, request, Infrastructure::Response::appropriate_network_error(vm, fetch_params));
  1210. JS::GCPtr<PendingResponse> pending_forward_response;
  1211. // 10. If response is null, then:
  1212. if (!response) {
  1213. // 1. If httpRequest’s cache mode is "only-if-cached", then return a network error.
  1214. if (http_request->cache_mode() == Infrastructure::Request::CacheMode::OnlyIfCached)
  1215. return PendingResponse::create(vm, request, Infrastructure::Response::network_error(vm, "Request with 'only-if-cached' cache mode doesn't have a cached response"sv));
  1216. // 2. Let forwardResponse be the result of running HTTP-network fetch given httpFetchParams, includeCredentials,
  1217. // and isNewConnectionFetch.
  1218. pending_forward_response = TRY(nonstandard_resource_loader_file_or_http_network_fetch(realm, *http_fetch_params, include_credentials, is_new_connection_fetch));
  1219. } else {
  1220. pending_forward_response = PendingResponse::create(vm, request, Infrastructure::Response::create(vm));
  1221. }
  1222. auto returned_pending_response = PendingResponse::create(vm, request);
  1223. pending_forward_response->when_loaded([&realm, &vm, &fetch_params, request, response, stored_response, http_request, returned_pending_response, is_authentication_fetch, is_new_connection_fetch, revalidating_flag, include_credentials, response_was_null = !response](JS::NonnullGCPtr<Infrastructure::Response> resolved_forward_response) mutable {
  1224. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP-network-or-cache fetch' pending_forward_response load callback");
  1225. if (response_was_null) {
  1226. auto forward_response = resolved_forward_response;
  1227. // NOTE: TRACE is omitted as it is a forbidden method in Fetch.
  1228. auto method_is_unsafe = StringView { http_request->method() }.is_one_of("GET"sv, "HEAD"sv, "OPTIONS"sv);
  1229. // 3. If httpRequest’s method is unsafe and forwardResponse’s status is in the range 200 to 399, inclusive,
  1230. // invalidate appropriate stored responses in httpCache, as per the "Invalidation" chapter of HTTP
  1231. // Caching, and set storedResponse to null.
  1232. if (method_is_unsafe && forward_response->status() >= 200 && forward_response->status() <= 399) {
  1233. // FIXME: "invalidate appropriate stored responses in httpCache, as per the "Invalidation" chapter of HTTP Caching"
  1234. stored_response = nullptr;
  1235. }
  1236. // 4. If the revalidatingFlag is set and forwardResponse’s status is 304, then:
  1237. if (revalidating_flag->value() && forward_response->status() == 304) {
  1238. // FIXME: 1. Update storedResponse’s header list using forwardResponse’s header list, as per the "Freshening
  1239. // Stored Responses upon Validation" chapter of HTTP Caching.
  1240. // NOTE: This updates the stored response in cache as well.
  1241. // 2. Set response to storedResponse.
  1242. response = stored_response;
  1243. // 3. Set response’s cache state to "validated".
  1244. if (response)
  1245. response->set_cache_state(Infrastructure::Response::CacheState::Validated);
  1246. }
  1247. // 5. If response is null, then:
  1248. if (!response) {
  1249. // 1. Set response to forwardResponse.
  1250. response = forward_response;
  1251. // FIXME: 2. Store httpRequest and forwardResponse in httpCache, as per the "Storing Responses in Caches"
  1252. // chapter of HTTP Caching.
  1253. // NOTE: If forwardResponse is a network error, this effectively caches the network error, which is
  1254. // sometimes known as "negative caching".
  1255. // NOTE: The associated body info is stored in the cache alongside the response.
  1256. }
  1257. }
  1258. // 11. Set response’s URL list to a clone of httpRequest’s URL list.
  1259. response->set_url_list(http_request->url_list());
  1260. // 12. If httpRequest’s header list contains `Range`, then set response’s range-requested flag.
  1261. if (http_request->header_list()->contains("Range"sv.bytes()))
  1262. response->set_range_requested(true);
  1263. // 13. Set response’s request-includes-credentials to includeCredentials.
  1264. response->set_request_includes_credentials(include_credentials == IncludeCredentials::Yes);
  1265. auto inner_pending_response = PendingResponse::create(vm, request, *response);
  1266. // 14. If response’s status is 401, httpRequest’s response tainting is not "cors", includeCredentials is true,
  1267. // and request’s window is an environment settings object, then:
  1268. if (response->status() == 401
  1269. && http_request->response_tainting() != Infrastructure::Request::ResponseTainting::CORS
  1270. && include_credentials == IncludeCredentials::Yes
  1271. && request->window().has<JS::GCPtr<HTML::EnvironmentSettingsObject>>()) {
  1272. // 1. Needs testing: multiple `WWW-Authenticate` headers, missing, parsing issues.
  1273. // (Red box in the spec, no-op)
  1274. // 2. If request’s body is non-null, then:
  1275. if (!request->body().has<Empty>()) {
  1276. // 1. If request’s body’s source is null, then return a network error.
  1277. if (request->body().get<Infrastructure::Body>().source().has<Empty>()) {
  1278. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("Request has body but no body source"_string)));
  1279. return;
  1280. }
  1281. // 2. Set request’s body to the body of the result of safely extracting request’s body’s source.
  1282. auto const& source = request->body().get<Infrastructure::Body>().source();
  1283. // NOTE: BodyInitOrReadableBytes is a superset of Body::SourceType
  1284. auto converted_source = source.has<ByteBuffer>()
  1285. ? BodyInitOrReadableBytes { source.get<ByteBuffer>() }
  1286. : BodyInitOrReadableBytes { source.get<JS::Handle<FileAPI::Blob>>() };
  1287. auto [body, _] = TRY_OR_IGNORE(safely_extract_body(realm, converted_source));
  1288. request->set_body(move(body));
  1289. }
  1290. // 3. If request’s use-URL-credentials flag is unset or isAuthenticationFetch is true, then:
  1291. if (!request->use_url_credentials() || is_authentication_fetch == IsAuthenticationFetch::Yes) {
  1292. // 1. If fetchParams is canceled, then return the appropriate network error for fetchParams.
  1293. if (fetch_params.is_canceled()) {
  1294. returned_pending_response->resolve(Infrastructure::Response::appropriate_network_error(vm, fetch_params));
  1295. return;
  1296. }
  1297. // FIXME: 2. Let username and password be the result of prompting the end user for a username and password,
  1298. // respectively, in request’s window.
  1299. dbgln("Fetch: Username/password prompt is not implemented, using empty strings. This request will probably fail.");
  1300. auto username = DeprecatedString::empty();
  1301. auto password = DeprecatedString::empty();
  1302. // 3. Set the username given request’s current URL and username.
  1303. request->current_url().set_username(move(username));
  1304. // 4. Set the password given request’s current URL and password.
  1305. request->current_url().set_password(move(password));
  1306. }
  1307. // 4. Set response to the result of running HTTP-network-or-cache fetch given fetchParams and true.
  1308. inner_pending_response = TRY_OR_IGNORE(http_network_or_cache_fetch(realm, fetch_params, IsAuthenticationFetch::Yes));
  1309. }
  1310. inner_pending_response->when_loaded([&realm, &vm, &fetch_params, request, returned_pending_response, is_authentication_fetch, is_new_connection_fetch](JS::NonnullGCPtr<Infrastructure::Response> response) {
  1311. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'HTTP network-or-cache fetch' inner_pending_response load callback");
  1312. // 15. If response’s status is 407, then:
  1313. if (response->status() == 407) {
  1314. // 1. If request’s window is "no-window", then return a network error.
  1315. if (request->window().has<Infrastructure::Request::Window>()
  1316. && request->window().get<Infrastructure::Request::Window>() == Infrastructure::Request::Window::NoWindow) {
  1317. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("Request requires proxy authentication but has 'no-window' set"_string)));
  1318. return;
  1319. }
  1320. // 2. Needs testing: multiple `Proxy-Authenticate` headers, missing, parsing issues.
  1321. // (Red box in the spec, no-op)
  1322. // 3. If fetchParams is canceled, then return the appropriate network error for fetchParams.
  1323. if (fetch_params.is_canceled()) {
  1324. returned_pending_response->resolve(Infrastructure::Response::appropriate_network_error(vm, fetch_params));
  1325. return;
  1326. }
  1327. // FIXME: 4. Prompt the end user as appropriate in request’s window and store the result as a
  1328. // proxy-authentication entry.
  1329. // NOTE: Remaining details surrounding proxy authentication are defined by HTTP.
  1330. // FIXME: 5. Set response to the result of running HTTP-network-or-cache fetch given fetchParams.
  1331. // (Doing this without step 4 would potentially lead to an infinite request cycle.)
  1332. }
  1333. auto inner_pending_response = PendingResponse::create(vm, request, *response);
  1334. // 16. If all of the following are true
  1335. if (
  1336. // - response’s status is 421
  1337. response->status() == 421
  1338. // - isNewConnectionFetch is false
  1339. && is_new_connection_fetch == IsNewConnectionFetch::No
  1340. // - request’s body is null, or request’s body is non-null and request’s body’s source is non-null
  1341. && (request->body().has<Empty>() || !request->body().get<Infrastructure::Body>().source().has<Empty>())
  1342. // then:
  1343. ) {
  1344. // 1. If fetchParams is canceled, then return the appropriate network error for fetchParams.
  1345. if (fetch_params.is_canceled()) {
  1346. returned_pending_response->resolve(Infrastructure::Response::appropriate_network_error(vm, fetch_params));
  1347. return;
  1348. }
  1349. // 2. Set response to the result of running HTTP-network-or-cache fetch given fetchParams,
  1350. // isAuthenticationFetch, and true.
  1351. inner_pending_response = TRY_OR_IGNORE(http_network_or_cache_fetch(realm, fetch_params, is_authentication_fetch, IsNewConnectionFetch::Yes));
  1352. }
  1353. inner_pending_response->when_loaded([returned_pending_response, is_authentication_fetch](JS::NonnullGCPtr<Infrastructure::Response> response) {
  1354. // 17. If isAuthenticationFetch is true, then create an authentication entry for request and the given
  1355. // realm.
  1356. if (is_authentication_fetch == IsAuthenticationFetch::Yes) {
  1357. // FIXME: "create an authentication entry for request and the given realm"
  1358. }
  1359. returned_pending_response->resolve(response);
  1360. });
  1361. });
  1362. });
  1363. // 18. Return response.
  1364. // NOTE: Typically response’s body’s stream is still being enqueued to after returning.
  1365. return returned_pending_response;
  1366. }
  1367. #if defined(WEB_FETCH_DEBUG)
  1368. static void log_load_request(auto const& load_request)
  1369. {
  1370. dbgln("Fetch: Invoking ResourceLoader");
  1371. dbgln("> {} {} HTTP/1.1", load_request.method(), load_request.url());
  1372. for (auto const& [name, value] : load_request.headers())
  1373. dbgln("> {}: {}", name, value);
  1374. dbgln(">");
  1375. for (auto line : StringView { load_request.body() }.split_view('\n', SplitBehavior::KeepEmpty))
  1376. dbgln("> {}", line);
  1377. }
  1378. static void log_response(auto const& status_code, auto const& headers, auto const& data)
  1379. {
  1380. dbgln("< HTTP/1.1 {}", status_code.value_or(0));
  1381. for (auto const& [name, value] : headers)
  1382. dbgln("< {}: {}", name, value);
  1383. dbgln("<");
  1384. for (auto line : StringView { data }.split_view('\n', SplitBehavior::KeepEmpty))
  1385. dbgln("< {}", line);
  1386. }
  1387. #endif
  1388. // https://fetch.spec.whatwg.org/#concept-http-network-fetch
  1389. // Drop-in replacement for 'HTTP-network fetch', but obviously non-standard :^)
  1390. // It also handles file:// URLs since those can also go through ResourceLoader.
  1391. WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>> nonstandard_resource_loader_file_or_http_network_fetch(JS::Realm& realm, Infrastructure::FetchParams const& fetch_params, IncludeCredentials include_credentials, IsNewConnectionFetch is_new_connection_fetch)
  1392. {
  1393. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'non-standard HTTP-network fetch' with: fetch_params @ {}", &fetch_params);
  1394. auto& vm = realm.vm();
  1395. (void)include_credentials;
  1396. (void)is_new_connection_fetch;
  1397. auto request = fetch_params.request();
  1398. Page* page = nullptr;
  1399. auto& global_object = realm.global_object();
  1400. if (is<HTML::Window>(global_object))
  1401. page = static_cast<HTML::Window&>(global_object).page();
  1402. // NOTE: Using LoadRequest::create_for_url_on_page here will unconditionally add cookies as long as there's a page available.
  1403. // However, it is up to http_network_or_cache_fetch to determine if cookies should be added to the request.
  1404. LoadRequest load_request;
  1405. load_request.set_url(request->current_url());
  1406. if (page)
  1407. load_request.set_page(*page);
  1408. load_request.set_method(DeprecatedString::copy(request->method()));
  1409. for (auto const& header : *request->header_list())
  1410. load_request.set_header(DeprecatedString::copy(header.name), DeprecatedString::copy(header.value));
  1411. if (auto const* body = request->body().get_pointer<Infrastructure::Body>()) {
  1412. TRY(body->source().visit(
  1413. [&](ByteBuffer const& byte_buffer) -> WebIDL::ExceptionOr<void> {
  1414. load_request.set_body(TRY_OR_THROW_OOM(vm, ByteBuffer::copy(byte_buffer)));
  1415. return {};
  1416. },
  1417. [&](JS::Handle<FileAPI::Blob> const& blob_handle) -> WebIDL::ExceptionOr<void> {
  1418. load_request.set_body(TRY_OR_THROW_OOM(vm, ByteBuffer::copy(blob_handle->bytes())));
  1419. return {};
  1420. },
  1421. [](Empty) -> WebIDL::ExceptionOr<void> {
  1422. return {};
  1423. }));
  1424. }
  1425. auto pending_response = PendingResponse::create(vm, request);
  1426. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Invoking ResourceLoader");
  1427. if constexpr (WEB_FETCH_DEBUG)
  1428. log_load_request(load_request);
  1429. ResourceLoader::the().load(
  1430. load_request,
  1431. [&realm, &vm, request, pending_response](auto data, auto& response_headers, auto status_code) {
  1432. dbgln_if(WEB_FETCH_DEBUG, "Fetch: ResourceLoader load for '{}' complete", request->url());
  1433. if constexpr (WEB_FETCH_DEBUG)
  1434. log_response(status_code, response_headers, data);
  1435. auto [body, _] = TRY_OR_IGNORE(extract_body(realm, data));
  1436. auto response = Infrastructure::Response::create(vm);
  1437. response->set_status(status_code.value_or(200));
  1438. response->set_body(move(body));
  1439. for (auto const& [name, value] : response_headers) {
  1440. auto header = TRY_OR_IGNORE(Infrastructure::Header::from_string_pair(name, value));
  1441. TRY_OR_IGNORE(response->header_list()->append(header));
  1442. }
  1443. // FIXME: Set response status message
  1444. pending_response->resolve(response);
  1445. },
  1446. [&vm, request, pending_response](auto& error, auto status_code) {
  1447. dbgln_if(WEB_FETCH_DEBUG, "Fetch: ResourceLoader load for '{}' failed: {} (status {})", request->url(), error, status_code.value_or(0));
  1448. auto response = Infrastructure::Response::create(vm);
  1449. // FIXME: This is ugly, ResourceLoader should tell us.
  1450. if (status_code.value_or(0) == 0) {
  1451. response = Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("HTTP request failed"_string));
  1452. } else {
  1453. response->set_type(Infrastructure::Response::Type::Error);
  1454. response->set_status(status_code.value_or(400));
  1455. // FIXME: Set response status message and body
  1456. }
  1457. pending_response->resolve(response);
  1458. });
  1459. return pending_response;
  1460. }
  1461. // https://fetch.spec.whatwg.org/#cors-preflight-fetch-0
  1462. WebIDL::ExceptionOr<JS::NonnullGCPtr<PendingResponse>> cors_preflight_fetch(JS::Realm& realm, Infrastructure::Request& request)
  1463. {
  1464. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'CORS-preflight fetch' with request @ {}", &request);
  1465. auto& vm = realm.vm();
  1466. // 1. Let preflight be a new request whose method is `OPTIONS`, URL list is a clone of request’s URL list, initiator is
  1467. // request’s initiator, destination is request’s destination, origin is request’s origin, referrer is request’s referrer,
  1468. // referrer policy is request’s referrer policy, mode is "cors", and response tainting is "cors".
  1469. auto preflight = Fetch::Infrastructure::Request::create(vm);
  1470. preflight->set_method(TRY_OR_THROW_OOM(vm, ByteBuffer::copy("OPTIONS"sv.bytes())));
  1471. preflight->set_url_list(request.url_list());
  1472. preflight->set_initiator(request.initiator());
  1473. preflight->set_destination(request.destination());
  1474. preflight->set_origin(request.origin());
  1475. preflight->set_referrer(request.referrer());
  1476. preflight->set_referrer_policy(request.referrer_policy());
  1477. preflight->set_mode(Infrastructure::Request::Mode::CORS);
  1478. preflight->set_response_tainting(Infrastructure::Request::ResponseTainting::CORS);
  1479. // 2. Append (`Accept`, `*/*`) to preflight’s header list.
  1480. auto temp_header = TRY_OR_THROW_OOM(vm, Infrastructure::Header::from_string_pair("Accept"sv, "*/*"sv));
  1481. TRY_OR_THROW_OOM(vm, preflight->header_list()->append(move(temp_header)));
  1482. // 3. Append (`Access-Control-Request-Method`, request’s method) to preflight’s header list.
  1483. temp_header = TRY_OR_THROW_OOM(vm, Infrastructure::Header::from_string_pair("Access-Control-Request-Method"sv, request.method()));
  1484. TRY_OR_THROW_OOM(vm, preflight->header_list()->append(move(temp_header)));
  1485. // 4. Let headers be the CORS-unsafe request-header names with request’s header list.
  1486. auto headers = TRY_OR_THROW_OOM(vm, Infrastructure::get_cors_unsafe_header_names(request.header_list()));
  1487. // 5. If headers is not empty, then:
  1488. if (!headers.is_empty()) {
  1489. // 1. Let value be the items in headers separated from each other by `,`.
  1490. // NOTE: This intentionally does not use combine, as 0x20 following 0x2C is not the way this was implemented,
  1491. // for better or worse.
  1492. ByteBuffer value;
  1493. bool first = true;
  1494. for (auto const& header : headers) {
  1495. if (!first)
  1496. TRY_OR_THROW_OOM(vm, value.try_append(','));
  1497. TRY_OR_THROW_OOM(vm, value.try_append(header));
  1498. first = false;
  1499. }
  1500. // 2. Append (`Access-Control-Request-Headers`, value) to preflight’s header list.
  1501. temp_header = Infrastructure::Header {
  1502. .name = TRY_OR_THROW_OOM(vm, ByteBuffer::copy("Access-Control-Request-Headers"sv.bytes())),
  1503. .value = move(value),
  1504. };
  1505. TRY_OR_THROW_OOM(vm, preflight->header_list()->append(move(temp_header)));
  1506. }
  1507. // 6. Let response be the result of running HTTP-network-or-cache fetch given a new fetch params whose request is preflight.
  1508. // FIXME: The spec doesn't say anything about timing_info here, but FetchParams requires a non-null FetchTimingInfo object.
  1509. auto timing_info = Infrastructure::FetchTimingInfo::create(vm);
  1510. auto fetch_params = Infrastructure::FetchParams::create(vm, preflight, timing_info);
  1511. auto returned_pending_response = PendingResponse::create(vm, request);
  1512. auto preflight_response = TRY(http_network_or_cache_fetch(realm, fetch_params));
  1513. preflight_response->when_loaded([&vm, &request, returned_pending_response](JS::NonnullGCPtr<Infrastructure::Response> response) {
  1514. dbgln_if(WEB_FETCH_DEBUG, "Fetch: Running 'CORS-preflight fetch' preflight_response load callback");
  1515. // 7. If a CORS check for request and response returns success and response’s status is an ok status, then:
  1516. // NOTE: The CORS check is done on request rather than preflight to ensure the correct credentials mode is used.
  1517. if (TRY_OR_IGNORE(cors_check(request, response)) && Infrastructure::is_ok_status(response->status())) {
  1518. // 1. Let methods be the result of extracting header list values given `Access-Control-Allow-Methods` and response’s header list.
  1519. auto methods_or_failure = TRY_OR_IGNORE(Infrastructure::extract_header_list_values("Access-Control-Allow-Methods"sv.bytes(), response->header_list()));
  1520. // 2. Let headerNames be the result of extracting header list values given `Access-Control-Allow-Headers` and
  1521. // response’s header list.
  1522. auto header_names_or_failure = TRY_OR_IGNORE(Infrastructure::extract_header_list_values("Access-Control-Allow-Headers"sv.bytes(), response->header_list()));
  1523. // 3. If either methods or headerNames is failure, return a network error.
  1524. if (methods_or_failure.has<Infrastructure::ExtractHeaderParseFailure>()) {
  1525. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("The Access-Control-Allow-Methods in the CORS-preflight response is syntactically invalid"_string)));
  1526. return;
  1527. }
  1528. if (header_names_or_failure.has<Infrastructure::ExtractHeaderParseFailure>()) {
  1529. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("The Access-Control-Allow-Headers in the CORS-preflight response is syntactically invalid"_string)));
  1530. return;
  1531. }
  1532. // NOTE: We treat "methods_or_failure" being `Empty` as empty Vector here.
  1533. auto methods = methods_or_failure.has<Vector<ByteBuffer>>() ? methods_or_failure.get<Vector<ByteBuffer>>() : Vector<ByteBuffer> {};
  1534. // NOTE: We treat "header_names_or_failure" being `Empty` as empty Vector here.
  1535. auto header_names = header_names_or_failure.has<Vector<ByteBuffer>>() ? header_names_or_failure.get<Vector<ByteBuffer>>() : Vector<ByteBuffer> {};
  1536. // FIXME: Remove this once extract_header_list_values validates the header and returns multiple values.
  1537. if (!methods.is_empty()) {
  1538. VERIFY(methods.size() == 1);
  1539. auto split_methods = StringView { methods.first() }.split_view(',');
  1540. Vector<ByteBuffer> trimmed_methods;
  1541. for (auto const& method : split_methods) {
  1542. auto trimmed_method = method.trim(" \t"sv);
  1543. auto trimmed_method_as_byte_buffer = TRY_OR_IGNORE(ByteBuffer::copy(trimmed_method.bytes()));
  1544. TRY_OR_IGNORE(trimmed_methods.try_append(move(trimmed_method_as_byte_buffer)));
  1545. }
  1546. methods = move(trimmed_methods);
  1547. }
  1548. // FIXME: Remove this once extract_header_list_values validates the header and returns multiple values.
  1549. if (!header_names.is_empty()) {
  1550. VERIFY(header_names.size() == 1);
  1551. auto split_header_names = StringView { header_names.first() }.split_view(',');
  1552. Vector<ByteBuffer> trimmed_header_names;
  1553. for (auto const& header_name : split_header_names) {
  1554. auto trimmed_header_name = header_name.trim(" \t"sv);
  1555. auto trimmed_header_name_as_byte_buffer = TRY_OR_IGNORE(ByteBuffer::copy(trimmed_header_name.bytes()));
  1556. TRY_OR_IGNORE(trimmed_header_names.try_append(move(trimmed_header_name_as_byte_buffer)));
  1557. }
  1558. header_names = move(trimmed_header_names);
  1559. }
  1560. // 4. If methods is null and request’s use-CORS-preflight flag is set, then set methods to a new list containing request’s method.
  1561. // NOTE: This ensures that a CORS-preflight fetch that happened due to request’s use-CORS-preflight flag being set is cached.
  1562. if (methods.is_empty() && request.use_cors_preflight())
  1563. methods = Vector { TRY_OR_IGNORE(ByteBuffer::copy(request.method())) };
  1564. // 5. If request’s method is not in methods, request’s method is not a CORS-safelisted method, and request’s credentials mode
  1565. // is "include" or methods does not contain `*`, then return a network error.
  1566. if (!methods.contains_slow(request.method()) && !Infrastructure::is_cors_safelisted_method(request.method())) {
  1567. if (request.credentials_mode() == Infrastructure::Request::CredentialsMode::Include) {
  1568. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE(String::formatted("Non-CORS-safelisted method '{}' not found in the CORS-preflight response's Access-Control-Allow-Methods header (the header may be missing). '*' is not allowed as the main request includes credentials."sv, StringView { request.method() }))));
  1569. return;
  1570. }
  1571. if (!methods.contains_slow("*"sv.bytes())) {
  1572. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE(String::formatted("Non-CORS-safelisted method '{}' not found in the CORS-preflight response's Access-Control-Allow-Methods header and there was no '*' entry. The header may be missing."sv, StringView { request.method() }))));
  1573. return;
  1574. }
  1575. }
  1576. // 6. If one of request’s header list’s names is a CORS non-wildcard request-header name and is not a byte-case-insensitive match
  1577. // for an item in headerNames, then return a network error.
  1578. for (auto const& header : *request.header_list()) {
  1579. if (Infrastructure::is_cors_non_wildcard_request_header_name(header.name)) {
  1580. bool is_in_header_names = false;
  1581. for (auto const& allowed_header_name : header_names) {
  1582. if (StringView { allowed_header_name }.equals_ignoring_ascii_case(header.name)) {
  1583. is_in_header_names = true;
  1584. break;
  1585. }
  1586. }
  1587. if (!is_in_header_names) {
  1588. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE(String::formatted("Main request contains the header '{}' that is not specified in the CORS-preflight response's Access-Control-Allow-Headers header (the header may be missing). '*' does not capture this header."sv, StringView { header.name }))));
  1589. return;
  1590. }
  1591. }
  1592. }
  1593. // 7. For each unsafeName of the CORS-unsafe request-header names with request’s header list, if unsafeName is not a
  1594. // byte-case-insensitive match for an item in headerNames and request’s credentials mode is "include" or headerNames
  1595. // does not contain `*`, return a network error.
  1596. auto unsafe_names = TRY_OR_IGNORE(Infrastructure::get_cors_unsafe_header_names(request.header_list()));
  1597. for (auto const& unsafe_name : unsafe_names) {
  1598. bool is_in_header_names = false;
  1599. for (auto const& header_name : header_names) {
  1600. if (StringView { unsafe_name }.equals_ignoring_ascii_case(header_name)) {
  1601. is_in_header_names = true;
  1602. break;
  1603. }
  1604. }
  1605. if (!is_in_header_names) {
  1606. if (request.credentials_mode() == Infrastructure::Request::CredentialsMode::Include) {
  1607. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE(String::formatted("CORS-unsafe request-header '{}' not found in the CORS-preflight response's Access-Control-Allow-Headers header (the header may be missing). '*' is not allowed as the main request includes credentials."sv, StringView { unsafe_name }))));
  1608. return;
  1609. }
  1610. if (!header_names.contains_slow("*"sv.bytes())) {
  1611. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE(String::formatted("CORS-unsafe request-header '{}' not found in the CORS-preflight response's Access-Control-Allow-Headers header and there was no '*' entry. The header may be missing."sv, StringView { unsafe_name }))));
  1612. return;
  1613. }
  1614. }
  1615. }
  1616. // FIXME: 8. Let max-age be the result of extracting header list values given `Access-Control-Max-Age` and response’s header list.
  1617. // FIXME: 9. If max-age is failure or null, then set max-age to 5.
  1618. // FIXME: 10. If max-age is greater than an imposed limit on max-age, then set max-age to the imposed limit.
  1619. // 11. If the user agent does not provide for a cache, then return response.
  1620. // NOTE: Since we don't currently have a cache, this is always true.
  1621. returned_pending_response->resolve(response);
  1622. return;
  1623. // FIXME: 12. For each method in methods for which there is a method cache entry match using request, set matching entry’s max-age
  1624. // to max-age.
  1625. // FIXME: 13. For each method in methods for which there is no method cache entry match using request, create a new cache entry
  1626. // with request, max-age, method, and null.
  1627. // FIXME: 14. For each headerName in headerNames for which there is a header-name cache entry match using request, set matching
  1628. // entry’s max-age to max-age.
  1629. // FIXME: 15. For each headerName in headerNames for which there is no header-name cache entry match using request, create a
  1630. // new cache entry with request, max-age, null, and headerName.
  1631. // FIXME: 16. Return response.
  1632. }
  1633. // 8. Otherwise, return a network error.
  1634. returned_pending_response->resolve(Infrastructure::Response::network_error(vm, TRY_OR_IGNORE("CORS-preflight check failed"_string)));
  1635. });
  1636. return returned_pending_response;
  1637. }
  1638. }