1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
|
/*
* Copyright (C) 2009 Apple Inc. All Rights Reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "CredentialStorage.h"
#include "CString.h"
#include "Credential.h"
#include "KURL.h"
#include "ProtectionSpaceHash.h"
#include "StringHash.h"
#include <wtf/StdLibExtras.h>
namespace WebCore {
typedef HashMap<ProtectionSpace, Credential> ProtectionSpaceToCredentialMap;
static ProtectionSpaceToCredentialMap& protectionSpaceToCredentialMap()
{
DEFINE_STATIC_LOCAL(ProtectionSpaceToCredentialMap, map, ());
return map;
}
typedef HashMap<String, HashMap<String, Credential> > OriginToDefaultBasicCredentialMap;
static OriginToDefaultBasicCredentialMap& originToDefaultBasicCredentialMap()
{
DEFINE_STATIC_LOCAL(OriginToDefaultBasicCredentialMap, map, ());
return map;
}
static String originStringFromURL(const KURL& url)
{
if (url.port())
return url.protocol() + "://" + url.host() + String::format(":%i/", url.port());
return url.protocol() + "://" + url.host() + "/";
}
void CredentialStorage::set(const Credential& credential, const ProtectionSpace& protectionSpace, const KURL& url)
{
ASSERT(url.protocolInHTTPFamily());
ASSERT(url.isValid());
protectionSpaceToCredentialMap().set(protectionSpace, credential);
ProtectionSpaceAuthenticationScheme scheme = protectionSpace.authenticationScheme();
if (url.protocolInHTTPFamily() && (scheme == ProtectionSpaceAuthenticationSchemeHTTPBasic || scheme == ProtectionSpaceAuthenticationSchemeDefault)) {
String origin = originStringFromURL(url);
HashMap<String, Credential> pathToCredentialMap;
pair<HashMap<String, HashMap<String, Credential> >::iterator, bool> result = originToDefaultBasicCredentialMap().add(origin, pathToCredentialMap);
// Remove the last path component that is not a directory to determine the subpath for which this credential applies.
// We keep a leading slash, but remove a trailing one.
String path = url.path();
ASSERT(path.length() > 0);
ASSERT(path[0] == '/');
if (path.length() > 1) {
int index = path.reverseFind('/');
path = path.substring(0, index ? index : 1);
}
ASSERT(path.length() == 1 || path[path.length() - 1] != '/');
result.first->second.set(path, credential);
}
}
Credential CredentialStorage::get(const ProtectionSpace& protectionSpace)
{
return protectionSpaceToCredentialMap().get(protectionSpace);
}
Credential CredentialStorage::getDefaultAuthenticationCredential(const KURL& url)
{
ASSERT(url.protocolInHTTPFamily());
String origin = originStringFromURL(url);
const HashMap<String, Credential>& pathToCredentialMap(originToDefaultBasicCredentialMap().get(origin));
if (pathToCredentialMap.isEmpty())
return Credential();
// Check to see if there is a stored credential for the subpath ancestry of this url.
String path = url.path();
Credential credential = pathToCredentialMap.get(path);
while (credential.isEmpty() && !path.isNull()) {
int index = path.reverseFind('/');
if (index == 0) {
credential = pathToCredentialMap.get("/");
break;
} else if (index == -1) {
// This case should never happen, as all HTTP URL paths should start with a leading /
ASSERT_NOT_REACHED();
credential = pathToCredentialMap.get(path);
break;
} else {
path = path.substring(0, index);
credential = pathToCredentialMap.get(path);
}
}
return credential;
}
} // namespace WebCore
|