1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
|
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
// HttpLog.h should generally be included first
#include "HttpLog.h"
#include "nsHttpHandler.h"
#include "nsHttpAuthManager.h"
#include "nsNetUtil.h"
#include "nsIPrincipal.h"
namespace mozilla {
namespace net {
NS_IMPL_ISUPPORTS(nsHttpAuthManager, nsIHttpAuthManager)
nsresult nsHttpAuthManager::Init() {
// get reference to the auth cache. we assume that we will live
// as long as gHttpHandler. instantiate it if necessary.
if (!gHttpHandler) {
nsresult rv;
nsCOMPtr<nsIIOService> ios = do_GetIOService(&rv);
if (NS_FAILED(rv)) return rv;
nsCOMPtr<nsIProtocolHandler> handler;
rv = ios->GetProtocolHandler("http", getter_AddRefs(handler));
if (NS_FAILED(rv)) return rv;
// maybe someone is overriding our HTTP handler implementation?
NS_ENSURE_TRUE(gHttpHandler, NS_ERROR_UNEXPECTED);
}
mAuthCache = gHttpHandler->AuthCache(false);
mPrivateAuthCache = gHttpHandler->AuthCache(true);
NS_ENSURE_TRUE(mAuthCache, NS_ERROR_FAILURE);
NS_ENSURE_TRUE(mPrivateAuthCache, NS_ERROR_FAILURE);
return NS_OK;
}
NS_IMETHODIMP
nsHttpAuthManager::GetAuthIdentity(
const nsACString& aScheme, const nsACString& aHost, int32_t aPort,
const nsACString& aAuthType, const nsACString& aRealm,
const nsACString& aPath, nsAString& aUserDomain, nsAString& aUserName,
nsAString& aUserPassword, bool aIsPrivate, nsIPrincipal* aPrincipal) {
nsHttpAuthCache* auth_cache = aIsPrivate ? mPrivateAuthCache : mAuthCache;
nsHttpAuthEntry* entry = nullptr;
nsresult rv;
nsAutoCString originSuffix;
if (aPrincipal) {
aPrincipal->OriginAttributesRef().CreateSuffix(originSuffix);
}
if (!aPath.IsEmpty()) {
rv = auth_cache->GetAuthEntryForPath(aScheme, aHost, aPort, aPath,
originSuffix, &entry);
} else {
rv = auth_cache->GetAuthEntryForDomain(aScheme, aHost, aPort, aRealm,
originSuffix, &entry);
}
if (NS_FAILED(rv)) return rv;
if (!entry) return NS_ERROR_UNEXPECTED;
aUserDomain.Assign(entry->Domain());
aUserName.Assign(entry->User());
aUserPassword.Assign(entry->Pass());
return NS_OK;
}
NS_IMETHODIMP
nsHttpAuthManager::SetAuthIdentity(
const nsACString& aScheme, const nsACString& aHost, int32_t aPort,
const nsACString& aAuthType, const nsACString& aRealm,
const nsACString& aPath, const nsAString& aUserDomain,
const nsAString& aUserName, const nsAString& aUserPassword, bool aIsPrivate,
nsIPrincipal* aPrincipal) {
nsHttpAuthIdentity ident(aUserDomain, aUserName, aUserPassword);
nsAutoCString originSuffix;
if (aPrincipal) {
aPrincipal->OriginAttributesRef().CreateSuffix(originSuffix);
}
nsHttpAuthCache* auth_cache = aIsPrivate ? mPrivateAuthCache : mAuthCache;
return auth_cache->SetAuthEntry(aScheme, aHost, aPort, aPath, aRealm,
""_ns, // credentials
""_ns, // challenge
originSuffix, &ident,
nullptr); // metadata
}
NS_IMETHODIMP
nsHttpAuthManager::ClearAll() {
mAuthCache->ClearAll();
mPrivateAuthCache->ClearAll();
return NS_OK;
}
} // namespace net
} // namespace mozilla
|