src/java.base/share/classes/sun/net/www/protocol/http/HttpURLConnection.java
author dfuchs
Fri, 30 Aug 2019 15:42:27 +0100
branchJDK-8229867-branch
changeset 57968 8595871a5446
parent 57879 095c2f21dd10
permissions -rw-r--r--
JDK-8229867: first prototype
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
55711
0c143aaa2c99 8221518: Normalize normalization
dfuchs
parents: 53018
diff changeset
     2
 * Copyright (c) 1995, 2019, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5199
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5199
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5199
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5199
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5199
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package sun.net.www.protocol.http;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
    28
import java.security.PrivilegedAction;
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
    29
import java.util.Arrays;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.net.URL;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.net.URLConnection;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import java.net.ProtocolException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import java.net.HttpRetryException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.net.PasswordAuthentication;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.net.Authenticator;
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
    36
import java.net.HttpCookie;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.net.InetAddress;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
import java.net.UnknownHostException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
import java.net.SocketTimeoutException;
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
    40
import java.net.SocketPermission;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import java.net.Proxy;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
import java.net.ProxySelector;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
import java.net.URI;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
import java.net.InetSocketAddress;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
import java.net.CookieHandler;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
import java.net.ResponseCache;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
import java.net.CacheResponse;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
import java.net.SecureCacheResponse;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
import java.net.CacheRequest;
20787
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
    50
import java.net.URLPermission;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
import java.net.Authenticator.RequestorType;
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
    52
import java.security.AccessController;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
    53
import java.security.PrivilegedExceptionAction;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
    54
import java.security.PrivilegedActionException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
import java.io.*;
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
    56
import java.util.ArrayList;
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
    57
import java.util.Collections;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
import java.util.Date;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
import java.util.Map;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
import java.util.List;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
import java.util.Locale;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
import java.util.StringTokenizer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
import java.util.Iterator;
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
    64
import java.util.HashSet;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
    65
import java.util.HashMap;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
    66
import java.util.Set;
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
    67
import java.util.StringJoiner;
52427
3c6aa484536c 8211122: Reduce the number of internal classes made accessible to jdk.unsupported
mchung
parents: 52169
diff changeset
    68
import jdk.internal.access.JavaNetHttpCookieAccess;
3c6aa484536c 8211122: Reduce the number of internal classes made accessible to jdk.unsupported
mchung
parents: 52169
diff changeset
    69
import jdk.internal.access.SharedSecrets;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
import sun.net.*;
55711
0c143aaa2c99 8221518: Normalize normalization
dfuchs
parents: 53018
diff changeset
    71
import sun.net.util.IPAddressUtil;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
import sun.net.www.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
import sun.net.www.http.HttpClient;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
import sun.net.www.http.PosterOutputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
import sun.net.www.http.ChunkedInputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
import sun.net.www.http.ChunkedOutputStream;
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
    77
import sun.util.logging.PlatformLogger;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
import java.text.SimpleDateFormat;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
import java.util.TimeZone;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
import java.net.MalformedURLException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
import java.nio.ByteBuffer;
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
    82
import java.util.Objects;
37593
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
    83
import java.util.Properties;
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
    84
import java.util.concurrent.locks.ReentrantLock;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
    85
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
    86
import static sun.net.www.protocol.http.AuthScheme.BASIC;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
    87
import static sun.net.www.protocol.http.AuthScheme.DIGEST;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
    88
import static sun.net.www.protocol.http.AuthScheme.NTLM;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
    89
import static sun.net.www.protocol.http.AuthScheme.NEGOTIATE;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
    90
import static sun.net.www.protocol.http.AuthScheme.KERBEROS;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
    91
import static sun.net.www.protocol.http.AuthScheme.UNKNOWN;
37593
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
    92
import sun.security.action.GetIntegerAction;
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
    93
import sun.security.action.GetPropertyAction;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
 * A class to represent an HTTP connection to a remote object.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
public class HttpURLConnection extends java.net.HttpURLConnection {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   102
    static final String HTTP_CONNECT = "CONNECT";
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   103
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
    static final String version;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
    public static final String userAgent;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
    /* max # of allowed re-directs */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
    static final int defaultmaxRedirects = 20;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
    static final int maxRedirects;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
    /* Not all servers support the (Proxy)-Authentication-Info headers.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
     * By default, we don't require them to be sent
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
    static final boolean validateProxy;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
    static final boolean validateServer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   117
    /** A, possibly empty, set of authentication schemes that are disabled
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   118
     *  when proxying plain HTTP ( not HTTPS ). */
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   119
    static final Set<String> disabledProxyingSchemes;
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   120
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   121
    /** A, possibly empty, set of authentication schemes that are disabled
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   122
     *  when setting up a tunnel for HTTPS ( HTTP CONNECT ). */
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   123
    static final Set<String> disabledTunnelingSchemes;
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   124
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
    private StreamingOutputStream strOutputStream;
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31061
diff changeset
   126
    private static final String RETRY_MSG1 =
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
        "cannot retry due to proxy authentication, in streaming mode";
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31061
diff changeset
   128
    private static final String RETRY_MSG2 =
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
        "cannot retry due to server authentication, in streaming mode";
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31061
diff changeset
   130
    private static final String RETRY_MSG3 =
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
        "cannot retry due to redirection, in streaming mode";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
     * System properties related to error stream handling:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
     * sun.net.http.errorstream.enableBuffering = <boolean>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
     * With the above system property set to true (default is false),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
     * when the response code is >=400, the HTTP handler will try to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
     * buffer the response body (up to a certain amount and within a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
     * time limit). Thus freeing up the underlying socket connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
     * for reuse. The rationale behind this is that usually when the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
     * server responds with a >=400 error (client error or server
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
     * error, such as 404 file not found), the server will send a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
     * small response body to explain who to contact and what to do to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
     * recover. With this property set to true, even if the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
     * application doesn't call getErrorStream(), read the response
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
     * body, and then call close(), the underlying socket connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
     * can still be kept-alive and reused. The following two system
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
     * properties provide further control to the error stream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
     * buffering behaviour.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
     * sun.net.http.errorstream.timeout = <int>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
     *     the timeout (in millisec) waiting the error stream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
     *     to be buffered; default is 300 ms
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
     * sun.net.http.errorstream.bufferSize = <int>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
     *     the size (in bytes) to use for the buffering the error stream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
     *     default is 4k
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
    /* Should we enable buffering of error streams? */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
    private static boolean enableESBuffer = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
    /* timeout waiting for read for buffered error stream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
    private static int timeout4ESBuffer = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
    /* buffer size for buffered error stream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
    */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
    private static int bufSize4ES = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   174
    /*
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   175
     * Restrict setting of request headers through the public api
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   176
     * consistent with JavaScript XMLHttpRequest2 with a few
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   177
     * exceptions. Disallowed headers are silently ignored for
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   178
     * backwards compatibility reasons rather than throwing a
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   179
     * SecurityException. For example, some applets set the
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   180
     * Host header since old JREs did not implement HTTP 1.1.
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   181
     * Additionally, any header starting with Sec- is
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   182
     * disallowed.
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   183
     *
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   184
     * The following headers are allowed for historical reasons:
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   185
     *
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   186
     * Accept-Charset, Accept-Encoding, Cookie, Cookie2, Date,
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   187
     * Referer, TE, User-Agent, headers beginning with Proxy-.
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   188
     *
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   189
     * The following headers are allowed in a limited form:
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   190
     *
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   191
     * Connection: close
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   192
     *
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   193
     * See http://www.w3.org/TR/XMLHttpRequest2.
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   194
     */
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   195
    private static final boolean allowRestrictedHeaders;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   196
    private static final Set<String> restrictedHeaderSet;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   197
    private static final String[] restrictedHeaders = {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   198
        /* Restricted by XMLHttpRequest2 */
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   199
        //"Accept-Charset",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   200
        //"Accept-Encoding",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   201
        "Access-Control-Request-Headers",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   202
        "Access-Control-Request-Method",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   203
        "Connection", /* close is allowed */
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   204
        "Content-Length",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   205
        //"Cookie",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   206
        //"Cookie2",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   207
        "Content-Transfer-Encoding",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   208
        //"Date",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   209
        //"Expect",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   210
        "Host",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   211
        "Keep-Alive",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   212
        "Origin",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   213
        // "Referer",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   214
        // "TE",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   215
        "Trailer",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   216
        "Transfer-Encoding",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   217
        "Upgrade",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   218
        //"User-Agent",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   219
        "Via"
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   220
    };
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   221
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   222
    private static String getNetProperty(String name) {
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   223
        PrivilegedAction<String> pa = () -> NetProperties.get(name);
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   224
        return AccessController.doPrivileged(pa);
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   225
    }
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   226
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   227
    private static Set<String> schemesListToSet(String list) {
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   228
        if (list == null || list.isEmpty())
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   229
            return Collections.emptySet();
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   230
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   231
        Set<String> s = new HashSet<>();
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   232
        String[] parts = list.split("\\s*,\\s*");
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   233
        for (String part : parts)
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   234
            s.add(part.toLowerCase(Locale.ROOT));
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   235
        return s;
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   236
    }
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   237
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
    static {
37781
71ed5645f17c 8155775: Re-examine naming of privileged methods to access System properties
redestad
parents: 37593
diff changeset
   239
        Properties props = GetPropertyAction.privilegedGetProperties();
71ed5645f17c 8155775: Re-examine naming of privileged methods to access System properties
redestad
parents: 37593
diff changeset
   240
        maxRedirects = GetIntegerAction.privilegedGetProperty(
71ed5645f17c 8155775: Re-examine naming of privileged methods to access System properties
redestad
parents: 37593
diff changeset
   241
                "http.maxRedirects", defaultmaxRedirects);
37593
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   242
        version = props.getProperty("java.version");
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   243
        String agent = props.getProperty("http.agent");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
        if (agent == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
            agent = "Java/"+version;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
            agent = agent + " Java/"+version;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
        userAgent = agent;
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   250
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   251
        // A set of net properties to control the use of authentication schemes
52499
768b1c612100 8213490: Networking area typos and inconsistencies cleanup
prappo
parents: 52427
diff changeset
   252
        // when proxying/tunneling.
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   253
        String p = getNetProperty("jdk.http.auth.tunneling.disabledSchemes");
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   254
        disabledTunnelingSchemes = schemesListToSet(p);
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   255
        p = getNetProperty("jdk.http.auth.proxying.disabledSchemes");
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   256
        disabledProxyingSchemes = schemesListToSet(p);
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
   257
37593
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   258
        validateProxy = Boolean.parseBoolean(
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   259
                props.getProperty("http.auth.digest.validateProxy"));
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   260
        validateServer = Boolean.parseBoolean(
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   261
                props.getProperty("http.auth.digest.validateServer"));
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   262
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   263
        enableESBuffer = Boolean.parseBoolean(
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   264
                props.getProperty("sun.net.http.errorstream.enableBuffering"));
37781
71ed5645f17c 8155775: Re-examine naming of privileged methods to access System properties
redestad
parents: 37593
diff changeset
   265
        timeout4ESBuffer = GetIntegerAction.privilegedGetProperty(
71ed5645f17c 8155775: Re-examine naming of privileged methods to access System properties
redestad
parents: 37593
diff changeset
   266
                "sun.net.http.errorstream.timeout", 300);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
        if (timeout4ESBuffer <= 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   268
            timeout4ESBuffer = 300; // use the default
90ce3da70b43 Initial load
duke
parents:
diff changeset
   269
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   270
37781
71ed5645f17c 8155775: Re-examine naming of privileged methods to access System properties
redestad
parents: 37593
diff changeset
   271
        bufSize4ES = GetIntegerAction.privilegedGetProperty(
71ed5645f17c 8155775: Re-examine naming of privileged methods to access System properties
redestad
parents: 37593
diff changeset
   272
                "sun.net.http.errorstream.bufferSize", 4096);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   273
        if (bufSize4ES <= 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   274
            bufSize4ES = 4096; // use the default
90ce3da70b43 Initial load
duke
parents:
diff changeset
   275
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   276
37593
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   277
        allowRestrictedHeaders = Boolean.parseBoolean(
824750ada3d6 8154231: Simplify access to System properties from JDK code
redestad
parents: 33292
diff changeset
   278
                props.getProperty("sun.net.http.allowRestrictedHeaders"));
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   279
        if (!allowRestrictedHeaders) {
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
   280
            restrictedHeaderSet = new HashSet<>(restrictedHeaders.length);
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   281
            for (int i=0; i < restrictedHeaders.length; i++) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   282
                restrictedHeaderSet.add(restrictedHeaders[i].toLowerCase());
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   283
            }
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   284
        } else {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   285
            restrictedHeaderSet = null;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   286
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
    static final String httpVersion = "HTTP/1.1";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
    static final String acceptString =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
        "text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
90ce3da70b43 Initial load
duke
parents:
diff changeset
   293
    // the following http request headers should NOT have their values
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
    // returned for security reasons.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
    private static final String[] EXCLUDE_HEADERS = {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
            "Proxy-Authorization",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
            "Authorization"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   298
    };
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   299
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   300
    // also exclude system cookies when any might be set
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   301
    private static final String[] EXCLUDE_HEADERS2= {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   302
            "Proxy-Authorization",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   303
            "Authorization",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   304
            "Cookie",
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   305
            "Cookie2"
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   306
    };
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   307
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
    protected HttpClient http;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
    protected Handler handler;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
    protected Proxy instProxy;
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   311
    protected volatile Authenticator authenticator;
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   312
    protected volatile String authenticatorKey;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
    private CookieHandler cookieHandler;
11839
53065c5f535d 7133367: ResponseCache.put should not be called when setUseCaches(false)
chegar
parents: 11528
diff changeset
   315
    private final ResponseCache cacheHandler;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
    // the cached response, and cached response headers and body
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
    protected CacheResponse cachedResponse;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
    private MessageHeader cachedHeaders;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
    private InputStream cachedInputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
    /* output stream to server */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
    protected PrintStream ps = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
    /* buffered error stream */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
    private InputStream errorStream = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
    /* User set Cookies */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
    private boolean setUserCookies = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
    private String userCookies = null;
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   332
    private String userCookies2 = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
    /* We only have a single static authenticator for now.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
     * REMIND:  backwards compatibility with JDK 1.1.  Should be
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
     * eliminated for JDK 2.0.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
     */
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
   338
    @Deprecated
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
    private static HttpAuthenticator defaultAuth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
    /* all the headers we send
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
     * NOTE: do *NOT* dump out the content of 'requests' in the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
     * output or stacktrace since it may contain security-sensitive
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
     * headers such as those defined in EXCLUDE_HEADERS.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
    private MessageHeader requests;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   348
    /* The headers actually set by the user are recorded here also
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   349
     */
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   350
    private MessageHeader userHeaders;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   351
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   352
    /* Headers and request method cannot be changed
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   353
     * once this flag is set in :-
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   354
     *     - getOutputStream()
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   355
     *     - getInputStream())
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   356
     *     - connect()
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   357
     * Access synchronized on connectionLock.
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   358
     */
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   359
    private boolean connecting = false;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   360
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
    /* The following two fields are only used with Digest Authentication */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
    String domain;      /* The list of authentication domains */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   363
    DigestAuthentication.Parameters digestparams;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
    /* Current credentials in use */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
    AuthenticationInfo  currentProxyCredentials = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
    AuthenticationInfo  currentServerCredentials = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
    boolean             needToCheck = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
    private boolean doingNTLM2ndStage = false; /* doing the 2nd stage of an NTLM server authentication */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
    private boolean doingNTLMp2ndStage = false; /* doing the 2nd stage of an NTLM proxy authentication */
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
   371
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
   372
    /* try auth without calling Authenticator. Used for transparent NTLM authentication */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
   373
    private boolean tryTransparentNTLMServer = true;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
   374
    private boolean tryTransparentNTLMProxy = true;
28545
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
   375
    private boolean useProxyResponseCode = false;
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
   376
3061
419b6dba7ccf 6855297: Windows build breaks after 6811297
jccollet
parents: 3059
diff changeset
   377
    /* Used by Windows specific code */
4157
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   378
    private Object authObj;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
90ce3da70b43 Initial load
duke
parents:
diff changeset
   380
    /* Set if the user is manually setting the Authorization or Proxy-Authorization headers */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   381
    boolean isUserServerAuth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
    boolean isUserProxyAuth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   383
5199
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
   384
    String serverAuthKey, proxyAuthKey;
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
   385
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   386
    /* Progress source */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   387
    protected ProgressSource pi;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   388
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   389
    /* Lock */
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   390
    final ReentrantLock connectionLock = new ReentrantLock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   391
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
    /* all the response headers we get back */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   393
    private MessageHeader responses;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   394
    /* the stream _from_ the server */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   395
    private InputStream inputStream = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
    /* post stream _to_ the server, if any */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
    private PosterOutputStream poster = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
    /* Indicates if the std. request headers have been set in requests. */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
    private boolean setRequests=false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
    /* Indicates whether a request has already failed or not */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
    private boolean failedOnce=false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
    /* Remembered Exception, we will throw it again if somebody
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
       calls getInputStream after disconnect */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
    private Exception rememberedException = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
    /* If we decide we want to reuse a client, we put it here */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
    private HttpClient reuseClient = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   412
    /* Tunnel states */
14008
b572c1f3a7ad 7199219: Proxy-Connection headers set incorrectly when a HttpClient is retrieved from the Keep Alive Cache
robm
parents: 14007
diff changeset
   413
    public enum TunnelState {
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   414
        /* No tunnel */
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   415
        NONE,
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   416
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   417
        /* Setting up a tunnel */
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   418
        SETUP,
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   419
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   420
        /* Tunnel has been successfully setup */
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   421
        TUNNELING
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   422
    }
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   423
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   424
    private TunnelState tunnelState = TunnelState.NONE;
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   425
7022
1066bfde0f5e 6993490: SocketTimeoutException on HTTP keep-alive connections
chegar
parents: 6879
diff changeset
   426
    /* Redefine timeouts from java.net.URLConnection as we need -1 to mean
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
     * not set. This is to ensure backward compatibility.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
     */
7022
1066bfde0f5e 6993490: SocketTimeoutException on HTTP keep-alive connections
chegar
parents: 6879
diff changeset
   429
    private int connectTimeout = NetworkClient.DEFAULT_CONNECT_TIMEOUT;
1066bfde0f5e 6993490: SocketTimeoutException on HTTP keep-alive connections
chegar
parents: 6879
diff changeset
   430
    private int readTimeout = NetworkClient.DEFAULT_READ_TIMEOUT;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
20787
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
   432
    /* A permission converted from a URLPermission */
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   433
    private SocketPermission socketPermission;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   434
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   435
    /* Logging support */
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   436
    private static final PlatformLogger logger =
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   437
            PlatformLogger.getLogger("sun.net.www.protocol.http.HttpURLConnection");
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   438
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
     * privileged request password authentication
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
    private static PasswordAuthentication
90ce3da70b43 Initial load
duke
parents:
diff changeset
   444
    privilegedRequestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   445
                            final Authenticator authenticator,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
                            final String host,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
                            final InetAddress addr,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
                            final int port,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
                            final String protocol,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
                            final String prompt,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
                            final String scheme,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
                            final URL url,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
                            final RequestorType authType) {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
   454
        return java.security.AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
   455
            new java.security.PrivilegedAction<>() {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
   456
                public PasswordAuthentication run() {
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
   457
                    if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   458
                        logger.finest("Requesting Authentication: host =" + host + " url = " + url);
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
   459
                    }
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
   460
                    PasswordAuthentication pass = Authenticator.requestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   461
                        authenticator, host, addr, port, protocol,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
                        prompt, scheme, url, authType);
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
   463
                    if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   464
                        logger.finest("Authentication returned: " + (pass != null ? pass.toString() : "null"));
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
   465
                    }
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
   466
                    return pass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
            });
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   471
    private boolean isRestrictedHeader(String key, String value) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   472
        if (allowRestrictedHeaders) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   473
            return false;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   474
        }
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   475
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   476
        key = key.toLowerCase();
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   477
        if (restrictedHeaderSet.contains(key)) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   478
            /*
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   479
             * Exceptions to restricted headers:
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   480
             *
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   481
             * Allow "Connection: close".
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   482
             */
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   483
            if (key.equals("connection") && value.equalsIgnoreCase("close")) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   484
                return false;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   485
            }
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   486
            return true;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   487
        } else if (key.startsWith("sec-")) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   488
            return true;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   489
        }
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   490
        return false;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   491
    }
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   492
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   493
    /*
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   494
     * Checks the validity of http message header and whether the header
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   495
     * is restricted and throws IllegalArgumentException if invalid or
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   496
     * restricted.
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   497
     */
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   498
    private boolean isExternalMessageHeaderAllowed(String key, String value) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   499
        checkMessageHeader(key, value);
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   500
        if (!isRestrictedHeader(key, value)) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   501
            return true;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   502
        }
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   503
        return false;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   504
    }
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
   505
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   506
    /* Logging support */
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   507
    public static PlatformLogger getHttpLogger() {
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   508
        return logger;
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   509
    }
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   510
4157
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   511
    /* Used for Windows NTLM implementation */
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   512
    public Object authObj() {
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   513
        return authObj;
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   514
    }
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   515
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   516
    public void authObj(Object authObj) {
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   517
        this.authObj = authObj;
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   518
    }
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
   519
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   520
    @Override
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   521
    public void setAuthenticator(Authenticator auth) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   522
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   523
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   524
            if (connecting || connected) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   525
                throw new IllegalStateException(
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   526
                        "Authenticator must be set before connecting");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   527
            }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   528
            authenticator = Objects.requireNonNull(auth);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   529
            authenticatorKey = AuthenticatorKeys.getKey(authenticator);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   530
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   531
            connectionLock.unlock();
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   532
        }
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   533
    }
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   534
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   535
    public String getAuthenticatorKey() {
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   536
        String k = authenticatorKey;
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   537
        if (k == null) return AuthenticatorKeys.getKey(authenticator);
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   538
        return k;
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   539
    }
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   540
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   541
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
     * checks the validity of http message header and throws
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
     * IllegalArgumentException if invalid.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
    private void checkMessageHeader(String key, String value) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
        char LF = '\n';
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
        int index = key.indexOf(LF);
33292
4d2290a6ce1f 8130193: Improve HTTP connections
michaelm
parents: 32834
diff changeset
   548
        int index1 = key.indexOf(':');
4d2290a6ce1f 8130193: Improve HTTP connections
michaelm
parents: 32834
diff changeset
   549
        if (index != -1 || index1 != -1) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
            throw new IllegalArgumentException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
                "Illegal character(s) in message header field: " + key);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
        else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
            if (value == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
                return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
            index = value.indexOf(LF);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
            while (index != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
                index++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
                if (index < value.length()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
                    char c = value.charAt(index);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
                    if ((c==' ') || (c=='\t')) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
                        // ok, check the next occurrence
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
                        index = value.indexOf(LF, index);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
                        continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
                throw new IllegalArgumentException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
                    "Illegal character(s) in message header value: " + value);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   575
    public void setRequestMethod(String method)
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   576
                        throws ProtocolException {
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   577
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   578
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   579
            if (connecting) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   580
                throw new IllegalStateException("connect in progress");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   581
            }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   582
            super.setRequestMethod(method);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   583
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   584
            connectionLock.unlock();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   585
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   586
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   587
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
    /* adds the standard key/val pairs to reqests if necessary & write to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   589
     * given PrintStream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
    private void writeRequests() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
        /* print all message headers in the MessageHeader
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
         * onto the wire - all the ones we've set and any
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
         * others that have been set
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
        // send any pre-emptive authentication
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
   597
        if (http.usingProxy && tunnelState() != TunnelState.TUNNELING) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
            setPreemptiveProxyAuthentication(requests);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   600
        if (!setRequests) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   601
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
            /* We're very particular about the order in which we
90ce3da70b43 Initial load
duke
parents:
diff changeset
   603
             * set the request headers here.  The order should not
90ce3da70b43 Initial load
duke
parents:
diff changeset
   604
             * matter, but some careless CGI programs have been
90ce3da70b43 Initial load
duke
parents:
diff changeset
   605
             * written to expect a very particular order of the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   606
             * standard headers.  To name names, the order in which
90ce3da70b43 Initial load
duke
parents:
diff changeset
   607
             * Navigator3.0 sends them.  In particular, we make *sure*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   608
             * to send Content-type: <> and Content-length:<> second
90ce3da70b43 Initial load
duke
parents:
diff changeset
   609
             * to last and last, respectively, in the case of a POST
90ce3da70b43 Initial load
duke
parents:
diff changeset
   610
             * request.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   611
             */
22348
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   612
            if (!failedOnce) {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   613
                checkURLFile();
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
   614
                requests.prepend(method + " " + getRequestURI()+" "  +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   615
                                 httpVersion, null);
22348
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   616
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   617
            if (!getUseCaches()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   618
                requests.setIfNotSet ("Cache-Control", "no-cache");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   619
                requests.setIfNotSet ("Pragma", "no-cache");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
            requests.setIfNotSet("User-Agent", userAgent);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
            int port = url.getPort();
24869
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
   623
            String host = stripIPv6ZoneId(url.getHost());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
            if (port != -1 && port != url.getDefaultPort()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
                host += ":" + String.valueOf(port);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
            }
22348
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   627
            String reqHost = requests.findValue("Host");
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   628
            if (reqHost == null ||
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   629
                (!reqHost.equalsIgnoreCase(host) && !checkSetHost()))
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   630
            {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   631
                requests.set("Host", host);
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   632
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   633
            requests.setIfNotSet("Accept", acceptString);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
90ce3da70b43 Initial load
duke
parents:
diff changeset
   635
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   636
             * For HTTP/1.1 the default behavior is to keep connections alive.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
             * However, we may be talking to a 1.0 server so we should set
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
             * keep-alive just in case, except if we have encountered an error
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
             * or if keep alive is disabled via a system property
90ce3da70b43 Initial load
duke
parents:
diff changeset
   640
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   641
90ce3da70b43 Initial load
duke
parents:
diff changeset
   642
            // Try keep-alive only on first attempt
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
            if (!failedOnce && http.getHttpKeepAliveSet()) {
4923
cd2829ef32e2 6365587: Proxy-Connection header sent through tunnel
chegar
parents: 4158
diff changeset
   644
                if (http.usingProxy && tunnelState() != TunnelState.TUNNELING) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   645
                    requests.setIfNotSet("Proxy-Connection", "keep-alive");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   646
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
                    requests.setIfNotSet("Connection", "keep-alive");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   648
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
                /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
                 * RFC 2616 HTTP/1.1 section 14.10 says:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
                 * HTTP/1.1 applications that do not support persistent
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
                 * connections MUST include the "close" connection option
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
                 * in every message
90ce3da70b43 Initial load
duke
parents:
diff changeset
   655
                 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   656
                requests.setIfNotSet("Connection", "close");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   657
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   658
            // Set modified since if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
   659
            long modTime = getIfModifiedSince();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   660
            if (modTime != 0 ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   661
                Date date = new Date(modTime);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   662
                //use the preferred date format according to RFC 2068(HTTP1.1),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
                // RFC 822 and RFC 1123
90ce3da70b43 Initial load
duke
parents:
diff changeset
   664
                SimpleDateFormat fo =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   665
                  new SimpleDateFormat ("EEE, dd MMM yyyy HH:mm:ss 'GMT'", Locale.US);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   666
                fo.setTimeZone(TimeZone.getTimeZone("GMT"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   667
                requests.setIfNotSet("If-Modified-Since", fo.format(date));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   668
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   669
            // check for preemptive authorization
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   670
            AuthenticationInfo sauth = AuthenticationInfo.getServerAuth(url,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   671
                                             getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   672
            if (sauth != null && sauth.supportsPreemptiveAuthorization() ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   673
                // Sets "Authorization"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
                requests.setIfNotSet(sauth.getHeaderName(), sauth.getHeaderValue(url,method));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   675
                currentServerCredentials = sauth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   677
90ce3da70b43 Initial load
duke
parents:
diff changeset
   678
            if (!method.equals("PUT") && (poster != null || streaming())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
                requests.setIfNotSet ("Content-type",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
                        "application/x-www-form-urlencoded");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
6873
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   683
            boolean chunked = false;
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   684
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
            if (streaming()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
                if (chunkLength != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
                    requests.set ("Transfer-Encoding", "chunked");
6873
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   688
                    chunked = true;
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   689
                } else { /* fixed content length */
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   690
                    if (fixedContentLengthLong != -1) {
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   691
                        requests.set ("Content-Length",
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   692
                                      String.valueOf(fixedContentLengthLong));
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   693
                    } else if (fixedContentLength != -1) {
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   694
                        requests.set ("Content-Length",
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   695
                                      String.valueOf(fixedContentLength));
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
   696
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   697
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   698
            } else if (poster != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   699
                /* add Content-Length & POST/PUT data */
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   700
                // safe to synchronize on poster: this is
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
   701
                // a simple subclass of ByteArrayOutputStream
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   702
                synchronized (poster) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   703
                    /* close it, so no more data can be added */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
                    poster.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   705
                    requests.set("Content-Length",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   706
                                 String.valueOf(poster.size()));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   707
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   708
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   709
6873
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   710
            if (!chunked) {
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   711
                if (requests.findValue("Transfer-Encoding") != null) {
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   712
                    requests.remove("Transfer-Encoding");
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
   713
                    if (logger.isLoggable(PlatformLogger.Level.WARNING)) {
6873
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   714
                        logger.warning(
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   715
                            "use streaming mode for chunked encoding");
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   716
                    }
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   717
                }
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   718
            }
7fe1f614001e 6952017: HttpURLConnection chunked encoding issue (Http request splitting)
michaelm
parents: 5979
diff changeset
   719
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
            // get applicable cookies based on the uri and request headers
90ce3da70b43 Initial load
duke
parents:
diff changeset
   721
            // add them to the existing request headers
90ce3da70b43 Initial load
duke
parents:
diff changeset
   722
            setCookieHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   723
90ce3da70b43 Initial load
duke
parents:
diff changeset
   724
            setRequests=true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   725
        }
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
   726
        if (logger.isLoggable(PlatformLogger.Level.FINE)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
   727
            logger.fine(requests.toString());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   728
        }
6673
3674dbc66612 6672144: HttpURLConnection.getInputStream sends POST request after failed chunked
chegar
parents: 6292
diff changeset
   729
        http.writeRequests(requests, poster, streaming());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   730
        if (ps.checkError()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   731
            String proxyHost = http.getProxyHostUsed();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   732
            int proxyPort = http.getProxyPortUsed();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   733
            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   734
            if (failedOnce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   735
                throw new IOException("Error writing to server");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   736
            } else { // try once more
90ce3da70b43 Initial load
duke
parents:
diff changeset
   737
                failedOnce=true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   738
                if (proxyHost != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   739
                    setProxiedClient(url, proxyHost, proxyPort);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   740
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   741
                    setNewClient (url);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   742
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   743
                ps = (PrintStream) http.getOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   744
                connected=true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   745
                responses = new MessageHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   746
                setRequests=false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   747
                writeRequests();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   748
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   749
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   751
22348
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   752
    private boolean checkSetHost() {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   753
        SecurityManager s = System.getSecurityManager();
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   754
        if (s != null) {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   755
            String name = s.getClass().getName();
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   756
            if (name.equals("sun.plugin2.applet.AWTAppletSecurityManager") ||
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   757
                name.equals("sun.plugin2.applet.FXAppletSecurityManager") ||
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   758
                name.equals("com.sun.javaws.security.JavaWebStartSecurity") ||
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   759
                name.equals("sun.plugin.security.ActivatorSecurityManager"))
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   760
            {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   761
                int CHECK_SET_HOST = -2;
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   762
                try {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   763
                    s.checkConnect(url.toExternalForm(), CHECK_SET_HOST);
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   764
                } catch (SecurityException ex) {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   765
                    return false;
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   766
                }
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   767
            }
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   768
        }
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   769
        return true;
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   770
    }
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   771
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   772
    private void checkURLFile() {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   773
        SecurityManager s = System.getSecurityManager();
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   774
        if (s != null) {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   775
            String name = s.getClass().getName();
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   776
            if (name.equals("sun.plugin2.applet.AWTAppletSecurityManager") ||
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   777
                name.equals("sun.plugin2.applet.FXAppletSecurityManager") ||
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   778
                name.equals("com.sun.javaws.security.JavaWebStartSecurity") ||
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   779
                name.equals("sun.plugin.security.ActivatorSecurityManager"))
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   780
            {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   781
                int CHECK_SUBPATH = -3;
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   782
                try {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   783
                    s.checkConnect(url.toExternalForm(), CHECK_SUBPATH);
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   784
                } catch (SecurityException ex) {
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   785
                    throw new SecurityException("denied access outside a permitted URL subpath", ex);
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   786
                }
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   787
            }
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   788
        }
8e8c84d9535f 8004562: Better support for crossdomain.xml
nikgor
parents: 21952
diff changeset
   789
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   790
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
     * Create a new HttpClient object, bypassing the cache of
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
     * HTTP client objects/connections.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   794
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   795
     * @param url       the URL being accessed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
    protected void setNewClient (URL url)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
    throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   799
        setNewClient(url, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   800
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   801
90ce3da70b43 Initial load
duke
parents:
diff changeset
   802
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   803
     * Obtain a HttpsClient object. Use the cached copy if specified.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
     * @param url       the URL being accessed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   806
     * @param useCache  whether the cached connection should be used
90ce3da70b43 Initial load
duke
parents:
diff changeset
   807
     *        if present
90ce3da70b43 Initial load
duke
parents:
diff changeset
   808
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   809
    protected void setNewClient (URL url, boolean useCache)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   810
        throws IOException {
14007
2fde9d6d874a 7199862: Make sure that a connection is still alive when retrieved from KeepAliveCache in certain cases
robm
parents: 11839
diff changeset
   811
        http = HttpClient.New(url, null, -1, useCache, connectTimeout, this);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   812
        http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   813
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   814
90ce3da70b43 Initial load
duke
parents:
diff changeset
   815
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
     * Create a new HttpClient object, set up so that it uses
90ce3da70b43 Initial load
duke
parents:
diff changeset
   818
     * per-instance proxying to the given HTTP proxy.  This
90ce3da70b43 Initial load
duke
parents:
diff changeset
   819
     * bypasses the cache of HTTP client objects/connections.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
     * @param url       the URL being accessed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
     * @param proxyHost the proxy host to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   823
     * @param proxyPort the proxy port to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   825
    protected void setProxiedClient (URL url, String proxyHost, int proxyPort)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   826
    throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   827
        setProxiedClient(url, proxyHost, proxyPort, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   828
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   829
90ce3da70b43 Initial load
duke
parents:
diff changeset
   830
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   831
     * Obtain a HttpClient object, set up so that it uses per-instance
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
     * proxying to the given HTTP proxy. Use the cached copy of HTTP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
     * client objects/connections if specified.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   835
     * @param url       the URL being accessed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   836
     * @param proxyHost the proxy host to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   837
     * @param proxyPort the proxy port to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   838
     * @param useCache  whether the cached connection should be used
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
     *        if present
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
    protected void setProxiedClient (URL url,
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   842
                                     String proxyHost, int proxyPort,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   843
                                     boolean useCache)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
        throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
        proxiedConnect(url, proxyHost, proxyPort, useCache);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   847
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
    protected void proxiedConnect(URL url,
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   849
                                  String proxyHost, int proxyPort,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   850
                                  boolean useCache)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
        throws IOException {
14007
2fde9d6d874a 7199862: Make sure that a connection is still alive when retrieved from KeepAliveCache in certain cases
robm
parents: 11839
diff changeset
   852
        http = HttpClient.New (url, proxyHost, proxyPort, useCache,
2fde9d6d874a 7199862: Make sure that a connection is still alive when retrieved from KeepAliveCache in certain cases
robm
parents: 11839
diff changeset
   853
            connectTimeout, this);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
        http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
    protected HttpURLConnection(URL u, Handler handler)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   858
    throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   859
        // we set proxy == null to distinguish this case with the case
90ce3da70b43 Initial load
duke
parents:
diff changeset
   860
        // when per connection proxy is set
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
        this(u, null, handler);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
47411
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   864
    private static String checkHost(String h) throws IOException {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   865
        if (h != null) {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   866
            if (h.indexOf('\n') > -1) {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   867
                throw new MalformedURLException("Illegal character in host");
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   868
            }
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   869
        }
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   870
        return h;
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   871
    }
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   872
    public HttpURLConnection(URL u, String host, int port) throws IOException {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   873
        this(u, new Proxy(Proxy.Type.HTTP,
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   874
                InetSocketAddress.createUnresolved(checkHost(host), port)));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
    /** this constructor is used by other protocol handlers such as ftp
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
        that want to use http to fetch urls on their behalf.*/
47411
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   879
    public HttpURLConnection(URL u, Proxy p) throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   880
        this(u, p, new Handler());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   881
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   882
47411
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   883
    private static URL checkURL(URL u) throws IOException {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   884
        if (u != null) {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   885
            if (u.toExternalForm().indexOf('\n') > -1) {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   886
                throw new MalformedURLException("Illegal character in URL");
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   887
            }
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   888
        }
55711
0c143aaa2c99 8221518: Normalize normalization
dfuchs
parents: 53018
diff changeset
   889
        String s = IPAddressUtil.checkAuthority(u);
0c143aaa2c99 8221518: Normalize normalization
dfuchs
parents: 53018
diff changeset
   890
        if (s != null) {
0c143aaa2c99 8221518: Normalize normalization
dfuchs
parents: 53018
diff changeset
   891
            throw new MalformedURLException(s);
0c143aaa2c99 8221518: Normalize normalization
dfuchs
parents: 53018
diff changeset
   892
        }
47411
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   893
        return u;
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   894
    }
55711
0c143aaa2c99 8221518: Normalize normalization
dfuchs
parents: 53018
diff changeset
   895
47411
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   896
    protected HttpURLConnection(URL u, Proxy p, Handler handler)
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   897
            throws IOException {
45a84b0b59b9 8176751: Better URL connections
dfuchs
parents: 47216
diff changeset
   898
        super(checkURL(u));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   899
        requests = new MessageHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   900
        responses = new MessageHeader();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
   901
        userHeaders = new MessageHeader();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   902
        this.handler = handler;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   903
        instProxy = p;
3450
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   904
        if (instProxy instanceof sun.net.ApplicationProxy) {
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   905
            /* Application set Proxies should not have access to cookies
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   906
             * in a secure environment unless explicitly allowed. */
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   907
            try {
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   908
                cookieHandler = CookieHandler.getDefault();
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   909
            } catch (SecurityException se) { /* swallow exception */ }
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   910
        } else {
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   911
            cookieHandler = java.security.AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
   912
                new java.security.PrivilegedAction<>() {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
   913
                public CookieHandler run() {
3450
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   914
                    return CookieHandler.getDefault();
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   915
                }
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   916
            });
2f08a8bb9b83 6801071: Remote sites can compromise user privacy and possibly hijack web sessions
chegar
parents: 1576
diff changeset
   917
        }
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
   918
        cacheHandler = java.security.AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
   919
            new java.security.PrivilegedAction<>() {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
   920
                public ResponseCache run() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   921
                return ResponseCache.getDefault();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   922
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   923
        });
90ce3da70b43 Initial load
duke
parents:
diff changeset
   924
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   925
90ce3da70b43 Initial load
duke
parents:
diff changeset
   926
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   927
     * @deprecated.  Use java.net.Authenticator.setDefault() instead.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   928
     */
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
   929
    @Deprecated
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   930
    public static void setDefaultAuthenticator(HttpAuthenticator a) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
        defaultAuth = a;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   932
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
     * opens a stream allowing redirects only to the same host.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
    public static InputStream openConnectionCheckRedirects(URLConnection c)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   938
        throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
        boolean redir;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   941
        int redirects = 0;
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
   942
        InputStream in;
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   943
        Authenticator a = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
        do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   946
            if (c instanceof HttpURLConnection) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   947
                ((HttpURLConnection) c).setInstanceFollowRedirects(false);
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   948
                if (a == null) {
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   949
                    a = ((HttpURLConnection) c).authenticator;
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   950
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   951
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
            // We want to open the input stream before
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
            // getting headers, because getHeaderField()
90ce3da70b43 Initial load
duke
parents:
diff changeset
   955
            // et al swallow IOExceptions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   956
            in = c.getInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   957
            redir = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
90ce3da70b43 Initial load
duke
parents:
diff changeset
   959
            if (c instanceof HttpURLConnection) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   960
                HttpURLConnection http = (HttpURLConnection) c;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
                int stat = http.getResponseCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   962
                if (stat >= 300 && stat <= 307 && stat != 306 &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   963
                        stat != HttpURLConnection.HTTP_NOT_MODIFIED) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   964
                    URL base = http.getURL();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   965
                    String loc = http.getHeaderField("Location");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
                    URL target = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   967
                    if (loc != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   968
                        target = new URL(base, loc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   969
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   970
                    http.disconnect();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   971
                    if (target == null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   972
                        || !base.getProtocol().equals(target.getProtocol())
90ce3da70b43 Initial load
duke
parents:
diff changeset
   973
                        || base.getPort() != target.getPort()
90ce3da70b43 Initial load
duke
parents:
diff changeset
   974
                        || !hostsEqual(base, target)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   975
                        || redirects >= 5)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   976
                    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   977
                        throw new SecurityException("illegal URL redirect");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   978
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   979
                    redir = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   980
                    c = target.openConnection();
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   981
                    if (a != null && c instanceof HttpURLConnection) {
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   982
                        ((HttpURLConnection)c).setAuthenticator(a);
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
   983
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   984
                    redirects++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   985
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   986
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   987
        } while (redir);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   988
        return in;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   989
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   990
90ce3da70b43 Initial load
duke
parents:
diff changeset
   991
90ce3da70b43 Initial load
duke
parents:
diff changeset
   992
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   993
    // Same as java.net.URL.hostsEqual
90ce3da70b43 Initial load
duke
parents:
diff changeset
   994
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
   995
    private static boolean hostsEqual(URL u1, URL u2) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   996
        final String h1 = u1.getHost();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   997
        final String h2 = u2.getHost();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   998
90ce3da70b43 Initial load
duke
parents:
diff changeset
   999
        if (h1 == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1000
            return h2 == null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1001
        } else if (h2 == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1002
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1003
        } else if (h1.equalsIgnoreCase(h2)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1004
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1005
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1006
        // Have to resolve addresses before comparing, otherwise
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1007
        // names like tachyon and tachyon.eng would compare different
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1008
        final boolean result[] = {false};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1009
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1010
        java.security.AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
  1011
            new java.security.PrivilegedAction<>() {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1012
                public Void run() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1013
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1014
                    InetAddress a1 = InetAddress.getByName(h1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1015
                    InetAddress a2 = InetAddress.getByName(h2);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1016
                    result[0] = a1.equals(a2);
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  1017
                } catch(UnknownHostException | SecurityException e) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1018
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1019
                return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1020
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1021
        });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1022
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1023
        return result[0];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1024
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1025
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1026
    // overridden in HTTPS subclass
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1027
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1028
    public void connect() throws IOException {
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1029
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1030
        try {
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1031
            connecting = true;
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1032
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1033
            connectionLock.unlock();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1034
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
        plainConnect();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1038
    private boolean checkReuseConnection () {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1039
        if (connected) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1040
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1041
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1042
        if (reuseClient != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1043
            http = reuseClient;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1044
            http.setReadTimeout(getReadTimeout());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1045
            http.reuse = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1046
            reuseClient = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1047
            connected = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1048
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1049
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1050
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1051
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1052
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1053
    private String getHostAndPort(URL url) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1054
        String host = url.getHost();
21344
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1055
        final String hostarg = host;
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1056
        try {
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1057
            // lookup hostname and use IP address if available
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1058
            host = AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
  1059
                new PrivilegedExceptionAction<>() {
21344
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1060
                    public String run() throws IOException {
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1061
                            InetAddress addr = InetAddress.getByName(hostarg);
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1062
                            return addr.getHostAddress();
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1063
                    }
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1064
                }
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1065
            );
13091b742137 8025734: Use literal IP address where possible in SocketPermission generated by HttpURLPermission
michaelm
parents: 20787
diff changeset
  1066
        } catch (PrivilegedActionException e) {}
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1067
        int port = url.getPort();
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1068
        if (port == -1) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1069
            String scheme = url.getProtocol();
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1070
            if ("http".equals(scheme)) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1071
                return host + ":80";
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1072
            } else { // scheme must be https
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1073
                return host + ":443";
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1074
            }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1075
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1076
        return host + ":" + Integer.toString(port);
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1077
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1078
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1079
    protected void plainConnect()  throws IOException {
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1080
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1081
        try {
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1082
            if (connected) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1083
                return;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1084
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1085
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1086
            connectionLock.unlock();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1087
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1088
        SocketPermission p = URLtoSocketPermission(this.url);
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1089
        if (p != null) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1090
            try {
30685
5806d3adbd6b 8077155: LoginContext Subject ignored by jdk8 sun.net.www.protocol.http.HttpURLConnection
robm
parents: 29986
diff changeset
  1091
                AccessController.doPrivilegedWithCombiner(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
  1092
                    new PrivilegedExceptionAction<>() {
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1093
                        public Void run() throws IOException {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1094
                            plainConnect0();
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1095
                            return null;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1096
                        }
20787
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
  1097
                    }, null, p
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1098
                );
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1099
            } catch (PrivilegedActionException e) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1100
                    throw (IOException) e.getException();
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1101
            }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1102
        } else {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1103
            // run without additional permission
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1104
            plainConnect0();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1105
        }
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1106
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1107
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1108
    /**
20787
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
  1109
     *  if the caller has a URLPermission for connecting to the
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1110
     *  given URL, then return a SocketPermission which permits
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1111
     *  access to that destination. Return null otherwise. The permission
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1112
     *  is cached in a field (which can only be changed by redirects)
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1113
     */
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1114
    SocketPermission URLtoSocketPermission(URL url) throws IOException {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1115
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1116
        if (socketPermission != null) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1117
            return socketPermission;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1118
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1119
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1120
        SecurityManager sm = System.getSecurityManager();
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1121
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1122
        if (sm == null) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1123
            return null;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1124
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1125
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1126
        // the permission, which we might grant
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1127
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1128
        SocketPermission newPerm = new SocketPermission(
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1129
            getHostAndPort(url), "connect"
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1130
        );
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1131
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1132
        String actions = getRequestMethod()+":" +
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1133
                getUserSetHeaders().getHeaderNamesInList();
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1134
20787
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
  1135
        String urlstring = url.getProtocol() + "://" + url.getAuthority()
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
  1136
                + url.getPath();
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
  1137
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
  1138
        URLPermission p = new URLPermission(urlstring, actions);
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1139
        try {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1140
            sm.checkPermission(p);
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1141
            socketPermission = newPerm;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1142
            return socketPermission;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1143
        } catch (SecurityException e) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1144
            // fall thru
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1145
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1146
        return null;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1147
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1148
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1149
    protected void plainConnect0()  throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
        // try to see if request can be served from local cache
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1151
        if (cacheHandler != null && getUseCaches()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1152
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1153
                URI uri = ParseUtil.toURI(url);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1154
                if (uri != null) {
27177
3717db2c3bfe 8042622: Check for CRL results in IllegalArgumentException "white space not allowed"
michaelm
parents: 26219
diff changeset
  1155
                    cachedResponse = cacheHandler.get(uri, getRequestMethod(), getUserSetHeaders().getHeaders());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
                    if ("https".equalsIgnoreCase(uri.getScheme())
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
                        && !(cachedResponse instanceof SecureCacheResponse)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
                        cachedResponse = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
                    }
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  1160
                    if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  1161
                        logger.finest("Cache Request for " + uri + " / " + getRequestMethod());
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  1162
                        logger.finest("From cache: " + (cachedResponse != null ? cachedResponse.toString() : "null"));
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1163
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1164
                    if (cachedResponse != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
                        cachedHeaders = mapToMessageHeader(cachedResponse.getHeaders());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
                        cachedInputStream = cachedResponse.getBody();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1167
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1168
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
            } catch (IOException ioex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1170
                // ignore and commence normal connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1171
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1172
            if (cachedHeaders != null && cachedInputStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1173
                connected = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1174
                return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1175
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1176
                cachedResponse = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1177
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1178
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1179
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1180
            /* Try to open connections using the following scheme,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1181
             * return on the first one that's successful:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1182
             * 1) if (instProxy != null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1183
             *        connect to instProxy; raise exception if failed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1184
             * 2) else use system default ProxySelector
40737
9b5eee5d7a26 8161016: Strange behavior of URLConnection with proxy
rpatil
parents: 37781
diff changeset
  1185
             * 3) else make a direct connection if ProxySelector is not present
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1187
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
            if (instProxy == null) { // no instance Proxy is set
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
                /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1190
                 * Do we have to use a proxy?
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1191
                 */
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1192
                ProxySelector sel =
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
                    java.security.AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
  1194
                        new java.security.PrivilegedAction<>() {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1195
                            public ProxySelector run() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1196
                                     return ProxySelector.getDefault();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
                                 }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
                             });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1199
                if (sel != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1200
                    URI uri = sun.net.www.ParseUtil.toURI(url);
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  1201
                    if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  1202
                        logger.finest("ProxySelector Request for " + uri);
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1203
                    }
57879
095c2f21dd10 8177648: getResponseCode() throws IllegalArgumentException caused by protocol error while following redirect
michaelm
parents: 57838
diff changeset
  1204
                    final List<Proxy> proxies;
095c2f21dd10 8177648: getResponseCode() throws IllegalArgumentException caused by protocol error while following redirect
michaelm
parents: 57838
diff changeset
  1205
                    try {
095c2f21dd10 8177648: getResponseCode() throws IllegalArgumentException caused by protocol error while following redirect
michaelm
parents: 57838
diff changeset
  1206
                        proxies = sel.select(uri);
095c2f21dd10 8177648: getResponseCode() throws IllegalArgumentException caused by protocol error while following redirect
michaelm
parents: 57838
diff changeset
  1207
                    } catch (IllegalArgumentException iae) {
095c2f21dd10 8177648: getResponseCode() throws IllegalArgumentException caused by protocol error while following redirect
michaelm
parents: 57838
diff changeset
  1208
                        throw new IOException("Failed to select a proxy", iae);
095c2f21dd10 8177648: getResponseCode() throws IllegalArgumentException caused by protocol error while following redirect
michaelm
parents: 57838
diff changeset
  1209
                    }
095c2f21dd10 8177648: getResponseCode() throws IllegalArgumentException caused by protocol error while following redirect
michaelm
parents: 57838
diff changeset
  1210
                    final Iterator<Proxy> it = proxies.iterator();
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1211
                    Proxy p;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1212
                    while (it.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
                        p = it.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1214
                        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
                            if (!failedOnce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
                                http = getNewHttpClient(url, p, connectTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
                                http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
                            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
                                // make sure to construct new connection if first
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
                                // attempt failed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
                                http = getNewHttpClient(url, p, connectTimeout, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
                                http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
                            }
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  1224
                            if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1225
                                if (p != null) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  1226
                                    logger.finest("Proxy used: " + p.toString());
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1227
                                }
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1228
                            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1230
                        } catch (IOException ioex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1231
                            if (p != Proxy.NO_PROXY) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
                                sel.connectFailed(uri, p.address(), ioex);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
                                if (!it.hasNext()) {
40737
9b5eee5d7a26 8161016: Strange behavior of URLConnection with proxy
rpatil
parents: 37781
diff changeset
  1234
                                    throw ioex;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1235
                                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
                            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1237
                                throw ioex;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
                            continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1242
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
                    // No proxy selector, create http client with no proxy
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1244
                    if (!failedOnce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1245
                        http = getNewHttpClient(url, null, connectTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1246
                        http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1247
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1248
                        // make sure to construct new connection if first
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
                        // attempt failed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1250
                        http = getNewHttpClient(url, null, connectTimeout, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1251
                        http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
                if (!failedOnce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
                    http = getNewHttpClient(url, instProxy, connectTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
                    http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
                    // make sure to construct new connection if first
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
                    // attempt failed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
                    http = getNewHttpClient(url, instProxy, connectTimeout, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
                    http.setReadTimeout(readTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
            ps = (PrintStream)http.getOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
            throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1269
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1270
        // constructor to HTTP client calls openserver
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
        connected = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
    // subclass HttpsClient will overwrite & return an instance of HttpsClient
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
    protected HttpClient getNewHttpClient(URL url, Proxy p, int connectTimeout)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
        throws IOException {
14007
2fde9d6d874a 7199862: Make sure that a connection is still alive when retrieved from KeepAliveCache in certain cases
robm
parents: 11839
diff changeset
  1277
        return HttpClient.New(url, p, connectTimeout, this);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1279
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1280
    // subclass HttpsClient will overwrite & return an instance of HttpsClient
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1281
    protected HttpClient getNewHttpClient(URL url, Proxy p,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1282
                                          int connectTimeout, boolean useCache)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1283
        throws IOException {
14007
2fde9d6d874a 7199862: Make sure that a connection is still alive when retrieved from KeepAliveCache in certain cases
robm
parents: 11839
diff changeset
  1284
        return HttpClient.New(url, p, connectTimeout, useCache, this);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1285
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1286
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1287
    private void expect100Continue() throws IOException {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1288
            // Expect: 100-Continue was set, so check the return code for
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1289
            // Acceptance
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1290
            int oldTimeout = http.getReadTimeout();
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1291
            boolean enforceTimeOut = false;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1292
            boolean timedOut = false;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1293
            if (oldTimeout <= 0) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1294
                // 5s read timeout in case the server doesn't understand
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1295
                // Expect: 100-Continue
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1296
                http.setReadTimeout(5000);
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1297
                enforceTimeOut = true;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1298
            }
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1299
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1300
            try {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1301
                http.parseHTTP(responses, pi, this);
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1302
            } catch (SocketTimeoutException se) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1303
                if (!enforceTimeOut) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1304
                    throw se;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1305
                }
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1306
                timedOut = true;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1307
                http.setIgnoreContinue(true);
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1308
            }
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1309
            if (!timedOut) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1310
                // Can't use getResponseCode() yet
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1311
                String resp = responses.getValue(0);
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1312
                // Parse the response which is of the form:
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1313
                // HTTP/1.1 417 Expectation Failed
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1314
                // HTTP/1.1 100 Continue
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1315
                if (resp != null && resp.startsWith("HTTP/")) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1316
                    String[] sa = resp.split("\\s+");
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1317
                    responseCode = -1;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1318
                    try {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1319
                        // Response code is 2nd token on the line
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1320
                        if (sa.length > 1)
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1321
                            responseCode = Integer.parseInt(sa[1]);
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1322
                    } catch (NumberFormatException numberFormatException) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1323
                    }
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1324
                }
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1325
                if (responseCode != 100) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1326
                    throw new ProtocolException("Server rejected operation");
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1327
                }
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1328
            }
7022
1066bfde0f5e 6993490: SocketTimeoutException on HTTP keep-alive connections
chegar
parents: 6879
diff changeset
  1329
1066bfde0f5e 6993490: SocketTimeoutException on HTTP keep-alive connections
chegar
parents: 6879
diff changeset
  1330
            http.setReadTimeout(oldTimeout);
1066bfde0f5e 6993490: SocketTimeoutException on HTTP keep-alive connections
chegar
parents: 6879
diff changeset
  1331
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1332
            responseCode = -1;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1333
            responses.reset();
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1334
            // Proceed
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1335
    }
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1336
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1338
     * Allowable input/output sequences:
18541
a974731db859 7157360: HttpURLConnection: HTTP method DELETE doesn't support output
arieber
parents: 18178
diff changeset
  1339
     * [interpreted as request entity]
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1340
     * - get output, [write output,] get input, [read input]
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1341
     * - get output, [write output]
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1342
     * [interpreted as GET]
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1343
     * - get input, [read input]
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1344
     * Disallowed:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1345
     * - get input, [read input,] get output, [write output]
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1346
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1347
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  1348
    @Override
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1349
    public OutputStream getOutputStream() throws IOException {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1350
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1351
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1352
            connecting = true;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1353
            SocketPermission p = URLtoSocketPermission(this.url);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1354
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1355
            if (p != null) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1356
                try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1357
                    return AccessController.doPrivilegedWithCombiner(
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1358
                            new PrivilegedExceptionAction<>() {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1359
                                public OutputStream run() throws IOException {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1360
                                    return getOutputStream0();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1361
                                }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1362
                            }, null, p
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1363
                    );
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1364
                } catch (PrivilegedActionException e) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1365
                    throw (IOException) e.getException();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1366
                }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1367
            } else {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1368
                return getOutputStream0();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1369
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1370
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1371
            connectionLock.unlock();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1372
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1373
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1374
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1375
    private OutputStream getOutputStream0() throws IOException {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1376
        assert connectionLock.isHeldByCurrentThread();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1377
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1378
            if (!doOutput) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1379
                throw new ProtocolException("cannot write to a URLConnection"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1380
                               + " if doOutput=false - call setDoOutput(true)");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1381
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1382
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1383
            if (method.equals("GET")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1384
                method = "POST"; // Backward compatibility
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1385
            }
18541
a974731db859 7157360: HttpURLConnection: HTTP method DELETE doesn't support output
arieber
parents: 18178
diff changeset
  1386
            if ("TRACE".equals(method) && "http".equals(url.getProtocol())) {
a974731db859 7157360: HttpURLConnection: HTTP method DELETE doesn't support output
arieber
parents: 18178
diff changeset
  1387
                throw new ProtocolException("HTTP method TRACE" +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1388
                                            " doesn't support output");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1389
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1390
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1391
            // if there's already an input stream open, throw an exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1392
            if (inputStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1393
                throw new ProtocolException("Cannot write output after reading input.");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1394
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1395
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1396
            if (!checkReuseConnection())
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1397
                connect();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1398
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1399
            boolean expectContinue = false;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1400
            String expects = requests.findValue("Expect");
17485
feb8cd6a4c7d 8012625: Incorrect handling of HTTP/1.1 " Expect: 100-continue " in HttpURLConnection
michaelm
parents: 17473
diff changeset
  1401
            if ("100-Continue".equalsIgnoreCase(expects) && streaming()) {
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1402
                http.setIgnoreContinue(false);
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1403
                expectContinue = true;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1404
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1405
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1406
            if (streaming() && strOutputStream == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1407
                writeRequests();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
            }
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1409
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1410
            if (expectContinue) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1411
                expect100Continue();
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1412
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
            ps = (PrintStream)http.getOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
            if (streaming()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
                if (strOutputStream == null) {
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1416
                    if (chunkLength != -1) { /* chunked */
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1417
                         strOutputStream = new StreamingOutputStream(
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1418
                               new ChunkedOutputStream(ps, chunkLength), -1L);
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1419
                    } else { /* must be fixed content length */
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1420
                        long length = 0L;
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1421
                        if (fixedContentLengthLong != -1) {
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1422
                            length = fixedContentLengthLong;
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1423
                        } else if (fixedContentLength != -1) {
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1424
                            length = fixedContentLength;
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1425
                        }
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1426
                        strOutputStream = new StreamingOutputStream(ps, length);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1427
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1428
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1429
                return strOutputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1430
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1431
                if (poster == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
                    poster = new PosterOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1434
                return poster;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1435
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1436
        } catch (RuntimeException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1438
            throw e;
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1439
        } catch (ProtocolException e) {
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1440
            // Save the response code which may have been set while enforcing
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1441
            // the 100-continue. disconnectInternal() forces it to -1
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1442
            int i = responseCode;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1443
            disconnectInternal();
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1444
            responseCode = i;
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  1445
            throw e;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1446
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1447
            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1448
            throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1449
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1450
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1451
14007
2fde9d6d874a 7199862: Make sure that a connection is still alive when retrieved from KeepAliveCache in certain cases
robm
parents: 11839
diff changeset
  1452
    public boolean streaming () {
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1453
        return (fixedContentLength != -1) || (fixedContentLengthLong != -1) ||
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  1454
               (chunkLength != -1);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1455
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1456
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1457
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1458
     * get applicable cookies based on the uri and request headers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1459
     * add them to the existing request headers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1460
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1461
    private void setCookieHeader() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1462
        if (cookieHandler != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1463
            // we only want to capture the user defined Cookies once, as
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1464
            // they cannot be changed by user code after we are connected,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1465
            // only internally.
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1466
        if (setUserCookies) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1467
            // we should only reach here when called from
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1468
            // writeRequest, which in turn is only called by
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1469
            // getInputStream0
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1470
            assert connectionLock.isHeldByCurrentThread();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1471
            int k = requests.getKey("Cookie");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1472
            if (k != -1)
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1473
                userCookies = requests.getValue(k);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1474
            k = requests.getKey("Cookie2");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1475
            if (k != -1)
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1476
                userCookies2 = requests.getValue(k);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1477
            setUserCookies = false;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1478
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1480
            // remove old Cookie header before setting new one.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
            requests.remove("Cookie");
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  1482
            requests.remove("Cookie2");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
            URI uri = ParseUtil.toURI(url);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1485
            if (uri != null) {
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  1486
                if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  1487
                    logger.finest("CookieHandler request for " + uri);
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1488
                }
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1489
                Map<String, List<String>> cookies
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1490
                    = cookieHandler.get(
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1491
                        uri, requests.getHeaders(EXCLUDE_HEADERS));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
                if (!cookies.isEmpty()) {
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  1493
                    if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  1494
                        logger.finest("Cookies retrieved: " + cookies.toString());
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  1495
                    }
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1496
                    for (Map.Entry<String, List<String>> entry :
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1497
                             cookies.entrySet()) {
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1498
                        String key = entry.getKey();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1499
                        // ignore all entries that don't have "Cookie"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
                        // or "Cookie2" as keys
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
                        if (!"Cookie".equalsIgnoreCase(key) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1502
                            !"Cookie2".equalsIgnoreCase(key)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1503
                            continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1504
                        }
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1505
                        List<String> l = entry.getValue();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1506
                        if (l != null && !l.isEmpty()) {
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
  1507
                            StringJoiner cookieValue = new StringJoiner("; ");
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  1508
                            for (String value : l) {
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
  1509
                                cookieValue.add(value);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1510
                            }
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
  1511
                            requests.add(key, cookieValue.toString());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1512
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
            if (userCookies != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
                int k;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
                if ((k = requests.getKey("Cookie")) != -1)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
                    requests.set("Cookie", requests.getValue(k) + ";" + userCookies);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
                else
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
                    requests.set("Cookie", userCookies);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1522
            }
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  1523
            if (userCookies2 != null) {
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  1524
                int k;
6877
80aa31f1b638 6986400: Change Cookie to Cookie2 in 6980004 fix
michaelm
parents: 6876
diff changeset
  1525
                if ((k = requests.getKey("Cookie2")) != -1)
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  1526
                    requests.set("Cookie2", requests.getValue(k) + ";" + userCookies2);
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  1527
                else
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  1528
                    requests.set("Cookie2", userCookies2);
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  1529
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
        } // end of getting cookies
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1532
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  1534
    @Override
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1535
    public InputStream getInputStream() throws IOException {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1536
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1537
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1538
            connecting = true;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1539
            SocketPermission p = URLtoSocketPermission(this.url);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1540
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1541
            if (p != null) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1542
                try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1543
                    return AccessController.doPrivilegedWithCombiner(
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1544
                            new PrivilegedExceptionAction<>() {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1545
                                public InputStream run() throws IOException {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1546
                                    return getInputStream0();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1547
                                }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1548
                            }, null, p
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1549
                    );
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1550
                } catch (PrivilegedActionException e) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1551
                    throw (IOException) e.getException();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1552
                }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1553
            } else {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1554
                return getInputStream0();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1555
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1556
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1557
            connectionLock.unlock();
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1558
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1559
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  1560
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  1561
    @SuppressWarnings("empty-statement")
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1562
    private InputStream getInputStream0() throws IOException {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1563
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  1564
        assert connectionLock.isHeldByCurrentThread();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1565
        if (!doInput) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1566
            throw new ProtocolException("Cannot read from URLConnection"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1567
                   + " if doInput=false (call setDoInput(true))");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1568
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1569
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1570
        if (rememberedException != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1571
            if (rememberedException instanceof RuntimeException)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1572
                throw new RuntimeException(rememberedException);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1573
            else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1574
                throw getChainedException((IOException)rememberedException);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1575
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1576
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1577
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1578
        if (inputStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1579
            return inputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1580
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1581
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1582
        if (streaming() ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1583
            if (strOutputStream == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1584
                getOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1585
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1586
            /* make sure stream is closed */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1587
            strOutputStream.close ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1588
            if (!strOutputStream.writtenOK()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1589
                throw new IOException ("Incomplete output stream");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1590
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1591
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1592
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1593
        int redirects = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1594
        int respCode = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1595
        long cl = -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1596
        AuthenticationInfo serverAuthentication = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1597
        AuthenticationInfo proxyAuthentication = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1598
        AuthenticationHeader srvHdr = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1599
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1600
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1601
         * Failed Negotiate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1602
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1603
         * In some cases, the Negotiate auth is supported for the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1604
         * remote host but the negotiate process still fails (For
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1605
         * example, if the web page is located on a backend server
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1606
         * and delegation is needed but fails). The authentication
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1607
         * process will start again, and we need to detect this
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1608
         * kind of failure and do proper fallback (say, to NTLM).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1609
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1610
         * In order to achieve this, the inNegotiate flag is set
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1611
         * when the first negotiate challenge is met (and reset
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1612
         * if authentication is finished). If a fresh new negotiate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1613
         * challenge (no parameter) is found while inNegotiate is
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1614
         * set, we know there's a failed auth attempt recently.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1615
         * Here we'll ignore the header line so that fallback
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1616
         * can be practiced.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1617
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1618
         * inNegotiateProxy is for proxy authentication.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1619
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1620
        boolean inNegotiate = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1621
        boolean inNegotiateProxy = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1622
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1623
        // If the user has set either of these headers then do not remove them
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1624
        isUserServerAuth = requests.getKey("Authorization") != -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1625
        isUserProxyAuth = requests.getKey("Proxy-Authorization") != -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1626
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1627
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1628
            do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1629
                if (!checkReuseConnection())
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1630
                    connect();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1631
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1632
                if (cachedInputStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1633
                    return cachedInputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1634
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1635
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1636
                // Check if URL should be metered
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1637
                boolean meteredInput = ProgressMonitor.getDefault().shouldMeterInput(url, method);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1638
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1639
                if (meteredInput)   {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1640
                    pi = new ProgressSource(url, method);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1641
                    pi.beginTracking();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1642
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1643
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1644
                /* REMIND: This exists to fix the HttpsURLConnection subclass.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1645
                 * Hotjava needs to run on JDK1.1FCS.  Do proper fix once a
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1646
                 * proper solution for SSL can be found.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1647
                 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1648
                ps = (PrintStream)http.getOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1649
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1650
                if (!streaming()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1651
                    writeRequests();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1652
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1653
                http.parseHTTP(responses, pi, this);
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  1654
                if (logger.isLoggable(PlatformLogger.Level.FINE)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  1655
                    logger.fine(responses.toString());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1656
                }
14766
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1657
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1658
                boolean b1 = responses.filterNTLMResponses("WWW-Authenticate");
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1659
                boolean b2 = responses.filterNTLMResponses("Proxy-Authenticate");
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1660
                if (b1 || b2) {
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  1661
                    if (logger.isLoggable(PlatformLogger.Level.FINE)) {
14766
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1662
                        logger.fine(">>>> Headers are filtered");
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1663
                        logger.fine(responses.toString());
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1664
                    }
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1665
                }
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  1666
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1667
                inputStream = http.getInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1668
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1669
                respCode = getResponseCode();
4047
f5dcf30f9206 6886436: Lightwight HTTP Container (com.sun.* package) is unstable
michaelm
parents: 3952
diff changeset
  1670
                if (respCode == -1) {
f5dcf30f9206 6886436: Lightwight HTTP Container (com.sun.* package) is unstable
michaelm
parents: 3952
diff changeset
  1671
                    disconnectInternal();
f5dcf30f9206 6886436: Lightwight HTTP Container (com.sun.* package) is unstable
michaelm
parents: 3952
diff changeset
  1672
                    throw new IOException ("Invalid Http response");
f5dcf30f9206 6886436: Lightwight HTTP Container (com.sun.* package) is unstable
michaelm
parents: 3952
diff changeset
  1673
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1674
                if (respCode == HTTP_PROXY_AUTH) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1675
                    if (streaming()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1676
                        disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1677
                        throw new HttpRetryException (
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1678
                            RETRY_MSG1, HTTP_PROXY_AUTH);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1679
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1680
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1681
                    // Read comments labeled "Failed Negotiate" for details.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1682
                    boolean dontUseNegotiate = false;
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  1683
                    Iterator<String> iter = responses.multiValueIterator("Proxy-Authenticate");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1684
                    while (iter.hasNext()) {
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  1685
                        String value = iter.next().trim();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1686
                        if (value.equalsIgnoreCase("Negotiate") ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1687
                                value.equalsIgnoreCase("Kerberos")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1688
                            if (!inNegotiateProxy) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1689
                                inNegotiateProxy = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1690
                            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1691
                                dontUseNegotiate = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1692
                                doingNTLMp2ndStage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1693
                                proxyAuthentication = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1694
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1695
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1696
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1697
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1698
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1699
                    // changes: add a 3rd parameter to the constructor of
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1700
                    // AuthenticationHeader, so that NegotiateAuthentication.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1701
                    // isSupported can be tested.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1702
                    // The other 2 appearances of "new AuthenticationHeader" is
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1703
                    // altered in similar ways.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1704
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1705
                    AuthenticationHeader authhdr = new AuthenticationHeader (
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  1706
                            "Proxy-Authenticate",
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  1707
                            responses,
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  1708
                            new HttpCallerInfo(url,
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  1709
                                               http.getProxyHostUsed(),
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  1710
                                               http.getProxyPortUsed(),
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  1711
                                               authenticator),
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  1712
                            dontUseNegotiate,
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  1713
                            disabledProxyingSchemes
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1714
                    );
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1715
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1716
                    if (!doingNTLMp2ndStage) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1717
                        proxyAuthentication =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1718
                            resetProxyAuthentication(proxyAuthentication, authhdr);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1719
                        if (proxyAuthentication != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1720
                            redirects++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1721
                            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1722
                            continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1723
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1724
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1725
                        /* in this case, only one header field will be present */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1726
                        String raw = responses.findValue ("Proxy-Authenticate");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1727
                        reset ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1728
                        if (!proxyAuthentication.setHeaders(this,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1729
                                                        authhdr.headerParser(), raw)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1730
                            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1731
                            throw new IOException ("Authentication failure");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1732
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1733
                        if (serverAuthentication != null && srvHdr != null &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1734
                                !serverAuthentication.setHeaders(this,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1735
                                                        srvHdr.headerParser(), raw)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1736
                            disconnectInternal ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1737
                            throw new IOException ("Authentication failure");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1738
                        }
3061
419b6dba7ccf 6855297: Windows build breaks after 6811297
jccollet
parents: 3059
diff changeset
  1739
                        authObj = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1740
                        doingNTLMp2ndStage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1741
                        continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1742
                    }
5161
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1743
                } else {
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1744
                    inNegotiateProxy = false;
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1745
                    doingNTLMp2ndStage = false;
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1746
                    if (!isUserProxyAuth)
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1747
                        requests.remove("Proxy-Authorization");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1748
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1749
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1750
                // cache proxy authentication info
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1751
                if (proxyAuthentication != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1752
                    // cache auth info on success, domain header not relevant.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1753
                    proxyAuthentication.addToCache();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1754
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1755
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1756
                if (respCode == HTTP_UNAUTHORIZED) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1757
                    if (streaming()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1758
                        disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1759
                        throw new HttpRetryException (
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1760
                            RETRY_MSG2, HTTP_UNAUTHORIZED);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1761
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1762
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1763
                    // Read comments labeled "Failed Negotiate" for details.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1764
                    boolean dontUseNegotiate = false;
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  1765
                    Iterator<String> iter = responses.multiValueIterator("WWW-Authenticate");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1766
                    while (iter.hasNext()) {
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  1767
                        String value = iter.next().trim();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1768
                        if (value.equalsIgnoreCase("Negotiate") ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1769
                                value.equalsIgnoreCase("Kerberos")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1770
                            if (!inNegotiate) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1771
                                inNegotiate = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1772
                            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1773
                                dontUseNegotiate = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1774
                                doingNTLM2ndStage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1775
                                serverAuthentication = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1776
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1777
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1778
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1779
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1780
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1781
                    srvHdr = new AuthenticationHeader (
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1782
                            "WWW-Authenticate", responses,
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  1783
                            new HttpCallerInfo(url, authenticator),
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2928
diff changeset
  1784
                            dontUseNegotiate
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1785
                    );
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1786
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1787
                    String raw = srvHdr.raw();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1788
                    if (!doingNTLM2ndStage) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1789
                        if ((serverAuthentication != null)&&
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  1790
                            serverAuthentication.getAuthScheme() != NTLM) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1791
                            if (serverAuthentication.isAuthorizationStale (raw)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1792
                                /* we can retry with the current credentials */
5161
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1793
                                disconnectWeb();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1794
                                redirects++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1795
                                requests.set(serverAuthentication.getHeaderName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1796
                                            serverAuthentication.getHeaderValue(url, method));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1797
                                currentServerCredentials = serverAuthentication;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1798
                                setCookieHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1799
                                continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1800
                            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1801
                                serverAuthentication.removeFromCache();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1802
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1803
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1804
                        serverAuthentication = getServerAuthentication(srvHdr);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1805
                        currentServerCredentials = serverAuthentication;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1806
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1807
                        if (serverAuthentication != null) {
5161
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1808
                            disconnectWeb();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1809
                            redirects++; // don't let things loop ad nauseum
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1810
                            setCookieHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1811
                            continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1812
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1813
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1814
                        reset ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1815
                        /* header not used for ntlm */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1816
                        if (!serverAuthentication.setHeaders(this, null, raw)) {
5161
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  1817
                            disconnectWeb();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1818
                            throw new IOException ("Authentication failure");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1819
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1820
                        doingNTLM2ndStage = false;
3061
419b6dba7ccf 6855297: Windows build breaks after 6811297
jccollet
parents: 3059
diff changeset
  1821
                        authObj = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1822
                        setCookieHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1823
                        continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1824
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1825
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1826
                // cache server authentication info
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1827
                if (serverAuthentication != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1828
                    // cache auth info on success
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1829
                    if (!(serverAuthentication instanceof DigestAuthentication) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1830
                        (domain == null)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1831
                        if (serverAuthentication instanceof BasicAuthentication) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1832
                            // check if the path is shorter than the existing entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1833
                            String npath = AuthenticationInfo.reducePath (url.getPath());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1834
                            String opath = serverAuthentication.path;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1835
                            if (!opath.startsWith (npath) || npath.length() >= opath.length()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1836
                                /* npath is longer, there must be a common root */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1837
                                npath = BasicAuthentication.getRootPath (opath, npath);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1838
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1839
                            // remove the entry and create a new one
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1840
                            BasicAuthentication a =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1841
                                (BasicAuthentication) serverAuthentication.clone();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1842
                            serverAuthentication.removeFromCache();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1843
                            a.path = npath;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1844
                            serverAuthentication = a;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1845
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1846
                        serverAuthentication.addToCache();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1847
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1848
                        // what we cache is based on the domain list in the request
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1849
                        DigestAuthentication srv = (DigestAuthentication)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1850
                            serverAuthentication;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1851
                        StringTokenizer tok = new StringTokenizer (domain," ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1852
                        String realm = srv.realm;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1853
                        PasswordAuthentication pw = srv.pw;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1854
                        digestparams = srv.params;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1855
                        while (tok.hasMoreTokens()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1856
                            String path = tok.nextToken();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1857
                            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1858
                                /* path could be an abs_path or a complete URI */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1859
                                URL u = new URL (url, path);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1860
                                DigestAuthentication d = new DigestAuthentication (
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  1861
                                                   false, u, realm, "Digest", pw,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  1862
                                                   digestparams, srv.authenticatorKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1863
                                d.addToCache ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1864
                            } catch (Exception e) {}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1865
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1866
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1867
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1868
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1869
                // some flags should be reset to its initialized form so that
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1870
                // even after a redirect the necessary checks can still be
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1871
                // preformed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1872
                inNegotiate = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1873
                inNegotiateProxy = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1874
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1875
                //serverAuthentication = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1876
                doingNTLMp2ndStage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1877
                doingNTLM2ndStage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1878
                if (!isUserServerAuth)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1879
                    requests.remove("Authorization");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1880
                if (!isUserProxyAuth)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1881
                    requests.remove("Proxy-Authorization");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1882
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1883
                if (respCode == HTTP_OK) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1884
                    checkResponseCredentials (false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1885
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1886
                    needToCheck = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1887
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1888
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1889
                // a flag need to clean
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1890
                needToCheck = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1891
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1892
                if (followRedirect()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1893
                    /* if we should follow a redirect, then the followRedirects()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1894
                     * method will disconnect() and re-connect us to the new
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1895
                     * location
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1896
                     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1897
                    redirects++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1898
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1899
                    // redirecting HTTP response may have set cookie, so
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1900
                    // need to re-generate request header
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1901
                    setCookieHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1902
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1903
                    continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1904
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1905
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1906
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1907
                    cl = Long.parseLong(responses.findValue("content-length"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1908
                } catch (Exception exc) { };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1909
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1910
                if (method.equals("HEAD") || cl == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1911
                    respCode == HTTP_NOT_MODIFIED ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1912
                    respCode == HTTP_NO_CONTENT) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1913
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1914
                    if (pi != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1915
                        pi.finishTracking();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1916
                        pi = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1917
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1918
                    http.finished();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1919
                    http = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1920
                    inputStream = new EmptyInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1921
                    connected = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1922
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1923
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1924
                if (respCode == 200 || respCode == 203 || respCode == 206 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1925
                    respCode == 300 || respCode == 301 || respCode == 410) {
11839
53065c5f535d 7133367: ResponseCache.put should not be called when setUseCaches(false)
chegar
parents: 11528
diff changeset
  1926
                    if (cacheHandler != null && getUseCaches()) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1927
                        // give cache a chance to save response in cache
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1928
                        URI uri = ParseUtil.toURI(url);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1929
                        if (uri != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1930
                            URLConnection uconn = this;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1931
                            if ("https".equalsIgnoreCase(uri.getScheme())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1932
                                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1933
                                // use reflection to get to the public
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1934
                                // HttpsURLConnection instance saved in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1935
                                // DelegateHttpsURLConnection
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1936
                                uconn = (URLConnection)this.getClass().getField("httpsURLConnection").get(this);
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  1937
                                } catch (IllegalAccessException |
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  1938
                                         NoSuchFieldException e) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1939
                                    // ignored; use 'this'
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1940
                                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1941
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1942
                            CacheRequest cacheRequest =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1943
                                cacheHandler.put(uri, uconn);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1944
                            if (cacheRequest != null && http != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1945
                                http.setCacheRequest(cacheRequest);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1946
                                inputStream = new HttpInputStream(inputStream, cacheRequest);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1947
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1948
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1949
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1950
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1951
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1952
                if (!(inputStream instanceof HttpInputStream)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1953
                    inputStream = new HttpInputStream(inputStream);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1954
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1955
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1956
                if (respCode >= 400) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1957
                    if (respCode == 404 || respCode == 410) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1958
                        throw new FileNotFoundException(url.toString());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1959
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1960
                        throw new java.io.IOException("Server returned HTTP" +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1961
                              " response code: " + respCode + " for URL: " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1962
                              url.toString());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1963
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1964
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1965
                poster = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1966
                strOutputStream = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1967
                return inputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1968
            } while (redirects < maxRedirects);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1969
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1970
            throw new ProtocolException("Server redirected too many " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1971
                                        " times ("+ redirects + ")");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1972
        } catch (RuntimeException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1973
            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1974
            rememberedException = e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1975
            throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1976
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1977
            rememberedException = e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1978
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1979
            // buffer the error stream if bytes < 4k
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1980
            // and it can be buffered within 1 second
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1981
            String te = responses.findValue("Transfer-Encoding");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1982
            if (http != null && http.isKeepingAlive() && enableESBuffer &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1983
                (cl > 0 || (te != null && te.equalsIgnoreCase("chunked")))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1984
                errorStream = ErrorStream.getErrorStream(inputStream, cl, http);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1985
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1986
            throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1987
        } finally {
5199
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  1988
            if (proxyAuthKey != null) {
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  1989
                AuthenticationInfo.endAuthRequest(proxyAuthKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1990
            }
5199
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  1991
            if (serverAuthKey != null) {
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  1992
                AuthenticationInfo.endAuthRequest(serverAuthKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1993
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1994
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1995
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1996
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1997
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1998
     * Creates a chained exception that has the same type as
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1999
     * original exception and with the same message. Right now,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2000
     * there is no convenient APIs for doing so.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2001
     */
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2002
    private IOException getChainedException(final IOException rememberedException) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2003
        try {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2004
            final Object[] args = { rememberedException.getMessage() };
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2005
            IOException chainedException =
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2006
                java.security.AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
  2007
                    new java.security.PrivilegedExceptionAction<>() {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2008
                        public IOException run() throws Exception {
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2009
                            return (IOException)
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2010
                                rememberedException.getClass()
10701
2c8dde454979 7090499: missing rawtypes warnings in anonymous inner class
chegar
parents: 10596
diff changeset
  2011
                                .getConstructor(new Class<?>[] { String.class })
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2012
                                .newInstance(args);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2013
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2014
                    });
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2015
            chainedException.initCause(rememberedException);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2016
            return chainedException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2017
        } catch (Exception ignored) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2018
            return rememberedException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2019
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2020
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2021
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  2022
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2023
    public InputStream getErrorStream() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2024
        if (connected && responseCode >= 400) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2025
            // Client Error 4xx and Server Error 5xx
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2026
            if (errorStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2027
                return errorStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2028
            } else if (inputStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2029
                return inputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2030
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2031
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2032
        return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2033
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2034
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2035
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2036
     * set or reset proxy authentication info in request headers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2037
     * after receiving a 407 error. In the case of NTLM however,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2038
     * receiving a 407 is normal and we just skip the stale check
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2039
     * because ntlm does not support this feature.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2040
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2041
    private AuthenticationInfo
4150
74dfe4a968c6 6890349: Fix #6870935 in jdk7/pit/b74 caused HttpClinet's check for "proxy capture" attack by-passed.
michaelm
parents: 4047
diff changeset
  2042
        resetProxyAuthentication(AuthenticationInfo proxyAuthentication, AuthenticationHeader auth) throws IOException {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2043
        if ((proxyAuthentication != null )&&
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2044
             proxyAuthentication.getAuthScheme() != NTLM) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2045
            String raw = auth.raw();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2046
            if (proxyAuthentication.isAuthorizationStale (raw)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2047
                /* we can retry with the current credentials */
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2048
                String value;
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2049
                if (proxyAuthentication instanceof DigestAuthentication) {
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2050
                    DigestAuthentication digestProxy = (DigestAuthentication)
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2051
                        proxyAuthentication;
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2052
                    if (tunnelState() == TunnelState.SETUP) {
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2053
                        value = digestProxy.getHeaderValue(connectRequestURI(url), HTTP_CONNECT);
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2054
                    } else {
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2055
                        value = digestProxy.getHeaderValue(getRequestURI(), method);
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2056
                    }
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2057
                } else {
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2058
                    value = proxyAuthentication.getHeaderValue(url, method);
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2059
                }
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2060
                requests.set(proxyAuthentication.getHeaderName(), value);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2061
                currentProxyCredentials = proxyAuthentication;
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2062
                return proxyAuthentication;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2063
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2064
                proxyAuthentication.removeFromCache();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2065
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2066
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2067
        proxyAuthentication = getHttpProxyAuthentication(auth);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2068
        currentProxyCredentials = proxyAuthentication;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2069
        return  proxyAuthentication;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2070
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2071
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2072
    /**
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2073
     * Returns the tunnel state.
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2074
     *
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2075
     * @return  the state
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2076
     */
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2077
    TunnelState tunnelState() {
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2078
        return tunnelState;
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2079
    }
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2080
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2081
    /**
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2082
     * Set the tunneling status.
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2083
     *
31061
fead7d86d75f 8081517: minor cleanup for docs
avstepan
parents: 30685
diff changeset
  2084
     * @param tunnelState the state
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2085
     */
14008
b572c1f3a7ad 7199219: Proxy-Connection headers set incorrectly when a HttpClient is retrieved from the Keep Alive Cache
robm
parents: 14007
diff changeset
  2086
    public void setTunnelState(TunnelState tunnelState) {
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2087
        this.tunnelState = tunnelState;
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2088
    }
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2089
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2090
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2091
     * establish a tunnel through proxy server
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2092
     */
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2093
    public void doTunneling() throws IOException {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2094
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2095
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2096
            doTunneling0();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2097
        } finally{
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2098
            connectionLock.unlock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2099
        }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2100
    }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2101
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2102
    private void doTunneling0() throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2103
        int retryTunnel = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2104
        String statusLine = "";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2105
        int respCode = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2106
        AuthenticationInfo proxyAuthentication = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2107
        String proxyHost = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2108
        int proxyPort = -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2109
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2110
        // save current requests so that they can be restored after tunnel is setup.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2111
        MessageHeader savedRequests = requests;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2112
        requests = new MessageHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2113
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2114
        // Read comments labeled "Failed Negotiate" for details.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2115
        boolean inNegotiateProxy = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2116
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2117
        try {
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2118
            /* Actively setting up a tunnel */
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2119
            setTunnelState(TunnelState.SETUP);
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2120
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2121
            do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2122
                if (!checkReuseConnection()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2123
                    proxiedConnect(url, proxyHost, proxyPort, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2124
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2125
                // send the "CONNECT" request to establish a tunnel
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2126
                // through proxy server
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2127
                sendCONNECTRequest();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2128
                responses.reset();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2129
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2130
                // There is no need to track progress in HTTP Tunneling,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2131
                // so ProgressSource is null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2132
                http.parseHTTP(responses, null, this);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2133
478
5adf3e3f1ff3 6659779: HttpURLConnections logger should log tunnel requests
chegar
parents: 94
diff changeset
  2134
                /* Log the response to the CONNECT */
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2135
                if (logger.isLoggable(PlatformLogger.Level.FINE)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  2136
                    logger.fine(responses.toString());
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2137
                }
478
5adf3e3f1ff3 6659779: HttpURLConnections logger should log tunnel requests
chegar
parents: 94
diff changeset
  2138
14766
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  2139
                if (responses.filterNTLMResponses("Proxy-Authenticate")) {
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2140
                    if (logger.isLoggable(PlatformLogger.Level.FINE)) {
14766
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  2141
                        logger.fine(">>>> Headers are filtered");
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  2142
                        logger.fine(responses.toString());
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  2143
                    }
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  2144
                }
1f22dd6f2658 8003948: NTLM/Negotiate authentication problem
michaelm
parents: 14008
diff changeset
  2145
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2146
                statusLine = responses.getValue(0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2147
                StringTokenizer st = new StringTokenizer(statusLine);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2148
                st.nextToken();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2149
                respCode = Integer.parseInt(st.nextToken().trim());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2150
                if (respCode == HTTP_PROXY_AUTH) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2151
                    // Read comments labeled "Failed Negotiate" for details.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2152
                    boolean dontUseNegotiate = false;
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2153
                    Iterator<String> iter = responses.multiValueIterator("Proxy-Authenticate");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2154
                    while (iter.hasNext()) {
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2155
                        String value = iter.next().trim();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2156
                        if (value.equalsIgnoreCase("Negotiate") ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2157
                                value.equalsIgnoreCase("Kerberos")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2158
                            if (!inNegotiateProxy) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2159
                                inNegotiateProxy = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2160
                            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2161
                                dontUseNegotiate = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2162
                                doingNTLMp2ndStage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2163
                                proxyAuthentication = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2164
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2165
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2166
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2167
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2168
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  2169
                    AuthenticationHeader authhdr = new AuthenticationHeader(
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  2170
                            "Proxy-Authenticate",
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  2171
                            responses,
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  2172
                            new HttpCallerInfo(url,
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  2173
                                               http.getProxyHostUsed(),
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2174
                                               http.getProxyPortUsed(),
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2175
                                               authenticator),
41579
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  2176
                            dontUseNegotiate,
c0fe2e6364d9 8160838: Better HTTP service
chegar
parents: 40737
diff changeset
  2177
                            disabledTunnelingSchemes
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2178
                    );
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2179
                    if (!doingNTLMp2ndStage) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2180
                        proxyAuthentication =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2181
                            resetProxyAuthentication(proxyAuthentication, authhdr);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2182
                        if (proxyAuthentication != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2183
                            proxyHost = http.getProxyHostUsed();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2184
                            proxyPort = http.getProxyPortUsed();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2185
                            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2186
                            retryTunnel++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2187
                            continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2188
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2189
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2190
                        String raw = responses.findValue ("Proxy-Authenticate");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2191
                        reset ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2192
                        if (!proxyAuthentication.setHeaders(this,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2193
                                                authhdr.headerParser(), raw)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2194
                            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2195
                            throw new IOException ("Authentication failure");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2196
                        }
3061
419b6dba7ccf 6855297: Windows build breaks after 6811297
jccollet
parents: 3059
diff changeset
  2197
                        authObj = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2198
                        doingNTLMp2ndStage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2199
                        continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2200
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2201
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2202
                // cache proxy authentication info
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2203
                if (proxyAuthentication != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2204
                    // cache auth info on success, domain header not relevant.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2205
                    proxyAuthentication.addToCache();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2206
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2207
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2208
                if (respCode == HTTP_OK) {
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2209
                    setTunnelState(TunnelState.TUNNELING);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2210
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2211
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2212
                // we don't know how to deal with other response code
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2213
                // so disconnect and report error
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2214
                disconnectInternal();
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2215
                setTunnelState(TunnelState.NONE);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2216
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2217
            } while (retryTunnel < maxRedirects);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2218
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2219
            if (retryTunnel >= maxRedirects || (respCode != HTTP_OK)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2220
                throw new IOException("Unable to tunnel through proxy."+
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2221
                                      " Proxy returns \"" +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2222
                                      statusLine + "\"");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2223
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2224
        } finally  {
5199
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  2225
            if (proxyAuthKey != null) {
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  2226
                AuthenticationInfo.endAuthRequest(proxyAuthKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2227
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2228
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2229
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2230
        // restore original request headers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2231
        requests = savedRequests;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2232
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2233
        // reset responses
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2234
        responses.reset();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2235
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2236
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2237
    static String connectRequestURI(URL url) {
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2238
        String host = url.getHost();
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2239
        int port = url.getPort();
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2240
        port = port != -1 ? port : url.getDefaultPort();
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2241
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2242
        return host + ":" + port;
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2243
    }
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2244
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2245
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2246
     * send a CONNECT request for establishing a tunnel to proxy server
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2247
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2248
    private void sendCONNECTRequest() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2249
        int port = url.getPort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2250
10136
af9631156b25 6670868: StackOverFlow with bad authenticated Proxy tunnels
chegar
parents: 9035
diff changeset
  2251
        requests.set(0, HTTP_CONNECT + " " + connectRequestURI(url)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2252
                         + " " + httpVersion, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2253
        requests.setIfNotSet("User-Agent", userAgent);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2254
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2255
        String host = url.getHost();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2256
        if (port != -1 && port != url.getDefaultPort()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2257
            host += ":" + String.valueOf(port);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2258
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2259
        requests.setIfNotSet("Host", host);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2260
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2261
        // Not really necessary for a tunnel, but can't hurt
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2262
        requests.setIfNotSet("Accept", acceptString);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2263
6292
9da761dff0c7 6973030: NTLM proxy authentication fails with https
chegar
parents: 5979
diff changeset
  2264
        if (http.getHttpKeepAliveSet()) {
9da761dff0c7 6973030: NTLM proxy authentication fails with https
chegar
parents: 5979
diff changeset
  2265
            requests.setIfNotSet("Proxy-Connection", "keep-alive");
9da761dff0c7 6973030: NTLM proxy authentication fails with https
chegar
parents: 5979
diff changeset
  2266
        }
9da761dff0c7 6973030: NTLM proxy authentication fails with https
chegar
parents: 5979
diff changeset
  2267
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2268
        setPreemptiveProxyAuthentication(requests);
478
5adf3e3f1ff3 6659779: HttpURLConnections logger should log tunnel requests
chegar
parents: 94
diff changeset
  2269
5adf3e3f1ff3 6659779: HttpURLConnections logger should log tunnel requests
chegar
parents: 94
diff changeset
  2270
         /* Log the CONNECT request */
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2271
        if (logger.isLoggable(PlatformLogger.Level.FINE)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  2272
            logger.fine(requests.toString());
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2273
        }
478
5adf3e3f1ff3 6659779: HttpURLConnections logger should log tunnel requests
chegar
parents: 94
diff changeset
  2274
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2275
        http.writeRequests(requests, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2276
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2277
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2278
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2279
     * Sets pre-emptive proxy authentication in header
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2280
     */
4150
74dfe4a968c6 6890349: Fix #6870935 in jdk7/pit/b74 caused HttpClinet's check for "proxy capture" attack by-passed.
michaelm
parents: 4047
diff changeset
  2281
    private void setPreemptiveProxyAuthentication(MessageHeader requests) throws IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2282
        AuthenticationInfo pauth
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2283
            = AuthenticationInfo.getProxyAuth(http.getProxyHostUsed(),
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2284
                                              http.getProxyPortUsed(),
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2285
                                              getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2286
        if (pauth != null && pauth.supportsPreemptiveAuthorization()) {
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2287
            String value;
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2288
            if (pauth instanceof DigestAuthentication) {
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2289
                DigestAuthentication digestProxy = (DigestAuthentication) pauth;
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2290
                if (tunnelState() == TunnelState.SETUP) {
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2291
                    value = digestProxy
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2292
                        .getHeaderValue(connectRequestURI(url), HTTP_CONNECT);
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2293
                } else {
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2294
                    value = digestProxy.getHeaderValue(getRequestURI(), method);
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2295
                }
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2296
            } else {
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2297
                value = pauth.getHeaderValue(url, method);
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2298
            }
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2299
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2300
            // Sets "Proxy-authorization"
479
c6ddcfc7ff4d 6687282: URLConnection for HTTPS connection through Proxy w/ Digest Authentication gives 400 Bad Request
chegar
parents: 478
diff changeset
  2301
            requests.set(pauth.getHeaderName(), value);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2302
            currentProxyCredentials = pauth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2303
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2304
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2305
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2306
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2307
     * Gets the authentication for an HTTP proxy, and applies it to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2308
     * the connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2309
     */
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2310
    @SuppressWarnings("fallthrough")
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2311
    private AuthenticationInfo getHttpProxyAuthentication (AuthenticationHeader authhdr) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2312
        /* get authorization from authenticator */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2313
        AuthenticationInfo ret = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2314
        String raw = authhdr.raw();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2315
        String host = http.getProxyHostUsed();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2316
        int port = http.getProxyPortUsed();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2317
        if (host != null && authhdr.isPresent()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2318
            HeaderParser p = authhdr.headerParser();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2319
            String realm = p.findValue("realm");
57838
78844dceede6 8199849: Add support for UTF-8 encoded credentials in HTTP Basic Authentication
michaelm
parents: 55711
diff changeset
  2320
            String charset = p.findValue("charset");
78844dceede6 8199849: Add support for UTF-8 encoded credentials in HTTP Basic Authentication
michaelm
parents: 55711
diff changeset
  2321
            boolean isUTF8 = (charset != null && charset.equalsIgnoreCase("UTF-8"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2322
            String scheme = authhdr.scheme();
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2323
            AuthScheme authScheme = UNKNOWN;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2324
            if ("basic".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2325
                authScheme = BASIC;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2326
            } else if ("digest".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2327
                authScheme = DIGEST;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2328
            } else if ("ntlm".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2329
                authScheme = NTLM;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2330
                doingNTLMp2ndStage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2331
            } else if ("Kerberos".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2332
                authScheme = KERBEROS;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2333
                doingNTLMp2ndStage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2334
            } else if ("Negotiate".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2335
                authScheme = NEGOTIATE;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2336
                doingNTLMp2ndStage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2337
            }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2338
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2339
            if (realm == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2340
                realm = "";
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2341
            proxyAuthKey = AuthenticationInfo.getProxyAuthKey(host, port, realm,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2342
                                authScheme, getAuthenticatorKey());
5199
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  2343
            ret = AuthenticationInfo.getProxyAuth(proxyAuthKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2344
            if (ret == null) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2345
                switch (authScheme) {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2346
                case BASIC:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2347
                    InetAddress addr = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2348
                    try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2349
                        final String finalHost = host;
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2350
                        addr = java.security.AccessController.doPrivileged(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
  2351
                            new java.security.PrivilegedExceptionAction<>() {
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  2352
                                public InetAddress run()
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2353
                                    throws java.net.UnknownHostException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2354
                                    return InetAddress.getByName(finalHost);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2355
                                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2356
                            });
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2357
                    } catch (java.security.PrivilegedActionException ignored) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2358
                        // User will have an unknown host.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2359
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2360
                    PasswordAuthentication a =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2361
                        privilegedRequestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2362
                                    authenticator,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2363
                                    host, addr, port, "http",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2364
                                    realm, scheme, url, RequestorType.PROXY);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2365
                    if (a != null) {
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2366
                        ret = new BasicAuthentication(true, host, port, realm, a,
57838
78844dceede6 8199849: Add support for UTF-8 encoded credentials in HTTP Basic Authentication
michaelm
parents: 55711
diff changeset
  2367
                                             isUTF8, getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2368
                    }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2369
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2370
                case DIGEST:
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2371
                    a = privilegedRequestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2372
                                    authenticator,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2373
                                    host, null, port, url.getProtocol(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2374
                                    realm, scheme, url, RequestorType.PROXY);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2375
                    if (a != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2376
                        DigestAuthentication.Parameters params =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2377
                            new DigestAuthentication.Parameters();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2378
                        ret = new DigestAuthentication(true, host, port, realm,
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2379
                                             scheme, a, params,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2380
                                             getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2381
                    }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2382
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2383
                case NTLM:
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2384
                    if (NTLMAuthenticationProxy.supported) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2385
                        /* tryTransparentNTLMProxy will always be true the first
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2386
                         * time around, but verify that the platform supports it
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2387
                         * otherwise don't try. */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2388
                        if (tryTransparentNTLMProxy) {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2389
                            tryTransparentNTLMProxy =
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2390
                                    NTLMAuthenticationProxy.supportsTransparentAuth;
28545
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2391
                            /* If the platform supports transparent authentication
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2392
                             * then normally it's ok to do transparent auth to a proxy
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2393
                                         * because we generally trust proxies (chosen by the user)
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2394
                                         * But not in the case of 305 response where the server
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2395
                             * chose it. */
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2396
                            if (tryTransparentNTLMProxy && useProxyResponseCode) {
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2397
                                tryTransparentNTLMProxy = false;
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2398
                            }
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2399
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2400
                        }
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2401
                        a = null;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2402
                        if (tryTransparentNTLMProxy) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  2403
                            logger.finest("Trying Transparent NTLM authentication");
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2404
                        } else {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2405
                            a = privilegedRequestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2406
                                                authenticator,
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2407
                                                host, null, port, url.getProtocol(),
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2408
                                                "", scheme, url, RequestorType.PROXY);
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2409
                        }
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2410
                        /* If we are not trying transparent authentication then
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2411
                         * we need to have a PasswordAuthentication instance. For
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2412
                         * transparent authentication (Windows only) the username
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2413
                         * and password will be picked up from the current logged
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2414
                         * on users credentials.
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2415
                        */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2416
                        if (tryTransparentNTLMProxy ||
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2417
                              (!tryTransparentNTLMProxy && a != null)) {
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2418
                            ret = NTLMAuthenticationProxy.proxy.create(true, host,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2419
                                    port, a, getAuthenticatorKey());
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2420
                        }
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2421
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2422
                        /* set to false so that we do not try again */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2423
                        tryTransparentNTLMProxy = false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2424
                    }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2425
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2426
                case NEGOTIATE:
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2928
diff changeset
  2427
                    ret = new NegotiateAuthentication(new HttpCallerInfo(authhdr.getHttpCallerInfo(), "Negotiate"));
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2428
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2429
                case KERBEROS:
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2928
diff changeset
  2430
                    ret = new NegotiateAuthentication(new HttpCallerInfo(authhdr.getHttpCallerInfo(), "Kerberos"));
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2431
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2432
                case UNKNOWN:
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2433
                    if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
16839
d0f2e97b7359 8010297: Missing isLoggable() checks in logging code
anthony
parents: 16007
diff changeset
  2434
                        logger.finest("Unknown/Unsupported authentication scheme: " + scheme);
d0f2e97b7359 8010297: Missing isLoggable() checks in logging code
anthony
parents: 16007
diff changeset
  2435
                    }
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2436
                /*fall through*/
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2437
                default:
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2438
                    throw new AssertionError("should not reach here");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2439
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2440
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2441
            // For backwards compatibility, we also try defaultAuth
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2442
            // REMIND:  Get rid of this for JDK2.0.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2443
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2444
            if (ret == null && defaultAuth != null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2445
                && defaultAuth.schemeSupported(scheme)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2446
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2447
                    URL u = new URL("http", host, port, "/");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2448
                    String a = defaultAuth.authString(u, scheme, realm);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2449
                    if (a != null) {
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2450
                        ret = new BasicAuthentication (true, host, port, realm, a,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2451
                                  getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2452
                        // not in cache by default - cache on success
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2453
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2454
                } catch (java.net.MalformedURLException ignored) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2455
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2456
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2457
            if (ret != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2458
                if (!ret.setHeaders(this, p, raw)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2459
                    ret = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2460
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2461
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2462
        }
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2463
        if (logger.isLoggable(PlatformLogger.Level.FINER)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  2464
            logger.finer("Proxy Authentication for " + authhdr.toString() +" returned " + (ret != null ? ret.toString() : "null"));
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2465
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2466
        return ret;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2467
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2468
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2469
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2470
     * Gets the authentication for an HTTP server, and applies it to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2471
     * the connection.
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  2472
     * @param authhdr the AuthenticationHeader which tells what auth scheme is
21278
ef8a3a2a72f2 8022746: List of spelling errors in API doc
malenkov
parents: 20787
diff changeset
  2473
     * preferred.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2474
     */
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2475
    @SuppressWarnings("fallthrough")
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2476
    private AuthenticationInfo getServerAuthentication (AuthenticationHeader authhdr) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2477
        /* get authorization from authenticator */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2478
        AuthenticationInfo ret = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2479
        String raw = authhdr.raw();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2480
        /* When we get an NTLM auth from cache, don't set any special headers */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2481
        if (authhdr.isPresent()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2482
            HeaderParser p = authhdr.headerParser();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2483
            String realm = p.findValue("realm");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2484
            String scheme = authhdr.scheme();
57838
78844dceede6 8199849: Add support for UTF-8 encoded credentials in HTTP Basic Authentication
michaelm
parents: 55711
diff changeset
  2485
            String charset = p.findValue("charset");
78844dceede6 8199849: Add support for UTF-8 encoded credentials in HTTP Basic Authentication
michaelm
parents: 55711
diff changeset
  2486
            boolean isUTF8 = (charset != null && charset.equalsIgnoreCase("UTF-8"));
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2487
            AuthScheme authScheme = UNKNOWN;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2488
            if ("basic".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2489
                authScheme = BASIC;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2490
            } else if ("digest".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2491
                authScheme = DIGEST;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2492
            } else if ("ntlm".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2493
                authScheme = NTLM;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2494
                doingNTLM2ndStage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2495
            } else if ("Kerberos".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2496
                authScheme = KERBEROS;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2497
                doingNTLM2ndStage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2498
            } else if ("Negotiate".equalsIgnoreCase(scheme)) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2499
                authScheme = NEGOTIATE;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2500
                doingNTLM2ndStage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2501
            }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2502
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2503
            domain = p.findValue ("domain");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2504
            if (realm == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2505
                realm = "";
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2506
            serverAuthKey = AuthenticationInfo.getServerAuthKey(url, realm, authScheme,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2507
                                               getAuthenticatorKey());
5199
98b1778f0fd1 6648001: Cancelling HTTP authentication causes subsequent deadlocks
chegar
parents: 5161
diff changeset
  2508
            ret = AuthenticationInfo.getServerAuth(serverAuthKey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2509
            InetAddress addr = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2510
            if (ret == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2511
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2512
                    addr = InetAddress.getByName(url.getHost());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2513
                } catch (java.net.UnknownHostException ignored) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2514
                    // User will have addr = null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2515
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2516
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2517
            // replacing -1 with default port for a protocol
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2518
            int port = url.getPort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2519
            if (port == -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2520
                port = url.getDefaultPort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2521
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2522
            if (ret == null) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2523
                switch(authScheme) {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2524
                case KERBEROS:
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2928
diff changeset
  2525
                    ret = new NegotiateAuthentication(new HttpCallerInfo(authhdr.getHttpCallerInfo(), "Kerberos"));
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2526
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2527
                case NEGOTIATE:
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2928
diff changeset
  2528
                    ret = new NegotiateAuthentication(new HttpCallerInfo(authhdr.getHttpCallerInfo(), "Negotiate"));
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2529
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2530
                case BASIC:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2531
                    PasswordAuthentication a =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2532
                        privilegedRequestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2533
                            authenticator,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2534
                            url.getHost(), addr, port, url.getProtocol(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2535
                            realm, scheme, url, RequestorType.SERVER);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2536
                    if (a != null) {
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2537
                        ret = new BasicAuthentication(false, url, realm, a,
57838
78844dceede6 8199849: Add support for UTF-8 encoded credentials in HTTP Basic Authentication
michaelm
parents: 55711
diff changeset
  2538
                                    isUTF8, getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2539
                    }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2540
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2541
                case DIGEST:
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2542
                    a = privilegedRequestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2543
                            authenticator,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2544
                            url.getHost(), addr, port, url.getProtocol(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2545
                            realm, scheme, url, RequestorType.SERVER);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2546
                    if (a != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2547
                        digestparams = new DigestAuthentication.Parameters();
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2548
                        ret = new DigestAuthentication(false, url, realm, scheme,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2549
                                    a, digestparams,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2550
                                    getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2551
                    }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2552
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2553
                case NTLM:
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2554
                    if (NTLMAuthenticationProxy.supported) {
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2555
                        URL url1;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2556
                        try {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2557
                            url1 = new URL (url, "/"); /* truncate the path */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2558
                        } catch (Exception e) {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2559
                            url1 = url;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2560
                        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2561
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2562
                        /* tryTransparentNTLMServer will always be true the first
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2563
                         * time around, but verify that the platform supports it
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2564
                         * otherwise don't try. */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2565
                        if (tryTransparentNTLMServer) {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2566
                            tryTransparentNTLMServer =
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2567
                                    NTLMAuthenticationProxy.supportsTransparentAuth;
8815
9a3f042d307e 6997851: Create NTLM AuthenticationCallBack class to avoid NTLM info leakage on client side
chegar
parents: 7022
diff changeset
  2568
                            /* If the platform supports transparent authentication
9a3f042d307e 6997851: Create NTLM AuthenticationCallBack class to avoid NTLM info leakage on client side
chegar
parents: 7022
diff changeset
  2569
                             * then check if we are in a secure environment
9a3f042d307e 6997851: Create NTLM AuthenticationCallBack class to avoid NTLM info leakage on client side
chegar
parents: 7022
diff changeset
  2570
                             * whether, or not, we should try transparent authentication.*/
9a3f042d307e 6997851: Create NTLM AuthenticationCallBack class to avoid NTLM info leakage on client side
chegar
parents: 7022
diff changeset
  2571
                            if (tryTransparentNTLMServer) {
9a3f042d307e 6997851: Create NTLM AuthenticationCallBack class to avoid NTLM info leakage on client side
chegar
parents: 7022
diff changeset
  2572
                                tryTransparentNTLMServer =
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2573
                                        NTLMAuthenticationProxy.isTrustedSite(url);
8815
9a3f042d307e 6997851: Create NTLM AuthenticationCallBack class to avoid NTLM info leakage on client side
chegar
parents: 7022
diff changeset
  2574
                            }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2575
                        }
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2576
                        a = null;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2577
                        if (tryTransparentNTLMServer) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  2578
                            logger.finest("Trying Transparent NTLM authentication");
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2579
                        } else {
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2580
                            a = privilegedRequestPasswordAuthentication(
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2581
                                authenticator,
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2582
                                url.getHost(), addr, port, url.getProtocol(),
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2583
                                "", scheme, url, RequestorType.SERVER);
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2584
                        }
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2585
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2586
                        /* If we are not trying transparent authentication then
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2587
                         * we need to have a PasswordAuthentication instance. For
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2588
                         * transparent authentication (Windows only) the username
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2589
                         * and password will be picked up from the current logged
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2590
                         * on users credentials.
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2591
                         */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2592
                        if (tryTransparentNTLMServer ||
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2593
                              (!tryTransparentNTLMServer && a != null)) {
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2594
                            ret = NTLMAuthenticationProxy.proxy.create(false,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2595
                                     url1, a, getAuthenticatorKey());
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2596
                        }
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2597
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2598
                        /* set to false so that we do not try again */
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2599
                        tryTransparentNTLMServer = false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2600
                    }
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2601
                    break;
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2602
                case UNKNOWN:
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2603
                    if (logger.isLoggable(PlatformLogger.Level.FINEST)) {
16839
d0f2e97b7359 8010297: Missing isLoggable() checks in logging code
anthony
parents: 16007
diff changeset
  2604
                        logger.finest("Unknown/Unsupported authentication scheme: " + scheme);
d0f2e97b7359 8010297: Missing isLoggable() checks in logging code
anthony
parents: 16007
diff changeset
  2605
                    }
10596
39b3a979e600 7090158: Networking Libraries don't build with javac -Werror
chegar
parents: 10136
diff changeset
  2606
                /*fall through*/
3859
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2607
                default:
8b82336dedb3 6882594: Remove static dependancy on NTLM authentication
chegar
parents: 3465
diff changeset
  2608
                    throw new AssertionError("should not reach here");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2609
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2610
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2611
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2612
            // For backwards compatibility, we also try defaultAuth
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2613
            // REMIND:  Get rid of this for JDK2.0.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2614
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2615
            if (ret == null && defaultAuth != null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2616
                && defaultAuth.schemeSupported(scheme)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2617
                String a = defaultAuth.authString(url, scheme, realm);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2618
                if (a != null) {
42351
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2619
                    ret = new BasicAuthentication (false, url, realm, a,
85ed90be0ae1 8169495: Add a method to set an Authenticator on a HttpURLConnection.
dfuchs
parents: 41579
diff changeset
  2620
                                    getAuthenticatorKey());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2621
                    // not in cache by default - cache on success
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2622
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2623
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2624
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2625
            if (ret != null ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2626
                if (!ret.setHeaders(this, p, raw)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2627
                    ret = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2628
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2629
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2630
        }
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2631
        if (logger.isLoggable(PlatformLogger.Level.FINER)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  2632
            logger.finer("Server Authentication for " + authhdr.toString() +" returned " + (ret != null ? ret.toString() : "null"));
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2633
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2634
        return ret;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2635
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2636
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2637
    /* inclose will be true if called from close(), in which case we
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2638
     * force the call to check because this is the last chance to do so.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2639
     * If not in close(), then the authentication info could arrive in a trailer
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2640
     * field, which we have not read yet.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2641
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2642
    private void checkResponseCredentials (boolean inClose) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2643
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2644
            if (!needToCheck)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2645
                return;
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2646
            if ((validateProxy && currentProxyCredentials != null) &&
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2647
                (currentProxyCredentials instanceof DigestAuthentication)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2648
                String raw = responses.findValue ("Proxy-Authentication-Info");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2649
                if (inClose || (raw != null)) {
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2650
                    DigestAuthentication da = (DigestAuthentication)
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2651
                        currentProxyCredentials;
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2652
                    da.checkResponse (raw, method, getRequestURI());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2653
                    currentProxyCredentials = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2654
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2655
            }
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2656
            if ((validateServer && currentServerCredentials != null) &&
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2657
                (currentServerCredentials instanceof DigestAuthentication)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2658
                String raw = responses.findValue ("Authentication-Info");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2659
                if (inClose || (raw != null)) {
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2660
                    DigestAuthentication da = (DigestAuthentication)
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2661
                        currentServerCredentials;
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2662
                    da.checkResponse (raw, method, url);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2663
                    currentServerCredentials = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2664
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2665
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2666
            if ((currentServerCredentials==null) && (currentProxyCredentials == null)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2667
                needToCheck = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2668
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2669
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2670
            disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2671
            connected = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2672
            throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2673
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2674
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2675
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2676
   /* The request URI used in the request line for this request.
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2677
    * Also, needed for digest authentication
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2678
    */
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2679
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2680
    String requestURI = null;
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2681
4150
74dfe4a968c6 6890349: Fix #6870935 in jdk7/pit/b74 caused HttpClinet's check for "proxy capture" attack by-passed.
michaelm
parents: 4047
diff changeset
  2682
    String getRequestURI() throws IOException {
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2683
        if (requestURI == null) {
4150
74dfe4a968c6 6890349: Fix #6870935 in jdk7/pit/b74 caused HttpClinet's check for "proxy capture" attack by-passed.
michaelm
parents: 4047
diff changeset
  2684
            requestURI = http.getURLFile();
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2685
        }
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2686
        return requestURI;
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2687
    }
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2688
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2689
    /* Tells us whether to follow a redirect.  If so, it
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2690
     * closes the connection (break any keep-alive) and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2691
     * resets the url, re-connects, and resets the request
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2692
     * property.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2693
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2694
    private boolean followRedirect() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2695
        if (!getInstanceFollowRedirects()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2696
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2697
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2698
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2699
        final int stat = getResponseCode();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2700
        if (stat < 300 || stat > 307 || stat == 306
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2701
                                || stat == HTTP_NOT_MODIFIED) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2702
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2703
        }
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2704
        final String loc = getHeaderField("Location");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2705
        if (loc == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2706
            /* this should be present - if not, we have no choice
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2707
             * but to go forward w/ the response we got
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2708
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2709
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2710
        }
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2711
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2712
        URL locUrl;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2713
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2714
            locUrl = new URL(loc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2715
            if (!url.getProtocol().equalsIgnoreCase(locUrl.getProtocol())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2716
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2717
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2718
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2719
        } catch (MalformedURLException mue) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2720
          // treat loc as a relative URI to conform to popular browsers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2721
          locUrl = new URL(url, loc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2722
        }
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2723
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2724
        final URL locUrl0 = locUrl;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2725
        socketPermission = null; // force recalculation
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2726
        SocketPermission p = URLtoSocketPermission(locUrl);
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2727
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2728
        if (p != null) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2729
            try {
30685
5806d3adbd6b 8077155: LoginContext Subject ignored by jdk8 sun.net.www.protocol.http.HttpURLConnection
robm
parents: 29986
diff changeset
  2730
                return AccessController.doPrivilegedWithCombiner(
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 28545
diff changeset
  2731
                    new PrivilegedExceptionAction<>() {
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2732
                        public Boolean run() throws IOException {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2733
                            return followRedirect0(loc, stat, locUrl0);
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2734
                        }
20787
ab071ce90368 8014719: HttpClient/ProxyTest.java failing with IAE HttpURLPermission.parseURI
michaelm
parents: 18577
diff changeset
  2735
                    }, null, p
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2736
                );
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2737
            } catch (PrivilegedActionException e) {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2738
                throw (IOException) e.getException();
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2739
            }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2740
        } else {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2741
            // run without additional permission
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2742
            return followRedirect0(loc, stat, locUrl);
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2743
        }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2744
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2745
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2746
    /* Tells us whether to follow a redirect.  If so, it
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2747
     * closes the connection (break any keep-alive) and
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2748
     * resets the url, re-connects, and resets the request
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2749
     * property.
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2750
     */
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2751
    private boolean followRedirect0(String loc, int stat, URL locUrl)
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2752
        throws IOException
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  2753
    {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2754
        disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2755
        if (streaming()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2756
            throw new HttpRetryException (RETRY_MSG3, stat, loc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2757
        }
18178
ee71c923891d 8016747: Replace deprecated PlatformLogger isLoggable(int) with isLoggable(Level)
chegar
parents: 17952
diff changeset
  2758
        if (logger.isLoggable(PlatformLogger.Level.FINE)) {
3866
34cd368bd2dd 6882384: Update http protocol handler to use PlatformLogger
chegar
parents: 3859
diff changeset
  2759
            logger.fine("Redirected from " + url + " to " + locUrl);
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2760
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2761
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2762
        // clear out old response headers!!!!
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2763
        responses = new MessageHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2764
        if (stat == HTTP_USE_PROXY) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2765
            /* This means we must re-request the resource through the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2766
             * proxy denoted in the "Location:" field of the response.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2767
             * Judging by the spec, the string in the Location header
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2768
             * _should_ denote a URL - let's hope for "http://my.proxy.org"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2769
             * Make a new HttpClient to the proxy, using HttpClient's
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2770
             * Instance-specific proxy fields, but note we're still fetching
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2771
             * the same URL.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2772
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2773
            String proxyHost = locUrl.getHost();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2774
            int proxyPort = locUrl.getPort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2775
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2776
            SecurityManager security = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2777
            if (security != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2778
                security.checkConnect(proxyHost, proxyPort);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2779
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2780
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2781
            setProxiedClient (url, proxyHost, proxyPort);
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2782
            requests.set(0, method + " " + getRequestURI()+" "  +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2783
                             httpVersion, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2784
            connected = true;
28545
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2785
            // need to remember this in case NTLM proxy authentication gets
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2786
            // used. We can't use transparent authentication when user
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2787
            // doesn't know about proxy.
1628787df68a 8048035: Ensure proper proxy protocols
michaelm
parents: 27177
diff changeset
  2788
            useProxyResponseCode = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2789
        } else {
52169
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2790
            final URL prevURL = url;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2791
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2792
            // maintain previous headers, just change the name
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2793
            // of the file we're getting
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2794
            url = locUrl;
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2795
            requestURI = null; // force it to be recalculated
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2796
            if (method.equals("POST") && !Boolean.getBoolean("http.strictPostRedirect") && (stat!=307)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2797
                /* The HTTP/1.1 spec says that a redirect from a POST
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2798
                 * *should not* be immediately turned into a GET, and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2799
                 * that some HTTP/1.0 clients incorrectly did this.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2800
                 * Correct behavior redirects a POST to another POST.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2801
                 * Unfortunately, since most browsers have this incorrect
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2802
                 * behavior, the web works this way now.  Typical usage
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2803
                 * seems to be:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2804
                 *   POST a login code or passwd to a web page.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2805
                 *   after validation, the server redirects to another
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2806
                 *     (welcome) page
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2807
                 *   The second request is (erroneously) expected to be GET
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2808
                 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2809
                 * We will do the incorrect thing (POST-->GET) by default.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2810
                 * We will provide the capability to do the "right" thing
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2811
                 * (POST-->POST) by a system property, "http.strictPostRedirect=true"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2812
                 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2813
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2814
                requests = new MessageHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2815
                setRequests = false;
21952
6fdca3d54613 8029127: Redirected POST request throws IllegalStateException on HttpURLConnection.getInputStream
michaelm
parents: 21428
diff changeset
  2816
                super.setRequestMethod("GET"); // avoid the connecting check
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2817
                poster = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2818
                if (!checkReuseConnection())
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2819
                    connect();
52169
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2820
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2821
                if (!sameDestination(prevURL, url)) {
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2822
                    // Ensures pre-redirect user-set cookie will not be reset.
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2823
                    // CookieHandler, if any, will be queried to determine
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2824
                    // cookies for redirected URL, if any.
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2825
                    userCookies = null;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2826
                    userCookies2 = null;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2827
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2828
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2829
                if (!checkReuseConnection())
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2830
                    connect();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2831
                /* Even after a connect() call, http variable still can be
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2832
                 * null, if a ResponseCache has been installed and it returns
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2833
                 * a non-null CacheResponse instance. So check nullity before using it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2834
                 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2835
                 * And further, if http is null, there's no need to do anything
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2836
                 * about request headers because successive http session will use
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2837
                 * cachedInputStream/cachedHeaders anyway, which is returned by
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2838
                 * CacheResponse.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2839
                 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2840
                if (http != null) {
3952
dc329398de30 6870935: DIGEST proxy authentication fails to connect to URLs with no trailing slash
michaelm
parents: 3866
diff changeset
  2841
                    requests.set(0, method + " " + getRequestURI()+" "  +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2842
                                 httpVersion, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2843
                    int port = url.getPort();
24869
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  2844
                    String host = stripIPv6ZoneId(url.getHost());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2845
                    if (port != -1 && port != url.getDefaultPort()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2846
                        host += ":" + String.valueOf(port);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2847
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2848
                    requests.set("Host", host);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2849
                }
52169
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2850
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2851
                if (!sameDestination(prevURL, url)) {
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2852
                    // Redirecting to a different destination will drop any
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2853
                    // security-sensitive headers, regardless of whether
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2854
                    // they are user-set or not. CookieHandler, if any, will be
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2855
                    // queried to determine cookies for redirected URL, if any.
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2856
                    userCookies = null;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2857
                    userCookies2 = null;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2858
                    requests.remove("Cookie");
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2859
                    requests.remove("Cookie2");
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2860
                    requests.remove("Authorization");
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2861
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2862
                    // check for preemptive authorization
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2863
                    AuthenticationInfo sauth =
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2864
                            AuthenticationInfo.getServerAuth(url, getAuthenticatorKey());
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2865
                    if (sauth != null && sauth.supportsPreemptiveAuthorization() ) {
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2866
                        // Sets "Authorization"
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2867
                        requests.setIfNotSet(sauth.getHeaderName(), sauth.getHeaderValue(url,method));
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2868
                        currentServerCredentials = sauth;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2869
                    }
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2870
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2871
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2872
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2873
        return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2874
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2875
52169
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2876
    /* Returns true iff the given URLs have the same host and effective port. */
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2877
    private static boolean sameDestination(URL firstURL, URL secondURL) {
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2878
        assert firstURL.getProtocol().equalsIgnoreCase(secondURL.getProtocol()):
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2879
               "protocols not equal: " + firstURL +  " - " + secondURL;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2880
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2881
        if (!firstURL.getHost().equalsIgnoreCase(secondURL.getHost()))
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2882
            return false;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2883
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2884
        int firstPort = firstURL.getPort();
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2885
        if (firstPort == -1)
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2886
            firstPort = firstURL.getDefaultPort();
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2887
        int secondPort = secondURL.getPort();
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2888
        if (secondPort == -1)
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2889
            secondPort = secondURL.getDefaultPort();
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2890
        if (firstPort != secondPort)
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2891
            return false;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2892
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2893
        return true;
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2894
    }
ca48ad1b6e21 8196902: Better HTTP Redirection
michaelm
parents: 47478
diff changeset
  2895
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2896
    /* dummy byte buffer for reading off socket prior to closing */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2897
    byte[] cdata = new byte [128];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2898
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2899
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2900
     * Reset (without disconnecting the TCP conn) in order to do another transaction with this instance
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2901
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2902
    private void reset() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2903
        http.reuse = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2904
        /* must save before calling close */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2905
        reuseClient = http;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2906
        InputStream is = http.getInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2907
        if (!method.equals("HEAD")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2908
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2909
                /* we want to read the rest of the response without using the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2910
                 * hurry mechanism, because that would close the connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2911
                 * if everything is not available immediately
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2912
                 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2913
                if ((is instanceof ChunkedInputStream) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2914
                    (is instanceof MeteredStream)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2915
                    /* reading until eof will not block */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2916
                    while (is.read (cdata) > 0) {}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2917
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2918
                    /* raw stream, which will block on read, so only read
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2919
                     * the expected number of bytes, probably 0
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2920
                     */
3059
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2921
                    long cl = 0;
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2922
                    int n = 0;
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2923
                    String cls = responses.findValue ("Content-Length");
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2924
                    if (cls != null) {
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2925
                        try {
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2926
                            cl = Long.parseLong (cls);
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2927
                        } catch (NumberFormatException e) {
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2928
                            cl = 0;
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2929
                        }
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2930
                    }
2975ff687a6b 6811297: Add more logging to HTTP protocol handler
jccollet
parents: 2942
diff changeset
  2931
                    for (long i=0; i<cl; ) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2932
                        if ((n = is.read (cdata)) == -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2933
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2934
                        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2935
                            i+= n;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2936
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2937
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2938
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2939
            } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2940
                http.reuse = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2941
                reuseClient = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2942
                disconnectInternal();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2943
                return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2944
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2945
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2946
                if (is instanceof MeteredStream) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2947
                    is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2948
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2949
            } catch (IOException e) { }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2950
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2951
        responseCode = -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2952
        responses = new MessageHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2953
        connected = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2954
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2955
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2956
    /**
5161
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2957
     * Disconnect from the web server at the first 401 error. Do not
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2958
     * disconnect when using a proxy, a good proxy should have already
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2959
     * closed the connection to the web server.
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2960
     */
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2961
    private void disconnectWeb() throws IOException {
5979
26b9b2b1b37b 6954525: Testcase failure java/net/Authenticator/B4769350.java
chegar
parents: 5506
diff changeset
  2962
        if (usingProxy() && http.isKeepingAlive()) {
5161
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2963
            responseCode = -1;
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2964
            // clean up, particularly, skip the content part
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2965
            // of a 401 error response
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2966
            reset();
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2967
        } else {
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2968
            disconnectInternal();
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2969
        }
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2970
    }
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2971
bad56b1f38fb 6586707: NTLM authentication with proxy fails
weijun
parents: 4923
diff changeset
  2972
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2973
     * Disconnect from the server (for internal use)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2974
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2975
    private void disconnectInternal() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2976
        responseCode = -1;
78
65353d0d0e31 6660405: HttpURLConnection returns the wrong InputStream
jccollet
parents: 74
diff changeset
  2977
        inputStream = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2978
        if (pi != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2979
            pi.finishTracking();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2980
            pi = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2981
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2982
        if (http != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2983
            http.closeServer();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2984
            http = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2985
            connected = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2986
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2987
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2988
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2989
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2990
     * Disconnect from the server (public API)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2991
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2992
    public void disconnect() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2993
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2994
        responseCode = -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2995
        if (pi != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2996
            pi.finishTracking();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2997
            pi = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2998
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2999
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3000
        if (http != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3001
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3002
             * If we have an input stream this means we received a response
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3003
             * from the server. That stream may have been read to EOF and
47478
438e0c9f2f17 8190382: fix small typographic errors in comments
smarks
parents: 47411
diff changeset
  3004
             * depending on the stream type may already be closed or
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3005
             * the http client may be returned to the keep-alive cache.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3006
             * If the http client has been returned to the keep-alive cache
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3007
             * it may be closed (idle timeout) or may be allocated to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3008
             * another request.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3009
             *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3010
             * In other to avoid timing issues we close the input stream
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3011
             * which will either close the underlying connection or return
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3012
             * the client to the cache. If there's a possibility that the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3013
             * client has been returned to the cache (ie: stream is a keep
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3014
             * alive stream or a chunked input stream) then we remove an
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3015
             * idle connection to the server. Note that this approach
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3016
             * can be considered an approximation in that we may close a
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3017
             * different idle connection to that used by the request.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3018
             * Additionally it's possible that we close two connections
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3019
             * - the first becuase it wasn't an EOF (and couldn't be
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3020
             * hurried) - the second, another idle connection to the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3021
             * same server. The is okay because "disconnect" is an
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3022
             * indication that the application doesn't intend to access
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3023
             * this http server for a while.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3024
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3025
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3026
            if (inputStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3027
                HttpClient hc = http;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3028
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3029
                // un-synchronized
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3030
                boolean ka = hc.isKeepingAlive();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3031
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3032
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3033
                    inputStream.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3034
                } catch (IOException ioe) { }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3035
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3036
                // if the connection is persistent it may have been closed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3037
                // or returned to the keep-alive cache. If it's been returned
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3038
                // to the keep-alive cache then we would like to close it
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3039
                // but it may have been allocated
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3040
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3041
                if (ka) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3042
                    hc.closeIdleConnection();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3043
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3044
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3045
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3046
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3047
                // We are deliberatly being disconnected so HttpClient
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3048
                // should not try to resend the request no matter what stage
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3049
                // of the connection we are in.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3050
                http.setDoNotRetry(true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3051
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3052
                http.closeServer();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3053
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3054
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3055
            //      poster = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3056
            http = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3057
            connected = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3058
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3059
        cachedInputStream = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3060
        if (cachedHeaders != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3061
            cachedHeaders.reset();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3062
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3063
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3064
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3065
    public boolean usingProxy() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3066
        if (http != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3067
            return (http.getProxyHostUsed() != null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3068
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3069
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3070
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3071
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3072
    // constant strings represent set-cookie header names
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31061
diff changeset
  3073
    private static final String SET_COOKIE = "set-cookie";
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31061
diff changeset
  3074
    private static final String SET_COOKIE2 = "set-cookie2";
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3075
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3076
    /**
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3077
     * Returns a filtered version of the given headers value.
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3078
     *
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3079
     * Note: The implementation currently only filters out HttpOnly cookies
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3080
     *       from Set-Cookie and Set-Cookie2 headers.
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3081
     */
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3082
    private String filterHeaderField(String name, String value) {
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3083
        if (value == null)
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3084
            return null;
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3085
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3086
        if (SET_COOKIE.equalsIgnoreCase(name) ||
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3087
            SET_COOKIE2.equalsIgnoreCase(name)) {
18577
f76979ce4bc4 8015799: HttpURLConnection.getHeaderFields() throws IllegalArgumentException
jzavgren
parents: 18541
diff changeset
  3088
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3089
            // Filtering only if there is a cookie handler. [Assumption: the
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3090
            // cookie handler will store/retrieve the HttpOnly cookies]
53018
8bf9268df0e2 8215281: Use String.isEmpty() when applicable in java.base
redestad
parents: 52499
diff changeset
  3091
            if (cookieHandler == null || value.isEmpty())
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3092
                return value;
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3093
32834
e1dca5fe4de3 8137056: Move SharedSecrets and interface friends out of sun.misc
chegar
parents: 32649
diff changeset
  3094
            JavaNetHttpCookieAccess access =
e1dca5fe4de3 8137056: Move SharedSecrets and interface friends out of sun.misc
chegar
parents: 32649
diff changeset
  3095
                    SharedSecrets.getJavaNetHttpCookieAccess();
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
  3096
            StringJoiner retValue = new StringJoiner(",");  // RFC 2965, comma separated
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3097
            List<HttpCookie> cookies = access.parse(value);
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3098
            for (HttpCookie cookie : cookies) {
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3099
                // skip HttpOnly cookies
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
  3100
                if (!cookie.isHttpOnly())
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
  3101
                    retValue.add(access.header(cookie));
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3102
            }
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
  3103
            return retValue.toString();
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3104
        }
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3105
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3106
        return value;
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3107
    }
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3108
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3109
    // Cache the filtered response headers so that they don't need
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3110
    // to be generated for every getHeaderFields() call.
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3111
    private Map<String, List<String>> filteredHeaders;  // null
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3112
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3113
    private Map<String, List<String>> getFilteredHeaderFields() {
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3114
        if (filteredHeaders != null)
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3115
            return filteredHeaders;
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3116
11518
7e720dd82e9e 7128648: HttpURLConnection.getHeaderFields should return an unmodifiable Map
chegar
parents: 11284
diff changeset
  3117
        Map<String, List<String>> headers, tmpMap = new HashMap<>();
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3118
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3119
        if (cachedHeaders != null)
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3120
            headers = cachedHeaders.getHeaders();
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3121
        else
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3122
            headers = responses.getHeaders();
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3123
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3124
        for (Map.Entry<String, List<String>> e: headers.entrySet()) {
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3125
            String key = e.getKey();
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3126
            List<String> values = e.getValue(), filteredVals = new ArrayList<>();
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3127
            for (String value : values) {
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3128
                String fVal = filterHeaderField(key, value);
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3129
                if (fVal != null)
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3130
                    filteredVals.add(fVal);
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3131
            }
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3132
            if (!filteredVals.isEmpty())
11518
7e720dd82e9e 7128648: HttpURLConnection.getHeaderFields should return an unmodifiable Map
chegar
parents: 11284
diff changeset
  3133
                tmpMap.put(key, Collections.unmodifiableList(filteredVals));
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3134
        }
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3135
11518
7e720dd82e9e 7128648: HttpURLConnection.getHeaderFields should return an unmodifiable Map
chegar
parents: 11284
diff changeset
  3136
        return filteredHeaders = Collections.unmodifiableMap(tmpMap);
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3137
    }
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3138
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3139
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3140
     * Gets a header field by name. Returns null if not known.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3141
     * @param name the name of the header field
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3142
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3143
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3144
    public String getHeaderField(String name) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3145
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3146
            getInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3147
        } catch (IOException e) {}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3148
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3149
        if (cachedHeaders != null) {
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3150
            return filterHeaderField(name, cachedHeaders.findValue(name));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3151
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3152
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3153
        return filterHeaderField(name, responses.findValue(name));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3154
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3155
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3156
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3157
     * Returns an unmodifiable Map of the header fields.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3158
     * The Map keys are Strings that represent the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3159
     * response-header field names. Each Map value is an
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3160
     * unmodifiable List of Strings that represents
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3161
     * the corresponding field values.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3162
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3163
     * @return a Map of header fields
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3164
     * @since 1.4
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3165
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3166
    @Override
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  3167
    public Map<String, List<String>> getHeaderFields() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3168
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3169
            getInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3170
        } catch (IOException e) {}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3171
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3172
        return getFilteredHeaderFields();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3173
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3174
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3175
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3176
     * Gets a header field by index. Returns null if not known.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3177
     * @param n the index of the header field
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3178
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3179
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3180
    public String getHeaderField(int n) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3181
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3182
            getInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3183
        } catch (IOException e) {}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3184
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3185
        if (cachedHeaders != null) {
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3186
           return filterHeaderField(cachedHeaders.getKey(n),
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3187
                                    cachedHeaders.getValue(n));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3188
        }
11284
2750cfd2352c 7095980: Ensure HttpURLConnection (and supporting APIs) don't expose HttpOnly cookies
chegar
parents: 10701
diff changeset
  3189
        return filterHeaderField(responses.getKey(n), responses.getValue(n));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3190
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3191
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3192
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3193
     * Gets a header field by index. Returns null if not known.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3194
     * @param n the index of the header field
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3195
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3196
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3197
    public String getHeaderFieldKey(int n) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3198
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3199
            getInputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3200
        } catch (IOException e) {}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3201
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3202
        if (cachedHeaders != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3203
            return cachedHeaders.getKey(n);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3204
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3205
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3206
        return responses.getKey(n);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3207
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3208
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3209
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3210
     * Sets request property. If a property with the key already
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3211
     * exists, overwrite its value with the new value.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3212
     * @param value the value to be set
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3213
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3214
    @Override
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3215
    public void setRequestProperty(String key, String value) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3216
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3217
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3218
            if (connected || connecting)
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3219
                throw new IllegalStateException("Already connected");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3220
            if (key == null)
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3221
                throw new NullPointerException("key is null");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3222
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3223
            if (isExternalMessageHeaderAllowed(key, value)) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3224
                requests.set(key, value);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3225
                if (!key.equalsIgnoreCase("Content-Type")) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3226
                    userHeaders.set(key, value);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3227
                }
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  3228
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3229
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3230
            connectionLock.unlock();
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  3231
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3232
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3233
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  3234
    MessageHeader getUserSetHeaders() {
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  3235
        return userHeaders;
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  3236
    }
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  3237
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3238
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3239
     * Adds a general request property specified by a
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3240
     * key-value pair.  This method will not overwrite
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3241
     * existing values associated with the same key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3242
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3243
     * @param   key     the keyword by which the request is known
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3244
     *                  (e.g., "<code>accept</code>").
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3245
     * @param   value  the value associated with it.
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3246
     * @see #getRequestProperty(java.lang.String)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3247
     * @since 1.4
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3248
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3249
    @Override
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3250
    public void addRequestProperty(String key, String value) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3251
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3252
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3253
            if (connected || connecting)
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3254
                throw new IllegalStateException("Already connected");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3255
            if (key == null)
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3256
                throw new NullPointerException("key is null");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3257
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3258
            if (isExternalMessageHeaderAllowed(key, value)) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3259
                requests.add(key, value);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3260
                if (!key.equalsIgnoreCase("Content-Type")) {
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  3261
                    userHeaders.add(key, value);
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3262
                }
17473
35cd9b3a98ff 8010464: Evolve java networking same origin policy
michaelm
parents: 16839
diff changeset
  3263
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3264
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3265
            connectionLock.unlock();
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  3266
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3267
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3268
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3269
    //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3270
    // Set a property for authentication.  This can safely disregard
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3271
    // the connected test.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3272
    //
4157
558590fb3b49 6893238: Move NTLM and SPNEGO implementations into separate packages
chegar
parents: 4047
diff changeset
  3273
    public void setAuthenticationProperty(String key, String value) {
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3274
        // use lock here to avoid the need for external synchronization
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3275
        // in AuthenticationInfo subclasses
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3276
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3277
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3278
            checkMessageHeader(key, value);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3279
            requests.set(key, value);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3280
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3281
            connectionLock.unlock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3282
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3283
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3284
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3285
    @Override
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3286
    public String getRequestProperty (String key) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3287
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3288
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3289
            if (key == null) {
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  3290
                return null;
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  3291
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3292
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3293
            // don't return headers containing security sensitive information
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3294
            for (int i = 0; i < EXCLUDE_HEADERS.length; i++) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3295
                if (key.equalsIgnoreCase(EXCLUDE_HEADERS[i])) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3296
                    return null;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3297
                }
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  3298
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3299
            if (!setUserCookies) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3300
                if (key.equalsIgnoreCase("Cookie")) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3301
                    return userCookies;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3302
                }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3303
                if (key.equalsIgnoreCase("Cookie2")) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3304
                    return userCookies2;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3305
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3306
            }
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3307
            return requests.findValue(key);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3308
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3309
            connectionLock.unlock();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3310
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3311
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3312
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3313
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3314
     * Returns an unmodifiable Map of general request
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3315
     * properties for this connection. The Map keys
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3316
     * are Strings that represent the request-header
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3317
     * field names. Each Map value is a unmodifiable List
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3318
     * of Strings that represents the corresponding
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3319
     * field values.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3320
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3321
     * @return  a Map of the general request properties for this connection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3322
     * @throws IllegalStateException if already connected
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3323
     * @since 1.4
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3324
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3325
    @Override
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3326
    public Map<String, List<String>> getRequestProperties() {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3327
        connectionLock.lock();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3328
        try {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3329
            if (connected)
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3330
                throw new IllegalStateException("Already connected");
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3331
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3332
            // exclude headers containing security-sensitive info
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3333
            if (setUserCookies) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3334
                return requests.getHeaders(EXCLUDE_HEADERS);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3335
            }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3336
            /*
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3337
             * The cookies in the requests message headers may have
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3338
             * been modified. Use the saved user cookies instead.
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3339
             */
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3340
            Map<String, List<String>> userCookiesMap = null;
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3341
            if (userCookies != null || userCookies2 != null) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3342
                userCookiesMap = new HashMap<>();
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3343
                if (userCookies != null) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3344
                    userCookiesMap.put("Cookie", Arrays.asList(userCookies));
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3345
                }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3346
                if (userCookies2 != null) {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3347
                    userCookiesMap.put("Cookie2", Arrays.asList(userCookies2));
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3348
                }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3349
            }
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3350
            return requests.filterAndAddHeaders(EXCLUDE_HEADERS2, userCookiesMap);
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3351
        } finally {
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3352
            connectionLock.unlock();
6876
13fdbd146659 6980004: limit HTTP request cookie headers in HttpURLConnection
michaelm
parents: 6873
diff changeset
  3353
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3354
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3355
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3356
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3357
    public void setConnectTimeout(int timeout) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3358
        if (timeout < 0)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3359
            throw new IllegalArgumentException("timeouts can't be negative");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3360
        connectTimeout = timeout;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3361
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3362
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3363
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3364
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3365
     * Returns setting for connect timeout.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3366
     * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3367
     * 0 return implies that the option is disabled
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3368
     * (i.e., timeout of infinity).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3369
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3370
     * @return an <code>int</code> that indicates the connect timeout
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3371
     *         value in milliseconds
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3372
     * @see java.net.URLConnection#setConnectTimeout(int)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3373
     * @see java.net.URLConnection#connect()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3374
     * @since 1.5
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3375
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3376
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3377
    public int getConnectTimeout() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3378
        return (connectTimeout < 0 ? 0 : connectTimeout);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3379
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3380
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3381
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3382
     * Sets the read timeout to a specified timeout, in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3383
     * milliseconds. A non-zero value specifies the timeout when
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3384
     * reading from Input stream when a connection is established to a
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3385
     * resource. If the timeout expires before there is data available
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3386
     * for read, a java.net.SocketTimeoutException is raised. A
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3387
     * timeout of zero is interpreted as an infinite timeout.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3388
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3389
     * <p> Some non-standard implementation of this method ignores the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3390
     * specified timeout. To see the read timeout set, please call
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3391
     * getReadTimeout().
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3392
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3393
     * @param timeout an <code>int</code> that specifies the timeout
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3394
     * value to be used in milliseconds
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3395
     * @throws IllegalArgumentException if the timeout parameter is negative
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3396
     *
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3397
     * @see java.net.URLConnection#getReadTimeout()
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3398
     * @see java.io.InputStream#read()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3399
     * @since 1.5
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3400
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3401
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3402
    public void setReadTimeout(int timeout) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3403
        if (timeout < 0)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3404
            throw new IllegalArgumentException("timeouts can't be negative");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3405
        readTimeout = timeout;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3406
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3407
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3408
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3409
     * Returns setting for read timeout. 0 return implies that the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3410
     * option is disabled (i.e., timeout of infinity).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3411
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3412
     * @return an <code>int</code> that indicates the read timeout
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3413
     *         value in milliseconds
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3414
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3415
     * @see java.net.URLConnection#setReadTimeout(int)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3416
     * @see java.io.InputStream#read()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3417
     * @since 1.5
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3418
     */
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3419
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3420
    public int getReadTimeout() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3421
        return readTimeout < 0 ? 0 : readTimeout;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3422
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3423
11528
638ca25aec87 7129083: CookieManager does not store cookies if url is read before setting cookie manager
chegar
parents: 11518
diff changeset
  3424
    public CookieHandler getCookieHandler() {
638ca25aec87 7129083: CookieManager does not store cookies if url is read before setting cookie manager
chegar
parents: 11518
diff changeset
  3425
        return cookieHandler;
638ca25aec87 7129083: CookieManager does not store cookies if url is read before setting cookie manager
chegar
parents: 11518
diff changeset
  3426
    }
638ca25aec87 7129083: CookieManager does not store cookies if url is read before setting cookie manager
chegar
parents: 11518
diff changeset
  3427
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3428
    String getMethod() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3429
        return method;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3430
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3431
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  3432
    private MessageHeader mapToMessageHeader(Map<String, List<String>> map) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3433
        MessageHeader headers = new MessageHeader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3434
        if (map == null || map.isEmpty()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3435
            return headers;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3436
        }
51
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  3437
        for (Map.Entry<String, List<String>> entry : map.entrySet()) {
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  3438
            String key = entry.getKey();
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  3439
            List<String> values = entry.getValue();
6fe31bc95bbc 6600143: Remove another 450 unnecessary casts
martin
parents: 2
diff changeset
  3440
            for (String value : values) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3441
                if (key == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3442
                    headers.prepend(key, value);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3443
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3444
                    headers.add(key, value);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3445
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3446
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3447
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3448
        return headers;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3449
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3450
24869
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3451
    /**
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3452
     * Returns the given host, without the IPv6 Zone Id, if present.
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3453
     * (e.g. [fe80::a00:27ff:aaaa:aaaa%eth0] -> [fe80::a00:27ff:aaaa:aaaa])
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3454
     *
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3455
     * @param host host address (not null, not empty)
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3456
     * @return host address without Zone Id
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3457
     */
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3458
    static String stripIPv6ZoneId(String host) {
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3459
        if (host.charAt(0) != '[') { // not an IPv6-literal
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3460
            return host;
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3461
        }
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3462
        int i = host.lastIndexOf('%');
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3463
        if (i == -1) { // doesn't contain zone_id
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3464
            return host;
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3465
        }
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3466
        return host.substring(0, i) + "]";
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3467
    }
6cdd5aa7e259 8027308: HttpURLConnection should better handle URLs with literal IPv6 addresses
prappo
parents: 22348
diff changeset
  3468
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3469
    /* The purpose of this wrapper is just to capture the close() call
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3470
     * so we can check authentication information that may have
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3471
     * arrived in a Trailer field
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3472
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3473
    class HttpInputStream extends FilterInputStream {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3474
        private CacheRequest cacheRequest;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3475
        private OutputStream outputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3476
        private boolean marked = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3477
        private int inCache = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3478
        private int markCount = 0;
17952
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3479
        private boolean closed;  // false
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3480
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3481
        public HttpInputStream (InputStream is) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3482
            super (is);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3483
            this.cacheRequest = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3484
            this.outputStream = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3485
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3486
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3487
        public HttpInputStream (InputStream is, CacheRequest cacheRequest) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3488
            super (is);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3489
            this.cacheRequest = cacheRequest;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3490
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3491
                this.outputStream = cacheRequest.getBody();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3492
            } catch (IOException ioex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3493
                this.cacheRequest.abort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3494
                this.cacheRequest = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3495
                this.outputStream = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3496
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3497
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3498
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3499
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3500
         * Marks the current position in this input stream. A subsequent
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3501
         * call to the <code>reset</code> method repositions this stream at
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3502
         * the last marked position so that subsequent reads re-read the same
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3503
         * bytes.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3504
         * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3505
         * The <code>readlimit</code> argument tells this input stream to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3506
         * allow that many bytes to be read before the mark position gets
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3507
         * invalidated.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3508
         * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3509
         * This method simply performs <code>in.mark(readlimit)</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3510
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3511
         * @param   readlimit   the maximum limit of bytes that can be read before
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3512
         *                      the mark position becomes invalid.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3513
         * @see     java.io.FilterInputStream#in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3514
         * @see     java.io.FilterInputStream#reset()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3515
         */
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3516
        // safe to use synchronized here: super method is synchronized too
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3517
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3518
        public synchronized void mark(int readlimit) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3519
            super.mark(readlimit);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3520
            if (cacheRequest != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3521
                marked = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3522
                markCount = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3523
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3524
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3525
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3526
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3527
         * Repositions this stream to the position at the time the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3528
         * <code>mark</code> method was last called on this input stream.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3529
         * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3530
         * This method
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3531
         * simply performs <code>in.reset()</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3532
         * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3533
         * Stream marks are intended to be used in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3534
         * situations where you need to read ahead a little to see what's in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3535
         * the stream. Often this is most easily done by invoking some
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3536
         * general parser. If the stream is of the type handled by the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3537
         * parse, it just chugs along happily. If the stream is not of
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3538
         * that type, the parser should toss an exception when it fails.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3539
         * If this happens within readlimit bytes, it allows the outer
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3540
         * code to reset the stream and try another parser.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3541
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3542
         * @exception  IOException  if the stream has not been marked or if the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3543
         *               mark has been invalidated.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3544
         * @see        java.io.FilterInputStream#in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3545
         * @see        java.io.FilterInputStream#mark(int)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3546
         */
57968
8595871a5446 JDK-8229867: first prototype
dfuchs
parents: 57879
diff changeset
  3547
        // safe to use synchronized here: super method is synchronized too
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3548
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3549
        public synchronized void reset() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3550
            super.reset();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3551
            if (cacheRequest != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3552
                marked = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3553
                inCache += markCount;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3554
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3555
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3556
17952
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3557
        private void ensureOpen() throws IOException {
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3558
            if (closed)
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3559
                throw new IOException("stream is closed");
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3560
        }
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3561
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3562
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3563
        public int read() throws IOException {
17952
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3564
            ensureOpen();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3565
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3566
                byte[] b = new byte[1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3567
                int ret = read(b);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3568
                return (ret == -1? ret : (b[0] & 0x00FF));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3569
            } catch (IOException ioex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3570
                if (cacheRequest != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3571
                    cacheRequest.abort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3572
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3573
                throw ioex;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3574
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3575
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3576
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3577
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3578
        public int read(byte[] b) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3579
            return read(b, 0, b.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3580
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3581
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3582
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3583
        public int read(byte[] b, int off, int len) throws IOException {
17952
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3584
            ensureOpen();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3585
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3586
                int newLen = super.read(b, off, len);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3587
                int nWrite;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3588
                // write to cache
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3589
                if (inCache > 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3590
                    if (inCache >= newLen) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3591
                        inCache -= newLen;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3592
                        nWrite = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3593
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3594
                        nWrite = newLen - inCache;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3595
                        inCache = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3596
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3597
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3598
                    nWrite = newLen;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3599
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3600
                if (nWrite > 0 && outputStream != null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3601
                    outputStream.write(b, off + (newLen-nWrite), nWrite);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3602
                if (marked) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3603
                    markCount += newLen;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3604
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3605
                return newLen;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3606
            } catch (IOException ioex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3607
                if (cacheRequest != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3608
                    cacheRequest.abort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3609
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3610
                throw ioex;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3611
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3612
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3613
6685
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3614
        /* skip() calls read() in order to ensure that entire response gets
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3615
         * cached. same implementation as InputStream.skip */
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3616
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3617
        private byte[] skipBuffer;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3618
        private static final int SKIP_BUFFER_SIZE = 8096;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3619
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3620
        @Override
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3621
        public long skip (long n) throws IOException {
17952
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3622
            ensureOpen();
6685
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3623
            long remaining = n;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3624
            int nr;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3625
            if (skipBuffer == null)
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3626
                skipBuffer = new byte[SKIP_BUFFER_SIZE];
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3627
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3628
            byte[] localSkipBuffer = skipBuffer;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3629
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3630
            if (n <= 0) {
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3631
                return 0;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3632
            }
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3633
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3634
            while (remaining > 0) {
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3635
                nr = read(localSkipBuffer, 0,
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3636
                          (int) Math.min(SKIP_BUFFER_SIZE, remaining));
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3637
                if (nr < 0) {
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3638
                    break;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3639
                }
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3640
                remaining -= nr;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3641
            }
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3642
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3643
            return n - remaining;
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3644
        }
36f070045e17 6550798: Using InputStream.skip with ResponseCache will cause partial data to be cached
michaelm
parents: 6673
diff changeset
  3645
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3646
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3647
        public void close () throws IOException {
17952
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3648
            if (closed)
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3649
                return;
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3650
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3651
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3652
                if (outputStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3653
                    if (read() != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3654
                        cacheRequest.abort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3655
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3656
                        outputStream.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3657
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3658
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3659
                super.close ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3660
            } catch (IOException ioex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3661
                if (cacheRequest != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3662
                    cacheRequest.abort();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3663
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3664
                throw ioex;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3665
            } finally {
17952
a5f2fb0e7457 8011719: Properties.loadFromXML fails with a chunked HTTP connection
chegar
parents: 17485
diff changeset
  3666
                closed = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3667
                HttpURLConnection.this.http = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3668
                checkResponseCredentials (true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3669
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3670
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3671
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3672
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3673
    class StreamingOutputStream extends FilterOutputStream {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3674
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  3675
        long expected;
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  3676
        long written;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3677
        boolean closed;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3678
        boolean error;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3679
        IOException errorExcp;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3680
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3681
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3682
         * expectedLength == -1 if the stream is chunked
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3683
         * expectedLength > 0 if the stream is fixed content-length
52499
768b1c612100 8213490: Networking area typos and inconsistencies cleanup
prappo
parents: 52427
diff changeset
  3684
         *    In the 2nd case, we make sure the expected number
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3685
         *    of bytes are actually written
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3686
         */
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  3687
        StreamingOutputStream (OutputStream os, long expectedLength) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3688
            super (os);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3689
            expected = expectedLength;
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  3690
            written = 0L;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3691
            closed = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3692
            error = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3693
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3694
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3695
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3696
        public void write (int b) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3697
            checkError();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3698
            written ++;
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  3699
            if (expected != -1L && written > expected) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3700
                throw new IOException ("too many bytes written");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3701
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3702
            out.write (b);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3703
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3704
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3705
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3706
        public void write (byte[] b) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3707
            write (b, 0, b.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3708
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3709
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3710
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3711
        public void write (byte[] b, int off, int len) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3712
            checkError();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3713
            written += len;
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  3714
            if (expected != -1L && written > expected) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3715
                out.close ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3716
                throw new IOException ("too many bytes written");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3717
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3718
            out.write (b, off, len);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3719
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3720
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3721
        void checkError () throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3722
            if (closed) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3723
                throw new IOException ("Stream is closed");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3724
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3725
            if (error) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3726
                throw errorExcp;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3727
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3728
            if (((PrintStream)out).checkError()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3729
                throw new IOException("Error writing request body to server");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3730
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3731
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3732
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3733
        /* this is called to check that all the bytes
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3734
         * that were supposed to be written were written
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3735
         * and that the stream is now closed().
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3736
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3737
        boolean writtenOK () {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3738
            return closed && ! error;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3739
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3740
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3741
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3742
        public void close () throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3743
            if (closed) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3744
                return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3745
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3746
            closed = true;
1576
b697b141012d 6755625: Add HttpURLConnection.setFixedLengthStreamingMode(long)
chegar
parents: 715
diff changeset
  3747
            if (expected != -1L) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3748
                /* not chunked */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3749
                if (written != expected) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3750
                    error = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3751
                    errorExcp = new IOException ("insufficient data written");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3752
                    out.close ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3753
                    throw errorExcp;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3754
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3755
                super.flush(); /* can't close the socket */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3756
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3757
                /* chunked */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3758
                super.close (); /* force final chunk to be written */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3759
                /* trailing \r\n */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3760
                OutputStream o = http.getOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3761
                o.write ('\r');
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3762
                o.write ('\n');
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3763
                o.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3764
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3765
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3766
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3767
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3768
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3769
    static class ErrorStream extends InputStream {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3770
        ByteBuffer buffer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3771
        InputStream is;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3772
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3773
        private ErrorStream(ByteBuffer buf) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3774
            buffer = buf;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3775
            is = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3776
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3777
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3778
        private ErrorStream(ByteBuffer buf, InputStream is) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3779
            buffer = buf;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3780
            this.is = is;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3781
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3782
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3783
        // when this method is called, it's either the case that cl > 0, or
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3784
        // if chunk-encoded, cl = -1; in other words, cl can't be 0
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3785
        public static InputStream getErrorStream(InputStream is, long cl, HttpClient http) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3786
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3787
            // cl can't be 0; this following is here for extra precaution
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3788
            if (cl == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3789
                return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3790
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3791
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3792
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3793
                // set SO_TIMEOUT to 1/5th of the total timeout
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3794
                // remember the old timeout value so that we can restore it
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  3795
                int oldTimeout = http.getReadTimeout();
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  3796
                http.setReadTimeout(timeout4ESBuffer/5);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3797
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3798
                long expected = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3799
                boolean isChunked = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3800
                // the chunked case
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3801
                if (cl < 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3802
                    expected = bufSize4ES;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3803
                    isChunked = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3804
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3805
                    expected = cl;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3806
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3807
                if (expected <= bufSize4ES) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3808
                    int exp = (int) expected;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3809
                    byte[] buffer = new byte[exp];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3810
                    int count = 0, time = 0, len = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3811
                    do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3812
                        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3813
                            len = is.read(buffer, count,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3814
                                             buffer.length - count);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3815
                            if (len < 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3816
                                if (isChunked) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3817
                                    // chunked ended
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3818
                                    // if chunked ended prematurely,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3819
                                    // an IOException would be thrown
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3820
                                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3821
                                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3822
                                // the server sends less than cl bytes of data
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3823
                                throw new IOException("the server closes"+
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3824
                                                      " before sending "+cl+
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3825
                                                      " bytes of data");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3826
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3827
                            count += len;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3828
                        } catch (SocketTimeoutException ex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3829
                            time += timeout4ESBuffer/5;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3830
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3831
                    } while (count < exp && time < timeout4ESBuffer);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3832
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3833
                    // reset SO_TIMEOUT to old value
2928
80b0b6c2d527 6726695: HttpURLConnection shoul support 'Expect: 100-contimue' headers for PUT
jccollet
parents: 1576
diff changeset
  3834
                    http.setReadTimeout(oldTimeout);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3835
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3836
                    // if count < cl at this point, we will not try to reuse
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3837
                    // the connection
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3838
                    if (count == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3839
                        // since we haven't read anything,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3840
                        // we will return the underlying
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3841
                        // inputstream back to the application
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3842
                        return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3843
                    }  else if ((count == expected && !(isChunked)) || (isChunked && len <0)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3844
                        // put the connection into keep-alive cache
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3845
                        // the inputstream will try to do the right thing
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3846
                        is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3847
                        return new ErrorStream(ByteBuffer.wrap(buffer, 0, count));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3848
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3849
                        // we read part of the response body
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3850
                        return new ErrorStream(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3851
                                      ByteBuffer.wrap(buffer, 0, count), is);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3852
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3853
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3854
                return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3855
            } catch (IOException ioex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3856
                // ioex.printStackTrace();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3857
                return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3858
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3859
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3860
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3861
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3862
        public int available() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3863
            if (is == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3864
                return buffer.remaining();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3865
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3866
                return buffer.remaining()+is.available();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3867
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3868
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3869
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3870
        public int read() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3871
            byte[] b = new byte[1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3872
            int ret = read(b);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3873
            return (ret == -1? ret : (b[0] & 0x00FF));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3874
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3875
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3876
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3877
        public int read(byte[] b) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3878
            return read(b, 0, b.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3879
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3880
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3881
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3882
        public int read(byte[] b, int off, int len) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3883
            int rem = buffer.remaining();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3884
            if (rem > 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3885
                int ret = rem < len? rem : len;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3886
                buffer.get(b, off, ret);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3887
                return ret;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3888
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3889
                if (is == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3890
                    return -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3891
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3892
                    return is.read(b, off, len);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3893
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3894
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3895
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3896
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3897
        @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3898
        public void close() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3899
            buffer = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3900
            if (is != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3901
                is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3902
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3903
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3904
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3905
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3906
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3907
/** An input stream that just returns EOF.  This is for
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3908
 * HTTP URLConnections that are KeepAlive && use the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3909
 * HEAD method - i.e., stream not dead, but nothing to be read.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3910
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3911
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3912
class EmptyInputStream extends InputStream {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3913
74
068494063b1b 6641309: Wrong Cookie separator used in HttpURLConnection
jccollet
parents: 2
diff changeset
  3914
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3915
    public int available() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3916
        return 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3917
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3918
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3919
    public int read() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3920
        return -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3921
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3922
}