blob: 6d82d9ec8d91ca5343e90402e6d3abdfcd3e8ff2 [file] [log] [blame]
Torne (Richard Coles)58218062012-11-14 11:43:16 +00001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5// Portions of this code based on Mozilla:
6// (netwerk/cookie/src/nsCookieService.cpp)
7/* ***** BEGIN LICENSE BLOCK *****
8 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
9 *
10 * The contents of this file are subject to the Mozilla Public License Version
11 * 1.1 (the "License"); you may not use this file except in compliance with
12 * the License. You may obtain a copy of the License at
13 * http://www.mozilla.org/MPL/
14 *
15 * Software distributed under the License is distributed on an "AS IS" basis,
16 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
17 * for the specific language governing rights and limitations under the
18 * License.
19 *
20 * The Original Code is mozilla.org code.
21 *
22 * The Initial Developer of the Original Code is
23 * Netscape Communications Corporation.
24 * Portions created by the Initial Developer are Copyright (C) 2003
25 * the Initial Developer. All Rights Reserved.
26 *
27 * Contributor(s):
28 * Daniel Witte (dwitte@stanford.edu)
29 * Michiel van Leeuwen (mvl@exedo.nl)
30 *
31 * Alternatively, the contents of this file may be used under the terms of
32 * either the GNU General Public License Version 2 or later (the "GPL"), or
33 * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
34 * in which case the provisions of the GPL or the LGPL are applicable instead
35 * of those above. If you wish to allow use of your version of this file only
36 * under the terms of either the GPL or the LGPL, and not to allow others to
37 * use your version of this file under the terms of the MPL, indicate your
38 * decision by deleting the provisions above and replace them with the notice
39 * and other provisions required by the GPL or the LGPL. If you do not delete
40 * the provisions above, a recipient may use your version of this file under
41 * the terms of any one of the MPL, the GPL or the LGPL.
42 *
43 * ***** END LICENSE BLOCK ***** */
44
45#include "net/cookies/parsed_cookie.h"
46
47#include "base/logging.h"
Torne (Richard Coles)5e3f23d2013-06-11 16:24:11 +010048#include "base/strings/string_util.h"
Torne (Richard Coles)58218062012-11-14 11:43:16 +000049
50namespace {
51
52const char kPathTokenName[] = "path";
53const char kDomainTokenName[] = "domain";
Torne (Richard Coles)58218062012-11-14 11:43:16 +000054const char kExpiresTokenName[] = "expires";
55const char kMaxAgeTokenName[] = "max-age";
56const char kSecureTokenName[] = "secure";
57const char kHttpOnlyTokenName[] = "httponly";
Torne (Richard Coles)c2e0dbd2013-05-09 18:35:53 +010058const char kPriorityTokenName[] = "priority";
Torne (Richard Coles)58218062012-11-14 11:43:16 +000059
60const char kTerminator[] = "\n\r\0";
61const int kTerminatorLen = sizeof(kTerminator) - 1;
62const char kWhitespace[] = " \t";
63const char kValueSeparator[] = ";";
64const char kTokenSeparator[] = ";=";
65
66// Returns true if |c| occurs in |chars|
67// TODO(erikwright): maybe make this take an iterator, could check for end also?
68inline bool CharIsA(const char c, const char* chars) {
69 return strchr(chars, c) != NULL;
70}
71// Seek the iterator to the first occurrence of a character in |chars|.
72// Returns true if it hit the end, false otherwise.
73inline bool SeekTo(std::string::const_iterator* it,
74 const std::string::const_iterator& end,
75 const char* chars) {
76 for (; *it != end && !CharIsA(**it, chars); ++(*it)) {}
77 return *it == end;
78}
79// Seek the iterator to the first occurrence of a character not in |chars|.
80// Returns true if it hit the end, false otherwise.
81inline bool SeekPast(std::string::const_iterator* it,
82 const std::string::const_iterator& end,
83 const char* chars) {
84 for (; *it != end && CharIsA(**it, chars); ++(*it)) {}
85 return *it == end;
86}
87inline bool SeekBackPast(std::string::const_iterator* it,
88 const std::string::const_iterator& end,
89 const char* chars) {
90 for (; *it != end && CharIsA(**it, chars); --(*it)) {}
91 return *it == end;
92}
93
94// Validate whether |value| is a valid token according to [RFC2616],
95// Section 2.2.
96bool IsValidToken(const std::string& value) {
97 if (value.empty())
98 return false;
99
100 // Check that |value| has no separators.
101 std::string separators = "()<>@,;:\\\"/[]?={} \t";
102 if (value.find_first_of(separators) != std::string::npos)
103 return false;
104
105 // Check that |value| has no CTLs.
106 for (std::string::const_iterator i = value.begin(); i != value.end(); ++i) {
107 if ((*i >= 0 && *i <= 31) || *i >= 127)
108 return false;
109 }
110
111 return true;
112}
113
114// Validate value, which may be according to RFC 6265
115// cookie-value = *cookie-octet / ( DQUOTE *cookie-octet DQUOTE )
116// cookie-octet = %x21 / %x23-2B / %x2D-3A / %x3C-5B / %x5D-7E
117// ; US-ASCII characters excluding CTLs,
118// ; whitespace DQUOTE, comma, semicolon,
119// ; and backslash
120bool IsValidCookieValue(const std::string& value) {
121 // Number of characters to skip in validation at beginning and end of string.
122 size_t skip = 0;
123 if (value.size() >= 2 && *value.begin() == '"' && *(value.end()-1) == '"')
124 skip = 1;
125 for (std::string::const_iterator i = value.begin() + skip;
126 i != value.end() - skip; ++i) {
127 bool valid_octet =
128 (*i == 0x21 ||
129 (*i >= 0x23 && *i <= 0x2B) ||
130 (*i >= 0x2D && *i <= 0x3A) ||
131 (*i >= 0x3C && *i <= 0x5B) ||
132 (*i >= 0x5D && *i <= 0x7E));
133 if (!valid_octet)
134 return false;
135 }
136 return true;
137}
138
Torne (Richard Coles)68043e12013-09-26 13:24:57 +0100139bool IsControlCharacter(unsigned char c) {
140 return (c >= 0) && (c <= 31);
141}
142
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000143bool IsValidCookieAttributeValue(const std::string& value) {
144 // The greatest common denominator of cookie attribute values is
145 // <any CHAR except CTLs or ";"> according to RFC 6265.
146 for (std::string::const_iterator i = value.begin(); i != value.end(); ++i) {
Torne (Richard Coles)68043e12013-09-26 13:24:57 +0100147 if (IsControlCharacter(*i) || *i == ';')
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000148 return false;
149 }
150 return true;
151}
152
153} // namespace
154
155namespace net {
156
157ParsedCookie::ParsedCookie(const std::string& cookie_line)
158 : path_index_(0),
159 domain_index_(0),
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000160 expires_index_(0),
161 maxage_index_(0),
162 secure_index_(0),
Torne (Richard Coles)c2e0dbd2013-05-09 18:35:53 +0100163 httponly_index_(0),
164 priority_index_(0) {
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000165
166 if (cookie_line.size() > kMaxCookieSize) {
167 VLOG(1) << "Not parsing cookie, too large: " << cookie_line.size();
168 return;
169 }
170
171 ParseTokenValuePairs(cookie_line);
172 if (!pairs_.empty())
173 SetupAttributes();
174}
175
176ParsedCookie::~ParsedCookie() {
177}
178
179bool ParsedCookie::IsValid() const {
180 return !pairs_.empty();
181}
182
Torne (Richard Coles)c2e0dbd2013-05-09 18:35:53 +0100183CookiePriority ParsedCookie::Priority() const {
184 return (priority_index_ == 0) ? COOKIE_PRIORITY_DEFAULT :
185 StringToCookiePriority(pairs_[priority_index_].second);
186}
187
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000188bool ParsedCookie::SetName(const std::string& name) {
Torne (Richard Coles)68043e12013-09-26 13:24:57 +0100189 if (!IsValidToken(name))
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000190 return false;
191 if (pairs_.empty())
192 pairs_.push_back(std::make_pair("", ""));
193 pairs_[0].first = name;
194 return true;
195}
196
197bool ParsedCookie::SetValue(const std::string& value) {
Torne (Richard Coles)68043e12013-09-26 13:24:57 +0100198 if (!IsValidCookieValue(value))
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000199 return false;
200 if (pairs_.empty())
201 pairs_.push_back(std::make_pair("", ""));
202 pairs_[0].second = value;
203 return true;
204}
205
206bool ParsedCookie::SetPath(const std::string& path) {
207 return SetString(&path_index_, kPathTokenName, path);
208}
209
210bool ParsedCookie::SetDomain(const std::string& domain) {
211 return SetString(&domain_index_, kDomainTokenName, domain);
212}
213
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000214bool ParsedCookie::SetExpires(const std::string& expires) {
215 return SetString(&expires_index_, kExpiresTokenName, expires);
216}
217
218bool ParsedCookie::SetMaxAge(const std::string& maxage) {
219 return SetString(&maxage_index_, kMaxAgeTokenName, maxage);
220}
221
222bool ParsedCookie::SetIsSecure(bool is_secure) {
223 return SetBool(&secure_index_, kSecureTokenName, is_secure);
224}
225
226bool ParsedCookie::SetIsHttpOnly(bool is_http_only) {
227 return SetBool(&httponly_index_, kHttpOnlyTokenName, is_http_only);
228}
229
Torne (Richard Coles)c2e0dbd2013-05-09 18:35:53 +0100230bool ParsedCookie::SetPriority(const std::string& priority) {
231 return SetString(&priority_index_, kPriorityTokenName, priority);
232}
233
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000234std::string ParsedCookie::ToCookieLine() const {
235 std::string out;
236 for (PairList::const_iterator it = pairs_.begin();
237 it != pairs_.end(); ++it) {
238 if (!out.empty())
239 out.append("; ");
240 out.append(it->first);
241 if (it->first != kSecureTokenName && it->first != kHttpOnlyTokenName) {
242 out.append("=");
243 out.append(it->second);
244 }
245 }
246 return out;
247}
248
249std::string::const_iterator ParsedCookie::FindFirstTerminator(
250 const std::string& s) {
251 std::string::const_iterator end = s.end();
252 size_t term_pos =
253 s.find_first_of(std::string(kTerminator, kTerminatorLen));
254 if (term_pos != std::string::npos) {
255 // We found a character we should treat as an end of string.
256 end = s.begin() + term_pos;
257 }
258 return end;
259}
260
261bool ParsedCookie::ParseToken(std::string::const_iterator* it,
262 const std::string::const_iterator& end,
263 std::string::const_iterator* token_start,
264 std::string::const_iterator* token_end) {
265 DCHECK(it && token_start && token_end);
266 std::string::const_iterator token_real_end;
267
268 // Seek past any whitespace before the "token" (the name).
269 // token_start should point at the first character in the token
270 if (SeekPast(it, end, kWhitespace))
271 return false; // No token, whitespace or empty.
272 *token_start = *it;
273
274 // Seek over the token, to the token separator.
275 // token_real_end should point at the token separator, i.e. '='.
276 // If it == end after the seek, we probably have a token-value.
277 SeekTo(it, end, kTokenSeparator);
278 token_real_end = *it;
279
280 // Ignore any whitespace between the token and the token separator.
281 // token_end should point after the last interesting token character,
282 // pointing at either whitespace, or at '=' (and equal to token_real_end).
283 if (*it != *token_start) { // We could have an empty token name.
284 --(*it); // Go back before the token separator.
285 // Skip over any whitespace to the first non-whitespace character.
286 SeekBackPast(it, *token_start, kWhitespace);
287 // Point after it.
288 ++(*it);
289 }
290 *token_end = *it;
291
292 // Seek us back to the end of the token.
293 *it = token_real_end;
294 return true;
295}
296
297void ParsedCookie::ParseValue(std::string::const_iterator* it,
298 const std::string::const_iterator& end,
299 std::string::const_iterator* value_start,
300 std::string::const_iterator* value_end) {
301 DCHECK(it && value_start && value_end);
302
303 // Seek past any whitespace that might in-between the token and value.
304 SeekPast(it, end, kWhitespace);
305 // value_start should point at the first character of the value.
306 *value_start = *it;
307
308 // Just look for ';' to terminate ('=' allowed).
309 // We can hit the end, maybe they didn't terminate.
310 SeekTo(it, end, kValueSeparator);
311
312 // Will be pointed at the ; seperator or the end.
313 *value_end = *it;
314
315 // Ignore any unwanted whitespace after the value.
316 if (*value_end != *value_start) { // Could have an empty value
317 --(*value_end);
318 SeekBackPast(value_end, *value_start, kWhitespace);
319 ++(*value_end);
320 }
321}
322
323std::string ParsedCookie::ParseTokenString(const std::string& token) {
324 std::string::const_iterator it = token.begin();
325 std::string::const_iterator end = FindFirstTerminator(token);
326
327 std::string::const_iterator token_start, token_end;
328 if (ParseToken(&it, end, &token_start, &token_end))
329 return std::string(token_start, token_end);
330 return std::string();
331}
332
333std::string ParsedCookie::ParseValueString(const std::string& value) {
334 std::string::const_iterator it = value.begin();
335 std::string::const_iterator end = FindFirstTerminator(value);
336
337 std::string::const_iterator value_start, value_end;
338 ParseValue(&it, end, &value_start, &value_end);
339 return std::string(value_start, value_end);
340}
341
342// Parse all token/value pairs and populate pairs_.
343void ParsedCookie::ParseTokenValuePairs(const std::string& cookie_line) {
344 pairs_.clear();
345
346 // Ok, here we go. We should be expecting to be starting somewhere
347 // before the cookie line, not including any header name...
348 std::string::const_iterator start = cookie_line.begin();
349 std::string::const_iterator it = start;
350
351 // TODO(erikwright): Make sure we're stripping \r\n in the network code.
352 // Then we can log any unexpected terminators.
353 std::string::const_iterator end = FindFirstTerminator(cookie_line);
354
355 for (int pair_num = 0; pair_num < kMaxPairs && it != end; ++pair_num) {
356 TokenValuePair pair;
357
358 std::string::const_iterator token_start, token_end;
359 if (!ParseToken(&it, end, &token_start, &token_end))
360 break;
361
362 if (it == end || *it != '=') {
363 // We have a token-value, we didn't have any token name.
364 if (pair_num == 0) {
365 // For the first time around, we want to treat single values
366 // as a value with an empty name. (Mozilla bug 169091).
367 // IE seems to also have this behavior, ex "AAA", and "AAA=10" will
368 // set 2 different cookies, and setting "BBB" will then replace "AAA".
369 pair.first = "";
370 // Rewind to the beginning of what we thought was the token name,
371 // and let it get parsed as a value.
372 it = token_start;
373 } else {
374 // Any not-first attribute we want to treat a value as a
375 // name with an empty value... This is so something like
376 // "secure;" will get parsed as a Token name, and not a value.
377 pair.first = std::string(token_start, token_end);
378 }
379 } else {
380 // We have a TOKEN=VALUE.
381 pair.first = std::string(token_start, token_end);
382 ++it; // Skip past the '='.
383 }
384
385 // OK, now try to parse a value.
386 std::string::const_iterator value_start, value_end;
387 ParseValue(&it, end, &value_start, &value_end);
Torne (Richard Coles)68043e12013-09-26 13:24:57 +0100388
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000389 // OK, we're finished with a Token/Value.
390 pair.second = std::string(value_start, value_end);
391
392 // From RFC2109: "Attributes (names) (attr) are case-insensitive."
393 if (pair_num != 0)
Torne (Richard Coles)6e8cce62014-08-19 13:00:08 +0100394 base::StringToLowerASCII(&pair.first);
Torne (Richard Coles)68043e12013-09-26 13:24:57 +0100395 // Ignore Set-Cookie directives contaning control characters. See
396 // http://crbug.com/238041.
397 if (!IsValidCookieAttributeValue(pair.first) ||
398 !IsValidCookieAttributeValue(pair.second)) {
399 pairs_.clear();
400 break;
401 }
402
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000403 pairs_.push_back(pair);
404
405 // We've processed a token/value pair, we're either at the end of
406 // the string or a ValueSeparator like ';', which we want to skip.
407 if (it != end)
408 ++it;
409 }
410}
411
412void ParsedCookie::SetupAttributes() {
Torne (Richard Coles)5f1c9432014-08-12 13:47:38 +0100413 // Ignore Set-Cookie directive where name and value are both empty.
414 if (pairs_[0].first.empty() && pairs_[0].second.empty()) {
415 pairs_.clear();
416 return;
417 }
418
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000419 // We skip over the first token/value, the user supplied one.
420 for (size_t i = 1; i < pairs_.size(); ++i) {
421 if (pairs_[i].first == kPathTokenName) {
422 path_index_ = i;
423 } else if (pairs_[i].first == kDomainTokenName) {
424 domain_index_ = i;
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000425 } else if (pairs_[i].first == kExpiresTokenName) {
426 expires_index_ = i;
427 } else if (pairs_[i].first == kMaxAgeTokenName) {
428 maxage_index_ = i;
429 } else if (pairs_[i].first == kSecureTokenName) {
430 secure_index_ = i;
431 } else if (pairs_[i].first == kHttpOnlyTokenName) {
432 httponly_index_ = i;
Torne (Richard Coles)c2e0dbd2013-05-09 18:35:53 +0100433 } else if (pairs_[i].first == kPriorityTokenName) {
434 priority_index_ = i;
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000435 } else {
436 /* some attribute we don't know or don't care about. */
437 }
438 }
439}
440
441bool ParsedCookie::SetString(size_t* index,
442 const std::string& key,
443 const std::string& value) {
444 if (value.empty()) {
445 ClearAttributePair(*index);
446 return true;
447 } else {
448 return SetAttributePair(index, key, value);
449 }
450}
451
452bool ParsedCookie::SetBool(size_t* index,
453 const std::string& key,
454 bool value) {
455 if (!value) {
456 ClearAttributePair(*index);
457 return true;
458 } else {
Torne (Richard Coles)c2e0dbd2013-05-09 18:35:53 +0100459 return SetAttributePair(index, key, std::string());
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000460 }
461}
462
463bool ParsedCookie::SetAttributePair(size_t* index,
464 const std::string& key,
465 const std::string& value) {
Torne (Richard Coles)68043e12013-09-26 13:24:57 +0100466 if (!(IsValidToken(key) && IsValidCookieAttributeValue(value)))
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000467 return false;
468 if (!IsValid())
469 return false;
470 if (*index) {
471 pairs_[*index].second = value;
472 } else {
473 pairs_.push_back(std::make_pair(key, value));
474 *index = pairs_.size() - 1;
475 }
476 return true;
477}
478
479void ParsedCookie::ClearAttributePair(size_t index) {
480 // The first pair (name/value of cookie at pairs_[0]) cannot be cleared.
481 // Cookie attributes that don't have a value at the moment, are represented
482 // with an index being equal to 0.
483 if (index == 0)
484 return;
485
Torne (Richard Coles)2a99a7e2013-03-28 15:31:22 +0000486 size_t* indexes[] = { &path_index_, &domain_index_, &expires_index_,
Torne (Richard Coles)c2e0dbd2013-05-09 18:35:53 +0100487 &maxage_index_, &secure_index_, &httponly_index_,
488 &priority_index_ };
Torne (Richard Coles)58218062012-11-14 11:43:16 +0000489 for (size_t i = 0; i < arraysize(indexes); ++i) {
490 if (*indexes[i] == index)
491 *indexes[i] = 0;
492 else if (*indexes[i] > index)
493 --*indexes[i];
494 }
495 pairs_.erase(pairs_.begin() + index);
496}
497
498} // namespace