8fc30896db
Former-commit-id: c477e03582759447177c6d4bf412cd2355aad476
1680 lines
47 KiB
C#
1680 lines
47 KiB
C#
//
|
|
// System.Net.HttpWebRequest
|
|
//
|
|
// Authors:
|
|
// Lawrence Pit (loz@cable.a2000.nl)
|
|
// Gonzalo Paniagua Javier (gonzalo@ximian.com)
|
|
// Martin Baulig <mabaul@microsoft.com>
|
|
//
|
|
// (c) 2002 Lawrence Pit
|
|
// (c) 2003 Ximian, Inc. (http://www.ximian.com)
|
|
// (c) 2004 Novell, Inc. (http://www.novell.com)
|
|
// Copyright (c) 2017 Xamarin Inc. (http://www.xamarin.com)
|
|
//
|
|
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining
|
|
// a copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to
|
|
// permit persons to whom the Software is furnished to do so, subject to
|
|
// the following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be
|
|
// included in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
//
|
|
#if SECURITY_DEP
|
|
#if MONO_SECURITY_ALIAS
|
|
extern alias MonoSecurity;
|
|
using MonoSecurity::Mono.Security.Interface;
|
|
#else
|
|
using Mono.Security.Interface;
|
|
#endif
|
|
#endif
|
|
|
|
using System;
|
|
using System.Collections;
|
|
using System.Configuration;
|
|
using System.Globalization;
|
|
using System.IO;
|
|
using System.Net;
|
|
using System.Net.Cache;
|
|
using System.Net.Sockets;
|
|
using System.Net.Security;
|
|
using System.Runtime.Remoting.Messaging;
|
|
using System.Runtime.Serialization;
|
|
using System.Security.Cryptography.X509Certificates;
|
|
using System.Text;
|
|
using System.Threading;
|
|
using System.Threading.Tasks;
|
|
using Mono.Net.Security;
|
|
|
|
namespace System.Net
|
|
{
|
|
[Serializable]
|
|
public class HttpWebRequest : WebRequest, ISerializable
|
|
{
|
|
Uri requestUri;
|
|
Uri actualUri;
|
|
bool hostChanged;
|
|
bool allowAutoRedirect = true;
|
|
bool allowBuffering = true;
|
|
bool allowReadStreamBuffering;
|
|
X509CertificateCollection certificates;
|
|
string connectionGroup;
|
|
bool haveContentLength;
|
|
long contentLength = -1;
|
|
HttpContinueDelegate continueDelegate;
|
|
CookieContainer cookieContainer;
|
|
ICredentials credentials;
|
|
bool haveResponse;
|
|
bool requestSent;
|
|
WebHeaderCollection webHeaders;
|
|
bool keepAlive = true;
|
|
int maxAutoRedirect = 50;
|
|
string mediaType = String.Empty;
|
|
string method = "GET";
|
|
string initialMethod = "GET";
|
|
bool pipelined = true;
|
|
bool preAuthenticate;
|
|
bool usedPreAuth;
|
|
Version version = HttpVersion.Version11;
|
|
bool force_version;
|
|
Version actualVersion;
|
|
IWebProxy proxy;
|
|
bool sendChunked;
|
|
ServicePoint servicePoint;
|
|
int timeout = 100000;
|
|
int continueTimeout = 350;
|
|
|
|
WebRequestStream writeStream;
|
|
HttpWebResponse webResponse;
|
|
WebCompletionSource responseTask;
|
|
WebOperation currentOperation;
|
|
int aborted;
|
|
bool gotRequestStream;
|
|
int redirects;
|
|
bool expectContinue;
|
|
bool getResponseCalled;
|
|
object locker = new object ();
|
|
bool finished_reading;
|
|
DecompressionMethods auto_decomp;
|
|
int maxResponseHeadersLength;
|
|
static int defaultMaxResponseHeadersLength;
|
|
static int defaultMaximumErrorResponseLength;
|
|
static RequestCachePolicy defaultCachePolicy;
|
|
int readWriteTimeout = 300000; // ms
|
|
#if SECURITY_DEP
|
|
MonoTlsProvider tlsProvider;
|
|
MonoTlsSettings tlsSettings;
|
|
#endif
|
|
ServerCertValidationCallback certValidationCallback;
|
|
|
|
// stores the user provided Host header as Uri. If the user specified a default port explicitly we'll lose
|
|
// that information when converting the host string to a Uri. _HostHasPort will store that information.
|
|
bool hostHasPort;
|
|
Uri hostUri;
|
|
|
|
enum NtlmAuthState
|
|
{
|
|
None,
|
|
Challenge,
|
|
Response
|
|
}
|
|
AuthorizationState auth_state, proxy_auth_state;
|
|
|
|
[NonSerialized]
|
|
internal Func<Stream, Task> ResendContentFactory;
|
|
|
|
// Constructors
|
|
static HttpWebRequest ()
|
|
{
|
|
defaultMaxResponseHeadersLength = 64;
|
|
defaultMaximumErrorResponseLength = 64;
|
|
defaultCachePolicy = new RequestCachePolicy (RequestCacheLevel.BypassCache);
|
|
#if !MOBILE
|
|
#pragma warning disable 618
|
|
NetConfig config = ConfigurationSettings.GetConfig ("system.net/settings") as NetConfig;
|
|
#pragma warning restore 618
|
|
if (config != null)
|
|
defaultMaxResponseHeadersLength = config.MaxResponseHeadersLength;
|
|
#endif
|
|
}
|
|
|
|
#if MOBILE
|
|
public
|
|
#else
|
|
internal
|
|
#endif
|
|
HttpWebRequest (Uri uri)
|
|
{
|
|
this.requestUri = uri;
|
|
this.actualUri = uri;
|
|
this.proxy = InternalDefaultWebProxy;
|
|
this.webHeaders = new WebHeaderCollection (WebHeaderCollectionType.HttpWebRequest);
|
|
ThrowOnError = true;
|
|
ResetAuthorization ();
|
|
}
|
|
|
|
#if SECURITY_DEP
|
|
internal HttpWebRequest (Uri uri, MonoTlsProvider tlsProvider, MonoTlsSettings settings = null)
|
|
: this (uri)
|
|
{
|
|
this.tlsProvider = tlsProvider;
|
|
this.tlsSettings = settings;
|
|
}
|
|
#endif
|
|
|
|
[Obsolete ("Serialization is obsoleted for this type. http://go.microsoft.com/fwlink/?linkid=14202")]
|
|
protected HttpWebRequest (SerializationInfo serializationInfo, StreamingContext streamingContext)
|
|
{
|
|
// In CoreFX, attempting to serialize this class fails due to
|
|
// non-serializable fields, so this constructor never gets called.
|
|
// They're throwing PlatformNotSupportedException() in here.
|
|
throw new SerializationException ();
|
|
}
|
|
|
|
#if MONO_WEB_DEBUG
|
|
static int nextId;
|
|
internal readonly int ID = ++nextId;
|
|
#else
|
|
internal readonly int ID;
|
|
#endif
|
|
|
|
void ResetAuthorization ()
|
|
{
|
|
auth_state = new AuthorizationState (this, false);
|
|
proxy_auth_state = new AuthorizationState (this, true);
|
|
}
|
|
|
|
// Properties
|
|
|
|
void SetSpecialHeaders (string HeaderName, string value)
|
|
{
|
|
value = WebHeaderCollection.CheckBadChars (value, true);
|
|
webHeaders.RemoveInternal (HeaderName);
|
|
if (value.Length != 0) {
|
|
webHeaders.AddInternal (HeaderName, value);
|
|
}
|
|
}
|
|
|
|
public string Accept {
|
|
get { return webHeaders["Accept"]; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
SetSpecialHeaders ("Accept", value);
|
|
}
|
|
}
|
|
|
|
public Uri Address {
|
|
get { return actualUri; }
|
|
internal set { actualUri = value; } // Used by Ftp+proxy
|
|
}
|
|
|
|
public virtual bool AllowAutoRedirect {
|
|
get { return allowAutoRedirect; }
|
|
set { this.allowAutoRedirect = value; }
|
|
}
|
|
|
|
public virtual bool AllowWriteStreamBuffering {
|
|
get { return allowBuffering; }
|
|
set { allowBuffering = value; }
|
|
}
|
|
|
|
public virtual bool AllowReadStreamBuffering {
|
|
get { return allowReadStreamBuffering; }
|
|
set { allowReadStreamBuffering = value; }
|
|
}
|
|
|
|
static Exception GetMustImplement ()
|
|
{
|
|
return new NotImplementedException ();
|
|
}
|
|
|
|
public DecompressionMethods AutomaticDecompression {
|
|
get {
|
|
return auto_decomp;
|
|
}
|
|
set {
|
|
CheckRequestStarted ();
|
|
auto_decomp = value;
|
|
}
|
|
}
|
|
|
|
internal bool InternalAllowBuffering {
|
|
get {
|
|
return allowBuffering && MethodWithBuffer;
|
|
}
|
|
}
|
|
|
|
bool MethodWithBuffer {
|
|
get {
|
|
return method != "HEAD" && method != "GET" &&
|
|
method != "MKCOL" && method != "CONNECT" &&
|
|
method != "TRACE";
|
|
}
|
|
}
|
|
|
|
#if SECURITY_DEP
|
|
internal MonoTlsProvider TlsProvider {
|
|
get { return tlsProvider; }
|
|
}
|
|
|
|
internal MonoTlsSettings TlsSettings {
|
|
get { return tlsSettings; }
|
|
}
|
|
#endif
|
|
|
|
public X509CertificateCollection ClientCertificates {
|
|
get {
|
|
if (certificates == null)
|
|
certificates = new X509CertificateCollection ();
|
|
return certificates;
|
|
}
|
|
set {
|
|
if (value == null)
|
|
throw new ArgumentNullException ("value");
|
|
certificates = value;
|
|
}
|
|
}
|
|
|
|
public string Connection {
|
|
get { return webHeaders["Connection"]; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
|
|
if (string.IsNullOrWhiteSpace (value)) {
|
|
webHeaders.RemoveInternal ("Connection");
|
|
return;
|
|
}
|
|
|
|
string val = value.ToLowerInvariant ();
|
|
if (val.Contains ("keep-alive") || val.Contains ("close"))
|
|
throw new ArgumentException (SR.net_connarg, nameof (value));
|
|
|
|
string checkedValue = HttpValidationHelpers.CheckBadHeaderValueChars (value);
|
|
webHeaders.CheckUpdate ("Connection", checkedValue);
|
|
}
|
|
}
|
|
|
|
public override string ConnectionGroupName {
|
|
get { return connectionGroup; }
|
|
set { connectionGroup = value; }
|
|
}
|
|
|
|
public override long ContentLength {
|
|
get { return contentLength; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
if (value < 0)
|
|
throw new ArgumentOutOfRangeException ("value", "Content-Length must be >= 0");
|
|
|
|
contentLength = value;
|
|
haveContentLength = true;
|
|
}
|
|
}
|
|
|
|
internal long InternalContentLength {
|
|
set { contentLength = value; }
|
|
}
|
|
|
|
internal bool ThrowOnError { get; set; }
|
|
|
|
public override string ContentType {
|
|
get { return webHeaders["Content-Type"]; }
|
|
set {
|
|
SetSpecialHeaders ("Content-Type", value);
|
|
}
|
|
}
|
|
|
|
public HttpContinueDelegate ContinueDelegate {
|
|
get { return continueDelegate; }
|
|
set { continueDelegate = value; }
|
|
}
|
|
|
|
virtual
|
|
public CookieContainer CookieContainer {
|
|
get { return cookieContainer; }
|
|
set { cookieContainer = value; }
|
|
}
|
|
|
|
public override ICredentials Credentials {
|
|
get { return credentials; }
|
|
set { credentials = value; }
|
|
}
|
|
public DateTime Date {
|
|
get {
|
|
string date = webHeaders["Date"];
|
|
if (date == null)
|
|
return DateTime.MinValue;
|
|
return DateTime.ParseExact (date, "r", CultureInfo.InvariantCulture).ToLocalTime ();
|
|
}
|
|
set {
|
|
SetDateHeaderHelper ("Date", value);
|
|
}
|
|
}
|
|
|
|
void SetDateHeaderHelper (string headerName, DateTime dateTime)
|
|
{
|
|
if (dateTime == DateTime.MinValue)
|
|
SetSpecialHeaders (headerName, null); // remove header
|
|
else
|
|
SetSpecialHeaders (headerName, HttpProtocolUtils.date2string (dateTime));
|
|
}
|
|
|
|
#if !MOBILE
|
|
[MonoTODO]
|
|
public static new RequestCachePolicy DefaultCachePolicy {
|
|
get { return defaultCachePolicy; }
|
|
set { defaultCachePolicy = value; }
|
|
}
|
|
#endif
|
|
|
|
[MonoTODO]
|
|
public static int DefaultMaximumErrorResponseLength {
|
|
get { return defaultMaximumErrorResponseLength; }
|
|
set { defaultMaximumErrorResponseLength = value; }
|
|
}
|
|
|
|
public string Expect {
|
|
get { return webHeaders["Expect"]; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
string val = value;
|
|
if (val != null)
|
|
val = val.Trim ().ToLower ();
|
|
|
|
if (val == null || val.Length == 0) {
|
|
webHeaders.RemoveInternal ("Expect");
|
|
return;
|
|
}
|
|
|
|
if (val == "100-continue")
|
|
throw new ArgumentException ("100-Continue cannot be set with this property.",
|
|
"value");
|
|
|
|
webHeaders.CheckUpdate ("Expect", value);
|
|
}
|
|
}
|
|
|
|
virtual
|
|
public bool HaveResponse {
|
|
get { return haveResponse; }
|
|
}
|
|
|
|
public override WebHeaderCollection Headers {
|
|
get { return webHeaders; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
|
|
WebHeaderCollection webHeaders = value;
|
|
WebHeaderCollection newWebHeaders = new WebHeaderCollection (WebHeaderCollectionType.HttpWebRequest);
|
|
|
|
// Copy And Validate -
|
|
// Handle the case where their object tries to change
|
|
// name, value pairs after they call set, so therefore,
|
|
// we need to clone their headers.
|
|
//
|
|
|
|
foreach (String headerName in webHeaders.AllKeys) {
|
|
newWebHeaders.Add (headerName, webHeaders[headerName]);
|
|
}
|
|
|
|
this.webHeaders = newWebHeaders;
|
|
}
|
|
}
|
|
|
|
public string Host {
|
|
|
|
get {
|
|
Uri uri = hostUri ?? Address;
|
|
return (hostUri == null || !hostHasPort) && Address.IsDefaultPort ?
|
|
uri.Host : uri.Host + ":" + uri.Port;
|
|
}
|
|
set {
|
|
CheckRequestStarted ();
|
|
|
|
if (value == null)
|
|
throw new ArgumentNullException (nameof (value));
|
|
|
|
Uri uri;
|
|
if ((value.IndexOf ('/') != -1) || (!TryGetHostUri (value, out uri)))
|
|
throw new ArgumentException (SR.net_invalid_host, nameof (value));
|
|
|
|
hostUri = uri;
|
|
|
|
// Determine if the user provided string contains a port
|
|
if (!hostUri.IsDefaultPort) {
|
|
hostHasPort = true;
|
|
} else if (value.IndexOf (':') == -1) {
|
|
hostHasPort = false;
|
|
} else {
|
|
int endOfIPv6Address = value.IndexOf (']');
|
|
hostHasPort = endOfIPv6Address == -1 || value.LastIndexOf (':') > endOfIPv6Address;
|
|
}
|
|
}
|
|
}
|
|
|
|
bool TryGetHostUri (string hostName, out Uri hostUri)
|
|
{
|
|
string s = Address.Scheme + "://" + hostName + Address.PathAndQuery;
|
|
return Uri.TryCreate (s, UriKind.Absolute, out hostUri);
|
|
}
|
|
|
|
public DateTime IfModifiedSince {
|
|
get {
|
|
string str = webHeaders["If-Modified-Since"];
|
|
if (str == null)
|
|
return DateTime.Now;
|
|
try {
|
|
return MonoHttpDate.Parse (str);
|
|
} catch (Exception) {
|
|
return DateTime.Now;
|
|
}
|
|
}
|
|
set {
|
|
CheckRequestStarted ();
|
|
// rfc-1123 pattern
|
|
webHeaders.SetInternal ("If-Modified-Since",
|
|
value.ToUniversalTime ().ToString ("r", null));
|
|
// TODO: check last param when using different locale
|
|
}
|
|
}
|
|
|
|
public bool KeepAlive {
|
|
get {
|
|
return keepAlive;
|
|
}
|
|
set {
|
|
keepAlive = value;
|
|
}
|
|
}
|
|
|
|
public int MaximumAutomaticRedirections {
|
|
get { return maxAutoRedirect; }
|
|
set {
|
|
if (value <= 0)
|
|
throw new ArgumentException ("Must be > 0", "value");
|
|
|
|
maxAutoRedirect = value;
|
|
}
|
|
}
|
|
|
|
[MonoTODO ("Use this")]
|
|
public int MaximumResponseHeadersLength {
|
|
get { return maxResponseHeadersLength; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
if (value < 0 && value != System.Threading.Timeout.Infinite)
|
|
throw new ArgumentOutOfRangeException (nameof (value), SR.net_toosmall);
|
|
|
|
maxResponseHeadersLength = value;
|
|
}
|
|
}
|
|
|
|
[MonoTODO ("Use this")]
|
|
public static int DefaultMaximumResponseHeadersLength {
|
|
get { return defaultMaxResponseHeadersLength; }
|
|
set { defaultMaxResponseHeadersLength = value; }
|
|
}
|
|
|
|
public int ReadWriteTimeout {
|
|
get { return readWriteTimeout; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
|
|
if (value <= 0 && value != System.Threading.Timeout.Infinite)
|
|
throw new ArgumentOutOfRangeException (nameof (value), SR.net_io_timeout_use_gt_zero);
|
|
|
|
readWriteTimeout = value;
|
|
}
|
|
}
|
|
|
|
[MonoTODO]
|
|
public int ContinueTimeout {
|
|
get {
|
|
return continueTimeout;
|
|
}
|
|
set {
|
|
CheckRequestStarted ();
|
|
if ((value < 0) && (value != System.Threading.Timeout.Infinite))
|
|
throw new ArgumentOutOfRangeException (nameof (value), SR.net_io_timeout_use_ge_zero);
|
|
continueTimeout = value;
|
|
}
|
|
}
|
|
|
|
public string MediaType {
|
|
get { return mediaType; }
|
|
set {
|
|
mediaType = value;
|
|
}
|
|
}
|
|
|
|
public override string Method {
|
|
get { return this.method; }
|
|
set {
|
|
if (string.IsNullOrEmpty (value))
|
|
throw new ArgumentException (SR.net_badmethod, nameof (value));
|
|
if (HttpValidationHelpers.IsInvalidMethodOrHeaderString (value))
|
|
throw new ArgumentException (SR.net_badmethod, nameof (value));
|
|
|
|
method = value.ToUpperInvariant ();
|
|
if (method != "HEAD" && method != "GET" && method != "POST" && method != "PUT" &&
|
|
method != "DELETE" && method != "CONNECT" && method != "TRACE" &&
|
|
method != "MKCOL") {
|
|
method = value;
|
|
}
|
|
}
|
|
}
|
|
|
|
public bool Pipelined {
|
|
get { return pipelined; }
|
|
set { pipelined = value; }
|
|
}
|
|
|
|
public override bool PreAuthenticate {
|
|
get { return preAuthenticate; }
|
|
set { preAuthenticate = value; }
|
|
}
|
|
|
|
public Version ProtocolVersion {
|
|
get { return version; }
|
|
set {
|
|
if (value != HttpVersion.Version10 && value != HttpVersion.Version11)
|
|
throw new ArgumentException (SR.net_wrongversion, nameof (value));
|
|
|
|
force_version = true;
|
|
version = value;
|
|
}
|
|
}
|
|
|
|
public override IWebProxy Proxy {
|
|
get { return proxy; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
proxy = value;
|
|
servicePoint = null; // we may need a new one
|
|
GetServicePoint ();
|
|
}
|
|
}
|
|
|
|
public string Referer {
|
|
get { return webHeaders["Referer"]; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
if (value == null || value.Trim ().Length == 0) {
|
|
webHeaders.RemoveInternal ("Referer");
|
|
return;
|
|
}
|
|
webHeaders.SetInternal ("Referer", value);
|
|
}
|
|
}
|
|
|
|
public override Uri RequestUri {
|
|
get { return requestUri; }
|
|
}
|
|
|
|
public bool SendChunked {
|
|
get { return sendChunked; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
sendChunked = value;
|
|
}
|
|
}
|
|
|
|
public ServicePoint ServicePoint {
|
|
get { return GetServicePoint (); }
|
|
}
|
|
|
|
internal ServicePoint ServicePointNoLock {
|
|
get { return servicePoint; }
|
|
}
|
|
public virtual bool SupportsCookieContainer {
|
|
get {
|
|
// The managed implementation supports the cookie container
|
|
// it is only Silverlight that returns false here
|
|
return true;
|
|
}
|
|
}
|
|
public override int Timeout {
|
|
get { return timeout; }
|
|
set {
|
|
if (value < -1)
|
|
throw new ArgumentOutOfRangeException ("value");
|
|
|
|
timeout = value;
|
|
}
|
|
}
|
|
|
|
public string TransferEncoding {
|
|
get { return webHeaders["Transfer-Encoding"]; }
|
|
set {
|
|
CheckRequestStarted ();
|
|
|
|
if (string.IsNullOrWhiteSpace (value)) {
|
|
webHeaders.RemoveInternal ("Transfer-Encoding");
|
|
return;
|
|
}
|
|
|
|
string val = value.ToLower ();
|
|
//
|
|
// prevent them from adding chunked, or from adding an Encoding without
|
|
// turning on chunked, the reason is due to the HTTP Spec which prevents
|
|
// additional encoding types from being used without chunked
|
|
//
|
|
if (val.Contains ("chunked"))
|
|
throw new ArgumentException (SR.net_nochunked, nameof (value));
|
|
else if (!SendChunked)
|
|
throw new InvalidOperationException (SR.net_needchunked);
|
|
|
|
string checkedValue = HttpValidationHelpers.CheckBadHeaderValueChars (value);
|
|
webHeaders.CheckUpdate ("Transfer-Encoding", checkedValue);
|
|
}
|
|
}
|
|
|
|
public override bool UseDefaultCredentials {
|
|
get { return CredentialCache.DefaultCredentials == Credentials; }
|
|
set { Credentials = value ? CredentialCache.DefaultCredentials : null; }
|
|
}
|
|
|
|
public string UserAgent {
|
|
get { return webHeaders["User-Agent"]; }
|
|
set { webHeaders.SetInternal ("User-Agent", value); }
|
|
}
|
|
|
|
bool unsafe_auth_blah;
|
|
public bool UnsafeAuthenticatedConnectionSharing {
|
|
get { return unsafe_auth_blah; }
|
|
set { unsafe_auth_blah = value; }
|
|
}
|
|
|
|
internal bool GotRequestStream {
|
|
get { return gotRequestStream; }
|
|
}
|
|
|
|
internal bool ExpectContinue {
|
|
get { return expectContinue; }
|
|
set { expectContinue = value; }
|
|
}
|
|
|
|
internal Uri AuthUri {
|
|
get { return actualUri; }
|
|
}
|
|
|
|
internal bool ProxyQuery {
|
|
get { return servicePoint.UsesProxy && !servicePoint.UseConnect; }
|
|
}
|
|
|
|
internal ServerCertValidationCallback ServerCertValidationCallback {
|
|
get { return certValidationCallback; }
|
|
}
|
|
|
|
public RemoteCertificateValidationCallback ServerCertificateValidationCallback {
|
|
get {
|
|
if (certValidationCallback == null)
|
|
return null;
|
|
return certValidationCallback.ValidationCallback;
|
|
}
|
|
set {
|
|
if (value == null)
|
|
certValidationCallback = null;
|
|
else
|
|
certValidationCallback = new ServerCertValidationCallback (value);
|
|
}
|
|
}
|
|
|
|
// Methods
|
|
|
|
internal ServicePoint GetServicePoint ()
|
|
{
|
|
lock (locker) {
|
|
if (hostChanged || servicePoint == null) {
|
|
servicePoint = ServicePointManager.FindServicePoint (actualUri, proxy);
|
|
hostChanged = false;
|
|
}
|
|
}
|
|
|
|
return servicePoint;
|
|
}
|
|
|
|
public void AddRange (int range)
|
|
{
|
|
AddRange ("bytes", (long)range);
|
|
}
|
|
|
|
public void AddRange (int from, int to)
|
|
{
|
|
AddRange ("bytes", (long)from, (long)to);
|
|
}
|
|
|
|
public void AddRange (string rangeSpecifier, int range)
|
|
{
|
|
AddRange (rangeSpecifier, (long)range);
|
|
}
|
|
|
|
public void AddRange (string rangeSpecifier, int from, int to)
|
|
{
|
|
AddRange (rangeSpecifier, (long)from, (long)to);
|
|
}
|
|
public
|
|
void AddRange (long range)
|
|
{
|
|
AddRange ("bytes", (long)range);
|
|
}
|
|
|
|
public
|
|
void AddRange (long from, long to)
|
|
{
|
|
AddRange ("bytes", from, to);
|
|
}
|
|
|
|
public
|
|
void AddRange (string rangeSpecifier, long range)
|
|
{
|
|
if (rangeSpecifier == null)
|
|
throw new ArgumentNullException ("rangeSpecifier");
|
|
if (!WebHeaderCollection.IsValidToken (rangeSpecifier))
|
|
throw new ArgumentException ("Invalid range specifier", "rangeSpecifier");
|
|
|
|
string r = webHeaders["Range"];
|
|
if (r == null)
|
|
r = rangeSpecifier + "=";
|
|
else {
|
|
string old_specifier = r.Substring (0, r.IndexOf ('='));
|
|
if (String.Compare (old_specifier, rangeSpecifier, StringComparison.OrdinalIgnoreCase) != 0)
|
|
throw new InvalidOperationException ("A different range specifier is already in use");
|
|
r += ",";
|
|
}
|
|
|
|
string n = range.ToString (CultureInfo.InvariantCulture);
|
|
if (range < 0)
|
|
r = r + "0" + n;
|
|
else
|
|
r = r + n + "-";
|
|
webHeaders.ChangeInternal ("Range", r);
|
|
}
|
|
|
|
public
|
|
void AddRange (string rangeSpecifier, long from, long to)
|
|
{
|
|
if (rangeSpecifier == null)
|
|
throw new ArgumentNullException ("rangeSpecifier");
|
|
if (!WebHeaderCollection.IsValidToken (rangeSpecifier))
|
|
throw new ArgumentException ("Invalid range specifier", "rangeSpecifier");
|
|
if (from > to || from < 0)
|
|
throw new ArgumentOutOfRangeException ("from");
|
|
if (to < 0)
|
|
throw new ArgumentOutOfRangeException ("to");
|
|
|
|
string r = webHeaders["Range"];
|
|
if (r == null)
|
|
r = rangeSpecifier + "=";
|
|
else
|
|
r += ",";
|
|
|
|
r = String.Format ("{0}{1}-{2}", r, from, to);
|
|
webHeaders.ChangeInternal ("Range", r);
|
|
}
|
|
|
|
WebOperation SendRequest (bool redirecting, BufferOffsetSize writeBuffer, CancellationToken cancellationToken)
|
|
{
|
|
lock (locker) {
|
|
WebConnection.Debug ($"HWR SEND REQUEST: Req={ID} requestSent={requestSent} redirecting={redirecting}");
|
|
|
|
WebOperation operation;
|
|
if (!redirecting) {
|
|
if (requestSent) {
|
|
operation = currentOperation;
|
|
if (operation == null)
|
|
throw new InvalidOperationException ("Should never happen!");
|
|
return operation;
|
|
}
|
|
}
|
|
|
|
operation = new WebOperation (this, writeBuffer, false, cancellationToken);
|
|
if (Interlocked.CompareExchange (ref currentOperation, operation, null) != null)
|
|
throw new InvalidOperationException ("Invalid nested call.");
|
|
|
|
requestSent = true;
|
|
if (!redirecting)
|
|
redirects = 0;
|
|
servicePoint = GetServicePoint ();
|
|
servicePoint.SendRequest (operation, connectionGroup);
|
|
return operation;
|
|
}
|
|
}
|
|
|
|
Task<Stream> MyGetRequestStreamAsync (CancellationToken cancellationToken)
|
|
{
|
|
if (Aborted)
|
|
throw CreateRequestAbortedException ();
|
|
|
|
bool send = !(method == "GET" || method == "CONNECT" || method == "HEAD" ||
|
|
method == "TRACE");
|
|
if (method == null || !send)
|
|
throw new ProtocolViolationException ("Cannot send data when method is: " + method);
|
|
|
|
if (contentLength == -1 && !sendChunked && !allowBuffering && KeepAlive)
|
|
throw new ProtocolViolationException ("Content-Length not set");
|
|
|
|
string transferEncoding = TransferEncoding;
|
|
if (!sendChunked && transferEncoding != null && transferEncoding.Trim () != "")
|
|
throw new ProtocolViolationException ("SendChunked should be true.");
|
|
|
|
WebOperation operation;
|
|
lock (locker) {
|
|
if (getResponseCalled)
|
|
throw new InvalidOperationException ("The operation cannot be performed once the request has been submitted.");
|
|
|
|
operation = currentOperation;
|
|
if (operation == null) {
|
|
initialMethod = method;
|
|
|
|
gotRequestStream = true;
|
|
operation = SendRequest (false, null, cancellationToken);
|
|
}
|
|
}
|
|
|
|
return operation.GetRequestStream ();
|
|
}
|
|
|
|
public override IAsyncResult BeginGetRequestStream (AsyncCallback callback, object state)
|
|
{
|
|
return TaskToApm.Begin (RunWithTimeout (MyGetRequestStreamAsync), callback, state);
|
|
}
|
|
|
|
public override Stream EndGetRequestStream (IAsyncResult asyncResult)
|
|
{
|
|
if (asyncResult == null)
|
|
throw new ArgumentNullException ("asyncResult");
|
|
|
|
try {
|
|
return TaskToApm.End<Stream> (asyncResult);
|
|
} catch (Exception e) {
|
|
throw FlattenException (e);
|
|
}
|
|
}
|
|
|
|
public override Stream GetRequestStream ()
|
|
{
|
|
try {
|
|
return GetRequestStreamAsync ().Result;
|
|
} catch (Exception e) {
|
|
throw FlattenException (e);
|
|
}
|
|
}
|
|
|
|
[MonoTODO]
|
|
public Stream GetRequestStream (out TransportContext context)
|
|
{
|
|
throw new NotImplementedException ();
|
|
}
|
|
|
|
public override Task<Stream> GetRequestStreamAsync ()
|
|
{
|
|
return RunWithTimeout (MyGetRequestStreamAsync);
|
|
}
|
|
|
|
internal static Task<T> RunWithTimeout<T> (
|
|
Func<CancellationToken, Task<T>> func, int timeout, Action abort)
|
|
{
|
|
// Call `func` here to propagate any potential exception that it
|
|
// might throw to our caller rather than returning a faulted task.
|
|
var cts = new CancellationTokenSource ();
|
|
var workerTask = func (cts.Token);
|
|
return RunWithTimeoutWorker (workerTask, timeout, abort, cts);
|
|
}
|
|
|
|
static async Task<T> RunWithTimeoutWorker<T> (
|
|
Task<T> workerTask, int timeout, Action abort,
|
|
CancellationTokenSource cts)
|
|
{
|
|
try {
|
|
if (await ServicePointScheduler.WaitAsync (workerTask, timeout).ConfigureAwait (false))
|
|
return workerTask.Result;
|
|
try {
|
|
cts.Cancel ();
|
|
abort ();
|
|
} catch {
|
|
// Ignore; we report the timeout.
|
|
}
|
|
throw new WebException (SR.net_timeout, WebExceptionStatus.Timeout);
|
|
} catch (Exception ex) {
|
|
throw FlattenException (ex);
|
|
} finally {
|
|
cts.Dispose ();
|
|
}
|
|
}
|
|
|
|
Task<T> RunWithTimeout<T> (Func<CancellationToken, Task<T>> func)
|
|
{
|
|
return RunWithTimeout (func, timeout, Abort);
|
|
}
|
|
|
|
async Task<HttpWebResponse> MyGetResponseAsync (CancellationToken cancellationToken)
|
|
{
|
|
if (Aborted)
|
|
throw CreateRequestAbortedException ();
|
|
|
|
if (method == null)
|
|
throw new ProtocolViolationException ("Method is null.");
|
|
|
|
string transferEncoding = TransferEncoding;
|
|
if (!sendChunked && transferEncoding != null && transferEncoding.Trim () != "")
|
|
throw new ProtocolViolationException ("SendChunked should be true.");
|
|
|
|
var completion = new WebCompletionSource ();
|
|
WebOperation operation;
|
|
lock (locker) {
|
|
getResponseCalled = true;
|
|
var oldCompletion = Interlocked.CompareExchange (ref responseTask, completion, null);
|
|
WebConnection.Debug ($"HWR GET RESPONSE: Req={ID} {oldCompletion != null}");
|
|
if (oldCompletion != null) {
|
|
oldCompletion.ThrowOnError ();
|
|
if (haveResponse && oldCompletion.Task.IsCompleted)
|
|
return webResponse;
|
|
throw new InvalidOperationException ("Cannot re-call start of asynchronous " +
|
|
"method while a previous call is still in progress.");
|
|
}
|
|
|
|
operation = currentOperation;
|
|
if (currentOperation != null)
|
|
writeStream = currentOperation.WriteStream;
|
|
|
|
initialMethod = method;
|
|
|
|
operation = SendRequest (false, null, cancellationToken);
|
|
}
|
|
|
|
while (true) {
|
|
WebException throwMe = null;
|
|
HttpWebResponse response = null;
|
|
WebResponseStream stream = null;
|
|
bool redirect = false;
|
|
bool mustReadAll = false;
|
|
WebOperation ntlm = null;
|
|
BufferOffsetSize writeBuffer = null;
|
|
|
|
try {
|
|
cancellationToken.ThrowIfCancellationRequested ();
|
|
|
|
WebConnection.Debug ($"HWR GET RESPONSE LOOP: Req={ID} {auth_state.NtlmAuthState}");
|
|
|
|
writeStream = await operation.GetRequestStreamInternal ();
|
|
await writeStream.WriteRequestAsync (cancellationToken).ConfigureAwait (false);
|
|
|
|
stream = await operation.GetResponseStream ();
|
|
|
|
WebConnection.Debug ($"HWR RESPONSE LOOP #0: Req={ID} - {stream?.Headers != null}");
|
|
|
|
(response, redirect, mustReadAll, writeBuffer, ntlm) = await GetResponseFromData (
|
|
stream, cancellationToken).ConfigureAwait (false);
|
|
} catch (Exception e) {
|
|
throwMe = GetWebException (e);
|
|
}
|
|
|
|
WebConnection.Debug ($"HWR GET RESPONSE LOOP #1: Req={ID} - redirect={redirect} mustReadAll={mustReadAll} writeBuffer={writeBuffer != null} ntlm={ntlm != null} - {throwMe != null}");
|
|
|
|
lock (locker) {
|
|
if (throwMe != null) {
|
|
WebConnection.Debug ($"HWR GET RESPONSE LOOP #1 EX: Req={ID} {throwMe.Status} {throwMe.InnerException?.GetType ()}");
|
|
haveResponse = true;
|
|
completion.TrySetException (throwMe);
|
|
throw throwMe;
|
|
}
|
|
|
|
if (!redirect) {
|
|
haveResponse = true;
|
|
webResponse = response;
|
|
completion.TrySetCompleted ();
|
|
return response;
|
|
}
|
|
|
|
finished_reading = false;
|
|
haveResponse = false;
|
|
webResponse = null;
|
|
currentOperation = ntlm;
|
|
WebConnection.Debug ($"HWR GET RESPONSE LOOP #2: Req={ID} {mustReadAll} {ntlm}");
|
|
}
|
|
|
|
try {
|
|
if (mustReadAll)
|
|
await stream.ReadAllAsync (redirect || ntlm != null, cancellationToken).ConfigureAwait (false);
|
|
operation.Finish (true);
|
|
response.Close ();
|
|
} catch (Exception e) {
|
|
throwMe = GetWebException (e);
|
|
}
|
|
|
|
lock (locker) {
|
|
WebConnection.Debug ($"HWR GET RESPONSE LOOP #3: Req={ID} {writeBuffer != null} {ntlm != null}");
|
|
if (throwMe != null) {
|
|
WebConnection.Debug ($"HWR GET RESPONSE LOOP #3 EX: Req={ID} {throwMe.Status} {throwMe.InnerException?.GetType ()}");
|
|
haveResponse = true;
|
|
stream?.Close ();
|
|
completion.TrySetException (throwMe);
|
|
throw throwMe;
|
|
}
|
|
|
|
if (ntlm == null) {
|
|
operation = SendRequest (true, writeBuffer, cancellationToken);
|
|
} else {
|
|
operation = ntlm;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
async Task<(HttpWebResponse response, bool redirect, bool mustReadAll, BufferOffsetSize writeBuffer, WebOperation ntlm)>
|
|
GetResponseFromData (WebResponseStream stream, CancellationToken cancellationToken)
|
|
{
|
|
/*
|
|
* WebConnection has either called SetResponseData() or SetResponseError().
|
|
*/
|
|
|
|
var response = new HttpWebResponse (actualUri, method, stream, cookieContainer);
|
|
|
|
WebException throwMe = null;
|
|
bool redirect = false;
|
|
bool mustReadAll = false;
|
|
WebOperation ntlm = null;
|
|
Task<BufferOffsetSize> rewriteHandler = null;
|
|
BufferOffsetSize writeBuffer = null;
|
|
|
|
lock (locker) {
|
|
(redirect, mustReadAll, rewriteHandler, throwMe) = CheckFinalStatus (response);
|
|
}
|
|
|
|
if (throwMe != null) {
|
|
if (mustReadAll)
|
|
await stream.ReadAllAsync (false, cancellationToken).ConfigureAwait (false);
|
|
throw throwMe;
|
|
}
|
|
|
|
if (rewriteHandler != null) {
|
|
writeBuffer = await rewriteHandler.ConfigureAwait (false);
|
|
}
|
|
|
|
lock (locker) {
|
|
bool isProxy = ProxyQuery && proxy != null && !proxy.IsBypassed (actualUri);
|
|
|
|
if (!redirect) {
|
|
if ((isProxy ? proxy_auth_state : auth_state).IsNtlmAuthenticated && (int)response.StatusCode < 400) {
|
|
stream.Connection.NtlmAuthenticated = true;
|
|
}
|
|
|
|
// clear internal buffer so that it does not
|
|
// hold possible big buffer (bug #397627)
|
|
if (writeStream != null)
|
|
writeStream.KillBuffer ();
|
|
|
|
return (response, false, false, writeBuffer, null);
|
|
}
|
|
|
|
if (sendChunked) {
|
|
sendChunked = false;
|
|
webHeaders.RemoveInternal ("Transfer-Encoding");
|
|
}
|
|
|
|
bool isChallenge;
|
|
(ntlm, isChallenge) = HandleNtlmAuth (stream, response, writeBuffer, cancellationToken);
|
|
WebConnection.Debug ($"HWR REDIRECT: {ntlm} {isChallenge} {mustReadAll}");
|
|
}
|
|
|
|
return (response, true, mustReadAll, writeBuffer, ntlm);
|
|
}
|
|
|
|
internal static Exception FlattenException (Exception e)
|
|
{
|
|
if (e is AggregateException ae) {
|
|
ae = ae.Flatten ();
|
|
if (ae.InnerExceptions.Count == 1)
|
|
return ae.InnerException;
|
|
}
|
|
|
|
return e;
|
|
}
|
|
|
|
WebException GetWebException (Exception e)
|
|
{
|
|
e = FlattenException (e);
|
|
if (e is WebException wexc) {
|
|
if (!Aborted || wexc.Status == WebExceptionStatus.RequestCanceled || wexc.Status == WebExceptionStatus.Timeout)
|
|
return wexc;
|
|
}
|
|
if (Aborted || e is OperationCanceledException || e is ObjectDisposedException)
|
|
return CreateRequestAbortedException ();
|
|
return new WebException (e.Message, e, WebExceptionStatus.UnknownError, null);
|
|
}
|
|
|
|
internal static WebException CreateRequestAbortedException ()
|
|
{
|
|
return new WebException (SR.Format (SR.net_reqaborted, WebExceptionStatus.RequestCanceled), WebExceptionStatus.RequestCanceled);
|
|
}
|
|
|
|
public override IAsyncResult BeginGetResponse (AsyncCallback callback, object state)
|
|
{
|
|
if (Aborted)
|
|
throw CreateRequestAbortedException ();
|
|
|
|
return TaskToApm.Begin (RunWithTimeout (MyGetResponseAsync), callback, state);
|
|
}
|
|
|
|
public override WebResponse EndGetResponse (IAsyncResult asyncResult)
|
|
{
|
|
if (asyncResult == null)
|
|
throw new ArgumentNullException (nameof (asyncResult));
|
|
|
|
try {
|
|
return TaskToApm.End<HttpWebResponse> (asyncResult);
|
|
} catch (Exception e) {
|
|
throw FlattenException (e);
|
|
}
|
|
}
|
|
|
|
public Stream EndGetRequestStream (IAsyncResult asyncResult, out TransportContext context)
|
|
{
|
|
if (asyncResult == null)
|
|
throw new ArgumentNullException (nameof (asyncResult));
|
|
|
|
context = null;
|
|
return EndGetRequestStream (asyncResult);
|
|
}
|
|
|
|
public override WebResponse GetResponse ()
|
|
{
|
|
try {
|
|
return GetResponseAsync ().Result;
|
|
} catch (Exception e) {
|
|
throw FlattenException (e);
|
|
}
|
|
}
|
|
|
|
internal bool FinishedReading {
|
|
get { return finished_reading; }
|
|
set { finished_reading = value; }
|
|
}
|
|
|
|
internal bool Aborted {
|
|
get { return Interlocked.CompareExchange (ref aborted, 0, 0) == 1; }
|
|
}
|
|
|
|
public override void Abort ()
|
|
{
|
|
if (Interlocked.CompareExchange (ref aborted, 1, 0) == 1)
|
|
return;
|
|
|
|
WebConnection.Debug ($"HWR ABORT: Req={ID}");
|
|
|
|
haveResponse = true;
|
|
var operation = currentOperation;
|
|
if (operation != null)
|
|
operation.Abort ();
|
|
|
|
responseTask?.TrySetCanceled ();
|
|
|
|
if (webResponse != null) {
|
|
try {
|
|
webResponse.Close ();
|
|
webResponse = null;
|
|
} catch { }
|
|
}
|
|
}
|
|
|
|
void ISerializable.GetObjectData (SerializationInfo serializationInfo,
|
|
StreamingContext streamingContext)
|
|
{
|
|
throw new SerializationException ();
|
|
}
|
|
|
|
protected override void GetObjectData (SerializationInfo serializationInfo,
|
|
StreamingContext streamingContext)
|
|
{
|
|
throw new SerializationException ();
|
|
}
|
|
|
|
void CheckRequestStarted ()
|
|
{
|
|
if (requestSent)
|
|
throw new InvalidOperationException ("request started");
|
|
}
|
|
|
|
internal void DoContinueDelegate (int statusCode, WebHeaderCollection headers)
|
|
{
|
|
if (continueDelegate != null)
|
|
continueDelegate (statusCode, headers);
|
|
}
|
|
|
|
void RewriteRedirectToGet ()
|
|
{
|
|
method = "GET";
|
|
webHeaders.RemoveInternal ("Transfer-Encoding");
|
|
sendChunked = false;
|
|
}
|
|
|
|
bool Redirect (HttpStatusCode code, WebResponse response)
|
|
{
|
|
redirects++;
|
|
Exception e = null;
|
|
string uriString = null;
|
|
switch (code) {
|
|
case HttpStatusCode.Ambiguous: // 300
|
|
e = new WebException ("Ambiguous redirect.");
|
|
break;
|
|
case HttpStatusCode.MovedPermanently: // 301
|
|
case HttpStatusCode.Redirect: // 302
|
|
if (method == "POST")
|
|
RewriteRedirectToGet ();
|
|
break;
|
|
case HttpStatusCode.TemporaryRedirect: // 307
|
|
break;
|
|
case HttpStatusCode.SeeOther: //303
|
|
RewriteRedirectToGet ();
|
|
break;
|
|
case HttpStatusCode.NotModified: // 304
|
|
return false;
|
|
case HttpStatusCode.UseProxy: // 305
|
|
e = new NotImplementedException ("Proxy support not available.");
|
|
break;
|
|
case HttpStatusCode.Unused: // 306
|
|
default:
|
|
e = new ProtocolViolationException ("Invalid status code: " + (int)code);
|
|
break;
|
|
}
|
|
|
|
if (method != "GET" && !InternalAllowBuffering && ResendContentFactory == null &&
|
|
(writeStream.WriteBufferLength > 0 || contentLength > 0))
|
|
e = new WebException ("The request requires buffering data to succeed.", null, WebExceptionStatus.ProtocolError, response);
|
|
|
|
if (e != null)
|
|
throw e;
|
|
|
|
if (AllowWriteStreamBuffering || method == "GET")
|
|
contentLength = -1;
|
|
|
|
uriString = response.Headers["Location"];
|
|
|
|
if (uriString == null)
|
|
throw new WebException ($"No Location header found for {(int)code}", null,
|
|
WebExceptionStatus.ProtocolError, response);
|
|
|
|
Uri prev = actualUri;
|
|
try {
|
|
actualUri = new Uri (actualUri, uriString);
|
|
} catch (Exception) {
|
|
throw new WebException ($"Invalid URL ({uriString}) for {(int)code}",
|
|
null, WebExceptionStatus.ProtocolError, response);
|
|
}
|
|
|
|
hostChanged = (actualUri.Scheme != prev.Scheme || Host != prev.Authority);
|
|
return true;
|
|
}
|
|
|
|
string GetHeaders ()
|
|
{
|
|
bool continue100 = false;
|
|
if (sendChunked) {
|
|
continue100 = true;
|
|
webHeaders.ChangeInternal ("Transfer-Encoding", "chunked");
|
|
webHeaders.RemoveInternal ("Content-Length");
|
|
} else if (contentLength != -1) {
|
|
if (auth_state.NtlmAuthState == NtlmAuthState.Challenge || proxy_auth_state.NtlmAuthState == NtlmAuthState.Challenge) {
|
|
// We don't send any body with the NTLM Challenge request.
|
|
if (haveContentLength || gotRequestStream || contentLength > 0)
|
|
webHeaders.SetInternal ("Content-Length", "0");
|
|
else
|
|
webHeaders.RemoveInternal ("Content-Length");
|
|
} else {
|
|
if (contentLength > 0)
|
|
continue100 = true;
|
|
|
|
if (haveContentLength || gotRequestStream || contentLength > 0)
|
|
webHeaders.SetInternal ("Content-Length", contentLength.ToString ());
|
|
}
|
|
webHeaders.RemoveInternal ("Transfer-Encoding");
|
|
} else {
|
|
webHeaders.RemoveInternal ("Content-Length");
|
|
}
|
|
|
|
if (actualVersion == HttpVersion.Version11 && continue100 &&
|
|
servicePoint.SendContinue) { // RFC2616 8.2.3
|
|
webHeaders.ChangeInternal ("Expect", "100-continue");
|
|
expectContinue = true;
|
|
} else {
|
|
webHeaders.RemoveInternal ("Expect");
|
|
expectContinue = false;
|
|
}
|
|
|
|
bool proxy_query = ProxyQuery;
|
|
string connectionHeader = (proxy_query) ? "Proxy-Connection" : "Connection";
|
|
webHeaders.RemoveInternal ((!proxy_query) ? "Proxy-Connection" : "Connection");
|
|
Version proto_version = servicePoint.ProtocolVersion;
|
|
bool spoint10 = (proto_version == null || proto_version == HttpVersion.Version10);
|
|
|
|
if (keepAlive && (version == HttpVersion.Version10 || spoint10)) {
|
|
if (webHeaders[connectionHeader] == null
|
|
|| webHeaders[connectionHeader].IndexOf ("keep-alive", StringComparison.OrdinalIgnoreCase) == -1)
|
|
webHeaders.ChangeInternal (connectionHeader, "keep-alive");
|
|
} else if (!keepAlive && version == HttpVersion.Version11) {
|
|
webHeaders.ChangeInternal (connectionHeader, "close");
|
|
}
|
|
|
|
string host;
|
|
if (hostUri != null) {
|
|
if (hostHasPort)
|
|
host = hostUri.GetComponents (UriComponents.HostAndPort, UriFormat.Unescaped);
|
|
else
|
|
host = hostUri.GetComponents (UriComponents.Host, UriFormat.Unescaped);
|
|
} else if (Address.IsDefaultPort) {
|
|
host = Address.GetComponents (UriComponents.Host, UriFormat.Unescaped);
|
|
} else {
|
|
host = Address.GetComponents (UriComponents.HostAndPort, UriFormat.Unescaped);
|
|
}
|
|
webHeaders.SetInternal ("Host", host);
|
|
|
|
if (cookieContainer != null) {
|
|
string cookieHeader = cookieContainer.GetCookieHeader (actualUri);
|
|
if (cookieHeader != "")
|
|
webHeaders.ChangeInternal ("Cookie", cookieHeader);
|
|
else
|
|
webHeaders.RemoveInternal ("Cookie");
|
|
}
|
|
|
|
string accept_encoding = null;
|
|
if ((auto_decomp & DecompressionMethods.GZip) != 0)
|
|
accept_encoding = "gzip";
|
|
if ((auto_decomp & DecompressionMethods.Deflate) != 0)
|
|
accept_encoding = accept_encoding != null ? "gzip, deflate" : "deflate";
|
|
if (accept_encoding != null)
|
|
webHeaders.ChangeInternal ("Accept-Encoding", accept_encoding);
|
|
|
|
if (!usedPreAuth && preAuthenticate)
|
|
DoPreAuthenticate ();
|
|
|
|
return webHeaders.ToString ();
|
|
}
|
|
|
|
void DoPreAuthenticate ()
|
|
{
|
|
bool isProxy = (proxy != null && !proxy.IsBypassed (actualUri));
|
|
ICredentials creds = (!isProxy || credentials != null) ? credentials : proxy.Credentials;
|
|
Authorization auth = AuthenticationManager.PreAuthenticate (this, creds);
|
|
if (auth == null)
|
|
return;
|
|
|
|
webHeaders.RemoveInternal ("Proxy-Authorization");
|
|
webHeaders.RemoveInternal ("Authorization");
|
|
string authHeader = (isProxy && credentials == null) ? "Proxy-Authorization" : "Authorization";
|
|
webHeaders[authHeader] = auth.Message;
|
|
usedPreAuth = true;
|
|
}
|
|
|
|
internal byte[] GetRequestHeaders ()
|
|
{
|
|
StringBuilder req = new StringBuilder ();
|
|
string query;
|
|
if (!ProxyQuery) {
|
|
query = actualUri.PathAndQuery;
|
|
} else {
|
|
query = String.Format ("{0}://{1}{2}", actualUri.Scheme,
|
|
Host,
|
|
actualUri.PathAndQuery);
|
|
}
|
|
|
|
if (!force_version && servicePoint.ProtocolVersion != null && servicePoint.ProtocolVersion < version) {
|
|
actualVersion = servicePoint.ProtocolVersion;
|
|
} else {
|
|
actualVersion = version;
|
|
}
|
|
|
|
req.AppendFormat ("{0} {1} HTTP/{2}.{3}\r\n", method, query,
|
|
actualVersion.Major, actualVersion.Minor);
|
|
req.Append (GetHeaders ());
|
|
string reqstr = req.ToString ();
|
|
return Encoding.UTF8.GetBytes (reqstr);
|
|
}
|
|
|
|
(WebOperation, bool) HandleNtlmAuth (WebResponseStream stream, HttpWebResponse response,
|
|
BufferOffsetSize writeBuffer, CancellationToken cancellationToken)
|
|
{
|
|
bool isProxy = response.StatusCode == HttpStatusCode.ProxyAuthenticationRequired;
|
|
if ((isProxy ? proxy_auth_state : auth_state).NtlmAuthState == NtlmAuthState.None)
|
|
return (null, false);
|
|
|
|
var isChallenge = auth_state.NtlmAuthState == NtlmAuthState.Challenge || proxy_auth_state.NtlmAuthState == NtlmAuthState.Challenge;
|
|
|
|
var operation = new WebOperation (this, writeBuffer, isChallenge, cancellationToken);
|
|
stream.Operation.SetPriorityRequest (operation);
|
|
var creds = (!isProxy || proxy == null) ? credentials : proxy.Credentials;
|
|
if (creds != null) {
|
|
stream.Connection.NtlmCredential = creds.GetCredential (requestUri, "NTLM");
|
|
stream.Connection.UnsafeAuthenticatedConnectionSharing = unsafe_auth_blah;
|
|
}
|
|
return (operation, isChallenge);
|
|
}
|
|
|
|
struct AuthorizationState
|
|
{
|
|
readonly HttpWebRequest request;
|
|
readonly bool isProxy;
|
|
bool isCompleted;
|
|
NtlmAuthState ntlm_auth_state;
|
|
|
|
public bool IsCompleted {
|
|
get { return isCompleted; }
|
|
}
|
|
|
|
public NtlmAuthState NtlmAuthState {
|
|
get { return ntlm_auth_state; }
|
|
}
|
|
|
|
public bool IsNtlmAuthenticated {
|
|
get { return isCompleted && ntlm_auth_state != NtlmAuthState.None; }
|
|
}
|
|
|
|
public AuthorizationState (HttpWebRequest request, bool isProxy)
|
|
{
|
|
this.request = request;
|
|
this.isProxy = isProxy;
|
|
isCompleted = false;
|
|
ntlm_auth_state = NtlmAuthState.None;
|
|
}
|
|
|
|
public bool CheckAuthorization (WebResponse response, HttpStatusCode code)
|
|
{
|
|
isCompleted = false;
|
|
if (code == HttpStatusCode.Unauthorized && request.credentials == null)
|
|
return false;
|
|
|
|
// FIXME: This should never happen!
|
|
if (isProxy != (code == HttpStatusCode.ProxyAuthenticationRequired))
|
|
return false;
|
|
|
|
if (isProxy && (request.proxy == null || request.proxy.Credentials == null))
|
|
return false;
|
|
|
|
string[] authHeaders = response.Headers.GetValues (isProxy ? "Proxy-Authenticate" : "WWW-Authenticate");
|
|
if (authHeaders == null || authHeaders.Length == 0)
|
|
return false;
|
|
|
|
ICredentials creds = (!isProxy) ? request.credentials : request.proxy.Credentials;
|
|
Authorization auth = null;
|
|
foreach (string authHeader in authHeaders) {
|
|
auth = AuthenticationManager.Authenticate (authHeader, request, creds);
|
|
if (auth != null)
|
|
break;
|
|
}
|
|
if (auth == null)
|
|
return false;
|
|
request.webHeaders[isProxy ? "Proxy-Authorization" : "Authorization"] = auth.Message;
|
|
isCompleted = auth.Complete;
|
|
bool is_ntlm = (auth.ModuleAuthenticationType == "NTLM");
|
|
if (is_ntlm)
|
|
ntlm_auth_state = (NtlmAuthState)((int)ntlm_auth_state + 1);
|
|
return true;
|
|
}
|
|
|
|
public void Reset ()
|
|
{
|
|
isCompleted = false;
|
|
ntlm_auth_state = NtlmAuthState.None;
|
|
request.webHeaders.RemoveInternal (isProxy ? "Proxy-Authorization" : "Authorization");
|
|
}
|
|
|
|
public override string ToString ()
|
|
{
|
|
return string.Format ("{0}AuthState [{1}:{2}]", isProxy ? "Proxy" : "", isCompleted, ntlm_auth_state);
|
|
}
|
|
}
|
|
|
|
bool CheckAuthorization (WebResponse response, HttpStatusCode code)
|
|
{
|
|
bool isProxy = code == HttpStatusCode.ProxyAuthenticationRequired;
|
|
return isProxy ? proxy_auth_state.CheckAuthorization (response, code) : auth_state.CheckAuthorization (response, code);
|
|
}
|
|
|
|
(Task<BufferOffsetSize> task, WebException throwMe) GetRewriteHandler (HttpWebResponse response, bool redirect)
|
|
{
|
|
if (redirect) {
|
|
if (!MethodWithBuffer)
|
|
return (null, null);
|
|
|
|
if (writeStream.WriteBufferLength == 0 || contentLength == 0)
|
|
return (null, null);
|
|
}
|
|
|
|
// Keep the written body, so it can be rewritten in the retry
|
|
if (AllowWriteStreamBuffering)
|
|
return (Task.FromResult (writeStream.GetWriteBuffer ()), null);
|
|
|
|
if (ResendContentFactory == null)
|
|
return (null, new WebException (
|
|
"The request requires buffering data to succeed.", null, WebExceptionStatus.ProtocolError, response));
|
|
|
|
Func<Task<BufferOffsetSize>> handleResendContentFactory = async () => {
|
|
using (var ms = new MemoryStream ()) {
|
|
await ResendContentFactory (ms).ConfigureAwait (false);
|
|
var buffer = ms.ToArray ();
|
|
return new BufferOffsetSize (buffer, 0, buffer.Length, false);
|
|
}
|
|
};
|
|
|
|
//
|
|
// Buffering is not allowed but we have alternative way to get same content (we
|
|
// need to resent it due to NTLM Authentication).
|
|
//
|
|
return (handleResendContentFactory (), null);
|
|
}
|
|
|
|
// Returns true if redirected
|
|
(bool redirect, bool mustReadAll, Task<BufferOffsetSize> writeBuffer, WebException throwMe) CheckFinalStatus (HttpWebResponse response)
|
|
{
|
|
WebException throwMe = null;
|
|
|
|
bool mustReadAll = false;
|
|
HttpStatusCode code = 0;
|
|
Task<BufferOffsetSize> rewriteHandler = null;
|
|
|
|
code = response.StatusCode;
|
|
if ((!auth_state.IsCompleted && code == HttpStatusCode.Unauthorized && credentials != null) ||
|
|
(ProxyQuery && !proxy_auth_state.IsCompleted && code == HttpStatusCode.ProxyAuthenticationRequired)) {
|
|
if (!usedPreAuth && CheckAuthorization (response, code)) {
|
|
mustReadAll = true;
|
|
|
|
// HEAD, GET, MKCOL, CONNECT, TRACE
|
|
if (!MethodWithBuffer)
|
|
return (true, mustReadAll, null, null);
|
|
|
|
(rewriteHandler, throwMe) = GetRewriteHandler (response, false);
|
|
if (throwMe == null)
|
|
return (true, mustReadAll, rewriteHandler, null);
|
|
|
|
if (!ThrowOnError)
|
|
return (false, mustReadAll, null, null);
|
|
|
|
writeStream.InternalClose ();
|
|
writeStream = null;
|
|
response.Close ();
|
|
|
|
return (false, mustReadAll, null, throwMe);
|
|
}
|
|
}
|
|
|
|
if ((int)code >= 400) {
|
|
string err = String.Format ("The remote server returned an error: ({0}) {1}.",
|
|
(int)code, response.StatusDescription);
|
|
throwMe = new WebException (err, null, WebExceptionStatus.ProtocolError, response);
|
|
mustReadAll = true;
|
|
} else if ((int)code == 304 && allowAutoRedirect) {
|
|
string err = String.Format ("The remote server returned an error: ({0}) {1}.",
|
|
(int)code, response.StatusDescription);
|
|
throwMe = new WebException (err, null, WebExceptionStatus.ProtocolError, response);
|
|
} else if ((int)code >= 300 && allowAutoRedirect && redirects >= maxAutoRedirect) {
|
|
throwMe = new WebException ("Max. redirections exceeded.", null,
|
|
WebExceptionStatus.ProtocolError, response);
|
|
mustReadAll = true;
|
|
}
|
|
|
|
if (throwMe == null) {
|
|
int c = (int)code;
|
|
bool b = false;
|
|
if (allowAutoRedirect && c >= 300) {
|
|
b = Redirect (code, response);
|
|
(rewriteHandler, throwMe) = GetRewriteHandler (response, true);
|
|
if (b && !unsafe_auth_blah) {
|
|
auth_state.Reset ();
|
|
proxy_auth_state.Reset ();
|
|
}
|
|
}
|
|
|
|
if (c >= 300 && c != 304)
|
|
mustReadAll = true;
|
|
|
|
if (throwMe == null)
|
|
return (b, mustReadAll, rewriteHandler, null);
|
|
}
|
|
|
|
if (!ThrowOnError)
|
|
return (false, mustReadAll, null, null);
|
|
|
|
if (writeStream != null) {
|
|
writeStream.InternalClose ();
|
|
writeStream = null;
|
|
}
|
|
|
|
return (false, mustReadAll, null, throwMe);
|
|
}
|
|
|
|
internal bool ReuseConnection {
|
|
get;
|
|
set;
|
|
}
|
|
|
|
#region referencesource
|
|
internal static StringBuilder GenerateConnectionGroup(string connectionGroupName, bool unsafeConnectionGroup, bool isInternalGroup)
|
|
{
|
|
StringBuilder connectionLine = new StringBuilder(connectionGroupName);
|
|
|
|
connectionLine.Append(unsafeConnectionGroup ? "U>" : "S>");
|
|
|
|
if (isInternalGroup)
|
|
{
|
|
connectionLine.Append("I>");
|
|
}
|
|
|
|
return connectionLine;
|
|
}
|
|
#endregion
|
|
}
|
|
}
|
|
|