mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
115 lines
4.1 KiB
C++
115 lines
4.1 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsHttpHandler.h"
|
|
#include "nsHttpChannel.h"
|
|
#include "nsHttpAuthManager.h"
|
|
#include "nsReadableUtils.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
NS_IMPL_ISUPPORTS1(nsHttpAuthManager, nsIHttpAuthManager)
|
|
|
|
nsHttpAuthManager::nsHttpAuthManager()
|
|
{
|
|
}
|
|
|
|
nsresult nsHttpAuthManager::Init()
|
|
{
|
|
// get reference to the auth cache. we assume that we will live
|
|
// as long as gHttpHandler. instantiate it if necessary.
|
|
|
|
if (!gHttpHandler) {
|
|
nsresult rv;
|
|
nsCOMPtr<nsIIOService> ios = do_GetIOService(&rv);
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
|
|
nsCOMPtr<nsIProtocolHandler> handler;
|
|
rv = ios->GetProtocolHandler("http", getter_AddRefs(handler));
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
|
|
// maybe someone is overriding our HTTP handler implementation?
|
|
NS_ENSURE_TRUE(gHttpHandler, NS_ERROR_UNEXPECTED);
|
|
}
|
|
|
|
mAuthCache = gHttpHandler->AuthCache();
|
|
NS_ENSURE_TRUE(mAuthCache, NS_ERROR_FAILURE);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsHttpAuthManager::~nsHttpAuthManager()
|
|
{
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsHttpAuthManager::GetAuthIdentity(const nsACString & aScheme,
|
|
const nsACString & aHost,
|
|
PRInt32 aPort,
|
|
const nsACString & aAuthType,
|
|
const nsACString & aRealm,
|
|
const nsACString & aPath,
|
|
nsAString & aUserDomain,
|
|
nsAString & aUserName,
|
|
nsAString & aUserPassword)
|
|
{
|
|
nsHttpAuthEntry * entry = nsnull;
|
|
nsresult rv;
|
|
if (!aPath.IsEmpty())
|
|
rv = mAuthCache->GetAuthEntryForPath(PromiseFlatCString(aScheme).get(),
|
|
PromiseFlatCString(aHost).get(),
|
|
aPort,
|
|
PromiseFlatCString(aPath).get(),
|
|
&entry);
|
|
else
|
|
rv = mAuthCache->GetAuthEntryForDomain(PromiseFlatCString(aScheme).get(),
|
|
PromiseFlatCString(aHost).get(),
|
|
aPort,
|
|
PromiseFlatCString(aRealm).get(),
|
|
&entry);
|
|
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
if (!entry)
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
aUserDomain.Assign(entry->Domain());
|
|
aUserName.Assign(entry->User());
|
|
aUserPassword.Assign(entry->Pass());
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsHttpAuthManager::SetAuthIdentity(const nsACString & aScheme,
|
|
const nsACString & aHost,
|
|
PRInt32 aPort,
|
|
const nsACString & aAuthType,
|
|
const nsACString & aRealm,
|
|
const nsACString & aPath,
|
|
const nsAString & aUserDomain,
|
|
const nsAString & aUserName,
|
|
const nsAString & aUserPassword)
|
|
{
|
|
nsHttpAuthIdentity ident(PromiseFlatString(aUserDomain).get(),
|
|
PromiseFlatString(aUserName).get(),
|
|
PromiseFlatString(aUserPassword).get());
|
|
|
|
return mAuthCache->SetAuthEntry(PromiseFlatCString(aScheme).get(),
|
|
PromiseFlatCString(aHost).get(),
|
|
aPort,
|
|
PromiseFlatCString(aPath).get(),
|
|
PromiseFlatCString(aRealm).get(),
|
|
nsnull, // credentials
|
|
nsnull, // challenge
|
|
&ident,
|
|
nsnull); // metadata
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsHttpAuthManager::ClearAll()
|
|
{
|
|
return mAuthCache->ClearAll();
|
|
}
|