// Copyright 2011 The Chromium Authors // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef NET_HTTP_HTTP_AUTH_HANDLER_H_ #define NET_HTTP_HTTP_AUTH_HANDLER_H_ #include #include "net/base/completion_once_callback.h" #include "net/base/net_export.h" #include "net/http/http_auth.h" #include "net/log/net_log_with_source.h" #include "url/scheme_host_port.h" namespace net { class NetworkAnonymizationKey; class HttpAuthChallengeTokenizer; struct HttpRequestInfo; class SSLInfo; // HttpAuthHandler is the interface for the authentication schemes // (basic, digest, NTLM, Negotiate). // HttpAuthHandler objects are typically created by an HttpAuthHandlerFactory. // // HttpAuthHandlers and generally created and managed by an HttpAuthController, // which is the interaction point between the rest of net and the HTTP auth // code. // // For connection-based authentication, an HttpAuthHandler handles all rounds // related to using a single identity. If the identity is rejected, a new // HttpAuthHandler must be created. class NET_EXPORT_PRIVATE HttpAuthHandler { public: HttpAuthHandler(); HttpAuthHandler(const HttpAuthHandler&) = delete; HttpAuthHandler& operator=(const HttpAuthHandler&) = delete; virtual ~HttpAuthHandler(); // Initializes the handler using a challenge issued by a server. // // |challenge| must be non-nullptr and have already tokenized the // authentication scheme, but none of the tokens occurring after the // authentication scheme. // |target| and |scheme_host_port| are both stored for later use, and are not // part of the initial challenge. // |ssl_info| must be valid if the underlying connection used a certificate. // |network_anonymization_key| the NetworkAnonymizationKey associated with the // challenge. Used for host resolutions, if any are needed. // |net_log| to be used for logging. bool InitFromChallenge( HttpAuthChallengeTokenizer* challenge, HttpAuth::Target target, const SSLInfo& ssl_info, const NetworkAnonymizationKey& network_anonymization_key, const url::SchemeHostPort& scheme_host_port, const NetLogWithSource& net_log); // Determines how the previous authorization attempt was received. // // This is called when the server/proxy responds with a 401/407 after an // earlier authorization attempt. Although this normally means that the // previous attempt was rejected, in multi-round schemes such as // NTLM+Negotiate it may indicate that another round of challenge+response // is required. For Digest authentication it may also mean that the previous // attempt used a stale nonce (and nonce-count) and that a new attempt should // be made with a different nonce provided in the challenge. // // |challenge| must be non-nullptr and have already tokenized the // authentication scheme, but none of the tokens occurring after the // authentication scheme. HttpAuth::AuthorizationResult HandleAnotherChallenge( HttpAuthChallengeTokenizer* challenge); // Generates an authentication token, potentially asynchronously. // // When |credentials| is nullptr, the default credentials for the currently // logged in user are used. |AllowsDefaultCredentials()| MUST be true in this // case. // // |request|, |callback|, and |auth_token| must be non-nullptr. // // The return value is a net error code. // // If |OK| is returned, |*auth_token| is filled in with an authentication // token which can be inserted in the HTTP request. // // If |ERR_IO_PENDING| is returned, |*auth_token| will be filled in // asynchronously and |callback| will be invoked. The lifetime of // |request|, |callback|, and |auth_token| must last until |callback| is // invoked, but |credentials| is only used during the initial call. // // All other return codes indicate that there was a problem generating a // token, and the value of |*auth_token| is unspecified. int GenerateAuthToken(const AuthCredentials* credentials, const HttpRequestInfo* request, CompletionOnceCallback callback, std::string* auth_token); // The authentication scheme as an enumerated value. HttpAuth::Scheme auth_scheme() const { return auth_scheme_; } // The realm, encoded as UTF-8. This may be empty. const std::string& realm() const { return realm_; } // The challenge which was issued when creating the handler. const std::string& challenge() const { return auth_challenge_; } // Numeric rank based on the challenge's security level. Higher // numbers are better. Used by HttpAuth::ChooseBestChallenge(). int score() const { return score_; } HttpAuth::Target target() const { return target_; } // Returns the proxy or server which issued the authentication challenge // that this HttpAuthHandler is handling. const url::SchemeHostPort& scheme_host_port() const { return scheme_host_port_; } // Returns true if the authentication scheme does not send the username and // password in the clear. bool encrypts_identity() const { return (properties_ & ENCRYPTS_IDENTITY) != 0; } // Returns true if the authentication scheme is connection-based, for // example, NTLM. A connection-based authentication scheme does not support // preemptive authentication, and must use the same handler object // throughout the life of an HTTP transaction. bool is_connection_based() const { return (properties_ & IS_CONNECTION_BASED) != 0; } // This HttpAuthHandler's bound NetLog. const NetLogWithSource& net_log() const { return net_log_; } // If NeedsIdentity() returns true, then a subsequent call to // GenerateAuthToken() must indicate which identity to use. This can be done // either by passing in a non-empty set of credentials, or an empty set to // force the handler to use the default credentials. The latter is only an // option if AllowsDefaultCredentials() returns true. // // If NeedsIdentity() returns false, then the handler is already bound to an // identity and GenerateAuthToken() will ignore any credentials that are // passed in. // // TODO(wtc): Find a better way to handle a multi-round challenge-response // sequence used by a connection-based authentication scheme. virtual bool NeedsIdentity(); // Returns whether the default credentials may be used for the |origin| passed // into |InitFromChallenge|. If true, the user does not need to be prompted // for username and password to establish credentials. // NOTE: SSO is a potential security risk. // TODO(cbentzel): Add a pointer to Firefox documentation about risk. virtual bool AllowsDefaultCredentials(); // Returns whether explicit credentials can be used with this handler. If // true the user may be prompted for credentials if an implicit identity // cannot be determined. virtual bool AllowsExplicitCredentials(); protected: enum Property { ENCRYPTS_IDENTITY = 1 << 0, IS_CONNECTION_BASED = 1 << 1, }; // Initializes the handler using a challenge issued by a server. // |challenge| must be non-nullptr and have already tokenized the // authentication scheme, but none of the tokens occurring after the // authentication scheme. // // If the request was sent over an encrypted connection, |ssl_info| is valid // and describes the connection. // // NetworkAnonymizationKey is the NetworkAnonymizationKey associated with the // request. // // Implementations are expected to initialize the following members: // scheme_, realm_, score_, properties_ virtual bool Init( HttpAuthChallengeTokenizer* challenge, const SSLInfo& ssl_info, const NetworkAnonymizationKey& network_anonymization_key) = 0; // |GenerateAuthTokenImpl()} is the auth-scheme specific implementation // of generating the next auth token. Callers should use |GenerateAuthToken()| // which will in turn call |GenerateAuthTokenImpl()| virtual int GenerateAuthTokenImpl(const AuthCredentials* credentials, const HttpRequestInfo* request, CompletionOnceCallback callback, std::string* auth_token) = 0; // See HandleAnotherChallenge() above. HandleAuthChallengeImpl is the // scheme-specific implementation. Callers should use HandleAnotherChallenge() // instead. virtual HttpAuth::AuthorizationResult HandleAnotherChallengeImpl( HttpAuthChallengeTokenizer* challenge) = 0; // The auth-scheme as an enumerated value. HttpAuth::Scheme auth_scheme_ = HttpAuth::AUTH_SCHEME_MAX; // The realm, encoded as UTF-8. Used by "basic" and "digest". std::string realm_; // The auth challenge. std::string auth_challenge_; // The {scheme, host, port} for the authentication target. Used by "ntlm" // and "negotiate" to construct the service principal name. url::SchemeHostPort scheme_host_port_; // The score for this challenge. Higher numbers are better. int score_ = -1; // Whether this authentication request is for a proxy server, or an // origin server. HttpAuth::Target target_ = HttpAuth::AUTH_NONE; // A bitmask of the properties of the authentication scheme. int properties_ = -1; private: void OnGenerateAuthTokenComplete(int rv); void FinishGenerateAuthToken(int rv); // NetLog that should be used for logging events generated by this // HttpAuthHandler. NetLogWithSource net_log_; CompletionOnceCallback callback_; }; } // namespace net #endif // NET_HTTP_HTTP_AUTH_HANDLER_H_