You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1559 lines
45 KiB
1559 lines
45 KiB
/* This file is part of the KDE File Manager
|
|
|
|
Copyright (C) 1998-2000 Waldo Bastian (bastian@kde.org)
|
|
Copyright (C) 2000,2001 Dawit Alemayehu (adawit@kde.org)
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
of this software and associated documentation files (the "Software"), to deal
|
|
in the Software without restriction, including without limitation the rights
|
|
to use, copy, modify, merge, publish, distribute, and/or sell copies of the
|
|
Software, and to permit persons to whom the Software is furnished to do so,
|
|
subject to the following conditions:
|
|
|
|
The above copyright notice and this permission notice shall be included in
|
|
all copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
//----------------------------------------------------------------------------
|
|
//
|
|
// KDE File Manager -- HTTP Cookies
|
|
// $Id$
|
|
|
|
//
|
|
// The cookie protocol is a mess. RFC2109 is a joke since nobody seems to
|
|
// use it. Apart from that it is badly written.
|
|
// We try to implement Netscape Cookies and try to behave us according to
|
|
// RFC2109 as much as we can.
|
|
//
|
|
// We assume cookies do not contain any spaces (Netscape spec.)
|
|
// According to RFC2109 this is allowed though.
|
|
//
|
|
|
|
#include <config.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#ifdef HAVE_SYS_PARAM_H
|
|
#include <sys/param.h>
|
|
#endif
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#ifdef USE_SOLARIS
|
|
#include <strings.h>
|
|
#endif
|
|
|
|
#include <stdlib.h>
|
|
|
|
//#include <netinet/in.h>
|
|
//#include <arpa/inet.h>
|
|
|
|
#include <tqstring.h>
|
|
#include <tqstrlist.h>
|
|
#include <tqptrlist.h>
|
|
#include <tqptrdict.h>
|
|
#include <tqfile.h>
|
|
#include <tqdir.h>
|
|
#include <tqregexp.h>
|
|
|
|
#include <kurl.h>
|
|
#include <krfcdate.h>
|
|
#include <kconfig.h>
|
|
#include <ksavefile.h>
|
|
#include <kdebug.h>
|
|
|
|
#include "kcookiejar.h"
|
|
|
|
|
|
// BR87227
|
|
// Waba: Should the number of cookies be limited?
|
|
// I am not convinced of the need of such limit
|
|
// Mozilla seems to limit to 20 cookies / domain
|
|
// but it is unclear which policy it uses to expire
|
|
// cookies when it exceeds that amount
|
|
#undef MAX_COOKIE_LIMIT
|
|
|
|
#define MAX_COOKIES_PER_HOST 25
|
|
#define READ_BUFFER_SIZE 8192
|
|
#define IP_ADDRESS_EXPRESSION "(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)"
|
|
|
|
// Note with respect to TQString::fromLatin1( )
|
|
// Cookies are stored as 8 bit data and passed to kio_http as
|
|
// latin1 regardless of their actual encoding.
|
|
|
|
// L1 is used to indicate latin1 constants
|
|
#define L1(x) TQString::fromLatin1(x)
|
|
|
|
template class TQPtrList<KHttpCookie>;
|
|
template class TQPtrDict<KHttpCookieList>;
|
|
|
|
TQString KCookieJar::adviceToStr(KCookieAdvice _advice)
|
|
{
|
|
switch( _advice )
|
|
{
|
|
case KCookieAccept: return L1("Accept");
|
|
case KCookieReject: return L1("Reject");
|
|
case KCookieAsk: return L1("Ask");
|
|
default: return L1("Dunno");
|
|
}
|
|
}
|
|
|
|
KCookieAdvice KCookieJar::strToAdvice(const TQString &_str)
|
|
{
|
|
if (_str.isEmpty())
|
|
return KCookieDunno;
|
|
|
|
TQCString advice = _str.lower().latin1();
|
|
|
|
if (advice == "accept")
|
|
return KCookieAccept;
|
|
else if (advice == "reject")
|
|
return KCookieReject;
|
|
else if (advice == "ask")
|
|
return KCookieAsk;
|
|
|
|
return KCookieDunno;
|
|
}
|
|
|
|
// KHttpCookie
|
|
///////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
// Cookie constructor
|
|
//
|
|
KHttpCookie::KHttpCookie(const TQString &_host,
|
|
const TQString &_domain,
|
|
const TQString &_path,
|
|
const TQString &_name,
|
|
const TQString &_value,
|
|
time_t _expireDate,
|
|
int _protocolVersion,
|
|
bool _secure,
|
|
bool _httpOnly,
|
|
bool _explicitPath) :
|
|
mHost(_host),
|
|
mDomain(_domain),
|
|
mPath(_path.isEmpty() ? TQString::null : _path),
|
|
mName(_name),
|
|
mValue(_value),
|
|
mExpireDate(_expireDate),
|
|
mProtocolVersion(_protocolVersion),
|
|
mSecure(_secure),
|
|
mHttpOnly(_httpOnly),
|
|
mExplicitPath(_explicitPath)
|
|
{
|
|
}
|
|
|
|
//
|
|
// Checks if a cookie has been expired
|
|
//
|
|
bool KHttpCookie::isExpired(time_t currentDate)
|
|
{
|
|
return (mExpireDate != 0) && (mExpireDate < currentDate);
|
|
}
|
|
|
|
//
|
|
// Returns a string for a HTTP-header
|
|
//
|
|
TQString KHttpCookie::cookieStr(bool useDOMFormat)
|
|
{
|
|
TQString result;
|
|
|
|
if (useDOMFormat || (mProtocolVersion == 0))
|
|
{
|
|
if ( !mName.isEmpty() )
|
|
result = mName + '=';
|
|
result += mValue;
|
|
}
|
|
else
|
|
{
|
|
result = mName + '=' + mValue;
|
|
if (mExplicitPath)
|
|
result += L1("; $Path=\"") + mPath + L1("\"");
|
|
if (!mDomain.isEmpty())
|
|
result += L1("; $Domain=\"") + mDomain + L1("\"");
|
|
}
|
|
return result;
|
|
}
|
|
|
|
//
|
|
// Returns whether this cookie should be send to this location.
|
|
bool KHttpCookie::match(const TQString &fqdn, const TQStringList &domains,
|
|
const TQString &path)
|
|
{
|
|
// Cookie domain match check
|
|
if (mDomain.isEmpty())
|
|
{
|
|
if (fqdn != mHost)
|
|
return false;
|
|
}
|
|
else if (!domains.contains(mDomain))
|
|
{
|
|
if (mDomain[0] == '.')
|
|
return false;
|
|
|
|
// Maybe the domain needs an extra dot.
|
|
TQString domain = '.' + mDomain;
|
|
if ( !domains.contains( domain ) )
|
|
if ( fqdn != mDomain )
|
|
return false;
|
|
}
|
|
|
|
// Cookie path match check
|
|
if (mPath.isEmpty())
|
|
return true;
|
|
|
|
// According to the netscape spec both http://www.acme.com/foobar,
|
|
// http://www.acme.com/foo.bar and http://www.acme.com/foo/bar
|
|
// match http://www.acme.com/foo.
|
|
// We only match http://www.acme.com/foo/bar
|
|
|
|
if( path.startsWith(mPath) &&
|
|
(
|
|
(path.length() == mPath.length() ) || // Paths are exact match
|
|
(path[mPath.length()-1] == '/') || // mPath ended with a slash
|
|
(path[mPath.length()] == '/') // A slash follows.
|
|
))
|
|
return true; // Path of URL starts with cookie-path
|
|
|
|
return false;
|
|
}
|
|
|
|
// KHttpCookieList
|
|
///////////////////////////////////////////////////////////////////////////
|
|
|
|
int KHttpCookieList::compareItems( void * item1, void * item2)
|
|
{
|
|
int pathLen1 = ((KHttpCookie *)item1)->path().length();
|
|
int pathLen2 = ((KHttpCookie *)item2)->path().length();
|
|
if (pathLen1 > pathLen2)
|
|
return -1;
|
|
if (pathLen1 < pathLen2)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
|
|
// KCookieJar
|
|
///////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
// Constructs a new cookie jar
|
|
//
|
|
// One jar should be enough for all cookies.
|
|
//
|
|
KCookieJar::KCookieJar()
|
|
{
|
|
m_cookieDomains.setAutoDelete( true );
|
|
m_globalAdvice = KCookieDunno;
|
|
m_configChanged = false;
|
|
m_cookiesChanged = false;
|
|
|
|
KConfig cfg("khtml/domain_info", true, false, "data");
|
|
TQStringList countries = cfg.readListEntry("twoLevelTLD");
|
|
for(TQStringList::ConstIterator it = countries.begin();
|
|
it != countries.end(); ++it)
|
|
{
|
|
m_twoLevelTLD.replace(*it, (int *) 1);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Destructs the cookie jar
|
|
//
|
|
// Poor little cookies, they will all be eaten by the cookie monster!
|
|
//
|
|
KCookieJar::~KCookieJar()
|
|
{
|
|
// Not much to do here
|
|
}
|
|
|
|
static void removeDuplicateFromList(KHttpCookieList *list, KHttpCookie *cookiePtr, bool nameMatchOnly=false, bool updateWindowId=false)
|
|
{
|
|
TQString domain1 = cookiePtr->domain();
|
|
if (domain1.isEmpty())
|
|
domain1 = cookiePtr->host();
|
|
|
|
for ( KHttpCookiePtr cookie=list->first(); cookie != 0; )
|
|
{
|
|
TQString domain2 = cookie->domain();
|
|
if (domain2.isEmpty())
|
|
domain2 = cookie->host();
|
|
|
|
if (
|
|
(cookiePtr->name() == cookie->name()) &&
|
|
(
|
|
nameMatchOnly ||
|
|
( (domain1 == domain2) && (cookiePtr->path() == cookie->path()) )
|
|
)
|
|
)
|
|
{
|
|
if (updateWindowId)
|
|
{
|
|
for(TQValueList<long>::ConstIterator it = cookie->windowIds().begin();
|
|
it != cookie->windowIds().end(); ++it)
|
|
{
|
|
long windowId = *it;
|
|
if (windowId && (cookiePtr->windowIds().find(windowId) == cookiePtr->windowIds().end()))
|
|
{
|
|
cookiePtr->windowIds().append(windowId);
|
|
}
|
|
}
|
|
}
|
|
KHttpCookiePtr old_cookie = cookie;
|
|
cookie = list->next();
|
|
list->removeRef( old_cookie );
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
cookie = list->next();
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Looks for cookies in the cookie jar which are appropriate for _url.
|
|
// Returned is a string containing all appropriate cookies in a format
|
|
// which can be added to a HTTP-header without any additional processing.
|
|
//
|
|
TQString KCookieJar::findCookies(const TQString &_url, bool useDOMFormat, long windowId, KHttpCookieList *pendingCookies)
|
|
{
|
|
TQString cookieStr;
|
|
TQStringList domains;
|
|
TQString fqdn;
|
|
TQString path;
|
|
KHttpCookiePtr cookie;
|
|
KCookieAdvice advice = m_globalAdvice;
|
|
|
|
if (!parseURL(_url, fqdn, path))
|
|
return cookieStr;
|
|
|
|
bool secureRequest = (_url.find( L1("https://"), 0, false) == 0 ||
|
|
_url.find( L1("webdavs://"), 0, false) == 0);
|
|
|
|
// kdDebug(7104) << "findCookies: URL= " << _url << ", secure = " << secureRequest << endl;
|
|
|
|
extractDomains(fqdn, domains);
|
|
|
|
KHttpCookieList allCookies;
|
|
|
|
for(TQStringList::ConstIterator it = domains.begin();
|
|
true;
|
|
++it)
|
|
{
|
|
KHttpCookieList *cookieList;
|
|
if (it == domains.end())
|
|
{
|
|
cookieList = pendingCookies; // Add pending cookies
|
|
pendingCookies = 0;
|
|
if (!cookieList)
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
TQString key = (*it).isNull() ? L1("") : (*it);
|
|
cookieList = m_cookieDomains[key];
|
|
if (!cookieList)
|
|
continue; // No cookies for this domain
|
|
}
|
|
|
|
if (cookieList->getAdvice() != KCookieDunno)
|
|
advice = cookieList->getAdvice();
|
|
|
|
for ( cookie=cookieList->first(); cookie != 0; cookie=cookieList->next() )
|
|
{
|
|
// If the we are setup to automatically accept all session cookies and to
|
|
// treat all cookies as session cookies or the current cookie is a session
|
|
// cookie, then send the cookie back regardless of either policy.
|
|
if (advice == KCookieReject &&
|
|
!(m_autoAcceptSessionCookies &&
|
|
(m_ignoreCookieExpirationDate || cookie->expireDate() == 0)))
|
|
continue;
|
|
|
|
if (!cookie->match(fqdn, domains, path))
|
|
continue;
|
|
|
|
if( cookie->isSecure() && !secureRequest )
|
|
continue;
|
|
|
|
if( cookie->isHttpOnly() && useDOMFormat )
|
|
continue;
|
|
|
|
// Do not send expired cookies.
|
|
if ( cookie->isExpired (time(0)) )
|
|
{
|
|
// Note there is no need to actually delete the cookie here
|
|
// since the cookieserver will invoke ::saveCookieJar because
|
|
// of the state change below. This will then do the job of
|
|
// deleting the cookie for us.
|
|
m_cookiesChanged = true;
|
|
continue;
|
|
}
|
|
|
|
if (windowId && (cookie->windowIds().find(windowId) == cookie->windowIds().end()))
|
|
{
|
|
cookie->windowIds().append(windowId);
|
|
}
|
|
|
|
if (it == domains.end()) // Only needed when processing pending cookies
|
|
removeDuplicateFromList(&allCookies, cookie);
|
|
|
|
allCookies.append(cookie);
|
|
}
|
|
if (it == domains.end())
|
|
break; // Finished.
|
|
}
|
|
|
|
int cookieCount = 0;
|
|
|
|
int protVersion=0;
|
|
for ( cookie=allCookies.first(); cookie != 0; cookie=allCookies.next() )
|
|
{
|
|
if (cookie->protocolVersion() > protVersion)
|
|
protVersion = cookie->protocolVersion();
|
|
}
|
|
|
|
for ( cookie=allCookies.first(); cookie != 0; cookie=allCookies.next() )
|
|
{
|
|
if (useDOMFormat)
|
|
{
|
|
if (cookieCount > 0)
|
|
cookieStr += L1("; ");
|
|
cookieStr += cookie->cookieStr(true);
|
|
}
|
|
else
|
|
{
|
|
if (cookieCount == 0)
|
|
{
|
|
cookieStr += L1("Cookie: ");
|
|
if (protVersion > 0)
|
|
{
|
|
TQString version;
|
|
version.sprintf("$Version=%d; ", protVersion); // Without quotes
|
|
cookieStr += version;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
cookieStr += L1("; ");
|
|
}
|
|
cookieStr += cookie->cookieStr(false);
|
|
}
|
|
cookieCount++;
|
|
}
|
|
|
|
return cookieStr;
|
|
}
|
|
|
|
//
|
|
// This function parses a string like 'my_name="my_value";' and returns
|
|
// 'my_name' in Name and 'my_value' in Value.
|
|
//
|
|
// A pointer to the end of the parsed part is returned.
|
|
// This pointer points either to:
|
|
// '\0' - The end of the string has reached.
|
|
// ';' - Another my_name="my_value" pair follows
|
|
// ',' - Another cookie follows
|
|
// '\n' - Another header follows
|
|
static const char * parseNameValue(const char *header,
|
|
TQString &Name,
|
|
TQString &Value,
|
|
bool keepQuotes=false,
|
|
bool rfcQuotes=false)
|
|
{
|
|
const char *s = header;
|
|
// Parse 'my_name' part
|
|
for(; (*s != '='); s++)
|
|
{
|
|
if ((*s=='\0') || (*s==';') || (*s=='\n'))
|
|
{
|
|
// No '=' sign -> use string as the value, name is empty
|
|
// (behavior found in Mozilla and IE)
|
|
Name = "";
|
|
Value = TQString::fromLatin1(header);
|
|
Value.truncate( s - header );
|
|
Value = Value.stripWhiteSpace();
|
|
return (s);
|
|
}
|
|
}
|
|
|
|
Name = header;
|
|
Name.truncate( s - header );
|
|
Name = Name.stripWhiteSpace();
|
|
|
|
// *s == '='
|
|
s++;
|
|
|
|
// Skip any whitespace
|
|
for(; (*s == ' ') || (*s == '\t'); s++)
|
|
{
|
|
if ((*s=='\0') || (*s==';') || (*s=='\n'))
|
|
{
|
|
// End of Name
|
|
Value = "";
|
|
return (s);
|
|
}
|
|
}
|
|
|
|
if ((rfcQuotes || !keepQuotes) && (*s == '\"'))
|
|
{
|
|
// Parse '"my_value"' part (quoted value)
|
|
if (keepQuotes)
|
|
header = s++;
|
|
else
|
|
header = ++s; // skip "
|
|
for(;(*s != '\"');s++)
|
|
{
|
|
if ((*s=='\0') || (*s=='\n'))
|
|
{
|
|
// End of Name
|
|
Value = TQString::fromLatin1(header);
|
|
Value.truncate(s - header);
|
|
return (s);
|
|
}
|
|
}
|
|
Value = TQString::fromLatin1(header);
|
|
// *s == '\"';
|
|
if (keepQuotes)
|
|
Value.truncate( ++s - header );
|
|
else
|
|
Value.truncate( s++ - header );
|
|
|
|
// Skip any remaining garbage
|
|
for(;; s++)
|
|
{
|
|
if ((*s=='\0') || (*s==';') || (*s=='\n'))
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Parse 'my_value' part (unquoted value)
|
|
header = s;
|
|
while ((*s != '\0') && (*s != ';') && (*s != '\n'))
|
|
s++;
|
|
// End of Name
|
|
Value = TQString::fromLatin1(header);
|
|
Value.truncate( s - header );
|
|
Value = Value.stripWhiteSpace();
|
|
}
|
|
return (s);
|
|
|
|
}
|
|
|
|
void KCookieJar::stripDomain(const TQString &_fqdn, TQString &_domain)
|
|
{
|
|
TQStringList domains;
|
|
extractDomains(_fqdn, domains);
|
|
if (domains.count() > 3)
|
|
_domain = domains[3];
|
|
else
|
|
_domain = domains[0];
|
|
}
|
|
|
|
TQString KCookieJar::stripDomain( KHttpCookiePtr cookiePtr)
|
|
{
|
|
TQString domain; // We file the cookie under this domain.
|
|
if (cookiePtr->domain().isEmpty())
|
|
stripDomain( cookiePtr->host(), domain);
|
|
else
|
|
stripDomain (cookiePtr->domain(), domain);
|
|
return domain;
|
|
}
|
|
|
|
bool KCookieJar::parseURL(const TQString &_url,
|
|
TQString &_fqdn,
|
|
TQString &_path)
|
|
{
|
|
KURL kurl(_url);
|
|
if (!kurl.isValid())
|
|
return false;
|
|
|
|
_fqdn = kurl.host().lower();
|
|
if (kurl.port())
|
|
{
|
|
if (((kurl.protocol() == L1("http")) && (kurl.port() != 80)) ||
|
|
((kurl.protocol() == L1("https")) && (kurl.port() != 443)))
|
|
{
|
|
_fqdn = L1("%1:%2").arg(kurl.port()).arg(_fqdn);
|
|
}
|
|
}
|
|
|
|
// Cookie spoofing protection. Since there is no way a path separator
|
|
// or escape encoded character is allowed in the hostname according
|
|
// to RFC 2396, reject attempts to include such things there!
|
|
if(_fqdn.find('/') > -1 || _fqdn.find('%') > -1)
|
|
{
|
|
return false; // deny everything!!
|
|
}
|
|
|
|
_path = kurl.path();
|
|
if (_path.isEmpty())
|
|
_path = L1("/");
|
|
|
|
TQRegExp exp(L1("[\\\\/]\\.\\.[\\\\/]"));
|
|
// Weird path, cookie stealing attempt?
|
|
if (exp.search(_path) != -1)
|
|
return false; // Deny everything!!
|
|
|
|
return true;
|
|
}
|
|
|
|
void KCookieJar::extractDomains(const TQString &_fqdn,
|
|
TQStringList &_domains)
|
|
{
|
|
// Return numeric IPv6 addresses as is...
|
|
if (_fqdn[0] == '[')
|
|
{
|
|
_domains.append( _fqdn );
|
|
return;
|
|
}
|
|
// Return numeric IPv4 addresses as is...
|
|
if ((_fqdn[0] >= '0') && (_fqdn[0] <= '9'))
|
|
{
|
|
if (_fqdn.find(TQRegExp(IP_ADDRESS_EXPRESSION)) > -1)
|
|
{
|
|
_domains.append( _fqdn );
|
|
return;
|
|
}
|
|
}
|
|
|
|
TQStringList partList = TQStringList::split('.', _fqdn, false);
|
|
|
|
if (partList.count())
|
|
partList.remove(partList.begin()); // Remove hostname
|
|
|
|
while(partList.count())
|
|
{
|
|
|
|
if (partList.count() == 1)
|
|
break; // We only have a TLD left.
|
|
|
|
if ((partList.count() == 2) && (m_twoLevelTLD[partList[1].lower()]))
|
|
{
|
|
// This domain uses two-level TLDs in the form xxxx.yy
|
|
break;
|
|
}
|
|
|
|
if ((partList.count() == 2) && (partList[1].length() == 2))
|
|
{
|
|
// If this is a TLD, we should stop. (e.g. co.uk)
|
|
// We assume this is a TLD if it ends with .xx.yy or .x.yy
|
|
if (partList[0].length() <= 2)
|
|
break; // This is a TLD.
|
|
|
|
// Catch some TLDs that we miss with the previous check
|
|
// e.g. com.au, org.uk, mil.co
|
|
TQCString t = partList[0].lower().utf8();
|
|
if ((t == "com") || (t == "net") || (t == "org") || (t == "gov") || (t == "edu") || (t == "mil") || (t == "int"))
|
|
break;
|
|
}
|
|
|
|
TQString domain = partList.join(L1("."));
|
|
_domains.append(domain);
|
|
_domains.append('.' + domain);
|
|
partList.remove(partList.begin()); // Remove part
|
|
}
|
|
|
|
// Always add the FQDN at the start of the list for
|
|
// hostname == cookie-domainname checks!
|
|
_domains.prepend( '.' + _fqdn );
|
|
_domains.prepend( _fqdn );
|
|
}
|
|
|
|
|
|
/*
|
|
Changes dates in from the following format
|
|
|
|
Wed Sep 12 07:00:00 2007 GMT
|
|
to
|
|
Wed Sep 12 2007 07:00:00 GMT
|
|
|
|
to allow KRFCDate::parseDate to properly parse expiration date formats
|
|
used in cookies by some servers such as amazon.com. See BR# 145244.
|
|
*/
|
|
static TQString fixupDateTime(const TQString& dt)
|
|
{
|
|
const int index = dt.find(TQRegExp("[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}"));
|
|
|
|
if (index > -1)
|
|
{
|
|
TQStringList dateStrList = TQStringList::split(' ', dt.mid(index));
|
|
if (dateStrList.count() > 1)
|
|
{
|
|
TQString date = dateStrList[0];
|
|
dateStrList[0] = dateStrList[1];
|
|
dateStrList[1] = date;
|
|
date = dt;
|
|
return date.replace(index, date.length(), dateStrList.join(" "));
|
|
}
|
|
}
|
|
|
|
return dt;
|
|
}
|
|
|
|
//
|
|
// This function parses cookie_headers and returns a linked list of
|
|
// KHttpCookie objects for all cookies found in cookie_headers.
|
|
// If no cookies could be found 0 is returned.
|
|
//
|
|
// cookie_headers should be a concatenation of all lines of a HTTP-header
|
|
// which start with "Set-Cookie". The lines should be separated by '\n's.
|
|
//
|
|
KHttpCookieList KCookieJar::makeCookies(const TQString &_url,
|
|
const TQCString &cookie_headers,
|
|
long windowId)
|
|
{
|
|
KHttpCookieList cookieList;
|
|
KHttpCookieList cookieList2;
|
|
KHttpCookiePtr lastCookie = 0;
|
|
const char *cookieStr = cookie_headers.data();
|
|
TQString Name;
|
|
TQString Value;
|
|
TQString fqdn;
|
|
TQString path;
|
|
bool crossDomain = false;
|
|
|
|
if (!parseURL(_url, fqdn, path))
|
|
{
|
|
// Error parsing _url
|
|
return KHttpCookieList();
|
|
}
|
|
TQString defaultPath;
|
|
int i = path.findRev('/');
|
|
if (i > 0)
|
|
defaultPath = path.left(i);
|
|
|
|
// The hard stuff :)
|
|
for(;;)
|
|
{
|
|
// check for "Set-Cookie"
|
|
if (strncmp(cookieStr, "Cross-Domain\n", 13) == 0)
|
|
{
|
|
cookieStr += 13;
|
|
crossDomain = true;
|
|
}
|
|
else if (strncasecmp(cookieStr, "Set-Cookie:", 11) == 0)
|
|
{
|
|
cookieStr = parseNameValue(cookieStr+11, Name, Value, true);
|
|
|
|
// Host = FQDN
|
|
// Default domain = ""
|
|
// Default path according to rfc2109
|
|
|
|
KHttpCookie *cookie = new KHttpCookie(fqdn, L1(""), defaultPath, Name, Value);
|
|
if (windowId)
|
|
cookie->mWindowIds.append(windowId);
|
|
cookie->mCrossDomain = crossDomain;
|
|
|
|
// Insert cookie in chain
|
|
cookieList.append(cookie);
|
|
lastCookie = cookie;
|
|
}
|
|
else if (strncasecmp(cookieStr, "Set-Cookie2:", 12) == 0)
|
|
{
|
|
// Attempt to follow rfc2965
|
|
cookieStr = parseNameValue(cookieStr+12, Name, Value, true, true);
|
|
|
|
// Host = FQDN
|
|
// Default domain = ""
|
|
// Default path according to rfc2965
|
|
|
|
KHttpCookie *cookie = new KHttpCookie(fqdn, L1(""), defaultPath, Name, Value);
|
|
if (windowId)
|
|
cookie->mWindowIds.append(windowId);
|
|
cookie->mCrossDomain = crossDomain;
|
|
|
|
// Insert cookie in chain
|
|
cookieList2.append(cookie);
|
|
lastCookie = cookie;
|
|
}
|
|
else
|
|
{
|
|
// This is not the start of a cookie header, skip till next line.
|
|
while (*cookieStr && *cookieStr != '\n')
|
|
cookieStr++;
|
|
|
|
if (*cookieStr == '\n')
|
|
cookieStr++;
|
|
|
|
if (!*cookieStr)
|
|
break; // End of cookie_headers
|
|
else
|
|
continue; // end of this header, continue with next.
|
|
}
|
|
|
|
while ((*cookieStr == ';') || (*cookieStr == ' '))
|
|
{
|
|
cookieStr++;
|
|
|
|
// Name-Value pair follows
|
|
cookieStr = parseNameValue(cookieStr, Name, Value);
|
|
|
|
TQCString cName = Name.lower().latin1();
|
|
if (cName == "domain")
|
|
{
|
|
TQString dom = Value.lower();
|
|
// RFC2965 3.2.2: If an explicitly specified value does not
|
|
// start with a dot, the user agent supplies a leading dot
|
|
if(dom.length() && dom[0] != '.')
|
|
dom.prepend(".");
|
|
// remove a trailing dot
|
|
if(dom.length() > 2 && dom[dom.length()-1] == '.')
|
|
dom = dom.left(dom.length()-1);
|
|
|
|
if(dom.contains('.') > 1 || dom == ".local")
|
|
lastCookie->mDomain = dom;
|
|
}
|
|
else if (cName == "max-age")
|
|
{
|
|
int max_age = Value.toInt();
|
|
if (max_age == 0)
|
|
lastCookie->mExpireDate = 1;
|
|
else
|
|
lastCookie->mExpireDate = time(0)+max_age;
|
|
}
|
|
else if (cName == "expires")
|
|
{
|
|
// Parse brain-dead netscape cookie-format
|
|
lastCookie->mExpireDate = KRFCDate::parseDate(Value);
|
|
|
|
// Workaround for servers that send the expiration date in
|
|
// 'Wed Sep 12 07:00:00 2007 GMT' format. See BR# 145244.
|
|
if (lastCookie->mExpireDate == 0)
|
|
lastCookie->mExpireDate = KRFCDate::parseDate(fixupDateTime(Value));
|
|
}
|
|
else if (cName == "path")
|
|
{
|
|
if (Value.isEmpty())
|
|
lastCookie->mPath = TQString::null; // Catch "" <> TQString::null
|
|
else
|
|
lastCookie->mPath = KURL::decode_string(Value);
|
|
lastCookie->mExplicitPath = true;
|
|
}
|
|
else if (cName == "version")
|
|
{
|
|
lastCookie->mProtocolVersion = Value.toInt();
|
|
}
|
|
else if ((cName == "secure") ||
|
|
(cName.isEmpty() && Value.lower() == L1("secure")))
|
|
{
|
|
lastCookie->mSecure = true;
|
|
}
|
|
else if ((cName == "httponly") ||
|
|
(cName.isEmpty() && Value.lower() == L1("httponly")))
|
|
{
|
|
lastCookie->mHttpOnly = true;
|
|
}
|
|
}
|
|
|
|
if (*cookieStr == '\0')
|
|
break; // End of header
|
|
|
|
// Skip ';' or '\n'
|
|
cookieStr++;
|
|
}
|
|
|
|
// RFC2965 cookies come last so that they override netscape cookies.
|
|
while( !cookieList2.isEmpty() && (lastCookie = cookieList2.take(0)) )
|
|
{
|
|
removeDuplicateFromList(&cookieList, lastCookie, true);
|
|
cookieList.append(lastCookie);
|
|
}
|
|
|
|
return cookieList;
|
|
}
|
|
|
|
/**
|
|
* Parses cookie_domstr and returns a linked list of KHttpCookie objects.
|
|
* cookie_domstr should be a semicolon-delimited list of "name=value"
|
|
* pairs. Any whitespace before "name" or around '=' is discarded.
|
|
* If no cookies are found, 0 is returned.
|
|
*/
|
|
KHttpCookieList KCookieJar::makeDOMCookies(const TQString &_url,
|
|
const TQCString &cookie_domstring,
|
|
long windowId)
|
|
{
|
|
// A lot copied from above
|
|
KHttpCookieList cookieList;
|
|
KHttpCookiePtr lastCookie = 0;
|
|
|
|
const char *cookieStr = cookie_domstring.data();
|
|
TQString Name;
|
|
TQString Value;
|
|
TQString fqdn;
|
|
TQString path;
|
|
|
|
if (!parseURL(_url, fqdn, path))
|
|
{
|
|
// Error parsing _url
|
|
return KHttpCookieList();
|
|
}
|
|
|
|
// This time it's easy
|
|
while(*cookieStr)
|
|
{
|
|
cookieStr = parseNameValue(cookieStr, Name, Value);
|
|
|
|
// Host = FQDN
|
|
// Default domain = ""
|
|
// Default path = ""
|
|
KHttpCookie *cookie = new KHttpCookie(fqdn, TQString::null, TQString::null,
|
|
Name, Value );
|
|
if (windowId)
|
|
cookie->mWindowIds.append(windowId);
|
|
|
|
cookieList.append(cookie);
|
|
lastCookie = cookie;
|
|
|
|
if (*cookieStr != '\0')
|
|
cookieStr++; // Skip ';' or '\n'
|
|
}
|
|
|
|
return cookieList;
|
|
}
|
|
|
|
#ifdef MAX_COOKIE_LIMIT
|
|
static void makeRoom(KHttpCookieList *cookieList, KHttpCookiePtr &cookiePtr)
|
|
{
|
|
// Too much cookies: throw one away, try to be somewhat clever
|
|
KHttpCookiePtr lastCookie = 0;
|
|
for(KHttpCookiePtr cookie = cookieList->first(); cookie; cookie = cookieList->next())
|
|
{
|
|
if (cookieList->compareItems(cookie, cookiePtr) < 0)
|
|
break;
|
|
lastCookie = cookie;
|
|
}
|
|
if (!lastCookie)
|
|
lastCookie = cookieList->first();
|
|
cookieList->removeRef(lastCookie);
|
|
}
|
|
#endif
|
|
|
|
//
|
|
// This function hands a KHttpCookie object over to the cookie jar.
|
|
//
|
|
// On return cookiePtr is set to 0.
|
|
//
|
|
void KCookieJar::addCookie(KHttpCookiePtr &cookiePtr)
|
|
{
|
|
TQStringList domains;
|
|
KHttpCookieList *cookieList = 0L;
|
|
|
|
// We always need to do this to make sure that the
|
|
// that cookies of type hostname == cookie-domainname
|
|
// are properly removed and/or updated as necessary!
|
|
extractDomains( cookiePtr->host(), domains );
|
|
for ( TQStringList::ConstIterator it = domains.begin();
|
|
(it != domains.end() && !cookieList);
|
|
++it )
|
|
{
|
|
TQString key = (*it).isNull() ? L1("") : (*it);
|
|
KHttpCookieList *list= m_cookieDomains[key];
|
|
if ( !list ) continue;
|
|
|
|
removeDuplicateFromList(list, cookiePtr, false, true);
|
|
}
|
|
|
|
TQString domain = stripDomain( cookiePtr );
|
|
TQString key = domain.isNull() ? L1("") : domain;
|
|
cookieList = m_cookieDomains[ key ];
|
|
if (!cookieList)
|
|
{
|
|
// Make a new cookie list
|
|
cookieList = new KHttpCookieList();
|
|
cookieList->setAutoDelete(true);
|
|
|
|
// All cookies whose domain is not already
|
|
// known to us should be added with KCookieDunno.
|
|
// KCookieDunno means that we use the global policy.
|
|
cookieList->setAdvice( KCookieDunno );
|
|
|
|
m_cookieDomains.insert( domain, cookieList);
|
|
|
|
// Update the list of domains
|
|
m_domainList.append(domain);
|
|
}
|
|
|
|
// Add the cookie to the cookie list
|
|
// The cookie list is sorted 'longest path first'
|
|
if (!cookiePtr->isExpired(time(0)))
|
|
{
|
|
#ifdef MAX_COOKIE_LIMIT
|
|
if (cookieList->count() >= MAX_COOKIES_PER_HOST)
|
|
makeRoom(cookieList, cookiePtr); // Delete a cookie
|
|
#endif
|
|
cookieList->inSort( cookiePtr );
|
|
m_cookiesChanged = true;
|
|
}
|
|
else
|
|
{
|
|
delete cookiePtr;
|
|
}
|
|
cookiePtr = 0;
|
|
}
|
|
|
|
//
|
|
// This function advices whether a single KHttpCookie object should
|
|
// be added to the cookie jar.
|
|
//
|
|
KCookieAdvice KCookieJar::cookieAdvice(KHttpCookiePtr cookiePtr)
|
|
{
|
|
if (m_rejectCrossDomainCookies && cookiePtr->isCrossDomain())
|
|
return KCookieReject;
|
|
|
|
TQStringList domains;
|
|
|
|
extractDomains(cookiePtr->host(), domains);
|
|
|
|
// If the cookie specifies a domain, check whether it is valid. Otherwise,
|
|
// accept the cookie anyways but remove the domain="" value to prevent
|
|
// cross-site cookie injection.
|
|
if (!cookiePtr->domain().isEmpty())
|
|
{
|
|
if (!domains.contains(cookiePtr->domain()) &&
|
|
!cookiePtr->domain().endsWith("."+cookiePtr->host()))
|
|
cookiePtr->fixDomain(TQString::null);
|
|
}
|
|
|
|
if (m_autoAcceptSessionCookies && (cookiePtr->expireDate() == 0 ||
|
|
m_ignoreCookieExpirationDate))
|
|
return KCookieAccept;
|
|
|
|
KCookieAdvice advice = KCookieDunno;
|
|
bool isFQDN = true; // First is FQDN
|
|
TQStringList::Iterator it = domains.begin(); // Start with FQDN which first in the list.
|
|
while( (advice == KCookieDunno) && (it != domains.end()))
|
|
{
|
|
TQString domain = *it;
|
|
// Check if a policy for the FQDN/domain is set.
|
|
if ( domain[0] == '.' || isFQDN )
|
|
{
|
|
isFQDN = false;
|
|
KHttpCookieList *cookieList = m_cookieDomains[domain];
|
|
if (cookieList)
|
|
advice = cookieList->getAdvice();
|
|
}
|
|
domains.remove(it);
|
|
it = domains.begin(); // Continue from begin of remaining list
|
|
}
|
|
|
|
if (advice == KCookieDunno)
|
|
advice = m_globalAdvice;
|
|
|
|
return advice;
|
|
}
|
|
|
|
//
|
|
// This function gets the advice for all cookies originating from
|
|
// _domain.
|
|
//
|
|
KCookieAdvice KCookieJar::getDomainAdvice(const TQString &_domain)
|
|
{
|
|
KHttpCookieList *cookieList = m_cookieDomains[_domain];
|
|
KCookieAdvice advice;
|
|
|
|
if (cookieList)
|
|
{
|
|
advice = cookieList->getAdvice();
|
|
}
|
|
else
|
|
{
|
|
advice = KCookieDunno;
|
|
}
|
|
|
|
return advice;
|
|
}
|
|
|
|
//
|
|
// This function sets the advice for all cookies originating from
|
|
// _domain.
|
|
//
|
|
void KCookieJar::setDomainAdvice(const TQString &_domain, KCookieAdvice _advice)
|
|
{
|
|
TQString domain(_domain);
|
|
KHttpCookieList *cookieList = m_cookieDomains[domain];
|
|
|
|
if (cookieList)
|
|
{
|
|
if (cookieList->getAdvice() != _advice)
|
|
{
|
|
m_configChanged = true;
|
|
// domain is already known
|
|
cookieList->setAdvice( _advice);
|
|
}
|
|
|
|
if ((cookieList->isEmpty()) &&
|
|
(_advice == KCookieDunno))
|
|
{
|
|
// This deletes cookieList!
|
|
m_cookieDomains.remove(domain);
|
|
m_domainList.remove(domain);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// domain is not yet known
|
|
if (_advice != KCookieDunno)
|
|
{
|
|
// We should create a domain entry
|
|
m_configChanged = true;
|
|
// Make a new cookie list
|
|
cookieList = new KHttpCookieList();
|
|
cookieList->setAutoDelete(true);
|
|
cookieList->setAdvice( _advice);
|
|
m_cookieDomains.insert( domain, cookieList);
|
|
// Update the list of domains
|
|
m_domainList.append( domain);
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// This function sets the advice for all cookies originating from
|
|
// the same domain as _cookie
|
|
//
|
|
void KCookieJar::setDomainAdvice(KHttpCookiePtr cookiePtr, KCookieAdvice _advice)
|
|
{
|
|
TQString domain;
|
|
stripDomain(cookiePtr->host(), domain); // We file the cookie under this domain.
|
|
|
|
setDomainAdvice(domain, _advice);
|
|
}
|
|
|
|
//
|
|
// This function sets the global advice for cookies
|
|
//
|
|
void KCookieJar::setGlobalAdvice(KCookieAdvice _advice)
|
|
{
|
|
if (m_globalAdvice != _advice)
|
|
m_configChanged = true;
|
|
m_globalAdvice = _advice;
|
|
}
|
|
|
|
//
|
|
// Get a list of all domains known to the cookie jar.
|
|
//
|
|
const TQStringList& KCookieJar::getDomainList()
|
|
{
|
|
return m_domainList;
|
|
}
|
|
|
|
//
|
|
// Get a list of all cookies in the cookie jar originating from _domain.
|
|
//
|
|
const KHttpCookieList *KCookieJar::getCookieList(const TQString & _domain,
|
|
const TQString & _fqdn )
|
|
{
|
|
TQString domain;
|
|
|
|
if (_domain.isEmpty())
|
|
stripDomain( _fqdn, domain );
|
|
else
|
|
domain = _domain;
|
|
|
|
return m_cookieDomains[domain];
|
|
}
|
|
|
|
//
|
|
// Eat a cookie out of the jar.
|
|
// cookiePtr should be one of the cookies returned by getCookieList()
|
|
//
|
|
void KCookieJar::eatCookie(KHttpCookiePtr cookiePtr)
|
|
{
|
|
TQString domain = stripDomain(cookiePtr); // We file the cookie under this domain.
|
|
KHttpCookieList *cookieList = m_cookieDomains[domain];
|
|
|
|
if (cookieList)
|
|
{
|
|
// This deletes cookiePtr!
|
|
if (cookieList->removeRef( cookiePtr ))
|
|
m_cookiesChanged = true;
|
|
|
|
if ((cookieList->isEmpty()) &&
|
|
(cookieList->getAdvice() == KCookieDunno))
|
|
{
|
|
// This deletes cookieList!
|
|
m_cookieDomains.remove(domain);
|
|
|
|
m_domainList.remove(domain);
|
|
}
|
|
}
|
|
}
|
|
|
|
void KCookieJar::eatCookiesForDomain(const TQString &domain)
|
|
{
|
|
KHttpCookieList *cookieList = m_cookieDomains[domain];
|
|
if (!cookieList || cookieList->isEmpty()) return;
|
|
|
|
cookieList->clear();
|
|
if (cookieList->getAdvice() == KCookieDunno)
|
|
{
|
|
// This deletes cookieList!
|
|
m_cookieDomains.remove(domain);
|
|
m_domainList.remove(domain);
|
|
}
|
|
m_cookiesChanged = true;
|
|
}
|
|
|
|
void KCookieJar::eatSessionCookies( long windowId )
|
|
{
|
|
if (!windowId)
|
|
return;
|
|
|
|
TQStringList::Iterator it=m_domainList.begin();
|
|
for ( ; it != m_domainList.end(); ++it )
|
|
eatSessionCookies( *it, windowId, false );
|
|
}
|
|
|
|
void KCookieJar::eatAllCookies()
|
|
{
|
|
for ( TQStringList::Iterator it=m_domainList.begin();
|
|
it != m_domainList.end();)
|
|
{
|
|
TQString domain = *it++;
|
|
// This might remove domain from domainList!
|
|
eatCookiesForDomain(domain);
|
|
}
|
|
}
|
|
|
|
void KCookieJar::eatSessionCookies( const TQString& fqdn, long windowId,
|
|
bool isFQDN )
|
|
{
|
|
KHttpCookieList* cookieList;
|
|
if ( !isFQDN )
|
|
cookieList = m_cookieDomains[fqdn];
|
|
else
|
|
{
|
|
TQString domain;
|
|
stripDomain( fqdn, domain );
|
|
cookieList = m_cookieDomains[domain];
|
|
}
|
|
|
|
if ( cookieList )
|
|
{
|
|
KHttpCookiePtr cookie=cookieList->first();
|
|
for (; cookie != 0;)
|
|
{
|
|
if ((cookie->expireDate() != 0) && !m_ignoreCookieExpirationDate)
|
|
{
|
|
cookie = cookieList->next();
|
|
continue;
|
|
}
|
|
|
|
TQValueList<long> &ids = cookie->windowIds();
|
|
if (!ids.remove(windowId) || !ids.isEmpty())
|
|
{
|
|
cookie = cookieList->next();
|
|
continue;
|
|
}
|
|
KHttpCookiePtr old_cookie = cookie;
|
|
cookie = cookieList->next();
|
|
cookieList->removeRef( old_cookie );
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Saves all cookies to the file '_filename'.
|
|
// On succes 'true' is returned.
|
|
// On failure 'false' is returned.
|
|
bool KCookieJar::saveCookies(const TQString &_filename)
|
|
{
|
|
KSaveFile saveFile(_filename, 0600);
|
|
|
|
if (saveFile.status() != 0)
|
|
return false;
|
|
|
|
FILE *fStream = saveFile.fstream();
|
|
|
|
time_t curTime = time(0);
|
|
|
|
fprintf(fStream, "# KDE Cookie File v2\n#\n");
|
|
|
|
fprintf(fStream, "%-20s %-20s %-12s %-10s %-4s %-20s %-4s %s\n",
|
|
"# Host", "Domain", "Path", "Exp.date", "Prot",
|
|
"Name", "Sec", "Value");
|
|
|
|
for ( TQStringList::Iterator it=m_domainList.begin(); it != m_domainList.end();
|
|
it++ )
|
|
{
|
|
const TQString &domain = *it;
|
|
bool domainPrinted = false;
|
|
|
|
KHttpCookieList *cookieList = m_cookieDomains[domain];
|
|
KHttpCookiePtr cookie=cookieList->last();
|
|
|
|
for (; cookie != 0;)
|
|
{
|
|
if (cookie->isExpired(curTime))
|
|
{
|
|
// Delete expired cookies
|
|
KHttpCookiePtr old_cookie = cookie;
|
|
cookie = cookieList->prev();
|
|
cookieList->removeRef( old_cookie );
|
|
}
|
|
else if (cookie->expireDate() != 0 && !m_ignoreCookieExpirationDate)
|
|
{
|
|
if (!domainPrinted)
|
|
{
|
|
domainPrinted = true;
|
|
fprintf(fStream, "[%s]\n", domain.local8Bit().data());
|
|
}
|
|
// Store persistent cookies
|
|
TQString path = L1("\"");
|
|
path += cookie->path();
|
|
path += '"';
|
|
TQString domain = L1("\"");
|
|
domain += cookie->domain();
|
|
domain += '"';
|
|
fprintf(fStream, "%-20s %-20s %-12s %10lu %3d %-20s %-4i %s\n",
|
|
cookie->host().latin1(), domain.latin1(),
|
|
path.latin1(), (unsigned long) cookie->expireDate(),
|
|
cookie->protocolVersion(),
|
|
cookie->name().isEmpty() ? cookie->value().latin1() : cookie->name().latin1(),
|
|
(cookie->isSecure() ? 1 : 0) + (cookie->isHttpOnly() ? 2 : 0) +
|
|
(cookie->hasExplicitPath() ? 4 : 0) + (cookie->name().isEmpty() ? 8 : 0),
|
|
cookie->value().latin1());
|
|
cookie = cookieList->prev();
|
|
}
|
|
else
|
|
{
|
|
// Skip session-only cookies
|
|
cookie = cookieList->prev();
|
|
}
|
|
}
|
|
}
|
|
|
|
return saveFile.close();
|
|
}
|
|
|
|
typedef char *charPtr;
|
|
|
|
static const char *parseField(charPtr &buffer, bool keepQuotes=false)
|
|
{
|
|
char *result;
|
|
if (!keepQuotes && (*buffer == '\"'))
|
|
{
|
|
// Find terminating "
|
|
buffer++;
|
|
result = buffer;
|
|
while((*buffer != '\"') && (*buffer))
|
|
buffer++;
|
|
}
|
|
else
|
|
{
|
|
// Find first white space
|
|
result = buffer;
|
|
while((*buffer != ' ') && (*buffer != '\t') && (*buffer != '\n') && (*buffer))
|
|
buffer++;
|
|
}
|
|
|
|
if (!*buffer)
|
|
return result; //
|
|
*buffer++ = '\0';
|
|
|
|
// Skip white-space
|
|
while((*buffer == ' ') || (*buffer == '\t') || (*buffer == '\n'))
|
|
buffer++;
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
//
|
|
// Reloads all cookies from the file '_filename'.
|
|
// On succes 'true' is returned.
|
|
// On failure 'false' is returned.
|
|
bool KCookieJar::loadCookies(const TQString &_filename)
|
|
{
|
|
FILE *fStream = fopen( TQFile::encodeName(_filename), "r");
|
|
if (fStream == 0)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
time_t curTime = time(0);
|
|
|
|
char *buffer = new char[READ_BUFFER_SIZE];
|
|
|
|
bool err = false;
|
|
err = (fgets(buffer, READ_BUFFER_SIZE, fStream) == 0);
|
|
|
|
int version = 1;
|
|
if (!err)
|
|
{
|
|
if (strcmp(buffer, "# KDE Cookie File\n") == 0)
|
|
{
|
|
// version 1
|
|
}
|
|
else if (sscanf(buffer, "# KDE Cookie File v%d\n", &version) != 1)
|
|
{
|
|
err = true;
|
|
}
|
|
}
|
|
|
|
if (!err)
|
|
{
|
|
while(fgets(buffer, READ_BUFFER_SIZE, fStream) != 0)
|
|
{
|
|
char *line = buffer;
|
|
// Skip lines which begin with '#' or '['
|
|
if ((line[0] == '#') || (line[0] == '['))
|
|
continue;
|
|
|
|
const char *host( parseField(line) );
|
|
const char *domain( parseField(line) );
|
|
const char *path( parseField(line) );
|
|
const char *expStr( parseField(line) );
|
|
if (!expStr) continue;
|
|
int expDate = (time_t) strtoul(expStr, 0, 10);
|
|
const char *verStr( parseField(line) );
|
|
if (!verStr) continue;
|
|
int protVer = (time_t) strtoul(verStr, 0, 10);
|
|
const char *name( parseField(line) );
|
|
bool keepQuotes = false;
|
|
bool secure = false;
|
|
bool httpOnly = false;
|
|
bool explicitPath = false;
|
|
const char *value = 0;
|
|
if ((version == 2) || (protVer >= 200))
|
|
{
|
|
if (protVer >= 200)
|
|
protVer -= 200;
|
|
int i = atoi( parseField(line) );
|
|
secure = i & 1;
|
|
httpOnly = i & 2;
|
|
explicitPath = i & 4;
|
|
if (i & 8)
|
|
name = "";
|
|
line[strlen(line)-1] = '\0'; // Strip LF.
|
|
value = line;
|
|
}
|
|
else
|
|
{
|
|
if (protVer >= 100)
|
|
{
|
|
protVer -= 100;
|
|
keepQuotes = true;
|
|
}
|
|
value = parseField(line, keepQuotes);
|
|
secure = atoi( parseField(line) );
|
|
}
|
|
|
|
// Parse error
|
|
if (!value) continue;
|
|
|
|
// Expired or parse error
|
|
if ((expDate == 0) || (expDate < curTime))
|
|
continue;
|
|
|
|
KHttpCookie *cookie = new KHttpCookie(TQString::fromLatin1(host),
|
|
TQString::fromLatin1(domain),
|
|
TQString::fromLatin1(path),
|
|
TQString::fromLatin1(name),
|
|
TQString::fromLatin1(value),
|
|
expDate, protVer,
|
|
secure, httpOnly, explicitPath);
|
|
addCookie(cookie);
|
|
}
|
|
}
|
|
delete [] buffer;
|
|
m_cookiesChanged = false;
|
|
|
|
fclose( fStream);
|
|
return err;
|
|
}
|
|
|
|
//
|
|
// Save the cookie configuration
|
|
//
|
|
|
|
void KCookieJar::saveConfig(KConfig *_config)
|
|
{
|
|
if (!m_configChanged)
|
|
return;
|
|
|
|
_config->setGroup("Cookie Dialog");
|
|
_config->writeEntry("PreferredPolicy", m_preferredPolicy);
|
|
_config->writeEntry("ShowCookieDetails", m_showCookieDetails );
|
|
_config->setGroup("Cookie Policy");
|
|
_config->writeEntry("CookieGlobalAdvice", adviceToStr( m_globalAdvice));
|
|
|
|
TQStringList domainSettings;
|
|
for ( TQStringList::Iterator it=m_domainList.begin();
|
|
it != m_domainList.end();
|
|
it++ )
|
|
{
|
|
const TQString &domain = *it;
|
|
KCookieAdvice advice = getDomainAdvice( domain);
|
|
if (advice != KCookieDunno)
|
|
{
|
|
TQString value(domain);
|
|
value += ':';
|
|
value += adviceToStr(advice);
|
|
domainSettings.append(value);
|
|
}
|
|
}
|
|
_config->writeEntry("CookieDomainAdvice", domainSettings);
|
|
_config->sync();
|
|
m_configChanged = false;
|
|
}
|
|
|
|
|
|
//
|
|
// Load the cookie configuration
|
|
//
|
|
|
|
void KCookieJar::loadConfig(KConfig *_config, bool reparse )
|
|
{
|
|
if ( reparse )
|
|
_config->reparseConfiguration();
|
|
|
|
_config->setGroup("Cookie Dialog");
|
|
m_showCookieDetails = _config->readBoolEntry( "ShowCookieDetails" );
|
|
m_preferredPolicy = _config->readNumEntry( "PreferredPolicy", 0 );
|
|
|
|
_config->setGroup("Cookie Policy");
|
|
TQStringList domainSettings = _config->readListEntry("CookieDomainAdvice");
|
|
m_rejectCrossDomainCookies = _config->readBoolEntry( "RejectCrossDomainCookies", true );
|
|
m_autoAcceptSessionCookies = _config->readBoolEntry( "AcceptSessionCookies", true );
|
|
m_ignoreCookieExpirationDate = _config->readBoolEntry( "IgnoreExpirationDate", false );
|
|
TQString value = _config->readEntry("CookieGlobalAdvice", L1("Ask"));
|
|
m_globalAdvice = strToAdvice(value);
|
|
|
|
// Reset current domain settings first.
|
|
for ( TQStringList::Iterator it=m_domainList.begin(); it != m_domainList.end(); )
|
|
{
|
|
// Make sure to update iterator before calling setDomainAdvice()
|
|
// setDomainAdvice() might delete the domain from domainList.
|
|
TQString domain = *it++;
|
|
setDomainAdvice(domain, KCookieDunno);
|
|
}
|
|
|
|
// Now apply the domain settings read from config file...
|
|
for ( TQStringList::Iterator it=domainSettings.begin();
|
|
it != domainSettings.end(); )
|
|
{
|
|
const TQString &value = *it++;
|
|
|
|
int sepPos = value.findRev(':');
|
|
|
|
if (sepPos <= 0)
|
|
continue;
|
|
|
|
TQString domain(value.left(sepPos));
|
|
KCookieAdvice advice = strToAdvice( value.mid(sepPos + 1) );
|
|
setDomainAdvice(domain, advice);
|
|
}
|
|
}
|