5 // Atsushi Enomoto <atsushi@ximian.com>
7 // Copyright (C) 2010 Novell, Inc. http://www.novell.com
9 // Permission is hereby granted, free of charge, to any person obtaining
10 // a copy of this software and associated documentation files (the
11 // "Software"), to deal in the Software without restriction, including
12 // without limitation the rights to use, copy, modify, merge, publish,
13 // distribute, sublicense, and/or sell copies of the Software, and to
14 // permit persons to whom the Software is furnished to do so, subject to
15 // the following conditions:
17 // The above copyright notice and this permission notice shall be
18 // included in all copies or substantial portions of the Software.
20 // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
21 // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
22 // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
23 // NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
24 // LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
25 // OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
26 // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
29 using System.Collections.Generic;
30 using System.Collections.Specialized;
31 using System.IdentityModel.Selectors;
32 using System.IdentityModel.Tokens;
35 using System.ServiceModel;
36 using System.ServiceModel.Security;
38 using System.Threading;
40 namespace System.ServiceModel.Channels.Http
42 internal class HttpReplyChannel : InternalReplyChannelBase
44 HttpChannelListener<IReplyChannel> source;
45 RequestContext reqctx;
46 SecurityTokenAuthenticator security_token_authenticator;
47 SecurityTokenResolver security_token_resolver;
49 public HttpReplyChannel (HttpChannelListener<IReplyChannel> listener)
52 this.source = listener;
54 if (listener.SecurityTokenManager != null) {
55 var str = new SecurityTokenRequirement () { TokenType = SecurityTokenTypes.UserName };
56 security_token_authenticator = listener.SecurityTokenManager.CreateSecurityTokenAuthenticator (str, out security_token_resolver);
60 internal HttpChannelListener<IReplyChannel> Source {
61 get { return source; }
64 public MessageEncoder Encoder {
65 get { return source.MessageEncoder; }
68 internal MessageVersion MessageVersion {
69 get { return source.MessageEncoder.MessageVersion; }
72 public override RequestContext ReceiveRequest (TimeSpan timeout)
75 if (!TryReceiveRequest (timeout, out ctx))
76 throw new TimeoutException ();
80 protected override void OnOpen (TimeSpan timeout)
84 protected override void OnAbort ()
86 AbortConnections (TimeSpan.Zero);
87 base.OnAbort (); // FIXME: remove it. The base is wrong. But it is somehow required to not block some tests.
90 public override bool CancelAsync (TimeSpan timeout)
92 AbortConnections (timeout);
93 // FIXME: this wait is sort of hack (because it should not be required), but without it some tests are blocked.
94 // This hack even had better be moved to base.CancelAsync().
95 if (CurrentAsyncResult != null)
96 CurrentAsyncResult.AsyncWaitHandle.WaitOne (TimeSpan.FromMilliseconds (300));
97 return base.CancelAsync (timeout);
100 void AbortConnections (TimeSpan timeout)
103 reqctx.Close (timeout);
108 protected override void OnClose (TimeSpan timeout)
112 close_started = true;
113 DateTime start = DateTime.Now;
115 // FIXME: consider timeout
116 AbortConnections (timeout - (DateTime.Now - start));
118 base.OnClose (timeout - (DateTime.Now - start));
121 protected string GetHeaderItem (string raw)
123 if (raw == null || raw.Length == 0)
128 if (raw [raw.Length - 1] == raw [0])
129 return raw.Substring (1, raw.Length - 2);
130 // FIXME: is it simply an error?
136 protected HttpRequestMessageProperty CreateRequestProperty (HttpContextInfo ctxi)
138 var query = ctxi.Request.Url.Query;
139 var prop = new HttpRequestMessageProperty ();
140 prop.Method = ctxi.Request.HttpMethod;
141 prop.QueryString = query.StartsWith ("?") ? query.Substring (1) : query;
142 // FIXME: prop.SuppressEntityBody
143 prop.Headers.Add (ctxi.Request.Headers);
147 public override bool TryReceiveRequest (TimeSpan timeout, out RequestContext context)
150 HttpContextInfo ctxi;
151 if (!source.ListenerManager.TryDequeueRequest (source.ChannelDispatcher, timeout, out ctxi))
154 return true; // returning true, yet context is null. This happens at closing phase.
156 if (source.Source.AuthenticationScheme != AuthenticationSchemes.Anonymous) {
157 if (security_token_authenticator != null)
158 // FIXME: use return value?
160 security_token_authenticator.ValidateToken (new UserNameSecurityToken (ctxi.User, ctxi.Password));
161 } catch (Exception) {
162 ctxi.ReturnUnauthorized ();
165 ctxi.ReturnUnauthorized ();
171 if (ctxi.Request.HttpMethod == "POST")
172 msg = CreatePostMessage (ctxi);
173 else if (ctxi.Request.HttpMethod == "GET")
174 msg = Message.CreateMessage (MessageVersion.None, null); // HTTP GET-based request
179 if (msg.Headers.To == null)
180 msg.Headers.To = ctxi.Request.Url;
181 msg.Properties.Add ("Via", LocalAddress.Uri);
182 msg.Properties.Add (HttpRequestMessageProperty.Name, CreateRequestProperty (ctxi));
184 Logger.LogMessage (MessageLogSourceKind.TransportReceive, ref msg, source.Source.MaxReceivedMessageSize);
186 context = new HttpRequestContext (this, ctxi, msg);
191 protected Message CreatePostMessage (HttpContextInfo ctxi)
193 if (ctxi.Response.StatusCode != 200) { // it's already invalid.
198 if (!Encoder.IsContentTypeSupported (ctxi.Request.ContentType)) {
199 ctxi.Response.StatusCode = (int) HttpStatusCode.UnsupportedMediaType;
200 ctxi.Response.StatusDescription = String.Format (
201 "Expected content-type '{0}' but got '{1}'", Encoder.ContentType, ctxi.Request.ContentType);
207 // FIXME: supply maxSizeOfHeaders.
208 int maxSizeOfHeaders = 0x10000;
210 #if false // FIXME: enable it, once duplex callback test gets passed.
211 Stream stream = ctxi.Request.InputStream;
212 if (source.Source.TransferMode == TransferMode.Buffered) {
213 if (ctxi.Request.ContentLength64 <= 0)
214 throw new ArgumentException ("This HTTP channel is configured to use buffered mode, and thus expects Content-Length sent to the listener");
216 var ms = new MemoryStream ();
217 var buf = new byte [0x1000];
218 while (size < ctxi.Request.ContentLength64) {
219 if ((size += stream.Read (buf, 0, 0x1000)) > source.Source.MaxBufferSize)
220 throw new QuotaExceededException ("Message quota exceeded");
221 ms.Write (buf, 0, (int) (size - ms.Length));
227 var msg = Encoder.ReadMessage (
228 stream, maxSizeOfHeaders, ctxi.Request.ContentType);
230 var msg = Encoder.ReadMessage (
231 ctxi.Request.InputStream, maxSizeOfHeaders, ctxi.Request.ContentType);
234 if (MessageVersion.Envelope.Equals (EnvelopeVersion.Soap11) ||
235 MessageVersion.Addressing.Equals (AddressingVersion.None)) {
236 string action = GetHeaderItem (ctxi.Request.Headers ["SOAPAction"]);
237 if (action != null) {
238 if (action.Length > 2 && action [0] == '"' && action [action.Length] == '"')
239 action = action.Substring (1, action.Length - 2);
240 msg.Headers.Action = action;
243 msg.Properties.Add (RemoteEndpointMessageProperty.Name, new RemoteEndpointMessageProperty (ctxi.Request.ClientIPAddress, ctxi.Request.ClientPort));
248 public override bool WaitForRequest (TimeSpan timeout)
250 throw new NotImplementedException ();