/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef mozilla_dom_PerformanceResourceTiming_h___ #define mozilla_dom_PerformanceResourceTiming_h___ #include "mozilla/UniquePtr.h" #include "nsCOMPtr.h" #include "Performance.h" #include "PerformanceEntry.h" #include "PerformanceServerTiming.h" #include "PerformanceTiming.h" namespace mozilla { namespace dom { // http://www.w3.org/TR/resource-timing/#performanceresourcetiming class PerformanceResourceTiming : public PerformanceEntry { public: typedef mozilla::TimeStamp TimeStamp; NS_DECL_ISUPPORTS_INHERITED NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS_INHERITED( PerformanceResourceTiming, PerformanceEntry) PerformanceResourceTiming( UniquePtr&& aPerformanceTimingData, Performance* aPerformance, const nsAString& aName); virtual JSObject* WrapObject(JSContext* aCx, JS::Handle aGivenProto) override; virtual DOMHighResTimeStamp StartTime() const override; virtual DOMHighResTimeStamp Duration() const override { return ResponseEnd() - StartTime(); } void GetInitiatorType(nsAString& aInitiatorType) const { aInitiatorType = mInitiatorType; } void SetInitiatorType(const nsAString& aInitiatorType) { mInitiatorType = aInitiatorType; } void GetNextHopProtocol(nsAString& aNextHopProtocol) const { if (mTimingData) { aNextHopProtocol = mTimingData->NextHopProtocol(); } } DOMHighResTimeStamp WorkerStart() const { return mTimingData ? mTimingData->WorkerStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp FetchStart() const { return mTimingData ? mTimingData->FetchStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp RedirectStart( Maybe& aSubjectPrincipal) const { // We have to check if all the redirect URIs had the same origin (since // there is no check in RedirectStartHighRes()) return ReportRedirectForCaller(aSubjectPrincipal) ? mTimingData->RedirectStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp RedirectEnd( Maybe& aSubjectPrincipal) const { // We have to check if all the redirect URIs had the same origin (since // there is no check in RedirectEndHighRes()) return ReportRedirectForCaller(aSubjectPrincipal) ? mTimingData->RedirectEndHighRes(mPerformance) : 0; } DOMHighResTimeStamp DomainLookupStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->DomainLookupStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp DomainLookupEnd( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->DomainLookupEndHighRes(mPerformance) : 0; } DOMHighResTimeStamp ConnectStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->ConnectStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp ConnectEnd( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->ConnectEndHighRes(mPerformance) : 0; } DOMHighResTimeStamp RequestStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->RequestStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp ResponseStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->ResponseStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp ResponseEnd() const { return mTimingData ? mTimingData->ResponseEndHighRes(mPerformance) : 0; } DOMHighResTimeStamp SecureConnectionStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->SecureConnectionStartHighRes(mPerformance) : 0; } virtual const PerformanceResourceTiming* ToResourceTiming() const override { return this; } uint64_t TransferSize(Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->TransferSize() : 0; } uint64_t EncodedBodySize(Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->EncodedBodySize() : 0; } uint64_t DecodedBodySize(Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->DecodedBodySize() : 0; } void GetServerTiming(nsTArray>& aRetval, Maybe& aSubjectPrincipal); size_t SizeOfIncludingThis( mozilla::MallocSizeOf aMallocSizeOf) const override; protected: virtual ~PerformanceResourceTiming(); size_t SizeOfExcludingThis( mozilla::MallocSizeOf aMallocSizeOf) const override; // Check if caller has access to cross-origin timings, either by the rules // from the spec, or based on addon permissions. bool TimingAllowedForCaller(Maybe& aCaller) const; // Check if cross-origin redirects should be reported to the caller. bool ReportRedirectForCaller(Maybe& aCaller) const; nsString mInitiatorType; UniquePtr mTimingData; RefPtr mPerformance; // The same initial requested URI as the `name` attribute. nsCOMPtr mOriginalURI; }; } // namespace dom } // namespace mozilla #endif /* mozilla_dom_PerformanceResourceTiming_h___ */