mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-25 22:01:30 +00:00
e26682d684
Differential Revision: https://phabricator.services.mozilla.com/D45932 --HG-- extra : moz-landing-system : lando
643 lines
17 KiB
C++
643 lines
17 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "mozilla/dom/InternalHeaders.h"
|
|
|
|
#include "mozilla/dom/FetchTypes.h"
|
|
#include "mozilla/ErrorResult.h"
|
|
|
|
#include "nsCharSeparatedTokenizer.h"
|
|
#include "nsContentUtils.h"
|
|
#include "nsIHttpHeaderVisitor.h"
|
|
#include "nsNetUtil.h"
|
|
#include "nsReadableUtils.h"
|
|
|
|
namespace mozilla {
|
|
namespace dom {
|
|
|
|
InternalHeaders::InternalHeaders(const nsTArray<Entry>&& aHeaders,
|
|
HeadersGuardEnum aGuard)
|
|
: mGuard(aGuard), mList(aHeaders), mListDirty(true) {}
|
|
|
|
InternalHeaders::InternalHeaders(
|
|
const nsTArray<HeadersEntry>& aHeadersEntryList, HeadersGuardEnum aGuard)
|
|
: mGuard(aGuard), mListDirty(true) {
|
|
for (const HeadersEntry& headersEntry : aHeadersEntryList) {
|
|
mList.AppendElement(Entry(headersEntry.name(), headersEntry.value()));
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::ToIPC(nsTArray<HeadersEntry>& aIPCHeaders,
|
|
HeadersGuardEnum& aGuard) {
|
|
aGuard = mGuard;
|
|
|
|
aIPCHeaders.Clear();
|
|
for (Entry& entry : mList) {
|
|
aIPCHeaders.AppendElement(HeadersEntry(entry.mName, entry.mValue));
|
|
}
|
|
}
|
|
|
|
bool InternalHeaders::IsValidHeaderValue(const nsCString& aLowerName,
|
|
const nsCString& aNormalizedValue,
|
|
ErrorResult& aRv) {
|
|
// Steps 2 to 6 for ::Set() and ::Append() in the spec.
|
|
|
|
// Step 2
|
|
if (IsInvalidName(aLowerName, aRv) || IsInvalidValue(aNormalizedValue, aRv)) {
|
|
return false;
|
|
}
|
|
|
|
// Step 3
|
|
if (IsImmutable(aRv)) {
|
|
return false;
|
|
}
|
|
|
|
// Step 4
|
|
if (mGuard == HeadersGuardEnum::Request &&
|
|
IsForbiddenRequestHeader(aLowerName)) {
|
|
return false;
|
|
}
|
|
|
|
// Step 5
|
|
if (mGuard == HeadersGuardEnum::Request_no_cors) {
|
|
nsAutoCString tempValue;
|
|
Get(aLowerName, tempValue, aRv);
|
|
|
|
if (tempValue.IsVoid()) {
|
|
tempValue = aNormalizedValue;
|
|
} else {
|
|
tempValue.Append(", ");
|
|
tempValue.Append(aNormalizedValue);
|
|
}
|
|
|
|
if (!nsContentUtils::IsCORSSafelistedRequestHeader(aLowerName, tempValue)) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// Step 6
|
|
else if (IsForbiddenResponseHeader(aLowerName)) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
void InternalHeaders::Append(const nsACString& aName, const nsACString& aValue,
|
|
ErrorResult& aRv) {
|
|
// Step 1
|
|
nsAutoCString trimValue;
|
|
NS_TrimHTTPWhitespace(aValue, trimValue);
|
|
|
|
// Steps 2 to 6
|
|
nsAutoCString lowerName;
|
|
ToLowerCase(aName, lowerName);
|
|
if (!IsValidHeaderValue(lowerName, trimValue, aRv)) {
|
|
return;
|
|
}
|
|
|
|
// Step 7
|
|
nsAutoCString name(aName);
|
|
ReuseExistingNameIfExists(name);
|
|
SetListDirty();
|
|
mList.AppendElement(Entry(name, trimValue));
|
|
|
|
// Step 8
|
|
if (mGuard == HeadersGuardEnum::Request_no_cors) {
|
|
RemovePrivilegedNoCorsRequestHeaders();
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::RemovePrivilegedNoCorsRequestHeaders() {
|
|
bool dirty = false;
|
|
|
|
// remove in reverse order to minimize copying
|
|
for (int32_t i = mList.Length() - 1; i >= 0; --i) {
|
|
if (IsPrivilegedNoCorsRequestHeaderName(mList[i].mName)) {
|
|
mList.RemoveElementAt(i);
|
|
dirty = true;
|
|
}
|
|
}
|
|
|
|
if (dirty) {
|
|
SetListDirty();
|
|
}
|
|
}
|
|
|
|
bool InternalHeaders::DeleteInternal(const nsCString& aLowerName,
|
|
ErrorResult& aRv) {
|
|
bool dirty = false;
|
|
|
|
// remove in reverse order to minimize copying
|
|
for (int32_t i = mList.Length() - 1; i >= 0; --i) {
|
|
if (mList[i].mName.EqualsIgnoreCase(aLowerName.get())) {
|
|
mList.RemoveElementAt(i);
|
|
dirty = true;
|
|
}
|
|
}
|
|
|
|
if (dirty) {
|
|
SetListDirty();
|
|
}
|
|
|
|
return dirty;
|
|
}
|
|
|
|
void InternalHeaders::Delete(const nsACString& aName, ErrorResult& aRv) {
|
|
nsAutoCString lowerName;
|
|
ToLowerCase(aName, lowerName);
|
|
|
|
// Step 1
|
|
if (IsInvalidName(lowerName, aRv)) {
|
|
return;
|
|
}
|
|
|
|
// Step 2
|
|
if (IsImmutable(aRv)) {
|
|
return;
|
|
}
|
|
|
|
// Step 3
|
|
if (IsForbiddenRequestHeader(lowerName)) {
|
|
return;
|
|
}
|
|
|
|
// Step 4
|
|
if (mGuard == HeadersGuardEnum::Request_no_cors &&
|
|
!IsNoCorsSafelistedRequestHeaderName(lowerName) &&
|
|
!IsPrivilegedNoCorsRequestHeaderName(lowerName)) {
|
|
return;
|
|
}
|
|
|
|
// Step 5
|
|
if (IsForbiddenResponseHeader(lowerName)) {
|
|
return;
|
|
}
|
|
|
|
// Steps 6 and 7
|
|
if (!DeleteInternal(lowerName, aRv)) {
|
|
return;
|
|
}
|
|
|
|
// Step 8
|
|
if (mGuard == HeadersGuardEnum::Request_no_cors) {
|
|
RemovePrivilegedNoCorsRequestHeaders();
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::Get(const nsACString& aName, nsACString& aValue,
|
|
ErrorResult& aRv) const {
|
|
nsAutoCString lowerName;
|
|
ToLowerCase(aName, lowerName);
|
|
|
|
if (IsInvalidName(lowerName, aRv)) {
|
|
return;
|
|
}
|
|
|
|
GetInternal(lowerName, aValue, aRv);
|
|
}
|
|
|
|
void InternalHeaders::GetInternal(const nsCString& aLowerName,
|
|
nsACString& aValue, ErrorResult& aRv) const {
|
|
const char* delimiter = ", ";
|
|
bool firstValueFound = false;
|
|
|
|
for (uint32_t i = 0; i < mList.Length(); ++i) {
|
|
if (mList[i].mName.EqualsIgnoreCase(aLowerName.get())) {
|
|
if (firstValueFound) {
|
|
aValue += delimiter;
|
|
}
|
|
aValue += mList[i].mValue;
|
|
firstValueFound = true;
|
|
}
|
|
}
|
|
|
|
// No value found, so return null to content
|
|
if (!firstValueFound) {
|
|
aValue.SetIsVoid(true);
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::GetFirst(const nsACString& aName, nsACString& aValue,
|
|
ErrorResult& aRv) const {
|
|
nsAutoCString lowerName;
|
|
ToLowerCase(aName, lowerName);
|
|
|
|
if (IsInvalidName(lowerName, aRv)) {
|
|
return;
|
|
}
|
|
|
|
for (uint32_t i = 0; i < mList.Length(); ++i) {
|
|
if (mList[i].mName.EqualsIgnoreCase(lowerName.get())) {
|
|
aValue = mList[i].mValue;
|
|
return;
|
|
}
|
|
}
|
|
|
|
// No value found, so return null to content
|
|
aValue.SetIsVoid(true);
|
|
}
|
|
|
|
bool InternalHeaders::Has(const nsACString& aName, ErrorResult& aRv) const {
|
|
nsAutoCString lowerName;
|
|
ToLowerCase(aName, lowerName);
|
|
|
|
if (IsInvalidName(lowerName, aRv)) {
|
|
return false;
|
|
}
|
|
|
|
for (uint32_t i = 0; i < mList.Length(); ++i) {
|
|
if (mList[i].mName.EqualsIgnoreCase(lowerName.get())) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void InternalHeaders::Set(const nsACString& aName, const nsACString& aValue,
|
|
ErrorResult& aRv) {
|
|
// Step 1
|
|
nsAutoCString trimValue;
|
|
NS_TrimHTTPWhitespace(aValue, trimValue);
|
|
|
|
// Steps 2 to 6
|
|
nsAutoCString lowerName;
|
|
ToLowerCase(aName, lowerName);
|
|
if (!IsValidHeaderValue(lowerName, trimValue, aRv)) {
|
|
return;
|
|
}
|
|
|
|
// Step 7
|
|
SetListDirty();
|
|
|
|
int32_t firstIndex = INT32_MAX;
|
|
|
|
// remove in reverse order to minimize copying
|
|
for (int32_t i = mList.Length() - 1; i >= 0; --i) {
|
|
if (mList[i].mName.EqualsIgnoreCase(lowerName.get())) {
|
|
firstIndex = std::min(firstIndex, i);
|
|
mList.RemoveElementAt(i);
|
|
}
|
|
}
|
|
|
|
if (firstIndex < INT32_MAX) {
|
|
Entry* entry = mList.InsertElementAt(firstIndex);
|
|
entry->mName = aName;
|
|
entry->mValue = trimValue;
|
|
} else {
|
|
mList.AppendElement(Entry(aName, trimValue));
|
|
}
|
|
|
|
// Step 8
|
|
if (mGuard == HeadersGuardEnum::Request_no_cors) {
|
|
RemovePrivilegedNoCorsRequestHeaders();
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::Clear() {
|
|
SetListDirty();
|
|
mList.Clear();
|
|
}
|
|
|
|
void InternalHeaders::SetGuard(HeadersGuardEnum aGuard, ErrorResult& aRv) {
|
|
// The guard is only checked during ::Set() and ::Append() in the spec. It
|
|
// does not require revalidating headers already set.
|
|
mGuard = aGuard;
|
|
}
|
|
|
|
InternalHeaders::~InternalHeaders() {}
|
|
|
|
// static
|
|
bool InternalHeaders::IsNoCorsSafelistedRequestHeaderName(
|
|
const nsCString& aName) {
|
|
return aName.EqualsIgnoreCase("accept") ||
|
|
aName.EqualsIgnoreCase("accept-language") ||
|
|
aName.EqualsIgnoreCase("content-language") ||
|
|
aName.EqualsIgnoreCase("content-type");
|
|
}
|
|
|
|
// static
|
|
bool InternalHeaders::IsPrivilegedNoCorsRequestHeaderName(
|
|
const nsCString& aName) {
|
|
return aName.EqualsIgnoreCase("range");
|
|
}
|
|
|
|
// static
|
|
bool InternalHeaders::IsSimpleHeader(const nsCString& aName,
|
|
const nsACString& aValue) {
|
|
if (aValue.Length() > 128) {
|
|
return false;
|
|
}
|
|
// Note, we must allow a null content-type value here to support
|
|
// get("content-type"), but the IsInvalidValue() check will prevent null
|
|
// from being set or appended.
|
|
return (aName.EqualsIgnoreCase("accept") &&
|
|
nsContentUtils::IsAllowedNonCorsAccept(aValue)) ||
|
|
(aName.EqualsIgnoreCase("accept-language") &&
|
|
nsContentUtils::IsAllowedNonCorsLanguage(aValue)) ||
|
|
(aName.EqualsIgnoreCase("content-language") &&
|
|
nsContentUtils::IsAllowedNonCorsLanguage(aValue)) ||
|
|
(aName.EqualsIgnoreCase("content-type") &&
|
|
nsContentUtils::IsAllowedNonCorsContentType(aValue));
|
|
}
|
|
|
|
// static
|
|
bool InternalHeaders::IsRevalidationHeader(const nsCString& aName) {
|
|
return aName.EqualsIgnoreCase("if-modified-since") ||
|
|
aName.EqualsIgnoreCase("if-none-match") ||
|
|
aName.EqualsIgnoreCase("if-unmodified-since") ||
|
|
aName.EqualsIgnoreCase("if-match") ||
|
|
aName.EqualsIgnoreCase("if-range");
|
|
}
|
|
|
|
// static
|
|
bool InternalHeaders::IsInvalidName(const nsACString& aName, ErrorResult& aRv) {
|
|
if (!NS_IsValidHTTPToken(aName)) {
|
|
NS_ConvertUTF8toUTF16 label(aName);
|
|
aRv.ThrowTypeError<MSG_INVALID_HEADER_NAME>(label);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
// static
|
|
bool InternalHeaders::IsInvalidValue(const nsACString& aValue,
|
|
ErrorResult& aRv) {
|
|
if (!NS_IsReasonableHTTPHeaderValue(aValue)) {
|
|
NS_ConvertUTF8toUTF16 label(aValue);
|
|
aRv.ThrowTypeError<MSG_INVALID_HEADER_VALUE>(label);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool InternalHeaders::IsImmutable(ErrorResult& aRv) const {
|
|
if (mGuard == HeadersGuardEnum::Immutable) {
|
|
aRv.ThrowTypeError(u"Headers are immutable and cannot be modified.");
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool InternalHeaders::IsForbiddenRequestHeader(const nsCString& aName) const {
|
|
return mGuard == HeadersGuardEnum::Request &&
|
|
nsContentUtils::IsForbiddenRequestHeader(aName);
|
|
}
|
|
|
|
bool InternalHeaders::IsForbiddenRequestNoCorsHeader(
|
|
const nsCString& aName) const {
|
|
return mGuard == HeadersGuardEnum::Request_no_cors &&
|
|
!IsSimpleHeader(aName, EmptyCString());
|
|
}
|
|
|
|
bool InternalHeaders::IsForbiddenRequestNoCorsHeader(
|
|
const nsCString& aName, const nsACString& aValue) const {
|
|
return mGuard == HeadersGuardEnum::Request_no_cors &&
|
|
!IsSimpleHeader(aName, aValue);
|
|
}
|
|
|
|
bool InternalHeaders::IsForbiddenResponseHeader(const nsCString& aName) const {
|
|
return mGuard == HeadersGuardEnum::Response &&
|
|
nsContentUtils::IsForbiddenResponseHeader(aName);
|
|
}
|
|
|
|
void InternalHeaders::Fill(const InternalHeaders& aInit, ErrorResult& aRv) {
|
|
const nsTArray<Entry>& list = aInit.mList;
|
|
for (uint32_t i = 0; i < list.Length() && !aRv.Failed(); ++i) {
|
|
const Entry& entry = list[i];
|
|
Append(entry.mName, entry.mValue, aRv);
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::Fill(const Sequence<Sequence<nsCString>>& aInit,
|
|
ErrorResult& aRv) {
|
|
for (uint32_t i = 0; i < aInit.Length() && !aRv.Failed(); ++i) {
|
|
const Sequence<nsCString>& tuple = aInit[i];
|
|
if (tuple.Length() != 2) {
|
|
aRv.ThrowTypeError(
|
|
u"Headers require name/value tuples when being initialized by a "
|
|
u"sequence.");
|
|
return;
|
|
}
|
|
Append(tuple[0], tuple[1], aRv);
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::Fill(const Record<nsCString, nsCString>& aInit,
|
|
ErrorResult& aRv) {
|
|
for (auto& entry : aInit.Entries()) {
|
|
Append(entry.mKey, entry.mValue, aRv);
|
|
if (aRv.Failed()) {
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
namespace {
|
|
|
|
class FillHeaders final : public nsIHttpHeaderVisitor {
|
|
RefPtr<InternalHeaders> mInternalHeaders;
|
|
|
|
~FillHeaders() = default;
|
|
|
|
public:
|
|
NS_DECL_ISUPPORTS
|
|
|
|
explicit FillHeaders(InternalHeaders* aInternalHeaders)
|
|
: mInternalHeaders(aInternalHeaders) {
|
|
MOZ_DIAGNOSTIC_ASSERT(mInternalHeaders);
|
|
}
|
|
|
|
NS_IMETHOD
|
|
VisitHeader(const nsACString& aHeader, const nsACString& aValue) override {
|
|
mInternalHeaders->Append(aHeader, aValue, IgnoreErrors());
|
|
return NS_OK;
|
|
}
|
|
};
|
|
|
|
NS_IMPL_ISUPPORTS(FillHeaders, nsIHttpHeaderVisitor)
|
|
|
|
} // namespace
|
|
|
|
void InternalHeaders::FillResponseHeaders(nsIRequest* aRequest) {
|
|
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aRequest);
|
|
if (!httpChannel) {
|
|
return;
|
|
}
|
|
|
|
RefPtr<FillHeaders> visitor = new FillHeaders(this);
|
|
nsresult rv = httpChannel->VisitResponseHeaders(visitor);
|
|
if (NS_FAILED(rv)) {
|
|
NS_WARNING("failed to fill headers");
|
|
}
|
|
}
|
|
|
|
bool InternalHeaders::HasOnlySimpleHeaders() const {
|
|
for (uint32_t i = 0; i < mList.Length(); ++i) {
|
|
if (!IsSimpleHeader(mList[i].mName, mList[i].mValue)) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool InternalHeaders::HasRevalidationHeaders() const {
|
|
for (uint32_t i = 0; i < mList.Length(); ++i) {
|
|
if (IsRevalidationHeader(mList[i].mName)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
// static
|
|
already_AddRefed<InternalHeaders> InternalHeaders::BasicHeaders(
|
|
InternalHeaders* aHeaders) {
|
|
RefPtr<InternalHeaders> basic = new InternalHeaders(*aHeaders);
|
|
ErrorResult result;
|
|
// The Set-Cookie headers cannot be invalid mutable headers, so the Delete
|
|
// must succeed.
|
|
basic->Delete(NS_LITERAL_CSTRING("Set-Cookie"), result);
|
|
MOZ_ASSERT(!result.Failed());
|
|
basic->Delete(NS_LITERAL_CSTRING("Set-Cookie2"), result);
|
|
MOZ_ASSERT(!result.Failed());
|
|
return basic.forget();
|
|
}
|
|
|
|
// static
|
|
already_AddRefed<InternalHeaders> InternalHeaders::CORSHeaders(
|
|
InternalHeaders* aHeaders, RequestCredentials aCredentialsMode) {
|
|
RefPtr<InternalHeaders> cors = new InternalHeaders(aHeaders->mGuard);
|
|
ErrorResult result;
|
|
|
|
nsAutoCString acExposedNames;
|
|
aHeaders->Get(NS_LITERAL_CSTRING("Access-Control-Expose-Headers"),
|
|
acExposedNames, result);
|
|
MOZ_ASSERT(!result.Failed());
|
|
|
|
bool allowAllHeaders = false;
|
|
AutoTArray<nsCString, 5> exposeNamesArray;
|
|
nsCCharSeparatedTokenizer exposeTokens(acExposedNames, ',');
|
|
while (exposeTokens.hasMoreTokens()) {
|
|
const nsDependentCSubstring& token = exposeTokens.nextToken();
|
|
if (token.IsEmpty()) {
|
|
continue;
|
|
}
|
|
|
|
if (!NS_IsValidHTTPToken(token)) {
|
|
NS_WARNING(
|
|
"Got invalid HTTP token in Access-Control-Expose-Headers. Header "
|
|
"value is:");
|
|
NS_WARNING(acExposedNames.get());
|
|
exposeNamesArray.Clear();
|
|
break;
|
|
}
|
|
|
|
if (token.EqualsLiteral("*") &&
|
|
aCredentialsMode != RequestCredentials::Include) {
|
|
allowAllHeaders = true;
|
|
}
|
|
|
|
exposeNamesArray.AppendElement(token);
|
|
}
|
|
|
|
nsCaseInsensitiveCStringArrayComparator comp;
|
|
for (uint32_t i = 0; i < aHeaders->mList.Length(); ++i) {
|
|
const Entry& entry = aHeaders->mList[i];
|
|
if (allowAllHeaders) {
|
|
cors->Append(entry.mName, entry.mValue, result);
|
|
MOZ_ASSERT(!result.Failed());
|
|
} else if (entry.mName.EqualsIgnoreCase("cache-control") ||
|
|
entry.mName.EqualsIgnoreCase("content-language") ||
|
|
entry.mName.EqualsIgnoreCase("content-type") ||
|
|
entry.mName.EqualsIgnoreCase("expires") ||
|
|
entry.mName.EqualsIgnoreCase("last-modified") ||
|
|
entry.mName.EqualsIgnoreCase("pragma") ||
|
|
exposeNamesArray.Contains(entry.mName, comp)) {
|
|
cors->Append(entry.mName, entry.mValue, result);
|
|
MOZ_ASSERT(!result.Failed());
|
|
}
|
|
}
|
|
|
|
return cors.forget();
|
|
}
|
|
|
|
void InternalHeaders::GetEntries(
|
|
nsTArray<InternalHeaders::Entry>& aEntries) const {
|
|
MOZ_ASSERT(aEntries.IsEmpty());
|
|
aEntries.AppendElements(mList);
|
|
}
|
|
|
|
void InternalHeaders::GetUnsafeHeaders(nsTArray<nsCString>& aNames) const {
|
|
MOZ_ASSERT(aNames.IsEmpty());
|
|
for (uint32_t i = 0; i < mList.Length(); ++i) {
|
|
const Entry& header = mList[i];
|
|
if (!InternalHeaders::IsSimpleHeader(header.mName, header.mValue)) {
|
|
aNames.AppendElement(header.mName);
|
|
}
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::MaybeSortList() {
|
|
class Comparator {
|
|
public:
|
|
bool Equals(const Entry& aA, const Entry& aB) const {
|
|
return aA.mName == aB.mName;
|
|
}
|
|
|
|
bool LessThan(const Entry& aA, const Entry& aB) const {
|
|
return aA.mName < aB.mName;
|
|
}
|
|
};
|
|
|
|
if (!mListDirty) {
|
|
return;
|
|
}
|
|
|
|
mListDirty = false;
|
|
|
|
Comparator comparator;
|
|
|
|
mSortedList.Clear();
|
|
for (const Entry& entry : mList) {
|
|
bool found = false;
|
|
for (Entry& sortedEntry : mSortedList) {
|
|
if (sortedEntry.mName.EqualsIgnoreCase(entry.mName.get())) {
|
|
sortedEntry.mValue += ", ";
|
|
sortedEntry.mValue += entry.mValue;
|
|
found = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!found) {
|
|
Entry newEntry = entry;
|
|
ToLowerCase(newEntry.mName);
|
|
mSortedList.InsertElementSorted(newEntry, comparator);
|
|
}
|
|
}
|
|
}
|
|
|
|
void InternalHeaders::SetListDirty() {
|
|
mSortedList.Clear();
|
|
mListDirty = true;
|
|
}
|
|
|
|
void InternalHeaders::ReuseExistingNameIfExists(nsCString& aName) const {
|
|
for (const Entry& entry : mList) {
|
|
if (entry.mName.EqualsIgnoreCase(aName.get())) {
|
|
aName = entry.mName;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
} // namespace dom
|
|
} // namespace mozilla
|