mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-05 00:25:27 +00:00
b5681e95be
Right now, synthetic Responses did not have a valid channel info. When these were saved in the Cache, and then restored, the restored Response did have a ChannelInfo, but that ChannelInfo did not have a valid security info. Passing this to respondWith() then caused the interception to fail. This patch modifies Response::Constructor() to initialize its ChannelInfo from the global. ChannelInfo can now initialize itself from a nsIDocument. All workers now store their ChannelInfo on the WorkerLoadInfo. --HG-- extra : commitid : L1wltwPICd8 extra : rebase_source : 8dab4c414eb50e02a00dd2cb3ee848b811060e70
176 lines
5.2 KiB
C++
176 lines
5.2 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "mozilla/dom/ChannelInfo.h"
|
|
#include "nsCOMPtr.h"
|
|
#include "nsIChannel.h"
|
|
#include "nsIDocument.h"
|
|
#include "nsIHttpChannel.h"
|
|
#include "nsSerializationHelper.h"
|
|
#include "mozilla/net/HttpBaseChannel.h"
|
|
#include "mozilla/ipc/ChannelInfo.h"
|
|
#include "nsIJARChannel.h"
|
|
#include "nsJARChannel.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
using namespace mozilla;
|
|
using namespace mozilla::dom;
|
|
|
|
void
|
|
ChannelInfo::InitFromDocument(nsIDocument* aDoc)
|
|
{
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_ASSERT(!mInited, "Cannot initialize the object twice");
|
|
|
|
nsCOMPtr<nsISupports> securityInfo = aDoc->GetSecurityInfo();
|
|
if (securityInfo) {
|
|
SetSecurityInfo(securityInfo);
|
|
}
|
|
|
|
// mRedirected flag and mRedirectedURISpec are only important for maintaining
|
|
// the channel's redirected status. If the ChannelInfo is initialized from
|
|
// a document, that document has already asked the channel from which it was
|
|
// loaded about the current channel URI, so it won't matter if a future
|
|
// ResurrectInfoOnChannel() call misses whether the channel was redirected.
|
|
mRedirected = false;
|
|
mInited = true;
|
|
}
|
|
|
|
void
|
|
ChannelInfo::InitFromChannel(nsIChannel* aChannel)
|
|
{
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_ASSERT(!mInited, "Cannot initialize the object twice");
|
|
|
|
nsCOMPtr<nsISupports> securityInfo;
|
|
aChannel->GetSecurityInfo(getter_AddRefs(securityInfo));
|
|
if (securityInfo) {
|
|
SetSecurityInfo(securityInfo);
|
|
}
|
|
|
|
nsLoadFlags loadFlags = 0;
|
|
aChannel->GetLoadFlags(&loadFlags);
|
|
mRedirected = (loadFlags & nsIChannel::LOAD_REPLACE);
|
|
if (mRedirected) {
|
|
// Save the spec and not the nsIURI object itself, since those objects are
|
|
// not thread-safe, and releasing them somewhere other than the main thread
|
|
// is not possible.
|
|
nsCOMPtr<nsIURI> redirectedURI;
|
|
aChannel->GetURI(getter_AddRefs(redirectedURI));
|
|
if (redirectedURI) {
|
|
redirectedURI->GetSpec(mRedirectedURISpec);
|
|
}
|
|
}
|
|
|
|
mInited = true;
|
|
}
|
|
|
|
void
|
|
ChannelInfo::InitFromIPCChannelInfo(const ipc::IPCChannelInfo& aChannelInfo)
|
|
{
|
|
MOZ_ASSERT(!mInited, "Cannot initialize the object twice");
|
|
|
|
mSecurityInfo = aChannelInfo.securityInfo();
|
|
mRedirectedURISpec = aChannelInfo.redirectedURI();
|
|
mRedirected = aChannelInfo.redirected();
|
|
|
|
mInited = true;
|
|
}
|
|
|
|
void
|
|
ChannelInfo::SetSecurityInfo(nsISupports* aSecurityInfo)
|
|
{
|
|
MOZ_ASSERT(mSecurityInfo.IsEmpty(), "security info should only be set once");
|
|
nsCOMPtr<nsISerializable> serializable = do_QueryInterface(aSecurityInfo);
|
|
if (!serializable) {
|
|
NS_WARNING("A non-serializable object was passed to InternalResponse::SetSecurityInfo");
|
|
return;
|
|
}
|
|
NS_SerializeToString(serializable, mSecurityInfo);
|
|
}
|
|
|
|
nsresult
|
|
ChannelInfo::ResurrectInfoOnChannel(nsIChannel* aChannel)
|
|
{
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_ASSERT(mInited);
|
|
|
|
// These pointers may be null at this point. They must be checked before
|
|
// being dereferenced.
|
|
nsCOMPtr<nsIHttpChannel> httpChannel =
|
|
do_QueryInterface(aChannel);
|
|
nsCOMPtr<nsIJARChannel> jarChannel =
|
|
do_QueryInterface(aChannel);
|
|
|
|
if (!mSecurityInfo.IsEmpty()) {
|
|
nsCOMPtr<nsISupports> infoObj;
|
|
nsresult rv = NS_DeserializeObject(mSecurityInfo, getter_AddRefs(infoObj));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
if (httpChannel) {
|
|
net::HttpBaseChannel* httpBaseChannel =
|
|
static_cast<net::HttpBaseChannel*>(httpChannel.get());
|
|
rv = httpBaseChannel->OverrideSecurityInfo(infoObj);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
} else {
|
|
if (NS_WARN_IF(!jarChannel)) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
static_cast<nsJARChannel*>(jarChannel.get())->
|
|
OverrideSecurityInfo(infoObj);
|
|
}
|
|
}
|
|
|
|
if (mRedirected) {
|
|
nsLoadFlags flags = 0;
|
|
aChannel->GetLoadFlags(&flags);
|
|
flags |= nsIChannel::LOAD_REPLACE;
|
|
aChannel->SetLoadFlags(flags);
|
|
|
|
nsCOMPtr<nsIURI> redirectedURI;
|
|
nsresult rv = NS_NewURI(getter_AddRefs(redirectedURI),
|
|
mRedirectedURISpec);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
if (httpChannel) {
|
|
net::HttpBaseChannel* httpBaseChannel =
|
|
static_cast<net::HttpBaseChannel*>(httpChannel.get());
|
|
rv = httpBaseChannel->OverrideURI(redirectedURI);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
} else {
|
|
if (NS_WARN_IF(!jarChannel)) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
static_cast<nsJARChannel*>(jarChannel.get())->OverrideURI(redirectedURI);
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
ipc::IPCChannelInfo
|
|
ChannelInfo::AsIPCChannelInfo() const
|
|
{
|
|
// This may be called when mInited is false, for example if we try to store
|
|
// a synthesized Response object into the Cache. Uninitialized and empty
|
|
// ChannelInfo objects are indistinguishable at the IPC level, so this is
|
|
// fine.
|
|
|
|
IPCChannelInfo ipcInfo;
|
|
|
|
ipcInfo.securityInfo() = mSecurityInfo;
|
|
ipcInfo.redirectedURI() = mRedirectedURISpec;
|
|
ipcInfo.redirected() = mRedirected;
|
|
|
|
return ipcInfo;
|
|
}
|