mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-12-04 02:57:38 +00:00
732e327254
This code was added before we decided to do fission, when we wanted to separate out different sites that were in the same process so we could prioritize them better. We are not going down that path so we can simplify this code. There should be no change in functionality with this patch, just simpler code. Differential Revision: https://phabricator.services.mozilla.com/D201705
1243 lines
39 KiB
C++
1243 lines
39 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "imgRequest.h"
|
|
#include "ImageLogging.h"
|
|
|
|
#include "imgLoader.h"
|
|
#include "imgRequestProxy.h"
|
|
#include "DecodePool.h"
|
|
#include "ProgressTracker.h"
|
|
#include "ImageFactory.h"
|
|
#include "Image.h"
|
|
#include "MultipartImage.h"
|
|
#include "RasterImage.h"
|
|
|
|
#include "nsIChannel.h"
|
|
#include "nsICacheInfoChannel.h"
|
|
#include "nsIClassOfService.h"
|
|
#include "mozilla/dom/Document.h"
|
|
#include "nsIThreadRetargetableRequest.h"
|
|
#include "nsIInputStream.h"
|
|
#include "nsIMultiPartChannel.h"
|
|
#include "nsIHttpChannel.h"
|
|
#include "nsMimeTypes.h"
|
|
|
|
#include "nsIInterfaceRequestorUtils.h"
|
|
#include "nsISupportsPrimitives.h"
|
|
#include "nsIScriptSecurityManager.h"
|
|
#include "nsComponentManagerUtils.h"
|
|
#include "nsContentUtils.h"
|
|
#include "nsEscape.h"
|
|
|
|
#include "prtime.h" // for PR_Now
|
|
#include "nsNetUtil.h"
|
|
#include "nsIProtocolHandler.h"
|
|
#include "imgIRequest.h"
|
|
#include "nsProperties.h"
|
|
#include "nsIURL.h"
|
|
|
|
#include "mozilla/IntegerPrintfMacros.h"
|
|
#include "mozilla/SizeOfState.h"
|
|
|
|
using namespace mozilla;
|
|
using namespace mozilla::image;
|
|
|
|
#define LOG_TEST(level) (MOZ_LOG_TEST(gImgLog, (level)))
|
|
|
|
NS_IMPL_ISUPPORTS(imgRequest, nsIStreamListener, nsIRequestObserver,
|
|
nsIThreadRetargetableStreamListener, nsIChannelEventSink,
|
|
nsIInterfaceRequestor, nsIAsyncVerifyRedirectCallback)
|
|
|
|
imgRequest::imgRequest(imgLoader* aLoader, const ImageCacheKey& aCacheKey)
|
|
: mLoader(aLoader),
|
|
mCacheKey(aCacheKey),
|
|
mLoadId(nullptr),
|
|
mFirstProxy(nullptr),
|
|
mValidator(nullptr),
|
|
mCORSMode(CORS_NONE),
|
|
mImageErrorCode(NS_OK),
|
|
mImageAvailable(false),
|
|
mIsDeniedCrossSiteCORSRequest(false),
|
|
mIsCrossSiteNoCORSRequest(false),
|
|
mShouldReportRenderTimeForLCP(false),
|
|
mMutex("imgRequest"),
|
|
mProgressTracker(new ProgressTracker()),
|
|
mIsMultiPartChannel(false),
|
|
mIsInCache(false),
|
|
mDecodeRequested(false),
|
|
mNewPartPending(false),
|
|
mHadInsecureRedirect(false),
|
|
mInnerWindowId(0) {
|
|
LOG_FUNC(gImgLog, "imgRequest::imgRequest()");
|
|
}
|
|
|
|
imgRequest::~imgRequest() {
|
|
if (mLoader) {
|
|
mLoader->RemoveFromUncachedImages(this);
|
|
}
|
|
if (mURI) {
|
|
LOG_FUNC_WITH_PARAM(gImgLog, "imgRequest::~imgRequest()", "keyuri", mURI);
|
|
} else
|
|
LOG_FUNC(gImgLog, "imgRequest::~imgRequest()");
|
|
}
|
|
|
|
nsresult imgRequest::Init(
|
|
nsIURI* aURI, nsIURI* aFinalURI, bool aHadInsecureRedirect,
|
|
nsIRequest* aRequest, nsIChannel* aChannel, imgCacheEntry* aCacheEntry,
|
|
mozilla::dom::Document* aLoadingDocument,
|
|
nsIPrincipal* aTriggeringPrincipal, mozilla::CORSMode aCORSMode,
|
|
nsIReferrerInfo* aReferrerInfo) MOZ_NO_THREAD_SAFETY_ANALYSIS {
|
|
MOZ_ASSERT(NS_IsMainThread(), "Cannot use nsIURI off main thread!");
|
|
// Init() can only be called once, and that's before it can be used off
|
|
// mainthread
|
|
|
|
LOG_FUNC(gImgLog, "imgRequest::Init");
|
|
|
|
MOZ_ASSERT(!mImage, "Multiple calls to init");
|
|
MOZ_ASSERT(aURI, "No uri");
|
|
MOZ_ASSERT(aFinalURI, "No final uri");
|
|
MOZ_ASSERT(aRequest, "No request");
|
|
MOZ_ASSERT(aChannel, "No channel");
|
|
|
|
mProperties = new nsProperties();
|
|
mURI = aURI;
|
|
mFinalURI = aFinalURI;
|
|
mRequest = aRequest;
|
|
mChannel = aChannel;
|
|
mTimedChannel = do_QueryInterface(mChannel);
|
|
mTriggeringPrincipal = aTriggeringPrincipal;
|
|
mCORSMode = aCORSMode;
|
|
mReferrerInfo = aReferrerInfo;
|
|
|
|
// If the original URI and the final URI are different, check whether the
|
|
// original URI is secure. We deliberately don't take the final URI into
|
|
// account, as it needs to be handled using more complicated rules than
|
|
// earlier elements of the redirect chain.
|
|
if (aURI != aFinalURI) {
|
|
bool schemeLocal = false;
|
|
if (NS_FAILED(NS_URIChainHasFlags(
|
|
aURI, nsIProtocolHandler::URI_IS_LOCAL_RESOURCE, &schemeLocal)) ||
|
|
(!aURI->SchemeIs("https") && !aURI->SchemeIs("chrome") &&
|
|
!schemeLocal)) {
|
|
mHadInsecureRedirect = true;
|
|
}
|
|
}
|
|
|
|
// imgCacheValidator may have handled redirects before we were created, so we
|
|
// allow the caller to let us know if any redirects were insecure.
|
|
mHadInsecureRedirect = mHadInsecureRedirect || aHadInsecureRedirect;
|
|
|
|
mChannel->GetNotificationCallbacks(getter_AddRefs(mPrevChannelSink));
|
|
|
|
NS_ASSERTION(mPrevChannelSink != this,
|
|
"Initializing with a channel that already calls back to us!");
|
|
|
|
mChannel->SetNotificationCallbacks(this);
|
|
|
|
mCacheEntry = aCacheEntry;
|
|
mCacheEntry->UpdateLoadTime();
|
|
|
|
SetLoadId(aLoadingDocument);
|
|
|
|
// Grab the inner window ID of the loading document, if possible.
|
|
if (aLoadingDocument) {
|
|
mInnerWindowId = aLoadingDocument->InnerWindowID();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
bool imgRequest::CanReuseWithoutValidation(dom::Document* aDoc) const {
|
|
// If the request's loadId is the same as the aLoadingDocument, then it is ok
|
|
// to use this one because it has already been validated for this context.
|
|
// XXX: nullptr seems to be a 'special' key value that indicates that NO
|
|
// validation is required.
|
|
// XXX: we also check the window ID because the loadID() can return a reused
|
|
// pointer of a document. This can still happen for non-document image
|
|
// cache entries.
|
|
void* key = (void*)aDoc;
|
|
uint64_t innerWindowID = aDoc ? aDoc->InnerWindowID() : 0;
|
|
if (LoadId() == key && InnerWindowID() == innerWindowID) {
|
|
return true;
|
|
}
|
|
|
|
// As a special-case, if this is a print preview document, also validate on
|
|
// the original document. This allows to print uncacheable images.
|
|
if (dom::Document* original = aDoc ? aDoc->GetOriginalDocument() : nullptr) {
|
|
return CanReuseWithoutValidation(original);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void imgRequest::ClearLoader() { mLoader = nullptr; }
|
|
|
|
already_AddRefed<nsIPrincipal> imgRequest::GetTriggeringPrincipal() const {
|
|
nsCOMPtr<nsIPrincipal> principal = mTriggeringPrincipal;
|
|
return principal.forget();
|
|
}
|
|
|
|
already_AddRefed<ProgressTracker> imgRequest::GetProgressTracker() const {
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
if (mImage) {
|
|
MOZ_ASSERT(!mProgressTracker,
|
|
"Should have given mProgressTracker to mImage");
|
|
return mImage->GetProgressTracker();
|
|
}
|
|
MOZ_ASSERT(mProgressTracker,
|
|
"Should have mProgressTracker until we create mImage");
|
|
RefPtr<ProgressTracker> progressTracker = mProgressTracker;
|
|
MOZ_ASSERT(progressTracker);
|
|
return progressTracker.forget();
|
|
}
|
|
|
|
void imgRequest::SetCacheEntry(imgCacheEntry* entry) { mCacheEntry = entry; }
|
|
|
|
bool imgRequest::HasCacheEntry() const { return mCacheEntry != nullptr; }
|
|
|
|
void imgRequest::ResetCacheEntry() {
|
|
if (HasCacheEntry()) {
|
|
mCacheEntry->SetDataSize(0);
|
|
}
|
|
}
|
|
|
|
void imgRequest::AddProxy(imgRequestProxy* proxy) {
|
|
MOZ_ASSERT(proxy, "null imgRequestProxy passed in");
|
|
LOG_SCOPE_WITH_PARAM(gImgLog, "imgRequest::AddProxy", "proxy", proxy);
|
|
|
|
if (!mFirstProxy) {
|
|
// Save a raw pointer to the first proxy we see, for use in the network
|
|
// priority logic.
|
|
mFirstProxy = proxy;
|
|
}
|
|
|
|
// If we're empty before adding, we have to tell the loader we now have
|
|
// proxies.
|
|
RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
|
|
if (progressTracker->ObserverCount() == 0) {
|
|
MOZ_ASSERT(mURI, "Trying to SetHasProxies without key uri.");
|
|
if (mLoader) {
|
|
mLoader->SetHasProxies(this);
|
|
}
|
|
}
|
|
|
|
progressTracker->AddObserver(proxy);
|
|
}
|
|
|
|
nsresult imgRequest::RemoveProxy(imgRequestProxy* proxy, nsresult aStatus) {
|
|
LOG_SCOPE_WITH_PARAM(gImgLog, "imgRequest::RemoveProxy", "proxy", proxy);
|
|
|
|
// This will remove our animation consumers, so after removing
|
|
// this proxy, we don't end up without proxies with observers, but still
|
|
// have animation consumers.
|
|
proxy->ClearAnimationConsumers();
|
|
|
|
// Let the status tracker do its thing before we potentially call Cancel()
|
|
// below, because Cancel() may result in OnStopRequest being called back
|
|
// before Cancel() returns, leaving the image in a different state then the
|
|
// one it was in at this point.
|
|
RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
|
|
if (!progressTracker->RemoveObserver(proxy)) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (progressTracker->ObserverCount() == 0) {
|
|
// If we have no observers, there's nothing holding us alive. If we haven't
|
|
// been cancelled and thus removed from the cache, tell the image loader so
|
|
// we can be evicted from the cache.
|
|
if (mCacheEntry) {
|
|
MOZ_ASSERT(mURI, "Removing last observer without key uri.");
|
|
|
|
if (mLoader) {
|
|
mLoader->SetHasNoProxies(this, mCacheEntry);
|
|
}
|
|
} else {
|
|
LOG_MSG_WITH_PARAM(gImgLog, "imgRequest::RemoveProxy no cache entry",
|
|
"uri", mURI);
|
|
}
|
|
|
|
/* If |aStatus| is a failure code, then cancel the load if it is still in
|
|
progress. Otherwise, let the load continue, keeping 'this' in the cache
|
|
with no observers. This way, if a proxy is destroyed without calling
|
|
cancel on it, it won't leak and won't leave a bad pointer in the observer
|
|
list.
|
|
*/
|
|
if (!(progressTracker->GetProgress() & FLAG_LAST_PART_COMPLETE) &&
|
|
NS_FAILED(aStatus)) {
|
|
LOG_MSG(gImgLog, "imgRequest::RemoveProxy",
|
|
"load in progress. canceling");
|
|
|
|
this->Cancel(NS_BINDING_ABORTED);
|
|
}
|
|
|
|
/* break the cycle from the cache entry. */
|
|
mCacheEntry = nullptr;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
uint64_t imgRequest::InnerWindowID() const {
|
|
MutexAutoLock lock(mMutex);
|
|
return mInnerWindowId;
|
|
}
|
|
|
|
void imgRequest::SetInnerWindowID(uint64_t aInnerWindowId) {
|
|
MutexAutoLock lock(mMutex);
|
|
mInnerWindowId = aInnerWindowId;
|
|
}
|
|
|
|
void imgRequest::CancelAndAbort(nsresult aStatus) {
|
|
LOG_SCOPE(gImgLog, "imgRequest::CancelAndAbort");
|
|
|
|
Cancel(aStatus);
|
|
|
|
// It's possible for the channel to fail to open after we've set our
|
|
// notification callbacks. In that case, make sure to break the cycle between
|
|
// the channel and us, because it won't.
|
|
if (mChannel) {
|
|
mChannel->SetNotificationCallbacks(mPrevChannelSink);
|
|
mPrevChannelSink = nullptr;
|
|
}
|
|
}
|
|
|
|
class imgRequestMainThreadCancel : public Runnable {
|
|
public:
|
|
imgRequestMainThreadCancel(imgRequest* aImgRequest, nsresult aStatus)
|
|
: Runnable("imgRequestMainThreadCancel"),
|
|
mImgRequest(aImgRequest),
|
|
mStatus(aStatus) {
|
|
MOZ_ASSERT(!NS_IsMainThread(), "Create me off main thread only!");
|
|
MOZ_ASSERT(aImgRequest);
|
|
}
|
|
|
|
NS_IMETHOD Run() override {
|
|
MOZ_ASSERT(NS_IsMainThread(), "I should be running on the main thread!");
|
|
mImgRequest->ContinueCancel(mStatus);
|
|
return NS_OK;
|
|
}
|
|
|
|
private:
|
|
RefPtr<imgRequest> mImgRequest;
|
|
nsresult mStatus;
|
|
};
|
|
|
|
void imgRequest::Cancel(nsresult aStatus) {
|
|
/* The Cancel() method here should only be called by this class. */
|
|
LOG_SCOPE(gImgLog, "imgRequest::Cancel");
|
|
|
|
if (NS_IsMainThread()) {
|
|
ContinueCancel(aStatus);
|
|
} else {
|
|
nsCOMPtr<nsIEventTarget> eventTarget = GetMainThreadSerialEventTarget();
|
|
nsCOMPtr<nsIRunnable> ev = new imgRequestMainThreadCancel(this, aStatus);
|
|
eventTarget->Dispatch(ev.forget(), NS_DISPATCH_NORMAL);
|
|
}
|
|
}
|
|
|
|
void imgRequest::ContinueCancel(nsresult aStatus) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
|
|
progressTracker->SyncNotifyProgress(FLAG_HAS_ERROR);
|
|
|
|
RemoveFromCache();
|
|
|
|
if (mRequest && !(progressTracker->GetProgress() & FLAG_LAST_PART_COMPLETE)) {
|
|
mRequest->CancelWithReason(aStatus, "imgRequest::ContinueCancel"_ns);
|
|
}
|
|
}
|
|
|
|
class imgRequestMainThreadEvict : public Runnable {
|
|
public:
|
|
explicit imgRequestMainThreadEvict(imgRequest* aImgRequest)
|
|
: Runnable("imgRequestMainThreadEvict"), mImgRequest(aImgRequest) {
|
|
MOZ_ASSERT(!NS_IsMainThread(), "Create me off main thread only!");
|
|
MOZ_ASSERT(aImgRequest);
|
|
}
|
|
|
|
NS_IMETHOD Run() override {
|
|
MOZ_ASSERT(NS_IsMainThread(), "I should be running on the main thread!");
|
|
mImgRequest->ContinueEvict();
|
|
return NS_OK;
|
|
}
|
|
|
|
private:
|
|
RefPtr<imgRequest> mImgRequest;
|
|
};
|
|
|
|
// EvictFromCache() is written to allowed to get called from any thread
|
|
void imgRequest::EvictFromCache() {
|
|
/* The EvictFromCache() method here should only be called by this class. */
|
|
LOG_SCOPE(gImgLog, "imgRequest::EvictFromCache");
|
|
|
|
if (NS_IsMainThread()) {
|
|
ContinueEvict();
|
|
} else {
|
|
NS_DispatchToMainThread(new imgRequestMainThreadEvict(this));
|
|
}
|
|
}
|
|
|
|
// Helper-method used by EvictFromCache()
|
|
void imgRequest::ContinueEvict() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
RemoveFromCache();
|
|
}
|
|
|
|
void imgRequest::StartDecoding() {
|
|
MutexAutoLock lock(mMutex);
|
|
mDecodeRequested = true;
|
|
}
|
|
|
|
bool imgRequest::IsDecodeRequested() const {
|
|
MutexAutoLock lock(mMutex);
|
|
return mDecodeRequested;
|
|
}
|
|
|
|
nsresult imgRequest::GetURI(nsIURI** aURI) {
|
|
MOZ_ASSERT(aURI);
|
|
|
|
LOG_FUNC(gImgLog, "imgRequest::GetURI");
|
|
|
|
if (mURI) {
|
|
*aURI = mURI;
|
|
NS_ADDREF(*aURI);
|
|
return NS_OK;
|
|
}
|
|
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsresult imgRequest::GetFinalURI(nsIURI** aURI) {
|
|
MOZ_ASSERT(aURI);
|
|
|
|
LOG_FUNC(gImgLog, "imgRequest::GetFinalURI");
|
|
|
|
if (mFinalURI) {
|
|
*aURI = mFinalURI;
|
|
NS_ADDREF(*aURI);
|
|
return NS_OK;
|
|
}
|
|
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
bool imgRequest::IsChrome() const { return mURI->SchemeIs("chrome"); }
|
|
|
|
bool imgRequest::IsData() const { return mURI->SchemeIs("data"); }
|
|
|
|
nsresult imgRequest::GetImageErrorCode() { return mImageErrorCode; }
|
|
|
|
void imgRequest::RemoveFromCache() {
|
|
LOG_SCOPE(gImgLog, "imgRequest::RemoveFromCache");
|
|
|
|
bool isInCache = false;
|
|
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
isInCache = mIsInCache;
|
|
}
|
|
|
|
if (isInCache && mLoader) {
|
|
// mCacheEntry is nulled out when we have no more observers.
|
|
if (mCacheEntry) {
|
|
mLoader->RemoveFromCache(mCacheEntry);
|
|
} else {
|
|
mLoader->RemoveFromCache(mCacheKey);
|
|
}
|
|
}
|
|
|
|
mCacheEntry = nullptr;
|
|
}
|
|
|
|
bool imgRequest::HasConsumers() const {
|
|
RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
|
|
return progressTracker && progressTracker->ObserverCount() > 0;
|
|
}
|
|
|
|
already_AddRefed<image::Image> imgRequest::GetImage() const {
|
|
MutexAutoLock lock(mMutex);
|
|
RefPtr<image::Image> image = mImage;
|
|
return image.forget();
|
|
}
|
|
|
|
void imgRequest::GetFileName(nsACString& aFileName) {
|
|
nsAutoString fileName;
|
|
|
|
nsCOMPtr<nsISupportsCString> supportscstr;
|
|
if (NS_SUCCEEDED(mProperties->Get("content-disposition",
|
|
NS_GET_IID(nsISupportsCString),
|
|
getter_AddRefs(supportscstr))) &&
|
|
supportscstr) {
|
|
nsAutoCString cdHeader;
|
|
supportscstr->GetData(cdHeader);
|
|
NS_GetFilenameFromDisposition(fileName, cdHeader);
|
|
}
|
|
|
|
if (fileName.IsEmpty()) {
|
|
nsCOMPtr<nsIURL> imgUrl(do_QueryInterface(mURI));
|
|
if (imgUrl) {
|
|
imgUrl->GetFileName(aFileName);
|
|
NS_UnescapeURL(aFileName);
|
|
}
|
|
} else {
|
|
aFileName = NS_ConvertUTF16toUTF8(fileName);
|
|
}
|
|
}
|
|
|
|
int32_t imgRequest::Priority() const {
|
|
int32_t priority = nsISupportsPriority::PRIORITY_NORMAL;
|
|
nsCOMPtr<nsISupportsPriority> p = do_QueryInterface(mRequest);
|
|
if (p) {
|
|
p->GetPriority(&priority);
|
|
}
|
|
return priority;
|
|
}
|
|
|
|
void imgRequest::AdjustPriority(imgRequestProxy* proxy, int32_t delta) {
|
|
// only the first proxy is allowed to modify the priority of this image load.
|
|
//
|
|
// XXX(darin): this is probably not the most optimal algorithm as we may want
|
|
// to increase the priority of requests that have a lot of proxies. the key
|
|
// concern though is that image loads remain lower priority than other pieces
|
|
// of content such as link clicks, CSS, and JS.
|
|
//
|
|
if (!mFirstProxy || proxy != mFirstProxy) {
|
|
return;
|
|
}
|
|
|
|
AdjustPriorityInternal(delta);
|
|
}
|
|
|
|
void imgRequest::AdjustPriorityInternal(int32_t aDelta) {
|
|
nsCOMPtr<nsISupportsPriority> p = do_QueryInterface(mChannel);
|
|
if (p) {
|
|
p->AdjustPriority(aDelta);
|
|
}
|
|
}
|
|
|
|
void imgRequest::BoostPriority(uint32_t aCategory) {
|
|
if (!StaticPrefs::image_layout_network_priority()) {
|
|
return;
|
|
}
|
|
|
|
uint32_t newRequestedCategory =
|
|
(mBoostCategoriesRequested & aCategory) ^ aCategory;
|
|
if (!newRequestedCategory) {
|
|
// priority boost for each category can only apply once.
|
|
return;
|
|
}
|
|
|
|
MOZ_LOG(gImgLog, LogLevel::Debug,
|
|
("[this=%p] imgRequest::BoostPriority for category %x", this,
|
|
newRequestedCategory));
|
|
|
|
int32_t delta = 0;
|
|
|
|
if (newRequestedCategory & imgIRequest::CATEGORY_FRAME_INIT) {
|
|
--delta;
|
|
}
|
|
|
|
if (newRequestedCategory & imgIRequest::CATEGORY_FRAME_STYLE) {
|
|
--delta;
|
|
}
|
|
|
|
if (newRequestedCategory & imgIRequest::CATEGORY_SIZE_QUERY) {
|
|
--delta;
|
|
}
|
|
|
|
if (newRequestedCategory & imgIRequest::CATEGORY_DISPLAY) {
|
|
delta += nsISupportsPriority::PRIORITY_HIGH;
|
|
}
|
|
|
|
AdjustPriorityInternal(delta);
|
|
mBoostCategoriesRequested |= newRequestedCategory;
|
|
}
|
|
|
|
void imgRequest::SetIsInCache(bool aInCache) {
|
|
LOG_FUNC_WITH_PARAM(gImgLog, "imgRequest::SetIsCacheable", "aInCache",
|
|
aInCache);
|
|
MutexAutoLock lock(mMutex);
|
|
mIsInCache = aInCache;
|
|
}
|
|
|
|
void imgRequest::UpdateCacheEntrySize() {
|
|
if (!mCacheEntry) {
|
|
return;
|
|
}
|
|
|
|
RefPtr<Image> image = GetImage();
|
|
SizeOfState state(moz_malloc_size_of);
|
|
size_t size = image->SizeOfSourceWithComputedFallback(state);
|
|
mCacheEntry->SetDataSize(size);
|
|
}
|
|
|
|
void imgRequest::SetCacheValidation(imgCacheEntry* aCacheEntry,
|
|
nsIRequest* aRequest) {
|
|
/* get the expires info */
|
|
if (!aCacheEntry || aCacheEntry->GetExpiryTime() != 0) {
|
|
return;
|
|
}
|
|
|
|
RefPtr<imgRequest> req = aCacheEntry->GetRequest();
|
|
MOZ_ASSERT(req);
|
|
RefPtr<nsIURI> uri;
|
|
req->GetURI(getter_AddRefs(uri));
|
|
// TODO(emilio): Seems we should be able to assert `uri` is not null, but we
|
|
// get here in such cases sometimes (like for some redirects, see
|
|
// docshell/test/chrome/test_bug89419.xhtml).
|
|
//
|
|
// We have the original URI in the cache key though, probably we should be
|
|
// using that instead of relying on Init() getting called.
|
|
auto info = nsContentUtils::GetSubresourceCacheValidationInfo(aRequest, uri);
|
|
|
|
// Expiration time defaults to 0. We set the expiration time on our entry if
|
|
// it hasn't been set yet.
|
|
if (!info.mExpirationTime) {
|
|
// If the channel doesn't support caching, then ensure this expires the
|
|
// next time it is used.
|
|
info.mExpirationTime.emplace(nsContentUtils::SecondsFromPRTime(PR_Now()) -
|
|
1);
|
|
}
|
|
aCacheEntry->SetExpiryTime(*info.mExpirationTime);
|
|
// Cache entries default to not needing to validate. We ensure that
|
|
// multiple calls to this function don't override an earlier decision to
|
|
// validate by making validation a one-way decision.
|
|
if (info.mMustRevalidate) {
|
|
aCacheEntry->SetMustValidate(info.mMustRevalidate);
|
|
}
|
|
}
|
|
|
|
bool imgRequest::GetMultipart() const {
|
|
MutexAutoLock lock(mMutex);
|
|
return mIsMultiPartChannel;
|
|
}
|
|
|
|
bool imgRequest::HadInsecureRedirect() const {
|
|
MutexAutoLock lock(mMutex);
|
|
return mHadInsecureRedirect;
|
|
}
|
|
|
|
/** nsIRequestObserver methods **/
|
|
|
|
NS_IMETHODIMP
|
|
imgRequest::OnStartRequest(nsIRequest* aRequest) {
|
|
LOG_SCOPE(gImgLog, "imgRequest::OnStartRequest");
|
|
|
|
RefPtr<Image> image;
|
|
|
|
if (nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aRequest)) {
|
|
nsresult rv;
|
|
nsCOMPtr<nsILoadInfo> loadInfo = httpChannel->LoadInfo();
|
|
mIsDeniedCrossSiteCORSRequest =
|
|
loadInfo->GetTainting() == LoadTainting::CORS &&
|
|
(NS_FAILED(httpChannel->GetStatus(&rv)) || NS_FAILED(rv));
|
|
mIsCrossSiteNoCORSRequest = loadInfo->GetTainting() == LoadTainting::Opaque;
|
|
}
|
|
|
|
UpdateShouldReportRenderTimeForLCP();
|
|
// Figure out if we're multipart.
|
|
nsCOMPtr<nsIMultiPartChannel> multiPartChannel = do_QueryInterface(aRequest);
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
MOZ_ASSERT(multiPartChannel || !mIsMultiPartChannel,
|
|
"Stopped being multipart?");
|
|
|
|
mNewPartPending = true;
|
|
image = mImage;
|
|
mIsMultiPartChannel = bool(multiPartChannel);
|
|
}
|
|
|
|
// If we're not multipart, we shouldn't have an image yet.
|
|
if (image && !multiPartChannel) {
|
|
MOZ_ASSERT_UNREACHABLE("Already have an image for a non-multipart request");
|
|
Cancel(NS_IMAGELIB_ERROR_FAILURE);
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
/*
|
|
* If mRequest is null here, then we need to set it so that we'll be able to
|
|
* cancel it if our Cancel() method is called. Note that this can only
|
|
* happen for multipart channels. We could simply not null out mRequest for
|
|
* non-last parts, if GetIsLastPart() were reliable, but it's not. See
|
|
* https://bugzilla.mozilla.org/show_bug.cgi?id=339610
|
|
*/
|
|
if (!mRequest) {
|
|
MOZ_ASSERT(multiPartChannel, "Should have mRequest unless we're multipart");
|
|
nsCOMPtr<nsIChannel> baseChannel;
|
|
multiPartChannel->GetBaseChannel(getter_AddRefs(baseChannel));
|
|
mRequest = baseChannel;
|
|
}
|
|
|
|
nsCOMPtr<nsIChannel> channel(do_QueryInterface(aRequest));
|
|
if (channel) {
|
|
/* Get our principal */
|
|
nsCOMPtr<nsIScriptSecurityManager> secMan =
|
|
nsContentUtils::GetSecurityManager();
|
|
if (secMan) {
|
|
nsresult rv = secMan->GetChannelResultPrincipal(
|
|
channel, getter_AddRefs(mPrincipal));
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
}
|
|
}
|
|
|
|
SetCacheValidation(mCacheEntry, aRequest);
|
|
|
|
// Shouldn't we be dead already if this gets hit?
|
|
// Probably multipart/x-mixed-replace...
|
|
RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
|
|
if (progressTracker->ObserverCount() == 0) {
|
|
this->Cancel(NS_IMAGELIB_ERROR_FAILURE);
|
|
}
|
|
|
|
// Try to retarget OnDataAvailable to a decode thread. We must process data
|
|
// URIs synchronously as per the spec however.
|
|
if (!channel || IsData()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsCOMPtr<nsIThreadRetargetableRequest> retargetable =
|
|
do_QueryInterface(aRequest);
|
|
if (retargetable) {
|
|
nsAutoCString mimeType;
|
|
nsresult rv = channel->GetContentType(mimeType);
|
|
if (NS_SUCCEEDED(rv) && !mimeType.EqualsLiteral(IMAGE_SVG_XML)) {
|
|
// Retarget OnDataAvailable to the DecodePool's IO thread.
|
|
nsCOMPtr<nsISerialEventTarget> target =
|
|
DecodePool::Singleton()->GetIOEventTarget();
|
|
rv = retargetable->RetargetDeliveryTo(target);
|
|
}
|
|
MOZ_LOG(gImgLog, LogLevel::Warning,
|
|
("[this=%p] imgRequest::OnStartRequest -- "
|
|
"RetargetDeliveryTo rv %" PRIu32 "=%s\n",
|
|
this, static_cast<uint32_t>(rv),
|
|
NS_SUCCEEDED(rv) ? "succeeded" : "failed"));
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
imgRequest::OnStopRequest(nsIRequest* aRequest, nsresult status) {
|
|
LOG_FUNC(gImgLog, "imgRequest::OnStopRequest");
|
|
MOZ_ASSERT(NS_IsMainThread(), "Can't send notifications off-main-thread");
|
|
|
|
RefPtr<Image> image = GetImage();
|
|
|
|
RefPtr<imgRequest> strongThis = this;
|
|
|
|
bool isMultipart = false;
|
|
bool newPartPending = false;
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
isMultipart = mIsMultiPartChannel;
|
|
newPartPending = mNewPartPending;
|
|
}
|
|
if (isMultipart && newPartPending) {
|
|
OnDataAvailable(aRequest, nullptr, 0, 0);
|
|
}
|
|
|
|
// XXXldb What if this is a non-last part of a multipart request?
|
|
// xxx before we release our reference to mRequest, lets
|
|
// save the last status that we saw so that the
|
|
// imgRequestProxy will have access to it.
|
|
if (mRequest) {
|
|
mRequest = nullptr; // we no longer need the request
|
|
}
|
|
|
|
// stop holding a ref to the channel, since we don't need it anymore
|
|
if (mChannel) {
|
|
mChannel->SetNotificationCallbacks(mPrevChannelSink);
|
|
mPrevChannelSink = nullptr;
|
|
mChannel = nullptr;
|
|
}
|
|
|
|
bool lastPart = true;
|
|
nsCOMPtr<nsIMultiPartChannel> mpchan(do_QueryInterface(aRequest));
|
|
if (mpchan) {
|
|
mpchan->GetIsLastPart(&lastPart);
|
|
}
|
|
|
|
bool isPartial = false;
|
|
if (image && (status == NS_ERROR_NET_PARTIAL_TRANSFER)) {
|
|
isPartial = true;
|
|
status = NS_OK; // fake happy face
|
|
}
|
|
|
|
// Tell the image that it has all of the source data. Note that this can
|
|
// trigger a failure, since the image might be waiting for more non-optional
|
|
// data and this is the point where we break the news that it's not coming.
|
|
if (image) {
|
|
nsresult rv = image->OnImageDataComplete(aRequest, status, lastPart);
|
|
|
|
// If we got an error in the OnImageDataComplete() call, we don't want to
|
|
// proceed as if nothing bad happened. However, we also want to give
|
|
// precedence to failure status codes from necko, since presumably they're
|
|
// more meaningful.
|
|
if (NS_FAILED(rv) && NS_SUCCEEDED(status)) {
|
|
status = rv;
|
|
}
|
|
}
|
|
|
|
// If the request went through, update the cache entry size. Otherwise,
|
|
// cancel the request, which removes us from the cache.
|
|
if (image && NS_SUCCEEDED(status) && !isPartial) {
|
|
// We update the cache entry size here because this is where we finish
|
|
// loading compressed source data, which is part of our size calculus.
|
|
UpdateCacheEntrySize();
|
|
|
|
} else if (isPartial) {
|
|
// Remove the partial image from the cache.
|
|
this->EvictFromCache();
|
|
|
|
} else {
|
|
mImageErrorCode = status;
|
|
|
|
// if the error isn't "just" a partial transfer
|
|
// stops animations, removes from cache
|
|
this->Cancel(status);
|
|
}
|
|
|
|
if (!image) {
|
|
// We have to fire the OnStopRequest notifications ourselves because there's
|
|
// no image capable of doing so.
|
|
Progress progress =
|
|
LoadCompleteProgress(lastPart, /* aError = */ false, status);
|
|
|
|
RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
|
|
progressTracker->SyncNotifyProgress(progress);
|
|
}
|
|
|
|
mTimedChannel = nullptr;
|
|
return NS_OK;
|
|
}
|
|
|
|
struct mimetype_closure {
|
|
nsACString* newType;
|
|
};
|
|
|
|
/* prototype for these defined below */
|
|
static nsresult sniff_mimetype_callback(nsIInputStream* in, void* closure,
|
|
const char* fromRawSegment,
|
|
uint32_t toOffset, uint32_t count,
|
|
uint32_t* writeCount);
|
|
|
|
/** nsThreadRetargetableStreamListener methods **/
|
|
NS_IMETHODIMP
|
|
imgRequest::CheckListenerChain() {
|
|
// TODO Might need more checking here.
|
|
NS_ASSERTION(NS_IsMainThread(), "Should be on the main thread!");
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
imgRequest::OnDataFinished(nsresult) { return NS_OK; }
|
|
|
|
/** nsIStreamListener methods **/
|
|
|
|
struct NewPartResult final {
|
|
explicit NewPartResult(image::Image* aExistingImage)
|
|
: mImage(aExistingImage),
|
|
mIsFirstPart(!aExistingImage),
|
|
mSucceeded(false),
|
|
mShouldResetCacheEntry(false) {}
|
|
|
|
nsAutoCString mContentType;
|
|
nsAutoCString mContentDisposition;
|
|
RefPtr<image::Image> mImage;
|
|
const bool mIsFirstPart;
|
|
bool mSucceeded;
|
|
bool mShouldResetCacheEntry;
|
|
};
|
|
|
|
static NewPartResult PrepareForNewPart(nsIRequest* aRequest,
|
|
nsIInputStream* aInStr, uint32_t aCount,
|
|
nsIURI* aURI, bool aIsMultipart,
|
|
image::Image* aExistingImage,
|
|
ProgressTracker* aProgressTracker,
|
|
uint64_t aInnerWindowId) {
|
|
NewPartResult result(aExistingImage);
|
|
|
|
if (aInStr) {
|
|
mimetype_closure closure;
|
|
closure.newType = &result.mContentType;
|
|
|
|
// Look at the first few bytes and see if we can tell what the data is from
|
|
// that since servers tend to lie. :(
|
|
uint32_t out;
|
|
aInStr->ReadSegments(sniff_mimetype_callback, &closure, aCount, &out);
|
|
}
|
|
|
|
nsCOMPtr<nsIChannel> chan(do_QueryInterface(aRequest));
|
|
if (result.mContentType.IsEmpty()) {
|
|
nsresult rv =
|
|
chan ? chan->GetContentType(result.mContentType) : NS_ERROR_FAILURE;
|
|
if (NS_FAILED(rv)) {
|
|
MOZ_LOG(gImgLog, LogLevel::Error,
|
|
("imgRequest::PrepareForNewPart -- "
|
|
"Content type unavailable from the channel\n"));
|
|
if (!aIsMultipart) {
|
|
return result;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (chan) {
|
|
chan->GetContentDispositionHeader(result.mContentDisposition);
|
|
}
|
|
|
|
MOZ_LOG(gImgLog, LogLevel::Debug,
|
|
("imgRequest::PrepareForNewPart -- Got content type %s\n",
|
|
result.mContentType.get()));
|
|
|
|
// XXX If server lied about mimetype and it's SVG, we may need to copy
|
|
// the data and dispatch back to the main thread, AND tell the channel to
|
|
// dispatch there in the future.
|
|
|
|
// Create the new image and give it ownership of our ProgressTracker.
|
|
if (aIsMultipart) {
|
|
// Create the ProgressTracker and image for this part.
|
|
RefPtr<ProgressTracker> progressTracker = new ProgressTracker();
|
|
RefPtr<image::Image> partImage = image::ImageFactory::CreateImage(
|
|
aRequest, progressTracker, result.mContentType, aURI,
|
|
/* aIsMultipart = */ true, aInnerWindowId);
|
|
|
|
if (result.mIsFirstPart) {
|
|
// First part for a multipart channel. Create the MultipartImage wrapper.
|
|
MOZ_ASSERT(aProgressTracker, "Shouldn't have given away tracker yet");
|
|
aProgressTracker->SetIsMultipart();
|
|
result.mImage = image::ImageFactory::CreateMultipartImage(
|
|
partImage, aProgressTracker);
|
|
} else {
|
|
// Transition to the new part.
|
|
auto multipartImage = static_cast<MultipartImage*>(aExistingImage);
|
|
multipartImage->BeginTransitionToPart(partImage);
|
|
|
|
// Reset our cache entry size so it doesn't keep growing without bound.
|
|
result.mShouldResetCacheEntry = true;
|
|
}
|
|
} else {
|
|
MOZ_ASSERT(!aExistingImage, "New part for non-multipart channel?");
|
|
MOZ_ASSERT(aProgressTracker, "Shouldn't have given away tracker yet");
|
|
|
|
// Create an image using our progress tracker.
|
|
result.mImage = image::ImageFactory::CreateImage(
|
|
aRequest, aProgressTracker, result.mContentType, aURI,
|
|
/* aIsMultipart = */ false, aInnerWindowId);
|
|
}
|
|
|
|
MOZ_ASSERT(result.mImage);
|
|
if (!result.mImage->HasError() || aIsMultipart) {
|
|
// We allow multipart images to fail to initialize (which generally
|
|
// indicates a bad content type) without cancelling the load, because
|
|
// subsequent parts might be fine.
|
|
result.mSucceeded = true;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
class FinishPreparingForNewPartRunnable final : public Runnable {
|
|
public:
|
|
FinishPreparingForNewPartRunnable(imgRequest* aImgRequest,
|
|
NewPartResult&& aResult)
|
|
: Runnable("FinishPreparingForNewPartRunnable"),
|
|
mImgRequest(aImgRequest),
|
|
mResult(aResult) {
|
|
MOZ_ASSERT(aImgRequest);
|
|
}
|
|
|
|
NS_IMETHOD Run() override {
|
|
mImgRequest->FinishPreparingForNewPart(mResult);
|
|
return NS_OK;
|
|
}
|
|
|
|
private:
|
|
RefPtr<imgRequest> mImgRequest;
|
|
NewPartResult mResult;
|
|
};
|
|
|
|
void imgRequest::FinishPreparingForNewPart(const NewPartResult& aResult) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
mContentType = aResult.mContentType;
|
|
|
|
SetProperties(aResult.mContentType, aResult.mContentDisposition);
|
|
|
|
if (aResult.mIsFirstPart) {
|
|
// Notify listeners that we have an image.
|
|
mImageAvailable = true;
|
|
RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
|
|
progressTracker->OnImageAvailable();
|
|
MOZ_ASSERT(progressTracker->HasImage());
|
|
}
|
|
|
|
if (aResult.mShouldResetCacheEntry) {
|
|
ResetCacheEntry();
|
|
}
|
|
|
|
if (IsDecodeRequested()) {
|
|
aResult.mImage->StartDecoding(imgIContainer::FLAG_NONE);
|
|
}
|
|
}
|
|
|
|
bool imgRequest::ImageAvailable() const { return mImageAvailable; }
|
|
|
|
NS_IMETHODIMP
|
|
imgRequest::OnDataAvailable(nsIRequest* aRequest, nsIInputStream* aInStr,
|
|
uint64_t aOffset, uint32_t aCount) {
|
|
LOG_SCOPE_WITH_PARAM(gImgLog, "imgRequest::OnDataAvailable", "count", aCount);
|
|
|
|
NS_ASSERTION(aRequest, "imgRequest::OnDataAvailable -- no request!");
|
|
|
|
RefPtr<Image> image;
|
|
RefPtr<ProgressTracker> progressTracker;
|
|
bool isMultipart = false;
|
|
bool newPartPending = false;
|
|
uint64_t innerWindowId = 0;
|
|
|
|
// Retrieve and update our state.
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
image = mImage;
|
|
progressTracker = mProgressTracker;
|
|
isMultipart = mIsMultiPartChannel;
|
|
newPartPending = mNewPartPending;
|
|
mNewPartPending = false;
|
|
innerWindowId = mInnerWindowId;
|
|
}
|
|
|
|
// If this is a new part, we need to sniff its content type and create an
|
|
// appropriate image.
|
|
if (newPartPending) {
|
|
NewPartResult result =
|
|
PrepareForNewPart(aRequest, aInStr, aCount, mURI, isMultipart, image,
|
|
progressTracker, innerWindowId);
|
|
bool succeeded = result.mSucceeded;
|
|
|
|
if (result.mImage) {
|
|
image = result.mImage;
|
|
|
|
// Update our state to reflect this new part.
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
mImage = image;
|
|
|
|
mProgressTracker = nullptr;
|
|
}
|
|
|
|
// We only get an event target if we are not on the main thread, because
|
|
// we have to dispatch in that case.
|
|
nsCOMPtr<nsIEventTarget> eventTarget;
|
|
if (!NS_IsMainThread()) {
|
|
eventTarget = GetMainThreadSerialEventTarget();
|
|
MOZ_ASSERT(eventTarget);
|
|
}
|
|
|
|
// Some property objects are not threadsafe, and we need to send
|
|
// OnImageAvailable on the main thread, so finish on the main thread.
|
|
if (!eventTarget) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
FinishPreparingForNewPart(result);
|
|
} else {
|
|
nsCOMPtr<nsIRunnable> runnable =
|
|
new FinishPreparingForNewPartRunnable(this, std::move(result));
|
|
eventTarget->Dispatch(CreateRenderBlockingRunnable(runnable.forget()),
|
|
NS_DISPATCH_NORMAL);
|
|
}
|
|
}
|
|
|
|
if (!succeeded) {
|
|
// Something went wrong; probably a content type issue.
|
|
Cancel(NS_IMAGELIB_ERROR_FAILURE);
|
|
return NS_BINDING_ABORTED;
|
|
}
|
|
}
|
|
|
|
// Notify the image that it has new data.
|
|
if (aInStr) {
|
|
nsresult rv =
|
|
image->OnImageDataAvailable(aRequest, aInStr, aOffset, aCount);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
MOZ_LOG(gImgLog, LogLevel::Warning,
|
|
("[this=%p] imgRequest::OnDataAvailable -- "
|
|
"copy to RasterImage failed\n",
|
|
this));
|
|
Cancel(NS_IMAGELIB_ERROR_FAILURE);
|
|
return NS_BINDING_ABORTED;
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void imgRequest::SetProperties(const nsACString& aContentType,
|
|
const nsACString& aContentDisposition) {
|
|
/* set our mimetype as a property */
|
|
nsCOMPtr<nsISupportsCString> contentType =
|
|
do_CreateInstance("@mozilla.org/supports-cstring;1");
|
|
if (contentType) {
|
|
contentType->SetData(aContentType);
|
|
mProperties->Set("type", contentType);
|
|
}
|
|
|
|
/* set our content disposition as a property */
|
|
if (!aContentDisposition.IsEmpty()) {
|
|
nsCOMPtr<nsISupportsCString> contentDisposition =
|
|
do_CreateInstance("@mozilla.org/supports-cstring;1");
|
|
if (contentDisposition) {
|
|
contentDisposition->SetData(aContentDisposition);
|
|
mProperties->Set("content-disposition", contentDisposition);
|
|
}
|
|
}
|
|
}
|
|
|
|
static nsresult sniff_mimetype_callback(nsIInputStream* in, void* data,
|
|
const char* fromRawSegment,
|
|
uint32_t toOffset, uint32_t count,
|
|
uint32_t* writeCount) {
|
|
mimetype_closure* closure = static_cast<mimetype_closure*>(data);
|
|
|
|
NS_ASSERTION(closure, "closure is null!");
|
|
|
|
if (count > 0) {
|
|
imgLoader::GetMimeTypeFromContent(fromRawSegment, count, *closure->newType);
|
|
}
|
|
|
|
*writeCount = 0;
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
/** nsIInterfaceRequestor methods **/
|
|
|
|
NS_IMETHODIMP
|
|
imgRequest::GetInterface(const nsIID& aIID, void** aResult) {
|
|
if (!mPrevChannelSink || aIID.Equals(NS_GET_IID(nsIChannelEventSink))) {
|
|
return QueryInterface(aIID, aResult);
|
|
}
|
|
|
|
NS_ASSERTION(
|
|
mPrevChannelSink != this,
|
|
"Infinite recursion - don't keep track of channel sinks that are us!");
|
|
return mPrevChannelSink->GetInterface(aIID, aResult);
|
|
}
|
|
|
|
/** nsIChannelEventSink methods **/
|
|
NS_IMETHODIMP
|
|
imgRequest::AsyncOnChannelRedirect(nsIChannel* oldChannel,
|
|
nsIChannel* newChannel, uint32_t flags,
|
|
nsIAsyncVerifyRedirectCallback* callback) {
|
|
NS_ASSERTION(mRequest && mChannel,
|
|
"Got a channel redirect after we nulled out mRequest!");
|
|
NS_ASSERTION(mChannel == oldChannel,
|
|
"Got a channel redirect for an unknown channel!");
|
|
NS_ASSERTION(newChannel, "Got a redirect to a NULL channel!");
|
|
|
|
SetCacheValidation(mCacheEntry, oldChannel);
|
|
|
|
// Prepare for callback
|
|
mRedirectCallback = callback;
|
|
mNewRedirectChannel = newChannel;
|
|
|
|
nsCOMPtr<nsIChannelEventSink> sink(do_GetInterface(mPrevChannelSink));
|
|
if (sink) {
|
|
nsresult rv =
|
|
sink->AsyncOnChannelRedirect(oldChannel, newChannel, flags, this);
|
|
if (NS_FAILED(rv)) {
|
|
mRedirectCallback = nullptr;
|
|
mNewRedirectChannel = nullptr;
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
(void)OnRedirectVerifyCallback(NS_OK);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
imgRequest::OnRedirectVerifyCallback(nsresult result) {
|
|
NS_ASSERTION(mRedirectCallback, "mRedirectCallback not set in callback");
|
|
NS_ASSERTION(mNewRedirectChannel, "mNewRedirectChannel not set in callback");
|
|
|
|
if (NS_FAILED(result)) {
|
|
mRedirectCallback->OnRedirectVerifyCallback(result);
|
|
mRedirectCallback = nullptr;
|
|
mNewRedirectChannel = nullptr;
|
|
return NS_OK;
|
|
}
|
|
|
|
mChannel = mNewRedirectChannel;
|
|
mTimedChannel = do_QueryInterface(mChannel);
|
|
mNewRedirectChannel = nullptr;
|
|
|
|
if (LOG_TEST(LogLevel::Debug)) {
|
|
LOG_MSG_WITH_PARAM(gImgLog, "imgRequest::OnChannelRedirect", "old",
|
|
mFinalURI ? mFinalURI->GetSpecOrDefault().get() : "");
|
|
}
|
|
|
|
// If the previous URI is a non-HTTPS URI, record that fact for later use by
|
|
// security code, which needs to know whether there is an insecure load at any
|
|
// point in the redirect chain.
|
|
bool schemeLocal = false;
|
|
if (NS_FAILED(NS_URIChainHasFlags(mFinalURI,
|
|
nsIProtocolHandler::URI_IS_LOCAL_RESOURCE,
|
|
&schemeLocal)) ||
|
|
(!mFinalURI->SchemeIs("https") && !mFinalURI->SchemeIs("chrome") &&
|
|
!schemeLocal)) {
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
// The csp directive upgrade-insecure-requests performs an internal redirect
|
|
// to upgrade all requests from http to https before any data is fetched
|
|
// from the network. Do not pollute mHadInsecureRedirect in case of such an
|
|
// internal redirect.
|
|
nsCOMPtr<nsILoadInfo> loadInfo = mChannel->LoadInfo();
|
|
bool upgradeInsecureRequests =
|
|
loadInfo ? loadInfo->GetUpgradeInsecureRequests() ||
|
|
loadInfo->GetBrowserUpgradeInsecureRequests()
|
|
: false;
|
|
if (!upgradeInsecureRequests) {
|
|
mHadInsecureRedirect = true;
|
|
}
|
|
}
|
|
|
|
// Update the final URI.
|
|
mChannel->GetURI(getter_AddRefs(mFinalURI));
|
|
|
|
if (LOG_TEST(LogLevel::Debug)) {
|
|
LOG_MSG_WITH_PARAM(gImgLog, "imgRequest::OnChannelRedirect", "new",
|
|
mFinalURI ? mFinalURI->GetSpecOrDefault().get() : "");
|
|
}
|
|
|
|
// Make sure we have a protocol that returns data rather than opens an
|
|
// external application, e.g. 'mailto:'.
|
|
if (nsContentUtils::IsExternalProtocol(mFinalURI)) {
|
|
mRedirectCallback->OnRedirectVerifyCallback(NS_ERROR_ABORT);
|
|
mRedirectCallback = nullptr;
|
|
return NS_OK;
|
|
}
|
|
|
|
mRedirectCallback->OnRedirectVerifyCallback(NS_OK);
|
|
mRedirectCallback = nullptr;
|
|
return NS_OK;
|
|
}
|
|
|
|
void imgRequest::UpdateShouldReportRenderTimeForLCP() {
|
|
if (mTimedChannel) {
|
|
bool allRedirectPassTAO = false;
|
|
mTimedChannel->GetAllRedirectsPassTimingAllowCheck(&allRedirectPassTAO);
|
|
mShouldReportRenderTimeForLCP =
|
|
mTimedChannel->TimingAllowCheck(mTriggeringPrincipal) &&
|
|
allRedirectPassTAO;
|
|
}
|
|
}
|