mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-02 07:05:24 +00:00
b53e5f1ae8
--HG-- extra : transplant_source : p%1Cr%13%ED%F8%B1%B8D%9B%DC5%C6%EFEQD%CC%A2l
870 lines
27 KiB
C++
870 lines
27 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "mozilla/dom/FetchDriver.h"
|
|
|
|
#include "nsIInputStream.h"
|
|
#include "nsIOutputStream.h"
|
|
#include "nsIHttpChannel.h"
|
|
#include "nsIHttpChannelInternal.h"
|
|
#include "nsIHttpHeaderVisitor.h"
|
|
#include "nsIScriptSecurityManager.h"
|
|
#include "nsIThreadRetargetableRequest.h"
|
|
#include "nsIUploadChannel2.h"
|
|
|
|
#include "nsContentPolicyUtils.h"
|
|
#include "nsCORSListenerProxy.h"
|
|
#include "nsDataHandler.h"
|
|
#include "nsHostObjectProtocolHandler.h"
|
|
#include "nsNetUtil.h"
|
|
#include "nsStreamUtils.h"
|
|
#include "nsStringStream.h"
|
|
|
|
#include "mozilla/dom/File.h"
|
|
#include "mozilla/dom/workers/Workers.h"
|
|
|
|
#include "Fetch.h"
|
|
#include "InternalRequest.h"
|
|
#include "InternalResponse.h"
|
|
|
|
namespace mozilla {
|
|
namespace dom {
|
|
|
|
NS_IMPL_ISUPPORTS(FetchDriver,
|
|
nsIStreamListener, nsIChannelEventSink, nsIInterfaceRequestor,
|
|
nsIAsyncVerifyRedirectCallback)
|
|
|
|
FetchDriver::FetchDriver(InternalRequest* aRequest, nsIPrincipal* aPrincipal,
|
|
nsILoadGroup* aLoadGroup)
|
|
: mPrincipal(aPrincipal)
|
|
, mLoadGroup(aLoadGroup)
|
|
, mRequest(aRequest)
|
|
, mFetchRecursionCount(0)
|
|
, mReferrerPolicy(net::RP_Default)
|
|
, mResponseAvailableCalled(false)
|
|
{
|
|
}
|
|
|
|
FetchDriver::~FetchDriver()
|
|
{
|
|
// We assert this since even on failures, we should call
|
|
// FailWithNetworkError().
|
|
MOZ_ASSERT(mResponseAvailableCalled);
|
|
}
|
|
|
|
nsresult
|
|
FetchDriver::Fetch(FetchDriverObserver* aObserver)
|
|
{
|
|
workers::AssertIsOnMainThread();
|
|
mObserver = aObserver;
|
|
|
|
return Fetch(false /* CORS flag */);
|
|
}
|
|
|
|
nsresult
|
|
FetchDriver::Fetch(bool aCORSFlag)
|
|
{
|
|
// We do not currently implement parts of the spec that lead to recursion.
|
|
MOZ_ASSERT(mFetchRecursionCount == 0);
|
|
mFetchRecursionCount++;
|
|
|
|
// FIXME(nsm): Deal with HSTS.
|
|
|
|
if (!mRequest->IsSynchronous() && mFetchRecursionCount <= 1) {
|
|
nsCOMPtr<nsIRunnable> r =
|
|
NS_NewRunnableMethodWithArg<bool>(this, &FetchDriver::ContinueFetch, aCORSFlag);
|
|
nsresult rv = NS_DispatchToCurrentThread(r);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
MOZ_CRASH("Synchronous fetch not supported");
|
|
}
|
|
|
|
nsresult
|
|
FetchDriver::ContinueFetch(bool aCORSFlag)
|
|
{
|
|
workers::AssertIsOnMainThread();
|
|
|
|
nsAutoCString url;
|
|
mRequest->GetURL(url);
|
|
nsCOMPtr<nsIURI> requestURI;
|
|
nsresult rv = NS_NewURI(getter_AddRefs(requestURI), url,
|
|
nullptr, nullptr);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
// Begin Step 4 of the Fetch algorithm
|
|
// https://fetch.spec.whatwg.org/#fetching
|
|
|
|
// FIXME(nsm): Bug 1039846: Add CSP checks
|
|
|
|
nsAutoCString scheme;
|
|
rv = requestURI->GetScheme(scheme);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
rv = mPrincipal->CheckMayLoad(requestURI, false /* report */, false /* allowIfInheritsPrincipal */);
|
|
if ((!aCORSFlag && NS_SUCCEEDED(rv)) ||
|
|
(scheme.EqualsLiteral("data") && mRequest->SameOriginDataURL()) ||
|
|
scheme.EqualsLiteral("about")) {
|
|
return BasicFetch();
|
|
}
|
|
|
|
if (mRequest->Mode() == RequestMode::Same_origin) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
if (mRequest->Mode() == RequestMode::No_cors) {
|
|
mRequest->SetResponseTainting(InternalRequest::RESPONSETAINT_OPAQUE);
|
|
return BasicFetch();
|
|
}
|
|
|
|
if (!scheme.EqualsLiteral("http") && !scheme.EqualsLiteral("https")) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
bool corsPreflight = false;
|
|
if (mRequest->Mode() == RequestMode::Cors_with_forced_preflight ||
|
|
(mRequest->UnsafeRequest() && (!mRequest->HasSimpleMethod() || !mRequest->Headers()->HasOnlySimpleHeaders()))) {
|
|
corsPreflight = true;
|
|
}
|
|
|
|
mRequest->SetResponseTainting(InternalRequest::RESPONSETAINT_CORS);
|
|
return HttpFetch(true /* aCORSFlag */, corsPreflight);
|
|
}
|
|
|
|
nsresult
|
|
FetchDriver::BasicFetch()
|
|
{
|
|
nsAutoCString url;
|
|
mRequest->GetURL(url);
|
|
nsCOMPtr<nsIURI> uri;
|
|
nsresult rv = NS_NewURI(getter_AddRefs(uri),
|
|
url,
|
|
nullptr,
|
|
nullptr);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
nsAutoCString scheme;
|
|
rv = uri->GetScheme(scheme);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
if (scheme.LowerCaseEqualsLiteral("about")) {
|
|
if (url.EqualsLiteral("about:blank")) {
|
|
nsRefPtr<InternalResponse> response =
|
|
new InternalResponse(200, NS_LITERAL_CSTRING("OK"));
|
|
ErrorResult result;
|
|
response->Headers()->Append(NS_LITERAL_CSTRING("content-type"),
|
|
NS_LITERAL_CSTRING("text/html;charset=utf-8"),
|
|
result);
|
|
MOZ_ASSERT(!result.Failed());
|
|
nsCOMPtr<nsIInputStream> body;
|
|
rv = NS_NewCStringInputStream(getter_AddRefs(body), EmptyCString());
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
response->SetBody(body);
|
|
BeginResponse(response);
|
|
return SucceedWithResponse();
|
|
}
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
if (scheme.LowerCaseEqualsLiteral("blob")) {
|
|
nsRefPtr<FileImpl> blobImpl;
|
|
rv = NS_GetBlobForBlobURI(uri, getter_AddRefs(blobImpl));
|
|
FileImpl* blob = static_cast<FileImpl*>(blobImpl.get());
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
nsRefPtr<InternalResponse> response = new InternalResponse(200, NS_LITERAL_CSTRING("OK"));
|
|
{
|
|
ErrorResult result;
|
|
uint64_t size = blob->GetSize(result);
|
|
if (NS_WARN_IF(result.Failed())) {
|
|
FailWithNetworkError();
|
|
return result.ErrorCode();
|
|
}
|
|
|
|
nsAutoString sizeStr;
|
|
sizeStr.AppendInt(size);
|
|
response->Headers()->Append(NS_LITERAL_CSTRING("Content-Length"), NS_ConvertUTF16toUTF8(sizeStr), result);
|
|
if (NS_WARN_IF(result.Failed())) {
|
|
FailWithNetworkError();
|
|
return result.ErrorCode();
|
|
}
|
|
|
|
nsAutoString type;
|
|
blob->GetType(type);
|
|
response->Headers()->Append(NS_LITERAL_CSTRING("Content-Type"), NS_ConvertUTF16toUTF8(type), result);
|
|
if (NS_WARN_IF(result.Failed())) {
|
|
FailWithNetworkError();
|
|
return result.ErrorCode();
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsIInputStream> stream;
|
|
rv = blob->GetInternalStream(getter_AddRefs(stream));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
response->SetBody(stream);
|
|
BeginResponse(response);
|
|
return SucceedWithResponse();
|
|
}
|
|
|
|
if (scheme.LowerCaseEqualsLiteral("data")) {
|
|
nsAutoCString method;
|
|
mRequest->GetMethod(method);
|
|
if (method.LowerCaseEqualsASCII("get")) {
|
|
// Use nsDataHandler directly so that we can extract the content type.
|
|
// XXX(nsm): Is there a way to acquire the charset without such tight
|
|
// coupling with the DataHandler? nsIProtocolHandler does not provide
|
|
// anything similar.
|
|
nsAutoCString contentType, contentCharset, dataBuffer, hashRef;
|
|
bool isBase64;
|
|
rv = nsDataHandler::ParseURI(url,
|
|
contentType,
|
|
contentCharset,
|
|
isBase64,
|
|
dataBuffer,
|
|
hashRef);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
ErrorResult result;
|
|
nsRefPtr<InternalResponse> response = new InternalResponse(200, NS_LITERAL_CSTRING("OK"));
|
|
if (!contentCharset.IsEmpty()) {
|
|
contentType.Append(";charset=");
|
|
contentType.Append(contentCharset);
|
|
}
|
|
|
|
response->Headers()->Append(NS_LITERAL_CSTRING("Content-Type"), contentType, result);
|
|
if (!result.Failed()) {
|
|
nsCOMPtr<nsIInputStream> stream;
|
|
rv = NS_NewCStringInputStream(getter_AddRefs(stream), dataBuffer);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
response->SetBody(stream);
|
|
BeginResponse(response);
|
|
return SucceedWithResponse();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
if (scheme.LowerCaseEqualsLiteral("file")) {
|
|
} else if (scheme.LowerCaseEqualsLiteral("http") ||
|
|
scheme.LowerCaseEqualsLiteral("https")) {
|
|
return HttpFetch();
|
|
}
|
|
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
// This function implements the "HTTP Fetch" algorithm from the Fetch spec.
|
|
// Functionality is often split between here, the CORS listener proxy and the
|
|
// Necko HTTP implementation.
|
|
nsresult
|
|
FetchDriver::HttpFetch(bool aCORSFlag, bool aCORSPreflightFlag, bool aAuthenticationFlag)
|
|
{
|
|
// Step 1. "Let response be null."
|
|
mResponse = nullptr;
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIIOService> ios = do_GetIOService(&rv);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
nsAutoCString url;
|
|
mRequest->GetURL(url);
|
|
nsCOMPtr<nsIURI> uri;
|
|
rv = NS_NewURI(getter_AddRefs(uri),
|
|
url,
|
|
nullptr,
|
|
nullptr,
|
|
ios);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
// Step 2 deals with letting ServiceWorkers intercept requests. This is
|
|
// handled by Necko after the channel is opened.
|
|
// FIXME(nsm): Bug 1119026: The channel's skip service worker flag should be
|
|
// set based on the Request's flag.
|
|
|
|
// Step 3.1 "If the CORS preflight flag is set and one of these conditions is
|
|
// true..." is handled by the CORS proxy.
|
|
//
|
|
// Step 3.2 "Set request's skip service worker flag." This isn't required
|
|
// since Necko will fall back to the network if the ServiceWorker does not
|
|
// respond with a valid Response.
|
|
//
|
|
// NS_StartCORSPreflight() will automatically kick off the original request
|
|
// if it succeeds, so we need to have everything setup for the original
|
|
// request too.
|
|
|
|
// Step 3.3 "Let credentials flag be set if either request's credentials mode
|
|
// is include, or request's credentials mode is same-origin and the CORS flag
|
|
// is unset, and unset otherwise."
|
|
bool useCredentials = false;
|
|
if (mRequest->GetCredentialsMode() == RequestCredentials::Include ||
|
|
(mRequest->GetCredentialsMode() == RequestCredentials::Same_origin && !aCORSFlag)) {
|
|
useCredentials = true;
|
|
}
|
|
|
|
// This is effectivetly the opposite of the use credentials flag in "HTTP
|
|
// network or cache fetch" in the spec and decides whether to transmit
|
|
// cookies and other identifying information. LOAD_ANONYMOUS also prevents
|
|
// new cookies sent by the server from being stored.
|
|
const nsLoadFlags credentialsFlag = useCredentials ? 0 : nsIRequest::LOAD_ANONYMOUS;
|
|
|
|
// From here on we create a channel and set its properties with the
|
|
// information from the InternalRequest. This is an implementation detail.
|
|
MOZ_ASSERT(mLoadGroup);
|
|
nsCOMPtr<nsIChannel> chan;
|
|
rv = NS_NewChannel(getter_AddRefs(chan),
|
|
uri,
|
|
mPrincipal,
|
|
nsILoadInfo::SEC_NORMAL,
|
|
mRequest->ContentPolicyType(),
|
|
mLoadGroup,
|
|
nullptr, /* aCallbacks */
|
|
nsIRequest::LOAD_NORMAL | credentialsFlag,
|
|
ios);
|
|
mLoadGroup = nullptr;
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
// Insert ourselves into the notification callbacks chain so we can handle
|
|
// cross-origin redirects.
|
|
chan->GetNotificationCallbacks(getter_AddRefs(mNotificationCallbacks));
|
|
chan->SetNotificationCallbacks(this);
|
|
|
|
// FIXME(nsm): Bug 1120715.
|
|
// Step 3.4 "If request's cache mode is default and request's header list
|
|
// contains a header named `If-Modified-Since`, `If-None-Match`,
|
|
// `If-Unmodified-Since`, `If-Match`, or `If-Range`, set request's cache mode
|
|
// to no-store."
|
|
|
|
// Step 3.5 begins "HTTP network or cache fetch".
|
|
// HTTP network or cache fetch
|
|
// ---------------------------
|
|
// Step 1 "Let HTTPRequest..." The channel is the HTTPRequest.
|
|
nsCOMPtr<nsIHttpChannel> httpChan = do_QueryInterface(chan);
|
|
if (httpChan) {
|
|
// Copy the method.
|
|
nsAutoCString method;
|
|
mRequest->GetMethod(method);
|
|
rv = httpChan->SetRequestMethod(method);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
// Set the same headers.
|
|
nsAutoTArray<InternalHeaders::Entry, 5> headers;
|
|
mRequest->Headers()->GetEntries(headers);
|
|
for (uint32_t i = 0; i < headers.Length(); ++i) {
|
|
httpChan->SetRequestHeader(headers[i].mName, headers[i].mValue, false /* merge */);
|
|
}
|
|
|
|
// Step 2. Set the referrer.
|
|
nsAutoString referrer;
|
|
mRequest->GetReferrer(referrer);
|
|
// The referrer should have already been resolved to a URL by the caller.
|
|
MOZ_ASSERT(!referrer.EqualsLiteral(kFETCH_CLIENT_REFERRER_STR));
|
|
if (!referrer.IsEmpty()) {
|
|
nsCOMPtr<nsIURI> refURI;
|
|
rv = NS_NewURI(getter_AddRefs(refURI), referrer, nullptr, nullptr);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
rv = httpChan->SetReferrerWithPolicy(refURI, mReferrerPolicy);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
}
|
|
|
|
// Step 3 "If HTTPRequest's force Origin header flag is set..."
|
|
if (mRequest->ForceOriginHeader()) {
|
|
nsAutoString origin;
|
|
rv = nsContentUtils::GetUTFOrigin(mPrincipal, origin);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
httpChan->SetRequestHeader(NS_LITERAL_CSTRING("origin"),
|
|
NS_ConvertUTF16toUTF8(origin),
|
|
false /* merge */);
|
|
}
|
|
// Bug 1120722 - Authorization will be handled later.
|
|
// Auth may require prompting, we don't support it yet.
|
|
// The next patch in this same bug prevents this from aborting the request.
|
|
// Credentials checks for CORS are handled by nsCORSListenerProxy,
|
|
}
|
|
|
|
// Step 5. Proxy authentication will be handled by Necko.
|
|
// FIXME(nsm): Bug 1120715.
|
|
// Step 7-10. "If request's cache mode is neither no-store nor reload..."
|
|
|
|
// Continue setting up 'HTTPRequest'. Content-Type and body data.
|
|
nsCOMPtr<nsIUploadChannel2> uploadChan = do_QueryInterface(chan);
|
|
if (uploadChan) {
|
|
nsAutoCString contentType;
|
|
ErrorResult result;
|
|
mRequest->Headers()->Get(NS_LITERAL_CSTRING("content-type"), contentType, result);
|
|
// This is an error because the Request constructor explicitly extracts and
|
|
// sets a content-type per spec.
|
|
if (result.Failed()) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
nsCOMPtr<nsIInputStream> bodyStream;
|
|
mRequest->GetBody(getter_AddRefs(bodyStream));
|
|
if (bodyStream) {
|
|
nsAutoCString method;
|
|
mRequest->GetMethod(method);
|
|
rv = uploadChan->ExplicitSetUploadStream(bodyStream, contentType, -1, method, false /* aStreamHasHeaders */);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
}
|
|
}
|
|
|
|
// Set skip serviceworker flag.
|
|
// While the spec also gates on the client being a ServiceWorker, we can't
|
|
// infer that here. Instead we rely on callers to set the flag correctly.
|
|
if (mRequest->SkipServiceWorker()) {
|
|
nsCOMPtr<nsIHttpChannelInternal> internalChan = do_QueryInterface(httpChan);
|
|
internalChan->ForceNoIntercept();
|
|
}
|
|
|
|
// Set up a CORS proxy that will handle the various requirements of the CORS
|
|
// protocol. It handles the preflight cache and CORS response headers.
|
|
// If the request is allowed, it will start our original request
|
|
// and our observer will be notified. On failure, our observer is notified
|
|
// directly.
|
|
nsRefPtr<nsCORSListenerProxy> corsListener =
|
|
new nsCORSListenerProxy(this, mPrincipal, useCredentials);
|
|
rv = corsListener->Init(chan, true /* allow data uri */);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
// If preflight is required, start a "CORS preflight fetch"
|
|
// https://fetch.spec.whatwg.org/#cors-preflight-fetch-0. All the
|
|
// implementation is handled by NS_StartCORSPreflight, we just set up the
|
|
// unsafeHeaders so they can be verified against the response's
|
|
// "Access-Control-Allow-Headers" header.
|
|
if (aCORSPreflightFlag) {
|
|
nsCOMPtr<nsIChannel> preflightChannel;
|
|
nsAutoTArray<nsCString, 5> unsafeHeaders;
|
|
mRequest->Headers()->GetUnsafeHeaders(unsafeHeaders);
|
|
|
|
rv = NS_StartCORSPreflight(chan, corsListener, mPrincipal,
|
|
useCredentials,
|
|
unsafeHeaders,
|
|
getter_AddRefs(preflightChannel));
|
|
} else {
|
|
rv = chan->AsyncOpen(corsListener, nullptr);
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return FailWithNetworkError();
|
|
}
|
|
|
|
// Step 4 onwards of "HTTP Fetch" is handled internally by Necko.
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
FetchDriver::ContinueHttpFetchAfterNetworkFetch()
|
|
{
|
|
workers::AssertIsOnMainThread();
|
|
MOZ_ASSERT(mResponse);
|
|
MOZ_ASSERT(!mResponse->IsError());
|
|
|
|
return SucceedWithResponse();
|
|
}
|
|
|
|
already_AddRefed<InternalResponse>
|
|
FetchDriver::BeginAndGetFilteredResponse(InternalResponse* aResponse)
|
|
{
|
|
MOZ_ASSERT(aResponse);
|
|
nsAutoCString reqURL;
|
|
mRequest->GetURL(reqURL);
|
|
aResponse->SetUrl(reqURL);
|
|
|
|
// FIXME(nsm): Handle mixed content check, step 7 of fetch.
|
|
|
|
nsRefPtr<InternalResponse> filteredResponse;
|
|
switch (mRequest->GetResponseTainting()) {
|
|
case InternalRequest::RESPONSETAINT_BASIC:
|
|
filteredResponse = InternalResponse::BasicResponse(aResponse);
|
|
break;
|
|
case InternalRequest::RESPONSETAINT_CORS:
|
|
filteredResponse = InternalResponse::CORSResponse(aResponse);
|
|
break;
|
|
case InternalRequest::RESPONSETAINT_OPAQUE:
|
|
filteredResponse = InternalResponse::OpaqueResponse();
|
|
break;
|
|
default:
|
|
MOZ_CRASH("Unexpected case");
|
|
}
|
|
|
|
MOZ_ASSERT(filteredResponse);
|
|
MOZ_ASSERT(mObserver);
|
|
mObserver->OnResponseAvailable(filteredResponse);
|
|
mResponseAvailableCalled = true;
|
|
return filteredResponse.forget();
|
|
}
|
|
|
|
void
|
|
FetchDriver::BeginResponse(InternalResponse* aResponse)
|
|
{
|
|
nsRefPtr<InternalResponse> r = BeginAndGetFilteredResponse(aResponse);
|
|
// Release the ref.
|
|
}
|
|
|
|
nsresult
|
|
FetchDriver::SucceedWithResponse()
|
|
{
|
|
workers::AssertIsOnMainThread();
|
|
if (mObserver) {
|
|
mObserver->OnResponseEnd();
|
|
mObserver = nullptr;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
FetchDriver::FailWithNetworkError()
|
|
{
|
|
workers::AssertIsOnMainThread();
|
|
nsRefPtr<InternalResponse> error = InternalResponse::NetworkError();
|
|
if (mObserver) {
|
|
mObserver->OnResponseAvailable(error);
|
|
mResponseAvailableCalled = true;
|
|
mObserver->OnResponseEnd();
|
|
mObserver = nullptr;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
namespace {
|
|
class FillResponseHeaders MOZ_FINAL : public nsIHttpHeaderVisitor {
|
|
InternalResponse* mResponse;
|
|
|
|
~FillResponseHeaders()
|
|
{ }
|
|
public:
|
|
NS_DECL_ISUPPORTS
|
|
|
|
explicit FillResponseHeaders(InternalResponse* aResponse)
|
|
: mResponse(aResponse)
|
|
{
|
|
}
|
|
|
|
NS_IMETHOD
|
|
VisitHeader(const nsACString & aHeader, const nsACString & aValue) MOZ_OVERRIDE
|
|
{
|
|
ErrorResult result;
|
|
mResponse->Headers()->Append(aHeader, aValue, result);
|
|
return result.ErrorCode();
|
|
}
|
|
};
|
|
|
|
NS_IMPL_ISUPPORTS(FillResponseHeaders, nsIHttpHeaderVisitor)
|
|
} // anonymous namespace
|
|
|
|
NS_IMETHODIMP
|
|
FetchDriver::OnStartRequest(nsIRequest* aRequest,
|
|
nsISupports* aContext)
|
|
{
|
|
workers::AssertIsOnMainThread();
|
|
MOZ_ASSERT(!mPipeOutputStream);
|
|
MOZ_ASSERT(mObserver);
|
|
nsresult rv;
|
|
aRequest->GetStatus(&rv);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
nsCOMPtr<nsIHttpChannel> channel = do_QueryInterface(aRequest);
|
|
// For now we only support HTTP.
|
|
MOZ_ASSERT(channel);
|
|
|
|
aRequest->GetStatus(&rv);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
return rv;
|
|
}
|
|
|
|
uint32_t responseStatus;
|
|
channel->GetResponseStatus(&responseStatus);
|
|
|
|
nsAutoCString statusText;
|
|
channel->GetResponseStatusText(statusText);
|
|
|
|
nsRefPtr<InternalResponse> response = new InternalResponse(responseStatus, statusText);
|
|
|
|
nsRefPtr<FillResponseHeaders> visitor = new FillResponseHeaders(response);
|
|
rv = channel->VisitResponseHeaders(visitor);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
NS_WARNING("Failed to visit all headers.");
|
|
}
|
|
|
|
mResponse = BeginAndGetFilteredResponse(response);
|
|
|
|
// We open a pipe so that we can immediately set the pipe's read end as the
|
|
// response's body. Setting the segment size to UINT32_MAX means that the
|
|
// pipe has infinite space. The nsIChannel will continue to buffer data in
|
|
// xpcom events even if we block on a fixed size pipe. It might be possible
|
|
// to suspend the channel and then resume when there is space available, but
|
|
// for now use an infinite pipe to avoid blocking.
|
|
nsCOMPtr<nsIInputStream> pipeInputStream;
|
|
rv = NS_NewPipe(getter_AddRefs(pipeInputStream),
|
|
getter_AddRefs(mPipeOutputStream),
|
|
0, /* default segment size */
|
|
UINT32_MAX /* infinite pipe */);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
// Cancel request.
|
|
return rv;
|
|
}
|
|
|
|
mResponse->SetBody(pipeInputStream);
|
|
|
|
nsCOMPtr<nsIEventTarget> sts = do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID, &rv);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
FailWithNetworkError();
|
|
// Cancel request.
|
|
return rv;
|
|
}
|
|
|
|
// Try to retarget off main thread.
|
|
nsCOMPtr<nsIThreadRetargetableRequest> rr = do_QueryInterface(aRequest);
|
|
if (rr) {
|
|
rr->RetargetDeliveryTo(sts);
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
FetchDriver::OnDataAvailable(nsIRequest* aRequest,
|
|
nsISupports* aContext,
|
|
nsIInputStream* aInputStream,
|
|
uint64_t aOffset,
|
|
uint32_t aCount)
|
|
{
|
|
uint32_t aRead;
|
|
MOZ_ASSERT(mResponse);
|
|
MOZ_ASSERT(mPipeOutputStream);
|
|
|
|
nsresult rv = aInputStream->ReadSegments(NS_CopySegmentToStream,
|
|
mPipeOutputStream,
|
|
aCount, &aRead);
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
FetchDriver::OnStopRequest(nsIRequest* aRequest,
|
|
nsISupports* aContext,
|
|
nsresult aStatusCode)
|
|
{
|
|
workers::AssertIsOnMainThread();
|
|
if (mPipeOutputStream) {
|
|
mPipeOutputStream->Close();
|
|
}
|
|
|
|
if (NS_FAILED(aStatusCode)) {
|
|
FailWithNetworkError();
|
|
return aStatusCode;
|
|
}
|
|
|
|
ContinueHttpFetchAfterNetworkFetch();
|
|
return NS_OK;
|
|
}
|
|
|
|
// This is called when the channel is redirected.
|
|
NS_IMETHODIMP
|
|
FetchDriver::AsyncOnChannelRedirect(nsIChannel* aOldChannel,
|
|
nsIChannel* aNewChannel,
|
|
uint32_t aFlags,
|
|
nsIAsyncVerifyRedirectCallback *aCallback)
|
|
{
|
|
NS_PRECONDITION(aNewChannel, "Redirect without a channel?");
|
|
|
|
nsresult rv;
|
|
|
|
// Section 4.2, Step 4.6-4.7, enforcing a redirect count is done by Necko.
|
|
// The pref used is "network.http.redirection-limit" which is set to 20 by
|
|
// default.
|
|
//
|
|
// Step 4.8. We only unset this for spec compatibility. Any actions we take
|
|
// on mRequest here do not affect what the channel does.
|
|
mRequest->UnsetSameOriginDataURL();
|
|
|
|
//
|
|
// Requests that require preflight are not permitted to redirect.
|
|
// Fetch spec section 4.2 "HTTP Fetch", step 4.9 just uses the manual
|
|
// redirect flag to decide whether to execute step 4.10 or not. We do not
|
|
// represent it in our implementation.
|
|
// The only thing we do is to check if the request requires a preflight (part
|
|
// of step 4.9), in which case we abort. This part cannot be done by
|
|
// nsCORSListenerProxy since it does not have access to mRequest.
|
|
// which case. Step 4.10.3 is handled by OnRedirectVerifyCallback(), and all
|
|
// the other steps are handled by nsCORSListenerProxy.
|
|
if (!NS_IsInternalSameURIRedirect(aOldChannel, aNewChannel, aFlags)) {
|
|
rv = DoesNotRequirePreflight(aNewChannel);
|
|
if (NS_FAILED(rv)) {
|
|
NS_WARNING("nsXMLHttpRequest::OnChannelRedirect: "
|
|
"DoesNotRequirePreflight returned failure");
|
|
return rv;
|
|
}
|
|
}
|
|
|
|
mRedirectCallback = aCallback;
|
|
mOldRedirectChannel = aOldChannel;
|
|
mNewRedirectChannel = aNewChannel;
|
|
|
|
nsCOMPtr<nsIChannelEventSink> outer =
|
|
do_GetInterface(mNotificationCallbacks);
|
|
if (outer) {
|
|
// The callee is supposed to call OnRedirectVerifyCallback() on success,
|
|
// and nobody has to call it on failure, so we can just return after this
|
|
// block.
|
|
rv = outer->AsyncOnChannelRedirect(aOldChannel, aNewChannel, aFlags, this);
|
|
if (NS_FAILED(rv)) {
|
|
aOldChannel->Cancel(rv);
|
|
mRedirectCallback = nullptr;
|
|
mOldRedirectChannel = nullptr;
|
|
mNewRedirectChannel = nullptr;
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
(void) OnRedirectVerifyCallback(NS_OK);
|
|
return NS_OK;
|
|
}
|
|
|
|
// Returns NS_OK if no preflight is required, error otherwise.
|
|
nsresult
|
|
FetchDriver::DoesNotRequirePreflight(nsIChannel* aChannel)
|
|
{
|
|
// If this is a same-origin request or the channel's URI inherits
|
|
// its principal, it's allowed.
|
|
if (nsContentUtils::CheckMayLoad(mPrincipal, aChannel, true)) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Check if we need to do a preflight request.
|
|
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aChannel);
|
|
NS_ENSURE_TRUE(httpChannel, NS_ERROR_DOM_BAD_URI);
|
|
|
|
nsAutoCString method;
|
|
httpChannel->GetRequestMethod(method);
|
|
if (mRequest->Mode() == RequestMode::Cors_with_forced_preflight ||
|
|
!mRequest->Headers()->HasOnlySimpleHeaders() ||
|
|
(!method.LowerCaseEqualsLiteral("get") &&
|
|
!method.LowerCaseEqualsLiteral("post") &&
|
|
!method.LowerCaseEqualsLiteral("head"))) {
|
|
return NS_ERROR_DOM_BAD_URI;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
FetchDriver::GetInterface(const nsIID& aIID, void **aResult)
|
|
{
|
|
if (aIID.Equals(NS_GET_IID(nsIChannelEventSink))) {
|
|
*aResult = static_cast<nsIChannelEventSink*>(this);
|
|
NS_ADDREF_THIS();
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv;
|
|
|
|
if (mNotificationCallbacks) {
|
|
rv = mNotificationCallbacks->GetInterface(aIID, aResult);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
NS_ASSERTION(*aResult, "Lying nsIInterfaceRequestor implementation!");
|
|
return rv;
|
|
}
|
|
}
|
|
else if (aIID.Equals(NS_GET_IID(nsIStreamListener))) {
|
|
*aResult = static_cast<nsIStreamListener*>(this);
|
|
NS_ADDREF_THIS();
|
|
return NS_OK;
|
|
}
|
|
else if (aIID.Equals(NS_GET_IID(nsIRequestObserver))) {
|
|
*aResult = static_cast<nsIRequestObserver*>(this);
|
|
NS_ADDREF_THIS();
|
|
return NS_OK;
|
|
}
|
|
|
|
return QueryInterface(aIID, aResult);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
FetchDriver::OnRedirectVerifyCallback(nsresult aResult)
|
|
{
|
|
// On a successful redirect we perform the following substeps of Section 4.2,
|
|
// step 4.10.
|
|
if (NS_SUCCEEDED(aResult)) {
|
|
// Step 4.10.3 "Set request's url to locationURL." so that when we set the
|
|
// Response's URL from the Request's URL in Section 4, step 6, we get the
|
|
// final value.
|
|
nsCOMPtr<nsIURI> newURI;
|
|
nsresult rv = NS_GetFinalChannelURI(mNewRedirectChannel, getter_AddRefs(newURI));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
aResult = rv;
|
|
} else {
|
|
// We need to update our request's URL.
|
|
nsAutoCString newUrl;
|
|
newURI->GetSpec(newUrl);
|
|
mRequest->SetURL(newUrl);
|
|
}
|
|
}
|
|
|
|
if (NS_FAILED(aResult)) {
|
|
mOldRedirectChannel->Cancel(aResult);
|
|
}
|
|
|
|
mOldRedirectChannel = nullptr;
|
|
mNewRedirectChannel = nullptr;
|
|
mRedirectCallback->OnRedirectVerifyCallback(aResult);
|
|
mRedirectCallback = nullptr;
|
|
return NS_OK;
|
|
}
|
|
} // namespace dom
|
|
} // namespace mozilla
|