/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ // HttpLog.h should generally be included first #include "HttpLog.h" #include "nsHttp.h" #include "nsICacheEntry.h" #include "mozilla/Unused.h" #include "mozilla/dom/ContentChild.h" #include "mozilla/dom/TabChild.h" #include "mozilla/ipc/FileDescriptorSetChild.h" #include "mozilla/ipc/IPCStreamUtils.h" #include "mozilla/net/NeckoChild.h" #include "mozilla/net/HttpChannelChild.h" #include "AltDataOutputStreamChild.h" #include "nsISupportsPrimitives.h" #include "nsStringStream.h" #include "nsHttpHandler.h" #include "nsNetUtil.h" #include "nsSerializationHelper.h" #include "mozilla/Attributes.h" #include "mozilla/dom/Performance.h" #include "mozilla/ipc/InputStreamUtils.h" #include "mozilla/ipc/URIUtils.h" #include "mozilla/ipc/BackgroundUtils.h" #include "mozilla/net/ChannelDiverterChild.h" #include "mozilla/net/DNS.h" #include "SerializedLoadContext.h" #include "nsInputStreamPump.h" #include "InterceptedChannel.h" #include "mozIThirdPartyUtil.h" #include "nsContentSecurityManager.h" #include "nsIDeprecationWarner.h" #include "nsICompressConvStats.h" #include "nsIDocument.h" #include "nsIDOMWindowUtils.h" #include "nsStreamUtils.h" #ifdef OS_POSIX #include "chrome/common/file_descriptor_set_posix.h" #endif using namespace mozilla::dom; using namespace mozilla::ipc; namespace mozilla { namespace net { extern bool WillRedirect(nsHttpResponseHead * response); namespace { const uint32_t kMaxFileDescriptorsPerMessage = 250; #ifdef OS_POSIX // Keep this in sync with other platforms. static_assert(FileDescriptorSet::MAX_DESCRIPTORS_PER_MESSAGE == 250, "MAX_DESCRIPTORS_PER_MESSAGE mismatch!"); #endif } // namespace NS_IMPL_ISUPPORTS(InterceptStreamListener, nsIStreamListener, nsIRequestObserver, nsIProgressEventSink) NS_IMETHODIMP InterceptStreamListener::OnStartRequest(nsIRequest* aRequest, nsISupports* aContext) { if (mOwner) { mOwner->DoOnStartRequest(mOwner, mContext); } return NS_OK; } NS_IMETHODIMP InterceptStreamListener::OnStatus(nsIRequest* aRequest, nsISupports* aContext, nsresult status, const char16_t* aStatusArg) { if (mOwner) { mOwner->DoOnStatus(mOwner, status); } return NS_OK; } NS_IMETHODIMP InterceptStreamListener::OnProgress(nsIRequest* aRequest, nsISupports* aContext, int64_t aProgress, int64_t aProgressMax) { if (mOwner) { mOwner->DoOnProgress(mOwner, aProgress, aProgressMax); } return NS_OK; } NS_IMETHODIMP InterceptStreamListener::OnDataAvailable(nsIRequest* aRequest, nsISupports* aContext, nsIInputStream* aInputStream, uint64_t aOffset, uint32_t aCount) { if (!mOwner) { return NS_OK; } uint32_t loadFlags; mOwner->GetLoadFlags(&loadFlags); if (!(loadFlags & HttpBaseChannel::LOAD_BACKGROUND)) { nsCOMPtr uri; mOwner->GetURI(getter_AddRefs(uri)); nsAutoCString host; uri->GetHost(host); OnStatus(mOwner, aContext, NS_NET_STATUS_READING, NS_ConvertUTF8toUTF16(host).get()); int64_t progress = aOffset + aCount; OnProgress(mOwner, aContext, progress, mOwner->mSynthesizedStreamLength); } mOwner->DoOnDataAvailable(mOwner, mContext, aInputStream, aOffset, aCount); return NS_OK; } NS_IMETHODIMP InterceptStreamListener::OnStopRequest(nsIRequest* aRequest, nsISupports* aContext, nsresult aStatusCode) { if (mOwner) { mOwner->DoPreOnStopRequest(aStatusCode); mOwner->DoOnStopRequest(mOwner, aStatusCode, mContext); } Cleanup(); return NS_OK; } void InterceptStreamListener::Cleanup() { mOwner = nullptr; mContext = nullptr; } //----------------------------------------------------------------------------- // HttpChannelChild //----------------------------------------------------------------------------- HttpChannelChild::HttpChannelChild() : HttpAsyncAborter(this) , mSynthesizedStreamLength(0) , mIsFromCache(false) , mCacheEntryAvailable(false) , mCacheExpirationTime(nsICacheEntry::NO_EXPIRATION_TIME) , mSendResumeAt(false) , mIPCOpen(false) , mKeptAlive(false) , mUnknownDecoderInvolved(false) , mDivertingToParent(false) , mFlushedForDiversion(false) , mSuspendSent(false) , mSynthesizedResponse(false) , mShouldInterceptSubsequentRedirect(false) , mRedirectingForSubsequentSynthesizedResponse(false) , mPostRedirectChannelShouldIntercept(false) , mPostRedirectChannelShouldUpgrade(false) , mShouldParentIntercept(false) , mSuspendParentAfterSynthesizeResponse(false) { LOG(("Creating HttpChannelChild @%x\n", this)); mChannelCreationTime = PR_Now(); mChannelCreationTimestamp = TimeStamp::Now(); mAsyncOpenTime = TimeStamp::Now(); mEventQ = new ChannelEventQueue(static_cast(this)); } HttpChannelChild::~HttpChannelChild() { LOG(("Destroying HttpChannelChild @%x\n", this)); } //----------------------------------------------------------------------------- // HttpChannelChild::nsISupports //----------------------------------------------------------------------------- // Override nsHashPropertyBag's AddRef: we don't need thread-safe refcnt NS_IMPL_ADDREF(HttpChannelChild) NS_IMETHODIMP_(MozExternalRefCountType) HttpChannelChild::Release() { NS_PRECONDITION(0 != mRefCnt, "dup release"); NS_ASSERT_OWNINGTHREAD(HttpChannelChild); --mRefCnt; NS_LOG_RELEASE(this, mRefCnt, "HttpChannelChild"); // Normally we Send_delete in OnStopRequest, but when we need to retain the // remote channel for security info IPDL itself holds 1 reference, so we // Send_delete when refCnt==1. But if !mIPCOpen, then there's nobody to send // to, so we fall through. if (mKeptAlive && mRefCnt == 1 && mIPCOpen) { mKeptAlive = false; // We send a message to the parent, which calls SendDelete, and then the // child calling Send__delete__() to finally drop the refcount to 0. SendDeletingChannel(); return 1; } if (mRefCnt == 0) { mRefCnt = 1; /* stabilize */ delete this; return 0; } return mRefCnt; } NS_INTERFACE_MAP_BEGIN(HttpChannelChild) NS_INTERFACE_MAP_ENTRY(nsIRequest) NS_INTERFACE_MAP_ENTRY(nsIChannel) NS_INTERFACE_MAP_ENTRY(nsIHttpChannel) NS_INTERFACE_MAP_ENTRY(nsIHttpChannelInternal) NS_INTERFACE_MAP_ENTRY(nsICacheInfoChannel) NS_INTERFACE_MAP_ENTRY(nsIResumableChannel) NS_INTERFACE_MAP_ENTRY(nsISupportsPriority) NS_INTERFACE_MAP_ENTRY(nsIClassOfService) NS_INTERFACE_MAP_ENTRY(nsIProxiedChannel) NS_INTERFACE_MAP_ENTRY(nsITraceableChannel) NS_INTERFACE_MAP_ENTRY(nsIApplicationCacheContainer) NS_INTERFACE_MAP_ENTRY(nsIApplicationCacheChannel) NS_INTERFACE_MAP_ENTRY(nsIAsyncVerifyRedirectCallback) NS_INTERFACE_MAP_ENTRY(nsIChildChannel) NS_INTERFACE_MAP_ENTRY(nsIHttpChannelChild) NS_INTERFACE_MAP_ENTRY_CONDITIONAL(nsIAssociatedContentSecurity, GetAssociatedContentSecurity()) NS_INTERFACE_MAP_ENTRY(nsIDivertableChannel) NS_INTERFACE_MAP_END_INHERITING(HttpBaseChannel) //----------------------------------------------------------------------------- // HttpChannelChild::PHttpChannelChild //----------------------------------------------------------------------------- void HttpChannelChild::AddIPDLReference() { MOZ_ASSERT(!mIPCOpen, "Attempt to retain more than one IPDL reference"); mIPCOpen = true; AddRef(); } void HttpChannelChild::ReleaseIPDLReference() { MOZ_ASSERT(mIPCOpen, "Attempt to release nonexistent IPDL reference"); mIPCOpen = false; Release(); } class AssociateApplicationCacheEvent : public ChannelEvent { public: AssociateApplicationCacheEvent(HttpChannelChild* aChild, const nsCString &aGroupID, const nsCString &aClientID) : mChild(aChild) , groupID(aGroupID) , clientID(aClientID) {} void Run() { mChild->AssociateApplicationCache(groupID, clientID); } private: HttpChannelChild* mChild; nsCString groupID; nsCString clientID; }; bool HttpChannelChild::RecvAssociateApplicationCache(const nsCString &groupID, const nsCString &clientID) { LOG(("HttpChannelChild::RecvAssociateApplicationCache [this=%p]\n", this)); mEventQ->RunOrEnqueue(new AssociateApplicationCacheEvent(this, groupID, clientID)); return true; } void HttpChannelChild::AssociateApplicationCache(const nsCString &groupID, const nsCString &clientID) { LOG(("HttpChannelChild::AssociateApplicationCache [this=%p]\n", this)); nsresult rv; mApplicationCache = do_CreateInstance(NS_APPLICATIONCACHE_CONTRACTID, &rv); if (NS_FAILED(rv)) return; mLoadedFromApplicationCache = true; mApplicationCache->InitAsHandle(groupID, clientID); } class StartRequestEvent : public ChannelEvent { public: StartRequestEvent(HttpChannelChild* aChild, const nsresult& aChannelStatus, const nsHttpResponseHead& aResponseHead, const bool& aUseResponseHead, const nsHttpHeaderArray& aRequestHeaders, const bool& aIsFromCache, const bool& aCacheEntryAvailable, const uint32_t& aCacheExpirationTime, const nsCString& aCachedCharset, const nsCString& aSecurityInfoSerialization, const NetAddr& aSelfAddr, const NetAddr& aPeerAddr, const uint32_t& aCacheKey, const nsCString& altDataType) : mChild(aChild) , mChannelStatus(aChannelStatus) , mResponseHead(aResponseHead) , mRequestHeaders(aRequestHeaders) , mUseResponseHead(aUseResponseHead) , mIsFromCache(aIsFromCache) , mCacheEntryAvailable(aCacheEntryAvailable) , mCacheExpirationTime(aCacheExpirationTime) , mCachedCharset(aCachedCharset) , mSecurityInfoSerialization(aSecurityInfoSerialization) , mSelfAddr(aSelfAddr) , mPeerAddr(aPeerAddr) , mCacheKey(aCacheKey) , mAltDataType(altDataType) {} void Run() { LOG(("StartRequestEvent [this=%p]\n", mChild)); mChild->OnStartRequest(mChannelStatus, mResponseHead, mUseResponseHead, mRequestHeaders, mIsFromCache, mCacheEntryAvailable, mCacheExpirationTime, mCachedCharset, mSecurityInfoSerialization, mSelfAddr, mPeerAddr, mCacheKey, mAltDataType); } private: HttpChannelChild* mChild; nsresult mChannelStatus; nsHttpResponseHead mResponseHead; nsHttpHeaderArray mRequestHeaders; bool mUseResponseHead; bool mIsFromCache; bool mCacheEntryAvailable; uint32_t mCacheExpirationTime; nsCString mCachedCharset; nsCString mSecurityInfoSerialization; NetAddr mSelfAddr; NetAddr mPeerAddr; uint32_t mCacheKey; nsCString mAltDataType; }; bool HttpChannelChild::RecvOnStartRequest(const nsresult& channelStatus, const nsHttpResponseHead& responseHead, const bool& useResponseHead, const nsHttpHeaderArray& requestHeaders, const bool& isFromCache, const bool& cacheEntryAvailable, const uint32_t& cacheExpirationTime, const nsCString& cachedCharset, const nsCString& securityInfoSerialization, const NetAddr& selfAddr, const NetAddr& peerAddr, const int16_t& redirectCount, const uint32_t& cacheKey, const nsCString& altDataType) { LOG(("HttpChannelChild::RecvOnStartRequest [this=%p]\n", this)); // mFlushedForDiversion and mDivertingToParent should NEVER be set at this // stage, as they are set in the listener's OnStartRequest. MOZ_RELEASE_ASSERT(!mFlushedForDiversion, "mFlushedForDiversion should be unset before OnStartRequest!"); MOZ_RELEASE_ASSERT(!mDivertingToParent, "mDivertingToParent should be unset before OnStartRequest!"); mRedirectCount = redirectCount; mEventQ->RunOrEnqueue(new StartRequestEvent(this, channelStatus, responseHead, useResponseHead, requestHeaders, isFromCache, cacheEntryAvailable, cacheExpirationTime, cachedCharset, securityInfoSerialization, selfAddr, peerAddr, cacheKey, altDataType)); return true; } void HttpChannelChild::OnStartRequest(const nsresult& channelStatus, const nsHttpResponseHead& responseHead, const bool& useResponseHead, const nsHttpHeaderArray& requestHeaders, const bool& isFromCache, const bool& cacheEntryAvailable, const uint32_t& cacheExpirationTime, const nsCString& cachedCharset, const nsCString& securityInfoSerialization, const NetAddr& selfAddr, const NetAddr& peerAddr, const uint32_t& cacheKey, const nsCString& altDataType) { LOG(("HttpChannelChild::OnStartRequest [this=%p]\n", this)); // mFlushedForDiversion and mDivertingToParent should NEVER be set at this // stage, as they are set in the listener's OnStartRequest. MOZ_RELEASE_ASSERT(!mFlushedForDiversion, "mFlushedForDiversion should be unset before OnStartRequest!"); MOZ_RELEASE_ASSERT(!mDivertingToParent, "mDivertingToParent should be unset before OnStartRequest!"); if (!mCanceled && NS_SUCCEEDED(mStatus)) { mStatus = channelStatus; } if (useResponseHead && !mCanceled) mResponseHead = new nsHttpResponseHead(responseHead); if (!securityInfoSerialization.IsEmpty()) { NS_DeserializeObject(securityInfoSerialization, getter_AddRefs(mSecurityInfo)); } mIsFromCache = isFromCache; mCacheEntryAvailable = cacheEntryAvailable; mCacheExpirationTime = cacheExpirationTime; mCachedCharset = cachedCharset; mSelfAddr = selfAddr; mPeerAddr = peerAddr; mAvailableCachedAltDataType = altDataType; mAfterOnStartRequestBegun = true; AutoEventEnqueuer ensureSerialDispatch(mEventQ); nsresult rv; nsCOMPtr container = do_CreateInstance(NS_SUPPORTS_PRUINT32_CONTRACTID, &rv); if (NS_FAILED(rv)) { Cancel(rv); return; } rv = container->SetData(cacheKey); if (NS_FAILED(rv)) { Cancel(rv); return; } mCacheKey = container; // replace our request headers with what actually got sent in the parent mRequestHead.SetHeaders(requestHeaders); // Note: this is where we would notify "http-on-examine-response" observers. // We have deliberately disabled this for child processes (see bug 806753) // // gHttpHandler->OnExamineResponse(this); mTracingEnabled = false; DoOnStartRequest(this, mListenerContext); } namespace { class SyntheticDiversionListener final : public nsIStreamListener { RefPtr mChannel; ~SyntheticDiversionListener() { } public: explicit SyntheticDiversionListener(HttpChannelChild* aChannel) : mChannel(aChannel) { MOZ_ASSERT(mChannel); } NS_IMETHOD OnStartRequest(nsIRequest* aRequest, nsISupports* aContext) override { MOZ_ASSERT_UNREACHABLE("SyntheticDiversionListener should never see OnStartRequest"); return NS_OK; } NS_IMETHOD OnStopRequest(nsIRequest* aRequest, nsISupports* aContext, nsresult aStatus) override { mChannel->SendDivertOnStopRequest(aStatus); return NS_OK; } NS_IMETHOD OnDataAvailable(nsIRequest* aRequest, nsISupports* aContext, nsIInputStream* aInputStream, uint64_t aOffset, uint32_t aCount) override { nsAutoCString data; nsresult rv = NS_ConsumeStream(aInputStream, aCount, data); if (NS_WARN_IF(NS_FAILED(rv))) { aRequest->Cancel(rv); return rv; } mChannel->SendDivertOnDataAvailable(data, aOffset, aCount); return NS_OK; } NS_DECL_ISUPPORTS }; NS_IMPL_ISUPPORTS(SyntheticDiversionListener, nsIStreamListener); } // anonymous namespace void HttpChannelChild::DoOnStartRequest(nsIRequest* aRequest, nsISupports* aContext) { LOG(("HttpChannelChild::DoOnStartRequest [this=%p]\n", this)); // In theory mListener should not be null, but in practice sometimes it is. MOZ_ASSERT(mListener); if (!mListener) { Cancel(NS_ERROR_FAILURE); return; } nsresult rv = mListener->OnStartRequest(aRequest, aContext); if (NS_FAILED(rv)) { Cancel(rv); return; } if (mDivertingToParent) { mListener = nullptr; mListenerContext = nullptr; mCompressListener = nullptr; if (mLoadGroup) { mLoadGroup->RemoveRequest(this, nullptr, mStatus); } // If the response has been synthesized in the child, then we are going // be getting OnDataAvailable and OnStopRequest from the synthetic // stream pump. We need to forward these back to the parent diversion // listener. if (mSynthesizedResponse) { mListener = new SyntheticDiversionListener(this); } return; } nsCOMPtr listener; rv = DoApplyContentConversions(mListener, getter_AddRefs(listener), mListenerContext); if (NS_FAILED(rv)) { Cancel(rv); } else if (listener) { mListener = listener; mCompressListener = listener; } } class TransportAndDataEvent : public ChannelEvent { public: TransportAndDataEvent(HttpChannelChild* child, const nsresult& channelStatus, const nsresult& transportStatus, const uint64_t& progress, const uint64_t& progressMax, const nsCString& data, const uint64_t& offset, const uint32_t& count) : mChild(child) , mChannelStatus(channelStatus) , mTransportStatus(transportStatus) , mProgress(progress) , mProgressMax(progressMax) , mData(data) , mOffset(offset) , mCount(count) {} void Run() { mChild->OnTransportAndData(mChannelStatus, mTransportStatus, mProgress, mProgressMax, mOffset, mCount, mData); } private: HttpChannelChild* mChild; nsresult mChannelStatus; nsresult mTransportStatus; uint64_t mProgress; uint64_t mProgressMax; nsCString mData; uint64_t mOffset; uint32_t mCount; }; bool HttpChannelChild::RecvOnTransportAndData(const nsresult& channelStatus, const nsresult& transportStatus, const uint64_t& progress, const uint64_t& progressMax, const uint64_t& offset, const uint32_t& count, const nsCString& data) { LOG(("HttpChannelChild::RecvOnTransportAndData [this=%p]\n", this)); MOZ_RELEASE_ASSERT(!mFlushedForDiversion, "Should not be receiving any more callbacks from parent!"); mEventQ->RunOrEnqueue(new TransportAndDataEvent(this, channelStatus, transportStatus, progress, progressMax, data, offset, count), mDivertingToParent); return true; } class MaybeDivertOnDataHttpEvent : public ChannelEvent { public: MaybeDivertOnDataHttpEvent(HttpChannelChild* child, const nsCString& data, const uint64_t& offset, const uint32_t& count) : mChild(child) , mData(data) , mOffset(offset) , mCount(count) {} void Run() { mChild->MaybeDivertOnData(mData, mOffset, mCount); } private: HttpChannelChild* mChild; nsCString mData; uint64_t mOffset; uint32_t mCount; }; void HttpChannelChild::MaybeDivertOnData(const nsCString& data, const uint64_t& offset, const uint32_t& count) { LOG(("HttpChannelChild::MaybeDivertOnData [this=%p]", this)); if (mDivertingToParent) { SendDivertOnDataAvailable(data, offset, count); } } void HttpChannelChild::OnTransportAndData(const nsresult& channelStatus, const nsresult& transportStatus, const uint64_t progress, const uint64_t& progressMax, const uint64_t& offset, const uint32_t& count, const nsCString& data) { LOG(("HttpChannelChild::OnTransportAndData [this=%p]\n", this)); if (!mCanceled && NS_SUCCEEDED(mStatus)) { mStatus = channelStatus; } // For diversion to parent, just SendDivertOnDataAvailable. if (mDivertingToParent) { MOZ_RELEASE_ASSERT(!mFlushedForDiversion, "Should not be processing any more callbacks from parent!"); SendDivertOnDataAvailable(data, offset, count); return; } if (mCanceled) return; if (mUnknownDecoderInvolved) { LOG(("UnknownDecoder is involved queue OnDataAvailable call. [this=%p]", this)); mUnknownDecoderEventQ.AppendElement( MakeUnique(this, data, offset, count)); } // Hold queue lock throughout all three calls, else we might process a later // necko msg in between them. AutoEventEnqueuer ensureSerialDispatch(mEventQ); DoOnStatus(this, transportStatus); DoOnProgress(this, progress, progressMax); // OnDataAvailable // // NOTE: the OnDataAvailable contract requires the client to read all the data // in the inputstream. This code relies on that ('data' will go away after // this function). Apparently the previous, non-e10s behavior was to actually // support only reading part of the data, allowing later calls to read the // rest. nsCOMPtr stringStream; nsresult rv = NS_NewByteInputStream(getter_AddRefs(stringStream), data.get(), count, NS_ASSIGNMENT_DEPEND); if (NS_FAILED(rv)) { Cancel(rv); return; } DoOnDataAvailable(this, mListenerContext, stringStream, offset, count); stringStream->Close(); } void HttpChannelChild::DoOnStatus(nsIRequest* aRequest, nsresult status) { LOG(("HttpChannelChild::DoOnStatus [this=%p]\n", this)); if (mCanceled) return; // cache the progress sink so we don't have to query for it each time. if (!mProgressSink) GetCallback(mProgressSink); // Temporary fix for bug 1116124 // See 1124971 - Child removes LOAD_BACKGROUND flag from channel if (status == NS_OK) return; // block status/progress after Cancel or OnStopRequest has been called, // or if channel has LOAD_BACKGROUND set. if (mProgressSink && NS_SUCCEEDED(mStatus) && mIsPending && !(mLoadFlags & LOAD_BACKGROUND)) { // OnStatus // MOZ_ASSERT(status == NS_NET_STATUS_RECEIVING_FROM || status == NS_NET_STATUS_READING); nsAutoCString host; mURI->GetHost(host); mProgressSink->OnStatus(aRequest, nullptr, status, NS_ConvertUTF8toUTF16(host).get()); } } void HttpChannelChild::DoOnProgress(nsIRequest* aRequest, int64_t progress, int64_t progressMax) { LOG(("HttpChannelChild::DoOnProgress [this=%p]\n", this)); if (mCanceled) return; // cache the progress sink so we don't have to query for it each time. if (!mProgressSink) GetCallback(mProgressSink); // block status/progress after Cancel or OnStopRequest has been called, // or if channel has LOAD_BACKGROUND set. if (mProgressSink && NS_SUCCEEDED(mStatus) && mIsPending && !(mLoadFlags & LOAD_BACKGROUND)) { // OnProgress // if (progress > 0) { mProgressSink->OnProgress(aRequest, nullptr, progress, progressMax); } } } void HttpChannelChild::DoOnDataAvailable(nsIRequest* aRequest, nsISupports* aContext, nsIInputStream* aStream, uint64_t offset, uint32_t count) { LOG(("HttpChannelChild::DoOnDataAvailable [this=%p]\n", this)); if (mCanceled) return; nsresult rv = mListener->OnDataAvailable(aRequest, aContext, aStream, offset, count); if (NS_FAILED(rv)) { Cancel(rv); } } class StopRequestEvent : public ChannelEvent { public: StopRequestEvent(HttpChannelChild* child, const nsresult& channelStatus, const ResourceTimingStruct& timing) : mChild(child) , mChannelStatus(channelStatus) , mTiming(timing) {} void Run() { mChild->OnStopRequest(mChannelStatus, mTiming); } private: HttpChannelChild* mChild; nsresult mChannelStatus; ResourceTimingStruct mTiming; }; bool HttpChannelChild::RecvOnStopRequest(const nsresult& channelStatus, const ResourceTimingStruct& timing) { LOG(("HttpChannelChild::RecvOnStopRequest [this=%p]\n", this)); MOZ_RELEASE_ASSERT(!mFlushedForDiversion, "Should not be receiving any more callbacks from parent!"); mEventQ->RunOrEnqueue(new StopRequestEvent(this, channelStatus, timing), mDivertingToParent); return true; } class MaybeDivertOnStopHttpEvent : public ChannelEvent { public: MaybeDivertOnStopHttpEvent(HttpChannelChild* child, const nsresult& channelStatus) : mChild(child) , mChannelStatus(channelStatus) {} void Run() { mChild->MaybeDivertOnStop(mChannelStatus); } private: HttpChannelChild* mChild; nsresult mChannelStatus; }; void HttpChannelChild::MaybeDivertOnStop(const nsresult& aChannelStatus) { LOG(("HttpChannelChild::MaybeDivertOnStop [this=%p, " "mDivertingToParent=%d status=%x]", this, mDivertingToParent, aChannelStatus)); if (mDivertingToParent) { SendDivertOnStopRequest(aChannelStatus); } } void HttpChannelChild::OnStopRequest(const nsresult& channelStatus, const ResourceTimingStruct& timing) { LOG(("HttpChannelChild::OnStopRequest [this=%p status=%x]\n", this, channelStatus)); if (mDivertingToParent) { MOZ_RELEASE_ASSERT(!mFlushedForDiversion, "Should not be processing any more callbacks from parent!"); SendDivertOnStopRequest(channelStatus); return; } if (mUnknownDecoderInvolved) { LOG(("UnknownDecoder is involved queue OnStopRequest call. [this=%p]", this)); mUnknownDecoderEventQ.AppendElement( MakeUnique(this, channelStatus)); } nsCOMPtr conv = do_QueryInterface(mCompressListener); if (conv) { conv->GetDecodedDataLength(&mDecodedBodySize); } mTransactionTimings.domainLookupStart = timing.domainLookupStart; mTransactionTimings.domainLookupEnd = timing.domainLookupEnd; mTransactionTimings.connectStart = timing.connectStart; mTransactionTimings.secureConnectionStart = timing.secureConnectionStart; mTransactionTimings.connectEnd = timing.connectEnd; mTransactionTimings.requestStart = timing.requestStart; mTransactionTimings.responseStart = timing.responseStart; mTransactionTimings.responseEnd = timing.responseEnd; mAsyncOpenTime = timing.fetchStart; mRedirectStartTimeStamp = timing.redirectStart; mRedirectEndTimeStamp = timing.redirectEnd; mTransferSize = timing.transferSize; mEncodedBodySize = timing.encodedBodySize; mProtocolVersion = timing.protocolVersion; mCacheReadStart = timing.cacheReadStart; mCacheReadEnd = timing.cacheReadEnd; Performance* documentPerformance = GetPerformance(); if (documentPerformance) { documentPerformance->AddEntry(this, this); } DoPreOnStopRequest(channelStatus); { // We must flush the queue before we Send__delete__ // (although we really shouldn't receive any msgs after OnStop), // so make sure this goes out of scope before then. AutoEventEnqueuer ensureSerialDispatch(mEventQ); DoOnStopRequest(this, channelStatus, mListenerContext); } ReleaseListeners(); // DocumentChannelCleanup actually nulls out mCacheEntry in the parent, which // we might need later to open the Alt-Data output stream, so just return here if (!mPreferredCachedAltDataType.IsEmpty()) { mKeptAlive = true; return; } if (mLoadFlags & LOAD_DOCUMENT_URI) { // Keep IPDL channel open, but only for updating security info. mKeptAlive = true; SendDocumentChannelCleanup(); } else { // The parent process will respond by sending a DeleteSelf message and // making sure not to send any more messages after that. SendDeletingChannel(); } } void HttpChannelChild::DoPreOnStopRequest(nsresult aStatus) { LOG(("HttpChannelChild::DoPreOnStopRequest [this=%p status=%x]\n", this, aStatus)); mIsPending = false; if (!mCanceled && NS_SUCCEEDED(mStatus)) { mStatus = aStatus; } } void HttpChannelChild::DoOnStopRequest(nsIRequest* aRequest, nsresult aChannelStatus, nsISupports* aContext) { LOG(("HttpChannelChild::DoOnStopRequest [this=%p]\n", this)); MOZ_ASSERT(!mIsPending); MOZ_ASSERT(!mOnStopRequestCalled, "We should not call OnStopRequest twice"); // In theory mListener should not be null, but in practice sometimes it is. MOZ_ASSERT(mListener); if (mListener) { mListener->OnStopRequest(aRequest, aContext, mStatus); } mOnStopRequestCalled = true; mListener = nullptr; mListenerContext = nullptr; mCacheEntryAvailable = false; if (mLoadGroup) mLoadGroup->RemoveRequest(this, nullptr, mStatus); } class ProgressEvent : public ChannelEvent { public: ProgressEvent(HttpChannelChild* child, const int64_t& progress, const int64_t& progressMax) : mChild(child) , mProgress(progress) , mProgressMax(progressMax) {} void Run() { mChild->OnProgress(mProgress, mProgressMax); } private: HttpChannelChild* mChild; int64_t mProgress, mProgressMax; }; bool HttpChannelChild::RecvOnProgress(const int64_t& progress, const int64_t& progressMax) { mEventQ->RunOrEnqueue(new ProgressEvent(this, progress, progressMax)); return true; } void HttpChannelChild::OnProgress(const int64_t& progress, const int64_t& progressMax) { LOG(("HttpChannelChild::OnProgress [this=%p progress=%lld/%lld]\n", this, progress, progressMax)); if (mCanceled) return; // cache the progress sink so we don't have to query for it each time. if (!mProgressSink) { GetCallback(mProgressSink); } AutoEventEnqueuer ensureSerialDispatch(mEventQ); // Block socket status event after Cancel or OnStopRequest has been called. if (mProgressSink && NS_SUCCEEDED(mStatus) && mIsPending) { if (progress > 0) { mProgressSink->OnProgress(this, nullptr, progress, progressMax); } } } class StatusEvent : public ChannelEvent { public: StatusEvent(HttpChannelChild* child, const nsresult& status) : mChild(child) , mStatus(status) {} void Run() { mChild->OnStatus(mStatus); } private: HttpChannelChild* mChild; nsresult mStatus; }; bool HttpChannelChild::RecvOnStatus(const nsresult& status) { mEventQ->RunOrEnqueue(new StatusEvent(this, status)); return true; } void HttpChannelChild::OnStatus(const nsresult& status) { LOG(("HttpChannelChild::OnStatus [this=%p status=%x]\n", this, status)); if (mCanceled) return; // cache the progress sink so we don't have to query for it each time. if (!mProgressSink) GetCallback(mProgressSink); AutoEventEnqueuer ensureSerialDispatch(mEventQ); // block socket status event after Cancel or OnStopRequest has been called, // or if channel has LOAD_BACKGROUND set if (mProgressSink && NS_SUCCEEDED(mStatus) && mIsPending && !(mLoadFlags & LOAD_BACKGROUND)) { nsAutoCString host; mURI->GetHost(host); mProgressSink->OnStatus(this, nullptr, status, NS_ConvertUTF8toUTF16(host).get()); } } class FailedAsyncOpenEvent : public ChannelEvent { public: FailedAsyncOpenEvent(HttpChannelChild* child, const nsresult& status) : mChild(child) , mStatus(status) {} void Run() { mChild->FailedAsyncOpen(mStatus); } private: HttpChannelChild* mChild; nsresult mStatus; }; bool HttpChannelChild::RecvFailedAsyncOpen(const nsresult& status) { LOG(("HttpChannelChild::RecvFailedAsyncOpen [this=%p]\n", this)); mEventQ->RunOrEnqueue(new FailedAsyncOpenEvent(this, status)); return true; } // We need to have an implementation of this function just so that we can keep // all references to mCallOnResume of type HttpChannelChild: it's not OK in C++ // to set a member function ptr to a base class function. void HttpChannelChild::HandleAsyncAbort() { HttpAsyncAborter::HandleAsyncAbort(); } void HttpChannelChild::FailedAsyncOpen(const nsresult& status) { LOG(("HttpChannelChild::FailedAsyncOpen [this=%p status=%x]\n", this, status)); mStatus = status; // We're already being called from IPDL, therefore already "async" HandleAsyncAbort(); if (mIPCOpen) { SendDeletingChannel(); } } void HttpChannelChild::DoNotifyListenerCleanup() { LOG(("HttpChannelChild::DoNotifyListenerCleanup [this=%p]\n", this)); if (mInterceptListener) { mInterceptListener->Cleanup(); mInterceptListener = nullptr; } } class DeleteSelfEvent : public ChannelEvent { public: explicit DeleteSelfEvent(HttpChannelChild* child) : mChild(child) {} void Run() { mChild->DeleteSelf(); } private: HttpChannelChild* mChild; }; bool HttpChannelChild::RecvDeleteSelf() { LOG(("HttpChannelChild::RecvDeleteSelf [this=%p]\n", this)); mEventQ->RunOrEnqueue(new DeleteSelfEvent(this)); return true; } HttpChannelChild::OverrideRunnable::OverrideRunnable(HttpChannelChild* aChannel, HttpChannelChild* aNewChannel, InterceptStreamListener* aListener, nsIInputStream* aInput, nsAutoPtr& aHead) { mChannel = aChannel; mNewChannel = aNewChannel; mListener = aListener; mInput = aInput; mHead = aHead; } void HttpChannelChild::OverrideRunnable::OverrideWithSynthesizedResponse() { if (mNewChannel) { mNewChannel->OverrideWithSynthesizedResponse(mHead, mInput, mListener); } } NS_IMETHODIMP HttpChannelChild::OverrideRunnable::Run() { bool ret = mChannel->Redirect3Complete(this); // If the method returns false, it means the IPDL connection is being // asyncly torn down and reopened, and OverrideWithSynthesizedResponse // will be called later from FinishInterceptedRedirect. This object will // be assigned to HttpChannelChild::mOverrideRunnable in order to do so. // If it is true, we can call the method right now. if (ret) { OverrideWithSynthesizedResponse(); } return NS_OK; } bool HttpChannelChild::RecvFinishInterceptedRedirect() { // Hold a ref to this to keep it from being deleted by Send__delete__() RefPtr self(this); Send__delete__(this); // The IPDL connection was torn down by a interception logic in // CompleteRedirectSetup, and we need to call FinishInterceptedRedirect. NS_DispatchToMainThread(NewRunnableMethod(this, &HttpChannelChild::FinishInterceptedRedirect)); return true; } void HttpChannelChild::DeleteSelf() { Send__delete__(this); } void HttpChannelChild::FinishInterceptedRedirect() { nsresult rv; if (mLoadInfo && mLoadInfo->GetEnforceSecurity()) { MOZ_ASSERT(!mInterceptedRedirectContext, "the context should be null!"); rv = AsyncOpen2(mInterceptedRedirectListener); } else { rv = AsyncOpen(mInterceptedRedirectListener, mInterceptedRedirectContext); } mInterceptedRedirectListener = nullptr; mInterceptedRedirectContext = nullptr; if (mInterceptingChannel) { mInterceptingChannel->CleanupRedirectingChannel(rv); mInterceptingChannel = nullptr; } if (mOverrideRunnable) { mOverrideRunnable->OverrideWithSynthesizedResponse(); mOverrideRunnable = nullptr; } } bool HttpChannelChild::RecvReportSecurityMessage(const nsString& messageTag, const nsString& messageCategory) { AddSecurityMessage(messageTag, messageCategory); return true; } class Redirect1Event : public ChannelEvent { public: Redirect1Event(HttpChannelChild* child, const uint32_t& registrarId, const URIParams& newURI, const uint32_t& redirectFlags, const nsHttpResponseHead& responseHead, const nsACString& securityInfoSerialization, const nsACString& channelId) : mChild(child) , mRegistrarId(registrarId) , mNewURI(newURI) , mRedirectFlags(redirectFlags) , mResponseHead(responseHead) , mSecurityInfoSerialization(securityInfoSerialization) , mChannelId(channelId) {} void Run() { mChild->Redirect1Begin(mRegistrarId, mNewURI, mRedirectFlags, mResponseHead, mSecurityInfoSerialization, mChannelId); } private: HttpChannelChild* mChild; uint32_t mRegistrarId; URIParams mNewURI; uint32_t mRedirectFlags; nsHttpResponseHead mResponseHead; nsCString mSecurityInfoSerialization; nsCString mChannelId; }; bool HttpChannelChild::RecvRedirect1Begin(const uint32_t& registrarId, const URIParams& newUri, const uint32_t& redirectFlags, const nsHttpResponseHead& responseHead, const nsCString& securityInfoSerialization, const nsCString& channelId) { // TODO: handle security info LOG(("HttpChannelChild::RecvRedirect1Begin [this=%p]\n", this)); mEventQ->RunOrEnqueue(new Redirect1Event(this, registrarId, newUri, redirectFlags, responseHead, securityInfoSerialization, channelId)); return true; } nsresult HttpChannelChild::SetupRedirect(nsIURI* uri, const nsHttpResponseHead* responseHead, const uint32_t& redirectFlags, nsIChannel** outChannel) { LOG(("HttpChannelChild::SetupRedirect [this=%p]\n", this)); nsresult rv; nsCOMPtr ioService; rv = gHttpHandler->GetIOService(getter_AddRefs(ioService)); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr newChannel; rv = NS_NewChannelInternal(getter_AddRefs(newChannel), uri, mLoadInfo, nullptr, // aLoadGroup nullptr, // aCallbacks nsIRequest::LOAD_NORMAL, ioService); NS_ENSURE_SUCCESS(rv, rv); // We won't get OnStartRequest, set cookies here. mResponseHead = new nsHttpResponseHead(*responseHead); bool rewriteToGET = HttpBaseChannel::ShouldRewriteRedirectToGET(mResponseHead->Status(), mRequestHead.ParsedMethod()); rv = SetupReplacementChannel(uri, newChannel, !rewriteToGET, redirectFlags); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr httpChannelChild = do_QueryInterface(newChannel); if (httpChannelChild) { bool shouldUpgrade = false; auto channelChild = static_cast(httpChannelChild.get()); if (mShouldInterceptSubsequentRedirect) { // In the case where there was a synthesized response that caused a redirection, // we must force the new channel to intercept the request in the parent before a // network transaction is initiated. httpChannelChild->ForceIntercepted(false, false); } else if (mRedirectMode == nsIHttpChannelInternal::REDIRECT_MODE_MANUAL && ((redirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT)) != 0) && channelChild->ShouldInterceptURI(uri, shouldUpgrade)) { // In the case where the redirect mode is manual, we need to check whether // the post-redirect channel needs to be intercepted. If that is the // case, force the new channel to intercept the request in the parent // similar to the case above, but also remember that ShouldInterceptURI() // returned true to avoid calling it a second time. httpChannelChild->ForceIntercepted(true, shouldUpgrade); } } mRedirectChannelChild = do_QueryInterface(newChannel); newChannel.forget(outChannel); return NS_OK; } void HttpChannelChild::Redirect1Begin(const uint32_t& registrarId, const URIParams& newUri, const uint32_t& redirectFlags, const nsHttpResponseHead& responseHead, const nsACString& securityInfoSerialization, const nsACString& channelId) { LOG(("HttpChannelChild::Redirect1Begin [this=%p]\n", this)); nsCOMPtr uri = DeserializeURI(newUri); if (!securityInfoSerialization.IsEmpty()) { NS_DeserializeObject(securityInfoSerialization, getter_AddRefs(mSecurityInfo)); } nsCOMPtr newChannel; nsresult rv = SetupRedirect(uri, &responseHead, redirectFlags, getter_AddRefs(newChannel)); if (NS_SUCCEEDED(rv)) { if (mRedirectChannelChild) { // Set the channelId allocated in parent to the child instance nsCOMPtr httpChannel = do_QueryInterface(mRedirectChannelChild); if (httpChannel) { httpChannel->SetChannelId(channelId); } mRedirectChannelChild->ConnectParent(registrarId); } rv = gHttpHandler->AsyncOnChannelRedirect(this, newChannel, redirectFlags); } if (NS_FAILED(rv)) OnRedirectVerifyCallback(rv); } void HttpChannelChild::BeginNonIPCRedirect(nsIURI* responseURI, const nsHttpResponseHead* responseHead) { LOG(("HttpChannelChild::BeginNonIPCRedirect [this=%p]\n", this)); nsCOMPtr newChannel; nsresult rv = SetupRedirect(responseURI, responseHead, nsIChannelEventSink::REDIRECT_INTERNAL, getter_AddRefs(newChannel)); if (NS_SUCCEEDED(rv)) { // Ensure that the new channel shares the original channel's security information, // since it won't be provided via IPC. In particular, if the target of this redirect // is a synthesized response that has its own security info, the pre-redirect channel // has already received it and it must be propagated to the post-redirect channel. nsCOMPtr channelChild = do_QueryInterface(newChannel); if (mSecurityInfo && channelChild) { HttpChannelChild* httpChannelChild = static_cast(channelChild.get()); httpChannelChild->OverrideSecurityInfoForNonIPCRedirect(mSecurityInfo); } rv = gHttpHandler->AsyncOnChannelRedirect(this, newChannel, nsIChannelEventSink::REDIRECT_INTERNAL); } if (NS_FAILED(rv)) OnRedirectVerifyCallback(rv); } void HttpChannelChild::OverrideSecurityInfoForNonIPCRedirect(nsISupports* securityInfo) { mResponseCouldBeSynthesized = true; OverrideSecurityInfo(securityInfo); } class Redirect3Event : public ChannelEvent { public: explicit Redirect3Event(HttpChannelChild* child) : mChild(child) {} void Run() { mChild->Redirect3Complete(nullptr); } private: HttpChannelChild* mChild; }; bool HttpChannelChild::RecvRedirect3Complete() { LOG(("HttpChannelChild::RecvRedirect3Complete [this=%p]\n", this)); mEventQ->RunOrEnqueue(new Redirect3Event(this)); return true; } class HttpFlushedForDiversionEvent : public ChannelEvent { public: explicit HttpFlushedForDiversionEvent(HttpChannelChild* aChild) : mChild(aChild) { MOZ_RELEASE_ASSERT(aChild); } void Run() { mChild->FlushedForDiversion(); } private: HttpChannelChild* mChild; }; bool HttpChannelChild::RecvFlushedForDiversion() { LOG(("HttpChannelChild::RecvFlushedForDiversion [this=%p]\n", this)); MOZ_RELEASE_ASSERT(mDivertingToParent); mEventQ->RunOrEnqueue(new HttpFlushedForDiversionEvent(this), true); return true; } void HttpChannelChild::FlushedForDiversion() { LOG(("HttpChannelChild::FlushedForDiversion [this=%p]\n", this)); MOZ_RELEASE_ASSERT(mDivertingToParent); // Once this is set, it should not be unset before HttpChannelChild is taken // down. After it is set, no OnStart/OnData/OnStop callbacks should be // received from the parent channel, nor dequeued from the ChannelEventQueue. mFlushedForDiversion = true; SendDivertComplete(); } bool HttpChannelChild::RecvDivertMessages() { LOG(("HttpChannelChild::RecvDivertMessages [this=%p]\n", this)); MOZ_RELEASE_ASSERT(mDivertingToParent); MOZ_RELEASE_ASSERT(mSuspendCount > 0); // DivertTo() has been called on parent, so we can now start sending queued // IPDL messages back to parent listener. MOZ_RELEASE_ASSERT(NS_SUCCEEDED(Resume())); return true; } // Returns true if has actually completed the redirect and cleaned up the // channel, or false the interception logic kicked in and we need to asyncly // call FinishInterceptedRedirect and CleanupRedirectingChannel. // The argument is an optional OverrideRunnable that we pass to the redirected // channel. bool HttpChannelChild::Redirect3Complete(OverrideRunnable* aRunnable) { LOG(("HttpChannelChild::Redirect3Complete [this=%p]\n", this)); nsresult rv = NS_OK; nsCOMPtr chan = do_QueryInterface(mRedirectChannelChild); RefPtr httpChannelChild = static_cast(chan.get()); // Chrome channel has been AsyncOpen'd. Reflect this in child. if (mRedirectChannelChild) { if (httpChannelChild) { httpChannelChild->mOverrideRunnable = aRunnable; httpChannelChild->mInterceptingChannel = this; } rv = mRedirectChannelChild->CompleteRedirectSetup(mListener, mListenerContext); } if (!httpChannelChild || !httpChannelChild->mShouldParentIntercept) { // The redirect channel either isn't a HttpChannelChild, or the interception // logic wasn't triggered, so we can clean it up right here. CleanupRedirectingChannel(rv); if (httpChannelChild) { httpChannelChild->mOverrideRunnable = nullptr; httpChannelChild->mInterceptingChannel = nullptr; } return true; } return false; } void HttpChannelChild::CleanupRedirectingChannel(nsresult rv) { // Redirecting to new channel: shut this down and init new channel if (mLoadGroup) mLoadGroup->RemoveRequest(this, nullptr, NS_BINDING_ABORTED); if (NS_SUCCEEDED(rv)) { if (mLoadInfo) { mLoadInfo->AppendRedirectedPrincipal(GetURIPrincipal(), false); } } else { NS_WARNING("CompleteRedirectSetup failed, HttpChannelChild already open?"); } // Release ref to new channel. mRedirectChannelChild = nullptr; if (mInterceptListener) { mInterceptListener->Cleanup(); mInterceptListener = nullptr; } } //----------------------------------------------------------------------------- // HttpChannelChild::nsIChildChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::ConnectParent(uint32_t registrarId) { LOG(("HttpChannelChild::ConnectParent [this=%p]\n", this)); mozilla::dom::TabChild* tabChild = nullptr; nsCOMPtr iTabChild; GetCallback(iTabChild); if (iTabChild) { tabChild = static_cast(iTabChild.get()); } if (MissingRequiredTabChild(tabChild, "http")) { return NS_ERROR_ILLEGAL_VALUE; } if (tabChild && !tabChild->IPCOpen()) { return NS_ERROR_FAILURE; } HttpBaseChannel::SetDocshellUserAgentOverride(); // The socket transport in the chrome process now holds a logical ref to us // until OnStopRequest, or we do a redirect, or we hit an IPDL error. AddIPDLReference(); HttpChannelConnectArgs connectArgs(registrarId, mShouldParentIntercept); PBrowserOrId browser = static_cast(gNeckoChild->Manager()) ->GetBrowserOrId(tabChild); if (!gNeckoChild-> SendPHttpChannelConstructor(this, browser, IPC::SerializedLoadContext(this), connectArgs)) { return NS_ERROR_FAILURE; } return NS_OK; } NS_IMETHODIMP HttpChannelChild::CompleteRedirectSetup(nsIStreamListener *listener, nsISupports *aContext) { LOG(("HttpChannelChild::FinishRedirectSetup [this=%p]\n", this)); NS_ENSURE_TRUE(!mIsPending, NS_ERROR_IN_PROGRESS); NS_ENSURE_TRUE(!mWasOpened, NS_ERROR_ALREADY_OPENED); if (mShouldParentIntercept) { // This is a redirected channel, and the corresponding parent channel has started // AsyncOpen but was intercepted and suspended. We must tear it down and start // fresh - we will intercept the child channel this time, before creating a new // parent channel unnecessarily. // Since this method is called from RecvRedirect3Complete which itself is // called from either OnRedirectVerifyCallback via OverrideRunnable, or from // RecvRedirect3Complete. The order of events must always be: // 1. Teardown the IPDL connection // 2. AsyncOpen the connection again // 3. Cleanup the redirecting channel (the one calling Redirect3Complete) // 4. [optional] Call OverrideWithSynthesizedResponse on the redirected // channel if the call came from OverrideRunnable. mInterceptedRedirectListener = listener; mInterceptedRedirectContext = aContext; // This will send a message to the parent notifying it that we are closing // down. After closing the IPC channel, we will proceed to execute // FinishInterceptedRedirect() which AsyncOpen's the channel again. SendFinishInterceptedRedirect(); // XXX valentin: The interception logic should be rewritten to avoid // calling AsyncOpen on the channel _after_ we call Send__delete__() return NS_OK; } /* * No need to check for cancel: we don't get here if nsHttpChannel canceled * before AsyncOpen(); if it's canceled after that, OnStart/Stop will just * get called with error code as usual. So just setup mListener and make the * channel reflect AsyncOpen'ed state. */ mIsPending = true; mWasOpened = true; mListener = listener; mListenerContext = aContext; // add ourselves to the load group. if (mLoadGroup) mLoadGroup->AddRequest(this, nullptr); // We already have an open IPDL connection to the parent. If on-modify-request // listeners or load group observers canceled us, let the parent handle it // and send it back to us naturally. return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIAsyncVerifyRedirectCallback //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::OnRedirectVerifyCallback(nsresult result) { LOG(("HttpChannelChild::OnRedirectVerifyCallback [this=%p]\n", this)); OptionalURIParams redirectURI; nsresult rv; nsCOMPtr newHttpChannel = do_QueryInterface(mRedirectChannelChild); if (NS_SUCCEEDED(result) && !mRedirectChannelChild) { // mRedirectChannelChild doesn't exist means we're redirecting to a protocol // that doesn't implement nsIChildChannel. The redirect result should be set // as failed by veto listeners and shouldn't enter this condition. As the // last resort, we synthesize the error result as NS_ERROR_DOM_BAD_URI here // to let nsHttpChannel::ContinueProcessResponse2 know it's redirecting to // another protocol and throw an error. LOG((" redirecting to a protocol that doesn't implement nsIChildChannel")); result = NS_ERROR_DOM_BAD_URI; } if (newHttpChannel) { // Must not be called until after redirect observers called. newHttpChannel->SetOriginalURI(mOriginalURI); } if (mRedirectingForSubsequentSynthesizedResponse) { nsCOMPtr httpChannelChild = do_QueryInterface(mRedirectChannelChild); RefPtr redirectedChannel = static_cast(httpChannelChild.get()); // redirectChannel will be NULL if mRedirectChannelChild isn't a // nsIHttpChannelChild (it could be a DataChannelChild). RefPtr streamListener = new InterceptStreamListener(redirectedChannel, mListenerContext); NS_DispatchToMainThread(new OverrideRunnable(this, redirectedChannel, streamListener, mSynthesizedInput, mResponseHead)); return NS_OK; } RequestHeaderTuples emptyHeaders; RequestHeaderTuples* headerTuples = &emptyHeaders; nsLoadFlags loadFlags = 0; OptionalCorsPreflightArgs corsPreflightArgs = mozilla::void_t(); nsCOMPtr newHttpChannelChild = do_QueryInterface(mRedirectChannelChild); if (newHttpChannelChild && NS_SUCCEEDED(result)) { newHttpChannelChild->AddCookiesToRequest(); newHttpChannelChild->GetClientSetRequestHeaders(&headerTuples); newHttpChannelChild->GetClientSetCorsPreflightParameters(corsPreflightArgs); } /* If the redirect was canceled, bypass OMR and send an empty API * redirect URI */ SerializeURI(nullptr, redirectURI); if (NS_SUCCEEDED(result)) { // Note: this is where we would notify "http-on-modify-response" observers. // We have deliberately disabled this for child processes (see bug 806753) // // After we verify redirect, nsHttpChannel may hit the network: must give // "http-on-modify-request" observers the chance to cancel before that. //base->CallOnModifyRequestObservers(); nsCOMPtr newHttpChannelInternal = do_QueryInterface(mRedirectChannelChild); if (newHttpChannelInternal) { nsCOMPtr apiRedirectURI; rv = newHttpChannelInternal->GetApiRedirectToURI( getter_AddRefs(apiRedirectURI)); if (NS_SUCCEEDED(rv) && apiRedirectURI) { /* If there was an API redirect of this channel, we need to send it * up here, since it can't be sent via SendAsyncOpen. */ SerializeURI(apiRedirectURI, redirectURI); } } nsCOMPtr request = do_QueryInterface(mRedirectChannelChild); if (request) { request->GetLoadFlags(&loadFlags); } } bool chooseAppcache = false; nsCOMPtr appCacheChannel = do_QueryInterface(newHttpChannel); if (appCacheChannel) { appCacheChannel->GetChooseApplicationCache(&chooseAppcache); } if (mIPCOpen) SendRedirect2Verify(result, *headerTuples, loadFlags, redirectURI, corsPreflightArgs, chooseAppcache); return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIRequest //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::Cancel(nsresult status) { LOG(("HttpChannelChild::Cancel [this=%p]\n", this)); MOZ_ASSERT(NS_IsMainThread()); if (!mCanceled) { // If this cancel occurs before nsHttpChannel has been set up, AsyncOpen // is responsible for cleaning up. mCanceled = true; mStatus = status; if (RemoteChannelExists()) SendCancel(status); if (mSynthesizedResponsePump) { mSynthesizedResponsePump->Cancel(status); } mInterceptListener = nullptr; } return NS_OK; } NS_IMETHODIMP HttpChannelChild::Suspend() { LOG(("HttpChannelChild::Suspend [this=%p, mSuspendCount=%lu, " "mDivertingToParent=%d]\n", this, mSuspendCount+1, mDivertingToParent)); NS_ENSURE_TRUE(RemoteChannelExists() || mInterceptListener, NS_ERROR_NOT_AVAILABLE); // SendSuspend only once, when suspend goes from 0 to 1. // Don't SendSuspend at all if we're diverting callbacks to the parent; // suspend will be called at the correct time in the parent itself. if (!mSuspendCount++ && !mDivertingToParent) { if (RemoteChannelExists()) { SendSuspend(); mSuspendSent = true; } } if (mSynthesizedResponsePump) { mSynthesizedResponsePump->Suspend(); } mEventQ->Suspend(); return NS_OK; } NS_IMETHODIMP HttpChannelChild::Resume() { LOG(("HttpChannelChild::Resume [this=%p, mSuspendCount=%lu, " "mDivertingToParent=%d]\n", this, mSuspendCount-1, mDivertingToParent)); NS_ENSURE_TRUE(RemoteChannelExists() || mInterceptListener, NS_ERROR_NOT_AVAILABLE); NS_ENSURE_TRUE(mSuspendCount > 0, NS_ERROR_UNEXPECTED); nsresult rv = NS_OK; // SendResume only once, when suspend count drops to 0. // Don't SendResume at all if we're diverting callbacks to the parent (unless // suspend was sent earlier); otherwise, resume will be called at the correct // time in the parent itself. if (!--mSuspendCount && (!mDivertingToParent || mSuspendSent)) { if (RemoteChannelExists()) { SendResume(); } if (mCallOnResume) { AsyncCall(mCallOnResume); mCallOnResume = nullptr; } } if (mSynthesizedResponsePump) { mSynthesizedResponsePump->Resume(); } mEventQ->Resume(); return rv; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::GetSecurityInfo(nsISupports **aSecurityInfo) { NS_ENSURE_ARG_POINTER(aSecurityInfo); NS_IF_ADDREF(*aSecurityInfo = mSecurityInfo); return NS_OK; } NS_IMETHODIMP HttpChannelChild::AsyncOpen(nsIStreamListener *listener, nsISupports *aContext) { MOZ_ASSERT(!mLoadInfo || mLoadInfo->GetSecurityMode() == 0 || mLoadInfo->GetInitialSecurityCheckDone() || (mLoadInfo->GetSecurityMode() == nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_DATA_IS_NULL && nsContentUtils::IsSystemPrincipal(mLoadInfo->LoadingPrincipal())), "security flags in loadInfo but asyncOpen2() not called"); LOG(("HttpChannelChild::AsyncOpen [this=%p uri=%s]\n", this, mSpec.get())); #ifdef DEBUG AssertPrivateBrowsingId(); #endif if (mCanceled) return mStatus; NS_ENSURE_TRUE(gNeckoChild != nullptr, NS_ERROR_FAILURE); NS_ENSURE_ARG_POINTER(listener); NS_ENSURE_TRUE(!mIsPending, NS_ERROR_IN_PROGRESS); NS_ENSURE_TRUE(!mWasOpened, NS_ERROR_ALREADY_OPENED); mAsyncOpenTime = TimeStamp::Now(); // Port checked in parent, but duplicate here so we can return with error // immediately nsresult rv; rv = NS_CheckPortSafety(mURI); if (NS_FAILED(rv)) return rv; nsAutoCString cookie; if (NS_SUCCEEDED(mRequestHead.GetHeader(nsHttp::Cookie, cookie))) { mUserSetCookieHeader = cookie; } AddCookiesToRequest(); // // NOTE: From now on we must return NS_OK; all errors must be handled via // OnStart/OnStopRequest // // We notify "http-on-opening-request" observers in the child // process so that devtools can capture a stack trace at the // appropriate spot. See bug 806753 for some information about why // other http-* notifications are disabled in child processes. gHttpHandler->OnOpeningRequest(this); mIsPending = true; mWasOpened = true; mListener = listener; mListenerContext = aContext; // add ourselves to the load group. if (mLoadGroup) mLoadGroup->AddRequest(this, nullptr); if (mCanceled) { // We may have been canceled already, either by on-modify-request // listeners or by load group observers; in that case, don't create IPDL // connection. See nsHttpChannel::AsyncOpen(). AsyncAbort(mStatus); return NS_OK; } // Set user agent override from docshell HttpBaseChannel::SetDocshellUserAgentOverride(); MOZ_ASSERT_IF(mPostRedirectChannelShouldUpgrade, mPostRedirectChannelShouldIntercept); bool shouldUpgrade = mPostRedirectChannelShouldUpgrade; if (mPostRedirectChannelShouldIntercept || ShouldInterceptURI(mURI, shouldUpgrade)) { mResponseCouldBeSynthesized = true; nsCOMPtr controller; GetCallback(controller); mInterceptListener = new InterceptStreamListener(this, mListenerContext); RefPtr intercepted = new InterceptedChannelContent(this, controller, mInterceptListener, shouldUpgrade); intercepted->NotifyController(); return NS_OK; } return ContinueAsyncOpen(); } NS_IMETHODIMP HttpChannelChild::AsyncOpen2(nsIStreamListener *aListener) { nsCOMPtr listener = aListener; nsresult rv = nsContentSecurityManager::doContentSecurityCheck(this, listener); NS_ENSURE_SUCCESS(rv, rv); return AsyncOpen(listener, nullptr); } nsresult HttpChannelChild::ContinueAsyncOpen() { nsCString appCacheClientId; if (mInheritApplicationCache) { // Pick up an application cache from the notification // callbacks if available nsCOMPtr appCacheContainer; GetCallback(appCacheContainer); if (appCacheContainer) { nsCOMPtr appCache; nsresult rv = appCacheContainer->GetApplicationCache(getter_AddRefs(appCache)); if (NS_SUCCEEDED(rv) && appCache) { appCache->GetClientID(appCacheClientId); } } } // // Send request to the chrome process... // mozilla::dom::TabChild* tabChild = nullptr; nsCOMPtr iTabChild; GetCallback(iTabChild); if (iTabChild) { tabChild = static_cast(iTabChild.get()); } if (MissingRequiredTabChild(tabChild, "http")) { return NS_ERROR_ILLEGAL_VALUE; } // This id identifies the inner window's top-level document, // which changes on every new load or navigation. uint64_t contentWindowId = 0; if (tabChild) { MOZ_ASSERT(tabChild->WebNavigation()); nsCOMPtr document = tabChild->GetDocument(); if (document) { contentWindowId = document->InnerWindowID(); } } SetTopLevelContentWindowId(contentWindowId); HttpChannelOpenArgs openArgs; // No access to HttpChannelOpenArgs members, but they each have a // function with the struct name that returns a ref. SerializeURI(mURI, openArgs.uri()); SerializeURI(mOriginalURI, openArgs.original()); SerializeURI(mDocumentURI, openArgs.doc()); SerializeURI(mReferrer, openArgs.referrer()); openArgs.referrerPolicy() = mReferrerPolicy; SerializeURI(mAPIRedirectToURI, openArgs.apiRedirectTo()); openArgs.loadFlags() = mLoadFlags; openArgs.requestHeaders() = mClientSetRequestHeaders; mRequestHead.Method(openArgs.requestMethod()); openArgs.preferredAlternativeType() = mPreferredCachedAltDataType; AutoIPCStream autoStream(openArgs.uploadStream()); if (mUploadStream) { autoStream.Serialize(mUploadStream, ContentChild::GetSingleton()); autoStream.TakeOptionalValue(); } if (mResponseHead) { openArgs.synthesizedResponseHead() = *mResponseHead; openArgs.suspendAfterSynthesizeResponse() = mSuspendParentAfterSynthesizeResponse; } else { openArgs.synthesizedResponseHead() = mozilla::void_t(); openArgs.suspendAfterSynthesizeResponse() = false; } nsCOMPtr secInfoSer = do_QueryInterface(mSecurityInfo); if (secInfoSer) { NS_SerializeToString(secInfoSer, openArgs.synthesizedSecurityInfoSerialization()); } OptionalCorsPreflightArgs optionalCorsPreflightArgs; GetClientSetCorsPreflightParameters(optionalCorsPreflightArgs); // NB: This call forces us to cache mTopWindowURI if we haven't already. nsCOMPtr uri; GetTopWindowURI(getter_AddRefs(uri)); SerializeURI(mTopWindowURI, openArgs.topWindowURI()); openArgs.preflightArgs() = optionalCorsPreflightArgs; openArgs.uploadStreamHasHeaders() = mUploadStreamHasHeaders; openArgs.priority() = mPriority; openArgs.classOfService() = mClassOfService; openArgs.redirectionLimit() = mRedirectionLimit; openArgs.allowPipelining() = mAllowPipelining; openArgs.allowSTS() = mAllowSTS; openArgs.thirdPartyFlags() = mThirdPartyFlags; openArgs.resumeAt() = mSendResumeAt; openArgs.startPos() = mStartPos; openArgs.entityID() = mEntityID; openArgs.chooseApplicationCache() = mChooseApplicationCache; openArgs.appCacheClientID() = appCacheClientId; openArgs.allowSpdy() = mAllowSpdy; openArgs.allowAltSvc() = mAllowAltSvc; openArgs.beConservative() = mBeConservative; openArgs.initialRwin() = mInitialRwin; uint32_t cacheKey = 0; if (mCacheKey) { nsCOMPtr container = do_QueryInterface(mCacheKey); if (!container) { return NS_ERROR_ILLEGAL_VALUE; } nsresult rv = container->GetData(&cacheKey); if (NS_FAILED(rv)) { return rv; } } openArgs.cacheKey() = cacheKey; openArgs.blockAuthPrompt() = mBlockAuthPrompt; openArgs.allowStaleCacheContent() = mAllowStaleCacheContent; openArgs.contentTypeHint() = mContentTypeHint; nsresult rv = mozilla::ipc::LoadInfoToLoadInfoArgs(mLoadInfo, &openArgs.loadInfo()); NS_ENSURE_SUCCESS(rv, rv); EnsureRequestContextID(); char rcid[NSID_LENGTH]; mRequestContextID.ToProvidedString(rcid); openArgs.requestContextID().AssignASCII(rcid); char chid[NSID_LENGTH]; mChannelId.ToProvidedString(chid); openArgs.channelId().AssignASCII(chid); openArgs.contentWindowId() = contentWindowId; if (tabChild && !tabChild->IPCOpen()) { return NS_ERROR_FAILURE; } ContentChild* cc = static_cast(gNeckoChild->Manager()); if (cc->IsShuttingDown()) { return NS_ERROR_FAILURE; } openArgs.launchServiceWorkerStart() = mLaunchServiceWorkerStart; openArgs.launchServiceWorkerEnd() = mLaunchServiceWorkerEnd; openArgs.dispatchFetchEventStart() = mDispatchFetchEventStart; openArgs.dispatchFetchEventEnd() = mDispatchFetchEventEnd; openArgs.handleFetchEventStart() = mHandleFetchEventStart; openArgs.handleFetchEventEnd() = mHandleFetchEventEnd; // The socket transport in the chrome process now holds a logical ref to us // until OnStopRequest, or we do a redirect, or we hit an IPDL error. AddIPDLReference(); PBrowserOrId browser = cc->GetBrowserOrId(tabChild); if (!gNeckoChild->SendPHttpChannelConstructor(this, browser, IPC::SerializedLoadContext(this), openArgs)) { return NS_ERROR_FAILURE; } return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIHttpChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::SetRequestHeader(const nsACString& aHeader, const nsACString& aValue, bool aMerge) { LOG(("HttpChannelChild::SetRequestHeader [this=%p]\n", this)); nsresult rv = HttpBaseChannel::SetRequestHeader(aHeader, aValue, aMerge); if (NS_FAILED(rv)) return rv; RequestHeaderTuple* tuple = mClientSetRequestHeaders.AppendElement(); if (!tuple) return NS_ERROR_OUT_OF_MEMORY; tuple->mHeader = aHeader; tuple->mValue = aValue; tuple->mMerge = aMerge; tuple->mEmpty = false; return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetEmptyRequestHeader(const nsACString& aHeader) { LOG(("HttpChannelChild::SetEmptyRequestHeader [this=%p]\n", this)); nsresult rv = HttpBaseChannel::SetEmptyRequestHeader(aHeader); if (NS_FAILED(rv)) return rv; RequestHeaderTuple* tuple = mClientSetRequestHeaders.AppendElement(); if (!tuple) return NS_ERROR_OUT_OF_MEMORY; tuple->mHeader = aHeader; tuple->mMerge = false; tuple->mEmpty = true; return NS_OK; } NS_IMETHODIMP HttpChannelChild::RedirectTo(nsIURI *newURI) { // disabled until/unless addons run in child or something else needs this return NS_ERROR_NOT_IMPLEMENTED; } NS_IMETHODIMP HttpChannelChild::GetProtocolVersion(nsACString& aProtocolVersion) { aProtocolVersion = mProtocolVersion; return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIHttpChannelInternal //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::SetupFallbackChannel(const char *aFallbackKey) { DROP_DEAD(); } //----------------------------------------------------------------------------- // HttpChannelChild::nsICacheInfoChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::GetCacheTokenExpirationTime(uint32_t *_retval) { NS_ENSURE_ARG_POINTER(_retval); if (!mCacheEntryAvailable) return NS_ERROR_NOT_AVAILABLE; *_retval = mCacheExpirationTime; return NS_OK; } NS_IMETHODIMP HttpChannelChild::GetCacheTokenCachedCharset(nsACString &_retval) { if (!mCacheEntryAvailable) return NS_ERROR_NOT_AVAILABLE; _retval = mCachedCharset; return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetCacheTokenCachedCharset(const nsACString &aCharset) { if (!mCacheEntryAvailable || !RemoteChannelExists()) return NS_ERROR_NOT_AVAILABLE; mCachedCharset = aCharset; if (!SendSetCacheTokenCachedCharset(PromiseFlatCString(aCharset))) { return NS_ERROR_FAILURE; } return NS_OK; } NS_IMETHODIMP HttpChannelChild::IsFromCache(bool *value) { if (!mIsPending) return NS_ERROR_NOT_AVAILABLE; *value = mIsFromCache; return NS_OK; } NS_IMETHODIMP HttpChannelChild::GetCacheKey(nsISupports **cacheKey) { NS_IF_ADDREF(*cacheKey = mCacheKey); return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetCacheKey(nsISupports *cacheKey) { ENSURE_CALLED_BEFORE_ASYNC_OPEN(); mCacheKey = cacheKey; return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetAllowStaleCacheContent(bool aAllowStaleCacheContent) { mAllowStaleCacheContent = aAllowStaleCacheContent; return NS_OK; } NS_IMETHODIMP HttpChannelChild::GetAllowStaleCacheContent(bool *aAllowStaleCacheContent) { NS_ENSURE_ARG(aAllowStaleCacheContent); *aAllowStaleCacheContent = mAllowStaleCacheContent; return NS_OK; } NS_IMETHODIMP HttpChannelChild::PreferAlternativeDataType(const nsACString & aType) { ENSURE_CALLED_BEFORE_ASYNC_OPEN(); mPreferredCachedAltDataType = aType; return NS_OK; } NS_IMETHODIMP HttpChannelChild::GetAlternativeDataType(nsACString & aType) { // Must be called during or after OnStartRequest if (!mAfterOnStartRequestBegun) { return NS_ERROR_NOT_AVAILABLE; } aType = mAvailableCachedAltDataType; return NS_OK; } NS_IMETHODIMP HttpChannelChild::OpenAlternativeOutputStream(const nsACString & aType, nsIOutputStream * *_retval) { MOZ_ASSERT(NS_IsMainThread(), "Main thread only"); RefPtr stream = static_cast(gNeckoChild->SendPAltDataOutputStreamConstructor(nsCString(aType), this)); stream.forget(_retval); return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIResumableChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::ResumeAt(uint64_t startPos, const nsACString& entityID) { LOG(("HttpChannelChild::ResumeAt [this=%p]\n", this)); ENSURE_CALLED_BEFORE_CONNECT(); mStartPos = startPos; mEntityID = entityID; mSendResumeAt = true; return NS_OK; } // GetEntityID is shared in HttpBaseChannel //----------------------------------------------------------------------------- // HttpChannelChild::nsISupportsPriority //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::SetPriority(int32_t aPriority) { int16_t newValue = clamped(aPriority, INT16_MIN, INT16_MAX); if (mPriority == newValue) return NS_OK; mPriority = newValue; if (RemoteChannelExists()) SendSetPriority(mPriority); return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIClassOfService //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::SetClassFlags(uint32_t inFlags) { if (mClassOfService == inFlags) { return NS_OK; } mClassOfService = inFlags; if (RemoteChannelExists()) { SendSetClassOfService(mClassOfService); } return NS_OK; } NS_IMETHODIMP HttpChannelChild::AddClassFlags(uint32_t inFlags) { mClassOfService |= inFlags; if (RemoteChannelExists()) { SendSetClassOfService(mClassOfService); } return NS_OK; } NS_IMETHODIMP HttpChannelChild::ClearClassFlags(uint32_t inFlags) { mClassOfService &= ~inFlags; if (RemoteChannelExists()) { SendSetClassOfService(mClassOfService); } return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIProxiedChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::GetProxyInfo(nsIProxyInfo **aProxyInfo) { DROP_DEAD(); } //----------------------------------------------------------------------------- // HttpChannelChild::nsIApplicationCacheContainer //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::GetApplicationCache(nsIApplicationCache **aApplicationCache) { NS_IF_ADDREF(*aApplicationCache = mApplicationCache); return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetApplicationCache(nsIApplicationCache *aApplicationCache) { NS_ENSURE_TRUE(!mWasOpened, NS_ERROR_ALREADY_OPENED); mApplicationCache = aApplicationCache; return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIApplicationCacheChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::GetApplicationCacheForWrite(nsIApplicationCache **aApplicationCache) { *aApplicationCache = nullptr; return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetApplicationCacheForWrite(nsIApplicationCache *aApplicationCache) { NS_ENSURE_TRUE(!mWasOpened, NS_ERROR_ALREADY_OPENED); // Child channels are not intended to be used for cache writes return NS_ERROR_NOT_IMPLEMENTED; } NS_IMETHODIMP HttpChannelChild::GetLoadedFromApplicationCache(bool *aLoadedFromApplicationCache) { *aLoadedFromApplicationCache = mLoadedFromApplicationCache; return NS_OK; } NS_IMETHODIMP HttpChannelChild::GetInheritApplicationCache(bool *aInherit) { *aInherit = mInheritApplicationCache; return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetInheritApplicationCache(bool aInherit) { mInheritApplicationCache = aInherit; return NS_OK; } NS_IMETHODIMP HttpChannelChild::GetChooseApplicationCache(bool *aChoose) { *aChoose = mChooseApplicationCache; return NS_OK; } NS_IMETHODIMP HttpChannelChild::SetChooseApplicationCache(bool aChoose) { mChooseApplicationCache = aChoose; return NS_OK; } NS_IMETHODIMP HttpChannelChild::MarkOfflineCacheEntryAsForeign() { SendMarkOfflineCacheEntryAsForeign(); return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIAssociatedContentSecurity //----------------------------------------------------------------------------- bool HttpChannelChild::GetAssociatedContentSecurity( nsIAssociatedContentSecurity** _result) { if (!mSecurityInfo) return false; nsCOMPtr assoc = do_QueryInterface(mSecurityInfo); if (!assoc) return false; if (_result) assoc.forget(_result); return true; } NS_IMETHODIMP HttpChannelChild::GetCountSubRequestsBrokenSecurity( int32_t *aSubRequestsBrokenSecurity) { nsCOMPtr assoc; if (!GetAssociatedContentSecurity(getter_AddRefs(assoc))) return NS_OK; return assoc->GetCountSubRequestsBrokenSecurity(aSubRequestsBrokenSecurity); } NS_IMETHODIMP HttpChannelChild::SetCountSubRequestsBrokenSecurity( int32_t aSubRequestsBrokenSecurity) { nsCOMPtr assoc; if (!GetAssociatedContentSecurity(getter_AddRefs(assoc))) return NS_OK; return assoc->SetCountSubRequestsBrokenSecurity(aSubRequestsBrokenSecurity); } NS_IMETHODIMP HttpChannelChild::GetCountSubRequestsNoSecurity(int32_t *aSubRequestsNoSecurity) { nsCOMPtr assoc; if (!GetAssociatedContentSecurity(getter_AddRefs(assoc))) return NS_OK; return assoc->GetCountSubRequestsNoSecurity(aSubRequestsNoSecurity); } NS_IMETHODIMP HttpChannelChild::SetCountSubRequestsNoSecurity(int32_t aSubRequestsNoSecurity) { nsCOMPtr assoc; if (!GetAssociatedContentSecurity(getter_AddRefs(assoc))) return NS_OK; return assoc->SetCountSubRequestsNoSecurity(aSubRequestsNoSecurity); } NS_IMETHODIMP HttpChannelChild::Flush() { nsCOMPtr assoc; if (!GetAssociatedContentSecurity(getter_AddRefs(assoc))) return NS_OK; nsresult rv; int32_t broken, no; rv = assoc->GetCountSubRequestsBrokenSecurity(&broken); NS_ENSURE_SUCCESS(rv, rv); rv = assoc->GetCountSubRequestsNoSecurity(&no); NS_ENSURE_SUCCESS(rv, rv); if (mIPCOpen) SendUpdateAssociatedContentSecurity(broken, no); return NS_OK; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIHttpChannelChild //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::AddCookiesToRequest() { HttpBaseChannel::AddCookiesToRequest(); return NS_OK; } NS_IMETHODIMP HttpChannelChild::GetClientSetRequestHeaders(RequestHeaderTuples **aRequestHeaders) { *aRequestHeaders = &mClientSetRequestHeaders; return NS_OK; } void HttpChannelChild::GetClientSetCorsPreflightParameters(OptionalCorsPreflightArgs& aArgs) { if (mRequireCORSPreflight) { CorsPreflightArgs args; args.unsafeHeaders() = mUnsafeHeaders; aArgs = args; } else { aArgs = mozilla::void_t(); } } NS_IMETHODIMP HttpChannelChild::RemoveCorsPreflightCacheEntry(nsIURI* aURI, nsIPrincipal* aPrincipal) { URIParams uri; SerializeURI(aURI, uri); PrincipalInfo principalInfo; nsresult rv = PrincipalToPrincipalInfo(aPrincipal, &principalInfo); if (NS_WARN_IF(NS_FAILED(rv))) { return rv; } bool result = false; // Be careful to not attempt to send a message to the parent after the // actor has been destroyed. if (mIPCOpen) { result = SendRemoveCorsPreflightCacheEntry(uri, principalInfo); } return result ? NS_OK : NS_ERROR_FAILURE; } //----------------------------------------------------------------------------- // HttpChannelChild::nsIDivertableChannel //----------------------------------------------------------------------------- NS_IMETHODIMP HttpChannelChild::DivertToParent(ChannelDiverterChild **aChild) { LOG(("HttpChannelChild::DivertToParent [this=%p]\n", this)); MOZ_RELEASE_ASSERT(aChild); MOZ_RELEASE_ASSERT(gNeckoChild); MOZ_RELEASE_ASSERT(!mDivertingToParent); nsresult rv = NS_OK; // If the channel was intercepted, then we likely do not have an IPC actor // yet. We need one, though, in order to have a parent side to divert to. // Therefore, create the actor just in time for us to suspend and divert it. if (mSynthesizedResponse && !RemoteChannelExists()) { mSuspendParentAfterSynthesizeResponse = true; rv = ContinueAsyncOpen(); NS_ENSURE_SUCCESS(rv, rv); } // We must fail DivertToParent() if there's no parent end of the channel (and // won't be!) due to early failure. if (NS_FAILED(mStatus) && !RemoteChannelExists()) { return mStatus; } // Once this is set, it should not be unset before the child is taken down. mDivertingToParent = true; rv = Suspend(); if (NS_WARN_IF(NS_FAILED(rv))) { return rv; } HttpChannelDiverterArgs args; args.mChannelChild() = this; args.mApplyConversion() = mApplyConversion; PChannelDiverterChild* diverter = gNeckoChild->SendPChannelDiverterConstructor(args); MOZ_RELEASE_ASSERT(diverter); *aChild = static_cast(diverter); return NS_OK; } NS_IMETHODIMP HttpChannelChild::UnknownDecoderInvolvedKeepData() { LOG(("HttpChannelChild::UnknownDecoderInvolvedKeepData [this=%p]", this)); mUnknownDecoderInvolved = true; return NS_OK; } NS_IMETHODIMP HttpChannelChild::UnknownDecoderInvolvedOnStartRequestCalled() { LOG(("HttpChannelChild::UnknownDecoderInvolvedOnStartRequestCalled " "[this=%p, mDivertingToParent=%d]", this, mDivertingToParent)); mUnknownDecoderInvolved = false; nsresult rv = NS_OK; if (mDivertingToParent) { rv = mEventQ->PrependEvents(mUnknownDecoderEventQ); } mUnknownDecoderEventQ.Clear(); return rv; } NS_IMETHODIMP HttpChannelChild::GetDivertingToParent(bool* aDiverting) { NS_ENSURE_ARG_POINTER(aDiverting); *aDiverting = mDivertingToParent; return NS_OK; } void HttpChannelChild::ResetInterception() { NS_ENSURE_TRUE_VOID(gNeckoChild != nullptr); if (mInterceptListener) { mInterceptListener->Cleanup(); } mInterceptListener = nullptr; // The chance to intercept any further requests associated with this channel // (such as redirects) has passed. mLoadFlags |= LOAD_BYPASS_SERVICE_WORKER; // Continue with the original cross-process request nsresult rv = ContinueAsyncOpen(); if (NS_WARN_IF(NS_FAILED(rv))) { AsyncAbort(rv); } } NS_IMETHODIMP HttpChannelChild::GetResponseSynthesized(bool* aSynthesized) { NS_ENSURE_ARG_POINTER(aSynthesized); *aSynthesized = mSynthesizedResponse; return NS_OK; } void HttpChannelChild::OverrideWithSynthesizedResponse(nsAutoPtr& aResponseHead, nsIInputStream* aSynthesizedInput, InterceptStreamListener* aStreamListener) { mInterceptListener = aStreamListener; // Intercepted responses should already be decoded. If its a redirect, // however, we want to respect the encoding of the final result instead. if (!WillRedirect(aResponseHead)) { SetApplyConversion(false); } mResponseHead = aResponseHead; mSynthesizedResponse = true; if (WillRedirect(mResponseHead)) { mShouldInterceptSubsequentRedirect = true; // Continue with the original cross-process request nsresult rv = ContinueAsyncOpen(); if (NS_WARN_IF(NS_FAILED(rv))) { AsyncAbort(rv); } return; } // In our current implementation, the FetchEvent handler will copy the // response stream completely into the pipe backing the input stream so we // can treat the available as the length of the stream. uint64_t available; nsresult rv = aSynthesizedInput->Available(&available); if (NS_WARN_IF(NS_FAILED(rv))) { mSynthesizedStreamLength = -1; } else { mSynthesizedStreamLength = int64_t(available); } rv = nsInputStreamPump::Create(getter_AddRefs(mSynthesizedResponsePump), aSynthesizedInput, int64_t(-1), int64_t(-1), 0, 0, true); if (NS_WARN_IF(NS_FAILED(rv))) { aSynthesizedInput->Close(); return; } rv = mSynthesizedResponsePump->AsyncRead(aStreamListener, nullptr); NS_ENSURE_SUCCESS_VOID(rv); // if this channel has been suspended previously, the pump needs to be // correspondingly suspended now that it exists. for (uint32_t i = 0; i < mSuspendCount; i++) { rv = mSynthesizedResponsePump->Suspend(); NS_ENSURE_SUCCESS_VOID(rv); } if (mCanceled) { mSynthesizedResponsePump->Cancel(mStatus); } } NS_IMETHODIMP HttpChannelChild::ForceIntercepted(bool aPostRedirectChannelShouldIntercept, bool aPostRedirectChannelShouldUpgrade) { mShouldParentIntercept = true; mPostRedirectChannelShouldIntercept = aPostRedirectChannelShouldIntercept; mPostRedirectChannelShouldUpgrade = aPostRedirectChannelShouldUpgrade; return NS_OK; } NS_IMETHODIMP HttpChannelChild::ForceIntercepted(uint64_t aInterceptionID) { return NS_ERROR_NOT_IMPLEMENTED; } void HttpChannelChild::ForceIntercepted(nsIInputStream* aSynthesizedInput) { mSynthesizedInput = aSynthesizedInput; mSynthesizedResponse = true; mRedirectingForSubsequentSynthesizedResponse = true; } bool HttpChannelChild::RecvIssueDeprecationWarning(const uint32_t& warning, const bool& asError) { nsCOMPtr warner; GetCallback(warner); if (warner) { warner->IssueWarning(warning, asError); } return true; } bool HttpChannelChild::ShouldInterceptURI(nsIURI* aURI, bool& aShouldUpgrade) { bool isHttps = false; nsresult rv = aURI->SchemeIs("https", &isHttps); NS_ENSURE_SUCCESS(rv, false); nsCOMPtr resultPrincipal; if (!isHttps && mLoadInfo) { nsContentUtils::GetSecurityManager()-> GetChannelResultPrincipal(this, getter_AddRefs(resultPrincipal)); } rv = NS_ShouldSecureUpgrade(aURI, mLoadInfo, resultPrincipal, mPrivateBrowsing, mAllowSTS, aShouldUpgrade); NS_ENSURE_SUCCESS(rv, false); nsCOMPtr upgradedURI; if (aShouldUpgrade) { rv = NS_GetSecureUpgradedURI(aURI, getter_AddRefs(upgradedURI)); NS_ENSURE_SUCCESS(rv, false); } return ShouldIntercept(upgradedURI ? upgradedURI.get() : aURI); } } // namespace net } // namespace mozilla