forked from mirrors/gecko-dev
		
	mChannel might be null if download failure occurs right after receiving `quit-application` event. Differential Revision: https://phabricator.services.mozilla.com/D156281
		
			
				
	
	
		
			880 lines
		
	
	
	
		
			29 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			880 lines
		
	
	
	
		
			29 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
//* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
 | 
						|
/* This Source Code Form is subject to the terms of the Mozilla Public
 | 
						|
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 | 
						|
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 | 
						|
 | 
						|
#include "mozilla/Components.h"
 | 
						|
#include "nsCRT.h"
 | 
						|
#include "nsIHttpChannel.h"
 | 
						|
#include "nsIObserverService.h"
 | 
						|
#include "nsIStringStream.h"
 | 
						|
#include "nsIUploadChannel.h"
 | 
						|
#include "nsIURI.h"
 | 
						|
#include "nsIUrlClassifierDBService.h"
 | 
						|
#include "nsIUrlClassifierRemoteSettingsService.h"
 | 
						|
#include "nsUrlClassifierUtils.h"
 | 
						|
#include "nsNetUtil.h"
 | 
						|
#include "nsStreamUtils.h"
 | 
						|
#include "nsStringStream.h"
 | 
						|
#include "nsUrlClassifierStreamUpdater.h"
 | 
						|
#include "mozilla/ErrorNames.h"
 | 
						|
#include "mozilla/Logging.h"
 | 
						|
#include "nsIInterfaceRequestor.h"
 | 
						|
#include "mozilla/Telemetry.h"
 | 
						|
#include "nsContentUtils.h"
 | 
						|
#include "nsIURLFormatter.h"
 | 
						|
#include "Classifier.h"
 | 
						|
#include "UrlClassifierTelemetryUtils.h"
 | 
						|
#include "mozilla/StaticPrefs_urlclassifier.h"
 | 
						|
 | 
						|
using namespace mozilla::safebrowsing;
 | 
						|
using namespace mozilla;
 | 
						|
 | 
						|
#define MIN_TIMEOUT_MS (60 * 1000)
 | 
						|
 | 
						|
static const char* gQuitApplicationMessage = "quit-application";
 | 
						|
 | 
						|
// Limit the list file size to 32mb
 | 
						|
const uint32_t MAX_FILE_SIZE = (32 * 1024 * 1024);
 | 
						|
 | 
						|
// Retry delay when we failed to DownloadUpdate() if due to
 | 
						|
// DBService busy.
 | 
						|
const uint32_t FETCH_NEXT_REQUEST_RETRY_DELAY_MS = 1000;
 | 
						|
 | 
						|
#undef LOG
 | 
						|
 | 
						|
// MOZ_LOG=UrlClassifierStreamUpdater:5
 | 
						|
static mozilla::LazyLogModule gUrlClassifierStreamUpdaterLog(
 | 
						|
    "UrlClassifierStreamUpdater");
 | 
						|
#define LOG(args) TrimAndLog args
 | 
						|
#define LOG_ENABLED() \
 | 
						|
  MOZ_LOG_TEST(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Debug)
 | 
						|
 | 
						|
// Calls nsIURLFormatter::TrimSensitiveURLs to remove sensitive
 | 
						|
// info from the logging message.
 | 
						|
static MOZ_FORMAT_PRINTF(1, 2) void TrimAndLog(const char* aFmt, ...) {
 | 
						|
  nsString raw;
 | 
						|
 | 
						|
  va_list ap;
 | 
						|
  va_start(ap, aFmt);
 | 
						|
  raw.AppendVprintf(aFmt, ap);
 | 
						|
  va_end(ap);
 | 
						|
 | 
						|
  nsCOMPtr<nsIURLFormatter> urlFormatter =
 | 
						|
      do_GetService("@mozilla.org/toolkit/URLFormatterService;1");
 | 
						|
 | 
						|
  nsString trimmed;
 | 
						|
  nsresult rv = urlFormatter->TrimSensitiveURLs(raw, trimmed);
 | 
						|
  if (NS_FAILED(rv)) {
 | 
						|
    trimmed.Truncate();
 | 
						|
  }
 | 
						|
 | 
						|
  // Use %s so we aren't exposing random strings to printf interpolation.
 | 
						|
  MOZ_LOG(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Debug,
 | 
						|
          ("%s", NS_ConvertUTF16toUTF8(trimmed).get()));
 | 
						|
}
 | 
						|
 | 
						|
// This class does absolutely nothing, except pass requests onto the DBService.
 | 
						|
 | 
						|
///////////////////////////////////////////////////////////////////////////////
 | 
						|
// nsIUrlClassiferStreamUpdater implementation
 | 
						|
// Handles creating/running the stream listener
 | 
						|
 | 
						|
nsUrlClassifierStreamUpdater::nsUrlClassifierStreamUpdater()
 | 
						|
    : mIsUpdating(false),
 | 
						|
      mInitialized(false),
 | 
						|
      mDownloadError(false),
 | 
						|
      mBeganStream(false),
 | 
						|
      mChannel(nullptr),
 | 
						|
      mTelemetryClockStart(0) {
 | 
						|
  LOG(("nsUrlClassifierStreamUpdater init [this=%p]", this));
 | 
						|
}
 | 
						|
 | 
						|
NS_IMPL_ISUPPORTS(nsUrlClassifierStreamUpdater, nsIUrlClassifierStreamUpdater,
 | 
						|
                  nsIUrlClassifierUpdateObserver, nsIRequestObserver,
 | 
						|
                  nsIStreamListener, nsIObserver, nsIInterfaceRequestor,
 | 
						|
                  nsITimerCallback, nsINamed)
 | 
						|
 | 
						|
/**
 | 
						|
 * Clear out the update.
 | 
						|
 */
 | 
						|
void nsUrlClassifierStreamUpdater::DownloadDone() {
 | 
						|
  LOG(("nsUrlClassifierStreamUpdater::DownloadDone [this=%p]", this));
 | 
						|
  mIsUpdating = false;
 | 
						|
 | 
						|
  mPendingUpdates.Clear();
 | 
						|
  mDownloadError = false;
 | 
						|
  mCurrentRequest = nullptr;
 | 
						|
}
 | 
						|
 | 
						|
///////////////////////////////////////////////////////////////////////////////
 | 
						|
// nsIUrlClassifierStreamUpdater implementation
 | 
						|
 | 
						|
nsresult nsUrlClassifierStreamUpdater::FetchUpdate(
 | 
						|
    nsIURI* aUpdateUrl, const nsACString& aRequestPayload, bool aIsPostRequest,
 | 
						|
    const nsACString& aStreamTable) {
 | 
						|
  mBeganStream = false;
 | 
						|
  nsresult rv;
 | 
						|
  // moz-sbrs is a customed scheme used by Safe Browsing. When the scheme is
 | 
						|
  // present in the update url, we'll fetch the data from
 | 
						|
  // UrlClassifierRemoteSettingsService.
 | 
						|
  if (aUpdateUrl->SchemeIs("moz-sbrs")) {
 | 
						|
#ifdef DEBUG
 | 
						|
    LOG(("Fetching update %s from RemoteSettings", aRequestPayload.Data()));
 | 
						|
#endif
 | 
						|
    nsCOMPtr<nsIUrlClassifierRemoteSettingsService> rsService =
 | 
						|
        do_GetService("@mozilla.org/url-classifier/list-service;1");
 | 
						|
    if (!rsService) {
 | 
						|
      return NS_ERROR_FAILURE;
 | 
						|
    }
 | 
						|
 | 
						|
    rv = rsService->FetchList(aRequestPayload, this);
 | 
						|
    if (NS_WARN_IF(NS_FAILED(rv))) {
 | 
						|
      return rv;
 | 
						|
    }
 | 
						|
  } else {
 | 
						|
#ifdef DEBUG
 | 
						|
    LOG(("Fetching update %s from %s", aRequestPayload.Data(),
 | 
						|
         aUpdateUrl->GetSpecOrDefault().get()));
 | 
						|
#endif
 | 
						|
    uint32_t loadFlags = nsIChannel::INHIBIT_CACHING |
 | 
						|
                         nsIChannel::LOAD_BYPASS_CACHE |
 | 
						|
                         nsIChannel::LOAD_BYPASS_URL_CLASSIFIER;
 | 
						|
 | 
						|
    // SafeBrowsing update request should never be classified to make sure
 | 
						|
    // we can recover from a bad SafeBrowsing database.
 | 
						|
    rv = NS_NewChannel(getter_AddRefs(mChannel), aUpdateUrl,
 | 
						|
                       nsContentUtils::GetSystemPrincipal(),
 | 
						|
                       nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL,
 | 
						|
                       nsIContentPolicy::TYPE_OTHER,
 | 
						|
                       nullptr,  // nsICookieJarSettings
 | 
						|
                       nullptr,  // aPerformanceStorage
 | 
						|
                       nullptr,  // aLoadGroup
 | 
						|
                       this,     // aInterfaceRequestor
 | 
						|
                       loadFlags);
 | 
						|
 | 
						|
    NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
    nsCOMPtr<nsILoadInfo> loadInfo = mChannel->LoadInfo();
 | 
						|
    mozilla::OriginAttributes attrs;
 | 
						|
    attrs.mFirstPartyDomain.AssignLiteral(
 | 
						|
        NECKO_SAFEBROWSING_FIRST_PARTY_DOMAIN);
 | 
						|
    loadInfo->SetOriginAttributes(attrs);
 | 
						|
    // allow deprecated HTTP request from SystemPrincipal
 | 
						|
    loadInfo->SetAllowDeprecatedSystemRequests(true);
 | 
						|
 | 
						|
    if (!aIsPostRequest) {
 | 
						|
      // We use POST method to send our request in v2. In v4, the request
 | 
						|
      // needs to be embedded to the URL and use GET method to send.
 | 
						|
      // However, from the Chromium source code, a extended HTTP header has
 | 
						|
      // to be sent along with the request to make the request succeed.
 | 
						|
      // The following description is from Chromium source code:
 | 
						|
      //
 | 
						|
      // "The following header informs the envelope server (which sits in
 | 
						|
      // front of Google's stubby server) that the received GET request should
 | 
						|
      // be interpreted as a POST."
 | 
						|
      //
 | 
						|
      nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel, &rv);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
      rv = httpChannel->SetRequestHeader("X-HTTP-Method-Override"_ns, "POST"_ns,
 | 
						|
                                         false);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
    } else if (!aRequestPayload.IsEmpty()) {
 | 
						|
      rv = AddRequestBody(aRequestPayload);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
    }
 | 
						|
 | 
						|
    // Set the appropriate content type for file/data URIs, for unit testing
 | 
						|
    // purposes.
 | 
						|
    // This is only used for testing and should be deleted.
 | 
						|
    if (aUpdateUrl->SchemeIs("file") || aUpdateUrl->SchemeIs("data")) {
 | 
						|
      mChannel->SetContentType("application/vnd.google.safebrowsing-update"_ns);
 | 
						|
    } else {
 | 
						|
      // We assume everything else is an HTTP request.
 | 
						|
 | 
						|
      // Disable keepalive.
 | 
						|
      nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel, &rv);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
      rv = httpChannel->SetRequestHeader("Connection"_ns, "close"_ns, false);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
    }
 | 
						|
 | 
						|
    // Make the request.
 | 
						|
    rv = mChannel->AsyncOpen(this);
 | 
						|
    NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
  }
 | 
						|
 | 
						|
  mTelemetryClockStart = PR_IntervalNow();
 | 
						|
  mStreamTable = aStreamTable;
 | 
						|
 | 
						|
  if (StaticPrefs::urlclassifier_update_response_timeout_ms() >
 | 
						|
      StaticPrefs::urlclassifier_update_timeout_ms()) {
 | 
						|
    NS_WARNING(
 | 
						|
        "Safe Browsing response timeout is greater than the general "
 | 
						|
        "timeout. Disabling these update timeouts.");
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
  MOZ_TRY_VAR(mResponseTimeoutTimer,
 | 
						|
              NS_NewTimerWithCallback(
 | 
						|
                  this, StaticPrefs::urlclassifier_update_response_timeout_ms(),
 | 
						|
                  nsITimer::TYPE_ONE_SHOT));
 | 
						|
 | 
						|
  MOZ_TRY_VAR(mTimeoutTimer,
 | 
						|
              NS_NewTimerWithCallback(
 | 
						|
                  this, StaticPrefs::urlclassifier_update_timeout_ms(),
 | 
						|
                  nsITimer::TYPE_ONE_SHOT));
 | 
						|
 | 
						|
  if (StaticPrefs::urlclassifier_update_timeout_ms() < MIN_TIMEOUT_MS) {
 | 
						|
    LOG(("Download update timeout %d ms (< %d ms) would be too small",
 | 
						|
         StaticPrefs::urlclassifier_update_timeout_ms(), MIN_TIMEOUT_MS));
 | 
						|
  }
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
nsresult nsUrlClassifierStreamUpdater::FetchUpdate(
 | 
						|
    const nsACString& aUpdateUrl, const nsACString& aRequestPayload,
 | 
						|
    bool aIsPostRequest, const nsACString& aStreamTable) {
 | 
						|
  LOG(("(pre) Fetching update from %s\n",
 | 
						|
       PromiseFlatCString(aUpdateUrl).get()));
 | 
						|
 | 
						|
  nsCString updateUrl(aUpdateUrl);
 | 
						|
  if (!aIsPostRequest) {
 | 
						|
    updateUrl.AppendPrintf("&$req=%s", nsCString(aRequestPayload).get());
 | 
						|
  }
 | 
						|
 | 
						|
  nsCOMPtr<nsIURI> uri;
 | 
						|
  nsresult rv = NS_NewURI(getter_AddRefs(uri), updateUrl);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  nsAutoCString urlSpec;
 | 
						|
  uri->GetAsciiSpec(urlSpec);
 | 
						|
 | 
						|
  LOG(("(post) Fetching update from %s\n", urlSpec.get()));
 | 
						|
 | 
						|
  return FetchUpdate(uri, aRequestPayload, aIsPostRequest, aStreamTable);
 | 
						|
}
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::DownloadUpdates(
 | 
						|
    const nsACString& aRequestTables, const nsACString& aRequestPayload,
 | 
						|
    bool aIsPostRequest, const nsACString& aUpdateUrl,
 | 
						|
    nsIUrlClassifierCallback* aSuccessCallback,
 | 
						|
    nsIUrlClassifierCallback* aUpdateErrorCallback,
 | 
						|
    nsIUrlClassifierCallback* aDownloadErrorCallback, bool* _retval) {
 | 
						|
  NS_ENSURE_ARG(aSuccessCallback);
 | 
						|
  NS_ENSURE_ARG(aUpdateErrorCallback);
 | 
						|
  NS_ENSURE_ARG(aDownloadErrorCallback);
 | 
						|
 | 
						|
  if (mIsUpdating) {
 | 
						|
    LOG(("Already updating, queueing update %s from %s", aRequestPayload.Data(),
 | 
						|
         aUpdateUrl.Data()));
 | 
						|
    *_retval = false;
 | 
						|
    UpdateRequest* request = mPendingRequests.AppendElement(fallible);
 | 
						|
    if (!request) {
 | 
						|
      return NS_ERROR_OUT_OF_MEMORY;
 | 
						|
    }
 | 
						|
    BuildUpdateRequest(aRequestTables, aRequestPayload, aIsPostRequest,
 | 
						|
                       aUpdateUrl, aSuccessCallback, aUpdateErrorCallback,
 | 
						|
                       aDownloadErrorCallback, request);
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  if (aUpdateUrl.IsEmpty()) {
 | 
						|
    NS_ERROR("updateUrl not set");
 | 
						|
    return NS_ERROR_NOT_INITIALIZED;
 | 
						|
  }
 | 
						|
 | 
						|
  nsresult rv;
 | 
						|
 | 
						|
  if (!mInitialized) {
 | 
						|
    // Add an observer for shutdown so we can cancel any pending list
 | 
						|
    // downloads.  quit-application is the same event that the download
 | 
						|
    // manager listens for and uses to cancel pending downloads.
 | 
						|
    nsCOMPtr<nsIObserverService> observerService =
 | 
						|
        mozilla::services::GetObserverService();
 | 
						|
    if (!observerService) return NS_ERROR_FAILURE;
 | 
						|
 | 
						|
    observerService->AddObserver(this, gQuitApplicationMessage, false);
 | 
						|
 | 
						|
    mDBService = mozilla::components::UrlClassifierDB::Service(&rv);
 | 
						|
    NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
    mInitialized = true;
 | 
						|
  }
 | 
						|
 | 
						|
  rv = mDBService->BeginUpdate(this, aRequestTables);
 | 
						|
  if (rv == NS_ERROR_NOT_AVAILABLE) {
 | 
						|
    LOG(("Service busy, already updating, queuing update %s from %s",
 | 
						|
         aRequestPayload.Data(), aUpdateUrl.Data()));
 | 
						|
    *_retval = false;
 | 
						|
    UpdateRequest* request = mPendingRequests.AppendElement(fallible);
 | 
						|
    if (!request) {
 | 
						|
      return NS_ERROR_OUT_OF_MEMORY;
 | 
						|
    }
 | 
						|
    BuildUpdateRequest(aRequestTables, aRequestPayload, aIsPostRequest,
 | 
						|
                       aUpdateUrl, aSuccessCallback, aUpdateErrorCallback,
 | 
						|
                       aDownloadErrorCallback, request);
 | 
						|
 | 
						|
    // We cannot guarantee that we will be notified when DBService is done
 | 
						|
    // processing the current update, so we fire a retry timer on our own.
 | 
						|
    MOZ_TRY_VAR(mFetchNextRequestTimer,
 | 
						|
                NS_NewTimerWithCallback(this, FETCH_NEXT_REQUEST_RETRY_DELAY_MS,
 | 
						|
                                        nsITimer::TYPE_ONE_SHOT));
 | 
						|
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  if (NS_FAILED(rv)) {
 | 
						|
    return rv;
 | 
						|
  }
 | 
						|
 | 
						|
  nsUrlClassifierUtils* urlUtil = nsUrlClassifierUtils::GetInstance();
 | 
						|
  if (NS_WARN_IF(!urlUtil)) {
 | 
						|
    return NS_ERROR_FAILURE;
 | 
						|
  }
 | 
						|
 | 
						|
  nsTArray<nsCString> tables;
 | 
						|
  mozilla::safebrowsing::Classifier::SplitTables(aRequestTables, tables);
 | 
						|
  urlUtil->GetTelemetryProvider(tables.SafeElementAt(0, ""_ns),
 | 
						|
                                mTelemetryProvider);
 | 
						|
 | 
						|
  mCurrentRequest = MakeUnique<UpdateRequest>();
 | 
						|
  BuildUpdateRequest(aRequestTables, aRequestPayload, aIsPostRequest,
 | 
						|
                     aUpdateUrl, aSuccessCallback, aUpdateErrorCallback,
 | 
						|
                     aDownloadErrorCallback, mCurrentRequest.get());
 | 
						|
 | 
						|
  mIsUpdating = true;
 | 
						|
  *_retval = true;
 | 
						|
 | 
						|
  LOG(("FetchUpdate: %s", mCurrentRequest->mUrl.Data()));
 | 
						|
 | 
						|
  return FetchUpdate(aUpdateUrl, aRequestPayload, aIsPostRequest, ""_ns);
 | 
						|
}
 | 
						|
 | 
						|
///////////////////////////////////////////////////////////////////////////////
 | 
						|
// nsIUrlClassifierUpdateObserver implementation
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::UpdateUrlRequested(const nsACString& aUrl,
 | 
						|
                                                 const nsACString& aTable) {
 | 
						|
  LOG(("Queuing requested update from %s\n", PromiseFlatCString(aUrl).get()));
 | 
						|
 | 
						|
  PendingUpdate* update = mPendingUpdates.AppendElement(fallible);
 | 
						|
  if (!update) {
 | 
						|
    return NS_ERROR_OUT_OF_MEMORY;
 | 
						|
  }
 | 
						|
 | 
						|
  // Allow data: and file: urls for unit testing purposes, otherwise assume http
 | 
						|
  if (StringBeginsWith(aUrl, "data:"_ns) ||
 | 
						|
      StringBeginsWith(aUrl, "file:"_ns)) {
 | 
						|
    update->mUrl = aUrl;
 | 
						|
  } else {
 | 
						|
    // For unittesting update urls to localhost should use http, not https
 | 
						|
    // (otherwise the connection will fail silently, since there will be no
 | 
						|
    // cert available).
 | 
						|
    if (!StringBeginsWith(aUrl, "localhost"_ns)) {
 | 
						|
      update->mUrl = "https://"_ns + aUrl;
 | 
						|
    } else {
 | 
						|
      update->mUrl = "http://"_ns + aUrl;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  update->mTable = aTable;
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
nsresult nsUrlClassifierStreamUpdater::FetchNext() {
 | 
						|
  if (mPendingUpdates.Length() == 0) {
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  PendingUpdate& update = mPendingUpdates[0];
 | 
						|
  LOG(("Fetching update url: %s\n", update.mUrl.get()));
 | 
						|
  nsresult rv =
 | 
						|
      FetchUpdate(update.mUrl, ""_ns,
 | 
						|
                  true,  // This method is for v2 and v2 is always a POST.
 | 
						|
                  update.mTable);
 | 
						|
  if (NS_FAILED(rv)) {
 | 
						|
    nsAutoCString errorName;
 | 
						|
    mozilla::GetErrorName(rv, errorName);
 | 
						|
    LOG(("Error (%s) fetching update url: %s\n", errorName.get(),
 | 
						|
         update.mUrl.get()));
 | 
						|
    // We can commit the urls that we've applied so far.  This is
 | 
						|
    // probably a transient server problem, so trigger backoff.
 | 
						|
    mDownloadError = true;
 | 
						|
    mDBService->FinishUpdate();
 | 
						|
    return rv;
 | 
						|
  }
 | 
						|
 | 
						|
  mPendingUpdates.RemoveElementAt(0);
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
nsresult nsUrlClassifierStreamUpdater::FetchNextRequest() {
 | 
						|
  if (mPendingRequests.Length() == 0) {
 | 
						|
    LOG(("No more requests, returning"));
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  UpdateRequest request = mPendingRequests[0];
 | 
						|
  mPendingRequests.RemoveElementAt(0);
 | 
						|
  LOG(("Stream updater: fetching next request: %s, %s", request.mTables.get(),
 | 
						|
       request.mUrl.get()));
 | 
						|
  bool dummy;
 | 
						|
  DownloadUpdates(request.mTables, request.mRequestPayload,
 | 
						|
                  request.mIsPostRequest, request.mUrl,
 | 
						|
                  request.mSuccessCallback, request.mUpdateErrorCallback,
 | 
						|
                  request.mDownloadErrorCallback, &dummy);
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
void nsUrlClassifierStreamUpdater::BuildUpdateRequest(
 | 
						|
    const nsACString& aRequestTables, const nsACString& aRequestPayload,
 | 
						|
    bool aIsPostRequest, const nsACString& aUpdateUrl,
 | 
						|
    nsIUrlClassifierCallback* aSuccessCallback,
 | 
						|
    nsIUrlClassifierCallback* aUpdateErrorCallback,
 | 
						|
    nsIUrlClassifierCallback* aDownloadErrorCallback, UpdateRequest* aRequest) {
 | 
						|
  MOZ_ASSERT(aRequest);
 | 
						|
 | 
						|
  aRequest->mTables = aRequestTables;
 | 
						|
  aRequest->mRequestPayload = aRequestPayload;
 | 
						|
  aRequest->mIsPostRequest = aIsPostRequest;
 | 
						|
  aRequest->mUrl = aUpdateUrl;
 | 
						|
  aRequest->mSuccessCallback = aSuccessCallback;
 | 
						|
  aRequest->mUpdateErrorCallback = aUpdateErrorCallback;
 | 
						|
  aRequest->mDownloadErrorCallback = aDownloadErrorCallback;
 | 
						|
}
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::StreamFinished(nsresult status,
 | 
						|
                                             uint32_t requestedDelay) {
 | 
						|
  // We are a service and may not be reset with Init between calls, so reset
 | 
						|
  // mBeganStream manually.
 | 
						|
  mBeganStream = false;
 | 
						|
  if (LOG_ENABLED()) {
 | 
						|
    nsAutoCString errorName;
 | 
						|
    mozilla::GetErrorName(status, errorName);
 | 
						|
    LOG(("nsUrlClassifierStreamUpdater::StreamFinished [%s, %d]",
 | 
						|
         errorName.get(), requestedDelay));
 | 
						|
  }
 | 
						|
  if (NS_FAILED(status) || mPendingUpdates.Length() == 0) {
 | 
						|
    // We're done.
 | 
						|
    LOG(("nsUrlClassifierStreamUpdater::Done [this=%p]", this));
 | 
						|
    mDBService->FinishUpdate();
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  // This timer is for fetching indirect updates ("forwards") from any "u:"
 | 
						|
  // lines that we encountered while processing the server response. It is NOT
 | 
						|
  // for scheduling the next time we pull the list from the server. That's a
 | 
						|
  // different timer in listmanager.js (see bug 1110891).
 | 
						|
  nsresult rv;
 | 
						|
  rv = NS_NewTimerWithCallback(getter_AddRefs(mFetchIndirectUpdatesTimer), this,
 | 
						|
                               requestedDelay, nsITimer::TYPE_ONE_SHOT);
 | 
						|
 | 
						|
  if (NS_FAILED(rv)) {
 | 
						|
    NS_WARNING(
 | 
						|
        "Unable to initialize timer, fetching next safebrowsing item "
 | 
						|
        "immediately");
 | 
						|
    return FetchNext();
 | 
						|
  }
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::UpdateSuccess(uint32_t requestedTimeout) {
 | 
						|
  LOG(("nsUrlClassifierStreamUpdater::UpdateSuccess [this=%p]", this));
 | 
						|
  if (mPendingUpdates.Length() != 0) {
 | 
						|
    NS_WARNING("Didn't fetch all safebrowsing update redirects");
 | 
						|
  }
 | 
						|
 | 
						|
  // DownloadDone() clears mSuccessCallback, so we save it off here.
 | 
						|
  nsCOMPtr<nsIUrlClassifierCallback> successCallback =
 | 
						|
      mDownloadError ? nullptr : mCurrentRequest->mSuccessCallback.get();
 | 
						|
  nsCOMPtr<nsIUrlClassifierCallback> downloadErrorCallback =
 | 
						|
      mDownloadError ? mCurrentRequest->mDownloadErrorCallback.get() : nullptr;
 | 
						|
 | 
						|
  DownloadDone();
 | 
						|
 | 
						|
  nsAutoCString strTimeout;
 | 
						|
  strTimeout.AppendInt(requestedTimeout);
 | 
						|
  if (successCallback) {
 | 
						|
    LOG(("nsUrlClassifierStreamUpdater::UpdateSuccess callback [this=%p]",
 | 
						|
         this));
 | 
						|
    successCallback->HandleEvent(strTimeout);
 | 
						|
  } else if (downloadErrorCallback) {
 | 
						|
    downloadErrorCallback->HandleEvent(mDownloadErrorStatusStr);
 | 
						|
    mDownloadErrorStatusStr.Truncate();
 | 
						|
    LOG(("Notify download error callback in UpdateSuccess [this=%p]", this));
 | 
						|
  }
 | 
						|
  // Now fetch the next request
 | 
						|
  LOG(("stream updater: calling into fetch next request"));
 | 
						|
  FetchNextRequest();
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::UpdateError(nsresult result) {
 | 
						|
  LOG(("nsUrlClassifierStreamUpdater::UpdateError [this=%p]", this));
 | 
						|
 | 
						|
  // DownloadDone() clears mUpdateErrorCallback, so we save it off here.
 | 
						|
  nsCOMPtr<nsIUrlClassifierCallback> errorCallback =
 | 
						|
      mDownloadError ? nullptr : mCurrentRequest->mUpdateErrorCallback.get();
 | 
						|
  nsCOMPtr<nsIUrlClassifierCallback> downloadErrorCallback =
 | 
						|
      mDownloadError ? mCurrentRequest->mDownloadErrorCallback.get() : nullptr;
 | 
						|
  DownloadDone();
 | 
						|
 | 
						|
  if (errorCallback) {
 | 
						|
    nsAutoCString strResult;
 | 
						|
    mozilla::GetErrorName(result, strResult);
 | 
						|
    errorCallback->HandleEvent(strResult);
 | 
						|
  } else if (downloadErrorCallback) {
 | 
						|
    LOG(("Notify download error callback in UpdateError [this=%p]", this));
 | 
						|
    downloadErrorCallback->HandleEvent(mDownloadErrorStatusStr);
 | 
						|
    mDownloadErrorStatusStr.Truncate();
 | 
						|
  }
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
nsresult nsUrlClassifierStreamUpdater::AddRequestBody(
 | 
						|
    const nsACString& aRequestBody) {
 | 
						|
  nsresult rv;
 | 
						|
  nsCOMPtr<nsIStringInputStream> strStream =
 | 
						|
      do_CreateInstance(NS_STRINGINPUTSTREAM_CONTRACTID, &rv);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  rv = strStream->SetData(aRequestBody.BeginReading(), aRequestBody.Length());
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  nsCOMPtr<nsIUploadChannel> uploadChannel = do_QueryInterface(mChannel, &rv);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  rv = uploadChannel->SetUploadStream(strStream, "text/plain"_ns, -1);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel, &rv);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  rv = httpChannel->SetRequestMethod("POST"_ns);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
///////////////////////////////////////////////////////////////////////////////
 | 
						|
// nsIStreamListenerObserver implementation
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::OnStartRequest(nsIRequest* request) {
 | 
						|
  nsresult rv;
 | 
						|
  bool downloadError = false;
 | 
						|
  nsAutoCString strStatus;
 | 
						|
  nsresult status = NS_OK;
 | 
						|
 | 
						|
  // Only update if we got http success header
 | 
						|
  nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(request);
 | 
						|
  if (httpChannel) {
 | 
						|
    rv = httpChannel->GetStatus(&status);
 | 
						|
    NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
    if (LOG_ENABLED()) {
 | 
						|
      nsAutoCString errorName, spec;
 | 
						|
      mozilla::GetErrorName(status, errorName);
 | 
						|
      nsCOMPtr<nsIURI> uri;
 | 
						|
      rv = httpChannel->GetURI(getter_AddRefs(uri));
 | 
						|
      if (NS_SUCCEEDED(rv) && uri) {
 | 
						|
        uri->GetAsciiSpec(spec);
 | 
						|
      }
 | 
						|
      LOG(
 | 
						|
          ("nsUrlClassifierStreamUpdater::OnStartRequest "
 | 
						|
           "(status=%s, uri=%s, this=%p)",
 | 
						|
           errorName.get(), spec.get(), this));
 | 
						|
    }
 | 
						|
    if (mTelemetryClockStart > 0) {
 | 
						|
      uint32_t msecs =
 | 
						|
          PR_IntervalToMilliseconds(PR_IntervalNow() - mTelemetryClockStart);
 | 
						|
      mozilla::Telemetry::Accumulate(
 | 
						|
          mozilla::Telemetry::URLCLASSIFIER_UPDATE_SERVER_RESPONSE_TIME,
 | 
						|
          mTelemetryProvider, msecs);
 | 
						|
    }
 | 
						|
 | 
						|
    if (mResponseTimeoutTimer) {
 | 
						|
      mResponseTimeoutTimer->Cancel();
 | 
						|
      mResponseTimeoutTimer = nullptr;
 | 
						|
    }
 | 
						|
 | 
						|
    uint8_t netErrCode = NS_FAILED(status) ? NetworkErrorToBucket(status) : 0;
 | 
						|
    mozilla::Telemetry::Accumulate(
 | 
						|
        mozilla::Telemetry::URLCLASSIFIER_UPDATE_REMOTE_NETWORK_ERROR,
 | 
						|
        mTelemetryProvider, netErrCode);
 | 
						|
 | 
						|
    if (NS_FAILED(status)) {
 | 
						|
      // Assume we're overloading the server and trigger backoff.
 | 
						|
      downloadError = true;
 | 
						|
    } else {
 | 
						|
      bool succeeded = false;
 | 
						|
      rv = httpChannel->GetRequestSucceeded(&succeeded);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
      uint32_t requestStatus;
 | 
						|
      rv = httpChannel->GetResponseStatus(&requestStatus);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
      mozilla::Telemetry::Accumulate(
 | 
						|
          mozilla::Telemetry::URLCLASSIFIER_UPDATE_REMOTE_STATUS2,
 | 
						|
          mTelemetryProvider, HTTPStatusToBucket(requestStatus));
 | 
						|
      if (requestStatus == 400) {
 | 
						|
        printf_stderr(
 | 
						|
            "Safe Browsing server returned a 400 during update:"
 | 
						|
            "request url = %s, payload = %s\n",
 | 
						|
            mCurrentRequest->mUrl.get(),
 | 
						|
            mCurrentRequest->mRequestPayload.get());
 | 
						|
      }
 | 
						|
 | 
						|
      LOG(("nsUrlClassifierStreamUpdater::OnStartRequest %s (%d)",
 | 
						|
           succeeded ? "succeeded" : "failed", requestStatus));
 | 
						|
      if (!succeeded) {
 | 
						|
        // 404 or other error, pass error status back
 | 
						|
        strStatus.AppendInt(requestStatus);
 | 
						|
        downloadError = true;
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  if (downloadError) {
 | 
						|
    LOG(("nsUrlClassifierStreamUpdater::Download error [this=%p]", this));
 | 
						|
    mDownloadError = true;
 | 
						|
    mDownloadErrorStatusStr = strStatus;
 | 
						|
    status = NS_ERROR_ABORT;
 | 
						|
  } else if (NS_SUCCEEDED(status)) {
 | 
						|
    MOZ_ASSERT(mCurrentRequest->mDownloadErrorCallback);
 | 
						|
    mBeganStream = true;
 | 
						|
    LOG(("nsUrlClassifierStreamUpdater::Beginning stream [this=%p]", this));
 | 
						|
    rv = mDBService->BeginStream(mStreamTable);
 | 
						|
    NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
  }
 | 
						|
 | 
						|
  mStreamTable.Truncate();
 | 
						|
 | 
						|
  return status;
 | 
						|
}
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::OnDataAvailable(nsIRequest* request,
 | 
						|
                                              nsIInputStream* aIStream,
 | 
						|
                                              uint64_t aSourceOffset,
 | 
						|
                                              uint32_t aLength) {
 | 
						|
  if (!mDBService) return NS_ERROR_NOT_INITIALIZED;
 | 
						|
 | 
						|
  LOG(("OnDataAvailable (%d bytes)", aLength));
 | 
						|
 | 
						|
  if (aSourceOffset > MAX_FILE_SIZE) {
 | 
						|
    LOG((
 | 
						|
        "OnDataAvailable::Abort because exceeded the maximum file size(%" PRIu64
 | 
						|
        ")",
 | 
						|
        aSourceOffset));
 | 
						|
    return NS_ERROR_FILE_TOO_BIG;
 | 
						|
  }
 | 
						|
 | 
						|
  nsresult rv;
 | 
						|
 | 
						|
  // Copy the data into a nsCString
 | 
						|
  nsCString chunk;
 | 
						|
  rv = NS_ConsumeStream(aIStream, aLength, chunk);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  // LOG(("Chunk (%d): %s\n\n", chunk.Length(), chunk.get()));
 | 
						|
  rv = mDBService->UpdateStream(chunk);
 | 
						|
  NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::OnStopRequest(nsIRequest* request,
 | 
						|
                                            nsresult aStatus) {
 | 
						|
  if (!mDBService) return NS_ERROR_NOT_INITIALIZED;
 | 
						|
 | 
						|
  if (LOG_ENABLED()) {
 | 
						|
    nsAutoCString errorName;
 | 
						|
    mozilla::GetErrorName(aStatus, errorName);
 | 
						|
    LOG(("OnStopRequest (status %s, beganStream %s, this=%p)", errorName.get(),
 | 
						|
         mBeganStream ? "true" : "false", this));
 | 
						|
  }
 | 
						|
 | 
						|
  nsresult rv;
 | 
						|
 | 
						|
  if (NS_SUCCEEDED(aStatus)) {
 | 
						|
    // Success, finish this stream and move on to the next.
 | 
						|
    rv = mDBService->FinishStream();
 | 
						|
  } else if (mBeganStream) {
 | 
						|
    LOG(("OnStopRequest::Canceling update [this=%p]", this));
 | 
						|
    // We began this stream and couldn't finish it.  We have to cancel the
 | 
						|
    // update, it's not in a consistent state.
 | 
						|
    mDownloadError = true;
 | 
						|
    rv = mDBService->CancelUpdate();
 | 
						|
  } else {
 | 
						|
    LOG(("OnStopRequest::Finishing update [this=%p]", this));
 | 
						|
    // The fetch failed, but we didn't start the stream (probably a
 | 
						|
    // server or connection error).  We can commit what we've applied
 | 
						|
    // so far, and request again later.
 | 
						|
    rv = mDBService->FinishUpdate();
 | 
						|
  }
 | 
						|
 | 
						|
  if (mResponseTimeoutTimer) {
 | 
						|
    mResponseTimeoutTimer->Cancel();
 | 
						|
    mResponseTimeoutTimer = nullptr;
 | 
						|
  }
 | 
						|
 | 
						|
  // mResponseTimeoutTimer may be cleared in OnStartRequest, so we check
 | 
						|
  // mTimeoutTimer to see whether the update was has timed out
 | 
						|
  if (mTimeoutTimer) {
 | 
						|
    mozilla::Telemetry::Accumulate(
 | 
						|
        mozilla::Telemetry::URLCLASSIFIER_UPDATE_TIMEOUT, mTelemetryProvider,
 | 
						|
        static_cast<uint8_t>(eNoTimeout));
 | 
						|
    mTimeoutTimer->Cancel();
 | 
						|
    mTimeoutTimer = nullptr;
 | 
						|
  }
 | 
						|
 | 
						|
  mTelemetryProvider.Truncate();
 | 
						|
  mTelemetryClockStart = 0;
 | 
						|
  mChannel = nullptr;
 | 
						|
 | 
						|
  // If the fetch failed, return the network status rather than NS_OK, the
 | 
						|
  // result of finishing a possibly-empty update
 | 
						|
  if (NS_SUCCEEDED(aStatus)) {
 | 
						|
    return rv;
 | 
						|
  }
 | 
						|
  return aStatus;
 | 
						|
}
 | 
						|
 | 
						|
///////////////////////////////////////////////////////////////////////////////
 | 
						|
// nsIObserver implementation
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::Observe(nsISupports* aSubject, const char* aTopic,
 | 
						|
                                      const char16_t* aData) {
 | 
						|
  if (nsCRT::strcmp(aTopic, gQuitApplicationMessage) == 0) {
 | 
						|
    if (mIsUpdating && mChannel) {
 | 
						|
      LOG(("Cancel download"));
 | 
						|
      nsresult rv;
 | 
						|
      rv = mChannel->Cancel(NS_ERROR_ABORT);
 | 
						|
      NS_ENSURE_SUCCESS(rv, rv);
 | 
						|
      mIsUpdating = false;
 | 
						|
      mChannel = nullptr;
 | 
						|
      mTelemetryClockStart = 0;
 | 
						|
    }
 | 
						|
    if (mFetchIndirectUpdatesTimer) {
 | 
						|
      mFetchIndirectUpdatesTimer->Cancel();
 | 
						|
      mFetchIndirectUpdatesTimer = nullptr;
 | 
						|
    }
 | 
						|
    if (mFetchNextRequestTimer) {
 | 
						|
      mFetchNextRequestTimer->Cancel();
 | 
						|
      mFetchNextRequestTimer = nullptr;
 | 
						|
    }
 | 
						|
    if (mResponseTimeoutTimer) {
 | 
						|
      mResponseTimeoutTimer->Cancel();
 | 
						|
      mResponseTimeoutTimer = nullptr;
 | 
						|
    }
 | 
						|
    if (mTimeoutTimer) {
 | 
						|
      mTimeoutTimer->Cancel();
 | 
						|
      mTimeoutTimer = nullptr;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
///////////////////////////////////////////////////////////////////////////////
 | 
						|
// nsIInterfaceRequestor implementation
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::GetInterface(const nsIID& eventSinkIID,
 | 
						|
                                           void** _retval) {
 | 
						|
  return QueryInterface(eventSinkIID, _retval);
 | 
						|
}
 | 
						|
 | 
						|
///////////////////////////////////////////////////////////////////////////////
 | 
						|
// nsITimerCallback implementation
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::Notify(nsITimer* timer) {
 | 
						|
  LOG(("nsUrlClassifierStreamUpdater::Notify [%p]", this));
 | 
						|
 | 
						|
  if (timer == mFetchNextRequestTimer) {
 | 
						|
    mFetchNextRequestTimer = nullptr;
 | 
						|
    FetchNextRequest();
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  if (timer == mFetchIndirectUpdatesTimer) {
 | 
						|
    mFetchIndirectUpdatesTimer = nullptr;
 | 
						|
    // Start the update process up again.
 | 
						|
    FetchNext();
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  bool updateFailed = false;
 | 
						|
  if (timer == mResponseTimeoutTimer) {
 | 
						|
    mResponseTimeoutTimer = nullptr;
 | 
						|
    if (mTimeoutTimer) {
 | 
						|
      mTimeoutTimer->Cancel();
 | 
						|
      mTimeoutTimer = nullptr;
 | 
						|
    }
 | 
						|
    mDownloadError = true;  // Trigger backoff
 | 
						|
    updateFailed = true;
 | 
						|
    MOZ_LOG(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Error,
 | 
						|
            ("Safe Browsing timed out while waiting for the update server to "
 | 
						|
             "respond."));
 | 
						|
    mozilla::Telemetry::Accumulate(
 | 
						|
        mozilla::Telemetry::URLCLASSIFIER_UPDATE_TIMEOUT, mTelemetryProvider,
 | 
						|
        static_cast<uint8_t>(eResponseTimeout));
 | 
						|
  }
 | 
						|
 | 
						|
  if (timer == mTimeoutTimer) {
 | 
						|
    mTimeoutTimer = nullptr;
 | 
						|
    // No backoff since the connection may just be temporarily slow.
 | 
						|
    updateFailed = true;
 | 
						|
    MOZ_LOG(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Error,
 | 
						|
            ("Safe Browsing timed out while waiting for the update server to "
 | 
						|
             "finish."));
 | 
						|
    mozilla::Telemetry::Accumulate(
 | 
						|
        mozilla::Telemetry::URLCLASSIFIER_UPDATE_TIMEOUT, mTelemetryProvider,
 | 
						|
        static_cast<uint8_t>(eDownloadTimeout));
 | 
						|
  }
 | 
						|
 | 
						|
  if (updateFailed) {
 | 
						|
    // Cancelling the channel will trigger OnStopRequest.
 | 
						|
    if (mChannel) {
 | 
						|
      mozilla::Unused << mChannel->Cancel(NS_ERROR_ABORT);
 | 
						|
      mChannel = nullptr;
 | 
						|
    }
 | 
						|
    mTelemetryClockStart = 0;
 | 
						|
 | 
						|
    if (mFetchIndirectUpdatesTimer) {
 | 
						|
      mFetchIndirectUpdatesTimer->Cancel();
 | 
						|
      mFetchIndirectUpdatesTimer = nullptr;
 | 
						|
    }
 | 
						|
    if (mFetchNextRequestTimer) {
 | 
						|
      mFetchNextRequestTimer->Cancel();
 | 
						|
      mFetchNextRequestTimer = nullptr;
 | 
						|
    }
 | 
						|
 | 
						|
    return NS_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  MOZ_ASSERT_UNREACHABLE("A timer is fired from nowhere.");
 | 
						|
  return NS_OK;
 | 
						|
}
 | 
						|
 | 
						|
////////////////////////////////////////////////////////////////////////
 | 
						|
//// nsINamed
 | 
						|
 | 
						|
NS_IMETHODIMP
 | 
						|
nsUrlClassifierStreamUpdater::GetName(nsACString& aName) {
 | 
						|
  aName.AssignLiteral("nsUrlClassifierStreamUpdater");
 | 
						|
  return NS_OK;
 | 
						|
}
 |