forked from mirrors/gecko-dev
		
	 539e32202b
			
		
	
	
		539e32202b
		
	
	
	
	
		
			
			Spec: https://w3c.github.io/largest-contentful-paint Differential Revision: https://phabricator.services.mozilla.com/D151079
		
			
				
	
	
		
			1246 lines
		
	
	
	
		
			39 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			1246 lines
		
	
	
	
		
			39 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
 | |
|  *
 | |
|  * This Source Code Form is subject to the terms of the Mozilla Public
 | |
|  * License, v. 2.0. If a copy of the MPL was not distributed with this
 | |
|  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 | |
| 
 | |
| #include "imgRequest.h"
 | |
| #include "ImageLogging.h"
 | |
| 
 | |
| #include "imgLoader.h"
 | |
| #include "imgRequestProxy.h"
 | |
| #include "DecodePool.h"
 | |
| #include "ProgressTracker.h"
 | |
| #include "ImageFactory.h"
 | |
| #include "Image.h"
 | |
| #include "MultipartImage.h"
 | |
| #include "RasterImage.h"
 | |
| 
 | |
| #include "nsIChannel.h"
 | |
| #include "nsICacheInfoChannel.h"
 | |
| #include "nsIClassOfService.h"
 | |
| #include "mozilla/dom/Document.h"
 | |
| #include "nsIThreadRetargetableRequest.h"
 | |
| #include "nsIInputStream.h"
 | |
| #include "nsIMultiPartChannel.h"
 | |
| #include "nsIHttpChannel.h"
 | |
| #include "nsMimeTypes.h"
 | |
| 
 | |
| #include "nsIInterfaceRequestorUtils.h"
 | |
| #include "nsISupportsPrimitives.h"
 | |
| #include "nsIScriptSecurityManager.h"
 | |
| #include "nsComponentManagerUtils.h"
 | |
| #include "nsContentUtils.h"
 | |
| #include "nsEscape.h"
 | |
| 
 | |
| #include "prtime.h"  // for PR_Now
 | |
| #include "nsNetUtil.h"
 | |
| #include "nsIProtocolHandler.h"
 | |
| #include "imgIRequest.h"
 | |
| #include "nsProperties.h"
 | |
| #include "nsIURL.h"
 | |
| 
 | |
| #include "mozilla/IntegerPrintfMacros.h"
 | |
| #include "mozilla/SizeOfState.h"
 | |
| 
 | |
| using namespace mozilla;
 | |
| using namespace mozilla::image;
 | |
| 
 | |
| #define LOG_TEST(level) (MOZ_LOG_TEST(gImgLog, (level)))
 | |
| 
 | |
| NS_IMPL_ISUPPORTS(imgRequest, nsIStreamListener, nsIRequestObserver,
 | |
|                   nsIThreadRetargetableStreamListener, nsIChannelEventSink,
 | |
|                   nsIInterfaceRequestor, nsIAsyncVerifyRedirectCallback)
 | |
| 
 | |
| imgRequest::imgRequest(imgLoader* aLoader, const ImageCacheKey& aCacheKey)
 | |
|     : mLoader(aLoader),
 | |
|       mCacheKey(aCacheKey),
 | |
|       mLoadId(nullptr),
 | |
|       mFirstProxy(nullptr),
 | |
|       mValidator(nullptr),
 | |
|       mCORSMode(CORS_NONE),
 | |
|       mImageErrorCode(NS_OK),
 | |
|       mImageAvailable(false),
 | |
|       mIsDeniedCrossSiteCORSRequest(false),
 | |
|       mIsCrossSiteNoCORSRequest(false),
 | |
|       mShouldReportRenderTimeForLCP(false),
 | |
|       mMutex("imgRequest"),
 | |
|       mProgressTracker(new ProgressTracker()),
 | |
|       mIsMultiPartChannel(false),
 | |
|       mIsInCache(false),
 | |
|       mDecodeRequested(false),
 | |
|       mNewPartPending(false),
 | |
|       mHadInsecureRedirect(false),
 | |
|       mInnerWindowId(0) {
 | |
|   LOG_FUNC(gImgLog, "imgRequest::imgRequest()");
 | |
| }
 | |
| 
 | |
| imgRequest::~imgRequest() {
 | |
|   if (mLoader) {
 | |
|     mLoader->RemoveFromUncachedImages(this);
 | |
|   }
 | |
|   if (mURI) {
 | |
|     LOG_FUNC_WITH_PARAM(gImgLog, "imgRequest::~imgRequest()", "keyuri", mURI);
 | |
|   } else
 | |
|     LOG_FUNC(gImgLog, "imgRequest::~imgRequest()");
 | |
| }
 | |
| 
 | |
| nsresult imgRequest::Init(
 | |
|     nsIURI* aURI, nsIURI* aFinalURI, bool aHadInsecureRedirect,
 | |
|     nsIRequest* aRequest, nsIChannel* aChannel, imgCacheEntry* aCacheEntry,
 | |
|     mozilla::dom::Document* aLoadingDocument,
 | |
|     nsIPrincipal* aTriggeringPrincipal, mozilla::CORSMode aCORSMode,
 | |
|     nsIReferrerInfo* aReferrerInfo) MOZ_NO_THREAD_SAFETY_ANALYSIS {
 | |
|   MOZ_ASSERT(NS_IsMainThread(), "Cannot use nsIURI off main thread!");
 | |
|   // Init() can only be called once, and that's before it can be used off
 | |
|   // mainthread
 | |
| 
 | |
|   LOG_FUNC(gImgLog, "imgRequest::Init");
 | |
| 
 | |
|   MOZ_ASSERT(!mImage, "Multiple calls to init");
 | |
|   MOZ_ASSERT(aURI, "No uri");
 | |
|   MOZ_ASSERT(aFinalURI, "No final uri");
 | |
|   MOZ_ASSERT(aRequest, "No request");
 | |
|   MOZ_ASSERT(aChannel, "No channel");
 | |
| 
 | |
|   mProperties = new nsProperties();
 | |
|   mURI = aURI;
 | |
|   mFinalURI = aFinalURI;
 | |
|   mRequest = aRequest;
 | |
|   mChannel = aChannel;
 | |
|   mTimedChannel = do_QueryInterface(mChannel);
 | |
|   mTriggeringPrincipal = aTriggeringPrincipal;
 | |
|   mCORSMode = aCORSMode;
 | |
|   mReferrerInfo = aReferrerInfo;
 | |
| 
 | |
|   // If the original URI and the final URI are different, check whether the
 | |
|   // original URI is secure. We deliberately don't take the final URI into
 | |
|   // account, as it needs to be handled using more complicated rules than
 | |
|   // earlier elements of the redirect chain.
 | |
|   if (aURI != aFinalURI) {
 | |
|     bool schemeLocal = false;
 | |
|     if (NS_FAILED(NS_URIChainHasFlags(
 | |
|             aURI, nsIProtocolHandler::URI_IS_LOCAL_RESOURCE, &schemeLocal)) ||
 | |
|         (!aURI->SchemeIs("https") && !aURI->SchemeIs("chrome") &&
 | |
|          !schemeLocal)) {
 | |
|       mHadInsecureRedirect = true;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // imgCacheValidator may have handled redirects before we were created, so we
 | |
|   // allow the caller to let us know if any redirects were insecure.
 | |
|   mHadInsecureRedirect = mHadInsecureRedirect || aHadInsecureRedirect;
 | |
| 
 | |
|   mChannel->GetNotificationCallbacks(getter_AddRefs(mPrevChannelSink));
 | |
| 
 | |
|   NS_ASSERTION(mPrevChannelSink != this,
 | |
|                "Initializing with a channel that already calls back to us!");
 | |
| 
 | |
|   mChannel->SetNotificationCallbacks(this);
 | |
| 
 | |
|   mCacheEntry = aCacheEntry;
 | |
|   mCacheEntry->UpdateLoadTime();
 | |
| 
 | |
|   SetLoadId(aLoadingDocument);
 | |
| 
 | |
|   // Grab the inner window ID of the loading document, if possible.
 | |
|   if (aLoadingDocument) {
 | |
|     mInnerWindowId = aLoadingDocument->InnerWindowID();
 | |
|   }
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| bool imgRequest::CanReuseWithoutValidation(dom::Document* aDoc) const {
 | |
|   // If the request's loadId is the same as the aLoadingDocument, then it is ok
 | |
|   // to use this one because it has already been validated for this context.
 | |
|   // XXX: nullptr seems to be a 'special' key value that indicates that NO
 | |
|   //      validation is required.
 | |
|   // XXX: we also check the window ID because the loadID() can return a reused
 | |
|   //      pointer of a document. This can still happen for non-document image
 | |
|   //      cache entries.
 | |
|   void* key = (void*)aDoc;
 | |
|   uint64_t innerWindowID = aDoc ? aDoc->InnerWindowID() : 0;
 | |
|   if (LoadId() == key && InnerWindowID() == innerWindowID) {
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   // As a special-case, if this is a print preview document, also validate on
 | |
|   // the original document. This allows to print uncacheable images.
 | |
|   if (dom::Document* original = aDoc ? aDoc->GetOriginalDocument() : nullptr) {
 | |
|     return CanReuseWithoutValidation(original);
 | |
|   }
 | |
| 
 | |
|   return false;
 | |
| }
 | |
| 
 | |
| void imgRequest::ClearLoader() { mLoader = nullptr; }
 | |
| 
 | |
| already_AddRefed<nsIPrincipal> imgRequest::GetTriggeringPrincipal() const {
 | |
|   nsCOMPtr<nsIPrincipal> principal = mTriggeringPrincipal;
 | |
|   return principal.forget();
 | |
| }
 | |
| 
 | |
| already_AddRefed<ProgressTracker> imgRequest::GetProgressTracker() const {
 | |
|   MutexAutoLock lock(mMutex);
 | |
| 
 | |
|   if (mImage) {
 | |
|     MOZ_ASSERT(!mProgressTracker,
 | |
|                "Should have given mProgressTracker to mImage");
 | |
|     return mImage->GetProgressTracker();
 | |
|   }
 | |
|   MOZ_ASSERT(mProgressTracker,
 | |
|              "Should have mProgressTracker until we create mImage");
 | |
|   RefPtr<ProgressTracker> progressTracker = mProgressTracker;
 | |
|   MOZ_ASSERT(progressTracker);
 | |
|   return progressTracker.forget();
 | |
| }
 | |
| 
 | |
| void imgRequest::SetCacheEntry(imgCacheEntry* entry) { mCacheEntry = entry; }
 | |
| 
 | |
| bool imgRequest::HasCacheEntry() const { return mCacheEntry != nullptr; }
 | |
| 
 | |
| void imgRequest::ResetCacheEntry() {
 | |
|   if (HasCacheEntry()) {
 | |
|     mCacheEntry->SetDataSize(0);
 | |
|   }
 | |
| }
 | |
| 
 | |
| void imgRequest::AddProxy(imgRequestProxy* proxy) {
 | |
|   MOZ_ASSERT(proxy, "null imgRequestProxy passed in");
 | |
|   LOG_SCOPE_WITH_PARAM(gImgLog, "imgRequest::AddProxy", "proxy", proxy);
 | |
| 
 | |
|   if (!mFirstProxy) {
 | |
|     // Save a raw pointer to the first proxy we see, for use in the network
 | |
|     // priority logic.
 | |
|     mFirstProxy = proxy;
 | |
|   }
 | |
| 
 | |
|   // If we're empty before adding, we have to tell the loader we now have
 | |
|   // proxies.
 | |
|   RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|   if (progressTracker->ObserverCount() == 0) {
 | |
|     MOZ_ASSERT(mURI, "Trying to SetHasProxies without key uri.");
 | |
|     if (mLoader) {
 | |
|       mLoader->SetHasProxies(this);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   progressTracker->AddObserver(proxy);
 | |
| }
 | |
| 
 | |
| nsresult imgRequest::RemoveProxy(imgRequestProxy* proxy, nsresult aStatus) {
 | |
|   LOG_SCOPE_WITH_PARAM(gImgLog, "imgRequest::RemoveProxy", "proxy", proxy);
 | |
| 
 | |
|   // This will remove our animation consumers, so after removing
 | |
|   // this proxy, we don't end up without proxies with observers, but still
 | |
|   // have animation consumers.
 | |
|   proxy->ClearAnimationConsumers();
 | |
| 
 | |
|   // Let the status tracker do its thing before we potentially call Cancel()
 | |
|   // below, because Cancel() may result in OnStopRequest being called back
 | |
|   // before Cancel() returns, leaving the image in a different state then the
 | |
|   // one it was in at this point.
 | |
|   RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|   if (!progressTracker->RemoveObserver(proxy)) {
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   if (progressTracker->ObserverCount() == 0) {
 | |
|     // If we have no observers, there's nothing holding us alive. If we haven't
 | |
|     // been cancelled and thus removed from the cache, tell the image loader so
 | |
|     // we can be evicted from the cache.
 | |
|     if (mCacheEntry) {
 | |
|       MOZ_ASSERT(mURI, "Removing last observer without key uri.");
 | |
| 
 | |
|       if (mLoader) {
 | |
|         mLoader->SetHasNoProxies(this, mCacheEntry);
 | |
|       }
 | |
|     } else {
 | |
|       LOG_MSG_WITH_PARAM(gImgLog, "imgRequest::RemoveProxy no cache entry",
 | |
|                          "uri", mURI);
 | |
|     }
 | |
| 
 | |
|     /* If |aStatus| is a failure code, then cancel the load if it is still in
 | |
|        progress.  Otherwise, let the load continue, keeping 'this' in the cache
 | |
|        with no observers.  This way, if a proxy is destroyed without calling
 | |
|        cancel on it, it won't leak and won't leave a bad pointer in the observer
 | |
|        list.
 | |
|      */
 | |
|     if (!(progressTracker->GetProgress() & FLAG_LAST_PART_COMPLETE) &&
 | |
|         NS_FAILED(aStatus)) {
 | |
|       LOG_MSG(gImgLog, "imgRequest::RemoveProxy",
 | |
|               "load in progress.  canceling");
 | |
| 
 | |
|       this->Cancel(NS_BINDING_ABORTED);
 | |
|     }
 | |
| 
 | |
|     /* break the cycle from the cache entry. */
 | |
|     mCacheEntry = nullptr;
 | |
|   }
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| uint64_t imgRequest::InnerWindowID() const {
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   return mInnerWindowId;
 | |
| }
 | |
| 
 | |
| void imgRequest::SetInnerWindowID(uint64_t aInnerWindowId) {
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   mInnerWindowId = aInnerWindowId;
 | |
| }
 | |
| 
 | |
| void imgRequest::CancelAndAbort(nsresult aStatus) {
 | |
|   LOG_SCOPE(gImgLog, "imgRequest::CancelAndAbort");
 | |
| 
 | |
|   Cancel(aStatus);
 | |
| 
 | |
|   // It's possible for the channel to fail to open after we've set our
 | |
|   // notification callbacks. In that case, make sure to break the cycle between
 | |
|   // the channel and us, because it won't.
 | |
|   if (mChannel) {
 | |
|     mChannel->SetNotificationCallbacks(mPrevChannelSink);
 | |
|     mPrevChannelSink = nullptr;
 | |
|   }
 | |
| }
 | |
| 
 | |
| class imgRequestMainThreadCancel : public Runnable {
 | |
|  public:
 | |
|   imgRequestMainThreadCancel(imgRequest* aImgRequest, nsresult aStatus)
 | |
|       : Runnable("imgRequestMainThreadCancel"),
 | |
|         mImgRequest(aImgRequest),
 | |
|         mStatus(aStatus) {
 | |
|     MOZ_ASSERT(!NS_IsMainThread(), "Create me off main thread only!");
 | |
|     MOZ_ASSERT(aImgRequest);
 | |
|   }
 | |
| 
 | |
|   NS_IMETHOD Run() override {
 | |
|     MOZ_ASSERT(NS_IsMainThread(), "I should be running on the main thread!");
 | |
|     mImgRequest->ContinueCancel(mStatus);
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   RefPtr<imgRequest> mImgRequest;
 | |
|   nsresult mStatus;
 | |
| };
 | |
| 
 | |
| void imgRequest::Cancel(nsresult aStatus) {
 | |
|   /* The Cancel() method here should only be called by this class. */
 | |
|   LOG_SCOPE(gImgLog, "imgRequest::Cancel");
 | |
| 
 | |
|   if (NS_IsMainThread()) {
 | |
|     ContinueCancel(aStatus);
 | |
|   } else {
 | |
|     RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|     nsCOMPtr<nsIEventTarget> eventTarget = progressTracker->GetEventTarget();
 | |
|     nsCOMPtr<nsIRunnable> ev = new imgRequestMainThreadCancel(this, aStatus);
 | |
|     eventTarget->Dispatch(ev.forget(), NS_DISPATCH_NORMAL);
 | |
|   }
 | |
| }
 | |
| 
 | |
| void imgRequest::ContinueCancel(nsresult aStatus) {
 | |
|   MOZ_ASSERT(NS_IsMainThread());
 | |
| 
 | |
|   RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|   progressTracker->SyncNotifyProgress(FLAG_HAS_ERROR);
 | |
| 
 | |
|   RemoveFromCache();
 | |
| 
 | |
|   if (mRequest && !(progressTracker->GetProgress() & FLAG_LAST_PART_COMPLETE)) {
 | |
|     mRequest->CancelWithReason(aStatus, "imgRequest::ContinueCancel"_ns);
 | |
|   }
 | |
| }
 | |
| 
 | |
| class imgRequestMainThreadEvict : public Runnable {
 | |
|  public:
 | |
|   explicit imgRequestMainThreadEvict(imgRequest* aImgRequest)
 | |
|       : Runnable("imgRequestMainThreadEvict"), mImgRequest(aImgRequest) {
 | |
|     MOZ_ASSERT(!NS_IsMainThread(), "Create me off main thread only!");
 | |
|     MOZ_ASSERT(aImgRequest);
 | |
|   }
 | |
| 
 | |
|   NS_IMETHOD Run() override {
 | |
|     MOZ_ASSERT(NS_IsMainThread(), "I should be running on the main thread!");
 | |
|     mImgRequest->ContinueEvict();
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   RefPtr<imgRequest> mImgRequest;
 | |
| };
 | |
| 
 | |
| // EvictFromCache() is written to allowed to get called from any thread
 | |
| void imgRequest::EvictFromCache() {
 | |
|   /* The EvictFromCache() method here should only be called by this class. */
 | |
|   LOG_SCOPE(gImgLog, "imgRequest::EvictFromCache");
 | |
| 
 | |
|   if (NS_IsMainThread()) {
 | |
|     ContinueEvict();
 | |
|   } else {
 | |
|     NS_DispatchToMainThread(new imgRequestMainThreadEvict(this));
 | |
|   }
 | |
| }
 | |
| 
 | |
| // Helper-method used by EvictFromCache()
 | |
| void imgRequest::ContinueEvict() {
 | |
|   MOZ_ASSERT(NS_IsMainThread());
 | |
| 
 | |
|   RemoveFromCache();
 | |
| }
 | |
| 
 | |
| void imgRequest::StartDecoding() {
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   mDecodeRequested = true;
 | |
| }
 | |
| 
 | |
| bool imgRequest::IsDecodeRequested() const {
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   return mDecodeRequested;
 | |
| }
 | |
| 
 | |
| nsresult imgRequest::GetURI(nsIURI** aURI) {
 | |
|   MOZ_ASSERT(aURI);
 | |
| 
 | |
|   LOG_FUNC(gImgLog, "imgRequest::GetURI");
 | |
| 
 | |
|   if (mURI) {
 | |
|     *aURI = mURI;
 | |
|     NS_ADDREF(*aURI);
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   return NS_ERROR_FAILURE;
 | |
| }
 | |
| 
 | |
| nsresult imgRequest::GetFinalURI(nsIURI** aURI) {
 | |
|   MOZ_ASSERT(aURI);
 | |
| 
 | |
|   LOG_FUNC(gImgLog, "imgRequest::GetFinalURI");
 | |
| 
 | |
|   if (mFinalURI) {
 | |
|     *aURI = mFinalURI;
 | |
|     NS_ADDREF(*aURI);
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   return NS_ERROR_FAILURE;
 | |
| }
 | |
| 
 | |
| bool imgRequest::IsChrome() const { return mURI->SchemeIs("chrome"); }
 | |
| 
 | |
| bool imgRequest::IsData() const { return mURI->SchemeIs("data"); }
 | |
| 
 | |
| nsresult imgRequest::GetImageErrorCode() { return mImageErrorCode; }
 | |
| 
 | |
| void imgRequest::RemoveFromCache() {
 | |
|   LOG_SCOPE(gImgLog, "imgRequest::RemoveFromCache");
 | |
| 
 | |
|   bool isInCache = false;
 | |
| 
 | |
|   {
 | |
|     MutexAutoLock lock(mMutex);
 | |
|     isInCache = mIsInCache;
 | |
|   }
 | |
| 
 | |
|   if (isInCache && mLoader) {
 | |
|     // mCacheEntry is nulled out when we have no more observers.
 | |
|     if (mCacheEntry) {
 | |
|       mLoader->RemoveFromCache(mCacheEntry);
 | |
|     } else {
 | |
|       mLoader->RemoveFromCache(mCacheKey);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   mCacheEntry = nullptr;
 | |
| }
 | |
| 
 | |
| bool imgRequest::HasConsumers() const {
 | |
|   RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|   return progressTracker && progressTracker->ObserverCount() > 0;
 | |
| }
 | |
| 
 | |
| already_AddRefed<image::Image> imgRequest::GetImage() const {
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   RefPtr<image::Image> image = mImage;
 | |
|   return image.forget();
 | |
| }
 | |
| 
 | |
| void imgRequest::GetFileName(nsACString& aFileName) {
 | |
|   nsAutoString fileName;
 | |
| 
 | |
|   nsCOMPtr<nsISupportsCString> supportscstr;
 | |
|   if (NS_SUCCEEDED(mProperties->Get("content-disposition",
 | |
|                                     NS_GET_IID(nsISupportsCString),
 | |
|                                     getter_AddRefs(supportscstr))) &&
 | |
|       supportscstr) {
 | |
|     nsAutoCString cdHeader;
 | |
|     supportscstr->GetData(cdHeader);
 | |
|     NS_GetFilenameFromDisposition(fileName, cdHeader);
 | |
|   }
 | |
| 
 | |
|   if (fileName.IsEmpty()) {
 | |
|     nsCOMPtr<nsIURL> imgUrl(do_QueryInterface(mURI));
 | |
|     if (imgUrl) {
 | |
|       imgUrl->GetFileName(aFileName);
 | |
|       NS_UnescapeURL(aFileName);
 | |
|     }
 | |
|   } else {
 | |
|     aFileName = NS_ConvertUTF16toUTF8(fileName);
 | |
|   }
 | |
| }
 | |
| 
 | |
| int32_t imgRequest::Priority() const {
 | |
|   int32_t priority = nsISupportsPriority::PRIORITY_NORMAL;
 | |
|   nsCOMPtr<nsISupportsPriority> p = do_QueryInterface(mRequest);
 | |
|   if (p) {
 | |
|     p->GetPriority(&priority);
 | |
|   }
 | |
|   return priority;
 | |
| }
 | |
| 
 | |
| void imgRequest::AdjustPriority(imgRequestProxy* proxy, int32_t delta) {
 | |
|   // only the first proxy is allowed to modify the priority of this image load.
 | |
|   //
 | |
|   // XXX(darin): this is probably not the most optimal algorithm as we may want
 | |
|   // to increase the priority of requests that have a lot of proxies.  the key
 | |
|   // concern though is that image loads remain lower priority than other pieces
 | |
|   // of content such as link clicks, CSS, and JS.
 | |
|   //
 | |
|   if (!mFirstProxy || proxy != mFirstProxy) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   AdjustPriorityInternal(delta);
 | |
| }
 | |
| 
 | |
| void imgRequest::AdjustPriorityInternal(int32_t aDelta) {
 | |
|   nsCOMPtr<nsISupportsPriority> p = do_QueryInterface(mChannel);
 | |
|   if (p) {
 | |
|     p->AdjustPriority(aDelta);
 | |
|   }
 | |
| }
 | |
| 
 | |
| void imgRequest::BoostPriority(uint32_t aCategory) {
 | |
|   if (!StaticPrefs::image_layout_network_priority()) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   uint32_t newRequestedCategory =
 | |
|       (mBoostCategoriesRequested & aCategory) ^ aCategory;
 | |
|   if (!newRequestedCategory) {
 | |
|     // priority boost for each category can only apply once.
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   MOZ_LOG(gImgLog, LogLevel::Debug,
 | |
|           ("[this=%p] imgRequest::BoostPriority for category %x", this,
 | |
|            newRequestedCategory));
 | |
| 
 | |
|   int32_t delta = 0;
 | |
| 
 | |
|   if (newRequestedCategory & imgIRequest::CATEGORY_FRAME_INIT) {
 | |
|     --delta;
 | |
|   }
 | |
| 
 | |
|   if (newRequestedCategory & imgIRequest::CATEGORY_FRAME_STYLE) {
 | |
|     --delta;
 | |
|   }
 | |
| 
 | |
|   if (newRequestedCategory & imgIRequest::CATEGORY_SIZE_QUERY) {
 | |
|     --delta;
 | |
|   }
 | |
| 
 | |
|   if (newRequestedCategory & imgIRequest::CATEGORY_DISPLAY) {
 | |
|     delta += nsISupportsPriority::PRIORITY_HIGH;
 | |
|   }
 | |
| 
 | |
|   AdjustPriorityInternal(delta);
 | |
|   mBoostCategoriesRequested |= newRequestedCategory;
 | |
| }
 | |
| 
 | |
| void imgRequest::SetIsInCache(bool aInCache) {
 | |
|   LOG_FUNC_WITH_PARAM(gImgLog, "imgRequest::SetIsCacheable", "aInCache",
 | |
|                       aInCache);
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   mIsInCache = aInCache;
 | |
| }
 | |
| 
 | |
| void imgRequest::UpdateCacheEntrySize() {
 | |
|   if (!mCacheEntry) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   RefPtr<Image> image = GetImage();
 | |
|   SizeOfState state(moz_malloc_size_of);
 | |
|   size_t size = image->SizeOfSourceWithComputedFallback(state);
 | |
|   mCacheEntry->SetDataSize(size);
 | |
| }
 | |
| 
 | |
| void imgRequest::SetCacheValidation(imgCacheEntry* aCacheEntry,
 | |
|                                     nsIRequest* aRequest) {
 | |
|   /* get the expires info */
 | |
|   if (!aCacheEntry || aCacheEntry->GetExpiryTime() != 0) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   RefPtr<imgRequest> req = aCacheEntry->GetRequest();
 | |
|   MOZ_ASSERT(req);
 | |
|   RefPtr<nsIURI> uri;
 | |
|   req->GetURI(getter_AddRefs(uri));
 | |
|   // TODO(emilio): Seems we should be able to assert `uri` is not null, but we
 | |
|   // get here in such cases sometimes (like for some redirects, see
 | |
|   // docshell/test/chrome/test_bug89419.xhtml).
 | |
|   //
 | |
|   // We have the original URI in the cache key though, probably we should be
 | |
|   // using that instead of relying on Init() getting called.
 | |
|   auto info = nsContentUtils::GetSubresourceCacheValidationInfo(aRequest, uri);
 | |
| 
 | |
|   // Expiration time defaults to 0. We set the expiration time on our entry if
 | |
|   // it hasn't been set yet.
 | |
|   if (!info.mExpirationTime) {
 | |
|     // If the channel doesn't support caching, then ensure this expires the
 | |
|     // next time it is used.
 | |
|     info.mExpirationTime.emplace(nsContentUtils::SecondsFromPRTime(PR_Now()) -
 | |
|                                  1);
 | |
|   }
 | |
|   aCacheEntry->SetExpiryTime(*info.mExpirationTime);
 | |
|   // Cache entries default to not needing to validate. We ensure that
 | |
|   // multiple calls to this function don't override an earlier decision to
 | |
|   // validate by making validation a one-way decision.
 | |
|   if (info.mMustRevalidate) {
 | |
|     aCacheEntry->SetMustValidate(info.mMustRevalidate);
 | |
|   }
 | |
| }
 | |
| 
 | |
| bool imgRequest::GetMultipart() const {
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   return mIsMultiPartChannel;
 | |
| }
 | |
| 
 | |
| bool imgRequest::HadInsecureRedirect() const {
 | |
|   MutexAutoLock lock(mMutex);
 | |
|   return mHadInsecureRedirect;
 | |
| }
 | |
| 
 | |
| /** nsIRequestObserver methods **/
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| imgRequest::OnStartRequest(nsIRequest* aRequest) {
 | |
|   LOG_SCOPE(gImgLog, "imgRequest::OnStartRequest");
 | |
| 
 | |
|   RefPtr<Image> image;
 | |
| 
 | |
|   if (nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aRequest)) {
 | |
|     nsresult rv;
 | |
|     nsCOMPtr<nsILoadInfo> loadInfo = httpChannel->LoadInfo();
 | |
|     mIsDeniedCrossSiteCORSRequest =
 | |
|         loadInfo->GetTainting() == LoadTainting::CORS &&
 | |
|         (NS_FAILED(httpChannel->GetStatus(&rv)) || NS_FAILED(rv));
 | |
|     mIsCrossSiteNoCORSRequest = loadInfo->GetTainting() == LoadTainting::Opaque;
 | |
|   }
 | |
| 
 | |
|   UpdateShouldReportRenderTimeForLCP();
 | |
|   // Figure out if we're multipart.
 | |
|   nsCOMPtr<nsIMultiPartChannel> multiPartChannel = do_QueryInterface(aRequest);
 | |
|   {
 | |
|     MutexAutoLock lock(mMutex);
 | |
| 
 | |
|     MOZ_ASSERT(multiPartChannel || !mIsMultiPartChannel,
 | |
|                "Stopped being multipart?");
 | |
| 
 | |
|     mNewPartPending = true;
 | |
|     image = mImage;
 | |
|     mIsMultiPartChannel = bool(multiPartChannel);
 | |
|   }
 | |
| 
 | |
|   // If we're not multipart, we shouldn't have an image yet.
 | |
|   if (image && !multiPartChannel) {
 | |
|     MOZ_ASSERT_UNREACHABLE("Already have an image for a non-multipart request");
 | |
|     Cancel(NS_IMAGELIB_ERROR_FAILURE);
 | |
|     return NS_ERROR_FAILURE;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * If mRequest is null here, then we need to set it so that we'll be able to
 | |
|    * cancel it if our Cancel() method is called.  Note that this can only
 | |
|    * happen for multipart channels.  We could simply not null out mRequest for
 | |
|    * non-last parts, if GetIsLastPart() were reliable, but it's not.  See
 | |
|    * https://bugzilla.mozilla.org/show_bug.cgi?id=339610
 | |
|    */
 | |
|   if (!mRequest) {
 | |
|     MOZ_ASSERT(multiPartChannel, "Should have mRequest unless we're multipart");
 | |
|     nsCOMPtr<nsIChannel> baseChannel;
 | |
|     multiPartChannel->GetBaseChannel(getter_AddRefs(baseChannel));
 | |
|     mRequest = baseChannel;
 | |
|   }
 | |
| 
 | |
|   nsCOMPtr<nsIChannel> channel(do_QueryInterface(aRequest));
 | |
|   if (channel) {
 | |
|     /* Get our principal */
 | |
|     nsCOMPtr<nsIScriptSecurityManager> secMan =
 | |
|         nsContentUtils::GetSecurityManager();
 | |
|     if (secMan) {
 | |
|       nsresult rv = secMan->GetChannelResultPrincipal(
 | |
|           channel, getter_AddRefs(mPrincipal));
 | |
|       if (NS_FAILED(rv)) {
 | |
|         return rv;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   SetCacheValidation(mCacheEntry, aRequest);
 | |
| 
 | |
|   // Shouldn't we be dead already if this gets hit?
 | |
|   // Probably multipart/x-mixed-replace...
 | |
|   RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|   if (progressTracker->ObserverCount() == 0) {
 | |
|     this->Cancel(NS_IMAGELIB_ERROR_FAILURE);
 | |
|   }
 | |
| 
 | |
|   // Try to retarget OnDataAvailable to a decode thread. We must process data
 | |
|   // URIs synchronously as per the spec however.
 | |
|   if (!channel || IsData()) {
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   nsCOMPtr<nsIThreadRetargetableRequest> retargetable =
 | |
|       do_QueryInterface(aRequest);
 | |
|   if (retargetable) {
 | |
|     nsAutoCString mimeType;
 | |
|     nsresult rv = channel->GetContentType(mimeType);
 | |
|     if (NS_SUCCEEDED(rv) && !mimeType.EqualsLiteral(IMAGE_SVG_XML)) {
 | |
|       // Retarget OnDataAvailable to the DecodePool's IO thread.
 | |
|       nsCOMPtr<nsISerialEventTarget> target =
 | |
|           DecodePool::Singleton()->GetIOEventTarget();
 | |
|       rv = retargetable->RetargetDeliveryTo(target);
 | |
|     }
 | |
|     MOZ_LOG(gImgLog, LogLevel::Warning,
 | |
|             ("[this=%p] imgRequest::OnStartRequest -- "
 | |
|              "RetargetDeliveryTo rv %" PRIu32 "=%s\n",
 | |
|              this, static_cast<uint32_t>(rv),
 | |
|              NS_SUCCEEDED(rv) ? "succeeded" : "failed"));
 | |
|   }
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| imgRequest::OnStopRequest(nsIRequest* aRequest, nsresult status) {
 | |
|   LOG_FUNC(gImgLog, "imgRequest::OnStopRequest");
 | |
|   MOZ_ASSERT(NS_IsMainThread(), "Can't send notifications off-main-thread");
 | |
| 
 | |
|   RefPtr<Image> image = GetImage();
 | |
| 
 | |
|   RefPtr<imgRequest> strongThis = this;
 | |
| 
 | |
|   bool isMultipart = false;
 | |
|   bool newPartPending = false;
 | |
|   {
 | |
|     MutexAutoLock lock(mMutex);
 | |
|     isMultipart = mIsMultiPartChannel;
 | |
|     newPartPending = mNewPartPending;
 | |
|   }
 | |
|   if (isMultipart && newPartPending) {
 | |
|     OnDataAvailable(aRequest, nullptr, 0, 0);
 | |
|   }
 | |
| 
 | |
|   // XXXldb What if this is a non-last part of a multipart request?
 | |
|   // xxx before we release our reference to mRequest, lets
 | |
|   // save the last status that we saw so that the
 | |
|   // imgRequestProxy will have access to it.
 | |
|   if (mRequest) {
 | |
|     mRequest = nullptr;  // we no longer need the request
 | |
|   }
 | |
| 
 | |
|   // stop holding a ref to the channel, since we don't need it anymore
 | |
|   if (mChannel) {
 | |
|     mChannel->SetNotificationCallbacks(mPrevChannelSink);
 | |
|     mPrevChannelSink = nullptr;
 | |
|     mChannel = nullptr;
 | |
|   }
 | |
| 
 | |
|   bool lastPart = true;
 | |
|   nsCOMPtr<nsIMultiPartChannel> mpchan(do_QueryInterface(aRequest));
 | |
|   if (mpchan) {
 | |
|     mpchan->GetIsLastPart(&lastPart);
 | |
|   }
 | |
| 
 | |
|   bool isPartial = false;
 | |
|   if (image && (status == NS_ERROR_NET_PARTIAL_TRANSFER)) {
 | |
|     isPartial = true;
 | |
|     status = NS_OK;  // fake happy face
 | |
|   }
 | |
| 
 | |
|   // Tell the image that it has all of the source data. Note that this can
 | |
|   // trigger a failure, since the image might be waiting for more non-optional
 | |
|   // data and this is the point where we break the news that it's not coming.
 | |
|   if (image) {
 | |
|     nsresult rv = image->OnImageDataComplete(aRequest, status, lastPart);
 | |
| 
 | |
|     // If we got an error in the OnImageDataComplete() call, we don't want to
 | |
|     // proceed as if nothing bad happened. However, we also want to give
 | |
|     // precedence to failure status codes from necko, since presumably they're
 | |
|     // more meaningful.
 | |
|     if (NS_FAILED(rv) && NS_SUCCEEDED(status)) {
 | |
|       status = rv;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // If the request went through, update the cache entry size. Otherwise,
 | |
|   // cancel the request, which removes us from the cache.
 | |
|   if (image && NS_SUCCEEDED(status) && !isPartial) {
 | |
|     // We update the cache entry size here because this is where we finish
 | |
|     // loading compressed source data, which is part of our size calculus.
 | |
|     UpdateCacheEntrySize();
 | |
| 
 | |
|   } else if (isPartial) {
 | |
|     // Remove the partial image from the cache.
 | |
|     this->EvictFromCache();
 | |
| 
 | |
|   } else {
 | |
|     mImageErrorCode = status;
 | |
| 
 | |
|     // if the error isn't "just" a partial transfer
 | |
|     // stops animations, removes from cache
 | |
|     this->Cancel(status);
 | |
|   }
 | |
| 
 | |
|   if (!image) {
 | |
|     // We have to fire the OnStopRequest notifications ourselves because there's
 | |
|     // no image capable of doing so.
 | |
|     Progress progress =
 | |
|         LoadCompleteProgress(lastPart, /* aError = */ false, status);
 | |
| 
 | |
|     RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|     progressTracker->SyncNotifyProgress(progress);
 | |
|   }
 | |
| 
 | |
|   mTimedChannel = nullptr;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| struct mimetype_closure {
 | |
|   nsACString* newType;
 | |
| };
 | |
| 
 | |
| /* prototype for these defined below */
 | |
| static nsresult sniff_mimetype_callback(nsIInputStream* in, void* closure,
 | |
|                                         const char* fromRawSegment,
 | |
|                                         uint32_t toOffset, uint32_t count,
 | |
|                                         uint32_t* writeCount);
 | |
| 
 | |
| /** nsThreadRetargetableStreamListener methods **/
 | |
| NS_IMETHODIMP
 | |
| imgRequest::CheckListenerChain() {
 | |
|   // TODO Might need more checking here.
 | |
|   NS_ASSERTION(NS_IsMainThread(), "Should be on the main thread!");
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| imgRequest::OnDataFinished(nsresult) { return NS_OK; }
 | |
| 
 | |
| /** nsIStreamListener methods **/
 | |
| 
 | |
| struct NewPartResult final {
 | |
|   explicit NewPartResult(image::Image* aExistingImage)
 | |
|       : mImage(aExistingImage),
 | |
|         mIsFirstPart(!aExistingImage),
 | |
|         mSucceeded(false),
 | |
|         mShouldResetCacheEntry(false) {}
 | |
| 
 | |
|   nsAutoCString mContentType;
 | |
|   nsAutoCString mContentDisposition;
 | |
|   RefPtr<image::Image> mImage;
 | |
|   const bool mIsFirstPart;
 | |
|   bool mSucceeded;
 | |
|   bool mShouldResetCacheEntry;
 | |
| };
 | |
| 
 | |
| static NewPartResult PrepareForNewPart(nsIRequest* aRequest,
 | |
|                                        nsIInputStream* aInStr, uint32_t aCount,
 | |
|                                        nsIURI* aURI, bool aIsMultipart,
 | |
|                                        image::Image* aExistingImage,
 | |
|                                        ProgressTracker* aProgressTracker,
 | |
|                                        uint64_t aInnerWindowId) {
 | |
|   NewPartResult result(aExistingImage);
 | |
| 
 | |
|   if (aInStr) {
 | |
|     mimetype_closure closure;
 | |
|     closure.newType = &result.mContentType;
 | |
| 
 | |
|     // Look at the first few bytes and see if we can tell what the data is from
 | |
|     // that since servers tend to lie. :(
 | |
|     uint32_t out;
 | |
|     aInStr->ReadSegments(sniff_mimetype_callback, &closure, aCount, &out);
 | |
|   }
 | |
| 
 | |
|   nsCOMPtr<nsIChannel> chan(do_QueryInterface(aRequest));
 | |
|   if (result.mContentType.IsEmpty()) {
 | |
|     nsresult rv =
 | |
|         chan ? chan->GetContentType(result.mContentType) : NS_ERROR_FAILURE;
 | |
|     if (NS_FAILED(rv)) {
 | |
|       MOZ_LOG(gImgLog, LogLevel::Error,
 | |
|               ("imgRequest::PrepareForNewPart -- "
 | |
|                "Content type unavailable from the channel\n"));
 | |
|       if (!aIsMultipart) {
 | |
|         return result;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   if (chan) {
 | |
|     chan->GetContentDispositionHeader(result.mContentDisposition);
 | |
|   }
 | |
| 
 | |
|   MOZ_LOG(gImgLog, LogLevel::Debug,
 | |
|           ("imgRequest::PrepareForNewPart -- Got content type %s\n",
 | |
|            result.mContentType.get()));
 | |
| 
 | |
|   // XXX If server lied about mimetype and it's SVG, we may need to copy
 | |
|   // the data and dispatch back to the main thread, AND tell the channel to
 | |
|   // dispatch there in the future.
 | |
| 
 | |
|   // Create the new image and give it ownership of our ProgressTracker.
 | |
|   if (aIsMultipart) {
 | |
|     // Create the ProgressTracker and image for this part.
 | |
|     RefPtr<ProgressTracker> progressTracker = new ProgressTracker();
 | |
|     RefPtr<image::Image> partImage = image::ImageFactory::CreateImage(
 | |
|         aRequest, progressTracker, result.mContentType, aURI,
 | |
|         /* aIsMultipart = */ true, aInnerWindowId);
 | |
| 
 | |
|     if (result.mIsFirstPart) {
 | |
|       // First part for a multipart channel. Create the MultipartImage wrapper.
 | |
|       MOZ_ASSERT(aProgressTracker, "Shouldn't have given away tracker yet");
 | |
|       aProgressTracker->SetIsMultipart();
 | |
|       result.mImage = image::ImageFactory::CreateMultipartImage(
 | |
|           partImage, aProgressTracker);
 | |
|     } else {
 | |
|       // Transition to the new part.
 | |
|       auto multipartImage = static_cast<MultipartImage*>(aExistingImage);
 | |
|       multipartImage->BeginTransitionToPart(partImage);
 | |
| 
 | |
|       // Reset our cache entry size so it doesn't keep growing without bound.
 | |
|       result.mShouldResetCacheEntry = true;
 | |
|     }
 | |
|   } else {
 | |
|     MOZ_ASSERT(!aExistingImage, "New part for non-multipart channel?");
 | |
|     MOZ_ASSERT(aProgressTracker, "Shouldn't have given away tracker yet");
 | |
| 
 | |
|     // Create an image using our progress tracker.
 | |
|     result.mImage = image::ImageFactory::CreateImage(
 | |
|         aRequest, aProgressTracker, result.mContentType, aURI,
 | |
|         /* aIsMultipart = */ false, aInnerWindowId);
 | |
|   }
 | |
| 
 | |
|   MOZ_ASSERT(result.mImage);
 | |
|   if (!result.mImage->HasError() || aIsMultipart) {
 | |
|     // We allow multipart images to fail to initialize (which generally
 | |
|     // indicates a bad content type) without cancelling the load, because
 | |
|     // subsequent parts might be fine.
 | |
|     result.mSucceeded = true;
 | |
|   }
 | |
| 
 | |
|   return result;
 | |
| }
 | |
| 
 | |
| class FinishPreparingForNewPartRunnable final : public Runnable {
 | |
|  public:
 | |
|   FinishPreparingForNewPartRunnable(imgRequest* aImgRequest,
 | |
|                                     NewPartResult&& aResult)
 | |
|       : Runnable("FinishPreparingForNewPartRunnable"),
 | |
|         mImgRequest(aImgRequest),
 | |
|         mResult(aResult) {
 | |
|     MOZ_ASSERT(aImgRequest);
 | |
|   }
 | |
| 
 | |
|   NS_IMETHOD Run() override {
 | |
|     mImgRequest->FinishPreparingForNewPart(mResult);
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   RefPtr<imgRequest> mImgRequest;
 | |
|   NewPartResult mResult;
 | |
| };
 | |
| 
 | |
| void imgRequest::FinishPreparingForNewPart(const NewPartResult& aResult) {
 | |
|   MOZ_ASSERT(NS_IsMainThread());
 | |
| 
 | |
|   mContentType = aResult.mContentType;
 | |
| 
 | |
|   SetProperties(aResult.mContentType, aResult.mContentDisposition);
 | |
| 
 | |
|   if (aResult.mIsFirstPart) {
 | |
|     // Notify listeners that we have an image.
 | |
|     mImageAvailable = true;
 | |
|     RefPtr<ProgressTracker> progressTracker = GetProgressTracker();
 | |
|     progressTracker->OnImageAvailable();
 | |
|     MOZ_ASSERT(progressTracker->HasImage());
 | |
|   }
 | |
| 
 | |
|   if (aResult.mShouldResetCacheEntry) {
 | |
|     ResetCacheEntry();
 | |
|   }
 | |
| 
 | |
|   if (IsDecodeRequested()) {
 | |
|     aResult.mImage->StartDecoding(imgIContainer::FLAG_NONE);
 | |
|   }
 | |
| }
 | |
| 
 | |
| bool imgRequest::ImageAvailable() const { return mImageAvailable; }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| imgRequest::OnDataAvailable(nsIRequest* aRequest, nsIInputStream* aInStr,
 | |
|                             uint64_t aOffset, uint32_t aCount) {
 | |
|   LOG_SCOPE_WITH_PARAM(gImgLog, "imgRequest::OnDataAvailable", "count", aCount);
 | |
| 
 | |
|   NS_ASSERTION(aRequest, "imgRequest::OnDataAvailable -- no request!");
 | |
| 
 | |
|   RefPtr<Image> image;
 | |
|   RefPtr<ProgressTracker> progressTracker;
 | |
|   bool isMultipart = false;
 | |
|   bool newPartPending = false;
 | |
|   uint64_t innerWindowId = 0;
 | |
| 
 | |
|   // Retrieve and update our state.
 | |
|   {
 | |
|     MutexAutoLock lock(mMutex);
 | |
|     image = mImage;
 | |
|     progressTracker = mProgressTracker;
 | |
|     isMultipart = mIsMultiPartChannel;
 | |
|     newPartPending = mNewPartPending;
 | |
|     mNewPartPending = false;
 | |
|     innerWindowId = mInnerWindowId;
 | |
|   }
 | |
| 
 | |
|   // If this is a new part, we need to sniff its content type and create an
 | |
|   // appropriate image.
 | |
|   if (newPartPending) {
 | |
|     NewPartResult result =
 | |
|         PrepareForNewPart(aRequest, aInStr, aCount, mURI, isMultipart, image,
 | |
|                           progressTracker, innerWindowId);
 | |
|     bool succeeded = result.mSucceeded;
 | |
| 
 | |
|     if (result.mImage) {
 | |
|       image = result.mImage;
 | |
|       nsCOMPtr<nsIEventTarget> eventTarget;
 | |
| 
 | |
|       // Update our state to reflect this new part.
 | |
|       {
 | |
|         MutexAutoLock lock(mMutex);
 | |
|         mImage = image;
 | |
| 
 | |
|         // We only get an event target if we are not on the main thread, because
 | |
|         // we have to dispatch in that case. If we are on the main thread, but
 | |
|         // on a different scheduler group than ProgressTracker would give us,
 | |
|         // that is okay because nothing in imagelib requires that, just our
 | |
|         // listeners (which have their own checks).
 | |
|         if (!NS_IsMainThread()) {
 | |
|           eventTarget = mProgressTracker->GetEventTarget();
 | |
|           MOZ_ASSERT(eventTarget);
 | |
|         }
 | |
| 
 | |
|         mProgressTracker = nullptr;
 | |
|       }
 | |
| 
 | |
|       // Some property objects are not threadsafe, and we need to send
 | |
|       // OnImageAvailable on the main thread, so finish on the main thread.
 | |
|       if (!eventTarget) {
 | |
|         MOZ_ASSERT(NS_IsMainThread());
 | |
|         FinishPreparingForNewPart(result);
 | |
|       } else {
 | |
|         nsCOMPtr<nsIRunnable> runnable =
 | |
|             new FinishPreparingForNewPartRunnable(this, std::move(result));
 | |
|         eventTarget->Dispatch(CreateRenderBlockingRunnable(runnable.forget()),
 | |
|                               NS_DISPATCH_NORMAL);
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     if (!succeeded) {
 | |
|       // Something went wrong; probably a content type issue.
 | |
|       Cancel(NS_IMAGELIB_ERROR_FAILURE);
 | |
|       return NS_BINDING_ABORTED;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Notify the image that it has new data.
 | |
|   if (aInStr) {
 | |
|     nsresult rv =
 | |
|         image->OnImageDataAvailable(aRequest, aInStr, aOffset, aCount);
 | |
| 
 | |
|     if (NS_FAILED(rv)) {
 | |
|       MOZ_LOG(gImgLog, LogLevel::Warning,
 | |
|               ("[this=%p] imgRequest::OnDataAvailable -- "
 | |
|                "copy to RasterImage failed\n",
 | |
|                this));
 | |
|       Cancel(NS_IMAGELIB_ERROR_FAILURE);
 | |
|       return NS_BINDING_ABORTED;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| void imgRequest::SetProperties(const nsACString& aContentType,
 | |
|                                const nsACString& aContentDisposition) {
 | |
|   /* set our mimetype as a property */
 | |
|   nsCOMPtr<nsISupportsCString> contentType =
 | |
|       do_CreateInstance("@mozilla.org/supports-cstring;1");
 | |
|   if (contentType) {
 | |
|     contentType->SetData(aContentType);
 | |
|     mProperties->Set("type", contentType);
 | |
|   }
 | |
| 
 | |
|   /* set our content disposition as a property */
 | |
|   if (!aContentDisposition.IsEmpty()) {
 | |
|     nsCOMPtr<nsISupportsCString> contentDisposition =
 | |
|         do_CreateInstance("@mozilla.org/supports-cstring;1");
 | |
|     if (contentDisposition) {
 | |
|       contentDisposition->SetData(aContentDisposition);
 | |
|       mProperties->Set("content-disposition", contentDisposition);
 | |
|     }
 | |
|   }
 | |
| }
 | |
| 
 | |
| static nsresult sniff_mimetype_callback(nsIInputStream* in, void* data,
 | |
|                                         const char* fromRawSegment,
 | |
|                                         uint32_t toOffset, uint32_t count,
 | |
|                                         uint32_t* writeCount) {
 | |
|   mimetype_closure* closure = static_cast<mimetype_closure*>(data);
 | |
| 
 | |
|   NS_ASSERTION(closure, "closure is null!");
 | |
| 
 | |
|   if (count > 0) {
 | |
|     imgLoader::GetMimeTypeFromContent(fromRawSegment, count, *closure->newType);
 | |
|   }
 | |
| 
 | |
|   *writeCount = 0;
 | |
|   return NS_ERROR_FAILURE;
 | |
| }
 | |
| 
 | |
| /** nsIInterfaceRequestor methods **/
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| imgRequest::GetInterface(const nsIID& aIID, void** aResult) {
 | |
|   if (!mPrevChannelSink || aIID.Equals(NS_GET_IID(nsIChannelEventSink))) {
 | |
|     return QueryInterface(aIID, aResult);
 | |
|   }
 | |
| 
 | |
|   NS_ASSERTION(
 | |
|       mPrevChannelSink != this,
 | |
|       "Infinite recursion - don't keep track of channel sinks that are us!");
 | |
|   return mPrevChannelSink->GetInterface(aIID, aResult);
 | |
| }
 | |
| 
 | |
| /** nsIChannelEventSink methods **/
 | |
| NS_IMETHODIMP
 | |
| imgRequest::AsyncOnChannelRedirect(nsIChannel* oldChannel,
 | |
|                                    nsIChannel* newChannel, uint32_t flags,
 | |
|                                    nsIAsyncVerifyRedirectCallback* callback) {
 | |
|   NS_ASSERTION(mRequest && mChannel,
 | |
|                "Got a channel redirect after we nulled out mRequest!");
 | |
|   NS_ASSERTION(mChannel == oldChannel,
 | |
|                "Got a channel redirect for an unknown channel!");
 | |
|   NS_ASSERTION(newChannel, "Got a redirect to a NULL channel!");
 | |
| 
 | |
|   SetCacheValidation(mCacheEntry, oldChannel);
 | |
| 
 | |
|   // Prepare for callback
 | |
|   mRedirectCallback = callback;
 | |
|   mNewRedirectChannel = newChannel;
 | |
| 
 | |
|   nsCOMPtr<nsIChannelEventSink> sink(do_GetInterface(mPrevChannelSink));
 | |
|   if (sink) {
 | |
|     nsresult rv =
 | |
|         sink->AsyncOnChannelRedirect(oldChannel, newChannel, flags, this);
 | |
|     if (NS_FAILED(rv)) {
 | |
|       mRedirectCallback = nullptr;
 | |
|       mNewRedirectChannel = nullptr;
 | |
|     }
 | |
|     return rv;
 | |
|   }
 | |
| 
 | |
|   (void)OnRedirectVerifyCallback(NS_OK);
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| NS_IMETHODIMP
 | |
| imgRequest::OnRedirectVerifyCallback(nsresult result) {
 | |
|   NS_ASSERTION(mRedirectCallback, "mRedirectCallback not set in callback");
 | |
|   NS_ASSERTION(mNewRedirectChannel, "mNewRedirectChannel not set in callback");
 | |
| 
 | |
|   if (NS_FAILED(result)) {
 | |
|     mRedirectCallback->OnRedirectVerifyCallback(result);
 | |
|     mRedirectCallback = nullptr;
 | |
|     mNewRedirectChannel = nullptr;
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   mChannel = mNewRedirectChannel;
 | |
|   mTimedChannel = do_QueryInterface(mChannel);
 | |
|   mNewRedirectChannel = nullptr;
 | |
| 
 | |
|   if (LOG_TEST(LogLevel::Debug)) {
 | |
|     LOG_MSG_WITH_PARAM(gImgLog, "imgRequest::OnChannelRedirect", "old",
 | |
|                        mFinalURI ? mFinalURI->GetSpecOrDefault().get() : "");
 | |
|   }
 | |
| 
 | |
|   // If the previous URI is a non-HTTPS URI, record that fact for later use by
 | |
|   // security code, which needs to know whether there is an insecure load at any
 | |
|   // point in the redirect chain.
 | |
|   bool schemeLocal = false;
 | |
|   if (NS_FAILED(NS_URIChainHasFlags(mFinalURI,
 | |
|                                     nsIProtocolHandler::URI_IS_LOCAL_RESOURCE,
 | |
|                                     &schemeLocal)) ||
 | |
|       (!mFinalURI->SchemeIs("https") && !mFinalURI->SchemeIs("chrome") &&
 | |
|        !schemeLocal)) {
 | |
|     MutexAutoLock lock(mMutex);
 | |
| 
 | |
|     // The csp directive upgrade-insecure-requests performs an internal redirect
 | |
|     // to upgrade all requests from http to https before any data is fetched
 | |
|     // from the network. Do not pollute mHadInsecureRedirect in case of such an
 | |
|     // internal redirect.
 | |
|     nsCOMPtr<nsILoadInfo> loadInfo = mChannel->LoadInfo();
 | |
|     bool upgradeInsecureRequests =
 | |
|         loadInfo ? loadInfo->GetUpgradeInsecureRequests() ||
 | |
|                        loadInfo->GetBrowserUpgradeInsecureRequests()
 | |
|                  : false;
 | |
|     if (!upgradeInsecureRequests) {
 | |
|       mHadInsecureRedirect = true;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Update the final URI.
 | |
|   mChannel->GetURI(getter_AddRefs(mFinalURI));
 | |
| 
 | |
|   if (LOG_TEST(LogLevel::Debug)) {
 | |
|     LOG_MSG_WITH_PARAM(gImgLog, "imgRequest::OnChannelRedirect", "new",
 | |
|                        mFinalURI ? mFinalURI->GetSpecOrDefault().get() : "");
 | |
|   }
 | |
| 
 | |
|   // Make sure we have a protocol that returns data rather than opens an
 | |
|   // external application, e.g. 'mailto:'.
 | |
|   if (nsContentUtils::IsExternalProtocol(mFinalURI)) {
 | |
|     mRedirectCallback->OnRedirectVerifyCallback(NS_ERROR_ABORT);
 | |
|     mRedirectCallback = nullptr;
 | |
|     return NS_OK;
 | |
|   }
 | |
| 
 | |
|   mRedirectCallback->OnRedirectVerifyCallback(NS_OK);
 | |
|   mRedirectCallback = nullptr;
 | |
|   return NS_OK;
 | |
| }
 | |
| 
 | |
| void imgRequest::UpdateShouldReportRenderTimeForLCP() {
 | |
|   if (mTimedChannel) {
 | |
|     bool allRedirectPassTAO = false;
 | |
|     mTimedChannel->GetAllRedirectsPassTimingAllowCheck(&allRedirectPassTAO);
 | |
|     mShouldReportRenderTimeForLCP =
 | |
|         mTimedChannel->TimingAllowCheck(mTriggeringPrincipal) &&
 | |
|         allRedirectPassTAO;
 | |
|   }
 | |
| }
 |