summaryrefslogtreecommitdiffstats
path: root/layout/style/Loader.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'layout/style/Loader.cpp')
-rw-r--r--layout/style/Loader.cpp2344
1 files changed, 2344 insertions, 0 deletions
diff --git a/layout/style/Loader.cpp b/layout/style/Loader.cpp
new file mode 100644
index 0000000000..ebbc934466
--- /dev/null
+++ b/layout/style/Loader.cpp
@@ -0,0 +1,2344 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+/* loading of CSS style sheets using the network APIs */
+
+#include "mozilla/css/Loader.h"
+
+#include "mozilla/ArrayUtils.h"
+#include "mozilla/dom/DocGroup.h"
+#include "mozilla/dom/FetchPriority.h"
+#include "mozilla/dom/SRILogHelper.h"
+#include "mozilla/IntegerPrintfMacros.h"
+#include "mozilla/AutoRestore.h"
+#include "mozilla/LoadInfo.h"
+#include "mozilla/Logging.h"
+#include "mozilla/MemoryReporting.h"
+#include "mozilla/PreloadHashKey.h"
+#include "mozilla/ResultExtensions.h"
+#include "mozilla/SchedulerGroup.h"
+#include "mozilla/URLPreloader.h"
+#include "nsIChildChannel.h"
+#include "nsISupportsPriority.h"
+#include "nsITimedChannel.h"
+#include "nsICachingChannel.h"
+#include "nsSyncLoadService.h"
+#include "nsContentSecurityManager.h"
+#include "nsCOMPtr.h"
+#include "nsString.h"
+#include "nsIContent.h"
+#include "nsIContentInlines.h"
+#include "nsICookieJarSettings.h"
+#include "mozilla/dom/Document.h"
+#include "nsIURI.h"
+#include "nsNetUtil.h"
+#include "nsContentUtils.h"
+#include "nsIScriptSecurityManager.h"
+#include "nsContentPolicyUtils.h"
+#include "nsIHttpChannel.h"
+#include "nsIHttpChannelInternal.h"
+#include "nsIClassOfService.h"
+#include "nsIScriptError.h"
+#include "nsMimeTypes.h"
+#include "nsICSSLoaderObserver.h"
+#include "nsThreadUtils.h"
+#include "nsGkAtoms.h"
+#include "nsIThreadInternal.h"
+#include "nsINetworkPredictor.h"
+#include "nsQueryActor.h"
+#include "nsStringStream.h"
+#include "mozilla/dom/MediaList.h"
+#include "mozilla/dom/ShadowRoot.h"
+#include "mozilla/dom/URL.h"
+#include "mozilla/net/UrlClassifierFeatureFactory.h"
+#include "mozilla/AsyncEventDispatcher.h"
+#include "mozilla/ProfilerLabels.h"
+#include "mozilla/ServoBindings.h"
+#include "mozilla/StyleSheet.h"
+#include "mozilla/StyleSheetInlines.h"
+#include "mozilla/ConsoleReportCollector.h"
+#include "mozilla/ServoUtils.h"
+#include "mozilla/css/StreamLoader.h"
+#include "mozilla/SharedStyleSheetCache.h"
+#include "mozilla/StaticPrefs_layout.h"
+#include "mozilla/StaticPrefs_dom.h"
+#include "mozilla/StaticPrefs_network.h"
+#include "mozilla/Try.h"
+#include "ReferrerInfo.h"
+
+#include "nsXULPrototypeCache.h"
+
+#include "nsError.h"
+
+#include "mozilla/dom/SRICheck.h"
+
+#include "mozilla/Encoding.h"
+
+using namespace mozilla::dom;
+
+// 1024 bytes is specified in https://drafts.csswg.org/css-syntax/
+#define SNIFFING_BUFFER_SIZE 1024
+
+/**
+ * OVERALL ARCHITECTURE
+ *
+ * The CSS Loader gets requests to load various sorts of style sheets:
+ * inline style from <style> elements, linked style, @import-ed child
+ * sheets, non-document sheets. The loader handles the following tasks:
+ * 1) Creation of the actual style sheet objects: CreateSheet()
+ * 2) setting of the right media, title, enabled state, etc on the
+ * sheet: PrepareSheet()
+ * 3) Insertion of the sheet in the proper cascade order:
+ * InsertSheetInTree() and InsertChildSheet()
+ * 4) Load of the sheet: LoadSheet() including security checks
+ * 5) Parsing of the sheet: ParseSheet()
+ * 6) Cleanup: SheetComplete()
+ *
+ * The detailed documentation for these functions is found with the
+ * function implementations.
+ *
+ * The following helper object is used:
+ * SheetLoadData -- a small class that is used to store all the
+ * information needed for the loading of a sheet;
+ * this class handles listening for the stream
+ * loader completion and also handles charset
+ * determination.
+ */
+
+extern mozilla::LazyLogModule sCssLoaderLog;
+mozilla::LazyLogModule sCssLoaderLog("nsCSSLoader");
+
+static mozilla::LazyLogModule gSriPRLog("SRI");
+
+static bool IsPrivilegedURI(nsIURI* aURI) {
+ return aURI->SchemeIs("chrome") || aURI->SchemeIs("resource");
+}
+
+#define LOG_ERROR(args) MOZ_LOG(sCssLoaderLog, mozilla::LogLevel::Error, args)
+#define LOG_WARN(args) MOZ_LOG(sCssLoaderLog, mozilla::LogLevel::Warning, args)
+#define LOG_DEBUG(args) MOZ_LOG(sCssLoaderLog, mozilla::LogLevel::Debug, args)
+#define LOG(args) LOG_DEBUG(args)
+
+#define LOG_ERROR_ENABLED() \
+ MOZ_LOG_TEST(sCssLoaderLog, mozilla::LogLevel::Error)
+#define LOG_WARN_ENABLED() \
+ MOZ_LOG_TEST(sCssLoaderLog, mozilla::LogLevel::Warning)
+#define LOG_DEBUG_ENABLED() \
+ MOZ_LOG_TEST(sCssLoaderLog, mozilla::LogLevel::Debug)
+#define LOG_ENABLED() LOG_DEBUG_ENABLED()
+
+#define LOG_URI(format, uri) \
+ PR_BEGIN_MACRO \
+ NS_ASSERTION(uri, "Logging null uri"); \
+ if (LOG_ENABLED()) { \
+ LOG((format, uri->GetSpecOrDefault().get())); \
+ } \
+ PR_END_MACRO
+
+// And some convenience strings...
+static const char* const gStateStrings[] = {"NeedsParser", "Pending", "Loading",
+ "Complete"};
+
+namespace mozilla {
+
+SheetLoadDataHashKey::SheetLoadDataHashKey(const css::SheetLoadData& aLoadData)
+ : mURI(aLoadData.mURI),
+ mPrincipal(aLoadData.mTriggeringPrincipal),
+ mLoaderPrincipal(aLoadData.mLoader->LoaderPrincipal()),
+ mPartitionPrincipal(aLoadData.mLoader->PartitionedPrincipal()),
+ mEncodingGuess(aLoadData.mGuessedEncoding),
+ mCORSMode(aLoadData.mSheet->GetCORSMode()),
+ mParsingMode(aLoadData.mSheet->ParsingMode()),
+ mCompatMode(aLoadData.mCompatMode),
+ mIsLinkRelPreload(aLoadData.IsLinkRelPreload()) {
+ MOZ_COUNT_CTOR(SheetLoadDataHashKey);
+ MOZ_ASSERT(mURI);
+ MOZ_ASSERT(mPrincipal);
+ MOZ_ASSERT(mLoaderPrincipal);
+ MOZ_ASSERT(mPartitionPrincipal);
+ aLoadData.mSheet->GetIntegrity(mSRIMetadata);
+}
+
+bool SheetLoadDataHashKey::KeyEquals(const SheetLoadDataHashKey& aKey) const {
+ {
+ bool eq;
+ if (NS_FAILED(mURI->Equals(aKey.mURI, &eq)) || !eq) {
+ return false;
+ }
+ }
+
+ LOG_URI("KeyEquals(%s)\n", mURI);
+
+ if (mParsingMode != aKey.mParsingMode) {
+ LOG((" > Parsing mode mismatch\n"));
+ return false;
+ }
+
+ // Chrome URIs ignore everything else.
+ if (IsPrivilegedURI(mURI)) {
+ return true;
+ }
+
+ if (!mPrincipal->Equals(aKey.mPrincipal)) {
+ LOG((" > Principal mismatch\n"));
+ return false;
+ }
+
+ // We only check for partition principal equality if any of the loads are
+ // triggered by a document rather than e.g. an extension (which have different
+ // origins than the loader principal).
+ if (mPrincipal->Equals(mLoaderPrincipal) ||
+ aKey.mPrincipal->Equals(aKey.mLoaderPrincipal)) {
+ if (!mPartitionPrincipal->Equals(aKey.mPartitionPrincipal)) {
+ LOG((" > Partition principal mismatch\n"));
+ return false;
+ }
+ }
+
+ if (mCORSMode != aKey.mCORSMode) {
+ LOG((" > CORS mismatch\n"));
+ return false;
+ }
+
+ if (mCompatMode != aKey.mCompatMode) {
+ LOG((" > Quirks mismatch\n"));
+ return false;
+ }
+
+ // If encoding differs, then don't reuse the cache.
+ //
+ // TODO(emilio): When the encoding is determined from the request (either
+ // BOM or Content-Length or @charset), we could do a bit better,
+ // theoretically.
+ if (mEncodingGuess != aKey.mEncodingGuess) {
+ LOG((" > Encoding guess mismatch\n"));
+ return false;
+ }
+
+ // Consuming stylesheet tags must never coalesce to <link preload> initiated
+ // speculative loads with a weaker SRI hash or its different value. This
+ // check makes sure that regular loads will never find such a weaker preload
+ // and rather start a new, independent load with new, stronger SRI checker
+ // set up, so that integrity is ensured.
+ if (mIsLinkRelPreload != aKey.mIsLinkRelPreload) {
+ const auto& linkPreloadMetadata =
+ mIsLinkRelPreload ? mSRIMetadata : aKey.mSRIMetadata;
+ const auto& consumerPreloadMetadata =
+ mIsLinkRelPreload ? aKey.mSRIMetadata : mSRIMetadata;
+
+ if (!consumerPreloadMetadata.CanTrustBeDelegatedTo(linkPreloadMetadata)) {
+ LOG((" > Preload SRI metadata mismatch\n"));
+ return false;
+ }
+ }
+
+ return true;
+}
+
+namespace css {
+
+static NotNull<const Encoding*> GetFallbackEncoding(
+ Loader& aLoader, nsINode* aOwningNode,
+ const Encoding* aPreloadOrParentDataEncoding) {
+ const Encoding* encoding;
+ // Now try the charset on the <link> or processing instruction
+ // that loaded us
+ if (aOwningNode) {
+ nsAutoString label16;
+ LinkStyle::FromNode(*aOwningNode)->GetCharset(label16);
+ encoding = Encoding::ForLabel(label16);
+ if (encoding) {
+ return WrapNotNull(encoding);
+ }
+ }
+
+ // Try preload or parent sheet encoding.
+ if (aPreloadOrParentDataEncoding) {
+ return WrapNotNull(aPreloadOrParentDataEncoding);
+ }
+
+ if (auto* doc = aLoader.GetDocument()) {
+ // Use the document charset.
+ return doc->GetDocumentCharacterSet();
+ }
+
+ return UTF_8_ENCODING;
+}
+
+/********************************
+ * SheetLoadData implementation *
+ ********************************/
+NS_IMPL_ISUPPORTS(SheetLoadData, nsISupports)
+
+SheetLoadData::SheetLoadData(
+ css::Loader* aLoader, const nsAString& aTitle, nsIURI* aURI,
+ StyleSheet* aSheet, SyncLoad aSyncLoad, nsINode* aOwningNode,
+ IsAlternate aIsAlternate, MediaMatched aMediaMatches,
+ StylePreloadKind aPreloadKind, nsICSSLoaderObserver* aObserver,
+ nsIPrincipal* aTriggeringPrincipal, nsIReferrerInfo* aReferrerInfo,
+ const nsAString& aNonce, FetchPriority aFetchPriority)
+ : mLoader(aLoader),
+ mTitle(aTitle),
+ mEncoding(nullptr),
+ mURI(aURI),
+ mSheet(aSheet),
+ mPendingChildren(0),
+ mSyncLoad(aSyncLoad == SyncLoad::Yes),
+ mIsNonDocumentSheet(false),
+ mIsChildSheet(aSheet->GetParentSheet()),
+ mIsBeingParsed(false),
+ mIsLoading(false),
+ mIsCancelled(false),
+ mMustNotify(false),
+ mHadOwnerNode(!!aOwningNode),
+ mWasAlternate(aIsAlternate == IsAlternate::Yes),
+ mMediaMatched(aMediaMatches == MediaMatched::Yes),
+ mUseSystemPrincipal(false),
+ mSheetAlreadyComplete(false),
+ mIsCrossOriginNoCORS(false),
+ mBlockResourceTiming(false),
+ mLoadFailed(false),
+ mPreloadKind(aPreloadKind),
+ mObserver(aObserver),
+ mTriggeringPrincipal(aTriggeringPrincipal),
+ mReferrerInfo(aReferrerInfo),
+ mNonce(aNonce),
+ mFetchPriority{aFetchPriority},
+ mGuessedEncoding(GetFallbackEncoding(*aLoader, aOwningNode, nullptr)),
+ mCompatMode(aLoader->CompatMode(aPreloadKind)) {
+ MOZ_ASSERT(!aOwningNode || dom::LinkStyle::FromNode(*aOwningNode),
+ "Must implement LinkStyle");
+ MOZ_ASSERT(mTriggeringPrincipal);
+ MOZ_ASSERT(mLoader, "Must have a loader!");
+}
+
+SheetLoadData::SheetLoadData(css::Loader* aLoader, nsIURI* aURI,
+ StyleSheet* aSheet, SheetLoadData* aParentData,
+ nsICSSLoaderObserver* aObserver,
+ nsIPrincipal* aTriggeringPrincipal,
+ nsIReferrerInfo* aReferrerInfo)
+ : mLoader(aLoader),
+ mEncoding(nullptr),
+ mURI(aURI),
+ mSheet(aSheet),
+ mParentData(aParentData),
+ mPendingChildren(0),
+ mSyncLoad(aParentData && aParentData->mSyncLoad),
+ mIsNonDocumentSheet(aParentData && aParentData->mIsNonDocumentSheet),
+ mIsChildSheet(aSheet->GetParentSheet()),
+ mIsBeingParsed(false),
+ mIsLoading(false),
+ mIsCancelled(false),
+ mMustNotify(false),
+ mHadOwnerNode(false),
+ mWasAlternate(false),
+ mMediaMatched(true),
+ mUseSystemPrincipal(aParentData && aParentData->mUseSystemPrincipal),
+ mSheetAlreadyComplete(false),
+ mIsCrossOriginNoCORS(false),
+ mBlockResourceTiming(false),
+ mLoadFailed(false),
+ mPreloadKind(StylePreloadKind::None),
+ mObserver(aObserver),
+ mTriggeringPrincipal(aTriggeringPrincipal),
+ mReferrerInfo(aReferrerInfo),
+ mNonce(u""_ns),
+ mFetchPriority(FetchPriority::Auto),
+ mGuessedEncoding(GetFallbackEncoding(
+ *aLoader, nullptr, aParentData ? aParentData->mEncoding : nullptr)),
+ mCompatMode(aLoader->CompatMode(mPreloadKind)) {
+ MOZ_ASSERT(mLoader, "Must have a loader!");
+ MOZ_ASSERT(mTriggeringPrincipal);
+ MOZ_ASSERT(!mUseSystemPrincipal || mSyncLoad,
+ "Shouldn't use system principal for async loads");
+ MOZ_ASSERT_IF(aParentData, mIsChildSheet);
+}
+
+SheetLoadData::SheetLoadData(
+ css::Loader* aLoader, nsIURI* aURI, StyleSheet* aSheet, SyncLoad aSyncLoad,
+ UseSystemPrincipal aUseSystemPrincipal, StylePreloadKind aPreloadKind,
+ const Encoding* aPreloadEncoding, nsICSSLoaderObserver* aObserver,
+ nsIPrincipal* aTriggeringPrincipal, nsIReferrerInfo* aReferrerInfo,
+ const nsAString& aNonce, FetchPriority aFetchPriority)
+ : mLoader(aLoader),
+ mEncoding(nullptr),
+ mURI(aURI),
+ mSheet(aSheet),
+ mPendingChildren(0),
+ mSyncLoad(aSyncLoad == SyncLoad::Yes),
+ mIsNonDocumentSheet(true),
+ mIsChildSheet(false),
+ mIsBeingParsed(false),
+ mIsLoading(false),
+ mIsCancelled(false),
+ mMustNotify(false),
+ mHadOwnerNode(false),
+ mWasAlternate(false),
+ mMediaMatched(true),
+ mUseSystemPrincipal(aUseSystemPrincipal == UseSystemPrincipal::Yes),
+ mSheetAlreadyComplete(false),
+ mIsCrossOriginNoCORS(false),
+ mBlockResourceTiming(false),
+ mLoadFailed(false),
+ mPreloadKind(aPreloadKind),
+ mObserver(aObserver),
+ mTriggeringPrincipal(aTriggeringPrincipal),
+ mReferrerInfo(aReferrerInfo),
+ mNonce(aNonce),
+ mFetchPriority(aFetchPriority),
+ mGuessedEncoding(
+ GetFallbackEncoding(*aLoader, nullptr, aPreloadEncoding)),
+ mCompatMode(aLoader->CompatMode(aPreloadKind)) {
+ MOZ_ASSERT(mTriggeringPrincipal);
+ MOZ_ASSERT(mLoader, "Must have a loader!");
+ MOZ_ASSERT(!mUseSystemPrincipal || mSyncLoad,
+ "Shouldn't use system principal for async loads");
+ MOZ_ASSERT(!aSheet->GetParentSheet(), "Shouldn't be used for child loads");
+}
+
+SheetLoadData::~SheetLoadData() {
+ MOZ_RELEASE_ASSERT(mSheetCompleteCalled || mIntentionallyDropped,
+ "Should always call SheetComplete, except when "
+ "dropping the load");
+}
+
+RefPtr<StyleSheet> SheetLoadData::ValueForCache() const {
+ // We need to clone the sheet on insertion to the cache because otherwise the
+ // stylesheets can keep full windows alive via either their JS wrapper, or via
+ // StyleSheet::mRelevantGlobal.
+ //
+ // If this ever changes, then you also need to fix up the memory reporting in
+ // both SizeOfIncludingThis and nsXULPrototypeCache::CollectMemoryReports.
+ return mSheet->Clone(nullptr, nullptr);
+}
+
+void SheetLoadData::PrioritizeAsPreload(nsIChannel* aChannel) {
+ if (nsCOMPtr<nsISupportsPriority> sp = do_QueryInterface(aChannel)) {
+ sp->AdjustPriority(nsISupportsPriority::PRIORITY_HIGHEST);
+ }
+}
+
+void SheetLoadData::StartPendingLoad() {
+ mLoader->LoadSheet(*this, Loader::SheetState::NeedsParser, 0,
+ Loader::PendingLoad::Yes);
+}
+
+already_AddRefed<AsyncEventDispatcher>
+SheetLoadData::PrepareLoadEventIfNeeded() {
+ nsCOMPtr<nsINode> node = mSheet->GetOwnerNode();
+ if (!node) {
+ return nullptr;
+ }
+ MOZ_ASSERT(!RootLoadData().IsLinkRelPreload(),
+ "rel=preload handled elsewhere");
+ RefPtr<AsyncEventDispatcher> dispatcher;
+ if (BlocksLoadEvent()) {
+ dispatcher = new LoadBlockingAsyncEventDispatcher(
+ node, mLoadFailed ? u"error"_ns : u"load"_ns, CanBubble::eNo,
+ ChromeOnlyDispatch::eNo);
+ } else {
+ // Fire the load event on the link, but don't block the document load.
+ dispatcher =
+ new AsyncEventDispatcher(node, mLoadFailed ? u"error"_ns : u"load"_ns,
+ CanBubble::eNo, ChromeOnlyDispatch::eNo);
+ }
+ return dispatcher.forget();
+}
+
+nsINode* SheetLoadData::GetRequestingNode() const {
+ if (nsINode* node = mSheet->GetOwnerNodeOfOutermostSheet()) {
+ return node;
+ }
+ return mLoader->GetDocument();
+}
+
+/*********************
+ * Style sheet reuse *
+ *********************/
+
+bool LoaderReusableStyleSheets::FindReusableStyleSheet(
+ nsIURI* aURL, RefPtr<StyleSheet>& aResult) {
+ MOZ_ASSERT(aURL);
+ for (size_t i = mReusableSheets.Length(); i > 0; --i) {
+ size_t index = i - 1;
+ bool sameURI;
+ MOZ_ASSERT(mReusableSheets[index]->GetOriginalURI());
+ nsresult rv =
+ aURL->Equals(mReusableSheets[index]->GetOriginalURI(), &sameURI);
+ if (!NS_FAILED(rv) && sameURI) {
+ aResult = mReusableSheets[index];
+ mReusableSheets.RemoveElementAt(index);
+ return true;
+ }
+ }
+ return false;
+}
+/*************************
+ * Loader Implementation *
+ *************************/
+
+Loader::Loader()
+ : mDocument(nullptr),
+ mDocumentCompatMode(eCompatibility_FullStandards),
+ mReporter(new ConsoleReportCollector()) {}
+
+Loader::Loader(DocGroup* aDocGroup) : Loader() { mDocGroup = aDocGroup; }
+
+Loader::Loader(Document* aDocument) : Loader() {
+ MOZ_ASSERT(aDocument, "We should get a valid document from the caller!");
+ mDocument = aDocument;
+ mIsDocumentAssociated = true;
+ mDocumentCompatMode = aDocument->GetCompatibilityMode();
+ mSheets = SharedStyleSheetCache::Get();
+ RegisterInSheetCache();
+}
+
+// Note: no real need to revoke our stylesheet loaded events -- they hold strong
+// references to us, so if we're going away that means they're all done.
+Loader::~Loader() = default;
+
+void Loader::RegisterInSheetCache() {
+ MOZ_ASSERT(mDocument);
+ MOZ_ASSERT(mSheets);
+
+ mSheets->RegisterLoader(*this);
+}
+
+void Loader::DeregisterFromSheetCache() {
+ MOZ_ASSERT(mDocument);
+ MOZ_ASSERT(mSheets);
+
+ mSheets->CancelLoadsForLoader(*this);
+ mSheets->UnregisterLoader(*this);
+}
+
+void Loader::DropDocumentReference() {
+ // Flush out pending datas just so we don't leak by accident.
+ if (mSheets) {
+ DeregisterFromSheetCache();
+ }
+ mDocument = nullptr;
+}
+
+void Loader::DocumentStyleSheetSetChanged() {
+ MOZ_ASSERT(mDocument);
+
+ // start any pending alternates that aren't alternates anymore
+ mSheets->StartPendingLoadsForLoader(*this, [&](const SheetLoadData& aData) {
+ return IsAlternateSheet(aData.mTitle, true) != IsAlternate::Yes;
+ });
+}
+
+static const char kCharsetSym[] = "@charset \"";
+
+static bool GetCharsetFromData(const char* aStyleSheetData,
+ uint32_t aDataLength, nsACString& aCharset) {
+ aCharset.Truncate();
+ if (aDataLength <= sizeof(kCharsetSym) - 1) return false;
+
+ if (strncmp(aStyleSheetData, kCharsetSym, sizeof(kCharsetSym) - 1)) {
+ return false;
+ }
+
+ for (uint32_t i = sizeof(kCharsetSym) - 1; i < aDataLength; ++i) {
+ char c = aStyleSheetData[i];
+ if (c == '"') {
+ ++i;
+ if (i < aDataLength && aStyleSheetData[i] == ';') {
+ return true;
+ }
+ // fail
+ break;
+ }
+ aCharset.Append(c);
+ }
+
+ // Did not see end quote or semicolon
+ aCharset.Truncate();
+ return false;
+}
+
+NotNull<const Encoding*> SheetLoadData::DetermineNonBOMEncoding(
+ const nsACString& aSegment, nsIChannel* aChannel) const {
+ const Encoding* encoding;
+ nsAutoCString label;
+
+ // Check HTTP
+ if (aChannel && NS_SUCCEEDED(aChannel->GetContentCharset(label))) {
+ encoding = Encoding::ForLabel(label);
+ if (encoding) {
+ return WrapNotNull(encoding);
+ }
+ }
+
+ // Check @charset
+ auto sniffingLength = aSegment.Length();
+ if (sniffingLength > SNIFFING_BUFFER_SIZE) {
+ sniffingLength = SNIFFING_BUFFER_SIZE;
+ }
+ if (GetCharsetFromData(aSegment.BeginReading(), sniffingLength, label)) {
+ encoding = Encoding::ForLabel(label);
+ if (encoding == UTF_16BE_ENCODING || encoding == UTF_16LE_ENCODING) {
+ return UTF_8_ENCODING;
+ }
+ if (encoding) {
+ return WrapNotNull(encoding);
+ }
+ }
+ return mGuessedEncoding;
+}
+
+static nsresult VerifySheetIntegrity(const SRIMetadata& aMetadata,
+ nsIChannel* aChannel,
+ const nsACString& aFirst,
+ const nsACString& aSecond,
+ const nsACString& aSourceFileURI,
+ nsIConsoleReportCollector* aReporter) {
+ NS_ENSURE_ARG_POINTER(aReporter);
+
+ if (MOZ_LOG_TEST(SRILogHelper::GetSriLog(), LogLevel::Debug)) {
+ nsAutoCString requestURL;
+ nsCOMPtr<nsIURI> originalURI;
+ if (aChannel &&
+ NS_SUCCEEDED(aChannel->GetOriginalURI(getter_AddRefs(originalURI))) &&
+ originalURI) {
+ originalURI->GetAsciiSpec(requestURL);
+ }
+ MOZ_LOG(SRILogHelper::GetSriLog(), LogLevel::Debug,
+ ("VerifySheetIntegrity (unichar stream)"));
+ }
+
+ SRICheckDataVerifier verifier(aMetadata, aSourceFileURI, aReporter);
+ nsresult rv =
+ verifier.Update(aFirst.Length(), (const uint8_t*)aFirst.BeginReading());
+ NS_ENSURE_SUCCESS(rv, rv);
+ rv =
+ verifier.Update(aSecond.Length(), (const uint8_t*)aSecond.BeginReading());
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ return verifier.Verify(aMetadata, aChannel, aSourceFileURI, aReporter);
+}
+
+static bool AllLoadsCanceled(const SheetLoadData& aData) {
+ const SheetLoadData* data = &aData;
+ do {
+ if (!data->IsCancelled()) {
+ return false;
+ }
+ } while ((data = data->mNext));
+ return true;
+}
+
+/*
+ * Stream completion code shared by Stylo and the old style system.
+ *
+ * Here we need to check that the load did not give us an http error
+ * page and check the mimetype on the channel to make sure we're not
+ * loading non-text/css data in standards mode.
+ */
+nsresult SheetLoadData::VerifySheetReadyToParse(nsresult aStatus,
+ const nsACString& aBytes1,
+ const nsACString& aBytes2,
+ nsIChannel* aChannel) {
+ LOG(("SheetLoadData::VerifySheetReadyToParse"));
+ NS_ASSERTION(!mLoader->mSyncCallback, "Synchronous callback from necko");
+
+ if (AllLoadsCanceled(*this)) {
+ LOG_WARN((" All loads are canceled, dropping"));
+ mLoader->SheetComplete(*this, NS_BINDING_ABORTED);
+ return NS_OK;
+ }
+
+ if (NS_FAILED(aStatus)) {
+ LOG_WARN(
+ (" Load failed: status 0x%" PRIx32, static_cast<uint32_t>(aStatus)));
+ // Handle sheet not loading error because source was a tracking URL (or
+ // fingerprinting, cryptomining, etc).
+ // We make a note of this sheet node by including it in a dedicated
+ // array of blocked tracking nodes under its parent document.
+ //
+ // Multiple sheet load instances might be tied to this request,
+ // we annotate each one linked to a valid owning element (node).
+ if (net::UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode(
+ aStatus)) {
+ if (Document* doc = mLoader->GetDocument()) {
+ for (SheetLoadData* data = this; data; data = data->mNext) {
+ // owner node may be null but AddBlockTrackingNode can cope
+ doc->AddBlockedNodeByClassifier(data->mSheet->GetOwnerNode());
+ }
+ }
+ }
+ mLoader->SheetComplete(*this, aStatus);
+ return NS_OK;
+ }
+
+ if (!aChannel) {
+ mLoader->SheetComplete(*this, NS_OK);
+ return NS_OK;
+ }
+
+ nsCOMPtr<nsIURI> originalURI;
+ aChannel->GetOriginalURI(getter_AddRefs(originalURI));
+
+ // If the channel's original URI is "chrome:", we want that, since
+ // the observer code in nsXULPrototypeCache depends on chrome stylesheets
+ // having a chrome URI. (Whether or not chrome stylesheets come through
+ // this codepath seems nondeterministic.)
+ // Otherwise we want the potentially-HTTP-redirected URI.
+ nsCOMPtr<nsIURI> channelURI;
+ NS_GetFinalChannelURI(aChannel, getter_AddRefs(channelURI));
+
+ if (!channelURI || !originalURI) {
+ NS_ERROR("Someone just violated the nsIRequest contract");
+ LOG_WARN((" Channel without a URI. Bad!"));
+ mLoader->SheetComplete(*this, NS_ERROR_UNEXPECTED);
+ return NS_OK;
+ }
+
+ nsCOMPtr<nsIPrincipal> principal;
+ nsIScriptSecurityManager* secMan = nsContentUtils::GetSecurityManager();
+ nsresult result = NS_ERROR_NOT_AVAILABLE;
+ if (secMan) { // Could be null if we already shut down
+ if (mUseSystemPrincipal) {
+ result = secMan->GetSystemPrincipal(getter_AddRefs(principal));
+ } else {
+ result = secMan->GetChannelResultPrincipal(aChannel,
+ getter_AddRefs(principal));
+ }
+ }
+
+ if (NS_FAILED(result)) {
+ LOG_WARN((" Couldn't get principal"));
+ mLoader->SheetComplete(*this, result);
+ return NS_OK;
+ }
+
+ mSheet->SetPrincipal(principal);
+
+ if (mSheet->GetCORSMode() == CORS_NONE &&
+ !mTriggeringPrincipal->Subsumes(principal)) {
+ mIsCrossOriginNoCORS = true;
+ }
+
+ // If it's an HTTP channel, we want to make sure this is not an
+ // error document we got.
+ if (nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aChannel)) {
+ bool requestSucceeded;
+ result = httpChannel->GetRequestSucceeded(&requestSucceeded);
+ if (NS_SUCCEEDED(result) && !requestSucceeded) {
+ LOG((" Load returned an error page"));
+ mLoader->SheetComplete(*this, NS_ERROR_NOT_AVAILABLE);
+ return NS_OK;
+ }
+
+ nsCString sourceMapURL;
+ if (nsContentUtils::GetSourceMapURL(httpChannel, sourceMapURL)) {
+ mSheet->SetSourceMapURL(std::move(sourceMapURL));
+ }
+ }
+
+ nsAutoCString contentType;
+ aChannel->GetContentType(contentType);
+
+ // In standards mode, a style sheet must have one of these MIME
+ // types to be processed at all. In quirks mode, we accept any
+ // MIME type, but only if the style sheet is same-origin with the
+ // requesting document or parent sheet. See bug 524223.
+
+ bool validType = contentType.EqualsLiteral("text/css") ||
+ contentType.EqualsLiteral(UNKNOWN_CONTENT_TYPE) ||
+ contentType.IsEmpty();
+
+ if (!validType) {
+ const char* errorMessage;
+ uint32_t errorFlag;
+ bool sameOrigin = true;
+
+ bool subsumed;
+ result = mTriggeringPrincipal->Subsumes(principal, &subsumed);
+ if (NS_FAILED(result) || !subsumed) {
+ sameOrigin = false;
+ }
+
+ if (sameOrigin && mCompatMode == eCompatibility_NavQuirks) {
+ errorMessage = "MimeNotCssWarn";
+ errorFlag = nsIScriptError::warningFlag;
+ } else {
+ errorMessage = "MimeNotCss";
+ errorFlag = nsIScriptError::errorFlag;
+ }
+
+ AutoTArray<nsString, 2> strings;
+ CopyUTF8toUTF16(channelURI->GetSpecOrDefault(), *strings.AppendElement());
+ CopyASCIItoUTF16(contentType, *strings.AppendElement());
+
+ nsCOMPtr<nsIURI> referrer = ReferrerInfo()->GetOriginalReferrer();
+ nsContentUtils::ReportToConsole(
+ errorFlag, "CSS Loader"_ns, mLoader->mDocument,
+ nsContentUtils::eCSS_PROPERTIES, errorMessage, strings, referrer);
+
+ if (errorFlag == nsIScriptError::errorFlag) {
+ LOG_WARN(
+ (" Ignoring sheet with improper MIME type %s", contentType.get()));
+ mLoader->SheetComplete(*this, NS_ERROR_NOT_AVAILABLE);
+ return NS_OK;
+ }
+ }
+
+ SRIMetadata sriMetadata;
+ mSheet->GetIntegrity(sriMetadata);
+ if (!sriMetadata.IsEmpty()) {
+ nsAutoCString sourceUri;
+ if (mLoader->mDocument && mLoader->mDocument->GetDocumentURI()) {
+ mLoader->mDocument->GetDocumentURI()->GetAsciiSpec(sourceUri);
+ }
+ nsresult rv = VerifySheetIntegrity(sriMetadata, aChannel, aBytes1, aBytes2,
+ sourceUri, mLoader->mReporter);
+
+ nsCOMPtr<nsILoadGroup> loadGroup;
+ aChannel->GetLoadGroup(getter_AddRefs(loadGroup));
+ if (loadGroup) {
+ mLoader->mReporter->FlushConsoleReports(loadGroup);
+ } else {
+ mLoader->mReporter->FlushConsoleReports(mLoader->mDocument);
+ }
+
+ if (NS_FAILED(rv)) {
+ LOG((" Load was blocked by SRI"));
+ MOZ_LOG(gSriPRLog, LogLevel::Debug,
+ ("css::Loader::OnStreamComplete, bad metadata"));
+ mLoader->SheetComplete(*this, NS_ERROR_SRI_CORRUPT);
+ return NS_OK;
+ }
+ }
+
+ // Enough to set the URIs on mSheet, since any sibling datas we have share
+ // the same mInner as mSheet and will thus get the same URI.
+ mSheet->SetURIs(channelURI, originalURI, channelURI);
+
+ ReferrerPolicy policy =
+ nsContentUtils::GetReferrerPolicyFromChannel(aChannel);
+ nsCOMPtr<nsIReferrerInfo> referrerInfo =
+ ReferrerInfo::CreateForExternalCSSResources(mSheet, policy);
+
+ mSheet->SetReferrerInfo(referrerInfo);
+ return NS_OK_PARSE_SHEET;
+}
+
+Loader::IsAlternate Loader::IsAlternateSheet(const nsAString& aTitle,
+ bool aHasAlternateRel) {
+ // A sheet is alternate if it has a nonempty title that doesn't match the
+ // currently selected style set. But if there _is_ no currently selected
+ // style set, the sheet wasn't marked as an alternate explicitly, and aTitle
+ // is nonempty, we should select the style set corresponding to aTitle, since
+ // that's a preferred sheet.
+ if (aTitle.IsEmpty()) {
+ return IsAlternate::No;
+ }
+
+ if (mDocument) {
+ const nsString& currentSheetSet = mDocument->GetCurrentStyleSheetSet();
+ if (!aHasAlternateRel && currentSheetSet.IsEmpty()) {
+ // There's no preferred set yet, and we now have a sheet with a title.
+ // Make that be the preferred set.
+ // FIXME(emilio): This is kinda wild, can we do it somewhere else?
+ mDocument->SetPreferredStyleSheetSet(aTitle);
+ // We're definitely not an alternate. Also, beware that at this point
+ // currentSheetSet may dangle.
+ return IsAlternate::No;
+ }
+
+ if (aTitle.Equals(currentSheetSet)) {
+ return IsAlternate::No;
+ }
+ }
+
+ return IsAlternate::Yes;
+}
+
+nsresult Loader::CheckContentPolicy(nsIPrincipal* aLoadingPrincipal,
+ nsIPrincipal* aTriggeringPrincipal,
+ nsIURI* aTargetURI,
+ nsINode* aRequestingNode,
+ const nsAString& aNonce,
+ StylePreloadKind aPreloadKind) {
+ // When performing a system load don't consult content policies.
+ if (!mDocument) {
+ return NS_OK;
+ }
+
+ nsContentPolicyType contentPolicyType =
+ aPreloadKind == StylePreloadKind::None
+ ? nsIContentPolicy::TYPE_INTERNAL_STYLESHEET
+ : nsIContentPolicy::TYPE_INTERNAL_STYLESHEET_PRELOAD;
+
+ nsCOMPtr<nsILoadInfo> secCheckLoadInfo = new net::LoadInfo(
+ aLoadingPrincipal, aTriggeringPrincipal, aRequestingNode,
+ nsILoadInfo::SEC_ONLY_FOR_EXPLICIT_CONTENTSEC_CHECK, contentPolicyType);
+ secCheckLoadInfo->SetCspNonce(aNonce);
+
+ int16_t shouldLoad = nsIContentPolicy::ACCEPT;
+ nsresult rv =
+ NS_CheckContentLoadPolicy(aTargetURI, secCheckLoadInfo, &shouldLoad,
+ nsContentUtils::GetContentPolicy());
+ if (NS_FAILED(rv) || NS_CP_REJECTED(shouldLoad)) {
+ // Asynchronously notify observers (e.g devtools) of CSP failure.
+ nsContentUtils::AddScriptRunner(NS_NewRunnableFunction(
+ "Loader::NotifyOnFailedCheckPolicy",
+ [targetURI = RefPtr<nsIURI>(aTargetURI),
+ requestingNode = RefPtr<nsINode>(aRequestingNode),
+ contentPolicyType]() {
+ nsCOMPtr<nsIChannel> channel;
+ NS_NewChannel(
+ getter_AddRefs(channel), targetURI, requestingNode,
+ nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT,
+ contentPolicyType);
+ NS_SetRequestBlockingReason(
+ channel, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_GENERAL);
+ nsCOMPtr<nsIObserverService> obsService =
+ services::GetObserverService();
+ if (obsService) {
+ obsService->NotifyObservers(
+ channel, "http-on-failed-opening-request", nullptr);
+ }
+ }));
+ return NS_ERROR_CONTENT_BLOCKED;
+ }
+ return NS_OK;
+}
+
+static void RecordUseCountersIfNeeded(Document* aDoc,
+ const StyleSheet& aSheet) {
+ if (!aDoc) {
+ return;
+ }
+ const StyleUseCounters* docCounters = aDoc->GetStyleUseCounters();
+ if (!docCounters) {
+ return;
+ }
+ if (aSheet.URLData()->ChromeRulesEnabled()) {
+ return;
+ }
+ const auto* sheetCounters = aSheet.GetStyleUseCounters();
+ if (!sheetCounters) {
+ return;
+ }
+ Servo_UseCounters_Merge(docCounters, sheetCounters);
+ aDoc->MaybeWarnAboutZoom();
+}
+
+/**
+ * CreateSheet() creates a StyleSheet object for the given URI.
+ *
+ * We check for an existing style sheet object for that uri in various caches
+ * and clone it if we find it. Cloned sheets will have the title/media/enabled
+ * state of the sheet they are clones off; make sure to call PrepareSheet() on
+ * the result of CreateSheet().
+ */
+std::tuple<RefPtr<StyleSheet>, Loader::SheetState> Loader::CreateSheet(
+ nsIURI* aURI, nsIContent* aLinkingContent,
+ nsIPrincipal* aTriggeringPrincipal, css::SheetParsingMode aParsingMode,
+ CORSMode aCORSMode, const Encoding* aPreloadOrParentDataEncoding,
+ const nsAString& aIntegrity, bool aSyncLoad,
+ StylePreloadKind aPreloadKind) {
+ MOZ_ASSERT(aURI, "This path is not taken for inline stylesheets");
+ LOG(("css::Loader::CreateSheet(%s)", aURI->GetSpecOrDefault().get()));
+
+ SRIMetadata sriMetadata;
+ if (!aIntegrity.IsEmpty()) {
+ MOZ_LOG(gSriPRLog, LogLevel::Debug,
+ ("css::Loader::CreateSheet, integrity=%s",
+ NS_ConvertUTF16toUTF8(aIntegrity).get()));
+ nsAutoCString sourceUri;
+ if (mDocument && mDocument->GetDocumentURI()) {
+ mDocument->GetDocumentURI()->GetAsciiSpec(sourceUri);
+ }
+ SRICheck::IntegrityMetadata(aIntegrity, sourceUri, mReporter, &sriMetadata);
+ }
+
+ if (mSheets) {
+ SheetLoadDataHashKey key(aURI, aTriggeringPrincipal, LoaderPrincipal(),
+ PartitionedPrincipal(),
+ GetFallbackEncoding(*this, aLinkingContent,
+ aPreloadOrParentDataEncoding),
+ aCORSMode, aParsingMode, CompatMode(aPreloadKind),
+ sriMetadata, aPreloadKind);
+ auto cacheResult = mSheets->Lookup(*this, key, aSyncLoad);
+ if (cacheResult.mState != CachedSubResourceState::Miss) {
+ SheetState sheetState = SheetState::Complete;
+ RefPtr<StyleSheet> sheet;
+ if (cacheResult.mCompleteValue) {
+ sheet = cacheResult.mCompleteValue->Clone(nullptr, nullptr);
+ mDocument->SetDidHitCompleteSheetCache();
+ RecordUseCountersIfNeeded(mDocument, *sheet);
+ mLoadsPerformed.PutEntry(key);
+ } else {
+ MOZ_ASSERT(cacheResult.mLoadingOrPendingValue);
+ sheet = cacheResult.mLoadingOrPendingValue->ValueForCache();
+ sheetState = cacheResult.mState == CachedSubResourceState::Loading
+ ? SheetState::Loading
+ : SheetState::Pending;
+ }
+ LOG((" Hit cache with state: %s", gStateStrings[size_t(sheetState)]));
+ return {std::move(sheet), sheetState};
+ }
+ }
+
+ nsIURI* sheetURI = aURI;
+ nsIURI* baseURI = aURI;
+ nsIURI* originalURI = aURI;
+
+ auto sheet = MakeRefPtr<StyleSheet>(aParsingMode, aCORSMode, sriMetadata);
+ sheet->SetURIs(sheetURI, originalURI, baseURI);
+ nsCOMPtr<nsIReferrerInfo> referrerInfo =
+ ReferrerInfo::CreateForExternalCSSResources(sheet);
+ sheet->SetReferrerInfo(referrerInfo);
+ LOG((" Needs parser"));
+ return {std::move(sheet), SheetState::NeedsParser};
+}
+
+static Loader::MediaMatched MediaListMatches(const MediaList* aMediaList,
+ const Document* aDocument) {
+ if (!aMediaList || !aDocument) {
+ return Loader::MediaMatched::Yes;
+ }
+
+ if (aMediaList->Matches(*aDocument)) {
+ return Loader::MediaMatched::Yes;
+ }
+
+ return Loader::MediaMatched::No;
+}
+
+/**
+ * PrepareSheet() handles setting the media and title on the sheet, as
+ * well as setting the enabled state based on the title and whether
+ * the sheet had "alternate" in its rel.
+ */
+Loader::MediaMatched Loader::PrepareSheet(
+ StyleSheet& aSheet, const nsAString& aTitle, const nsAString& aMediaString,
+ MediaList* aMediaList, IsAlternate aIsAlternate,
+ IsExplicitlyEnabled aIsExplicitlyEnabled) {
+ RefPtr<MediaList> mediaList(aMediaList);
+
+ if (!aMediaString.IsEmpty()) {
+ NS_ASSERTION(!aMediaList,
+ "must not provide both aMediaString and aMediaList");
+ mediaList = MediaList::Create(NS_ConvertUTF16toUTF8(aMediaString));
+ }
+
+ aSheet.SetMedia(do_AddRef(mediaList));
+
+ aSheet.SetTitle(aTitle);
+ aSheet.SetEnabled(aIsAlternate == IsAlternate::No ||
+ aIsExplicitlyEnabled == IsExplicitlyEnabled::Yes);
+ return MediaListMatches(mediaList, mDocument);
+}
+
+/**
+ * InsertSheetInTree handles ordering of sheets in the document or shadow root.
+ *
+ * Here we have two types of sheets -- those with linking elements and
+ * those without. The latter are loaded by Link: headers, and are only added to
+ * the document.
+ *
+ * The following constraints are observed:
+ * 1) Any sheet with a linking element comes after all sheets without
+ * linking elements
+ * 2) Sheets without linking elements are inserted in the order in
+ * which the inserting requests come in, since all of these are
+ * inserted during header data processing in the content sink
+ * 3) Sheets with linking elements are ordered based on document order
+ * as determined by CompareDocumentPosition.
+ */
+void Loader::InsertSheetInTree(StyleSheet& aSheet) {
+ LOG(("css::Loader::InsertSheetInTree"));
+ MOZ_ASSERT(mDocument, "Must have a document to insert into");
+
+ nsINode* owningNode = aSheet.GetOwnerNode();
+ MOZ_ASSERT(!owningNode || owningNode->IsInUncomposedDoc() ||
+ owningNode->IsInShadowTree(),
+ "Why would we insert it anywhere?");
+ ShadowRoot* shadow = owningNode ? owningNode->GetContainingShadow() : nullptr;
+
+ auto& target = shadow ? static_cast<DocumentOrShadowRoot&>(*shadow)
+ : static_cast<DocumentOrShadowRoot&>(*mDocument);
+
+ // XXX Need to cancel pending sheet loads for this element, if any
+
+ int32_t sheetCount = target.SheetCount();
+
+ /*
+ * Start the walk at the _end_ of the list, since in the typical
+ * case we'll just want to append anyway. We want to break out of
+ * the loop when insertionPoint points to just before the index we
+ * want to insert at. In other words, when we leave the loop
+ * insertionPoint is the index of the stylesheet that immediately
+ * precedes the one we're inserting.
+ */
+ int32_t insertionPoint = sheetCount - 1;
+ for (; insertionPoint >= 0; --insertionPoint) {
+ nsINode* sheetOwner = target.SheetAt(insertionPoint)->GetOwnerNode();
+ if (sheetOwner && !owningNode) {
+ // Keep moving; all sheets with a sheetOwner come after all
+ // sheets without a linkingNode
+ continue;
+ }
+
+ if (!sheetOwner) {
+ // Aha! The current sheet has no sheet owner, so we want to insert after
+ // it no matter whether we have a linking content or not.
+ break;
+ }
+
+ MOZ_ASSERT(owningNode != sheetOwner, "Why do we still have our old sheet?");
+
+ // Have to compare
+ if (nsContentUtils::PositionIsBefore(sheetOwner, owningNode)) {
+ // The current sheet comes before us, and it better be the first
+ // such, because now we break
+ break;
+ }
+ }
+
+ ++insertionPoint;
+
+ if (shadow) {
+ shadow->InsertSheetAt(insertionPoint, aSheet);
+ } else {
+ mDocument->InsertSheetAt(insertionPoint, aSheet);
+ }
+
+ LOG((" Inserting into target (doc: %d) at position %d",
+ target.AsNode().IsDocument(), insertionPoint));
+}
+
+/**
+ * InsertChildSheet handles ordering of @import-ed sheet in their
+ * parent sheets. Here we want to just insert based on order of the
+ * @import rules that imported the sheets. In theory we can't just
+ * append to the end because the CSSOM can insert @import rules. In
+ * practice, we get the call to load the child sheet before the CSSOM
+ * has finished inserting the @import rule, so we have no idea where
+ * to put it anyway. So just append for now. (In the future if we
+ * want to insert the sheet at the correct position, we'll need to
+ * restore CSSStyleSheet::InsertStyleSheetAt, which was removed in
+ * bug 1220506.)
+ */
+void Loader::InsertChildSheet(StyleSheet& aSheet, StyleSheet& aParentSheet) {
+ LOG(("css::Loader::InsertChildSheet"));
+
+ // child sheets should always start out enabled, even if they got
+ // cloned off of top-level sheets which were disabled
+ aSheet.SetEnabled(true);
+ aParentSheet.AppendStyleSheet(aSheet);
+
+ LOG((" Inserting into parent sheet"));
+}
+
+nsresult Loader::LoadSheetSyncInternal(SheetLoadData& aLoadData,
+ SheetState aSheetState) {
+ LOG((" Synchronous load"));
+ MOZ_ASSERT(!aLoadData.mObserver, "Observer for a sync load?");
+ MOZ_ASSERT(aSheetState == SheetState::NeedsParser,
+ "Sync loads can't reuse existing async loads");
+
+ nsINode* requestingNode = aLoadData.GetRequestingNode();
+
+ nsresult rv = NS_OK;
+
+ // Create a StreamLoader instance to which we will feed
+ // the data from the sync load. Do this before creating the
+ // channel to make error recovery simpler.
+ auto streamLoader = MakeRefPtr<StreamLoader>(aLoadData);
+
+ if (mDocument) {
+ net::PredictorLearn(aLoadData.mURI, mDocument->GetDocumentURI(),
+ nsINetworkPredictor::LEARN_LOAD_SUBRESOURCE, mDocument);
+ }
+
+ // Synchronous loads should only be used internally. Therefore no CORS
+ // policy is needed.
+ nsSecurityFlags securityFlags =
+ nsContentSecurityManager::ComputeSecurityFlags(
+ CORSMode::CORS_NONE, nsContentSecurityManager::CORSSecurityMapping::
+ CORS_NONE_MAPS_TO_INHERITED_CONTEXT);
+
+ securityFlags |= nsILoadInfo::SEC_ALLOW_CHROME;
+
+ nsContentPolicyType contentPolicyType =
+ aLoadData.mPreloadKind == StylePreloadKind::None
+ ? nsIContentPolicy::TYPE_INTERNAL_STYLESHEET
+ : nsIContentPolicy::TYPE_INTERNAL_STYLESHEET_PRELOAD;
+
+ // Just load it
+ nsCOMPtr<nsIChannel> channel;
+ // Note that we are calling NS_NewChannelWithTriggeringPrincipal() with both
+ // a node and a principal.
+ // This is because of a case where the node is the document being styled and
+ // the principal is the stylesheet (perhaps from a different origin) that is
+ // applying the styles.
+ if (requestingNode) {
+ rv = NS_NewChannelWithTriggeringPrincipal(
+ getter_AddRefs(channel), aLoadData.mURI, requestingNode,
+ aLoadData.mTriggeringPrincipal, securityFlags, contentPolicyType);
+ } else {
+ MOZ_ASSERT(aLoadData.mTriggeringPrincipal->Equals(LoaderPrincipal()));
+ auto result = URLPreloader::ReadURI(aLoadData.mURI);
+ if (result.isOk()) {
+ nsCOMPtr<nsIInputStream> stream;
+ MOZ_TRY(
+ NS_NewCStringInputStream(getter_AddRefs(stream), result.unwrap()));
+
+ rv = NS_NewInputStreamChannel(
+ getter_AddRefs(channel), aLoadData.mURI, stream.forget(),
+ aLoadData.mTriggeringPrincipal, securityFlags, contentPolicyType);
+ } else {
+ rv = NS_NewChannel(getter_AddRefs(channel), aLoadData.mURI,
+ aLoadData.mTriggeringPrincipal, securityFlags,
+ contentPolicyType);
+ }
+ }
+ if (NS_FAILED(rv)) {
+ LOG_ERROR((" Failed to create channel"));
+ streamLoader->ChannelOpenFailed(rv);
+ SheetComplete(aLoadData, rv);
+ return rv;
+ }
+
+ nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
+ loadInfo->SetCspNonce(aLoadData.Nonce());
+
+ nsCOMPtr<nsIInputStream> stream;
+ rv = channel->Open(getter_AddRefs(stream));
+
+ if (NS_FAILED(rv)) {
+ LOG_ERROR((" Failed to open URI synchronously"));
+ streamLoader->ChannelOpenFailed(rv);
+ SheetComplete(aLoadData, rv);
+ return rv;
+ }
+
+ // Force UA sheets to be UTF-8.
+ // XXX this is only necessary because the default in
+ // SheetLoadData::OnDetermineCharset is wrong (bug 521039).
+ channel->SetContentCharset("UTF-8"_ns);
+
+ // Manually feed the streamloader the contents of the stream.
+ // This will call back into OnStreamComplete
+ // and thence to ParseSheet. Regardless of whether this fails,
+ // SheetComplete has been called.
+ return nsSyncLoadService::PushSyncStreamToListener(stream.forget(),
+ streamLoader, channel);
+}
+
+bool Loader::MaybeDeferLoad(SheetLoadData& aLoadData, SheetState aSheetState,
+ PendingLoad aPendingLoad,
+ const SheetLoadDataHashKey& aKey) {
+ MOZ_ASSERT(mSheets);
+
+ // If we have at least one other load ongoing, then we can defer it until
+ // all non-pending loads are done.
+ if (aSheetState == SheetState::NeedsParser &&
+ aPendingLoad == PendingLoad::No && aLoadData.ShouldDefer() &&
+ mOngoingLoadCount > mPendingLoadCount + 1) {
+ LOG((" Deferring sheet load"));
+ ++mPendingLoadCount;
+ mSheets->DeferLoad(aKey, aLoadData);
+ return true;
+ }
+ return false;
+}
+
+bool Loader::MaybeCoalesceLoadAndNotifyOpen(SheetLoadData& aLoadData,
+ SheetState aSheetState,
+ const SheetLoadDataHashKey& aKey,
+ const PreloadHashKey& aPreloadKey) {
+ bool coalescedLoad = false;
+ auto cacheState = [&aSheetState] {
+ switch (aSheetState) {
+ case SheetState::Complete:
+ return CachedSubResourceState::Complete;
+ case SheetState::Pending:
+ return CachedSubResourceState::Pending;
+ case SheetState::Loading:
+ return CachedSubResourceState::Loading;
+ case SheetState::NeedsParser:
+ return CachedSubResourceState::Miss;
+ }
+ MOZ_ASSERT_UNREACHABLE("wat");
+ return CachedSubResourceState::Miss;
+ }();
+
+ if ((coalescedLoad = mSheets->CoalesceLoad(aKey, aLoadData, cacheState))) {
+ if (aSheetState == SheetState::Pending) {
+ ++mPendingLoadCount;
+ } else {
+ aLoadData.NotifyOpen(
+ aPreloadKey, mDocument,
+ aLoadData.IsLinkRelPreload() /* TODO: why not `IsPreload()`?*/);
+ }
+ }
+ return coalescedLoad;
+}
+
+/**
+ * LoadSheet handles the actual load of a sheet. If the load is
+ * supposed to be synchronous it just opens a channel synchronously
+ * using the given uri, wraps the resulting stream in a converter
+ * stream and calls ParseSheet. Otherwise it tries to look for an
+ * existing load for this URI and piggyback on it. Failing all that,
+ * a new load is kicked off asynchronously.
+ */
+nsresult Loader::LoadSheet(SheetLoadData& aLoadData, SheetState aSheetState,
+ uint64_t aEarlyHintPreloaderId,
+ PendingLoad aPendingLoad) {
+ LOG(("css::Loader::LoadSheet"));
+ MOZ_ASSERT(aLoadData.mURI, "Need a URI to load");
+ MOZ_ASSERT(aLoadData.mSheet, "Need a sheet to load into");
+ MOZ_ASSERT(aSheetState != SheetState::Complete, "Why bother?");
+ MOZ_ASSERT(!aLoadData.mUseSystemPrincipal || aLoadData.mSyncLoad,
+ "Shouldn't use system principal for async loads");
+
+ LOG_URI(" Load from: '%s'", aLoadData.mURI);
+
+ // If we're firing a pending load, this load is already accounted for the
+ // first time it went through this function.
+ if (aPendingLoad == PendingLoad::No) {
+ if (aLoadData.BlocksLoadEvent()) {
+ IncrementOngoingLoadCountAndMaybeBlockOnload();
+ }
+
+ // We technically never defer non-top-level sheets, so this condition could
+ // be outside the branch, but conceptually it should be here.
+ if (aLoadData.mParentData) {
+ ++aLoadData.mParentData->mPendingChildren;
+ }
+ }
+
+ if (!mDocument && !aLoadData.mIsNonDocumentSheet) {
+ // No point starting the load; just release all the data and such.
+ LOG_WARN((" No document and not non-document sheet; pre-dropping load"));
+ SheetComplete(aLoadData, NS_BINDING_ABORTED);
+ return NS_BINDING_ABORTED;
+ }
+
+ if (aLoadData.mSyncLoad) {
+ return LoadSheetSyncInternal(aLoadData, aSheetState);
+ }
+
+ SheetLoadDataHashKey key(aLoadData);
+
+ auto preloadKey = PreloadHashKey::CreateAsStyle(aLoadData);
+ if (mSheets) {
+ if (MaybeDeferLoad(aLoadData, aSheetState, aPendingLoad, key)) {
+ return NS_OK;
+ }
+
+ if (MaybeCoalesceLoadAndNotifyOpen(aLoadData, aSheetState, key,
+ preloadKey)) {
+ // All done here; once the load completes we'll be marked complete
+ // automatically.
+ return NS_OK;
+ }
+ }
+
+ aLoadData.NotifyOpen(preloadKey, mDocument, aLoadData.IsLinkRelPreload());
+
+ return LoadSheetAsyncInternal(aLoadData, aEarlyHintPreloaderId, key);
+}
+
+void Loader::AdjustPriority(const SheetLoadData& aLoadData,
+ nsIChannel* aChannel) {
+ if (!StaticPrefs::network_fetchpriority_enabled()) {
+ if (!aLoadData.ShouldDefer() && aLoadData.IsLinkRelPreload()) {
+ SheetLoadData::PrioritizeAsPreload(aChannel);
+ }
+
+ return;
+ }
+
+ nsCOMPtr<nsISupportsPriority> sp = do_QueryInterface(aChannel);
+
+ if (!sp) {
+ return;
+ }
+
+ // Adjusting priorites is specified as implementation-defined. To align with
+ // other browsers for potentially important cases, some adjustments are made
+ // according to
+ // <https://web.dev/articles/fetch-priority#browser_priority_and_fetchpriority>.
+ const int32_t supportsPriority = [&]() {
+ if (aLoadData.ShouldDefer()) {
+ return nsISupportsPriority::PRIORITY_LOW;
+ }
+ switch (aLoadData.mFetchPriority) {
+ case FetchPriority::Auto: {
+ return nsISupportsPriority::PRIORITY_HIGHEST;
+ }
+ case FetchPriority::High: {
+ return nsISupportsPriority::PRIORITY_HIGHEST;
+ }
+ case FetchPriority::Low: {
+ return nsISupportsPriority::PRIORITY_HIGH;
+ }
+ }
+
+ MOZ_ASSERT_UNREACHABLE();
+ return nsISupportsPriority::PRIORITY_HIGHEST;
+ }();
+
+ LogPriorityMapping(sCssLoaderLog, aLoadData.mFetchPriority, supportsPriority);
+ sp->SetPriority(supportsPriority);
+}
+
+nsresult Loader::LoadSheetAsyncInternal(SheetLoadData& aLoadData,
+ uint64_t aEarlyHintPreloaderId,
+ const SheetLoadDataHashKey& aKey) {
+ nsresult rv = NS_OK;
+
+ SRIMetadata sriMetadata;
+ aLoadData.mSheet->GetIntegrity(sriMetadata);
+
+ nsINode* requestingNode = aLoadData.GetRequestingNode();
+
+ nsCOMPtr<nsILoadGroup> loadGroup;
+ nsCOMPtr<nsICookieJarSettings> cookieJarSettings;
+ if (mDocument) {
+ loadGroup = mDocument->GetDocumentLoadGroup();
+ // load for a document with no loadgrup indicates that something is
+ // completely bogus, let's bail out early.
+ if (!loadGroup) {
+ LOG_ERROR((" Failed to query loadGroup from document"));
+ SheetComplete(aLoadData, NS_ERROR_UNEXPECTED);
+ return NS_ERROR_UNEXPECTED;
+ }
+
+ cookieJarSettings = mDocument->CookieJarSettings();
+ }
+
+#ifdef DEBUG
+ AutoRestore<bool> syncCallbackGuard(mSyncCallback);
+ mSyncCallback = true;
+#endif
+
+ nsSecurityFlags securityFlags =
+ nsContentSecurityManager::ComputeSecurityFlags(
+ aLoadData.mSheet->GetCORSMode(),
+ nsContentSecurityManager::CORSSecurityMapping::
+ CORS_NONE_MAPS_TO_INHERITED_CONTEXT);
+
+ securityFlags |= nsILoadInfo::SEC_ALLOW_CHROME;
+
+ nsContentPolicyType contentPolicyType =
+ aLoadData.mPreloadKind == StylePreloadKind::None
+ ? nsIContentPolicy::TYPE_INTERNAL_STYLESHEET
+ : nsIContentPolicy::TYPE_INTERNAL_STYLESHEET_PRELOAD;
+
+ nsCOMPtr<nsIChannel> channel;
+ // Note we are calling NS_NewChannelWithTriggeringPrincipal here with a node
+ // and a principal. This is because of a case where the node is the document
+ // being styled and the principal is the stylesheet (perhaps from a different
+ // origin) that is applying the styles.
+ if (requestingNode) {
+ rv = NS_NewChannelWithTriggeringPrincipal(
+ getter_AddRefs(channel), aLoadData.mURI, requestingNode,
+ aLoadData.mTriggeringPrincipal, securityFlags, contentPolicyType,
+ /* PerformanceStorage */ nullptr, loadGroup);
+ } else {
+ MOZ_ASSERT(aLoadData.mTriggeringPrincipal->Equals(LoaderPrincipal()));
+ rv = NS_NewChannel(getter_AddRefs(channel), aLoadData.mURI,
+ aLoadData.mTriggeringPrincipal, securityFlags,
+ contentPolicyType, cookieJarSettings,
+ /* aPerformanceStorage */ nullptr, loadGroup);
+ }
+
+ if (NS_FAILED(rv)) {
+ LOG_ERROR((" Failed to create channel"));
+ SheetComplete(aLoadData, rv);
+ return rv;
+ }
+
+ nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
+ loadInfo->SetCspNonce(aLoadData.Nonce());
+
+ if (!aLoadData.ShouldDefer()) {
+ if (nsCOMPtr<nsIClassOfService> cos = do_QueryInterface(channel)) {
+ cos->AddClassFlags(nsIClassOfService::Leader);
+ }
+
+ if (aLoadData.IsLinkRelPreload()) {
+ SheetLoadData::AddLoadBackgroundFlag(channel);
+ }
+ }
+
+ AdjustPriority(aLoadData, channel);
+
+ if (nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(channel)) {
+ if (nsCOMPtr<nsIReferrerInfo> referrerInfo = aLoadData.ReferrerInfo()) {
+ rv = httpChannel->SetReferrerInfo(referrerInfo);
+ Unused << NS_WARN_IF(NS_FAILED(rv));
+ }
+
+ nsCOMPtr<nsIHttpChannelInternal> internalChannel =
+ do_QueryInterface(httpChannel);
+ if (internalChannel) {
+ rv = internalChannel->SetIntegrityMetadata(
+ sriMetadata.GetIntegrityString());
+ NS_ENSURE_SUCCESS(rv, rv);
+ }
+
+ // Set the initiator type
+ if (nsCOMPtr<nsITimedChannel> timedChannel =
+ do_QueryInterface(httpChannel)) {
+ if (aLoadData.mParentData) {
+ timedChannel->SetInitiatorType(u"css"_ns);
+
+ // This is a child sheet load.
+ //
+ // The resource timing of the sub-resources that a document loads
+ // should normally be reported to the document. One exception is any
+ // sub-resources of any cross-origin resources that are loaded. We
+ // don't mind reporting timing data for a direct child cross-origin
+ // resource since the resource that linked to it (and hence potentially
+ // anything in that parent origin) is aware that the cross-origin
+ // resources is to be loaded. However, we do not want to report
+ // timings for any sub-resources that a cross-origin resource may load
+ // since that obviously leaks information about what the cross-origin
+ // resource loads, which is bad.
+ //
+ // In addition to checking whether we're an immediate child resource of
+ // a cross-origin resource (by checking if mIsCrossOriginNoCORS is set
+ // to true on our parent), we also check our parent to see whether it
+ // itself is a sub-resource of a cross-origin resource by checking
+ // mBlockResourceTiming. If that is set then we too are such a
+ // sub-resource and so we set the flag on ourself too to propagate it
+ // on down.
+ if (aLoadData.mParentData->mIsCrossOriginNoCORS ||
+ aLoadData.mParentData->mBlockResourceTiming) {
+ // Set a flag so any other stylesheet triggered by this one will
+ // not be reported
+ aLoadData.mBlockResourceTiming = true;
+
+ // Mark the channel so PerformanceMainThread::AddEntry will not
+ // report the resource.
+ timedChannel->SetReportResourceTiming(false);
+ }
+
+ } else if (aEarlyHintPreloaderId) {
+ timedChannel->SetInitiatorType(u"early-hints"_ns);
+ } else {
+ timedChannel->SetInitiatorType(u"link"_ns);
+ }
+ }
+ }
+
+ // Now tell the channel we expect text/css data back.... We do
+ // this before opening it, so it's only treated as a hint.
+ channel->SetContentType("text/css"_ns);
+
+ // We don't have to hold on to the stream loader. The ownership
+ // model is: Necko owns the stream loader, which owns the load data,
+ // which owns us
+ auto streamLoader = MakeRefPtr<StreamLoader>(aLoadData);
+ if (mDocument) {
+ net::PredictorLearn(aLoadData.mURI, mDocument->GetDocumentURI(),
+ nsINetworkPredictor::LEARN_LOAD_SUBRESOURCE, mDocument);
+ }
+
+ if (aEarlyHintPreloaderId) {
+ nsCOMPtr<nsIHttpChannelInternal> channelInternal =
+ do_QueryInterface(channel);
+ NS_ENSURE_TRUE(channelInternal != nullptr, NS_ERROR_FAILURE);
+
+ rv = channelInternal->SetEarlyHintPreloaderId(aEarlyHintPreloaderId);
+ NS_ENSURE_SUCCESS(rv, rv);
+ }
+ rv = channel->AsyncOpen(streamLoader);
+ if (NS_FAILED(rv)) {
+ LOG_ERROR((" Failed to create stream loader"));
+ streamLoader->ChannelOpenFailed(rv);
+ // NOTE: NotifyStop will be done in SheetComplete -> NotifyObservers.
+ aLoadData.NotifyStart(channel);
+ SheetComplete(aLoadData, rv);
+ return rv;
+ }
+
+#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
+ if (nsCOMPtr<nsIHttpChannelInternal> hci = do_QueryInterface(channel)) {
+ hci->DoDiagnosticAssertWhenOnStopNotCalledOnDestroy();
+ }
+#endif
+
+ if (mSheets) {
+ mSheets->LoadStarted(aKey, aLoadData);
+ }
+ return NS_OK;
+}
+
+/**
+ * ParseSheet handles parsing the data stream.
+ */
+Loader::Completed Loader::ParseSheet(const nsACString& aBytes,
+ SheetLoadData& aLoadData,
+ AllowAsyncParse aAllowAsync) {
+ LOG(("css::Loader::ParseSheet"));
+ if (aLoadData.mURI) {
+ LOG_URI(" Load succeeded for URI: '%s', parsing", aLoadData.mURI);
+ }
+ AUTO_PROFILER_LABEL_CATEGORY_PAIR_RELEVANT_FOR_JS(LAYOUT_CSSParsing);
+
+ ++mParsedSheetCount;
+
+ aLoadData.mIsBeingParsed = true;
+
+ StyleSheet* sheet = aLoadData.mSheet;
+ MOZ_ASSERT(sheet);
+
+ // Some cases, like inline style and UA stylesheets, need to be parsed
+ // synchronously. The former may trigger child loads, the latter must not.
+ if (aLoadData.mSyncLoad || aAllowAsync == AllowAsyncParse::No) {
+ sheet->ParseSheetSync(this, aBytes, &aLoadData);
+ aLoadData.mIsBeingParsed = false;
+
+ bool noPendingChildren = aLoadData.mPendingChildren == 0;
+ MOZ_ASSERT_IF(aLoadData.mSyncLoad, noPendingChildren);
+ if (noPendingChildren) {
+ SheetComplete(aLoadData, NS_OK);
+ return Completed::Yes;
+ }
+ return Completed::No;
+ }
+
+ // This parse does not need to be synchronous. \o/
+ //
+ // Note that load is already blocked from
+ // IncrementOngoingLoadCountAndMaybeBlockOnload(), and will be unblocked from
+ // SheetFinishedParsingAsync which will end up in NotifyObservers as needed.
+ sheet->ParseSheet(*this, aBytes, aLoadData)
+ ->Then(
+ GetMainThreadSerialEventTarget(), __func__,
+ [loadData = RefPtr<SheetLoadData>(&aLoadData)](bool aDummy) {
+ MOZ_ASSERT(NS_IsMainThread());
+ loadData->SheetFinishedParsingAsync();
+ },
+ [] { MOZ_CRASH("rejected parse promise"); });
+ return Completed::No;
+}
+
+void Loader::NotifyObservers(SheetLoadData& aData, nsresult aStatus) {
+ RecordUseCountersIfNeeded(mDocument, *aData.mSheet);
+ RefPtr loadDispatcher = aData.PrepareLoadEventIfNeeded();
+ if (aData.mURI) {
+ mLoadsPerformed.PutEntry(SheetLoadDataHashKey(aData));
+ aData.NotifyStop(aStatus);
+ // NOTE(emilio): This needs to happen before notifying observers, as
+ // FontFaceSet for example checks for pending sheet loads from the
+ // StyleSheetLoaded callback.
+ if (aData.BlocksLoadEvent()) {
+ DecrementOngoingLoadCountAndMaybeUnblockOnload();
+ if (mPendingLoadCount && mPendingLoadCount == mOngoingLoadCount) {
+ LOG((" No more loading sheets; starting deferred loads"));
+ StartDeferredLoads();
+ }
+ }
+ }
+ if (!aData.mTitle.IsEmpty() && NS_SUCCEEDED(aStatus)) {
+ nsContentUtils::AddScriptRunner(NS_NewRunnableFunction(
+ "Loader::NotifyObservers - Create PageStyle actor",
+ [doc = RefPtr{mDocument}] {
+ // Force creating the page style actor, if available.
+ // This will no-op if no actor with this name is registered (outside
+ // of desktop Firefox).
+ nsCOMPtr<nsISupports> pageStyleActor =
+ do_QueryActor("PageStyle", doc);
+ Unused << pageStyleActor;
+ }));
+ }
+ if (aData.mMustNotify) {
+ if (nsCOMPtr<nsICSSLoaderObserver> observer = std::move(aData.mObserver)) {
+ LOG((" Notifying observer %p for data %p. deferred: %d", observer.get(),
+ &aData, aData.ShouldDefer()));
+ observer->StyleSheetLoaded(aData.mSheet, aData.ShouldDefer(), aStatus);
+ }
+
+ for (nsCOMPtr<nsICSSLoaderObserver> obs : mObservers.ForwardRange()) {
+ LOG((" Notifying global observer %p for data %p. deferred: %d",
+ obs.get(), &aData, aData.ShouldDefer()));
+ obs->StyleSheetLoaded(aData.mSheet, aData.ShouldDefer(), aStatus);
+ }
+
+ if (loadDispatcher) {
+ loadDispatcher->RunDOMEventWhenSafe();
+ }
+ } else if (loadDispatcher) {
+ loadDispatcher->PostDOMEvent();
+ }
+}
+
+/**
+ * SheetComplete is the do-it-all cleanup function. It removes the
+ * load data from the "loading" hashtable, adds the sheet to the
+ * "completed" hashtable, massages the XUL cache, handles siblings of
+ * the load data (other loads for the same URI), handles unblocking
+ * blocked parent loads as needed, and most importantly calls
+ * NS_RELEASE on the load data to destroy the whole mess.
+ */
+void Loader::SheetComplete(SheetLoadData& aLoadData, nsresult aStatus) {
+ LOG(("css::Loader::SheetComplete, status: 0x%" PRIx32,
+ static_cast<uint32_t>(aStatus)));
+ SharedStyleSheetCache::LoadCompleted(mSheets.get(), aLoadData, aStatus);
+}
+
+// static
+void Loader::MarkLoadTreeFailed(SheetLoadData& aLoadData,
+ Loader* aOnlyForLoader) {
+ if (aLoadData.mURI) {
+ LOG_URI(" Load failed: '%s'", aLoadData.mURI);
+ }
+
+ SheetLoadData* data = &aLoadData;
+ do {
+ if (!aOnlyForLoader || aOnlyForLoader == data->mLoader) {
+ data->mLoadFailed = true;
+ data->mSheet->MaybeRejectReplacePromise();
+ }
+
+ if (data->mParentData) {
+ MarkLoadTreeFailed(*data->mParentData, aOnlyForLoader);
+ }
+
+ data = data->mNext;
+ } while (data);
+}
+
+RefPtr<StyleSheet> Loader::LookupInlineSheetInCache(
+ const nsAString& aBuffer, nsIPrincipal* aSheetPrincipal) {
+ auto result = mInlineSheets.Lookup(aBuffer);
+ if (!result) {
+ return nullptr;
+ }
+ StyleSheet* sheet = result.Data();
+ if (NS_WARN_IF(sheet->HasModifiedRules())) {
+ // Remove it now that we know that we're never going to use this stylesheet
+ // again.
+ result.Remove();
+ return nullptr;
+ }
+ if (NS_WARN_IF(!sheet->Principal()->Equals(aSheetPrincipal))) {
+ // If the sheet is going to have different access rights, don't return it
+ // from the cache.
+ return nullptr;
+ }
+ return sheet->Clone(nullptr, nullptr);
+}
+
+void Loader::MaybeNotifyPreloadUsed(SheetLoadData& aData) {
+ if (!mDocument) {
+ return;
+ }
+
+ auto key = PreloadHashKey::CreateAsStyle(aData);
+ RefPtr<PreloaderBase> preload = mDocument->Preloads().LookupPreload(key);
+ if (!preload) {
+ return;
+ }
+
+ preload->NotifyUsage(mDocument);
+}
+
+Result<Loader::LoadSheetResult, nsresult> Loader::LoadInlineStyle(
+ const SheetInfo& aInfo, const nsAString& aBuffer,
+ nsICSSLoaderObserver* aObserver) {
+ LOG(("css::Loader::LoadInlineStyle"));
+ MOZ_ASSERT(aInfo.mContent);
+
+ if (!mEnabled) {
+ LOG_WARN((" Not enabled"));
+ return Err(NS_ERROR_NOT_AVAILABLE);
+ }
+
+ if (!mDocument) {
+ return Err(NS_ERROR_NOT_INITIALIZED);
+ }
+
+ MOZ_ASSERT(LinkStyle::FromNodeOrNull(aInfo.mContent),
+ "Element is not a style linking element!");
+
+ // Since we're not planning to load a URI, no need to hand a principal to the
+ // load data or to CreateSheet().
+
+ // Check IsAlternateSheet now, since it can mutate our document.
+ auto isAlternate = IsAlternateSheet(aInfo.mTitle, aInfo.mHasAlternateRel);
+ LOG((" Sheet is alternate: %d", static_cast<int>(isAlternate)));
+
+ // Use the document's base URL so that @import in the inline sheet picks up
+ // the right base.
+ nsIURI* baseURI = aInfo.mContent->GetBaseURI();
+ nsIURI* sheetURI = aInfo.mContent->OwnerDoc()->GetDocumentURI();
+ nsIURI* originalURI = nullptr;
+
+ MOZ_ASSERT(aInfo.mIntegrity.IsEmpty());
+ nsIPrincipal* loadingPrincipal = LoaderPrincipal();
+ nsIPrincipal* principal = aInfo.mTriggeringPrincipal
+ ? aInfo.mTriggeringPrincipal.get()
+ : loadingPrincipal;
+ nsIPrincipal* sheetPrincipal = [&] {
+ // The triggering principal may be an expanded principal, which is safe to
+ // use for URL security checks, but not as the loader principal for a
+ // stylesheet. So treat this as principal inheritance, and downgrade if
+ // necessary.
+ //
+ // FIXME(emilio): Why doing this for inline sheets but not for links?
+ if (aInfo.mTriggeringPrincipal) {
+ return BasePrincipal::Cast(aInfo.mTriggeringPrincipal)
+ ->PrincipalToInherit();
+ }
+ return LoaderPrincipal();
+ }();
+
+ // We only cache sheets if in shadow trees, since regular document sheets are
+ // likely to be unique.
+ const bool isWorthCaching =
+ StaticPrefs::layout_css_inline_style_caching_always_enabled() ||
+ aInfo.mContent->IsInShadowTree();
+ RefPtr<StyleSheet> sheet;
+ if (isWorthCaching) {
+ sheet = LookupInlineSheetInCache(aBuffer, sheetPrincipal);
+ }
+ const bool isSheetFromCache = !!sheet;
+ if (!isSheetFromCache) {
+ sheet = MakeRefPtr<StyleSheet>(eAuthorSheetFeatures, aInfo.mCORSMode,
+ SRIMetadata{});
+ sheet->SetURIs(sheetURI, originalURI, baseURI);
+ nsIReferrerInfo* referrerInfo =
+ aInfo.mContent->OwnerDoc()->ReferrerInfoForInternalCSSAndSVGResources();
+ sheet->SetReferrerInfo(referrerInfo);
+ // We never actually load this, so just set its principal directly.
+ sheet->SetPrincipal(sheetPrincipal);
+ }
+
+ auto matched = PrepareSheet(*sheet, aInfo.mTitle, aInfo.mMedia, nullptr,
+ isAlternate, aInfo.mIsExplicitlyEnabled);
+ if (auto* linkStyle = LinkStyle::FromNode(*aInfo.mContent)) {
+ linkStyle->SetStyleSheet(sheet);
+ }
+ MOZ_ASSERT(sheet->IsComplete() == isSheetFromCache);
+
+ Completed completed;
+ auto data = MakeRefPtr<SheetLoadData>(
+ this, aInfo.mTitle, /* aURI = */ nullptr, sheet, SyncLoad::No,
+ aInfo.mContent, isAlternate, matched, StylePreloadKind::None, aObserver,
+ principal, aInfo.mReferrerInfo, aInfo.mNonce, aInfo.mFetchPriority);
+ MOZ_ASSERT(data->GetRequestingNode() == aInfo.mContent);
+ if (isSheetFromCache) {
+ MOZ_ASSERT(sheet->IsComplete());
+ MOZ_ASSERT(sheet->GetOwnerNode() == aInfo.mContent);
+ completed = Completed::Yes;
+ InsertSheetInTree(*sheet);
+ NotifyOfCachedLoad(std::move(data));
+ } else {
+ // Parse completion releases the load data.
+ //
+ // Note that we need to parse synchronously, since the web expects that the
+ // effects of inline stylesheets are visible immediately (aside from
+ // @imports).
+ NS_ConvertUTF16toUTF8 utf8(aBuffer);
+ completed = ParseSheet(utf8, *data, AllowAsyncParse::No);
+ if (completed == Completed::Yes) {
+ if (isWorthCaching) {
+ mInlineSheets.InsertOrUpdate(aBuffer, std::move(sheet));
+ }
+ } else {
+ data->mMustNotify = true;
+ }
+ }
+
+ return LoadSheetResult{completed, isAlternate, matched};
+}
+
+Result<Loader::LoadSheetResult, nsresult> Loader::LoadStyleLink(
+ const SheetInfo& aInfo, nsICSSLoaderObserver* aObserver) {
+ MOZ_ASSERT(aInfo.mURI, "Must have URL to load");
+ LOG(("css::Loader::LoadStyleLink"));
+ LOG_URI(" Link uri: '%s'", aInfo.mURI);
+ LOG((" Link title: '%s'", NS_ConvertUTF16toUTF8(aInfo.mTitle).get()));
+ LOG((" Link media: '%s'", NS_ConvertUTF16toUTF8(aInfo.mMedia).get()));
+ LOG((" Link alternate rel: %d", aInfo.mHasAlternateRel));
+
+ if (!mEnabled) {
+ LOG_WARN((" Not enabled"));
+ return Err(NS_ERROR_NOT_AVAILABLE);
+ }
+
+ if (!mDocument) {
+ return Err(NS_ERROR_NOT_INITIALIZED);
+ }
+
+ MOZ_ASSERT_IF(aInfo.mContent,
+ aInfo.mContent->NodePrincipal() == mDocument->NodePrincipal());
+ nsIPrincipal* loadingPrincipal = LoaderPrincipal();
+ nsIPrincipal* principal = aInfo.mTriggeringPrincipal
+ ? aInfo.mTriggeringPrincipal.get()
+ : loadingPrincipal;
+
+ nsINode* requestingNode =
+ aInfo.mContent ? static_cast<nsINode*>(aInfo.mContent) : mDocument;
+ const bool syncLoad = [&] {
+ if (!aInfo.mContent) {
+ return false;
+ }
+ const bool privilegedShadowTree =
+ aInfo.mContent->IsInShadowTree() &&
+ (aInfo.mContent->ChromeOnlyAccess() ||
+ aInfo.mContent->OwnerDoc()->ChromeRulesEnabled());
+ if (!privilegedShadowTree) {
+ return false;
+ }
+ if (!IsPrivilegedURI(aInfo.mURI)) {
+ return false;
+ }
+ // We're loading a chrome/resource URI in a chrome doc shadow tree or UA
+ // widget. Load synchronously to avoid FOUC.
+ return true;
+ }();
+ LOG((" Link sync load: '%s'", syncLoad ? "true" : "false"));
+ MOZ_ASSERT_IF(syncLoad, !aObserver);
+
+ nsresult rv =
+ CheckContentPolicy(loadingPrincipal, principal, aInfo.mURI,
+ requestingNode, aInfo.mNonce, StylePreloadKind::None);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ // Don't fire the error event if our document is loaded as data. We're
+ // supposed to not even try to do loads in that case... Unfortunately, we
+ // implement that via nsDataDocumentContentPolicy, which doesn't have a good
+ // way to communicate back to us that _it_ is the thing that blocked the
+ // load.
+ if (aInfo.mContent && !mDocument->IsLoadedAsData()) {
+ // Fire an async error event on it.
+ RefPtr<AsyncEventDispatcher> loadBlockingAsyncDispatcher =
+ new LoadBlockingAsyncEventDispatcher(aInfo.mContent, u"error"_ns,
+ CanBubble::eNo,
+ ChromeOnlyDispatch::eNo);
+ loadBlockingAsyncDispatcher->PostDOMEvent();
+ }
+ return Err(rv);
+ }
+
+ // Check IsAlternateSheet now, since it can mutate our document and make
+ // pending sheets go to the non-pending state.
+ auto isAlternate = IsAlternateSheet(aInfo.mTitle, aInfo.mHasAlternateRel);
+ auto [sheet, state] = CreateSheet(aInfo, eAuthorSheetFeatures, syncLoad,
+ StylePreloadKind::None);
+
+ LOG((" Sheet is alternate: %d", static_cast<int>(isAlternate)));
+
+ auto matched = PrepareSheet(*sheet, aInfo.mTitle, aInfo.mMedia, nullptr,
+ isAlternate, aInfo.mIsExplicitlyEnabled);
+
+ if (auto* linkStyle = LinkStyle::FromNodeOrNull(aInfo.mContent)) {
+ linkStyle->SetStyleSheet(sheet);
+ }
+ MOZ_ASSERT(sheet->IsComplete() == (state == SheetState::Complete));
+
+ // We may get here with no content for Link: headers for example.
+ MOZ_ASSERT(!aInfo.mContent || LinkStyle::FromNode(*aInfo.mContent),
+ "If there is any node, it should be a LinkStyle");
+ auto data = MakeRefPtr<SheetLoadData>(
+ this, aInfo.mTitle, aInfo.mURI, sheet, SyncLoad(syncLoad), aInfo.mContent,
+ isAlternate, matched, StylePreloadKind::None, aObserver, principal,
+ aInfo.mReferrerInfo, aInfo.mNonce, aInfo.mFetchPriority);
+
+ MOZ_ASSERT(data->GetRequestingNode() == requestingNode);
+
+ MaybeNotifyPreloadUsed(*data);
+
+ if (state == SheetState::Complete) {
+ LOG((" Sheet already complete: 0x%p", sheet.get()));
+ MOZ_ASSERT(sheet->GetOwnerNode() == aInfo.mContent);
+ InsertSheetInTree(*sheet);
+ NotifyOfCachedLoad(std::move(data));
+ return LoadSheetResult{Completed::Yes, isAlternate, matched};
+ }
+
+ // Now we need to actually load it.
+ auto result = LoadSheetResult{Completed::No, isAlternate, matched};
+
+ MOZ_ASSERT(result.ShouldBlock() == !data->ShouldDefer(),
+ "These should better match!");
+
+ // Load completion will free the data
+ rv = LoadSheet(*data, state, 0);
+ if (NS_FAILED(rv)) {
+ return Err(rv);
+ }
+
+ if (!syncLoad) {
+ data->mMustNotify = true;
+ }
+ return result;
+}
+
+static bool HaveAncestorDataWithURI(SheetLoadData& aData, nsIURI* aURI) {
+ if (!aData.mURI) {
+ // Inline style; this won't have any ancestors
+ MOZ_ASSERT(!aData.mParentData, "How does inline style have a parent?");
+ return false;
+ }
+
+ bool equal;
+ if (NS_FAILED(aData.mURI->Equals(aURI, &equal)) || equal) {
+ return true;
+ }
+
+ // Datas down the mNext chain have the same URI as aData, so we
+ // don't have to compare to them. But they might have different
+ // parents, and we have to check all of those.
+ SheetLoadData* data = &aData;
+ do {
+ if (data->mParentData &&
+ HaveAncestorDataWithURI(*data->mParentData, aURI)) {
+ return true;
+ }
+
+ data = data->mNext;
+ } while (data);
+
+ return false;
+}
+
+nsresult Loader::LoadChildSheet(StyleSheet& aParentSheet,
+ SheetLoadData* aParentData, nsIURI* aURL,
+ dom::MediaList* aMedia,
+ LoaderReusableStyleSheets* aReusableSheets) {
+ LOG(("css::Loader::LoadChildSheet"));
+ MOZ_ASSERT(aURL, "Must have a URI to load");
+
+ if (!mEnabled) {
+ LOG_WARN((" Not enabled"));
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ LOG_URI(" Child uri: '%s'", aURL);
+
+ nsCOMPtr<nsINode> owningNode;
+
+ nsINode* requestingNode = aParentSheet.GetOwnerNodeOfOutermostSheet();
+ if (requestingNode) {
+ MOZ_ASSERT(LoaderPrincipal() == requestingNode->NodePrincipal());
+ } else {
+ requestingNode = mDocument;
+ }
+
+ nsIPrincipal* principal = aParentSheet.Principal();
+ nsresult rv =
+ CheckContentPolicy(LoaderPrincipal(), principal, aURL, requestingNode,
+ /* aNonce = */ u""_ns, StylePreloadKind::None);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ if (aParentData) {
+ MarkLoadTreeFailed(*aParentData);
+ }
+ return rv;
+ }
+
+ nsCOMPtr<nsICSSLoaderObserver> observer;
+
+ if (aParentData) {
+ LOG((" Have a parent load"));
+ // Check for cycles
+ if (HaveAncestorDataWithURI(*aParentData, aURL)) {
+ // Houston, we have a loop, blow off this child and pretend this never
+ // happened
+ LOG_ERROR((" @import cycle detected, dropping load"));
+ return NS_OK;
+ }
+
+ NS_ASSERTION(aParentData->mSheet == &aParentSheet,
+ "Unexpected call to LoadChildSheet");
+ } else {
+ LOG((" No parent load; must be CSSOM"));
+ // No parent load data, so the sheet will need to be notified when
+ // we finish, if it can be, if we do the load asynchronously.
+ observer = &aParentSheet;
+ }
+
+ // Now that we know it's safe to load this (passes security check and not a
+ // loop) do so.
+ RefPtr<StyleSheet> sheet;
+ SheetState state;
+ if (aReusableSheets && aReusableSheets->FindReusableStyleSheet(aURL, sheet)) {
+ state = SheetState::Complete;
+ } else {
+ // For now, use CORS_NONE for child sheets
+ std::tie(sheet, state) = CreateSheet(
+ aURL, nullptr, principal, aParentSheet.ParsingMode(), CORS_NONE,
+ aParentData ? aParentData->mEncoding : nullptr,
+ u""_ns, // integrity is only checked on main sheet
+ aParentData && aParentData->mSyncLoad, StylePreloadKind::None);
+ PrepareSheet(*sheet, u""_ns, u""_ns, aMedia, IsAlternate::No,
+ IsExplicitlyEnabled::No);
+ }
+
+ MOZ_ASSERT(sheet);
+ InsertChildSheet(*sheet, aParentSheet);
+
+ auto data =
+ MakeRefPtr<SheetLoadData>(this, aURL, sheet, aParentData, observer,
+ principal, aParentSheet.GetReferrerInfo());
+ MOZ_ASSERT(data->GetRequestingNode() == requestingNode);
+
+ MaybeNotifyPreloadUsed(*data);
+
+ if (state == SheetState::Complete) {
+ LOG((" Sheet already complete"));
+ // We're completely done. No need to notify, even, since the
+ // @import rule addition/modification will trigger the right style
+ // changes automatically.
+ data->mIntentionallyDropped = true;
+ return NS_OK;
+ }
+
+ bool syncLoad = data->mSyncLoad;
+
+ // Load completion will release the data
+ rv = LoadSheet(*data, state, 0);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ if (!syncLoad) {
+ data->mMustNotify = true;
+ }
+ return rv;
+}
+
+Result<RefPtr<StyleSheet>, nsresult> Loader::LoadSheetSync(
+ nsIURI* aURL, SheetParsingMode aParsingMode,
+ UseSystemPrincipal aUseSystemPrincipal) {
+ LOG(("css::Loader::LoadSheetSync"));
+ nsCOMPtr<nsIReferrerInfo> referrerInfo = new ReferrerInfo(nullptr);
+ return InternalLoadNonDocumentSheet(
+ aURL, StylePreloadKind::None, aParsingMode, aUseSystemPrincipal, nullptr,
+ referrerInfo, nullptr, CORS_NONE, u""_ns, u""_ns, 0, FetchPriority::Auto);
+}
+
+Result<RefPtr<StyleSheet>, nsresult> Loader::LoadSheet(
+ nsIURI* aURI, SheetParsingMode aParsingMode,
+ UseSystemPrincipal aUseSystemPrincipal, nsICSSLoaderObserver* aObserver) {
+ nsCOMPtr<nsIReferrerInfo> referrerInfo = new ReferrerInfo(nullptr);
+ return InternalLoadNonDocumentSheet(
+ aURI, StylePreloadKind::None, aParsingMode, aUseSystemPrincipal, nullptr,
+ referrerInfo, aObserver, CORS_NONE, u""_ns, u""_ns, 0,
+ FetchPriority::Auto);
+}
+
+Result<RefPtr<StyleSheet>, nsresult> Loader::LoadSheet(
+ nsIURI* aURL, StylePreloadKind aPreloadKind,
+ const Encoding* aPreloadEncoding, nsIReferrerInfo* aReferrerInfo,
+ nsICSSLoaderObserver* aObserver, uint64_t aEarlyHintPreloaderId,
+ CORSMode aCORSMode, const nsAString& aNonce, const nsAString& aIntegrity,
+ FetchPriority aFetchPriority) {
+ LOG(("css::Loader::LoadSheet(aURL, aObserver) api call"));
+ return InternalLoadNonDocumentSheet(
+ aURL, aPreloadKind, eAuthorSheetFeatures, UseSystemPrincipal::No,
+ aPreloadEncoding, aReferrerInfo, aObserver, aCORSMode, aNonce, aIntegrity,
+ aEarlyHintPreloaderId, aFetchPriority);
+}
+
+Result<RefPtr<StyleSheet>, nsresult> Loader::InternalLoadNonDocumentSheet(
+ nsIURI* aURL, StylePreloadKind aPreloadKind, SheetParsingMode aParsingMode,
+ UseSystemPrincipal aUseSystemPrincipal, const Encoding* aPreloadEncoding,
+ nsIReferrerInfo* aReferrerInfo, nsICSSLoaderObserver* aObserver,
+ CORSMode aCORSMode, const nsAString& aNonce, const nsAString& aIntegrity,
+ uint64_t aEarlyHintPreloaderId, FetchPriority aFetchPriority) {
+ MOZ_ASSERT(aURL, "Must have a URI to load");
+ MOZ_ASSERT(aUseSystemPrincipal == UseSystemPrincipal::No || !aObserver,
+ "Shouldn't load system-principal sheets async");
+ MOZ_ASSERT(aReferrerInfo, "Must have referrerInfo");
+
+ LOG_URI(" Non-document sheet uri: '%s'", aURL);
+
+ if (!mEnabled) {
+ LOG_WARN((" Not enabled"));
+ return Err(NS_ERROR_NOT_AVAILABLE);
+ }
+
+ nsIPrincipal* loadingPrincipal = LoaderPrincipal();
+ nsIPrincipal* triggeringPrincipal = loadingPrincipal;
+ nsresult rv = CheckContentPolicy(loadingPrincipal, triggeringPrincipal, aURL,
+ mDocument, aNonce, aPreloadKind);
+ if (NS_FAILED(rv)) {
+ return Err(rv);
+ }
+
+ bool syncLoad = !aObserver;
+ auto [sheet, state] =
+ CreateSheet(aURL, nullptr, triggeringPrincipal, aParsingMode, aCORSMode,
+ aPreloadEncoding, aIntegrity, syncLoad, aPreloadKind);
+
+ PrepareSheet(*sheet, u""_ns, u""_ns, nullptr, IsAlternate::No,
+ IsExplicitlyEnabled::No);
+
+ auto data = MakeRefPtr<SheetLoadData>(
+ this, aURL, sheet, SyncLoad(syncLoad), aUseSystemPrincipal, aPreloadKind,
+ aPreloadEncoding, aObserver, triggeringPrincipal, aReferrerInfo, aNonce,
+ aFetchPriority);
+ MOZ_ASSERT(data->GetRequestingNode() == mDocument);
+ if (state == SheetState::Complete) {
+ LOG((" Sheet already complete"));
+ NotifyOfCachedLoad(std::move(data));
+ return sheet;
+ }
+
+ rv = LoadSheet(*data, state, aEarlyHintPreloaderId);
+ if (NS_FAILED(rv)) {
+ return Err(rv);
+ }
+ if (aObserver) {
+ data->mMustNotify = true;
+ }
+ return sheet;
+}
+
+void Loader::NotifyOfCachedLoad(RefPtr<SheetLoadData> aLoadData) {
+ LOG(("css::Loader::PostLoadEvent"));
+ MOZ_ASSERT(aLoadData->mSheet->IsComplete(),
+ "Only expected to be used for cached sheets");
+ // If we get to this code, the stylesheet loaded correctly at some point, so
+ // we can just schedule a load event and don't need to touch the data's
+ // mLoadFailed.
+ // Note that we do this here and not from inside our SheetComplete so that we
+ // don't end up running the load event more async than needed.
+ MOZ_ASSERT(!aLoadData->mLoadFailed, "Why are we marked as failed?");
+ aLoadData->mSheetAlreadyComplete = true;
+
+ // We need to check mURI to match
+ // DecrementOngoingLoadCountAndMaybeUnblockOnload().
+ if (aLoadData->mURI && aLoadData->BlocksLoadEvent()) {
+ IncrementOngoingLoadCountAndMaybeBlockOnload();
+ }
+ SheetComplete(*aLoadData, NS_OK);
+}
+
+void Loader::Stop() {
+ if (mSheets) {
+ mSheets->CancelLoadsForLoader(*this);
+ }
+}
+
+bool Loader::HasPendingLoads() { return mOngoingLoadCount; }
+
+void Loader::AddObserver(nsICSSLoaderObserver* aObserver) {
+ MOZ_ASSERT(aObserver, "Must have observer");
+ mObservers.AppendElementUnlessExists(aObserver);
+}
+
+void Loader::RemoveObserver(nsICSSLoaderObserver* aObserver) {
+ mObservers.RemoveElement(aObserver);
+}
+
+void Loader::StartDeferredLoads() {
+ if (mSheets && mPendingLoadCount) {
+ mSheets->StartPendingLoadsForLoader(
+ *this, [](const SheetLoadData&) { return true; });
+ }
+}
+
+NS_IMPL_CYCLE_COLLECTION_CLASS(Loader)
+
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN(Loader)
+ NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mSheets);
+ for (const auto& data : tmp->mInlineSheets.Values()) {
+ NS_CYCLE_COLLECTION_NOTE_EDGE_NAME(cb, "Inline sheet cache in Loader");
+ cb.NoteXPCOMChild(data);
+ }
+ for (nsCOMPtr<nsICSSLoaderObserver>& obs : tmp->mObservers.ForwardRange()) {
+ ImplCycleCollectionTraverse(cb, obs, "mozilla::css::Loader.mObservers");
+ }
+ NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mDocGroup)
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
+
+NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN(Loader)
+ if (tmp->mSheets) {
+ if (tmp->mDocument) {
+ tmp->DeregisterFromSheetCache();
+ }
+ tmp->mSheets = nullptr;
+ }
+ tmp->mInlineSheets.Clear();
+ tmp->mObservers.Clear();
+ NS_IMPL_CYCLE_COLLECTION_UNLINK(mDocGroup)
+NS_IMPL_CYCLE_COLLECTION_UNLINK_END
+
+size_t Loader::SizeOfIncludingThis(MallocSizeOf aMallocSizeOf) const {
+ size_t n = aMallocSizeOf(this);
+
+ n += mObservers.ShallowSizeOfExcludingThis(aMallocSizeOf);
+
+ n += mInlineSheets.ShallowSizeOfExcludingThis(aMallocSizeOf);
+ for (const auto& entry : mInlineSheets) {
+ n += entry.GetKey().SizeOfExcludingThisIfUnshared(aMallocSizeOf);
+ // If the sheet has a parent, then its parent will report it so we don't
+ // have to worry about it here.
+ const StyleSheet* sheet = entry.GetWeak();
+ MOZ_ASSERT(!sheet->GetParentSheet(),
+ "How did an @import rule end up here?");
+ if (!sheet->GetOwnerNode()) {
+ n += sheet->SizeOfIncludingThis(aMallocSizeOf);
+ }
+ }
+
+ // Measurement of the following members may be added later if DMD finds it is
+ // worthwhile:
+ // The following members aren't measured:
+ // - mDocument, because it's a weak backpointer
+
+ return n;
+}
+
+nsIPrincipal* Loader::LoaderPrincipal() const {
+ if (mDocument) {
+ return mDocument->NodePrincipal();
+ }
+ // Loaders without a document do system loads.
+ return nsContentUtils::GetSystemPrincipal();
+}
+
+nsIPrincipal* Loader::PartitionedPrincipal() const {
+ if (mDocument && StaticPrefs::privacy_partition_network_state()) {
+ return mDocument->PartitionedPrincipal();
+ }
+ return LoaderPrincipal();
+}
+
+bool Loader::ShouldBypassCache() const {
+ if (!mDocument) {
+ return false;
+ }
+ RefPtr<nsILoadGroup> lg = mDocument->GetDocumentLoadGroup();
+ if (!lg) {
+ return false;
+ }
+ nsLoadFlags flags;
+ if (NS_FAILED(lg->GetLoadFlags(&flags))) {
+ return false;
+ }
+ return flags & (nsIRequest::LOAD_BYPASS_CACHE |
+ nsICachingChannel::LOAD_BYPASS_LOCAL_CACHE);
+}
+
+void Loader::BlockOnload() {
+ if (mDocument) {
+ mDocument->BlockOnload();
+ }
+}
+
+void Loader::UnblockOnload(bool aFireSync) {
+ if (mDocument) {
+ mDocument->UnblockOnload(aFireSync);
+ }
+}
+
+} // namespace css
+} // namespace mozilla