diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
commit | 36d22d82aa202bb199967e9512281e9a53db42c9 (patch) | |
tree | 105e8c98ddea1c1e4784a60a5a6410fa416be2de /toolkit/components/url-classifier/nsUrlClassifierStreamUpdater.cpp | |
parent | Initial commit. (diff) | |
download | firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip |
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'toolkit/components/url-classifier/nsUrlClassifierStreamUpdater.cpp')
-rw-r--r-- | toolkit/components/url-classifier/nsUrlClassifierStreamUpdater.cpp | 880 |
1 files changed, 880 insertions, 0 deletions
diff --git a/toolkit/components/url-classifier/nsUrlClassifierStreamUpdater.cpp b/toolkit/components/url-classifier/nsUrlClassifierStreamUpdater.cpp new file mode 100644 index 0000000000..e501a2512e --- /dev/null +++ b/toolkit/components/url-classifier/nsUrlClassifierStreamUpdater.cpp @@ -0,0 +1,880 @@ +//* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "mozilla/Components.h" +#include "nsCRT.h" +#include "nsIHttpChannel.h" +#include "nsIObserverService.h" +#include "nsIStringStream.h" +#include "nsIUploadChannel.h" +#include "nsIURI.h" +#include "nsIUrlClassifierDBService.h" +#include "nsIUrlClassifierRemoteSettingsService.h" +#include "nsUrlClassifierUtils.h" +#include "nsNetUtil.h" +#include "nsStreamUtils.h" +#include "nsStringStream.h" +#include "nsUrlClassifierStreamUpdater.h" +#include "mozilla/ErrorNames.h" +#include "mozilla/Logging.h" +#include "nsIInterfaceRequestor.h" +#include "mozilla/Telemetry.h" +#include "nsContentUtils.h" +#include "nsIURLFormatter.h" +#include "Classifier.h" +#include "UrlClassifierTelemetryUtils.h" +#include "mozilla/StaticPrefs_urlclassifier.h" + +using namespace mozilla::safebrowsing; +using namespace mozilla; + +#define MIN_TIMEOUT_MS (60 * 1000) + +static const char* gQuitApplicationMessage = "quit-application"; + +// Limit the list file size to 32mb +const uint32_t MAX_FILE_SIZE = (32 * 1024 * 1024); + +// Retry delay when we failed to DownloadUpdate() if due to +// DBService busy. +const uint32_t FETCH_NEXT_REQUEST_RETRY_DELAY_MS = 1000; + +#undef LOG + +// MOZ_LOG=UrlClassifierStreamUpdater:5 +static mozilla::LazyLogModule gUrlClassifierStreamUpdaterLog( + "UrlClassifierStreamUpdater"); +#define LOG(args) TrimAndLog args +#define LOG_ENABLED() \ + MOZ_LOG_TEST(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Debug) + +// Calls nsIURLFormatter::TrimSensitiveURLs to remove sensitive +// info from the logging message. +static MOZ_FORMAT_PRINTF(1, 2) void TrimAndLog(const char* aFmt, ...) { + nsString raw; + + va_list ap; + va_start(ap, aFmt); + raw.AppendVprintf(aFmt, ap); + va_end(ap); + + nsCOMPtr<nsIURLFormatter> urlFormatter = + do_GetService("@mozilla.org/toolkit/URLFormatterService;1"); + + nsString trimmed; + nsresult rv = urlFormatter->TrimSensitiveURLs(raw, trimmed); + if (NS_FAILED(rv)) { + trimmed.Truncate(); + } + + // Use %s so we aren't exposing random strings to printf interpolation. + MOZ_LOG(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Debug, + ("%s", NS_ConvertUTF16toUTF8(trimmed).get())); +} + +// This class does absolutely nothing, except pass requests onto the DBService. + +/////////////////////////////////////////////////////////////////////////////// +// nsIUrlClassiferStreamUpdater implementation +// Handles creating/running the stream listener + +nsUrlClassifierStreamUpdater::nsUrlClassifierStreamUpdater() + : mIsUpdating(false), + mInitialized(false), + mDownloadError(false), + mBeganStream(false), + mChannel(nullptr), + mTelemetryClockStart(0) { + LOG(("nsUrlClassifierStreamUpdater init [this=%p]", this)); +} + +NS_IMPL_ISUPPORTS(nsUrlClassifierStreamUpdater, nsIUrlClassifierStreamUpdater, + nsIUrlClassifierUpdateObserver, nsIRequestObserver, + nsIStreamListener, nsIObserver, nsIInterfaceRequestor, + nsITimerCallback, nsINamed) + +/** + * Clear out the update. + */ +void nsUrlClassifierStreamUpdater::DownloadDone() { + LOG(("nsUrlClassifierStreamUpdater::DownloadDone [this=%p]", this)); + mIsUpdating = false; + + mPendingUpdates.Clear(); + mDownloadError = false; + mCurrentRequest = nullptr; +} + +/////////////////////////////////////////////////////////////////////////////// +// nsIUrlClassifierStreamUpdater implementation + +nsresult nsUrlClassifierStreamUpdater::FetchUpdate( + nsIURI* aUpdateUrl, const nsACString& aRequestPayload, bool aIsPostRequest, + const nsACString& aStreamTable) { + mBeganStream = false; + nsresult rv; + // moz-sbrs is a customed scheme used by Safe Browsing. When the scheme is + // present in the update url, we'll fetch the data from + // UrlClassifierRemoteSettingsService. + if (aUpdateUrl->SchemeIs("moz-sbrs")) { +#ifdef DEBUG + LOG(("Fetching update %s from RemoteSettings", aRequestPayload.Data())); +#endif + nsCOMPtr<nsIUrlClassifierRemoteSettingsService> rsService = + do_GetService("@mozilla.org/url-classifier/list-service;1"); + if (!rsService) { + return NS_ERROR_FAILURE; + } + + rv = rsService->FetchList(aRequestPayload, this); + if (NS_WARN_IF(NS_FAILED(rv))) { + return rv; + } + } else { +#ifdef DEBUG + LOG(("Fetching update %s from %s", aRequestPayload.Data(), + aUpdateUrl->GetSpecOrDefault().get())); +#endif + uint32_t loadFlags = nsIChannel::INHIBIT_CACHING | + nsIChannel::LOAD_BYPASS_CACHE | + nsIChannel::LOAD_BYPASS_URL_CLASSIFIER; + + // SafeBrowsing update request should never be classified to make sure + // we can recover from a bad SafeBrowsing database. + rv = NS_NewChannel(getter_AddRefs(mChannel), aUpdateUrl, + nsContentUtils::GetSystemPrincipal(), + nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL, + nsIContentPolicy::TYPE_OTHER, + nullptr, // nsICookieJarSettings + nullptr, // aPerformanceStorage + nullptr, // aLoadGroup + this, // aInterfaceRequestor + loadFlags); + + NS_ENSURE_SUCCESS(rv, rv); + + nsCOMPtr<nsILoadInfo> loadInfo = mChannel->LoadInfo(); + mozilla::OriginAttributes attrs; + attrs.mFirstPartyDomain.AssignLiteral( + NECKO_SAFEBROWSING_FIRST_PARTY_DOMAIN); + loadInfo->SetOriginAttributes(attrs); + // allow deprecated HTTP request from SystemPrincipal + loadInfo->SetAllowDeprecatedSystemRequests(true); + + if (!aIsPostRequest) { + // We use POST method to send our request in v2. In v4, the request + // needs to be embedded to the URL and use GET method to send. + // However, from the Chromium source code, a extended HTTP header has + // to be sent along with the request to make the request succeed. + // The following description is from Chromium source code: + // + // "The following header informs the envelope server (which sits in + // front of Google's stubby server) that the received GET request should + // be interpreted as a POST." + // + nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel, &rv); + NS_ENSURE_SUCCESS(rv, rv); + + rv = httpChannel->SetRequestHeader("X-HTTP-Method-Override"_ns, "POST"_ns, + false); + NS_ENSURE_SUCCESS(rv, rv); + } else if (!aRequestPayload.IsEmpty()) { + rv = AddRequestBody(aRequestPayload); + NS_ENSURE_SUCCESS(rv, rv); + } + + // Set the appropriate content type for file/data URIs, for unit testing + // purposes. + // This is only used for testing and should be deleted. + if (aUpdateUrl->SchemeIs("file") || aUpdateUrl->SchemeIs("data")) { + mChannel->SetContentType("application/vnd.google.safebrowsing-update"_ns); + } else { + // We assume everything else is an HTTP request. + + // Disable keepalive. + nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel, &rv); + NS_ENSURE_SUCCESS(rv, rv); + rv = httpChannel->SetRequestHeader("Connection"_ns, "close"_ns, false); + NS_ENSURE_SUCCESS(rv, rv); + } + + // Make the request. + rv = mChannel->AsyncOpen(this); + NS_ENSURE_SUCCESS(rv, rv); + } + + mTelemetryClockStart = PR_IntervalNow(); + mStreamTable = aStreamTable; + + if (StaticPrefs::urlclassifier_update_response_timeout_ms() > + StaticPrefs::urlclassifier_update_timeout_ms()) { + NS_WARNING( + "Safe Browsing response timeout is greater than the general " + "timeout. Disabling these update timeouts."); + return NS_OK; + } + MOZ_TRY_VAR(mResponseTimeoutTimer, + NS_NewTimerWithCallback( + this, StaticPrefs::urlclassifier_update_response_timeout_ms(), + nsITimer::TYPE_ONE_SHOT)); + + MOZ_TRY_VAR(mTimeoutTimer, + NS_NewTimerWithCallback( + this, StaticPrefs::urlclassifier_update_timeout_ms(), + nsITimer::TYPE_ONE_SHOT)); + + if (StaticPrefs::urlclassifier_update_timeout_ms() < MIN_TIMEOUT_MS) { + LOG(("Download update timeout %d ms (< %d ms) would be too small", + StaticPrefs::urlclassifier_update_timeout_ms(), MIN_TIMEOUT_MS)); + } + + return NS_OK; +} + +nsresult nsUrlClassifierStreamUpdater::FetchUpdate( + const nsACString& aUpdateUrl, const nsACString& aRequestPayload, + bool aIsPostRequest, const nsACString& aStreamTable) { + LOG(("(pre) Fetching update from %s\n", + PromiseFlatCString(aUpdateUrl).get())); + + nsCString updateUrl(aUpdateUrl); + if (!aIsPostRequest) { + updateUrl.AppendPrintf("&$req=%s", nsCString(aRequestPayload).get()); + } + + nsCOMPtr<nsIURI> uri; + nsresult rv = NS_NewURI(getter_AddRefs(uri), updateUrl); + NS_ENSURE_SUCCESS(rv, rv); + + nsAutoCString urlSpec; + uri->GetAsciiSpec(urlSpec); + + LOG(("(post) Fetching update from %s\n", urlSpec.get())); + + return FetchUpdate(uri, aRequestPayload, aIsPostRequest, aStreamTable); +} + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::DownloadUpdates( + const nsACString& aRequestTables, const nsACString& aRequestPayload, + bool aIsPostRequest, const nsACString& aUpdateUrl, + nsIUrlClassifierCallback* aSuccessCallback, + nsIUrlClassifierCallback* aUpdateErrorCallback, + nsIUrlClassifierCallback* aDownloadErrorCallback, bool* _retval) { + NS_ENSURE_ARG(aSuccessCallback); + NS_ENSURE_ARG(aUpdateErrorCallback); + NS_ENSURE_ARG(aDownloadErrorCallback); + + if (mIsUpdating) { + LOG(("Already updating, queueing update %s from %s", aRequestPayload.Data(), + aUpdateUrl.Data())); + *_retval = false; + UpdateRequest* request = mPendingRequests.AppendElement(fallible); + if (!request) { + return NS_ERROR_OUT_OF_MEMORY; + } + BuildUpdateRequest(aRequestTables, aRequestPayload, aIsPostRequest, + aUpdateUrl, aSuccessCallback, aUpdateErrorCallback, + aDownloadErrorCallback, request); + return NS_OK; + } + + if (aUpdateUrl.IsEmpty()) { + NS_ERROR("updateUrl not set"); + return NS_ERROR_NOT_INITIALIZED; + } + + nsresult rv; + + if (!mInitialized) { + // Add an observer for shutdown so we can cancel any pending list + // downloads. quit-application is the same event that the download + // manager listens for and uses to cancel pending downloads. + nsCOMPtr<nsIObserverService> observerService = + mozilla::services::GetObserverService(); + if (!observerService) return NS_ERROR_FAILURE; + + observerService->AddObserver(this, gQuitApplicationMessage, false); + + mDBService = mozilla::components::UrlClassifierDB::Service(&rv); + NS_ENSURE_SUCCESS(rv, rv); + + mInitialized = true; + } + + rv = mDBService->BeginUpdate(this, aRequestTables); + if (rv == NS_ERROR_NOT_AVAILABLE) { + LOG(("Service busy, already updating, queuing update %s from %s", + aRequestPayload.Data(), aUpdateUrl.Data())); + *_retval = false; + UpdateRequest* request = mPendingRequests.AppendElement(fallible); + if (!request) { + return NS_ERROR_OUT_OF_MEMORY; + } + BuildUpdateRequest(aRequestTables, aRequestPayload, aIsPostRequest, + aUpdateUrl, aSuccessCallback, aUpdateErrorCallback, + aDownloadErrorCallback, request); + + // We cannot guarantee that we will be notified when DBService is done + // processing the current update, so we fire a retry timer on our own. + MOZ_TRY_VAR(mFetchNextRequestTimer, + NS_NewTimerWithCallback(this, FETCH_NEXT_REQUEST_RETRY_DELAY_MS, + nsITimer::TYPE_ONE_SHOT)); + + return NS_OK; + } + + if (NS_FAILED(rv)) { + return rv; + } + + nsUrlClassifierUtils* urlUtil = nsUrlClassifierUtils::GetInstance(); + if (NS_WARN_IF(!urlUtil)) { + return NS_ERROR_FAILURE; + } + + nsTArray<nsCString> tables; + mozilla::safebrowsing::Classifier::SplitTables(aRequestTables, tables); + urlUtil->GetTelemetryProvider(tables.SafeElementAt(0, ""_ns), + mTelemetryProvider); + + mCurrentRequest = MakeUnique<UpdateRequest>(); + BuildUpdateRequest(aRequestTables, aRequestPayload, aIsPostRequest, + aUpdateUrl, aSuccessCallback, aUpdateErrorCallback, + aDownloadErrorCallback, mCurrentRequest.get()); + + mIsUpdating = true; + *_retval = true; + + LOG(("FetchUpdate: %s", mCurrentRequest->mUrl.Data())); + + return FetchUpdate(aUpdateUrl, aRequestPayload, aIsPostRequest, ""_ns); +} + +/////////////////////////////////////////////////////////////////////////////// +// nsIUrlClassifierUpdateObserver implementation + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::UpdateUrlRequested(const nsACString& aUrl, + const nsACString& aTable) { + LOG(("Queuing requested update from %s\n", PromiseFlatCString(aUrl).get())); + + PendingUpdate* update = mPendingUpdates.AppendElement(fallible); + if (!update) { + return NS_ERROR_OUT_OF_MEMORY; + } + + // Allow data: and file: urls for unit testing purposes, otherwise assume http + if (StringBeginsWith(aUrl, "data:"_ns) || + StringBeginsWith(aUrl, "file:"_ns)) { + update->mUrl = aUrl; + } else { + // For unittesting update urls to localhost should use http, not https + // (otherwise the connection will fail silently, since there will be no + // cert available). + if (!StringBeginsWith(aUrl, "localhost"_ns)) { + update->mUrl = "https://"_ns + aUrl; + } else { + update->mUrl = "http://"_ns + aUrl; + } + } + update->mTable = aTable; + + return NS_OK; +} + +nsresult nsUrlClassifierStreamUpdater::FetchNext() { + if (mPendingUpdates.Length() == 0) { + return NS_OK; + } + + PendingUpdate& update = mPendingUpdates[0]; + LOG(("Fetching update url: %s\n", update.mUrl.get())); + nsresult rv = + FetchUpdate(update.mUrl, ""_ns, + true, // This method is for v2 and v2 is always a POST. + update.mTable); + if (NS_FAILED(rv)) { + nsAutoCString errorName; + mozilla::GetErrorName(rv, errorName); + LOG(("Error (%s) fetching update url: %s\n", errorName.get(), + update.mUrl.get())); + // We can commit the urls that we've applied so far. This is + // probably a transient server problem, so trigger backoff. + mDownloadError = true; + mDBService->FinishUpdate(); + return rv; + } + + mPendingUpdates.RemoveElementAt(0); + + return NS_OK; +} + +nsresult nsUrlClassifierStreamUpdater::FetchNextRequest() { + if (mPendingRequests.Length() == 0) { + LOG(("No more requests, returning")); + return NS_OK; + } + + UpdateRequest request = mPendingRequests[0]; + mPendingRequests.RemoveElementAt(0); + LOG(("Stream updater: fetching next request: %s, %s", request.mTables.get(), + request.mUrl.get())); + bool dummy; + DownloadUpdates(request.mTables, request.mRequestPayload, + request.mIsPostRequest, request.mUrl, + request.mSuccessCallback, request.mUpdateErrorCallback, + request.mDownloadErrorCallback, &dummy); + return NS_OK; +} + +void nsUrlClassifierStreamUpdater::BuildUpdateRequest( + const nsACString& aRequestTables, const nsACString& aRequestPayload, + bool aIsPostRequest, const nsACString& aUpdateUrl, + nsIUrlClassifierCallback* aSuccessCallback, + nsIUrlClassifierCallback* aUpdateErrorCallback, + nsIUrlClassifierCallback* aDownloadErrorCallback, UpdateRequest* aRequest) { + MOZ_ASSERT(aRequest); + + aRequest->mTables = aRequestTables; + aRequest->mRequestPayload = aRequestPayload; + aRequest->mIsPostRequest = aIsPostRequest; + aRequest->mUrl = aUpdateUrl; + aRequest->mSuccessCallback = aSuccessCallback; + aRequest->mUpdateErrorCallback = aUpdateErrorCallback; + aRequest->mDownloadErrorCallback = aDownloadErrorCallback; +} + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::StreamFinished(nsresult status, + uint32_t requestedDelay) { + // We are a service and may not be reset with Init between calls, so reset + // mBeganStream manually. + mBeganStream = false; + if (LOG_ENABLED()) { + nsAutoCString errorName; + mozilla::GetErrorName(status, errorName); + LOG(("nsUrlClassifierStreamUpdater::StreamFinished [%s, %d]", + errorName.get(), requestedDelay)); + } + if (NS_FAILED(status) || mPendingUpdates.Length() == 0) { + // We're done. + LOG(("nsUrlClassifierStreamUpdater::Done [this=%p]", this)); + mDBService->FinishUpdate(); + return NS_OK; + } + + // This timer is for fetching indirect updates ("forwards") from any "u:" + // lines that we encountered while processing the server response. It is NOT + // for scheduling the next time we pull the list from the server. That's a + // different timer in listmanager.js (see bug 1110891). + nsresult rv; + rv = NS_NewTimerWithCallback(getter_AddRefs(mFetchIndirectUpdatesTimer), this, + requestedDelay, nsITimer::TYPE_ONE_SHOT); + + if (NS_FAILED(rv)) { + NS_WARNING( + "Unable to initialize timer, fetching next safebrowsing item " + "immediately"); + return FetchNext(); + } + + return NS_OK; +} + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::UpdateSuccess(uint32_t requestedTimeout) { + LOG(("nsUrlClassifierStreamUpdater::UpdateSuccess [this=%p]", this)); + if (mPendingUpdates.Length() != 0) { + NS_WARNING("Didn't fetch all safebrowsing update redirects"); + } + + // DownloadDone() clears mSuccessCallback, so we save it off here. + nsCOMPtr<nsIUrlClassifierCallback> successCallback = + mDownloadError ? nullptr : mCurrentRequest->mSuccessCallback.get(); + nsCOMPtr<nsIUrlClassifierCallback> downloadErrorCallback = + mDownloadError ? mCurrentRequest->mDownloadErrorCallback.get() : nullptr; + + DownloadDone(); + + nsAutoCString strTimeout; + strTimeout.AppendInt(requestedTimeout); + if (successCallback) { + LOG(("nsUrlClassifierStreamUpdater::UpdateSuccess callback [this=%p]", + this)); + successCallback->HandleEvent(strTimeout); + } else if (downloadErrorCallback) { + downloadErrorCallback->HandleEvent(mDownloadErrorStatusStr); + mDownloadErrorStatusStr.Truncate(); + LOG(("Notify download error callback in UpdateSuccess [this=%p]", this)); + } + // Now fetch the next request + LOG(("stream updater: calling into fetch next request")); + FetchNextRequest(); + + return NS_OK; +} + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::UpdateError(nsresult result) { + LOG(("nsUrlClassifierStreamUpdater::UpdateError [this=%p]", this)); + + // DownloadDone() clears mUpdateErrorCallback, so we save it off here. + nsCOMPtr<nsIUrlClassifierCallback> errorCallback = + mDownloadError ? nullptr : mCurrentRequest->mUpdateErrorCallback.get(); + nsCOMPtr<nsIUrlClassifierCallback> downloadErrorCallback = + mDownloadError ? mCurrentRequest->mDownloadErrorCallback.get() : nullptr; + DownloadDone(); + + if (errorCallback) { + nsAutoCString strResult; + mozilla::GetErrorName(result, strResult); + errorCallback->HandleEvent(strResult); + } else if (downloadErrorCallback) { + LOG(("Notify download error callback in UpdateError [this=%p]", this)); + downloadErrorCallback->HandleEvent(mDownloadErrorStatusStr); + mDownloadErrorStatusStr.Truncate(); + } + + return NS_OK; +} + +nsresult nsUrlClassifierStreamUpdater::AddRequestBody( + const nsACString& aRequestBody) { + nsresult rv; + nsCOMPtr<nsIStringInputStream> strStream = + do_CreateInstance(NS_STRINGINPUTSTREAM_CONTRACTID, &rv); + NS_ENSURE_SUCCESS(rv, rv); + + rv = strStream->SetData(aRequestBody.BeginReading(), aRequestBody.Length()); + NS_ENSURE_SUCCESS(rv, rv); + + nsCOMPtr<nsIUploadChannel> uploadChannel = do_QueryInterface(mChannel, &rv); + NS_ENSURE_SUCCESS(rv, rv); + + rv = uploadChannel->SetUploadStream(strStream, "text/plain"_ns, -1); + NS_ENSURE_SUCCESS(rv, rv); + + nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel, &rv); + NS_ENSURE_SUCCESS(rv, rv); + + rv = httpChannel->SetRequestMethod("POST"_ns); + NS_ENSURE_SUCCESS(rv, rv); + + return NS_OK; +} + +/////////////////////////////////////////////////////////////////////////////// +// nsIStreamListenerObserver implementation + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::OnStartRequest(nsIRequest* request) { + nsresult rv; + bool downloadError = false; + nsAutoCString strStatus; + nsresult status = NS_OK; + + // Only update if we got http success header + nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(request); + if (httpChannel) { + rv = httpChannel->GetStatus(&status); + NS_ENSURE_SUCCESS(rv, rv); + + if (LOG_ENABLED()) { + nsAutoCString errorName, spec; + mozilla::GetErrorName(status, errorName); + nsCOMPtr<nsIURI> uri; + rv = httpChannel->GetURI(getter_AddRefs(uri)); + if (NS_SUCCEEDED(rv) && uri) { + uri->GetAsciiSpec(spec); + } + LOG( + ("nsUrlClassifierStreamUpdater::OnStartRequest " + "(status=%s, uri=%s, this=%p)", + errorName.get(), spec.get(), this)); + } + if (mTelemetryClockStart > 0) { + uint32_t msecs = + PR_IntervalToMilliseconds(PR_IntervalNow() - mTelemetryClockStart); + mozilla::Telemetry::Accumulate( + mozilla::Telemetry::URLCLASSIFIER_UPDATE_SERVER_RESPONSE_TIME, + mTelemetryProvider, msecs); + } + + if (mResponseTimeoutTimer) { + mResponseTimeoutTimer->Cancel(); + mResponseTimeoutTimer = nullptr; + } + + uint8_t netErrCode = NS_FAILED(status) ? NetworkErrorToBucket(status) : 0; + mozilla::Telemetry::Accumulate( + mozilla::Telemetry::URLCLASSIFIER_UPDATE_REMOTE_NETWORK_ERROR, + mTelemetryProvider, netErrCode); + + if (NS_FAILED(status)) { + // Assume we're overloading the server and trigger backoff. + downloadError = true; + } else { + bool succeeded = false; + rv = httpChannel->GetRequestSucceeded(&succeeded); + NS_ENSURE_SUCCESS(rv, rv); + + uint32_t requestStatus; + rv = httpChannel->GetResponseStatus(&requestStatus); + NS_ENSURE_SUCCESS(rv, rv); + mozilla::Telemetry::Accumulate( + mozilla::Telemetry::URLCLASSIFIER_UPDATE_REMOTE_STATUS2, + mTelemetryProvider, HTTPStatusToBucket(requestStatus)); + if (requestStatus == 400) { + printf_stderr( + "Safe Browsing server returned a 400 during update:" + "request url = %s, payload = %s\n", + mCurrentRequest->mUrl.get(), + mCurrentRequest->mRequestPayload.get()); + } + + LOG(("nsUrlClassifierStreamUpdater::OnStartRequest %s (%d)", + succeeded ? "succeeded" : "failed", requestStatus)); + if (!succeeded) { + // 404 or other error, pass error status back + strStatus.AppendInt(requestStatus); + downloadError = true; + } + } + } + + if (downloadError) { + LOG(("nsUrlClassifierStreamUpdater::Download error [this=%p]", this)); + mDownloadError = true; + mDownloadErrorStatusStr = strStatus; + status = NS_ERROR_ABORT; + } else if (NS_SUCCEEDED(status)) { + MOZ_ASSERT(mCurrentRequest->mDownloadErrorCallback); + mBeganStream = true; + LOG(("nsUrlClassifierStreamUpdater::Beginning stream [this=%p]", this)); + rv = mDBService->BeginStream(mStreamTable); + NS_ENSURE_SUCCESS(rv, rv); + } + + mStreamTable.Truncate(); + + return status; +} + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::OnDataAvailable(nsIRequest* request, + nsIInputStream* aIStream, + uint64_t aSourceOffset, + uint32_t aLength) { + if (!mDBService) return NS_ERROR_NOT_INITIALIZED; + + LOG(("OnDataAvailable (%d bytes)", aLength)); + + if (aSourceOffset > MAX_FILE_SIZE) { + LOG(( + "OnDataAvailable::Abort because exceeded the maximum file size(%" PRIu64 + ")", + aSourceOffset)); + return NS_ERROR_FILE_TOO_BIG; + } + + nsresult rv; + + // Copy the data into a nsCString + nsCString chunk; + rv = NS_ConsumeStream(aIStream, aLength, chunk); + NS_ENSURE_SUCCESS(rv, rv); + + // LOG(("Chunk (%d): %s\n\n", chunk.Length(), chunk.get())); + rv = mDBService->UpdateStream(chunk); + NS_ENSURE_SUCCESS(rv, rv); + + return NS_OK; +} + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::OnStopRequest(nsIRequest* request, + nsresult aStatus) { + if (!mDBService) return NS_ERROR_NOT_INITIALIZED; + + if (LOG_ENABLED()) { + nsAutoCString errorName; + mozilla::GetErrorName(aStatus, errorName); + LOG(("OnStopRequest (status %s, beganStream %s, this=%p)", errorName.get(), + mBeganStream ? "true" : "false", this)); + } + + nsresult rv; + + if (NS_SUCCEEDED(aStatus)) { + // Success, finish this stream and move on to the next. + rv = mDBService->FinishStream(); + } else if (mBeganStream) { + LOG(("OnStopRequest::Canceling update [this=%p]", this)); + // We began this stream and couldn't finish it. We have to cancel the + // update, it's not in a consistent state. + mDownloadError = true; + rv = mDBService->CancelUpdate(); + } else { + LOG(("OnStopRequest::Finishing update [this=%p]", this)); + // The fetch failed, but we didn't start the stream (probably a + // server or connection error). We can commit what we've applied + // so far, and request again later. + rv = mDBService->FinishUpdate(); + } + + if (mResponseTimeoutTimer) { + mResponseTimeoutTimer->Cancel(); + mResponseTimeoutTimer = nullptr; + } + + // mResponseTimeoutTimer may be cleared in OnStartRequest, so we check + // mTimeoutTimer to see whether the update was has timed out + if (mTimeoutTimer) { + mozilla::Telemetry::Accumulate( + mozilla::Telemetry::URLCLASSIFIER_UPDATE_TIMEOUT, mTelemetryProvider, + static_cast<uint8_t>(eNoTimeout)); + mTimeoutTimer->Cancel(); + mTimeoutTimer = nullptr; + } + + mTelemetryProvider.Truncate(); + mTelemetryClockStart = 0; + mChannel = nullptr; + + // If the fetch failed, return the network status rather than NS_OK, the + // result of finishing a possibly-empty update + if (NS_SUCCEEDED(aStatus)) { + return rv; + } + return aStatus; +} + +/////////////////////////////////////////////////////////////////////////////// +// nsIObserver implementation + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::Observe(nsISupports* aSubject, const char* aTopic, + const char16_t* aData) { + if (nsCRT::strcmp(aTopic, gQuitApplicationMessage) == 0) { + if (mIsUpdating && mChannel) { + LOG(("Cancel download")); + nsresult rv; + rv = mChannel->Cancel(NS_ERROR_ABORT); + NS_ENSURE_SUCCESS(rv, rv); + mIsUpdating = false; + mChannel = nullptr; + mTelemetryClockStart = 0; + } + if (mFetchIndirectUpdatesTimer) { + mFetchIndirectUpdatesTimer->Cancel(); + mFetchIndirectUpdatesTimer = nullptr; + } + if (mFetchNextRequestTimer) { + mFetchNextRequestTimer->Cancel(); + mFetchNextRequestTimer = nullptr; + } + if (mResponseTimeoutTimer) { + mResponseTimeoutTimer->Cancel(); + mResponseTimeoutTimer = nullptr; + } + if (mTimeoutTimer) { + mTimeoutTimer->Cancel(); + mTimeoutTimer = nullptr; + } + } + return NS_OK; +} + +/////////////////////////////////////////////////////////////////////////////// +// nsIInterfaceRequestor implementation + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::GetInterface(const nsIID& eventSinkIID, + void** _retval) { + return QueryInterface(eventSinkIID, _retval); +} + +/////////////////////////////////////////////////////////////////////////////// +// nsITimerCallback implementation +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::Notify(nsITimer* timer) { + LOG(("nsUrlClassifierStreamUpdater::Notify [%p]", this)); + + if (timer == mFetchNextRequestTimer) { + mFetchNextRequestTimer = nullptr; + FetchNextRequest(); + return NS_OK; + } + + if (timer == mFetchIndirectUpdatesTimer) { + mFetchIndirectUpdatesTimer = nullptr; + // Start the update process up again. + FetchNext(); + return NS_OK; + } + + bool updateFailed = false; + if (timer == mResponseTimeoutTimer) { + mResponseTimeoutTimer = nullptr; + if (mTimeoutTimer) { + mTimeoutTimer->Cancel(); + mTimeoutTimer = nullptr; + } + mDownloadError = true; // Trigger backoff + updateFailed = true; + MOZ_LOG(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Error, + ("Safe Browsing timed out while waiting for the update server to " + "respond.")); + mozilla::Telemetry::Accumulate( + mozilla::Telemetry::URLCLASSIFIER_UPDATE_TIMEOUT, mTelemetryProvider, + static_cast<uint8_t>(eResponseTimeout)); + } + + if (timer == mTimeoutTimer) { + mTimeoutTimer = nullptr; + // No backoff since the connection may just be temporarily slow. + updateFailed = true; + MOZ_LOG(gUrlClassifierStreamUpdaterLog, mozilla::LogLevel::Error, + ("Safe Browsing timed out while waiting for the update server to " + "finish.")); + mozilla::Telemetry::Accumulate( + mozilla::Telemetry::URLCLASSIFIER_UPDATE_TIMEOUT, mTelemetryProvider, + static_cast<uint8_t>(eDownloadTimeout)); + } + + if (updateFailed) { + // Cancelling the channel will trigger OnStopRequest. + if (mChannel) { + mozilla::Unused << mChannel->Cancel(NS_ERROR_ABORT); + mChannel = nullptr; + } + mTelemetryClockStart = 0; + + if (mFetchIndirectUpdatesTimer) { + mFetchIndirectUpdatesTimer->Cancel(); + mFetchIndirectUpdatesTimer = nullptr; + } + if (mFetchNextRequestTimer) { + mFetchNextRequestTimer->Cancel(); + mFetchNextRequestTimer = nullptr; + } + + return NS_OK; + } + + MOZ_ASSERT_UNREACHABLE("A timer is fired from nowhere."); + return NS_OK; +} + +//////////////////////////////////////////////////////////////////////// +//// nsINamed + +NS_IMETHODIMP +nsUrlClassifierStreamUpdater::GetName(nsACString& aName) { + aName.AssignLiteral("nsUrlClassifierStreamUpdater"); + return NS_OK; +} |