summaryrefslogtreecommitdiffstats
path: root/dom/fetch/Fetch.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
commit36d22d82aa202bb199967e9512281e9a53db42c9 (patch)
tree105e8c98ddea1c1e4784a60a5a6410fa416be2de /dom/fetch/Fetch.cpp
parentInitial commit. (diff)
downloadfirefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz
firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip
Adding upstream version 115.7.0esr.upstream/115.7.0esrupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/fetch/Fetch.cpp')
-rw-r--r--dom/fetch/Fetch.cpp1683
1 files changed, 1683 insertions, 0 deletions
diff --git a/dom/fetch/Fetch.cpp b/dom/fetch/Fetch.cpp
new file mode 100644
index 0000000000..c4589bd513
--- /dev/null
+++ b/dom/fetch/Fetch.cpp
@@ -0,0 +1,1683 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "Fetch.h"
+
+#include "js/RootingAPI.h"
+#include "js/Value.h"
+#include "mozilla/CycleCollectedJSContext.h"
+#include "mozilla/StaticPrefs_dom.h"
+#include "mozilla/dom/Document.h"
+#include "mozilla/ipc/BackgroundChild.h"
+#include "mozilla/ipc/PBackgroundChild.h"
+#include "mozilla/ipc/PBackgroundSharedTypes.h"
+#include "mozilla/ipc/IPCStreamUtils.h"
+#include "nsIGlobalObject.h"
+
+#include "nsDOMString.h"
+#include "nsJSUtils.h"
+#include "nsNetUtil.h"
+#include "nsReadableUtils.h"
+#include "nsStreamUtils.h"
+#include "nsStringStream.h"
+#include "nsProxyRelease.h"
+
+#include "mozilla/ErrorResult.h"
+#include "mozilla/dom/BindingDeclarations.h"
+#include "mozilla/dom/BodyConsumer.h"
+#include "mozilla/dom/Exceptions.h"
+#include "mozilla/dom/DOMException.h"
+#include "mozilla/dom/FetchDriver.h"
+#include "mozilla/dom/File.h"
+#include "mozilla/dom/FormData.h"
+#include "mozilla/dom/Headers.h"
+#include "mozilla/dom/Promise.h"
+#include "mozilla/dom/PromiseWorkerProxy.h"
+#include "mozilla/dom/ReadableStreamDefaultReader.h"
+#include "mozilla/dom/RemoteWorkerChild.h"
+#include "mozilla/dom/Request.h"
+#include "mozilla/dom/Response.h"
+#include "mozilla/dom/ScriptSettings.h"
+#include "mozilla/dom/URLSearchParams.h"
+#include "mozilla/net/CookieJarSettings.h"
+
+#include "BodyExtractor.h"
+#include "FetchChild.h"
+#include "FetchObserver.h"
+#include "InternalRequest.h"
+#include "InternalResponse.h"
+
+#include "mozilla/dom/WorkerCommon.h"
+#include "mozilla/dom/WorkerRef.h"
+#include "mozilla/dom/WorkerRunnable.h"
+#include "mozilla/dom/WorkerScope.h"
+
+namespace mozilla::dom {
+
+namespace {
+
+// Step 17.2.1.2 and 17.2.2 of
+// https://fetch.spec.whatwg.org/#concept-http-network-fetch
+// If stream is readable, then error stream with ...
+void AbortStream(JSContext* aCx, ReadableStream* aReadableStream,
+ ErrorResult& aRv, JS::Handle<JS::Value> aReasonDetails) {
+ if (aReadableStream->State() != ReadableStream::ReaderState::Readable) {
+ return;
+ }
+
+ JS::Rooted<JS::Value> value(aCx, aReasonDetails);
+
+ if (aReasonDetails.isUndefined()) {
+ RefPtr<DOMException> e = DOMException::Create(NS_ERROR_DOM_ABORT_ERR);
+ if (!GetOrCreateDOMReflector(aCx, e, &value)) {
+ return;
+ }
+ }
+
+ aReadableStream->ErrorNative(aCx, value, aRv);
+}
+
+} // namespace
+
+class AbortSignalMainThread final : public AbortSignalImpl {
+ public:
+ NS_DECL_CYCLE_COLLECTING_ISUPPORTS
+ NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS(AbortSignalMainThread)
+
+ explicit AbortSignalMainThread(bool aAborted)
+ : AbortSignalImpl(aAborted, JS::UndefinedHandleValue) {
+ mozilla::HoldJSObjects(this);
+ }
+
+ private:
+ ~AbortSignalMainThread() { mozilla::DropJSObjects(this); };
+};
+
+NS_IMPL_CYCLE_COLLECTION_CLASS(AbortSignalMainThread)
+
+NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN(AbortSignalMainThread)
+ AbortSignalImpl::Unlink(static_cast<AbortSignalImpl*>(tmp));
+NS_IMPL_CYCLE_COLLECTION_UNLINK_END
+
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN(AbortSignalMainThread)
+ AbortSignalImpl::Traverse(static_cast<AbortSignalImpl*>(tmp), cb);
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
+
+NS_IMPL_CYCLE_COLLECTION_TRACE_BEGIN(AbortSignalMainThread)
+ NS_IMPL_CYCLE_COLLECTION_TRACE_JS_MEMBER_CALLBACK(mReason)
+NS_IMPL_CYCLE_COLLECTION_TRACE_END
+
+NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(AbortSignalMainThread)
+ NS_INTERFACE_MAP_ENTRY(nsISupports)
+NS_INTERFACE_MAP_END
+
+NS_IMPL_CYCLE_COLLECTING_ADDREF(AbortSignalMainThread)
+NS_IMPL_CYCLE_COLLECTING_RELEASE(AbortSignalMainThread)
+
+class AbortSignalProxy;
+
+// This runnable propagates changes from the AbortSignalImpl on workers to the
+// AbortSignalImpl on main-thread.
+class AbortSignalProxyRunnable final : public Runnable {
+ RefPtr<AbortSignalProxy> mProxy;
+
+ public:
+ explicit AbortSignalProxyRunnable(AbortSignalProxy* aProxy)
+ : Runnable("dom::AbortSignalProxyRunnable"), mProxy(aProxy) {}
+
+ NS_IMETHOD Run() override;
+};
+
+// This class orchestrates the proxying of AbortSignal operations between the
+// main thread and a worker thread.
+class AbortSignalProxy final : public AbortFollower {
+ // This is created and released on the main-thread.
+ RefPtr<AbortSignalImpl> mSignalImplMainThread;
+
+ // The main-thread event target for runnable dispatching.
+ nsCOMPtr<nsIEventTarget> mMainThreadEventTarget;
+
+ // This value is used only when creating mSignalImplMainThread on the main
+ // thread, to create it in already-aborted state if necessary. It does *not*
+ // reflect the instantaneous is-aborted status of the worker thread's
+ // AbortSignal.
+ const bool mAborted;
+
+ public:
+ NS_DECL_THREADSAFE_ISUPPORTS
+
+ AbortSignalProxy(AbortSignalImpl* aSignalImpl,
+ nsIEventTarget* aMainThreadEventTarget)
+ : mMainThreadEventTarget(aMainThreadEventTarget),
+ mAborted(aSignalImpl->Aborted()) {
+ MOZ_ASSERT(!NS_IsMainThread());
+ MOZ_ASSERT(mMainThreadEventTarget);
+ Follow(aSignalImpl);
+ }
+
+ // AbortFollower
+ void RunAbortAlgorithm() override;
+
+ AbortSignalImpl* GetOrCreateSignalImplForMainThread() {
+ MOZ_ASSERT(NS_IsMainThread());
+ if (!mSignalImplMainThread) {
+ mSignalImplMainThread = new AbortSignalMainThread(mAborted);
+ }
+ return mSignalImplMainThread;
+ }
+
+ AbortSignalImpl* GetSignalImplForTargetThread() {
+ MOZ_ASSERT(!NS_IsMainThread());
+ return Signal();
+ }
+
+ nsIEventTarget* MainThreadEventTarget() { return mMainThreadEventTarget; }
+
+ void Shutdown() {
+ MOZ_ASSERT(!NS_IsMainThread());
+ Unfollow();
+ }
+
+ private:
+ ~AbortSignalProxy() {
+ NS_ProxyRelease("AbortSignalProxy::mSignalImplMainThread",
+ mMainThreadEventTarget, mSignalImplMainThread.forget());
+ }
+};
+
+NS_IMPL_ISUPPORTS0(AbortSignalProxy)
+
+NS_IMETHODIMP AbortSignalProxyRunnable::Run() {
+ MOZ_ASSERT(NS_IsMainThread());
+ AbortSignalImpl* signalImpl = mProxy->GetOrCreateSignalImplForMainThread();
+ signalImpl->SignalAbort(JS::UndefinedHandleValue);
+ return NS_OK;
+}
+
+void AbortSignalProxy::RunAbortAlgorithm() {
+ MOZ_ASSERT(!NS_IsMainThread());
+ RefPtr<AbortSignalProxyRunnable> runnable =
+ new AbortSignalProxyRunnable(this);
+ MainThreadEventTarget()->Dispatch(runnable.forget(), NS_DISPATCH_NORMAL);
+}
+
+class WorkerFetchResolver final : public FetchDriverObserver {
+ // Thread-safe:
+ RefPtr<PromiseWorkerProxy> mPromiseProxy;
+ RefPtr<AbortSignalProxy> mSignalProxy;
+
+ // Touched only on the worker thread.
+ RefPtr<FetchObserver> mFetchObserver;
+ RefPtr<WeakWorkerRef> mWorkerRef;
+ bool mIsShutdown;
+
+ Atomic<bool> mNeedOnDataAvailable;
+
+ public:
+ // Returns null if worker is shutting down.
+ static already_AddRefed<WorkerFetchResolver> Create(
+ WorkerPrivate* aWorkerPrivate, Promise* aPromise,
+ AbortSignalImpl* aSignalImpl, FetchObserver* aObserver) {
+ MOZ_ASSERT(aWorkerPrivate);
+ aWorkerPrivate->AssertIsOnWorkerThread();
+ RefPtr<PromiseWorkerProxy> proxy =
+ PromiseWorkerProxy::Create(aWorkerPrivate, aPromise);
+ if (!proxy) {
+ return nullptr;
+ }
+
+ RefPtr<AbortSignalProxy> signalProxy;
+ if (aSignalImpl) {
+ signalProxy = new AbortSignalProxy(
+ aSignalImpl, aWorkerPrivate->MainThreadEventTarget());
+ }
+
+ RefPtr<WorkerFetchResolver> r =
+ new WorkerFetchResolver(proxy, signalProxy, aObserver);
+
+ RefPtr<WeakWorkerRef> workerRef = WeakWorkerRef::Create(
+ aWorkerPrivate, [r]() { r->Shutdown(r->mWorkerRef->GetPrivate()); });
+ if (NS_WARN_IF(!workerRef)) {
+ return nullptr;
+ }
+
+ r->mWorkerRef = std::move(workerRef);
+
+ return r.forget();
+ }
+
+ AbortSignalImpl* GetAbortSignalForMainThread() {
+ MOZ_ASSERT(NS_IsMainThread());
+
+ if (!mSignalProxy) {
+ return nullptr;
+ }
+
+ return mSignalProxy->GetOrCreateSignalImplForMainThread();
+ }
+
+ AbortSignalImpl* GetAbortSignalForTargetThread() {
+ mPromiseProxy->GetWorkerPrivate()->AssertIsOnWorkerThread();
+
+ if (!mSignalProxy) {
+ return nullptr;
+ }
+
+ return mSignalProxy->GetSignalImplForTargetThread();
+ }
+
+ PromiseWorkerProxy* PromiseProxy() const {
+ MOZ_ASSERT(NS_IsMainThread());
+ return mPromiseProxy;
+ }
+
+ Promise* WorkerPromise(WorkerPrivate* aWorkerPrivate) const {
+ MOZ_ASSERT(aWorkerPrivate);
+ aWorkerPrivate->AssertIsOnWorkerThread();
+ MOZ_ASSERT(!mIsShutdown);
+
+ return mPromiseProxy->WorkerPromise();
+ }
+
+ FetchObserver* GetFetchObserver(WorkerPrivate* aWorkerPrivate) const {
+ MOZ_ASSERT(aWorkerPrivate);
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ return mFetchObserver;
+ }
+
+ void OnResponseAvailableInternal(
+ SafeRefPtr<InternalResponse> aResponse) override;
+
+ void OnResponseEnd(FetchDriverObserver::EndReason aReason,
+ JS::Handle<JS::Value> aReasonDetails) override;
+
+ bool NeedOnDataAvailable() override;
+
+ void OnDataAvailable() override;
+
+ void Shutdown(WorkerPrivate* aWorkerPrivate) {
+ MOZ_ASSERT(aWorkerPrivate);
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ mIsShutdown = true;
+ mPromiseProxy->CleanUp();
+
+ mNeedOnDataAvailable = false;
+ mFetchObserver = nullptr;
+
+ if (mSignalProxy) {
+ mSignalProxy->Shutdown();
+ }
+
+ mWorkerRef = nullptr;
+ }
+
+ bool IsShutdown(WorkerPrivate* aWorkerPrivate) const {
+ MOZ_ASSERT(aWorkerPrivate);
+ aWorkerPrivate->AssertIsOnWorkerThread();
+ return mIsShutdown;
+ }
+
+ private:
+ WorkerFetchResolver(PromiseWorkerProxy* aProxy,
+ AbortSignalProxy* aSignalProxy, FetchObserver* aObserver)
+ : mPromiseProxy(aProxy),
+ mSignalProxy(aSignalProxy),
+ mFetchObserver(aObserver),
+ mIsShutdown(false),
+ mNeedOnDataAvailable(!!aObserver) {
+ MOZ_ASSERT(!NS_IsMainThread());
+ MOZ_ASSERT(mPromiseProxy);
+ }
+
+ ~WorkerFetchResolver() = default;
+
+ virtual void FlushConsoleReport() override;
+};
+
+void FetchDriverObserver::OnResponseAvailable(
+ SafeRefPtr<InternalResponse> aResponse) {
+ MOZ_ASSERT(!mGotResponseAvailable);
+ mGotResponseAvailable = true;
+ OnResponseAvailableInternal(std::move(aResponse));
+}
+
+class MainThreadFetchResolver final : public FetchDriverObserver {
+ RefPtr<Promise> mPromise;
+ RefPtr<Response> mResponse;
+ RefPtr<FetchObserver> mFetchObserver;
+ RefPtr<AbortSignalImpl> mSignalImpl;
+ const bool mMozErrors;
+
+ nsCOMPtr<nsILoadGroup> mLoadGroup;
+
+ NS_DECL_OWNINGTHREAD
+ public:
+ MainThreadFetchResolver(Promise* aPromise, FetchObserver* aObserver,
+ AbortSignalImpl* aSignalImpl, bool aMozErrors)
+ : mPromise(aPromise),
+ mFetchObserver(aObserver),
+ mSignalImpl(aSignalImpl),
+ mMozErrors(aMozErrors) {}
+
+ void OnResponseAvailableInternal(
+ SafeRefPtr<InternalResponse> aResponse) override;
+
+ void SetLoadGroup(nsILoadGroup* aLoadGroup) { mLoadGroup = aLoadGroup; }
+
+ void OnResponseEnd(FetchDriverObserver::EndReason aReason,
+ JS::Handle<JS::Value> aReasonDetails) override {
+ if (aReason == eAborted) {
+ if (!aReasonDetails.isUndefined()) {
+ mPromise->MaybeReject(aReasonDetails);
+ } else {
+ mPromise->MaybeReject(NS_ERROR_DOM_ABORT_ERR);
+ }
+ }
+
+ mFetchObserver = nullptr;
+
+ FlushConsoleReport();
+ }
+
+ bool NeedOnDataAvailable() override;
+
+ void OnDataAvailable() override;
+
+ private:
+ ~MainThreadFetchResolver();
+
+ void FlushConsoleReport() override {
+ mReporter->FlushConsoleReports(mLoadGroup);
+ }
+};
+
+class MainThreadFetchRunnable : public Runnable {
+ RefPtr<WorkerFetchResolver> mResolver;
+ const ClientInfo mClientInfo;
+ const Maybe<ServiceWorkerDescriptor> mController;
+ nsCOMPtr<nsICSPEventListener> mCSPEventListener;
+ SafeRefPtr<InternalRequest> mRequest;
+ UniquePtr<SerializedStackHolder> mOriginStack;
+
+ public:
+ MainThreadFetchRunnable(WorkerFetchResolver* aResolver,
+ const ClientInfo& aClientInfo,
+ const Maybe<ServiceWorkerDescriptor>& aController,
+ nsICSPEventListener* aCSPEventListener,
+ SafeRefPtr<InternalRequest> aRequest,
+ UniquePtr<SerializedStackHolder>&& aOriginStack)
+ : Runnable("dom::MainThreadFetchRunnable"),
+ mResolver(aResolver),
+ mClientInfo(aClientInfo),
+ mController(aController),
+ mCSPEventListener(aCSPEventListener),
+ mRequest(std::move(aRequest)),
+ mOriginStack(std::move(aOriginStack)) {
+ MOZ_ASSERT(mResolver);
+ }
+
+ NS_IMETHOD
+ Run() override {
+ AssertIsOnMainThread();
+ RefPtr<FetchDriver> fetch;
+ RefPtr<PromiseWorkerProxy> proxy = mResolver->PromiseProxy();
+
+ {
+ // Acquire the proxy mutex while getting data from the WorkerPrivate...
+ MutexAutoLock lock(proxy->Lock());
+ if (proxy->CleanedUp()) {
+ NS_WARNING("Aborting Fetch because worker already shut down");
+ return NS_OK;
+ }
+
+ WorkerPrivate* workerPrivate = proxy->GetWorkerPrivate();
+ MOZ_ASSERT(workerPrivate);
+ nsCOMPtr<nsIPrincipal> principal = workerPrivate->GetPrincipal();
+ MOZ_ASSERT(principal);
+ nsCOMPtr<nsILoadGroup> loadGroup = workerPrivate->GetLoadGroup();
+ MOZ_ASSERT(loadGroup);
+ // We don't track if a worker is spawned from a tracking script for now,
+ // so pass false as the last argument to FetchDriver().
+ fetch = new FetchDriver(mRequest.clonePtr(), principal, loadGroup,
+ workerPrivate->MainThreadEventTarget(),
+ workerPrivate->CookieJarSettings(),
+ workerPrivate->GetPerformanceStorage(), false);
+ nsAutoCString spec;
+ if (proxy->GetWorkerPrivate()->GetBaseURI()) {
+ proxy->GetWorkerPrivate()->GetBaseURI()->GetAsciiSpec(spec);
+ }
+ fetch->SetWorkerScript(spec);
+
+ fetch->SetClientInfo(mClientInfo);
+ fetch->SetController(mController);
+ fetch->SetCSPEventListener(mCSPEventListener);
+ }
+
+ fetch->SetOriginStack(std::move(mOriginStack));
+
+ RefPtr<AbortSignalImpl> signalImpl =
+ mResolver->GetAbortSignalForMainThread();
+
+ // ...but release it before calling Fetch, because mResolver's callback can
+ // be called synchronously and they want the mutex, too.
+ return fetch->Fetch(signalImpl, mResolver);
+ }
+};
+
+already_AddRefed<Promise> FetchRequest(nsIGlobalObject* aGlobal,
+ const RequestOrUSVString& aInput,
+ const RequestInit& aInit,
+ CallerType aCallerType,
+ ErrorResult& aRv) {
+ RefPtr<Promise> p = Promise::Create(aGlobal, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+
+ MOZ_ASSERT(aGlobal);
+
+ // Double check that we have chrome privileges if the Request's content
+ // policy type has been overridden.
+ MOZ_ASSERT_IF(aInput.IsRequest() &&
+ aInput.GetAsRequest().IsContentPolicyTypeOverridden(),
+ aCallerType == CallerType::System);
+
+ AutoJSAPI jsapi;
+ if (!jsapi.Init(aGlobal)) {
+ aRv.Throw(NS_ERROR_NOT_AVAILABLE);
+ return nullptr;
+ }
+
+ JSContext* cx = jsapi.cx();
+ JS::Rooted<JSObject*> jsGlobal(cx, aGlobal->GetGlobalJSObject());
+ GlobalObject global(cx, jsGlobal);
+
+ SafeRefPtr<Request> request =
+ Request::Constructor(global, aInput, aInit, aRv);
+ if (aRv.Failed()) {
+ return nullptr;
+ }
+
+ SafeRefPtr<InternalRequest> r = request->GetInternalRequest();
+
+ // Restore information of InterceptedHttpChannel if they are passed with the
+ // Request. Since Request::Constructor would not copy these members.
+ if (aInput.IsRequest()) {
+ RefPtr<Request> inputReq = &aInput.GetAsRequest();
+ SafeRefPtr<InternalRequest> inputInReq = inputReq->GetInternalRequest();
+ if (inputInReq->GetInterceptionTriggeringPrincipalInfo()) {
+ r->SetInterceptionContentPolicyType(
+ inputInReq->InterceptionContentPolicyType());
+ r->SetInterceptionTriggeringPrincipalInfo(
+ MakeUnique<mozilla::ipc::PrincipalInfo>(
+ *(inputInReq->GetInterceptionTriggeringPrincipalInfo().get())));
+ if (!inputInReq->InterceptionRedirectChain().IsEmpty()) {
+ r->SetInterceptionRedirectChain(
+ inputInReq->InterceptionRedirectChain());
+ }
+ r->SetInterceptionFromThirdParty(
+ inputInReq->InterceptionFromThirdParty());
+ }
+ }
+
+ RefPtr<AbortSignalImpl> signalImpl = request->GetSignalImpl();
+
+ if (signalImpl && signalImpl->Aborted()) {
+ // Already aborted signal rejects immediately.
+ JS::Rooted<JS::Value> reason(cx, signalImpl->RawReason());
+ if (reason.get().isUndefined()) {
+ aRv.Throw(NS_ERROR_DOM_ABORT_ERR);
+ return nullptr;
+ }
+
+ p->MaybeReject(reason);
+ return p.forget();
+ }
+
+ JS::Realm* realm = JS::GetCurrentRealmOrNull(cx);
+ if (realm && JS::GetDebuggerObservesWasm(realm)) {
+ r->SetSkipWasmCaching();
+ }
+
+ RefPtr<FetchObserver> observer;
+ if (aInit.mObserve.WasPassed()) {
+ observer = new FetchObserver(aGlobal, signalImpl);
+ aInit.mObserve.Value().HandleEvent(*observer);
+ }
+
+ if (NS_IsMainThread()) {
+ nsCOMPtr<nsPIDOMWindowInner> window = do_QueryInterface(aGlobal);
+ nsCOMPtr<Document> doc;
+ nsCOMPtr<nsILoadGroup> loadGroup;
+ nsCOMPtr<nsICookieJarSettings> cookieJarSettings;
+ nsIPrincipal* principal;
+ bool isTrackingFetch = false;
+ if (window) {
+ doc = window->GetExtantDoc();
+ if (!doc) {
+ aRv.Throw(NS_ERROR_FAILURE);
+ return nullptr;
+ }
+ principal = doc->NodePrincipal();
+ loadGroup = doc->GetDocumentLoadGroup();
+ cookieJarSettings = doc->CookieJarSettings();
+
+ isTrackingFetch = doc->IsScriptTracking(cx);
+ } else {
+ principal = aGlobal->PrincipalOrNull();
+ if (NS_WARN_IF(!principal)) {
+ aRv.Throw(NS_ERROR_FAILURE);
+ return nullptr;
+ }
+
+ cookieJarSettings = mozilla::net::CookieJarSettings::Create(principal);
+ }
+
+ if (!loadGroup) {
+ nsresult rv = NS_NewLoadGroup(getter_AddRefs(loadGroup), principal);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ aRv.Throw(rv);
+ return nullptr;
+ }
+ }
+
+ RefPtr<MainThreadFetchResolver> resolver = new MainThreadFetchResolver(
+ p, observer, signalImpl, request->MozErrors());
+ RefPtr<FetchDriver> fetch =
+ new FetchDriver(std::move(r), principal, loadGroup,
+ aGlobal->EventTargetFor(TaskCategory::Other),
+ cookieJarSettings, nullptr, // PerformanceStorage
+ isTrackingFetch);
+ fetch->SetDocument(doc);
+ resolver->SetLoadGroup(loadGroup);
+ aRv = fetch->Fetch(signalImpl, resolver);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+ } else {
+ WorkerPrivate* worker = GetCurrentThreadWorkerPrivate();
+ MOZ_ASSERT(worker);
+
+ if (worker->IsServiceWorker()) {
+ r->SetSkipServiceWorker();
+ }
+
+ // PFetch gives no benefit for the fetch in the parent process.
+ // Dispatch fetch to the parent process main thread directly for that case.
+ // For child process, dispatch fetch op to the parent.
+ if (StaticPrefs::dom_workers_pFetch_enabled() && !XRE_IsParentProcess()) {
+ RefPtr<FetchChild> actor =
+ FetchChild::Create(worker, p, signalImpl, observer);
+ if (!actor) {
+ NS_WARNING("Could not keep the worker alive.");
+ aRv.Throw(NS_ERROR_DOM_ABORT_ERR);
+ return nullptr;
+ }
+
+ Maybe<ClientInfo> clientInfo(worker->GlobalScope()->GetClientInfo());
+ if (clientInfo.isNothing()) {
+ aRv.Throw(NS_ERROR_DOM_INVALID_STATE_ERR);
+ return nullptr;
+ }
+
+ auto* backgroundChild =
+ mozilla::ipc::BackgroundChild::GetOrCreateForCurrentThread();
+ Unused << NS_WARN_IF(!backgroundChild->SendPFetchConstructor(actor));
+
+ FetchOpArgs ipcArgs;
+
+ ipcArgs.request() = IPCInternalRequest();
+ r->ToIPCInternalRequest(&(ipcArgs.request()), backgroundChild);
+
+ ipcArgs.principalInfo() = worker->GetPrincipalInfo();
+ ipcArgs.clientInfo() = clientInfo.ref().ToIPC();
+ if (worker->GetBaseURI()) {
+ worker->GetBaseURI()->GetAsciiSpec(ipcArgs.workerScript());
+ }
+ if (worker->GlobalScope()->GetController().isSome()) {
+ ipcArgs.controller() =
+ Some(worker->GlobalScope()->GetController().ref().ToIPC());
+ }
+ if (worker->CookieJarSettings()) {
+ ipcArgs.cookieJarSettings() = Some(worker->CookieJarSettingsArgs());
+ }
+ if (worker->CSPEventListener()) {
+ ipcArgs.hasCSPEventListener() = true;
+ actor->SetCSPEventListener(worker->CSPEventListener());
+ } else {
+ ipcArgs.hasCSPEventListener() = false;
+ }
+
+ ipcArgs.associatedBrowsingContextID() =
+ worker->AssociatedBrowsingContextID();
+
+ if (worker->IsWatchedByDevTools()) {
+ UniquePtr<SerializedStackHolder> stack;
+ stack = GetCurrentStackForNetMonitor(cx);
+ actor->SetOriginStack(std::move(stack));
+ }
+
+ actor->DoFetchOp(ipcArgs);
+
+ return p.forget();
+ }
+
+ RefPtr<WorkerFetchResolver> resolver =
+ WorkerFetchResolver::Create(worker, p, signalImpl, observer);
+ if (!resolver) {
+ NS_WARNING("Could not keep the worker alive.");
+ aRv.Throw(NS_ERROR_DOM_ABORT_ERR);
+ return nullptr;
+ }
+
+ Maybe<ClientInfo> clientInfo(worker->GlobalScope()->GetClientInfo());
+ if (clientInfo.isNothing()) {
+ aRv.Throw(NS_ERROR_DOM_INVALID_STATE_ERR);
+ return nullptr;
+ }
+
+ UniquePtr<SerializedStackHolder> stack;
+ if (worker->IsWatchedByDevTools()) {
+ stack = GetCurrentStackForNetMonitor(cx);
+ }
+
+ RefPtr<MainThreadFetchRunnable> run = new MainThreadFetchRunnable(
+ resolver, clientInfo.ref(), worker->GlobalScope()->GetController(),
+ worker->CSPEventListener(), std::move(r), std::move(stack));
+ worker->DispatchToMainThread(run.forget());
+ }
+
+ return p.forget();
+}
+
+class ResolveFetchPromise : public Runnable {
+ public:
+ ResolveFetchPromise(Promise* aPromise, Response* aResponse)
+ : Runnable("ResolveFetchPromise"),
+ mPromise(aPromise),
+ mResponse(aResponse) {}
+
+ NS_IMETHOD Run() override {
+ mPromise->MaybeResolve(mResponse);
+ return NS_OK;
+ }
+ RefPtr<Promise> mPromise;
+ RefPtr<Response> mResponse;
+};
+
+void MainThreadFetchResolver::OnResponseAvailableInternal(
+ SafeRefPtr<InternalResponse> aResponse) {
+ NS_ASSERT_OWNINGTHREAD(MainThreadFetchResolver);
+ AssertIsOnMainThread();
+
+ if (aResponse->Type() != ResponseType::Error) {
+ nsCOMPtr<nsIGlobalObject> go = mPromise->GetParentObject();
+ nsCOMPtr<nsPIDOMWindowInner> inner = do_QueryInterface(go);
+
+ // Notify the document when a fetch completes successfully. This is
+ // used by the password manager as a hint to observe DOM mutations.
+ // Call this prior to setting state to Complete so we can set up the
+ // observer before mutations occurs.
+ Document* doc = inner ? inner->GetExtantDoc() : nullptr;
+ if (doc) {
+ doc->NotifyFetchOrXHRSuccess();
+ }
+
+ if (mFetchObserver) {
+ mFetchObserver->SetState(FetchState::Complete);
+ }
+
+ mResponse = new Response(go, std::move(aResponse), mSignalImpl);
+ // response headers received from the network should be immutable
+ // all response header settings must be done before this point
+ // see Bug 1574174
+ ErrorResult result;
+ mResponse->Headers_()->SetGuard(HeadersGuardEnum::Immutable, result);
+ MOZ_ASSERT(!result.Failed());
+
+ BrowsingContext* bc = inner ? inner->GetBrowsingContext() : nullptr;
+ bc = bc ? bc->Top() : nullptr;
+ if (bc && bc->IsLoading()) {
+ bc->AddDeprioritizedLoadRunner(
+ new ResolveFetchPromise(mPromise, mResponse));
+ } else {
+ mPromise->MaybeResolve(mResponse);
+ }
+ } else {
+ if (mFetchObserver) {
+ mFetchObserver->SetState(FetchState::Errored);
+ }
+
+ if (mMozErrors) {
+ mPromise->MaybeReject(aResponse->GetErrorCode());
+ return;
+ }
+
+ mPromise->MaybeRejectWithTypeError<MSG_FETCH_FAILED>();
+ }
+}
+
+bool MainThreadFetchResolver::NeedOnDataAvailable() {
+ NS_ASSERT_OWNINGTHREAD(MainThreadFetchResolver);
+ return !!mFetchObserver;
+}
+
+void MainThreadFetchResolver::OnDataAvailable() {
+ NS_ASSERT_OWNINGTHREAD(MainThreadFetchResolver);
+ AssertIsOnMainThread();
+
+ if (!mFetchObserver) {
+ return;
+ }
+
+ if (mFetchObserver->State() == FetchState::Requesting) {
+ mFetchObserver->SetState(FetchState::Responding);
+ }
+}
+
+MainThreadFetchResolver::~MainThreadFetchResolver() {
+ NS_ASSERT_OWNINGTHREAD(MainThreadFetchResolver);
+}
+
+class WorkerFetchResponseRunnable final : public MainThreadWorkerRunnable {
+ RefPtr<WorkerFetchResolver> mResolver;
+ // Passed from main thread to worker thread after being initialized.
+ SafeRefPtr<InternalResponse> mInternalResponse;
+
+ public:
+ WorkerFetchResponseRunnable(WorkerPrivate* aWorkerPrivate,
+ WorkerFetchResolver* aResolver,
+ SafeRefPtr<InternalResponse> aResponse)
+ : MainThreadWorkerRunnable(aWorkerPrivate),
+ mResolver(aResolver),
+ mInternalResponse(std::move(aResponse)) {
+ MOZ_ASSERT(mResolver);
+ }
+
+ bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override {
+ MOZ_ASSERT(aWorkerPrivate);
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ RefPtr<Promise> promise = mResolver->WorkerPromise(aWorkerPrivate);
+ RefPtr<FetchObserver> fetchObserver =
+ mResolver->GetFetchObserver(aWorkerPrivate);
+
+ if (mInternalResponse->Type() != ResponseType::Error) {
+ if (fetchObserver) {
+ fetchObserver->SetState(FetchState::Complete);
+ }
+
+ RefPtr<nsIGlobalObject> global = aWorkerPrivate->GlobalScope();
+ RefPtr<Response> response =
+ new Response(global, mInternalResponse.clonePtr(),
+ mResolver->GetAbortSignalForTargetThread());
+
+ // response headers received from the network should be immutable,
+ // all response header settings must be done before this point
+ // see Bug 1574174
+ ErrorResult result;
+ response->Headers_()->SetGuard(HeadersGuardEnum::Immutable, result);
+ MOZ_ASSERT(!result.Failed());
+
+ promise->MaybeResolve(response);
+ } else {
+ if (fetchObserver) {
+ fetchObserver->SetState(FetchState::Errored);
+ }
+
+ promise->MaybeRejectWithTypeError<MSG_FETCH_FAILED>();
+ }
+ return true;
+ }
+};
+
+class WorkerDataAvailableRunnable final : public MainThreadWorkerRunnable {
+ RefPtr<WorkerFetchResolver> mResolver;
+
+ public:
+ WorkerDataAvailableRunnable(WorkerPrivate* aWorkerPrivate,
+ WorkerFetchResolver* aResolver)
+ : MainThreadWorkerRunnable(aWorkerPrivate), mResolver(aResolver) {}
+
+ bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override {
+ MOZ_ASSERT(aWorkerPrivate);
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ RefPtr<FetchObserver> fetchObserver =
+ mResolver->GetFetchObserver(aWorkerPrivate);
+
+ if (fetchObserver && fetchObserver->State() == FetchState::Requesting) {
+ fetchObserver->SetState(FetchState::Responding);
+ }
+
+ return true;
+ }
+};
+
+class WorkerFetchResponseEndBase {
+ protected:
+ RefPtr<WorkerFetchResolver> mResolver;
+
+ public:
+ explicit WorkerFetchResponseEndBase(WorkerFetchResolver* aResolver)
+ : mResolver(aResolver) {
+ MOZ_ASSERT(aResolver);
+ }
+
+ void WorkerRunInternal(WorkerPrivate* aWorkerPrivate) {
+ mResolver->Shutdown(aWorkerPrivate);
+ }
+};
+
+class WorkerFetchResponseEndRunnable final : public MainThreadWorkerRunnable,
+ public WorkerFetchResponseEndBase {
+ FetchDriverObserver::EndReason mReason;
+
+ public:
+ WorkerFetchResponseEndRunnable(WorkerPrivate* aWorkerPrivate,
+ WorkerFetchResolver* aResolver,
+ FetchDriverObserver::EndReason aReason)
+ : MainThreadWorkerRunnable(aWorkerPrivate),
+ WorkerFetchResponseEndBase(aResolver),
+ mReason(aReason) {}
+
+ bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override {
+ if (mResolver->IsShutdown(aWorkerPrivate)) {
+ return true;
+ }
+
+ if (mReason == FetchDriverObserver::eAborted) {
+ mResolver->WorkerPromise(aWorkerPrivate)
+ ->MaybeReject(NS_ERROR_DOM_ABORT_ERR);
+ }
+
+ WorkerRunInternal(aWorkerPrivate);
+ return true;
+ }
+
+ nsresult Cancel() override {
+ // We need to check first if cancel is called twice
+ nsresult rv = WorkerRunnable::Cancel();
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ // Execute Run anyway to make sure we cleanup our promise proxy to avoid
+ // leaking the worker thread
+ Run();
+ return NS_OK;
+ }
+};
+
+class WorkerFetchResponseEndControlRunnable final
+ : public MainThreadWorkerControlRunnable,
+ public WorkerFetchResponseEndBase {
+ public:
+ WorkerFetchResponseEndControlRunnable(WorkerPrivate* aWorkerPrivate,
+ WorkerFetchResolver* aResolver)
+ : MainThreadWorkerControlRunnable(aWorkerPrivate),
+ WorkerFetchResponseEndBase(aResolver) {}
+
+ bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override {
+ WorkerRunInternal(aWorkerPrivate);
+ return true;
+ }
+
+ // Control runnable cancel already calls Run().
+};
+
+void WorkerFetchResolver::OnResponseAvailableInternal(
+ SafeRefPtr<InternalResponse> aResponse) {
+ AssertIsOnMainThread();
+
+ MutexAutoLock lock(mPromiseProxy->Lock());
+ if (mPromiseProxy->CleanedUp()) {
+ return;
+ }
+
+ RefPtr<WorkerFetchResponseRunnable> r = new WorkerFetchResponseRunnable(
+ mPromiseProxy->GetWorkerPrivate(), this, std::move(aResponse));
+
+ if (!r->Dispatch()) {
+ NS_WARNING("Could not dispatch fetch response");
+ }
+}
+
+bool WorkerFetchResolver::NeedOnDataAvailable() {
+ AssertIsOnMainThread();
+ return mNeedOnDataAvailable;
+}
+
+void WorkerFetchResolver::OnDataAvailable() {
+ AssertIsOnMainThread();
+
+ MutexAutoLock lock(mPromiseProxy->Lock());
+ if (mPromiseProxy->CleanedUp()) {
+ return;
+ }
+
+ RefPtr<WorkerDataAvailableRunnable> r =
+ new WorkerDataAvailableRunnable(mPromiseProxy->GetWorkerPrivate(), this);
+ Unused << r->Dispatch();
+}
+
+void WorkerFetchResolver::OnResponseEnd(FetchDriverObserver::EndReason aReason,
+ JS::Handle<JS::Value> aReasonDetails) {
+ AssertIsOnMainThread();
+ MutexAutoLock lock(mPromiseProxy->Lock());
+ if (mPromiseProxy->CleanedUp()) {
+ return;
+ }
+
+ FlushConsoleReport();
+
+ Unused << aReasonDetails;
+
+ RefPtr<WorkerFetchResponseEndRunnable> r = new WorkerFetchResponseEndRunnable(
+ mPromiseProxy->GetWorkerPrivate(), this, aReason);
+
+ if (!r->Dispatch()) {
+ RefPtr<WorkerFetchResponseEndControlRunnable> cr =
+ new WorkerFetchResponseEndControlRunnable(
+ mPromiseProxy->GetWorkerPrivate(), this);
+ // This can fail if the worker thread is canceled or killed causing
+ // the PromiseWorkerProxy to give up its WorkerRef immediately,
+ // allowing the worker thread to become Dead.
+ if (!cr->Dispatch()) {
+ NS_WARNING("Failed to dispatch WorkerFetchResponseEndControlRunnable");
+ }
+ }
+}
+
+void WorkerFetchResolver::FlushConsoleReport() {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(mPromiseProxy);
+
+ if (!mReporter) {
+ return;
+ }
+
+ WorkerPrivate* worker = mPromiseProxy->GetWorkerPrivate();
+ if (!worker) {
+ mReporter->FlushReportsToConsole(0);
+ return;
+ }
+
+ if (worker->IsServiceWorker()) {
+ // Flush to service worker
+ mReporter->FlushReportsToConsoleForServiceWorkerScope(
+ worker->ServiceWorkerScope());
+ return;
+ }
+
+ if (worker->IsSharedWorker()) {
+ // Flush to shared worker
+ worker->GetRemoteWorkerController()->FlushReportsOnMainThread(mReporter);
+ return;
+ }
+
+ // Flush to dedicated worker
+ mReporter->FlushConsoleReports(worker->GetLoadGroup());
+}
+
+nsresult ExtractByteStreamFromBody(const fetch::OwningBodyInit& aBodyInit,
+ nsIInputStream** aStream,
+ nsCString& aContentTypeWithCharset,
+ uint64_t& aContentLength) {
+ MOZ_ASSERT(aStream);
+ nsAutoCString charset;
+ aContentTypeWithCharset.SetIsVoid(true);
+
+ if (aBodyInit.IsArrayBuffer()) {
+ BodyExtractor<const ArrayBuffer> body(&aBodyInit.GetAsArrayBuffer());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsArrayBufferView()) {
+ BodyExtractor<const ArrayBufferView> body(
+ &aBodyInit.GetAsArrayBufferView());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsBlob()) {
+ Blob& blob = aBodyInit.GetAsBlob();
+ BodyExtractor<const Blob> body(&blob);
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsFormData()) {
+ FormData& formData = aBodyInit.GetAsFormData();
+ BodyExtractor<const FormData> body(&formData);
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsUSVString()) {
+ BodyExtractor<const nsAString> body(&aBodyInit.GetAsUSVString());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsURLSearchParams()) {
+ URLSearchParams& usp = aBodyInit.GetAsURLSearchParams();
+ BodyExtractor<const URLSearchParams> body(&usp);
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ MOZ_ASSERT_UNREACHABLE("Should never reach here");
+ return NS_ERROR_FAILURE;
+}
+
+nsresult ExtractByteStreamFromBody(const fetch::BodyInit& aBodyInit,
+ nsIInputStream** aStream,
+ nsCString& aContentTypeWithCharset,
+ uint64_t& aContentLength) {
+ MOZ_ASSERT(aStream);
+ MOZ_ASSERT(!*aStream);
+
+ nsAutoCString charset;
+ aContentTypeWithCharset.SetIsVoid(true);
+
+ if (aBodyInit.IsArrayBuffer()) {
+ BodyExtractor<const ArrayBuffer> body(&aBodyInit.GetAsArrayBuffer());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsArrayBufferView()) {
+ BodyExtractor<const ArrayBufferView> body(
+ &aBodyInit.GetAsArrayBufferView());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsBlob()) {
+ BodyExtractor<const Blob> body(&aBodyInit.GetAsBlob());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsFormData()) {
+ BodyExtractor<const FormData> body(&aBodyInit.GetAsFormData());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsUSVString()) {
+ BodyExtractor<const nsAString> body(&aBodyInit.GetAsUSVString());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsURLSearchParams()) {
+ BodyExtractor<const URLSearchParams> body(
+ &aBodyInit.GetAsURLSearchParams());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ MOZ_ASSERT_UNREACHABLE("Should never reach here");
+ return NS_ERROR_FAILURE;
+}
+
+nsresult ExtractByteStreamFromBody(const fetch::ResponseBodyInit& aBodyInit,
+ nsIInputStream** aStream,
+ nsCString& aContentTypeWithCharset,
+ uint64_t& aContentLength) {
+ MOZ_ASSERT(aStream);
+ MOZ_ASSERT(!*aStream);
+
+ // ReadableStreams should be handled by
+ // BodyExtractorReadableStream::GetAsStream.
+ MOZ_ASSERT(!aBodyInit.IsReadableStream());
+
+ nsAutoCString charset;
+ aContentTypeWithCharset.SetIsVoid(true);
+
+ if (aBodyInit.IsArrayBuffer()) {
+ BodyExtractor<const ArrayBuffer> body(&aBodyInit.GetAsArrayBuffer());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsArrayBufferView()) {
+ BodyExtractor<const ArrayBufferView> body(
+ &aBodyInit.GetAsArrayBufferView());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsBlob()) {
+ BodyExtractor<const Blob> body(&aBodyInit.GetAsBlob());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsFormData()) {
+ BodyExtractor<const FormData> body(&aBodyInit.GetAsFormData());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsUSVString()) {
+ BodyExtractor<const nsAString> body(&aBodyInit.GetAsUSVString());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ if (aBodyInit.IsURLSearchParams()) {
+ BodyExtractor<const URLSearchParams> body(
+ &aBodyInit.GetAsURLSearchParams());
+ return body.GetAsStream(aStream, &aContentLength, aContentTypeWithCharset,
+ charset);
+ }
+
+ MOZ_ASSERT_UNREACHABLE("Should never reach here");
+ return NS_ERROR_FAILURE;
+}
+
+NS_IMPL_CYCLE_COLLECTION(FetchBodyBase, mReadableStreamBody)
+
+NS_IMPL_CYCLE_COLLECTING_ADDREF(FetchBodyBase)
+NS_IMPL_CYCLE_COLLECTING_RELEASE(FetchBodyBase)
+
+NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(FetchBodyBase)
+ NS_INTERFACE_MAP_ENTRY(nsISupports)
+NS_INTERFACE_MAP_END
+
+template <class Derived>
+FetchBody<Derived>::FetchBody(nsIGlobalObject* aOwner)
+ : mOwner(aOwner), mBodyUsed(false) {
+ MOZ_ASSERT(aOwner);
+
+ if (!NS_IsMainThread()) {
+ WorkerPrivate* wp = GetCurrentThreadWorkerPrivate();
+ MOZ_ASSERT(wp);
+ mMainThreadEventTarget = wp->MainThreadEventTarget();
+ } else {
+ mMainThreadEventTarget = aOwner->EventTargetFor(TaskCategory::Other);
+ }
+
+ MOZ_ASSERT(mMainThreadEventTarget);
+}
+
+template FetchBody<Request>::FetchBody(nsIGlobalObject* aOwner);
+
+template FetchBody<Response>::FetchBody(nsIGlobalObject* aOwner);
+
+template <class Derived>
+FetchBody<Derived>::~FetchBody() {
+ Unfollow();
+}
+
+template FetchBody<Request>::~FetchBody();
+
+template FetchBody<Response>::~FetchBody();
+
+template <class Derived>
+bool FetchBody<Derived>::BodyUsed() const {
+ if (mBodyUsed) {
+ return true;
+ }
+
+ // If this stream is disturbed, return true.
+ if (mReadableStreamBody) {
+ return mReadableStreamBody->Disturbed();
+ }
+
+ return false;
+}
+
+template bool FetchBody<Request>::BodyUsed() const;
+
+template bool FetchBody<Response>::BodyUsed() const;
+
+template <class Derived>
+void FetchBody<Derived>::SetBodyUsed(JSContext* aCx, ErrorResult& aRv) {
+ MOZ_ASSERT(aCx);
+ MOZ_ASSERT(mOwner->EventTargetFor(TaskCategory::Other)->IsOnCurrentThread());
+
+ MOZ_DIAGNOSTIC_ASSERT(!BodyUsed(), "Consuming already used body?");
+ if (BodyUsed()) {
+ return;
+ }
+
+ mBodyUsed = true;
+
+ // If we already have a ReadableStreamBody and it has been created by DOM, we
+ // have to lock it now because it can have been shared with other objects.
+ if (mReadableStreamBody) {
+ if (mReadableStreamBody->MaybeGetInputStreamIfUnread()) {
+ LockStream(aCx, mReadableStreamBody, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return;
+ }
+ } else {
+ MOZ_ASSERT(mFetchStreamReader);
+ // Let's activate the FetchStreamReader.
+ mFetchStreamReader->StartConsuming(aCx, mReadableStreamBody, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return;
+ }
+ }
+ }
+}
+
+template void FetchBody<Request>::SetBodyUsed(JSContext* aCx, ErrorResult& aRv);
+
+template void FetchBody<Response>::SetBodyUsed(JSContext* aCx,
+ ErrorResult& aRv);
+
+template <class Derived>
+already_AddRefed<Promise> FetchBody<Derived>::ConsumeBody(
+ JSContext* aCx, BodyConsumer::ConsumeType aType, ErrorResult& aRv) {
+ aRv.MightThrowJSException();
+
+ RefPtr<AbortSignalImpl> signalImpl =
+ DerivedClass()->GetSignalImplToConsumeBody();
+
+ if (signalImpl && signalImpl->Aborted()) {
+ JS::Rooted<JS::Value> abortReason(aCx, signalImpl->RawReason());
+
+ if (abortReason.get().isUndefined()) {
+ aRv.Throw(NS_ERROR_DOM_ABORT_ERR);
+ return nullptr;
+ }
+
+ nsCOMPtr<nsIGlobalObject> go = DerivedClass()->GetParentObject();
+
+ RefPtr<Promise> promise = Promise::Create(go, aRv);
+ promise->MaybeReject(abortReason);
+ return promise.forget();
+ }
+
+ if (BodyUsed()) {
+ aRv.ThrowTypeError<MSG_FETCH_BODY_CONSUMED_ERROR>();
+ return nullptr;
+ }
+
+ nsAutoCString mimeType;
+ nsAutoCString mixedCaseMimeType;
+ DerivedClass()->GetMimeType(mimeType, mixedCaseMimeType);
+
+ // Null bodies are a special-case in the fetch spec. The Body mix-in can only
+ // be "disturbed" or "locked" if its associated "body" is non-null.
+ // Additionally, the Body min-in's "consume body" algorithm explicitly creates
+ // a fresh empty ReadableStream object in step 2. This means that `bodyUsed`
+ // will never return true for a null body.
+ //
+ // To this end, we create a fresh (empty) body every time a request is made
+ // and consume its body here, without marking this FetchBody consumed via
+ // SetBodyUsed.
+ nsCOMPtr<nsIInputStream> bodyStream;
+ DerivedClass()->GetBody(getter_AddRefs(bodyStream));
+ if (!bodyStream) {
+ RefPtr<EmptyBody> emptyBody =
+ EmptyBody::Create(DerivedClass()->GetParentObject(),
+ DerivedClass()->GetPrincipalInfo().get(), signalImpl,
+ mimeType, mixedCaseMimeType, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+
+ return emptyBody->ConsumeBody(aCx, aType, aRv);
+ }
+
+ SetBodyUsed(aCx, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+
+ nsCOMPtr<nsIGlobalObject> global = DerivedClass()->GetParentObject();
+
+ MutableBlobStorage::MutableBlobStorageType blobStorageType =
+ MutableBlobStorage::eOnlyInMemory;
+ const mozilla::UniquePtr<mozilla::ipc::PrincipalInfo>& principalInfo =
+ DerivedClass()->GetPrincipalInfo();
+ // We support temporary file for blobs only if the principal is known and
+ // it's system or content not in private Browsing.
+ if (principalInfo &&
+ (principalInfo->type() ==
+ mozilla::ipc::PrincipalInfo::TSystemPrincipalInfo ||
+ (principalInfo->type() ==
+ mozilla::ipc::PrincipalInfo::TContentPrincipalInfo &&
+ principalInfo->get_ContentPrincipalInfo().attrs().mPrivateBrowsingId ==
+ 0))) {
+ blobStorageType = MutableBlobStorage::eCouldBeInTemporaryFile;
+ }
+
+ RefPtr<Promise> promise = BodyConsumer::Create(
+ global, mMainThreadEventTarget, bodyStream, signalImpl, aType,
+ BodyBlobURISpec(), BodyLocalPath(), mimeType, mixedCaseMimeType,
+ blobStorageType, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+
+ return promise.forget();
+}
+
+template already_AddRefed<Promise> FetchBody<Request>::ConsumeBody(
+ JSContext* aCx, BodyConsumer::ConsumeType aType, ErrorResult& aRv);
+
+template already_AddRefed<Promise> FetchBody<Response>::ConsumeBody(
+ JSContext* aCx, BodyConsumer::ConsumeType aType, ErrorResult& aRv);
+
+template already_AddRefed<Promise> FetchBody<EmptyBody>::ConsumeBody(
+ JSContext* aCx, BodyConsumer::ConsumeType aType, ErrorResult& aRv);
+
+template <class Derived>
+void FetchBody<Derived>::GetMimeType(nsACString& aMimeType,
+ nsACString& aMixedCaseMimeType) {
+ // Extract mime type.
+ ErrorResult result;
+ nsCString contentTypeValues;
+ MOZ_ASSERT(DerivedClass()->GetInternalHeaders());
+ DerivedClass()->GetInternalHeaders()->Get("Content-Type"_ns,
+ contentTypeValues, result);
+ MOZ_ALWAYS_TRUE(!result.Failed());
+
+ // HTTP ABNF states Content-Type may have only one value.
+ // This is from the "parse a header value" of the fetch spec.
+ if (!contentTypeValues.IsVoid() && contentTypeValues.Find(",") == -1) {
+ // Convert from a bytestring to a UTF8 CString.
+ CopyLatin1toUTF8(contentTypeValues, aMimeType);
+ aMixedCaseMimeType = aMimeType;
+ ToLowerCase(aMimeType);
+ }
+}
+
+template void FetchBody<Request>::GetMimeType(nsACString& aMimeType,
+ nsACString& aMixedCaseMimeType);
+template void FetchBody<Response>::GetMimeType(nsACString& aMimeType,
+ nsACString& aMixedCaseMimeType);
+
+template <class Derived>
+const nsACString& FetchBody<Derived>::BodyBlobURISpec() const {
+ return DerivedClass()->BodyBlobURISpec();
+}
+
+template const nsACString& FetchBody<Request>::BodyBlobURISpec() const;
+
+template const nsACString& FetchBody<Response>::BodyBlobURISpec() const;
+
+template const nsACString& FetchBody<EmptyBody>::BodyBlobURISpec() const;
+
+template <class Derived>
+const nsAString& FetchBody<Derived>::BodyLocalPath() const {
+ return DerivedClass()->BodyLocalPath();
+}
+
+template const nsAString& FetchBody<Request>::BodyLocalPath() const;
+
+template const nsAString& FetchBody<Response>::BodyLocalPath() const;
+
+template const nsAString& FetchBody<EmptyBody>::BodyLocalPath() const;
+
+template <class Derived>
+void FetchBody<Derived>::SetReadableStreamBody(JSContext* aCx,
+ ReadableStream* aBody) {
+ MOZ_ASSERT(!mReadableStreamBody);
+ MOZ_ASSERT(aBody);
+ mReadableStreamBody = aBody;
+
+ RefPtr<AbortSignalImpl> signalImpl = DerivedClass()->GetSignalImpl();
+ if (!signalImpl) {
+ return;
+ }
+
+ bool aborted = signalImpl->Aborted();
+ if (aborted) {
+ IgnoredErrorResult result;
+ JS::Rooted<JS::Value> abortReason(aCx, signalImpl->RawReason());
+ AbortStream(aCx, mReadableStreamBody, result, abortReason);
+ if (NS_WARN_IF(result.Failed())) {
+ return;
+ }
+ } else if (!IsFollowing()) {
+ Follow(signalImpl);
+ }
+}
+
+template void FetchBody<Request>::SetReadableStreamBody(JSContext* aCx,
+ ReadableStream* aBody);
+
+template void FetchBody<Response>::SetReadableStreamBody(JSContext* aCx,
+ ReadableStream* aBody);
+
+template <class Derived>
+already_AddRefed<ReadableStream> FetchBody<Derived>::GetBody(JSContext* aCx,
+ ErrorResult& aRv) {
+ if (mReadableStreamBody) {
+ return do_AddRef(mReadableStreamBody);
+ }
+
+ nsCOMPtr<nsIInputStream> inputStream;
+ DerivedClass()->GetBody(getter_AddRefs(inputStream));
+
+ if (!inputStream) {
+ return nullptr;
+ }
+
+ // The spec immediately creates ReadableStream on Response/Request constructor
+ // via https://fetch.spec.whatwg.org/#concept-bodyinit-extract, but Gecko
+ // creates nsIInputStream there instead and creates ReadableStream only when
+ // .body is accessed. Thus we only follow step 4 of it here.
+ //
+ // Step 4: Otherwise, set stream to a new ReadableStream object, and set up
+ // stream with byte reading support.
+ auto algorithms =
+ MakeRefPtr<NonAsyncInputToReadableStreamAlgorithms>(*inputStream);
+ RefPtr<ReadableStream> body = ReadableStream::CreateByteNative(
+ aCx, DerivedClass()->GetParentObject(), *algorithms, Nothing(), aRv);
+ if (aRv.Failed()) {
+ return nullptr;
+ }
+ mReadableStreamBody = body;
+
+ // If the body has been already consumed, we lock the stream.
+ if (BodyUsed()) {
+ LockStream(aCx, body, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+ }
+
+ RefPtr<AbortSignalImpl> signalImpl = DerivedClass()->GetSignalImpl();
+ if (signalImpl) {
+ if (signalImpl->Aborted()) {
+ JS::Rooted<JS::Value> abortReason(aCx, signalImpl->RawReason());
+ AbortStream(aCx, body, aRv, abortReason);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+ } else if (!IsFollowing()) {
+ Follow(signalImpl);
+ }
+ }
+
+ return body.forget();
+}
+
+template already_AddRefed<ReadableStream> FetchBody<Request>::GetBody(
+ JSContext* aCx, ErrorResult& aRv);
+
+template already_AddRefed<ReadableStream> FetchBody<Response>::GetBody(
+ JSContext* aCx, ErrorResult& aRv);
+
+template <class Derived>
+void FetchBody<Derived>::LockStream(JSContext* aCx, ReadableStream* aStream,
+ ErrorResult& aRv) {
+ // This is native stream, creating a reader will not execute any JS code.
+ RefPtr<ReadableStreamDefaultReader> reader = aStream->GetReader(aRv);
+ if (aRv.Failed()) {
+ return;
+ }
+}
+
+template void FetchBody<Request>::LockStream(JSContext* aCx,
+ ReadableStream* aStream,
+ ErrorResult& aRv);
+
+template void FetchBody<Response>::LockStream(JSContext* aCx,
+ ReadableStream* aStream,
+ ErrorResult& aRv);
+
+template <class Derived>
+void FetchBody<Derived>::MaybeTeeReadableStreamBody(
+ JSContext* aCx, ReadableStream** aBodyOut,
+ FetchStreamReader** aStreamReader, nsIInputStream** aInputStream,
+ ErrorResult& aRv) {
+ MOZ_DIAGNOSTIC_ASSERT(aStreamReader);
+ MOZ_DIAGNOSTIC_ASSERT(aInputStream);
+ MOZ_DIAGNOSTIC_ASSERT(!BodyUsed());
+
+ *aBodyOut = nullptr;
+ *aStreamReader = nullptr;
+ *aInputStream = nullptr;
+
+ if (!mReadableStreamBody) {
+ return;
+ }
+
+ // If this is a ReadableStream with an native source, this has been
+ // generated by a Fetch. In this case, Fetch will be able to recreate it
+ // again when GetBody() is called.
+ if (mReadableStreamBody->MaybeGetInputStreamIfUnread()) {
+ *aBodyOut = nullptr;
+ return;
+ }
+
+ nsTArray<RefPtr<ReadableStream> > branches;
+ MOZ_KnownLive(mReadableStreamBody)->Tee(aCx, branches, aRv);
+ if (aRv.Failed()) {
+ return;
+ }
+
+ mReadableStreamBody = branches[0];
+ branches[1].forget(aBodyOut);
+
+ aRv = FetchStreamReader::Create(aCx, mOwner, aStreamReader, aInputStream);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return;
+ }
+}
+
+template void FetchBody<Request>::MaybeTeeReadableStreamBody(
+ JSContext* aCx, ReadableStream** aBodyOut,
+ FetchStreamReader** aStreamReader, nsIInputStream** aInputStream,
+ ErrorResult& aRv);
+
+template void FetchBody<Response>::MaybeTeeReadableStreamBody(
+ JSContext* aCx, ReadableStream** aBodyOut,
+ FetchStreamReader** aStreamReader, nsIInputStream** aInputStream,
+ ErrorResult& aRv);
+
+template <class Derived>
+void FetchBody<Derived>::RunAbortAlgorithm() {
+ if (!mReadableStreamBody) {
+ return;
+ }
+
+ AutoJSAPI jsapi;
+ if (!jsapi.Init(mOwner)) {
+ return;
+ }
+
+ JSContext* cx = jsapi.cx();
+
+ RefPtr<ReadableStream> body(mReadableStreamBody);
+ IgnoredErrorResult result;
+
+ JS::Rooted<JS::Value> abortReason(cx);
+
+ AbortSignalImpl* signalImpl = Signal();
+ if (signalImpl) {
+ abortReason.set(signalImpl->RawReason());
+ }
+
+ AbortStream(cx, body, result, abortReason);
+}
+
+template void FetchBody<Request>::RunAbortAlgorithm();
+
+template void FetchBody<Response>::RunAbortAlgorithm();
+
+NS_IMPL_ADDREF_INHERITED(EmptyBody, FetchBody<EmptyBody>)
+NS_IMPL_RELEASE_INHERITED(EmptyBody, FetchBody<EmptyBody>)
+
+NS_IMPL_CYCLE_COLLECTION_CLASS(EmptyBody)
+
+NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN_INHERITED(EmptyBody, FetchBody<EmptyBody>)
+ NS_IMPL_CYCLE_COLLECTION_UNLINK(mOwner)
+ NS_IMPL_CYCLE_COLLECTION_UNLINK(mAbortSignalImpl)
+ NS_IMPL_CYCLE_COLLECTION_UNLINK(mFetchStreamReader)
+NS_IMPL_CYCLE_COLLECTION_UNLINK_END
+
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN_INHERITED(EmptyBody,
+ FetchBody<EmptyBody>)
+ NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mOwner)
+ NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mAbortSignalImpl)
+ NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mFetchStreamReader)
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
+
+NS_IMPL_CYCLE_COLLECTION_TRACE_BEGIN_INHERITED(EmptyBody, FetchBody<EmptyBody>)
+NS_IMPL_CYCLE_COLLECTION_TRACE_END
+
+NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(EmptyBody)
+NS_INTERFACE_MAP_END_INHERITING(FetchBody<EmptyBody>)
+
+EmptyBody::EmptyBody(nsIGlobalObject* aGlobal,
+ mozilla::ipc::PrincipalInfo* aPrincipalInfo,
+ AbortSignalImpl* aAbortSignalImpl,
+ const nsACString& aMimeType,
+ const nsACString& aMixedCaseMimeType,
+ already_AddRefed<nsIInputStream> aBodyStream)
+ : FetchBody<EmptyBody>(aGlobal),
+ mAbortSignalImpl(aAbortSignalImpl),
+ mMimeType(aMimeType),
+ mMixedCaseMimeType(aMixedCaseMimeType),
+ mBodyStream(std::move(aBodyStream)) {
+ if (aPrincipalInfo) {
+ mPrincipalInfo = MakeUnique<mozilla::ipc::PrincipalInfo>(*aPrincipalInfo);
+ }
+}
+
+EmptyBody::~EmptyBody() = default;
+
+/* static */
+already_AddRefed<EmptyBody> EmptyBody::Create(
+ nsIGlobalObject* aGlobal, mozilla::ipc::PrincipalInfo* aPrincipalInfo,
+ AbortSignalImpl* aAbortSignalImpl, const nsACString& aMimeType,
+ const nsACString& aMixedCaseMimeType, ErrorResult& aRv) {
+ nsCOMPtr<nsIInputStream> bodyStream;
+ aRv = NS_NewCStringInputStream(getter_AddRefs(bodyStream), ""_ns);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+
+ RefPtr<EmptyBody> emptyBody =
+ new EmptyBody(aGlobal, aPrincipalInfo, aAbortSignalImpl, aMimeType,
+ aMixedCaseMimeType, bodyStream.forget());
+ return emptyBody.forget();
+}
+
+void EmptyBody::GetBody(nsIInputStream** aStream, int64_t* aBodyLength) {
+ MOZ_ASSERT(aStream);
+
+ if (aBodyLength) {
+ *aBodyLength = 0;
+ }
+
+ nsCOMPtr<nsIInputStream> bodyStream = mBodyStream;
+ bodyStream.forget(aStream);
+}
+
+} // namespace mozilla::dom