/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "InternalResponse.h" #include "mozilla/Assertions.h" #include "mozilla/RefPtr.h" #include "mozilla/dom/FetchStreamUtils.h" #include "mozilla/dom/FetchTypes.h" #include "mozilla/dom/InternalHeaders.h" #include "mozilla/dom/cache/CacheTypes.h" #include "mozilla/ipc/PBackgroundSharedTypes.h" #include "mozilla/ipc/IPCStreamUtils.h" #include "mozilla/RandomNum.h" #include "mozilla/RemoteLazyInputStreamStorage.h" #include "nsIRandomGenerator.h" #include "nsStreamUtils.h" namespace mozilla::dom { namespace { // Const variable for generate padding size // XXX This will be tweaked to something more meaningful in Bug 1383656. const uint32_t kMaxRandomNumber = 102400; } // namespace InternalResponse::InternalResponse(uint16_t aStatus, const nsACString& aStatusText, RequestCredentials aCredentialsMode) : mType(ResponseType::Default), mStatus(aStatus), mStatusText(aStatusText), mHeaders(new InternalHeaders(HeadersGuardEnum::Response)), mBodySize(UNKNOWN_BODY_SIZE), mPaddingSize(UNKNOWN_PADDING_SIZE), mErrorCode(NS_OK), mCredentialsMode(aCredentialsMode), mCloned(false) {} /* static */ SafeRefPtr InternalResponse::FromIPC( const ParentToParentInternalResponse& aIPCResponse) { MOZ_ASSERT(XRE_IsParentProcess()); return FromIPCTemplate(aIPCResponse); } /* static */ SafeRefPtr InternalResponse::FromIPC( const ParentToChildInternalResponse& aIPCResponse) { MOZ_ASSERT(XRE_IsContentProcess()); return FromIPCTemplate(aIPCResponse); } template /* static */ SafeRefPtr InternalResponse::FromIPCTemplate( const T& aIPCResponse) { if (aIPCResponse.metadata().type() == ResponseType::Error) { return InternalResponse::NetworkError(aIPCResponse.metadata().errorCode()); } SafeRefPtr response = MakeSafeRefPtr( aIPCResponse.metadata().status(), aIPCResponse.metadata().statusText()); response->SetURLList(aIPCResponse.metadata().urlList()); response->mHeaders = new InternalHeaders(aIPCResponse.metadata().headers(), aIPCResponse.metadata().headersGuard()); if (aIPCResponse.body()) { auto bodySize = aIPCResponse.bodySize(); auto body = ToInputStream(*aIPCResponse.body()); response->SetBody(body.get(), bodySize); } response->SetAlternativeDataType( aIPCResponse.metadata().alternativeDataType()); if (aIPCResponse.alternativeBody()) { auto alternativeBody = ToInputStream(*aIPCResponse.alternativeBody()); response->SetAlternativeBody(alternativeBody.get()); } response->InitChannelInfo(aIPCResponse.metadata().securityInfo()); if (aIPCResponse.metadata().principalInfo()) { response->SetPrincipalInfo(MakeUnique( aIPCResponse.metadata().principalInfo().ref())); } switch (aIPCResponse.metadata().type()) { case ResponseType::Basic: response = response->BasicResponse(); break; case ResponseType::Cors: response = response->CORSResponse(); break; case ResponseType::Default: break; case ResponseType::Opaque: response = response->OpaqueResponse(); break; case ResponseType::Opaqueredirect: response = response->OpaqueRedirectResponse(); break; default: MOZ_CRASH("Unexpected ResponseType!"); } MOZ_ASSERT(response); return response; } InternalResponse::~InternalResponse() = default; InternalResponseMetadata InternalResponse::GetMetadata() { nsTArray headers; HeadersGuardEnum headersGuard; UnfilteredHeaders()->ToIPC(headers, headersGuard); Maybe principalInfo = mPrincipalInfo ? Some(*mPrincipalInfo) : Nothing(); // Note: all the arguments are copied rather than moved, which would be more // efficient, because there's no move-friendly constructor generated. nsCOMPtr securityInfo(mChannelInfo.SecurityInfo()); return InternalResponseMetadata( mType, GetUnfilteredURLList(), GetUnfilteredStatus(), GetUnfilteredStatusText(), headersGuard, headers, mErrorCode, GetAlternativeDataType(), securityInfo, principalInfo); } void InternalResponse::ToChildToParentInternalResponse( ChildToParentInternalResponse* aIPCResponse, mozilla::ipc::PBackgroundChild* aManager) { *aIPCResponse = ChildToParentInternalResponse(GetMetadata(), Nothing(), UNKNOWN_BODY_SIZE, Nothing()); nsCOMPtr body; int64_t bodySize; GetUnfilteredBody(getter_AddRefs(body), &bodySize); if (body) { aIPCResponse->body().emplace(ChildToParentStream()); aIPCResponse->bodySize() = bodySize; DebugOnly ok = mozilla::ipc::SerializeIPCStream( body.forget(), aIPCResponse->body()->stream(), /* aAllowLazy */ false); MOZ_ASSERT(ok); } nsCOMPtr alternativeBody = TakeAlternativeBody(); if (alternativeBody) { aIPCResponse->alternativeBody().emplace(ChildToParentStream()); DebugOnly ok = mozilla::ipc::SerializeIPCStream( alternativeBody.forget(), aIPCResponse->alternativeBody()->stream(), /* aAllowLazy */ false); MOZ_ASSERT(ok); } } ParentToParentInternalResponse InternalResponse::ToParentToParentInternalResponse() { ParentToParentInternalResponse result(GetMetadata(), Nothing(), UNKNOWN_BODY_SIZE, Nothing()); nsCOMPtr body; int64_t bodySize; GetUnfilteredBody(getter_AddRefs(body), &bodySize); if (body) { result.body() = Some(ToParentToParentStream(WrapNotNull(body), bodySize)); result.bodySize() = bodySize; } nsCOMPtr alternativeBody = TakeAlternativeBody(); if (alternativeBody) { result.alternativeBody() = Some(ToParentToParentStream( WrapNotNull(alternativeBody), UNKNOWN_BODY_SIZE)); } return result; } SafeRefPtr InternalResponse::Clone(CloneType aCloneType) { SafeRefPtr clone = CreateIncompleteCopy(); clone->mCloned = (mCloned = true); clone->mHeaders = new InternalHeaders(*mHeaders); // Make sure the clone response will have the same padding size. clone->mPaddingInfo = mPaddingInfo; clone->mPaddingSize = mPaddingSize; clone->mCacheInfoChannel = mCacheInfoChannel; clone->mCredentialsMode = mCredentialsMode; if (mWrappedResponse) { clone->mWrappedResponse = mWrappedResponse->Clone(aCloneType); MOZ_ASSERT(!mBody); return clone; } if (!mBody || aCloneType == eDontCloneInputStream) { return clone; } nsCOMPtr clonedBody; nsCOMPtr replacementBody; nsresult rv = NS_CloneInputStream(mBody, getter_AddRefs(clonedBody), getter_AddRefs(replacementBody)); if (NS_WARN_IF(NS_FAILED(rv))) { return nullptr; } clone->mBody.swap(clonedBody); if (replacementBody) { mBody.swap(replacementBody); } return clone; } SafeRefPtr InternalResponse::BasicResponse() { MOZ_ASSERT(!mWrappedResponse, "Can't BasicResponse a already wrapped response"); SafeRefPtr basic = CreateIncompleteCopy(); basic->mType = ResponseType::Basic; basic->mHeaders = InternalHeaders::BasicHeaders(Headers()); basic->mWrappedResponse = SafeRefPtrFromThis(); return basic; } SafeRefPtr InternalResponse::CORSResponse() { MOZ_ASSERT(!mWrappedResponse, "Can't CORSResponse a already wrapped response"); SafeRefPtr cors = CreateIncompleteCopy(); cors->mType = ResponseType::Cors; cors->mHeaders = InternalHeaders::CORSHeaders(Headers(), mCredentialsMode); cors->mWrappedResponse = SafeRefPtrFromThis(); return cors; } uint32_t InternalResponse::GetPaddingInfo() { // If it's an opaque response, the paddingInfo should be generated only when // paddingSize is unknown size. // If it's not, the paddingInfo should be nothing and the paddingSize should // be unknown size. MOZ_DIAGNOSTIC_ASSERT( (mType == ResponseType::Opaque && mPaddingSize == UNKNOWN_PADDING_SIZE && mPaddingInfo.isSome()) || (mType == ResponseType::Opaque && mPaddingSize != UNKNOWN_PADDING_SIZE && mPaddingInfo.isNothing()) || (mType != ResponseType::Opaque && mPaddingSize == UNKNOWN_PADDING_SIZE && mPaddingInfo.isNothing())); return mPaddingInfo.isSome() ? mPaddingInfo.ref() : 0; } nsresult InternalResponse::GeneratePaddingInfo() { MOZ_DIAGNOSTIC_ASSERT(mType == ResponseType::Opaque); MOZ_DIAGNOSTIC_ASSERT(mPaddingSize == UNKNOWN_PADDING_SIZE); // Utilize random generator to generator a random number nsresult rv; uint32_t randomNumber = 0; nsCOMPtr randomGenerator = do_GetService("@mozilla.org/security/random-generator;1", &rv); if (NS_WARN_IF(NS_FAILED(rv))) { Maybe maybeRandomNum = RandomUint64(); if (maybeRandomNum.isSome()) { mPaddingInfo.emplace(uint32_t(maybeRandomNum.value() % kMaxRandomNumber)); return NS_OK; } return rv; } MOZ_DIAGNOSTIC_ASSERT(randomGenerator); uint8_t* buffer; rv = randomGenerator->GenerateRandomBytes(sizeof(randomNumber), &buffer); if (NS_WARN_IF(NS_FAILED(rv))) { Maybe maybeRandomNum = RandomUint64(); if (maybeRandomNum.isSome()) { mPaddingInfo.emplace(uint32_t(maybeRandomNum.value() % kMaxRandomNumber)); return NS_OK; } return rv; } memcpy(&randomNumber, buffer, sizeof(randomNumber)); free(buffer); mPaddingInfo.emplace(randomNumber % kMaxRandomNumber); return rv; } int64_t InternalResponse::GetPaddingSize() { // We initialize padding size to an unknown size (-1). After cached, we only // pad opaque response. Opaque response's padding size might be unknown before // cached. MOZ_DIAGNOSTIC_ASSERT(mType == ResponseType::Opaque || mPaddingSize == UNKNOWN_PADDING_SIZE); MOZ_DIAGNOSTIC_ASSERT(mPaddingSize == UNKNOWN_PADDING_SIZE || mPaddingSize >= 0); return mPaddingSize; } void InternalResponse::SetPaddingSize(int64_t aPaddingSize) { // We should only pad the opaque response. MOZ_DIAGNOSTIC_ASSERT( (mType == ResponseType::Opaque) != (aPaddingSize == InternalResponse::UNKNOWN_PADDING_SIZE)); MOZ_DIAGNOSTIC_ASSERT(aPaddingSize == UNKNOWN_PADDING_SIZE || aPaddingSize >= 0); mPaddingSize = aPaddingSize; } void InternalResponse::SetPrincipalInfo( UniquePtr aPrincipalInfo) { mPrincipalInfo = std::move(aPrincipalInfo); } LoadTainting InternalResponse::GetTainting() const { switch (mType) { case ResponseType::Cors: return LoadTainting::CORS; case ResponseType::Opaque: return LoadTainting::Opaque; default: return LoadTainting::Basic; } } SafeRefPtr InternalResponse::Unfiltered() { SafeRefPtr ref = mWrappedResponse.clonePtr(); if (!ref) { ref = SafeRefPtrFromThis(); } return ref; } SafeRefPtr InternalResponse::OpaqueResponse() { MOZ_ASSERT(!mWrappedResponse, "Can't OpaqueResponse a already wrapped response"); SafeRefPtr response = MakeSafeRefPtr(0, ""_ns); response->mType = ResponseType::Opaque; response->mChannelInfo = mChannelInfo; if (mPrincipalInfo) { response->mPrincipalInfo = MakeUnique(*mPrincipalInfo); } response->mWrappedResponse = SafeRefPtrFromThis(); return response; } SafeRefPtr InternalResponse::OpaqueRedirectResponse() { MOZ_ASSERT(!mWrappedResponse, "Can't OpaqueRedirectResponse a already wrapped response"); MOZ_ASSERT(!mURLList.IsEmpty(), "URLList should not be emtpy for internalResponse"); SafeRefPtr response = OpaqueResponse(); response->mType = ResponseType::Opaqueredirect; response->mURLList = mURLList.Clone(); return response; } SafeRefPtr InternalResponse::CreateIncompleteCopy() { SafeRefPtr copy = MakeSafeRefPtr(mStatus, mStatusText); copy->mType = mType; copy->mURLList = mURLList.Clone(); copy->mChannelInfo = mChannelInfo; if (mPrincipalInfo) { copy->mPrincipalInfo = MakeUnique(*mPrincipalInfo); } return copy; } ParentToChildInternalResponse ToParentToChild( const ParentToParentInternalResponse& aResponse, NotNull aBackgroundParent) { ParentToChildInternalResponse result(aResponse.metadata(), Nothing(), aResponse.bodySize(), Nothing()); if (aResponse.body().isSome()) { result.body() = Some(ToParentToChildStream( aResponse.body().ref(), aResponse.bodySize(), aBackgroundParent)); } if (aResponse.alternativeBody().isSome()) { result.alternativeBody() = Some(ToParentToChildStream( aResponse.alternativeBody().ref(), InternalResponse::UNKNOWN_BODY_SIZE, aBackgroundParent)); } return result; } } // namespace mozilla::dom