/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set sw=2 ts=8 et tw=80 : */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "TRRServiceChannel.h" #include "HttpLog.h" #include "AltServiceChild.h" #include "mozilla/ScopeExit.h" #include "mozilla/StaticPrefs_network.h" #include "mozilla/Unused.h" #include "nsDNSPrefetch.h" #include "nsEscape.h" #include "nsHttpTransaction.h" #include "nsICancelable.h" #include "nsICachingChannel.h" #include "nsIHttpPushListener.h" #include "nsIProtocolProxyService2.h" #include "nsIOService.h" #include "nsISeekableStream.h" #include "nsURLHelper.h" #include "ProxyConfigLookup.h" #include "TRRLoadInfo.h" #include "ReferrerInfo.h" #include "TRR.h" #include "TRRService.h" namespace mozilla::net { NS_IMPL_ADDREF(TRRServiceChannel) // Because nsSupportsWeakReference isn't thread-safe we must ensure that // TRRServiceChannel is destroyed on the target thread. Any Release() called // on a different thread is dispatched to the target thread. bool TRRServiceChannel::DispatchRelease() { if (mCurrentEventTarget->IsOnCurrentThread()) { return false; } mCurrentEventTarget->Dispatch( NewNonOwningRunnableMethod("net::TRRServiceChannel::Release", this, &TRRServiceChannel::Release), NS_DISPATCH_NORMAL); return true; } NS_IMETHODIMP_(MozExternalRefCountType) TRRServiceChannel::Release() { nsrefcnt count = mRefCnt - 1; if (DispatchRelease()) { // Redispatched to the target thread. return count; } MOZ_ASSERT(0 != mRefCnt, "dup release"); count = --mRefCnt; NS_LOG_RELEASE(this, count, "TRRServiceChannel"); if (0 == count) { mRefCnt = 1; delete (this); return 0; } return count; } NS_INTERFACE_MAP_BEGIN(TRRServiceChannel) NS_INTERFACE_MAP_ENTRY(nsIRequest) NS_INTERFACE_MAP_ENTRY(nsIChannel) NS_INTERFACE_MAP_ENTRY(nsIHttpChannel) NS_INTERFACE_MAP_ENTRY(nsIHttpChannelInternal) NS_INTERFACE_MAP_ENTRY(nsISupportsPriority) NS_INTERFACE_MAP_ENTRY(nsIClassOfService) NS_INTERFACE_MAP_ENTRY(nsIProxiedChannel) NS_INTERFACE_MAP_ENTRY(nsIProtocolProxyCallback) NS_INTERFACE_MAP_ENTRY(nsIStreamListener) NS_INTERFACE_MAP_ENTRY(nsIRequestObserver) NS_INTERFACE_MAP_ENTRY(nsITransportEventSink) NS_INTERFACE_MAP_ENTRY(nsIDNSListener) NS_INTERFACE_MAP_ENTRY(nsISupportsWeakReference) NS_INTERFACE_MAP_ENTRY_CONCRETE(TRRServiceChannel) NS_INTERFACE_MAP_END_INHERITING(HttpBaseChannel) TRRServiceChannel::TRRServiceChannel() : HttpAsyncAborter(this), mProxyRequest(nullptr, "TRRServiceChannel::mProxyRequest"), mCurrentEventTarget(GetCurrentEventTarget()) { LOG(("TRRServiceChannel ctor [this=%p]\n", this)); } TRRServiceChannel::~TRRServiceChannel() { LOG(("TRRServiceChannel dtor [this=%p]\n", this)); } NS_IMETHODIMP TRRServiceChannel::SetCanceledReason(const nsACString& aReason) { return SetCanceledReasonImpl(aReason); } NS_IMETHODIMP TRRServiceChannel::GetCanceledReason(nsACString& aReason) { return GetCanceledReasonImpl(aReason); } NS_IMETHODIMP TRRServiceChannel::CancelWithReason(nsresult aStatus, const nsACString& aReason) { return CancelWithReasonImpl(aStatus, aReason); } NS_IMETHODIMP TRRServiceChannel::Cancel(nsresult status) { LOG(("TRRServiceChannel::Cancel [this=%p status=%" PRIx32 "]\n", this, static_cast(status))); if (mCanceled) { LOG((" ignoring; already canceled\n")); return NS_OK; } mCanceled = true; mStatus = status; nsCOMPtr proxyRequest; { auto req = mProxyRequest.Lock(); proxyRequest.swap(*req); } if (proxyRequest) { NS_DispatchToMainThread( NS_NewRunnableFunction( "CancelProxyRequest", [proxyRequest, status]() { proxyRequest->Cancel(status); }), NS_DISPATCH_NORMAL); } CancelNetworkRequest(status); return NS_OK; } void TRRServiceChannel::CancelNetworkRequest(nsresult aStatus) { if (mTransaction) { nsresult rv = gHttpHandler->CancelTransaction(mTransaction, aStatus); if (NS_FAILED(rv)) { LOG(("failed to cancel the transaction\n")); } } if (mTransactionPump) mTransactionPump->Cancel(aStatus); } NS_IMETHODIMP TRRServiceChannel::Suspend() { LOG(("TRRServiceChannel::SuspendInternal [this=%p]\n", this)); if (mTransactionPump) { return mTransactionPump->Suspend(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::Resume() { LOG(("TRRServiceChannel::Resume [this=%p]\n", this)); if (mTransactionPump) { return mTransactionPump->Resume(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetSecurityInfo(nsITransportSecurityInfo** securityInfo) { NS_ENSURE_ARG_POINTER(securityInfo); *securityInfo = do_AddRef(mSecurityInfo).take(); return NS_OK; } NS_IMETHODIMP TRRServiceChannel::AsyncOpen(nsIStreamListener* aListener) { NS_ENSURE_ARG_POINTER(aListener); NS_ENSURE_TRUE(!LoadIsPending(), NS_ERROR_IN_PROGRESS); NS_ENSURE_TRUE(!LoadWasOpened(), NS_ERROR_ALREADY_OPENED); if (mCanceled) { ReleaseListeners(); return mStatus; } // HttpBaseChannel::MaybeWaitForUploadStreamNormalization can only be used on // main thread, so we can only return an error here. #ifdef NIGHTLY_BUILD MOZ_ASSERT(!LoadPendingUploadStreamNormalization()); #endif if (LoadPendingUploadStreamNormalization()) { return NS_ERROR_FAILURE; } if (!gHttpHandler->Active()) { LOG((" after HTTP shutdown...")); ReleaseListeners(); return NS_ERROR_NOT_AVAILABLE; } nsresult rv = NS_CheckPortSafety(mURI); if (NS_FAILED(rv)) { ReleaseListeners(); return rv; } StoreIsPending(true); StoreWasOpened(true); mListener = aListener; mAsyncOpenTime = TimeStamp::Now(); rv = MaybeResolveProxyAndBeginConnect(); if (NS_FAILED(rv)) { Unused << AsyncAbort(rv); } return NS_OK; } nsresult TRRServiceChannel::MaybeResolveProxyAndBeginConnect() { nsresult rv; // The common case for HTTP channels is to begin proxy resolution and return // at this point. The only time we know mProxyInfo already is if we're // proxying a non-http protocol like ftp. We don't need to discover proxy // settings if we are never going to make a network connection. // If mConnectionInfo is already supplied, we don't need to do proxy // resolution again. if (!mProxyInfo && !mConnectionInfo && !(mLoadFlags & (nsICachingChannel::LOAD_ONLY_FROM_CACHE | nsICachingChannel::LOAD_NO_NETWORK_IO)) && NS_SUCCEEDED(ResolveProxy())) { return NS_OK; } rv = BeginConnect(); if (NS_FAILED(rv)) { Unused << AsyncAbort(rv); } return NS_OK; } nsresult TRRServiceChannel::ResolveProxy() { LOG(("TRRServiceChannel::ResolveProxy [this=%p]\n", this)); if (!NS_IsMainThread()) { return NS_DispatchToMainThread( NewRunnableMethod("TRRServiceChannel::ResolveProxy", this, &TRRServiceChannel::ResolveProxy), NS_DISPATCH_NORMAL); } MOZ_ASSERT(NS_IsMainThread()); // TODO: bug 1625171. Consider moving proxy resolution to socket process. RefPtr self = this; nsCOMPtr proxyRequest; nsresult rv = ProxyConfigLookup::Create( [self](nsIProxyInfo* aProxyInfo, nsresult aStatus) { self->OnProxyAvailable(nullptr, nullptr, aProxyInfo, aStatus); }, mURI, mProxyResolveFlags, getter_AddRefs(proxyRequest)); if (NS_FAILED(rv)) { if (!mCurrentEventTarget->IsOnCurrentThread()) { return mCurrentEventTarget->Dispatch( NewRunnableMethod("TRRServiceChannel::AsyncAbort", this, &TRRServiceChannel::AsyncAbort, rv), NS_DISPATCH_NORMAL); } } { auto req = mProxyRequest.Lock(); // We only set mProxyRequest if the channel hasn't already been cancelled // on another thread. if (!mCanceled) { *req = proxyRequest.forget(); } } // If the channel has been cancelled, we go ahead and cancel the proxy // request right here. if (proxyRequest) { proxyRequest->Cancel(mStatus); } return rv; } NS_IMETHODIMP TRRServiceChannel::OnProxyAvailable(nsICancelable* request, nsIChannel* channel, nsIProxyInfo* pi, nsresult status) { LOG(("TRRServiceChannel::OnProxyAvailable [this=%p pi=%p status=%" PRIx32 " mStatus=%" PRIx32 "]\n", this, pi, static_cast(status), static_cast(static_cast(mStatus)))); if (!mCurrentEventTarget->IsOnCurrentThread()) { RefPtr self = this; nsCOMPtr info = pi; return mCurrentEventTarget->Dispatch( NS_NewRunnableFunction("TRRServiceChannel::OnProxyAvailable", [self, info, status]() { self->OnProxyAvailable(nullptr, nullptr, info, status); }), NS_DISPATCH_NORMAL); } MOZ_ASSERT(mCurrentEventTarget->IsOnCurrentThread()); { auto proxyRequest = mProxyRequest.Lock(); *proxyRequest = nullptr; } nsresult rv; // If status is a failure code, then it means that we failed to resolve // proxy info. That is a non-fatal error assuming it wasn't because the // request was canceled. We just failover to DIRECT when proxy resolution // fails (failure can mean that the PAC URL could not be loaded). if (NS_SUCCEEDED(status)) mProxyInfo = pi; if (!gHttpHandler->Active()) { LOG( ("nsHttpChannel::OnProxyAvailable [this=%p] " "Handler no longer active.\n", this)); rv = NS_ERROR_NOT_AVAILABLE; } else { rv = BeginConnect(); } if (NS_FAILED(rv)) { Unused << AsyncAbort(rv); } return rv; } nsresult TRRServiceChannel::BeginConnect() { LOG(("TRRServiceChannel::BeginConnect [this=%p]\n", this)); nsresult rv; // Construct connection info object nsAutoCString host; nsAutoCString scheme; int32_t port = -1; bool isHttps = mURI->SchemeIs("https"); rv = mURI->GetScheme(scheme); if (NS_SUCCEEDED(rv)) rv = mURI->GetAsciiHost(host); if (NS_SUCCEEDED(rv)) rv = mURI->GetPort(&port); if (NS_SUCCEEDED(rv)) rv = mURI->GetAsciiSpec(mSpec); if (NS_FAILED(rv)) { return rv; } // Just a warning here because some nsIURIs do not implement this method. Unused << NS_WARN_IF(NS_FAILED(mURI->GetUsername(mUsername))); // Reject the URL if it doesn't specify a host if (host.IsEmpty()) { rv = NS_ERROR_MALFORMED_URI; return rv; } LOG(("host=%s port=%d\n", host.get(), port)); LOG(("uri=%s\n", mSpec.get())); nsCOMPtr proxyInfo; if (mProxyInfo) proxyInfo = do_QueryInterface(mProxyInfo); mRequestHead.SetHTTPS(isHttps); mRequestHead.SetOrigin(scheme, host, port); RefPtr connInfo = new nsHttpConnectionInfo( host, port, ""_ns, mUsername, proxyInfo, OriginAttributes(), isHttps); // TODO: Bug 1622778 for using AltService in socket process. StoreAllowAltSvc(XRE_IsParentProcess() && LoadAllowAltSvc()); bool http2Allowed = !gHttpHandler->IsHttp2Excluded(connInfo); bool http3Allowed = Http3Allowed(); if (!http3Allowed) { mCaps |= NS_HTTP_DISALLOW_HTTP3; } RefPtr mapping; if (!mConnectionInfo && LoadAllowAltSvc() && // per channel (http2Allowed || http3Allowed) && !(mLoadFlags & LOAD_FRESH_CONNECTION) && AltSvcMapping::AcceptableProxy(proxyInfo) && (scheme.EqualsLiteral("http") || scheme.EqualsLiteral("https")) && (mapping = gHttpHandler->GetAltServiceMapping( scheme, host, port, mPrivateBrowsing, OriginAttributes(), http2Allowed, http3Allowed))) { LOG(("TRRServiceChannel %p Alt Service Mapping Found %s://%s:%d [%s]\n", this, scheme.get(), mapping->AlternateHost().get(), mapping->AlternatePort(), mapping->HashKey().get())); if (!(mLoadFlags & LOAD_ANONYMOUS) && !mPrivateBrowsing) { nsAutoCString altUsedLine(mapping->AlternateHost()); bool defaultPort = mapping->AlternatePort() == (isHttps ? NS_HTTPS_DEFAULT_PORT : NS_HTTP_DEFAULT_PORT); if (!defaultPort) { altUsedLine.AppendLiteral(":"); altUsedLine.AppendInt(mapping->AlternatePort()); } rv = mRequestHead.SetHeader(nsHttp::Alternate_Service_Used, altUsedLine); MOZ_ASSERT(NS_SUCCEEDED(rv)); } LOG(("TRRServiceChannel %p Using connection info from altsvc mapping", this)); mapping->GetConnectionInfo(getter_AddRefs(mConnectionInfo), proxyInfo, OriginAttributes()); Telemetry::Accumulate(Telemetry::HTTP_TRANSACTION_USE_ALTSVC, true); Telemetry::Accumulate(Telemetry::HTTP_TRANSACTION_USE_ALTSVC_OE, !isHttps); } else if (mConnectionInfo) { LOG(("TRRServiceChannel %p Using channel supplied connection info", this)); } else { LOG(("TRRServiceChannel %p Using default connection info", this)); mConnectionInfo = connInfo; Telemetry::Accumulate(Telemetry::HTTP_TRANSACTION_USE_ALTSVC, false); } // Need to re-ask the handler, since mConnectionInfo may not be the connInfo // we used earlier if (gHttpHandler->IsHttp2Excluded(mConnectionInfo)) { StoreAllowSpdy(0); mCaps |= NS_HTTP_DISALLOW_SPDY; mConnectionInfo->SetNoSpdy(true); } // If TimingEnabled flag is not set after OnModifyRequest() then // clear the already recorded AsyncOpen value for consistency. if (!LoadTimingEnabled()) mAsyncOpenTime = TimeStamp(); // if this somehow fails we can go on without it Unused << gHttpHandler->AddConnectionHeader(&mRequestHead, mCaps); // Adjust mCaps according to our request headers: // - If "Connection: close" is set as a request header, then do not bother // trying to establish a keep-alive connection. if (mRequestHead.HasHeaderValue(nsHttp::Connection, "close")) { mCaps &= ~(NS_HTTP_ALLOW_KEEPALIVE); } if (gHttpHandler->CriticalRequestPrioritization()) { if (mClassOfService.Flags() & nsIClassOfService::Leader) { mCaps |= NS_HTTP_LOAD_AS_BLOCKING; } if (mClassOfService.Flags() & nsIClassOfService::Unblocked) { mCaps |= NS_HTTP_LOAD_UNBLOCKED; } if (mClassOfService.Flags() & nsIClassOfService::UrgentStart && gHttpHandler->IsUrgentStartEnabled()) { mCaps |= NS_HTTP_URGENT_START; SetPriority(nsISupportsPriority::PRIORITY_HIGHEST); } } if (mCanceled) { return mStatus; } MaybeStartDNSPrefetch(); rv = ContinueOnBeforeConnect(); if (NS_FAILED(rv)) { return rv; } return NS_OK; } nsresult TRRServiceChannel::ContinueOnBeforeConnect() { LOG(("TRRServiceChannel::ContinueOnBeforeConnect [this=%p]\n", this)); // ensure that we are using a valid hostname if (!net_IsValidHostName(nsDependentCString(mConnectionInfo->Origin()))) { return NS_ERROR_UNKNOWN_HOST; } if (LoadIsTRRServiceChannel()) { mCaps |= NS_HTTP_LARGE_KEEPALIVE; mCaps |= NS_HTTP_DISALLOW_HTTPS_RR; } mCaps |= NS_HTTP_TRR_FLAGS_FROM_MODE(nsIRequest::GetTRRMode()); // Finalize ConnectionInfo flags before SpeculativeConnect mConnectionInfo->SetAnonymous((mLoadFlags & LOAD_ANONYMOUS) != 0); mConnectionInfo->SetPrivate(mPrivateBrowsing); mConnectionInfo->SetNoSpdy(mCaps & NS_HTTP_DISALLOW_SPDY); mConnectionInfo->SetBeConservative((mCaps & NS_HTTP_BE_CONSERVATIVE) || LoadBeConservative()); mConnectionInfo->SetTlsFlags(mTlsFlags); mConnectionInfo->SetIsTrrServiceChannel(LoadIsTRRServiceChannel()); mConnectionInfo->SetTRRMode(nsIRequest::GetTRRMode()); mConnectionInfo->SetIPv4Disabled(mCaps & NS_HTTP_DISABLE_IPV4); mConnectionInfo->SetIPv6Disabled(mCaps & NS_HTTP_DISABLE_IPV6); if (mLoadFlags & LOAD_FRESH_CONNECTION) { Telemetry::ScalarAdd( Telemetry::ScalarID::NETWORKING_TRR_CONNECTION_CYCLE_COUNT, NS_ConvertUTF8toUTF16(TRRService::ProviderKey()), 1); nsresult rv = gHttpHandler->ConnMgr()->DoSingleConnectionCleanup(mConnectionInfo); LOG( ("TRRServiceChannel::BeginConnect " "DoSingleConnectionCleanup succeeded=%d %08x [this=%p]", NS_SUCCEEDED(rv), static_cast(rv), this)); } return Connect(); } nsresult TRRServiceChannel::Connect() { LOG(("TRRServiceChannel::Connect [this=%p]\n", this)); nsresult rv = SetupTransaction(); if (NS_FAILED(rv)) { return rv; } rv = gHttpHandler->InitiateTransaction(mTransaction, mPriority); if (NS_FAILED(rv)) { return rv; } return mTransaction->AsyncRead(this, getter_AddRefs(mTransactionPump)); } nsresult TRRServiceChannel::SetupTransaction() { LOG(( "TRRServiceChannel::SetupTransaction " "[this=%p, cos=%lu, inc=%d, prio=%d]\n", this, mClassOfService.Flags(), mClassOfService.Incremental(), mPriority)); NS_ENSURE_TRUE(!mTransaction, NS_ERROR_ALREADY_INITIALIZED); nsresult rv; if (!LoadAllowSpdy()) { mCaps |= NS_HTTP_DISALLOW_SPDY; } // Check a proxy info from mConnectionInfo. TRR channel may use a proxy that // is set in mConnectionInfo but acutally the channel do not have mProxyInfo // set. This can happend when network.trr.async_connInfo is true. bool useNonDirectProxy = mConnectionInfo->ProxyInfo() ? !mConnectionInfo->ProxyInfo()->IsDirect() : false; if (!Http3Allowed() || useNonDirectProxy) { mCaps |= NS_HTTP_DISALLOW_HTTP3; } if (LoadBeConservative()) { mCaps |= NS_HTTP_BE_CONSERVATIVE; } // Use the URI path if not proxying (transparent proxying such as proxy // CONNECT does not count here). Also figure out what HTTP version to use. nsAutoCString buf, path; nsCString* requestURI; // This is the normal e2e H1 path syntax "/index.html" rv = mURI->GetPathQueryRef(path); if (NS_FAILED(rv)) { return rv; } // path may contain UTF-8 characters, so ensure that they're escaped. if (NS_EscapeURL(path.get(), path.Length(), esc_OnlyNonASCII | esc_Spaces, buf)) { requestURI = &buf; } else { requestURI = &path; } // trim off the #ref portion if any... int32_t ref1 = requestURI->FindChar('#'); if (ref1 != kNotFound) { requestURI->SetLength(ref1); } if (mConnectionInfo->UsingConnect() || !mConnectionInfo->UsingHttpProxy()) { mRequestHead.SetVersion(gHttpHandler->HttpVersion()); } else { mRequestHead.SetPath(*requestURI); // RequestURI should be the absolute uri H1 proxy syntax // "http://foo/index.html" so we will overwrite the relative version in // requestURI rv = mURI->GetUserPass(buf); if (NS_FAILED(rv)) return rv; if (!buf.IsEmpty() && ((strncmp(mSpec.get(), "http:", 5) == 0) || strncmp(mSpec.get(), "https:", 6) == 0)) { nsCOMPtr tempURI = nsIOService::CreateExposableURI(mURI); rv = tempURI->GetAsciiSpec(path); if (NS_FAILED(rv)) return rv; requestURI = &path; } else { requestURI = &mSpec; } // trim off the #ref portion if any... int32_t ref2 = requestURI->FindChar('#'); if (ref2 != kNotFound) { requestURI->SetLength(ref2); } mRequestHead.SetVersion(gHttpHandler->ProxyHttpVersion()); } mRequestHead.SetRequestURI(*requestURI); // Force setting no-cache header for TRRServiceChannel. // We need to send 'Pragma:no-cache' to inhibit proxy caching even if // no proxy is configured since we might be talking with a transparent // proxy, i.e. one that operates at the network level. See bug #14772. rv = mRequestHead.SetHeaderOnce(nsHttp::Pragma, "no-cache", true); MOZ_ASSERT(NS_SUCCEEDED(rv)); // If we're configured to speak HTTP/1.1 then also send 'Cache-control: // no-cache' if (mRequestHead.Version() >= HttpVersion::v1_1) { rv = mRequestHead.SetHeaderOnce(nsHttp::Cache_Control, "no-cache", true); MOZ_ASSERT(NS_SUCCEEDED(rv)); } // create wrapper for this channel's notification callbacks nsCOMPtr callbacks; NS_NewNotificationCallbacksAggregation(mCallbacks, mLoadGroup, getter_AddRefs(callbacks)); // create the transaction object mTransaction = new nsHttpTransaction(); LOG1(("TRRServiceChannel %p created nsHttpTransaction %p\n", this, mTransaction.get())); // See bug #466080. Transfer LOAD_ANONYMOUS flag to socket-layer. if (mLoadFlags & LOAD_ANONYMOUS) mCaps |= NS_HTTP_LOAD_ANONYMOUS; if (LoadTimingEnabled()) mCaps |= NS_HTTP_TIMING_ENABLED; nsCOMPtr pushListener; NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup, NS_GET_IID(nsIHttpPushListener), getter_AddRefs(pushListener)); HttpTransactionShell::OnPushCallback pushCallback = nullptr; if (pushListener) { mCaps |= NS_HTTP_ONPUSH_LISTENER; nsWeakPtr weakPtrThis( do_GetWeakReference(static_cast(this))); pushCallback = [weakPtrThis](uint32_t aPushedStreamId, const nsACString& aUrl, const nsACString& aRequestString, HttpTransactionShell* aTransaction) { if (nsCOMPtr channel = do_QueryReferent(weakPtrThis)) { return static_cast(channel.get()) ->OnPush(aPushedStreamId, aUrl, aRequestString, aTransaction); } return NS_ERROR_NOT_AVAILABLE; }; } EnsureRequestContext(); rv = mTransaction->Init( mCaps, mConnectionInfo, &mRequestHead, mUploadStream, mReqContentLength, LoadUploadStreamHasHeaders(), mCurrentEventTarget, callbacks, this, mTopBrowsingContextId, HttpTrafficCategory::eInvalid, mRequestContext, mClassOfService, mInitialRwin, LoadResponseTimeoutEnabled(), mChannelId, nullptr, std::move(pushCallback), mTransWithPushedStream, mPushedStreamId); mTransWithPushedStream = nullptr; if (NS_FAILED(rv)) { mTransaction = nullptr; return rv; } return rv; } void TRRServiceChannel::SetPushedStreamTransactionAndId( HttpTransactionShell* aTransWithPushedStream, uint32_t aPushedStreamId) { MOZ_ASSERT(!mTransWithPushedStream); LOG(("TRRServiceChannel::SetPushedStreamTransaction [this=%p] trans=%p", this, aTransWithPushedStream)); mTransWithPushedStream = aTransWithPushedStream; mPushedStreamId = aPushedStreamId; } nsresult TRRServiceChannel::OnPush(uint32_t aPushedStreamId, const nsACString& aUrl, const nsACString& aRequestString, HttpTransactionShell* aTransaction) { MOZ_ASSERT(aTransaction); LOG(("TRRServiceChannel::OnPush [this=%p, trans=%p]\n", this, aTransaction)); MOZ_ASSERT(mCaps & NS_HTTP_ONPUSH_LISTENER); nsCOMPtr pushListener; NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup, NS_GET_IID(nsIHttpPushListener), getter_AddRefs(pushListener)); if (!pushListener) { LOG( ("TRRServiceChannel::OnPush [this=%p] notification callbacks do not " "implement nsIHttpPushListener\n", this)); return NS_ERROR_NOT_AVAILABLE; } nsCOMPtr pushResource; nsresult rv; // Create a Channel for the Push Resource rv = NS_NewURI(getter_AddRefs(pushResource), aUrl); if (NS_FAILED(rv)) { return NS_ERROR_FAILURE; } nsCOMPtr loadInfo = static_cast(mLoadInfo.get())->Clone(); nsCOMPtr pushHttpChannel; rv = gHttpHandler->CreateTRRServiceChannel(pushResource, nullptr, 0, nullptr, loadInfo, getter_AddRefs(pushHttpChannel)); NS_ENSURE_SUCCESS(rv, rv); rv = pushHttpChannel->SetLoadFlags(mLoadFlags); NS_ENSURE_SUCCESS(rv, rv); RefPtr channel; CallQueryInterface(pushHttpChannel, channel.StartAssignment()); MOZ_ASSERT(channel); if (!channel) { return NS_ERROR_UNEXPECTED; } // new channel needs mrqeuesthead and headers from pushedStream channel->mRequestHead.ParseHeaderSet(aRequestString.BeginReading()); channel->mLoadGroup = mLoadGroup; channel->mCallbacks = mCallbacks; // Link the pushed stream with the new channel and call listener channel->SetPushedStreamTransactionAndId(aTransaction, aPushedStreamId); rv = pushListener->OnPush(this, channel); return rv; } void TRRServiceChannel::MaybeStartDNSPrefetch() { if (mConnectionInfo->UsingHttpProxy() || (mLoadFlags & (nsICachingChannel::LOAD_NO_NETWORK_IO | nsICachingChannel::LOAD_ONLY_FROM_CACHE))) { return; } LOG( ("TRRServiceChannel::MaybeStartDNSPrefetch [this=%p] " "prefetching%s\n", this, mCaps & NS_HTTP_REFRESH_DNS ? ", refresh requested" : "")); OriginAttributes originAttributes; mDNSPrefetch = new nsDNSPrefetch(mURI, originAttributes, nsIRequest::GetTRRMode(), this, LoadTimingEnabled()); nsIDNSService::DNSFlags dnsFlags = nsIDNSService::RESOLVE_DEFAULT_FLAGS; if (mCaps & NS_HTTP_REFRESH_DNS) { dnsFlags |= nsIDNSService::RESOLVE_BYPASS_CACHE; } nsresult rv = mDNSPrefetch->PrefetchHigh(dnsFlags); NS_ENSURE_SUCCESS_VOID(rv); } NS_IMETHODIMP TRRServiceChannel::OnTransportStatus(nsITransport* trans, nsresult status, int64_t progress, int64_t progressMax) { return NS_OK; } nsresult TRRServiceChannel::CallOnStartRequest() { LOG(("TRRServiceChannel::CallOnStartRequest [this=%p]", this)); if (LoadOnStartRequestCalled()) { LOG(("CallOnStartRequest already invoked before")); return mStatus; } nsresult rv = NS_OK; StoreTracingEnabled(false); // Ensure mListener->OnStartRequest will be invoked before exiting // this function. auto onStartGuard = MakeScopeExit([&] { LOG( (" calling mListener->OnStartRequest by ScopeExit [this=%p, " "listener=%p]\n", this, mListener.get())); MOZ_ASSERT(!LoadOnStartRequestCalled()); if (mListener) { nsCOMPtr deleteProtector(mListener); StoreOnStartRequestCalled(true); deleteProtector->OnStartRequest(this); } StoreOnStartRequestCalled(true); }); if (mResponseHead && !mResponseHead->HasContentCharset()) { mResponseHead->SetContentCharset(mContentCharsetHint); } LOG((" calling mListener->OnStartRequest [this=%p, listener=%p]\n", this, mListener.get())); // About to call OnStartRequest, dismiss the guard object. onStartGuard.release(); if (mListener) { MOZ_ASSERT(!LoadOnStartRequestCalled(), "We should not call OsStartRequest twice"); nsCOMPtr deleteProtector(mListener); StoreOnStartRequestCalled(true); rv = deleteProtector->OnStartRequest(this); if (NS_FAILED(rv)) return rv; } else { NS_WARNING("OnStartRequest skipped because of null listener"); StoreOnStartRequestCalled(true); } if (!mResponseHead) { return NS_OK; } nsAutoCString contentEncoding; rv = mResponseHead->GetHeader(nsHttp::Content_Encoding, contentEncoding); if (NS_FAILED(rv) || contentEncoding.IsEmpty()) { return NS_OK; } // DoApplyContentConversions can only be called on the main thread. if (NS_IsMainThread()) { nsCOMPtr listener; rv = DoApplyContentConversions(mListener, getter_AddRefs(listener), nullptr); if (NS_FAILED(rv)) { return rv; } AfterApplyContentConversions(rv, listener); return NS_OK; } Suspend(); RefPtr self = this; rv = NS_DispatchToMainThread( NS_NewRunnableFunction("TRRServiceChannel::DoApplyContentConversions", [self]() { nsCOMPtr listener; nsresult rv = self->DoApplyContentConversions( self->mListener, getter_AddRefs(listener), nullptr); self->AfterApplyContentConversions(rv, listener); }), NS_DISPATCH_NORMAL); if (NS_FAILED(rv)) { Resume(); return rv; } return NS_OK; } void TRRServiceChannel::AfterApplyContentConversions( nsresult aResult, nsIStreamListener* aListener) { LOG(("TRRServiceChannel::AfterApplyContentConversions [this=%p]", this)); if (!mCurrentEventTarget->IsOnCurrentThread()) { RefPtr self = this; nsCOMPtr listener = aListener; self->mCurrentEventTarget->Dispatch( NS_NewRunnableFunction( "TRRServiceChannel::AfterApplyContentConversions", [self, aResult, listener]() { self->Resume(); self->AfterApplyContentConversions(aResult, listener); }), NS_DISPATCH_NORMAL); return; } if (mCanceled) { return; } if (NS_FAILED(aResult)) { Unused << AsyncAbort(aResult); return; } if (aListener) { mListener = aListener; mCompressListener = aListener; StoreHasAppliedConversion(true); } } void TRRServiceChannel::ProcessAltService() { // e.g. Alt-Svc: h2=":443"; ma=60 // e.g. Alt-Svc: h2="otherhost:443" // Alt-Svc = 1#( alternative *( OWS ";" OWS parameter ) ) // alternative = protocol-id "=" alt-authority // protocol-id = token ; percent-encoded ALPN protocol identifier // alt-authority = quoted-string ; containing [ uri-host ] ":" port if (!LoadAllowAltSvc()) { // per channel opt out return; } if (!gHttpHandler->AllowAltSvc() || (mCaps & NS_HTTP_DISALLOW_SPDY)) { return; } nsCString scheme; mURI->GetScheme(scheme); bool isHttp = scheme.EqualsLiteral("http"); if (!isHttp && !scheme.EqualsLiteral("https")) { return; } nsCString altSvc; Unused << mResponseHead->GetHeader(nsHttp::Alternate_Service, altSvc); if (altSvc.IsEmpty()) { return; } if (!nsHttp::IsReasonableHeaderValue(altSvc)) { LOG(("Alt-Svc Response Header seems unreasonable - skipping\n")); return; } nsCString originHost; int32_t originPort = 80; mURI->GetPort(&originPort); if (NS_FAILED(mURI->GetAsciiHost(originHost))) { return; } nsCOMPtr callbacks; nsCOMPtr proxyInfo; NS_NewNotificationCallbacksAggregation(mCallbacks, mLoadGroup, getter_AddRefs(callbacks)); if (mProxyInfo) { proxyInfo = do_QueryInterface(mProxyInfo); } auto processHeaderTask = [altSvc, scheme, originHost, originPort, userName(mUsername), privateBrowsing(mPrivateBrowsing), callbacks, proxyInfo, caps(mCaps)]() { if (XRE_IsSocketProcess()) { AltServiceChild::ProcessHeader(altSvc, scheme, originHost, originPort, userName, privateBrowsing, callbacks, proxyInfo, caps & NS_HTTP_DISALLOW_SPDY, OriginAttributes()); return; } AltSvcMapping::ProcessHeader( altSvc, scheme, originHost, originPort, userName, privateBrowsing, callbacks, proxyInfo, caps & NS_HTTP_DISALLOW_SPDY, OriginAttributes()); }; if (NS_IsMainThread()) { processHeaderTask(); return; } NS_DispatchToMainThread(NS_NewRunnableFunction( "TRRServiceChannel::ProcessAltService", std::move(processHeaderTask))); } NS_IMETHODIMP TRRServiceChannel::OnStartRequest(nsIRequest* request) { LOG(("TRRServiceChannel::OnStartRequest [this=%p request=%p status=%" PRIx32 "]\n", this, request, static_cast(static_cast(mStatus)))); if (!(mCanceled || NS_FAILED(mStatus))) { // capture the request's status, so our consumers will know ASAP of any // connection failures, etc - bug 93581 nsresult status; request->GetStatus(&status); mStatus = status; } MOZ_ASSERT(request == mTransactionPump, "Unexpected request"); StoreAfterOnStartRequestBegun(true); if (mTransaction) { if (!mSecurityInfo) { // grab the security info from the connection object; the transaction // is guaranteed to own a reference to the connection. mSecurityInfo = mTransaction->SecurityInfo(); } } if (NS_SUCCEEDED(mStatus) && mTransaction) { // mTransactionPump doesn't hit OnInputStreamReady and call this until // all of the response headers have been acquired, so we can take // ownership of them from the transaction. mResponseHead = mTransaction->TakeResponseHead(); if (mResponseHead) { uint32_t httpStatus = mResponseHead->Status(); if ((httpStatus < 500) && (httpStatus != 421) && (httpStatus != 407)) { ProcessAltService(); } if (httpStatus == 300 || httpStatus == 301 || httpStatus == 302 || httpStatus == 303 || httpStatus == 307 || httpStatus == 308) { nsresult rv = SyncProcessRedirection(httpStatus); if (NS_SUCCEEDED(rv)) { return rv; } mStatus = rv; DoNotifyListener(); return rv; } } else { NS_WARNING("No response head in OnStartRequest"); } } // avoid crashing if mListener happens to be null... if (!mListener) { MOZ_ASSERT_UNREACHABLE("mListener is null"); return NS_OK; } return CallOnStartRequest(); } nsresult TRRServiceChannel::SyncProcessRedirection(uint32_t aHttpStatus) { nsAutoCString location; // if a location header was not given, then we can't perform the redirect, // so just carry on as though this were a normal response. if (NS_FAILED(mResponseHead->GetHeader(nsHttp::Location, location))) { return NS_ERROR_FAILURE; } // make sure non-ASCII characters in the location header are escaped. nsAutoCString locationBuf; if (NS_EscapeURL(location.get(), -1, esc_OnlyNonASCII | esc_Spaces, locationBuf)) { location = locationBuf; } LOG(("redirecting to: %s [redirection-limit=%u]\n", location.get(), uint32_t(mRedirectionLimit))); nsCOMPtr redirectURI; nsresult rv = NS_NewURI(getter_AddRefs(redirectURI), location); if (NS_FAILED(rv)) { LOG(("Invalid URI for redirect: Location: %s\n", location.get())); return NS_ERROR_CORRUPTED_CONTENT; } // move the reference of the old location to the new one if the new // one has none. PropagateReferenceIfNeeded(mURI, redirectURI); bool rewriteToGET = ShouldRewriteRedirectToGET(aHttpStatus, mRequestHead.ParsedMethod()); // Let's not rewrite the method to GET for TRR requests. if (rewriteToGET) { return NS_ERROR_FAILURE; } // If the method is not safe (such as POST, PUT, DELETE, ...) if (!mRequestHead.IsSafeMethod()) { LOG(("TRRServiceChannel: unsafe redirect to:%s\n", location.get())); } uint32_t redirectFlags; if (nsHttp::IsPermanentRedirect(aHttpStatus)) { redirectFlags = nsIChannelEventSink::REDIRECT_PERMANENT; } else { redirectFlags = nsIChannelEventSink::REDIRECT_TEMPORARY; } nsCOMPtr newChannel; nsCOMPtr redirectLoadInfo = static_cast(mLoadInfo.get())->Clone(); rv = gHttpHandler->CreateTRRServiceChannel(redirectURI, nullptr, 0, nullptr, redirectLoadInfo, getter_AddRefs(newChannel)); if (NS_FAILED(rv)) { return rv; } rv = SetupReplacementChannel(redirectURI, newChannel, !rewriteToGET, redirectFlags); if (NS_FAILED(rv)) { return rv; } // Make sure to do this after we received redirect veto answer, // i.e. after all sinks had been notified newChannel->SetOriginalURI(mOriginalURI); rv = newChannel->AsyncOpen(mListener); LOG((" new channel AsyncOpen returned %" PRIX32, static_cast(rv))); // close down this channel Cancel(NS_BINDING_REDIRECTED); ReleaseListeners(); return NS_OK; } nsresult TRRServiceChannel::SetupReplacementChannel(nsIURI* aNewURI, nsIChannel* aNewChannel, bool aPreserveMethod, uint32_t aRedirectFlags) { LOG( ("TRRServiceChannel::SetupReplacementChannel " "[this=%p newChannel=%p preserveMethod=%d]", this, aNewChannel, aPreserveMethod)); nsresult rv = HttpBaseChannel::SetupReplacementChannel( aNewURI, aNewChannel, aPreserveMethod, aRedirectFlags); if (NS_FAILED(rv)) { return rv; } rv = CheckRedirectLimit(aRedirectFlags); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr httpChannel = do_QueryInterface(aNewChannel); if (!httpChannel) { MOZ_ASSERT(false); return NS_ERROR_FAILURE; } // convey the ApplyConversion flag (bug 91862) nsCOMPtr encodedChannel = do_QueryInterface(httpChannel); if (encodedChannel) { encodedChannel->SetApplyConversion(LoadApplyConversion()); } // mContentTypeHint is empty when this channel is used to download // ODoHConfigs. if (mContentTypeHint.IsEmpty()) { return NS_OK; } // Make sure we set content-type on the old channel properly. MOZ_ASSERT(mContentTypeHint.Equals("application/dns-message") || mContentTypeHint.Equals("application/oblivious-dns-message")); // Apply TRR specific settings. Note that we already know mContentTypeHint is // "application/dns-message" or "application/oblivious-dns-message" here. return TRR::SetupTRRServiceChannelInternal( httpChannel, mRequestHead.ParsedMethod() == nsHttpRequestHead::kMethod_Get, mContentTypeHint); } NS_IMETHODIMP TRRServiceChannel::OnDataAvailable(nsIRequest* request, nsIInputStream* input, uint64_t offset, uint32_t count) { LOG(("TRRServiceChannel::OnDataAvailable [this=%p request=%p offset=%" PRIu64 " count=%" PRIu32 "]\n", this, request, offset, count)); // don't send out OnDataAvailable notifications if we've been canceled. if (mCanceled) return mStatus; MOZ_ASSERT(mResponseHead, "No response head in ODA!!"); if (mListener) { return mListener->OnDataAvailable(this, input, offset, count); } return NS_ERROR_ABORT; } NS_IMETHODIMP TRRServiceChannel::OnStopRequest(nsIRequest* request, nsresult status) { LOG(("TRRServiceChannel::OnStopRequest [this=%p request=%p status=%" PRIx32 "]\n", this, request, static_cast(status))); if (mCanceled || NS_FAILED(mStatus)) status = mStatus; mTransactionTimings = mTransaction->Timings(); mTransaction = nullptr; mTransactionPump = nullptr; if (mListener) { LOG(("TRRServiceChannel %p calling OnStopRequest\n", this)); MOZ_ASSERT(LoadOnStartRequestCalled(), "OnStartRequest should be called before OnStopRequest"); MOZ_ASSERT(!LoadOnStopRequestCalled(), "We should not call OnStopRequest twice"); StoreOnStopRequestCalled(true); mListener->OnStopRequest(this, status); } StoreOnStopRequestCalled(true); mDNSPrefetch = nullptr; if (mLoadGroup) { mLoadGroup->RemoveRequest(this, nullptr, status); } ReleaseListeners(); return NS_OK; } NS_IMETHODIMP TRRServiceChannel::OnLookupComplete(nsICancelable* request, nsIDNSRecord* rec, nsresult status) { LOG( ("TRRServiceChannel::OnLookupComplete [this=%p] prefetch complete%s: " "%s status[0x%" PRIx32 "]\n", this, mCaps & NS_HTTP_REFRESH_DNS ? ", refresh requested" : "", NS_SUCCEEDED(status) ? "success" : "failure", static_cast(status))); // We no longer need the dns prefetch object. Note: mDNSPrefetch could be // validly null if OnStopRequest has already been called. // We only need the domainLookup timestamps when not loading from cache if (mDNSPrefetch && mDNSPrefetch->TimingsValid() && mTransaction) { TimeStamp connectStart = mTransaction->GetConnectStart(); TimeStamp requestStart = mTransaction->GetRequestStart(); // We only set the domainLookup timestamps if we're not using a // persistent connection. if (requestStart.IsNull() && connectStart.IsNull()) { mTransaction->SetDomainLookupStart(mDNSPrefetch->StartTimestamp()); mTransaction->SetDomainLookupEnd(mDNSPrefetch->EndTimestamp()); } } mDNSPrefetch = nullptr; // Unset DNS cache refresh if it was requested, if (mCaps & NS_HTTP_REFRESH_DNS) { mCaps &= ~NS_HTTP_REFRESH_DNS; if (mTransaction) { mTransaction->SetDNSWasRefreshed(); } } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::LogBlockedCORSRequest(const nsAString& aMessage, const nsACString& aCategory) { return NS_ERROR_NOT_IMPLEMENTED; } NS_IMETHODIMP TRRServiceChannel::LogMimeTypeMismatch(const nsACString& aMessageName, bool aWarning, const nsAString& aURL, const nsAString& aContentType) { return NS_ERROR_NOT_IMPLEMENTED; } NS_IMETHODIMP TRRServiceChannel::GetIsAuthChannel(bool* aIsAuthChannel) { return NS_ERROR_NOT_IMPLEMENTED; } NS_IMETHODIMP TRRServiceChannel::SetNotificationCallbacks(nsIInterfaceRequestor* aCallbacks) { mCallbacks = aCallbacks; return NS_OK; } NS_IMETHODIMP TRRServiceChannel::SetPriority(int32_t value) { return NS_ERROR_NOT_IMPLEMENTED; } void TRRServiceChannel::OnClassOfServiceUpdated() { LOG(("TRRServiceChannel::OnClassOfServiceUpdated this=%p, cos=%lu inc=%d", this, mClassOfService.Flags(), mClassOfService.Incremental())); if (mTransaction) { gHttpHandler->UpdateClassOfServiceOnTransaction(mTransaction, mClassOfService); } } NS_IMETHODIMP TRRServiceChannel::SetClassFlags(uint32_t inFlags) { uint32_t previous = mClassOfService.Flags(); mClassOfService.SetFlags(inFlags); if (previous != mClassOfService.Flags()) { OnClassOfServiceUpdated(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::SetIncremental(bool inFlag) { bool previous = mClassOfService.Incremental(); mClassOfService.SetIncremental(inFlag); if (previous != mClassOfService.Incremental()) { OnClassOfServiceUpdated(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::SetClassOfService(ClassOfService cos) { ClassOfService previous = mClassOfService; mClassOfService = cos; if (previous != mClassOfService) { OnClassOfServiceUpdated(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::AddClassFlags(uint32_t inFlags) { uint32_t previous = mClassOfService.Flags(); mClassOfService.SetFlags(inFlags | mClassOfService.Flags()); if (previous != mClassOfService.Flags()) { OnClassOfServiceUpdated(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::ClearClassFlags(uint32_t inFlags) { uint32_t previous = mClassOfService.Flags(); mClassOfService.SetFlags(~inFlags & mClassOfService.Flags()); if (previous != mClassOfService.Flags()) { OnClassOfServiceUpdated(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::ResumeAt(uint64_t aStartPos, const nsACString& aEntityID) { return NS_ERROR_NOT_IMPLEMENTED; } void TRRServiceChannel::DoAsyncAbort(nsresult aStatus) { Unused << AsyncAbort(aStatus); } NS_IMETHODIMP TRRServiceChannel::GetProxyInfo(nsIProxyInfo** result) { if (!mConnectionInfo) { *result = do_AddRef(mProxyInfo).take(); } else { *result = do_AddRef(mConnectionInfo->ProxyInfo()).take(); } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetHttpProxyConnectResponseCode( int32_t* aResponseCode) { NS_ENSURE_ARG_POINTER(aResponseCode); *aResponseCode = -1; return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetLoadFlags(nsLoadFlags* aLoadFlags) { return HttpBaseChannel::GetLoadFlags(aLoadFlags); } NS_IMETHODIMP TRRServiceChannel::SetLoadFlags(nsLoadFlags aLoadFlags) { if (aLoadFlags & (nsICachingChannel::LOAD_ONLY_FROM_CACHE | LOAD_FROM_CACHE | nsICachingChannel::LOAD_NO_NETWORK_IO)) { MOZ_ASSERT(false, "Wrong load flags!"); return NS_ERROR_FAILURE; } return HttpBaseChannel::SetLoadFlags(aLoadFlags); } NS_IMETHODIMP TRRServiceChannel::GetURI(nsIURI** aURI) { return HttpBaseChannel::GetURI(aURI); } NS_IMETHODIMP TRRServiceChannel::GetNotificationCallbacks( nsIInterfaceRequestor** aCallbacks) { return HttpBaseChannel::GetNotificationCallbacks(aCallbacks); } NS_IMETHODIMP TRRServiceChannel::GetLoadGroup(nsILoadGroup** aLoadGroup) { return HttpBaseChannel::GetLoadGroup(aLoadGroup); } NS_IMETHODIMP TRRServiceChannel::GetRequestMethod(nsACString& aMethod) { return HttpBaseChannel::GetRequestMethod(aMethod); } void TRRServiceChannel::DoNotifyListener() { LOG(("TRRServiceChannel::DoNotifyListener this=%p", this)); // In case nsHttpChannel::OnStartRequest wasn't called (e.g. due to flag // LOAD_ONLY_IF_MODIFIED) we want to set AfterOnStartRequestBegun to true // before notifying listener. if (!LoadAfterOnStartRequestBegun()) { StoreAfterOnStartRequestBegun(true); } if (mListener && !LoadOnStartRequestCalled()) { nsCOMPtr listener = mListener; StoreOnStartRequestCalled(true); listener->OnStartRequest(this); } StoreOnStartRequestCalled(true); // Make sure IsPending is set to false. At this moment we are done from // the point of view of our consumer and we have to report our self // as not-pending. StoreIsPending(false); if (mListener && !LoadOnStopRequestCalled()) { nsCOMPtr listener = mListener; StoreOnStopRequestCalled(true); listener->OnStopRequest(this, mStatus); } StoreOnStopRequestCalled(true); // We have to make sure to drop the references to listeners and callbacks // no longer needed. ReleaseListeners(); DoNotifyListenerCleanup(); } void TRRServiceChannel::DoNotifyListenerCleanup() {} NS_IMETHODIMP TRRServiceChannel::GetDomainLookupStart(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetDomainLookupStart(); } else { *_retval = mTransactionTimings.domainLookupStart; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetDomainLookupEnd(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetDomainLookupEnd(); } else { *_retval = mTransactionTimings.domainLookupEnd; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetConnectStart(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetConnectStart(); } else { *_retval = mTransactionTimings.connectStart; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetTcpConnectEnd(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetTcpConnectEnd(); } else { *_retval = mTransactionTimings.tcpConnectEnd; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetSecureConnectionStart(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetSecureConnectionStart(); } else { *_retval = mTransactionTimings.secureConnectionStart; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetConnectEnd(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetConnectEnd(); } else { *_retval = mTransactionTimings.connectEnd; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetRequestStart(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetRequestStart(); } else { *_retval = mTransactionTimings.requestStart; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetResponseStart(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetResponseStart(); } else { *_retval = mTransactionTimings.responseStart; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::GetResponseEnd(TimeStamp* _retval) { if (mTransaction) { *_retval = mTransaction->GetResponseEnd(); } else { *_retval = mTransactionTimings.responseEnd; } return NS_OK; } NS_IMETHODIMP TRRServiceChannel::SetLoadGroup(nsILoadGroup* aLoadGroup) { return NS_OK; } NS_IMETHODIMP TRRServiceChannel::TimingAllowCheck(nsIPrincipal* aOrigin, bool* aResult) { NS_ENSURE_ARG_POINTER(aResult); *aResult = true; return NS_OK; } bool TRRServiceChannel::SameOriginWithOriginalUri(nsIURI* aURI) { return true; } } // namespace mozilla::net