/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "PreloaderBase.h" #include "mozilla/dom/Document.h" #include "mozilla/Telemetry.h" #include "nsContentUtils.h" #include "nsIAsyncVerifyRedirectCallback.h" #include "nsIChannel.h" #include "nsILoadGroup.h" #include "nsIInterfaceRequestorUtils.h" #include "nsIRedirectResultListener.h" // Change this if we want to cancel and remove the associated preload on removal // of all tags from the tree. constexpr static bool kCancelAndRemovePreloadOnZeroReferences = false; namespace mozilla { PreloaderBase::UsageTimer::UsageTimer(PreloaderBase* aPreload, dom::Document* aDocument) : mDocument(aDocument), mPreload(aPreload) {} class PreloaderBase::RedirectSink final : public nsIInterfaceRequestor, public nsIChannelEventSink, public nsIRedirectResultListener { RedirectSink() = delete; virtual ~RedirectSink(); public: NS_DECL_THREADSAFE_ISUPPORTS NS_DECL_NSIINTERFACEREQUESTOR NS_DECL_NSICHANNELEVENTSINK NS_DECL_NSIREDIRECTRESULTLISTENER RedirectSink(PreloaderBase* aPreloader, nsIInterfaceRequestor* aCallbacks); private: MainThreadWeakPtr mPreloader; nsCOMPtr mCallbacks; nsCOMPtr mRedirectChannel; }; PreloaderBase::RedirectSink::RedirectSink(PreloaderBase* aPreloader, nsIInterfaceRequestor* aCallbacks) : mPreloader(aPreloader), mCallbacks(aCallbacks) {} PreloaderBase::RedirectSink::~RedirectSink() = default; NS_IMPL_ISUPPORTS(PreloaderBase::RedirectSink, nsIInterfaceRequestor, nsIChannelEventSink, nsIRedirectResultListener) NS_IMETHODIMP PreloaderBase::RedirectSink::AsyncOnChannelRedirect( nsIChannel* aOldChannel, nsIChannel* aNewChannel, uint32_t aFlags, nsIAsyncVerifyRedirectCallback* aCallback) { MOZ_DIAGNOSTIC_ASSERT(NS_IsMainThread()); mRedirectChannel = aNewChannel; // Deliberately adding this before confirmation. nsCOMPtr uri; aNewChannel->GetOriginalURI(getter_AddRefs(uri)); if (mPreloader) { mPreloader->mRedirectRecords.AppendElement( RedirectRecord(aFlags, uri.forget())); } if (mCallbacks) { nsCOMPtr sink(do_GetInterface(mCallbacks)); if (sink) { return sink->AsyncOnChannelRedirect(aOldChannel, aNewChannel, aFlags, aCallback); } } aCallback->OnRedirectVerifyCallback(NS_OK); return NS_OK; } NS_IMETHODIMP PreloaderBase::RedirectSink::OnRedirectResult(nsresult status) { if (NS_SUCCEEDED(status) && mRedirectChannel) { mPreloader->mChannel = std::move(mRedirectChannel); } else { mRedirectChannel = nullptr; } if (mCallbacks) { nsCOMPtr sink(do_GetInterface(mCallbacks)); if (sink) { return sink->OnRedirectResult(status); } } return NS_OK; } NS_IMETHODIMP PreloaderBase::RedirectSink::GetInterface(const nsIID& aIID, void** aResult) { NS_ENSURE_ARG_POINTER(aResult); if (aIID.Equals(NS_GET_IID(nsIChannelEventSink)) || aIID.Equals(NS_GET_IID(nsIRedirectResultListener))) { return QueryInterface(aIID, aResult); } if (mCallbacks) { return mCallbacks->GetInterface(aIID, aResult); } *aResult = nullptr; return NS_ERROR_NO_INTERFACE; } PreloaderBase::~PreloaderBase() { MOZ_ASSERT(NS_IsMainThread()); } // static void PreloaderBase::AddLoadBackgroundFlag(nsIChannel* aChannel) { nsLoadFlags loadFlags; aChannel->GetLoadFlags(&loadFlags); aChannel->SetLoadFlags(loadFlags | nsIRequest::LOAD_BACKGROUND); } void PreloaderBase::NotifyOpen(const PreloadHashKey& aKey, dom::Document* aDocument, bool aIsPreload) { if (aDocument) { DebugOnly alreadyRegistered = aDocument->Preloads().RegisterPreload(aKey, this); // This means there is already a preload registered under this key in this // document. We only allow replacement when this is a regular load. // Otherwise, this should never happen and is a suspected misuse of the API. MOZ_ASSERT_IF(alreadyRegistered, !aIsPreload); } mKey = aKey; mIsUsed = !aIsPreload; if (!mIsUsed && !mUsageTimer) { auto callback = MakeRefPtr(this, aDocument); NS_NewTimerWithCallback(getter_AddRefs(mUsageTimer), callback, 10000, nsITimer::TYPE_ONE_SHOT); } ReportUsageTelemetry(); } void PreloaderBase::NotifyOpen(const PreloadHashKey& aKey, nsIChannel* aChannel, dom::Document* aDocument, bool aIsPreload) { NotifyOpen(aKey, aDocument, aIsPreload); mChannel = aChannel; nsCOMPtr callbacks; mChannel->GetNotificationCallbacks(getter_AddRefs(callbacks)); RefPtr sink(new RedirectSink(this, callbacks)); mChannel->SetNotificationCallbacks(sink); } void PreloaderBase::NotifyUsage(LoadBackground aLoadBackground) { if (!mIsUsed && mChannel && aLoadBackground == LoadBackground::Drop) { nsLoadFlags loadFlags; mChannel->GetLoadFlags(&loadFlags); // Preloads are initially set the LOAD_BACKGROUND flag. When becoming // regular loads by hitting its consuming tag, we need to drop that flag, // which also means to re-add the request from/to it's loadgroup to reflect // that flag change. if (loadFlags & nsIRequest::LOAD_BACKGROUND) { nsCOMPtr loadGroup; mChannel->GetLoadGroup(getter_AddRefs(loadGroup)); if (loadGroup) { nsresult status; mChannel->GetStatus(&status); nsresult rv = loadGroup->RemoveRequest(mChannel, nullptr, status); mChannel->SetLoadFlags(loadFlags & ~nsIRequest::LOAD_BACKGROUND); if (NS_SUCCEEDED(rv)) { loadGroup->AddRequest(mChannel, nullptr); } } } } mIsUsed = true; ReportUsageTelemetry(); CancelUsageTimer(); } void PreloaderBase::RemoveSelf(dom::Document* aDocument) { if (aDocument) { aDocument->Preloads().DeregisterPreload(mKey); } } void PreloaderBase::NotifyRestart(dom::Document* aDocument, PreloaderBase* aNewPreloader) { RemoveSelf(aDocument); mKey = PreloadHashKey(); CancelUsageTimer(); if (aNewPreloader) { aNewPreloader->mNodes = std::move(mNodes); } } void PreloaderBase::NotifyStart(nsIRequest* aRequest) { // If there is no channel assigned on this preloader, we are not between // channel switching, so we can freely update the mShouldFireLoadEvent using // the given channel. if (mChannel && !SameCOMIdentity(aRequest, mChannel)) { return; } nsCOMPtr httpChannel = do_QueryInterface(aRequest); if (!httpChannel) { return; } // if the load is cross origin without CORS, or the CORS access is rejected, // always fire load event to avoid leaking site information. nsresult rv; nsCOMPtr loadInfo = httpChannel->LoadInfo(); mShouldFireLoadEvent = loadInfo->GetTainting() == LoadTainting::Opaque || (loadInfo->GetTainting() == LoadTainting::CORS && (NS_FAILED(httpChannel->GetStatus(&rv)) || NS_FAILED(rv))); } void PreloaderBase::NotifyStop(nsIRequest* aRequest, nsresult aStatus) { // Filter out notifications that may be arriving from the old channel before // restarting this request. if (!SameCOMIdentity(aRequest, mChannel)) { return; } NotifyStop(aStatus); } void PreloaderBase::NotifyStop(nsresult aStatus) { mOnStopStatus.emplace(aStatus); nsTArray nodes = std::move(mNodes); for (nsWeakPtr& weak : nodes) { nsCOMPtr node = do_QueryReferent(weak); if (node) { NotifyNodeEvent(node); } } mChannel = nullptr; } void PreloaderBase::NotifyValidating() { mOnStopStatus.reset(); } void PreloaderBase::NotifyValidated(nsresult aStatus) { NotifyStop(nullptr, aStatus); } void PreloaderBase::AddLinkPreloadNode(nsINode* aNode) { if (mOnStopStatus) { return NotifyNodeEvent(aNode); } mNodes.AppendElement(do_GetWeakReference(aNode)); } void PreloaderBase::RemoveLinkPreloadNode(nsINode* aNode) { // Note that do_GetWeakReference returns the internal weak proxy, which is // always the same, so we can use it to search the array using default // comparator. nsWeakPtr node = do_GetWeakReference(aNode); mNodes.RemoveElement(node); if (kCancelAndRemovePreloadOnZeroReferences && mNodes.Length() == 0 && !mIsUsed) { // Keep a reference, because the following call may release us. The caller // may use a WeakPtr to access this. RefPtr self(this); RemoveSelf(aNode->OwnerDoc()); if (mChannel) { mChannel->CancelWithReason(NS_BINDING_ABORTED, "PreloaderBase::RemoveLinkPreloadNode"_ns); } } } void PreloaderBase::NotifyNodeEvent(nsINode* aNode) { PreloadService::NotifyNodeEvent( aNode, mShouldFireLoadEvent || NS_SUCCEEDED(*mOnStopStatus)); } void PreloaderBase::CancelUsageTimer() { if (mUsageTimer) { mUsageTimer->Cancel(); mUsageTimer = nullptr; } } void PreloaderBase::ReportUsageTelemetry() { if (mUsageTelementryReported) { return; } mUsageTelementryReported = true; if (mKey.As() == PreloadHashKey::ResourceType::NONE) { return; } // The labels are structured as type1-used, type1-unused, type2-used, ... // The first "as" resource type is NONE with value 0. auto index = (static_cast(mKey.As()) - 1) * 2; if (!mIsUsed) { ++index; } auto label = static_cast(index); Telemetry::AccumulateCategorical(label); } nsresult PreloaderBase::AsyncConsume(nsIStreamListener* aListener) { // We want to return an error so that consumers can't ever use a preload to // consume data unless it's properly implemented. return NS_ERROR_NOT_IMPLEMENTED; } // PreloaderBase::RedirectRecord nsCString PreloaderBase::RedirectRecord::Spec() const { nsCOMPtr noFragment; NS_GetURIWithoutRef(mURI, getter_AddRefs(noFragment)); MOZ_ASSERT(noFragment); return noFragment->GetSpecOrDefault(); } nsCString PreloaderBase::RedirectRecord::Fragment() const { nsCString fragment; mURI->GetRef(fragment); return fragment; } // PreloaderBase::UsageTimer NS_IMPL_ISUPPORTS(PreloaderBase::UsageTimer, nsITimerCallback, nsINamed) NS_IMETHODIMP PreloaderBase::UsageTimer::Notify(nsITimer* aTimer) { if (!mPreload || !mDocument) { return NS_OK; } MOZ_ASSERT(aTimer == mPreload->mUsageTimer); mPreload->mUsageTimer = nullptr; if (mPreload->IsUsed()) { // Left in the hashtable, but marked as used. This is a valid case, and we // don't want to emit a warning for this preload then. return NS_OK; } mPreload->ReportUsageTelemetry(); // PreloadHashKey overrides GetKey, we need to use the nsURIHashKey one to get // the URI. nsIURI* uri = static_cast(&mPreload->mKey)->GetKey(); if (!uri) { return NS_OK; } nsString spec; NS_GetSanitizedURIStringFromURI(uri, spec); nsContentUtils::ReportToConsole(nsIScriptError::warningFlag, "DOM"_ns, mDocument, nsContentUtils::eDOM_PROPERTIES, "UnusedLinkPreloadPending", nsTArray({std::move(spec)})); return NS_OK; } NS_IMETHODIMP PreloaderBase::UsageTimer::GetName(nsACString& aName) { aName.AssignLiteral("PreloaderBase::UsageTimer"); return NS_OK; } } // namespace mozilla