File: | var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp |
Warning: | line 5612, column 3 Value stored to 'rv' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ |
2 | /* vim: set sw=2 ts=8 et tw=80 : */ |
3 | |
4 | /* This Source Code Form is subject to the terms of the Mozilla Public |
5 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
6 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
7 | |
8 | // HttpLog.h should generally be included first |
9 | #include "mozilla/net/HttpBaseChannel.h" |
10 | |
11 | #include <algorithm> |
12 | #include <utility> |
13 | |
14 | #include "HttpBaseChannel.h" |
15 | #include "HttpLog.h" |
16 | #include "LoadInfo.h" |
17 | #include "ReferrerInfo.h" |
18 | #include "mozIRemoteLazyInputStream.h" |
19 | #include "mozIThirdPartyUtil.h" |
20 | #include "mozilla/LoadInfo.h" |
21 | #include "mozilla/AntiTrackingUtils.h" |
22 | #include "mozilla/BasePrincipal.h" |
23 | #include "mozilla/BinarySearch.h" |
24 | #include "mozilla/ConsoleReportCollector.h" |
25 | #include "mozilla/DebugOnly.h" |
26 | #include "mozilla/InputStreamLengthHelper.h" |
27 | #include "mozilla/Mutex.h" |
28 | #include "mozilla/NullPrincipal.h" |
29 | #include "mozilla/PermissionManager.h" |
30 | #include "mozilla/Components.h" |
31 | #include "mozilla/StaticPrefs_browser.h" |
32 | #include "mozilla/StaticPrefs_fission.h" |
33 | #include "mozilla/StaticPrefs_network.h" |
34 | #include "mozilla/StaticPrefs_security.h" |
35 | #include "mozilla/glean/GleanMetrics.h" |
36 | #include "mozilla/Telemetry.h" |
37 | #include "mozilla/Tokenizer.h" |
38 | #include "mozilla/browser/NimbusFeatures.h" |
39 | #include "mozilla/dom/BrowsingContext.h" |
40 | #include "mozilla/dom/CanonicalBrowsingContext.h" |
41 | #include "mozilla/dom/Document.h" |
42 | #include "mozilla/dom/FetchPriority.h" |
43 | #include "mozilla/dom/nsHTTPSOnlyUtils.h" |
44 | #include "mozilla/dom/nsMixedContentBlocker.h" |
45 | #include "mozilla/dom/Performance.h" |
46 | #include "mozilla/dom/PerformanceStorage.h" |
47 | #include "mozilla/dom/ProcessIsolation.h" |
48 | #include "mozilla/dom/RequestBinding.h" |
49 | #include "mozilla/dom/WindowGlobalParent.h" |
50 | #include "mozilla/net/OpaqueResponseUtils.h" |
51 | #include "mozilla/net/UrlClassifierCommon.h" |
52 | #include "mozilla/net/UrlClassifierFeatureFactory.h" |
53 | #include "nsBufferedStreams.h" |
54 | #include "nsCOMPtr.h" |
55 | #include "nsCRT.h" |
56 | #include "nsContentSecurityManager.h" |
57 | #include "nsContentSecurityUtils.h" |
58 | #include "nsContentUtils.h" |
59 | #include "nsDebug.h" |
60 | #include "nsEscape.h" |
61 | #include "nsGlobalWindowInner.h" |
62 | #include "nsGlobalWindowOuter.h" |
63 | #include "nsHttpChannel.h" |
64 | #include "nsHTTPCompressConv.h" |
65 | #include "nsHttpHandler.h" |
66 | #include "nsICacheInfoChannel.h" |
67 | #include "nsICachingChannel.h" |
68 | #include "nsIChannelEventSink.h" |
69 | #include "nsIConsoleService.h" |
70 | #include "nsIContentPolicy.h" |
71 | #include "nsICookieService.h" |
72 | #include "nsIDOMWindowUtils.h" |
73 | #include "nsIDocShell.h" |
74 | #include "nsIDNSService.h" |
75 | #include "nsIEncodedChannel.h" |
76 | #include "nsIHttpHeaderVisitor.h" |
77 | #include "nsILoadGroupChild.h" |
78 | #include "nsIMIMEInputStream.h" |
79 | #include "nsIMultiplexInputStream.h" |
80 | #include "nsIMutableArray.h" |
81 | #include "nsINetworkInterceptController.h" |
82 | #include "nsIObserverService.h" |
83 | #include "nsIPrincipal.h" |
84 | #include "nsIProtocolProxyService.h" |
85 | #include "nsIScriptError.h" |
86 | #include "nsIScriptSecurityManager.h" |
87 | #include "nsISecurityConsoleMessage.h" |
88 | #include "nsISeekableStream.h" |
89 | #include "nsIStorageStream.h" |
90 | #include "nsIStreamConverterService.h" |
91 | #include "nsITimedChannel.h" |
92 | #include "nsITransportSecurityInfo.h" |
93 | #include "nsIURIMutator.h" |
94 | #include "nsMimeTypes.h" |
95 | #include "nsNetCID.h" |
96 | #include "nsNetUtil.h" |
97 | #include "nsPIDOMWindow.h" |
98 | #include "nsProxyRelease.h" |
99 | #include "nsReadableUtils.h" |
100 | #include "nsRedirectHistoryEntry.h" |
101 | #include "nsServerTiming.h" |
102 | #include "nsStreamListenerWrapper.h" |
103 | #include "nsStreamUtils.h" |
104 | #include "nsString.h" |
105 | #include "nsThreadUtils.h" |
106 | #include "nsURLHelper.h" |
107 | #include "mozilla/RemoteLazyInputStreamChild.h" |
108 | #include "mozilla/net/SFVService.h" |
109 | #include "mozilla/dom/ContentChild.h" |
110 | #include "nsQueryObject.h" |
111 | |
112 | using mozilla::dom::RequestMode; |
113 | |
114 | #define LOGORB(msg, ...)do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " msg, __func__, this, ...); } } while (0) \ |
115 | MOZ_LOG(GetORBLog(), LogLevel::Debug, \do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " msg, __func__, this, ##__VA_ARGS__ ); } } while (0) |
116 | ("%s: %p " msg, __func__, this, ##__VA_ARGS__))do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " msg, __func__, this, ##__VA_ARGS__ ); } } while (0) |
117 | |
118 | namespace mozilla { |
119 | namespace net { |
120 | |
121 | static bool IsHeaderBlacklistedForRedirectCopy(nsHttpAtom const& aHeader) { |
122 | // IMPORTANT: keep this list ASCII-code sorted |
123 | static nsHttpAtomLiteral const* blackList[] = { |
124 | &nsHttp::Accept, |
125 | &nsHttp::Accept_Encoding, |
126 | &nsHttp::Accept_Language, |
127 | &nsHttp::Alternate_Service_Used, |
128 | &nsHttp::Authentication, |
129 | &nsHttp::Authorization, |
130 | &nsHttp::Connection, |
131 | &nsHttp::Content_Length, |
132 | &nsHttp::Cookie, |
133 | &nsHttp::Host, |
134 | &nsHttp::If, |
135 | &nsHttp::If_Match, |
136 | &nsHttp::If_Modified_Since, |
137 | &nsHttp::If_None_Match, |
138 | &nsHttp::If_None_Match_Any, |
139 | &nsHttp::If_Range, |
140 | &nsHttp::If_Unmodified_Since, |
141 | &nsHttp::Proxy_Authenticate, |
142 | &nsHttp::Proxy_Authorization, |
143 | &nsHttp::Range, |
144 | &nsHttp::TE, |
145 | &nsHttp::Transfer_Encoding, |
146 | &nsHttp::Upgrade, |
147 | &nsHttp::User_Agent, |
148 | &nsHttp::WWW_Authenticate}; |
149 | |
150 | class HttpAtomComparator { |
151 | nsHttpAtom const& mTarget; |
152 | |
153 | public: |
154 | explicit HttpAtomComparator(nsHttpAtom const& aTarget) : mTarget(aTarget) {} |
155 | int operator()(nsHttpAtom const* aVal) const { |
156 | if (mTarget == *aVal) { |
157 | return 0; |
158 | } |
159 | return strcmp(mTarget.get(), aVal->get()); |
160 | } |
161 | int operator()(nsHttpAtomLiteral const* aVal) const { |
162 | if (mTarget == *aVal) { |
163 | return 0; |
164 | } |
165 | return strcmp(mTarget.get(), aVal->get()); |
166 | } |
167 | }; |
168 | |
169 | size_t unused; |
170 | return BinarySearchIf(blackList, 0, std::size(blackList), |
171 | HttpAtomComparator(aHeader), &unused); |
172 | } |
173 | |
174 | class AddHeadersToChannelVisitor final : public nsIHttpHeaderVisitor { |
175 | public: |
176 | NS_DECL_ISUPPORTSpublic: virtual nsresult QueryInterface(const nsIID& aIID , void** aInstancePtr) override; virtual MozExternalRefCountType AddRef(void) override; virtual MozExternalRefCountType Release (void) override; using HasThreadSafeRefCnt = std::false_type; protected: nsAutoRefCnt mRefCnt; nsAutoOwningThread _mOwningThread ; public: |
177 | |
178 | explicit AddHeadersToChannelVisitor(nsIHttpChannel* aChannel) |
179 | : mChannel(aChannel) {} |
180 | |
181 | NS_IMETHODvirtual nsresult VisitHeader(const nsACString& aHeader, |
182 | const nsACString& aValue) override { |
183 | nsHttpAtom atom = nsHttp::ResolveAtom(aHeader); |
184 | if (!IsHeaderBlacklistedForRedirectCopy(atom)) { |
185 | DebugOnly<nsresult> rv = |
186 | mChannel->SetRequestHeader(aHeader, aValue, false); |
187 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 187); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 187; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
188 | } |
189 | return NS_OK; |
190 | } |
191 | |
192 | private: |
193 | ~AddHeadersToChannelVisitor() = default; |
194 | |
195 | nsCOMPtr<nsIHttpChannel> mChannel; |
196 | }; |
197 | |
198 | NS_IMPL_ISUPPORTS(AddHeadersToChannelVisitor, nsIHttpHeaderVisitor)MozExternalRefCountType AddHeadersToChannelVisitor::AddRef(void ) { static_assert(!std::is_destructible_v<AddHeadersToChannelVisitor >, "Reference-counted class " "AddHeadersToChannelVisitor" " should not have a public destructor. " "Make this class's destructor non-public" ); do { static_assert( mozilla::detail::AssertionConditionType <decltype(int32_t(mRefCnt) >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) >= 0))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) >= 0" " (" "illegal refcnt" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 198); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) >= 0" ") (" "illegal refcnt" ")"); do { *((volatile int*)__null) = 198; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("AddHeadersToChannelVisitor" != nullptr)>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!("AddHeadersToChannelVisitor" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"AddHeadersToChannelVisitor\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 198); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"AddHeadersToChannelVisitor\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 198; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("AddHeadersToChannelVisitor" " not thread-safe" ); nsrefcnt count = ++mRefCnt; NS_LogAddRef((this), (count), ( "AddHeadersToChannelVisitor"), (uint32_t)(sizeof(*this))); return count; } MozExternalRefCountType AddHeadersToChannelVisitor:: Release(void) { do { static_assert( mozilla::detail::AssertionConditionType <decltype(int32_t(mRefCnt) > 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) > 0))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) > 0" " (" "dup release" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 198); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) > 0" ") (" "dup release" ")"); do { *((volatile int*)__null) = 198 ; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("AddHeadersToChannelVisitor" != nullptr)>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!("AddHeadersToChannelVisitor" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"AddHeadersToChannelVisitor\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 198); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"AddHeadersToChannelVisitor\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 198; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("AddHeadersToChannelVisitor" " not thread-safe" ); const char* const nametmp = "AddHeadersToChannelVisitor"; nsrefcnt count = --mRefCnt; NS_LogRelease((this), (count), (nametmp)) ; if (count == 0) { mRefCnt = 1; delete (this); return 0; } return count; } nsresult AddHeadersToChannelVisitor::QueryInterface (const nsIID& aIID, void** aInstancePtr) { do { if (!(aInstancePtr )) { NS_DebugBreak(NS_DEBUG_ASSERTION, "QueryInterface requires a non-NULL destination!" , "aInstancePtr", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 198); MOZ_PretendNoReturn(); } } while (0); nsresult rv = NS_ERROR_FAILURE ; static_assert(1 > 0, "Need more arguments to NS_INTERFACE_TABLE" ); static const QITableEntry table[] = { {&mozilla::detail ::kImplementedIID<AddHeadersToChannelVisitor, nsIHttpHeaderVisitor >, int32_t( reinterpret_cast<char*>(static_cast<nsIHttpHeaderVisitor *>((AddHeadersToChannelVisitor*)0x1000)) - reinterpret_cast <char*>((AddHeadersToChannelVisitor*)0x1000))}, {&mozilla ::detail::kImplementedIID<AddHeadersToChannelVisitor, nsISupports >, int32_t(reinterpret_cast<char*>(static_cast<nsISupports *>( static_cast<nsIHttpHeaderVisitor*>((AddHeadersToChannelVisitor *)0x1000))) - reinterpret_cast<char*>((AddHeadersToChannelVisitor *)0x1000))}, { nullptr, 0 } } ; static_assert(std::size(table ) > 1, "need at least 1 interface"); rv = NS_TableDrivenQI (static_cast<void*>(this), aIID, aInstancePtr, table); return rv; } |
199 | |
200 | static OpaqueResponseFilterFetch ConfiguredFilterFetchResponseBehaviour() { |
201 | uint32_t pref = StaticPrefs:: |
202 | browser_opaqueResponseBlocking_filterFetchResponse_DoNotUseDirectly(); |
203 | if (NS_WARN_IF(pref >NS_warn_if_impl(pref > static_cast<uint32_t>(OpaqueResponseFilterFetch ::All), "pref > static_cast<uint32_t>(OpaqueResponseFilterFetch::All)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 204) |
204 | static_cast<uint32_t>(OpaqueResponseFilterFetch::All))NS_warn_if_impl(pref > static_cast<uint32_t>(OpaqueResponseFilterFetch ::All), "pref > static_cast<uint32_t>(OpaqueResponseFilterFetch::All)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 204)) { |
205 | return OpaqueResponseFilterFetch::All; |
206 | } |
207 | |
208 | return static_cast<OpaqueResponseFilterFetch>(pref); |
209 | } |
210 | |
211 | HttpBaseChannel::HttpBaseChannel() |
212 | : mReportCollector(new ConsoleReportCollector()), |
213 | mHttpHandler(gHttpHandler), |
214 | mChannelCreationTime(0), |
215 | mComputedCrossOriginOpenerPolicy(nsILoadInfo::OPENER_POLICY_UNSAFE_NONE), |
216 | mStartPos(UINT64_MAX(18446744073709551615UL)), |
217 | mTransferSize(0), |
218 | mRequestSize(0), |
219 | mDecodedBodySize(0), |
220 | mSupportsHTTP3(false), |
221 | mEncodedBodySize(0), |
222 | mRequestContextID(0), |
223 | mContentWindowId(0), |
224 | mBrowserId(0), |
225 | mAltDataLength(-1), |
226 | mChannelId(0), |
227 | mReqContentLength(0U), |
228 | mStatus(NS_OK), |
229 | mCanceled(false), |
230 | mFirstPartyClassificationFlags(0), |
231 | mThirdPartyClassificationFlags(0), |
232 | mLoadFlags(LOAD_NORMAL), |
233 | mCaps(0), |
234 | mClassOfService(0, false), |
235 | mTlsFlags(0), |
236 | mSuspendCount(0), |
237 | mInitialRwin(0), |
238 | mProxyResolveFlags(0), |
239 | mContentDispositionHint(UINT32_MAX(4294967295U)), |
240 | mRequestMode(RequestMode::No_cors), |
241 | mRedirectMode(nsIHttpChannelInternal::REDIRECT_MODE_FOLLOW), |
242 | mLastRedirectFlags(0), |
243 | mPriority(PRIORITY_NORMAL), |
244 | mRedirectionLimit(gHttpHandler->RedirectionLimit()), |
245 | mRedirectCount(0), |
246 | mInternalRedirectCount(0), |
247 | mCachedOpaqueResponseBlockingPref( |
248 | StaticPrefs::browser_opaqueResponseBlocking()), |
249 | mChannelBlockedByOpaqueResponse(false), |
250 | mDummyChannelForCachedResource(false), |
251 | mHasContentDecompressed(false), |
252 | mRenderBlocking(false) { |
253 | StoreApplyConversion(true); |
254 | StoreAllowSTS(true); |
255 | StoreTracingEnabled(true); |
256 | StoreReportTiming(true); |
257 | StoreAllowSpdy(true); |
258 | StoreAllowHttp3(true); |
259 | StoreAllowAltSvc(true); |
260 | StoreResponseTimeoutEnabled(true); |
261 | StoreAllRedirectsSameOrigin(true); |
262 | StoreAllRedirectsPassTimingAllowCheck(true); |
263 | StoreUpgradableToSecure(true); |
264 | StoreIsUserAgentHeaderModified(false); |
265 | |
266 | this->mSelfAddr.inet = {}; |
267 | this->mPeerAddr.inet = {}; |
268 | LOG(("Creating HttpBaseChannel @%p\n", this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "Creating HttpBaseChannel @%p\n", this); } } while (0); |
269 | |
270 | // Subfields of unions cannot be targeted in an initializer list. |
271 | #ifdef MOZ_VALGRIND |
272 | // Zero the entire unions so that Valgrind doesn't complain when we send them |
273 | // to another process. |
274 | memset(&mSelfAddr, 0, sizeof(NetAddr)); |
275 | memset(&mPeerAddr, 0, sizeof(NetAddr)); |
276 | #endif |
277 | mSelfAddr.raw.family = PR_AF_UNSPEC0; |
278 | mPeerAddr.raw.family = PR_AF_UNSPEC0; |
279 | } |
280 | |
281 | HttpBaseChannel::~HttpBaseChannel() { |
282 | LOG(("Destroying HttpBaseChannel @%p\n", this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "Destroying HttpBaseChannel @%p\n", this); } } while (0); |
283 | |
284 | // Make sure we don't leak |
285 | CleanRedirectCacheChainIfNecessary(); |
286 | |
287 | ReleaseMainThreadOnlyReferences(); |
288 | } |
289 | |
290 | namespace { // anon |
291 | |
292 | class NonTailRemover : public nsISupports { |
293 | NS_DECL_THREADSAFE_ISUPPORTSpublic: virtual nsresult QueryInterface(const nsIID& aIID , void** aInstancePtr) override; virtual MozExternalRefCountType AddRef(void) override; virtual MozExternalRefCountType Release (void) override; using HasThreadSafeRefCnt = std::true_type; protected : ::mozilla::ThreadSafeAutoRefCnt mRefCnt; nsAutoOwningThread _mOwningThread; public: |
294 | |
295 | explicit NonTailRemover(nsIRequestContext* rc) : mRequestContext(rc) {} |
296 | |
297 | private: |
298 | virtual ~NonTailRemover() { |
299 | MOZ_ASSERT(NS_IsMainThread())do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 299); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ")"); do { *((volatile int*)__null) = 299; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
300 | mRequestContext->RemoveNonTailRequest(); |
301 | } |
302 | |
303 | nsCOMPtr<nsIRequestContext> mRequestContext; |
304 | }; |
305 | |
306 | NS_IMPL_ISUPPORTS0(NonTailRemover)MozExternalRefCountType NonTailRemover::AddRef(void) { static_assert (!std::is_destructible_v<NonTailRemover>, "Reference-counted class " "NonTailRemover" " should not have a public destructor. " "Make this class's destructor non-public" ); do { static_assert( mozilla::detail::AssertionConditionType <decltype(int32_t(mRefCnt) >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) >= 0))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) >= 0" " (" "illegal refcnt" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 306); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) >= 0" ") (" "illegal refcnt" ")"); do { *((volatile int*)__null) = 306; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("NonTailRemover" != nullptr)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!("NonTailRemover" != nullptr) )), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"NonTailRemover\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 306); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"NonTailRemover\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 306; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("NonTailRemover" " not thread-safe"); nsrefcnt count = ++mRefCnt; NS_LogAddRef((this), (count), ("NonTailRemover" ), (uint32_t)(sizeof(*this))); return count; } MozExternalRefCountType NonTailRemover::Release(void) { do { static_assert( mozilla:: detail::AssertionConditionType<decltype(int32_t(mRefCnt) > 0)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(int32_t(mRefCnt) > 0))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("int32_t(mRefCnt) > 0" " (" "dup release" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 306); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) > 0" ") (" "dup release" ")"); do { *((volatile int*)__null) = 306 ; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("NonTailRemover" != nullptr)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!("NonTailRemover" != nullptr) )), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"NonTailRemover\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 306); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"NonTailRemover\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 306; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("NonTailRemover" " not thread-safe"); const char * const nametmp = "NonTailRemover"; nsrefcnt count = --mRefCnt ; NS_LogRelease((this), (count), (nametmp)); if (count == 0) { mRefCnt = 1; delete (this); return 0; } return count; } nsresult NonTailRemover::QueryInterface(const nsIID& aIID, void** aInstancePtr) { do { if (!(aInstancePtr)) { NS_DebugBreak(NS_DEBUG_ASSERTION , "QueryInterface requires a non-NULL destination!", "aInstancePtr" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 306); MOZ_PretendNoReturn(); } } while (0); nsresult rv = NS_ERROR_FAILURE ; static const QITableEntry table[] = { {&mozilla::detail ::kImplementedIID<NonTailRemover, nsISupports>, int32_t ( reinterpret_cast<char*>(static_cast<nsISupports*> ((NonTailRemover*)0x1000)) - reinterpret_cast<char*>((NonTailRemover *)0x1000))}, { nullptr, 0 } } ; static_assert(std::size(table ) > 1, "need at least 1 interface"); rv = NS_TableDrivenQI (static_cast<void*>(this), aIID, aInstancePtr, table); return rv; } |
307 | |
308 | } // namespace |
309 | |
310 | void HttpBaseChannel::ReleaseMainThreadOnlyReferences() { |
311 | if (NS_IsMainThread()) { |
312 | // Already on main thread, let dtor to |
313 | // take care of releasing references |
314 | RemoveAsNonTailRequest(); |
315 | return; |
316 | } |
317 | |
318 | nsTArray<nsCOMPtr<nsISupports>> arrayToRelease; |
319 | arrayToRelease.AppendElement(mLoadGroup.forget()); |
320 | arrayToRelease.AppendElement(mLoadInfo.forget()); |
321 | arrayToRelease.AppendElement(mCallbacks.forget()); |
322 | arrayToRelease.AppendElement(mProgressSink.forget()); |
323 | arrayToRelease.AppendElement(mPrincipal.forget()); |
324 | arrayToRelease.AppendElement(mListener.forget()); |
325 | arrayToRelease.AppendElement(mCompressListener.forget()); |
326 | arrayToRelease.AppendElement(mORB.forget()); |
327 | |
328 | if (LoadAddedAsNonTailRequest()) { |
329 | // RemoveNonTailRequest() on our request context must be called on the main |
330 | // thread |
331 | MOZ_RELEASE_ASSERT(mRequestContext,do { static_assert( mozilla::detail::AssertionConditionType< decltype(mRequestContext)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mRequestContext))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mRequestContext" " (" "Someone released rc or set flags w/o having it?" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 332); AnnotateMozCrashReason("MOZ_RELEASE_ASSERT" "(" "mRequestContext" ") (" "Someone released rc or set flags w/o having it?" ")") ; do { *((volatile int*)__null) = 332; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
332 | "Someone released rc or set flags w/o having it?")do { static_assert( mozilla::detail::AssertionConditionType< decltype(mRequestContext)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mRequestContext))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mRequestContext" " (" "Someone released rc or set flags w/o having it?" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 332); AnnotateMozCrashReason("MOZ_RELEASE_ASSERT" "(" "mRequestContext" ") (" "Someone released rc or set flags w/o having it?" ")") ; do { *((volatile int*)__null) = 332; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
333 | |
334 | nsCOMPtr<nsISupports> nonTailRemover(new NonTailRemover(mRequestContext)); |
335 | arrayToRelease.AppendElement(nonTailRemover.forget()); |
336 | } |
337 | |
338 | NS_DispatchToMainThread(new ProxyReleaseRunnable(std::move(arrayToRelease))); |
339 | } |
340 | |
341 | void HttpBaseChannel::AddClassificationFlags(uint32_t aClassificationFlags, |
342 | bool aIsThirdParty) { |
343 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::AddClassificationFlags classificationFlags=%d " "thirdparty=%d %p", aClassificationFlags, static_cast<int >(aIsThirdParty), this); } } while (0) |
344 | ("HttpBaseChannel::AddClassificationFlags classificationFlags=%d "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::AddClassificationFlags classificationFlags=%d " "thirdparty=%d %p", aClassificationFlags, static_cast<int >(aIsThirdParty), this); } } while (0) |
345 | "thirdparty=%d %p",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::AddClassificationFlags classificationFlags=%d " "thirdparty=%d %p", aClassificationFlags, static_cast<int >(aIsThirdParty), this); } } while (0) |
346 | aClassificationFlags, static_cast<int>(aIsThirdParty), this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::AddClassificationFlags classificationFlags=%d " "thirdparty=%d %p", aClassificationFlags, static_cast<int >(aIsThirdParty), this); } } while (0); |
347 | |
348 | if (aIsThirdParty) { |
349 | mThirdPartyClassificationFlags |= aClassificationFlags; |
350 | } else { |
351 | mFirstPartyClassificationFlags |= aClassificationFlags; |
352 | } |
353 | } |
354 | |
355 | static bool isSecureOrTrustworthyURL(nsIURI* aURI) { |
356 | return aURI->SchemeIs("https") || |
357 | (StaticPrefs::network_http_encoding_trustworthy_is_https() && |
358 | nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackURL(aURI)); |
359 | } |
360 | |
361 | nsresult HttpBaseChannel::Init(nsIURI* aURI, uint32_t aCaps, |
362 | nsProxyInfo* aProxyInfo, |
363 | uint32_t aProxyResolveFlags, nsIURI* aProxyURI, |
364 | uint64_t aChannelId, |
365 | ExtContentPolicyType aContentPolicyType, |
366 | nsILoadInfo* aLoadInfo) { |
367 | LOG1(("HttpBaseChannel::Init [this=%p]\n", this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Error)), 0))) { mozilla:: detail::log_print(moz_real_module, mozilla::LogLevel::Error, "HttpBaseChannel::Init [this=%p]\n" , this); } } while (0); |
368 | |
369 | MOZ_ASSERT(aURI, "null uri")do { static_assert( mozilla::detail::AssertionConditionType< decltype(aURI)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(aURI))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("aURI" " (" "null uri" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 369); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aURI" ") (" "null uri" ")"); do { *((volatile int*)__null) = 369; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
370 | |
371 | mURI = aURI; |
372 | mOriginalURI = aURI; |
373 | mDocumentURI = nullptr; |
374 | mCaps = aCaps; |
375 | mProxyResolveFlags = aProxyResolveFlags; |
376 | mProxyURI = aProxyURI; |
377 | mChannelId = aChannelId; |
378 | mLoadInfo = aLoadInfo; |
379 | |
380 | // Construct connection info object |
381 | nsAutoCString host; |
382 | int32_t port = -1; |
383 | bool isHTTPS = isSecureOrTrustworthyURL(mURI); |
384 | |
385 | nsresult rv = mURI->GetAsciiHost(host); |
386 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) return rv; |
387 | |
388 | // Reject the URL if it doesn't specify a host |
389 | if (host.IsEmpty()) return NS_ERROR_MALFORMED_URI; |
390 | |
391 | rv = mURI->GetPort(&port); |
392 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) return rv; |
393 | |
394 | LOG1(("host=%s port=%d\n", host.get(), port))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Error)), 0))) { mozilla:: detail::log_print(moz_real_module, mozilla::LogLevel::Error, "host=%s port=%d\n" , host.get(), port); } } while (0); |
395 | |
396 | rv = mURI->GetAsciiSpec(mSpec); |
397 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) return rv; |
398 | LOG1(("uri=%s\n", mSpec.get()))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Error)), 0))) { mozilla:: detail::log_print(moz_real_module, mozilla::LogLevel::Error, "uri=%s\n" , mSpec.get()); } } while (0); |
399 | |
400 | // Assert default request method |
401 | MOZ_ASSERT(mRequestHead.EqualsMethod(nsHttpRequestHead::kMethod_Get))do { static_assert( mozilla::detail::AssertionConditionType< decltype(mRequestHead.EqualsMethod(nsHttpRequestHead::kMethod_Get ))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(mRequestHead.EqualsMethod(nsHttpRequestHead::kMethod_Get )))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("mRequestHead.EqualsMethod(nsHttpRequestHead::kMethod_Get)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 401); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mRequestHead.EqualsMethod(nsHttpRequestHead::kMethod_Get)" ")"); do { *((volatile int*)__null) = 401; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
402 | |
403 | // Set request headers |
404 | nsAutoCString hostLine; |
405 | rv = nsHttpHandler::GenerateHostPort(host, port, hostLine); |
406 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) return rv; |
407 | |
408 | rv = mRequestHead.SetHeader(nsHttp::Host, hostLine); |
409 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) return rv; |
410 | |
411 | rv = gHttpHandler->AddStandardRequestHeaders( |
412 | &mRequestHead, isHTTPS, aContentPolicyType, |
413 | nsContentUtils::ShouldResistFingerprinting(this, |
414 | RFPTarget::HttpUserAgent)); |
415 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) return rv; |
416 | |
417 | nsAutoCString type; |
418 | if (aProxyInfo && NS_SUCCEEDED(aProxyInfo->GetType(type))((bool)(__builtin_expect(!!(!NS_FAILED_impl(aProxyInfo->GetType (type))), 1))) && |
419 | !type.EqualsLiteral("unknown")) { |
420 | mProxyInfo = aProxyInfo; |
421 | } |
422 | |
423 | mCurrentThread = GetCurrentSerialEventTarget(); |
424 | return rv; |
425 | } |
426 | |
427 | //----------------------------------------------------------------------------- |
428 | // HttpBaseChannel::nsISupports |
429 | //----------------------------------------------------------------------------- |
430 | |
431 | NS_IMPL_ADDREF(HttpBaseChannel)MozExternalRefCountType HttpBaseChannel::AddRef(void) { static_assert (!std::is_destructible_v<HttpBaseChannel>, "Reference-counted class " "HttpBaseChannel" " should not have a public destructor. " "Make this class's destructor non-public" ); do { static_assert( mozilla::detail::AssertionConditionType <decltype(int32_t(mRefCnt) >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) >= 0))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) >= 0" " (" "illegal refcnt" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 431); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) >= 0" ") (" "illegal refcnt" ")"); do { *((volatile int*)__null) = 431; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("HttpBaseChannel" != nullptr)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!("HttpBaseChannel" != nullptr ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "\"HttpBaseChannel\" != nullptr" " (" "Must specify a name" ")" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 431); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"HttpBaseChannel\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 431; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("HttpBaseChannel" " not thread-safe"); nsrefcnt count = ++mRefCnt; NS_LogAddRef((this), (count), ("HttpBaseChannel" ), (uint32_t)(sizeof(*this))); return count; } |
432 | NS_IMPL_RELEASE(HttpBaseChannel)MozExternalRefCountType HttpBaseChannel::Release(void) { do { static_assert( mozilla::detail::AssertionConditionType<decltype (int32_t(mRefCnt) > 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) > 0))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) > 0" " (" "dup release" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 432); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) > 0" ") (" "dup release" ")"); do { *((volatile int*)__null) = 432 ; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("HttpBaseChannel" != nullptr)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!("HttpBaseChannel" != nullptr ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "\"HttpBaseChannel\" != nullptr" " (" "Must specify a name" ")" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 432); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"HttpBaseChannel\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 432; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("HttpBaseChannel" " not thread-safe"); const char* const nametmp = "HttpBaseChannel"; nsrefcnt count = -- mRefCnt; NS_LogRelease((this), (count), (nametmp)); if (count == 0) { mRefCnt = 1; delete (this); return 0; } return count ; } |
433 | |
434 | NS_INTERFACE_MAP_BEGIN(HttpBaseChannel)nsresult HttpBaseChannel::QueryInterface(const nsIID& aIID , void** aInstancePtr) { do { if (!(aInstancePtr)) { NS_DebugBreak (NS_DEBUG_ASSERTION, "QueryInterface requires a non-NULL destination!" , "aInstancePtr", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 434); MOZ_PretendNoReturn(); } } while (0); nsISupports* foundInterface ; |
435 | NS_INTERFACE_MAP_ENTRY(nsIRequest)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIRequest>)) foundInterface = static_cast <nsIRequest*>(this); else |
436 | NS_INTERFACE_MAP_ENTRY(nsIChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIChannel>)) foundInterface = static_cast <nsIChannel*>(this); else |
437 | NS_INTERFACE_MAP_ENTRY(nsIIdentChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIIdentChannel>)) foundInterface = static_cast<nsIIdentChannel*>(this); else |
438 | NS_INTERFACE_MAP_ENTRY(nsIEncodedChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIEncodedChannel>)) foundInterface = static_cast<nsIEncodedChannel*>(this); else |
439 | NS_INTERFACE_MAP_ENTRY(nsIHttpChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIHttpChannel>)) foundInterface = static_cast<nsIHttpChannel*>(this); else |
440 | NS_INTERFACE_MAP_ENTRY(nsIHttpChannelInternal)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIHttpChannelInternal>)) foundInterface = static_cast<nsIHttpChannelInternal*>(this); else |
441 | NS_INTERFACE_MAP_ENTRY(nsIForcePendingChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIForcePendingChannel>)) foundInterface = static_cast<nsIForcePendingChannel*>(this); else |
442 | NS_INTERFACE_MAP_ENTRY(nsIUploadChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIUploadChannel>)) foundInterface = static_cast<nsIUploadChannel*>(this); else |
443 | NS_INTERFACE_MAP_ENTRY(nsIFormPOSTActionChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIFormPOSTActionChannel>)) foundInterface = static_cast<nsIFormPOSTActionChannel*>(this); else |
444 | NS_INTERFACE_MAP_ENTRY(nsIUploadChannel2)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIUploadChannel2>)) foundInterface = static_cast<nsIUploadChannel2*>(this); else |
445 | NS_INTERFACE_MAP_ENTRY(nsISupportsPriority)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsISupportsPriority>)) foundInterface = static_cast<nsISupportsPriority*>(this); else |
446 | NS_INTERFACE_MAP_ENTRY(nsITraceableChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsITraceableChannel>)) foundInterface = static_cast<nsITraceableChannel*>(this); else |
447 | NS_INTERFACE_MAP_ENTRY(nsIPrivateBrowsingChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIPrivateBrowsingChannel>)) foundInterface = static_cast<nsIPrivateBrowsingChannel*>(this); else |
448 | NS_INTERFACE_MAP_ENTRY(nsITimedChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsITimedChannel>)) foundInterface = static_cast<nsITimedChannel*>(this); else |
449 | NS_INTERFACE_MAP_ENTRY(nsIConsoleReportCollector)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIConsoleReportCollector>)) foundInterface = static_cast<nsIConsoleReportCollector*>(this); else |
450 | NS_INTERFACE_MAP_ENTRY(nsIThrottledInputChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIThrottledInputChannel>)) foundInterface = static_cast<nsIThrottledInputChannel*>(this); else |
451 | NS_INTERFACE_MAP_ENTRY(nsIClassifiedChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIClassifiedChannel>)) foundInterface = static_cast<nsIClassifiedChannel*>(this); else |
452 | NS_INTERFACE_MAP_ENTRY_CONCRETE(HttpBaseChannel)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, HttpBaseChannel>)) { *aInstancePtr = do_AddRef(static_cast<HttpBaseChannel*>(this)).take( ); return NS_OK; } else |
453 | NS_INTERFACE_MAP_END_INHERITING(nsHashPropertyBag)foundInterface = 0; nsresult status; if (!foundInterface) status = nsHashPropertyBag::QueryInterface(aIID, (void**)&foundInterface ); else { (foundInterface)->AddRef(); status = NS_OK; } *aInstancePtr = foundInterface; return status; } |
454 | |
455 | //----------------------------------------------------------------------------- |
456 | // HttpBaseChannel::nsIRequest |
457 | //----------------------------------------------------------------------------- |
458 | |
459 | NS_IMETHODIMPnsresult |
460 | HttpBaseChannel::GetName(nsACString& aName) { |
461 | aName = mSpec; |
462 | return NS_OK; |
463 | } |
464 | |
465 | NS_IMETHODIMPnsresult |
466 | HttpBaseChannel::IsPending(bool* aIsPending) { |
467 | NS_ENSURE_ARG_POINTER(aIsPending)do { if ((__builtin_expect(!!(!(aIsPending)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aIsPending" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 467); return NS_ERROR_INVALID_POINTER; } } while (false); |
468 | *aIsPending = LoadIsPending() || LoadForcePending(); |
469 | return NS_OK; |
470 | } |
471 | |
472 | NS_IMETHODIMPnsresult |
473 | HttpBaseChannel::GetStatus(nsresult* aStatus) { |
474 | NS_ENSURE_ARG_POINTER(aStatus)do { if ((__builtin_expect(!!(!(aStatus)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aStatus" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 474); return NS_ERROR_INVALID_POINTER; } } while (false); |
475 | *aStatus = mStatus; |
476 | return NS_OK; |
477 | } |
478 | |
479 | NS_IMETHODIMPnsresult |
480 | HttpBaseChannel::GetLoadGroup(nsILoadGroup** aLoadGroup) { |
481 | NS_ENSURE_ARG_POINTER(aLoadGroup)do { if ((__builtin_expect(!!(!(aLoadGroup)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aLoadGroup" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 481); return NS_ERROR_INVALID_POINTER; } } while (false); |
482 | *aLoadGroup = do_AddRef(mLoadGroup).take(); |
483 | return NS_OK; |
484 | } |
485 | |
486 | NS_IMETHODIMPnsresult |
487 | HttpBaseChannel::SetLoadGroup(nsILoadGroup* aLoadGroup) { |
488 | MOZ_ASSERT(NS_IsMainThread(), "Should only be called on the main thread.")do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" " (" "Should only be called on the main thread." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 488); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ") (" "Should only be called on the main thread." ")"); do { *((volatile int*)__null) = 488; __attribute__((nomerge)) ::abort (); } while (false); } } while (false); |
489 | |
490 | if (!CanSetLoadGroup(aLoadGroup)) { |
491 | return NS_ERROR_FAILURE; |
492 | } |
493 | |
494 | mLoadGroup = aLoadGroup; |
495 | mProgressSink = nullptr; |
496 | UpdatePrivateBrowsing(); |
497 | return NS_OK; |
498 | } |
499 | |
500 | NS_IMETHODIMPnsresult |
501 | HttpBaseChannel::GetLoadFlags(nsLoadFlags* aLoadFlags) { |
502 | NS_ENSURE_ARG_POINTER(aLoadFlags)do { if ((__builtin_expect(!!(!(aLoadFlags)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aLoadFlags" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 502); return NS_ERROR_INVALID_POINTER; } } while (false); |
503 | *aLoadFlags = mLoadFlags; |
504 | return NS_OK; |
505 | } |
506 | |
507 | NS_IMETHODIMPnsresult |
508 | HttpBaseChannel::SetLoadFlags(nsLoadFlags aLoadFlags) { |
509 | mLoadFlags = aLoadFlags; |
510 | return NS_OK; |
511 | } |
512 | |
513 | NS_IMETHODIMPnsresult |
514 | HttpBaseChannel::GetTRRMode(nsIRequest::TRRMode* aTRRMode) { |
515 | if (!LoadIsOCSP()) { |
516 | return GetTRRModeImpl(aTRRMode); |
517 | } |
518 | |
519 | nsCOMPtr<nsIDNSService> dns = do_GetService(NS_DNSSERVICE_CONTRACTID"@mozilla.org/network/dns-service;1"); |
520 | nsIDNSService::ResolverMode trrMode = nsIDNSService::MODE_NATIVEONLY; |
521 | // If this is an OCSP channel, and the global TRR mode is TRR_ONLY (3) |
522 | // then we set the mode for this channel as TRR_DISABLED_MODE. |
523 | // We do this to prevent a TRR service channel's OCSP validation from |
524 | // blocking DNS resolution completely. |
525 | if (dns && NS_SUCCEEDED(dns->GetCurrentTrrMode(&trrMode))((bool)(__builtin_expect(!!(!NS_FAILED_impl(dns->GetCurrentTrrMode (&trrMode))), 1))) && |
526 | trrMode == nsIDNSService::MODE_TRRONLY) { |
527 | *aTRRMode = nsIRequest::TRR_DISABLED_MODE; |
528 | return NS_OK; |
529 | } |
530 | |
531 | return GetTRRModeImpl(aTRRMode); |
532 | } |
533 | |
534 | NS_IMETHODIMPnsresult |
535 | HttpBaseChannel::SetTRRMode(nsIRequest::TRRMode aTRRMode) { |
536 | return SetTRRModeImpl(aTRRMode); |
537 | } |
538 | |
539 | NS_IMETHODIMPnsresult |
540 | HttpBaseChannel::SetDocshellUserAgentOverride() { |
541 | RefPtr<dom::BrowsingContext> bc; |
542 | MOZ_ALWAYS_SUCCEEDS(mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))do { if ((__builtin_expect(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl (mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))), 1))) ), 1))) { } else { do { do { } while (false); MOZ_ReportCrash ("" "NS_SUCCEEDED(mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 542); AnnotateMozCrashReason("MOZ_CRASH(" "NS_SUCCEEDED(mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))" ")"); do { *((volatile int*)__null) = 542; __attribute__((nomerge )) ::abort(); } while (false); } while (false); } } while (false ); |
543 | if (!bc) { |
544 | return NS_OK; |
545 | } |
546 | |
547 | nsAutoString customUserAgent; |
548 | bc->GetCustomUserAgent(customUserAgent); |
549 | if (customUserAgent.IsEmpty() || customUserAgent.IsVoid()) { |
550 | return NS_OK; |
551 | } |
552 | |
553 | NS_ConvertUTF16toUTF8 utf8CustomUserAgent(customUserAgent); |
554 | nsresult rv = SetRequestHeaderInternal( |
555 | "User-Agent"_ns, utf8CustomUserAgent, false, |
556 | nsHttpHeaderArray::eVarietyRequestEnforceDefault); |
557 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
558 | return rv; |
559 | } |
560 | |
561 | return NS_OK; |
562 | } |
563 | |
564 | //----------------------------------------------------------------------------- |
565 | // HttpBaseChannel::nsIChannel |
566 | //----------------------------------------------------------------------------- |
567 | |
568 | NS_IMETHODIMPnsresult |
569 | HttpBaseChannel::GetOriginalURI(nsIURI** aOriginalURI) { |
570 | NS_ENSURE_ARG_POINTER(aOriginalURI)do { if ((__builtin_expect(!!(!(aOriginalURI)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aOriginalURI" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 570); return NS_ERROR_INVALID_POINTER; } } while (false); |
571 | *aOriginalURI = do_AddRef(mOriginalURI).take(); |
572 | return NS_OK; |
573 | } |
574 | |
575 | NS_IMETHODIMPnsresult |
576 | HttpBaseChannel::SetOriginalURI(nsIURI* aOriginalURI) { |
577 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 577); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 577, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 577); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 577); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 577; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
578 | |
579 | NS_ENSURE_ARG_POINTER(aOriginalURI)do { if ((__builtin_expect(!!(!(aOriginalURI)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aOriginalURI" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 579); return NS_ERROR_INVALID_POINTER; } } while (false); |
580 | mOriginalURI = aOriginalURI; |
581 | return NS_OK; |
582 | } |
583 | |
584 | NS_IMETHODIMPnsresult |
585 | HttpBaseChannel::GetURI(nsIURI** aURI) { |
586 | NS_ENSURE_ARG_POINTER(aURI)do { if ((__builtin_expect(!!(!(aURI)), 0))) { NS_DebugBreak( NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aURI" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 586); return NS_ERROR_INVALID_POINTER; } } while (false); |
587 | *aURI = do_AddRef(mURI).take(); |
588 | return NS_OK; |
589 | } |
590 | |
591 | NS_IMETHODIMPnsresult |
592 | HttpBaseChannel::GetOwner(nsISupports** aOwner) { |
593 | NS_ENSURE_ARG_POINTER(aOwner)do { if ((__builtin_expect(!!(!(aOwner)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aOwner" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 593); return NS_ERROR_INVALID_POINTER; } } while (false); |
594 | *aOwner = do_AddRef(mOwner).take(); |
595 | return NS_OK; |
596 | } |
597 | |
598 | NS_IMETHODIMPnsresult |
599 | HttpBaseChannel::SetOwner(nsISupports* aOwner) { |
600 | mOwner = aOwner; |
601 | return NS_OK; |
602 | } |
603 | |
604 | NS_IMETHODIMPnsresult |
605 | HttpBaseChannel::SetLoadInfo(nsILoadInfo* aLoadInfo) { |
606 | MOZ_RELEASE_ASSERT(aLoadInfo, "loadinfo can't be null")do { static_assert( mozilla::detail::AssertionConditionType< decltype(aLoadInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aLoadInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aLoadInfo" " (" "loadinfo can't be null" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 606); AnnotateMozCrashReason("MOZ_RELEASE_ASSERT" "(" "aLoadInfo" ") (" "loadinfo can't be null" ")"); do { *((volatile int*)__null ) = 606; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); |
607 | mLoadInfo = aLoadInfo; |
608 | return NS_OK; |
609 | } |
610 | |
611 | NS_IMETHODIMPnsresult |
612 | HttpBaseChannel::GetLoadInfo(nsILoadInfo** aLoadInfo) { |
613 | *aLoadInfo = do_AddRef(mLoadInfo).take(); |
614 | return NS_OK; |
615 | } |
616 | |
617 | NS_IMETHODIMPnsresult |
618 | HttpBaseChannel::GetIsDocument(bool* aIsDocument) { |
619 | return NS_GetIsDocumentChannel(this, aIsDocument); |
620 | } |
621 | |
622 | NS_IMETHODIMPnsresult |
623 | HttpBaseChannel::GetNotificationCallbacks(nsIInterfaceRequestor** aCallbacks) { |
624 | *aCallbacks = do_AddRef(mCallbacks).take(); |
625 | return NS_OK; |
626 | } |
627 | |
628 | NS_IMETHODIMPnsresult |
629 | HttpBaseChannel::SetNotificationCallbacks(nsIInterfaceRequestor* aCallbacks) { |
630 | MOZ_ASSERT(NS_IsMainThread(), "Should only be called on the main thread.")do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" " (" "Should only be called on the main thread." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 630); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ") (" "Should only be called on the main thread." ")"); do { *((volatile int*)__null) = 630; __attribute__((nomerge)) ::abort (); } while (false); } } while (false); |
631 | |
632 | if (!CanSetCallbacks(aCallbacks)) { |
633 | return NS_ERROR_FAILURE; |
634 | } |
635 | |
636 | mCallbacks = aCallbacks; |
637 | mProgressSink = nullptr; |
638 | |
639 | UpdatePrivateBrowsing(); |
640 | return NS_OK; |
641 | } |
642 | |
643 | NS_IMETHODIMPnsresult |
644 | HttpBaseChannel::GetContentType(nsACString& aContentType) { |
645 | if (!mResponseHead) { |
646 | aContentType.Truncate(); |
647 | return NS_ERROR_NOT_AVAILABLE; |
648 | } |
649 | |
650 | mResponseHead->ContentType(aContentType); |
651 | if (!aContentType.IsEmpty()) { |
652 | return NS_OK; |
653 | } |
654 | |
655 | aContentType.AssignLiteral(UNKNOWN_CONTENT_TYPE"application/x-unknown-content-type"); |
656 | return NS_OK; |
657 | } |
658 | |
659 | NS_IMETHODIMPnsresult |
660 | HttpBaseChannel::SetContentType(const nsACString& aContentType) { |
661 | if (mListener || LoadWasOpened() || mDummyChannelForCachedResource) { |
662 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
663 | |
664 | nsAutoCString contentTypeBuf, charsetBuf; |
665 | bool hadCharset; |
666 | net_ParseContentType(aContentType, contentTypeBuf, charsetBuf, &hadCharset); |
667 | |
668 | mResponseHead->SetContentType(contentTypeBuf); |
669 | |
670 | // take care not to stomp on an existing charset |
671 | if (hadCharset) mResponseHead->SetContentCharset(charsetBuf); |
672 | |
673 | } else { |
674 | // We are being given a content-type hint. |
675 | bool dummy; |
676 | net_ParseContentType(aContentType, mContentTypeHint, mContentCharsetHint, |
677 | &dummy); |
678 | } |
679 | |
680 | return NS_OK; |
681 | } |
682 | |
683 | NS_IMETHODIMPnsresult |
684 | HttpBaseChannel::GetContentCharset(nsACString& aContentCharset) { |
685 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
686 | |
687 | mResponseHead->ContentCharset(aContentCharset); |
688 | return NS_OK; |
689 | } |
690 | |
691 | NS_IMETHODIMPnsresult |
692 | HttpBaseChannel::SetContentCharset(const nsACString& aContentCharset) { |
693 | if (mListener) { |
694 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
695 | |
696 | mResponseHead->SetContentCharset(aContentCharset); |
697 | } else { |
698 | // Charset hint |
699 | mContentCharsetHint = aContentCharset; |
700 | } |
701 | return NS_OK; |
702 | } |
703 | |
704 | NS_IMETHODIMPnsresult |
705 | HttpBaseChannel::GetContentDisposition(uint32_t* aContentDisposition) { |
706 | // See bug 1658877. If mContentDispositionHint is already |
707 | // DISPOSITION_ATTACHMENT, it means this channel is created from a |
708 | // download attribute. In this case, we should prefer the value from the |
709 | // download attribute rather than the value in content disposition header. |
710 | // DISPOSITION_FORCE_INLINE is used to explicitly set inline, used by |
711 | // the pdf reader when loading a attachment pdf without having to |
712 | // download it. |
713 | if (mContentDispositionHint == nsIChannel::DISPOSITION_ATTACHMENT || |
714 | mContentDispositionHint == nsIChannel::DISPOSITION_FORCE_INLINE) { |
715 | *aContentDisposition = mContentDispositionHint; |
716 | return NS_OK; |
717 | } |
718 | |
719 | nsresult rv; |
720 | nsCString header; |
721 | |
722 | rv = GetContentDispositionHeader(header); |
723 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
724 | if (mContentDispositionHint == UINT32_MAX(4294967295U)) return rv; |
725 | |
726 | *aContentDisposition = mContentDispositionHint; |
727 | return NS_OK; |
728 | } |
729 | |
730 | *aContentDisposition = NS_GetContentDispositionFromHeader(header, this); |
731 | return NS_OK; |
732 | } |
733 | |
734 | NS_IMETHODIMPnsresult |
735 | HttpBaseChannel::SetContentDisposition(uint32_t aContentDisposition) { |
736 | mContentDispositionHint = aContentDisposition; |
737 | return NS_OK; |
738 | } |
739 | |
740 | NS_IMETHODIMPnsresult |
741 | HttpBaseChannel::GetContentDispositionFilename( |
742 | nsAString& aContentDispositionFilename) { |
743 | aContentDispositionFilename.Truncate(); |
744 | nsresult rv; |
745 | nsCString header; |
746 | |
747 | rv = GetContentDispositionHeader(header); |
748 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))) { |
749 | rv = NS_GetFilenameFromDisposition(aContentDispositionFilename, header); |
750 | } |
751 | |
752 | // If we failed to get the filename from header, we should use |
753 | // mContentDispositionFilename, since mContentDispositionFilename is set from |
754 | // the download attribute. |
755 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
756 | if (!mContentDispositionFilename) { |
757 | return rv; |
758 | } |
759 | |
760 | aContentDispositionFilename = *mContentDispositionFilename; |
761 | return NS_OK; |
762 | } |
763 | |
764 | return rv; |
765 | } |
766 | |
767 | NS_IMETHODIMPnsresult |
768 | HttpBaseChannel::SetContentDispositionFilename( |
769 | const nsAString& aContentDispositionFilename) { |
770 | mContentDispositionFilename = |
771 | MakeUnique<nsString>(aContentDispositionFilename); |
772 | |
773 | // For safety reasons ensure the filename doesn't contain null characters and |
774 | // replace them with underscores. We may later pass the extension to system |
775 | // MIME APIs that expect null terminated strings. |
776 | mContentDispositionFilename->ReplaceChar(char16_t(0), '_'); |
777 | |
778 | return NS_OK; |
779 | } |
780 | |
781 | NS_IMETHODIMPnsresult |
782 | HttpBaseChannel::GetContentDispositionHeader( |
783 | nsACString& aContentDispositionHeader) { |
784 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
785 | |
786 | nsresult rv = mResponseHead->GetHeader(nsHttp::Content_Disposition, |
787 | aContentDispositionHeader); |
788 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0))) || aContentDispositionHeader.IsEmpty()) { |
789 | return NS_ERROR_NOT_AVAILABLE; |
790 | } |
791 | |
792 | return NS_OK; |
793 | } |
794 | |
795 | NS_IMETHODIMPnsresult |
796 | HttpBaseChannel::GetContentLength(int64_t* aContentLength) { |
797 | NS_ENSURE_ARG_POINTER(aContentLength)do { if ((__builtin_expect(!!(!(aContentLength)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aContentLength" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 797); return NS_ERROR_INVALID_POINTER; } } while (false); |
798 | |
799 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
800 | |
801 | if (LoadDeliveringAltData()) { |
802 | MOZ_ASSERT(!mAvailableCachedAltDataType.IsEmpty())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mAvailableCachedAltDataType.IsEmpty())>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!(!mAvailableCachedAltDataType.IsEmpty()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mAvailableCachedAltDataType.IsEmpty()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 802); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mAvailableCachedAltDataType.IsEmpty()" ")"); do { *((volatile int*)__null) = 802; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
803 | *aContentLength = mAltDataLength; |
804 | return NS_OK; |
805 | } |
806 | |
807 | *aContentLength = mResponseHead->ContentLength(); |
808 | return NS_OK; |
809 | } |
810 | |
811 | NS_IMETHODIMPnsresult |
812 | HttpBaseChannel::SetContentLength(int64_t value) { |
813 | if (!mDummyChannelForCachedResource) { |
814 | MOZ_ASSERT_UNREACHABLE("HttpBaseChannel::SetContentLength")do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "HttpBaseChannel::SetContentLength" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 814); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "HttpBaseChannel::SetContentLength" ")"); do { *((volatile int*)__null) = 814; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
815 | return NS_ERROR_NOT_IMPLEMENTED; |
816 | } |
817 | MOZ_ASSERT(mResponseHead)do { static_assert( mozilla::detail::AssertionConditionType< decltype(mResponseHead)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mResponseHead))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mResponseHead", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 817); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mResponseHead" ")"); do { *((volatile int*)__null) = 817; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
818 | mResponseHead->SetContentLength(value); |
819 | return NS_OK; |
820 | } |
821 | |
822 | NS_IMETHODIMPnsresult |
823 | HttpBaseChannel::Open(nsIInputStream** aStream) { |
824 | if (!gHttpHandler->Active()) { |
825 | LOG(("HttpBaseChannel::Open after HTTP shutdown..."))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::Open after HTTP shutdown..."); } } while ( 0); |
826 | return NS_ERROR_NOT_AVAILABLE; |
827 | } |
828 | |
829 | nsCOMPtr<nsIStreamListener> listener; |
830 | nsresult rv = |
831 | nsContentSecurityManager::doContentSecurityCheck(this, listener); |
832 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 832); return rv; } } while (false); |
833 | |
834 | NS_ENSURE_TRUE(!LoadWasOpened(), NS_ERROR_IN_PROGRESS)do { if ((__builtin_expect(!!(!(!LoadWasOpened())), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!LoadWasOpened()" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 834); return NS_ERROR_IN_PROGRESS; } } while (false); |
835 | |
836 | if (!gHttpHandler->Active()) { |
837 | LOG(("HttpBaseChannel::Open after HTTP shutdown..."))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::Open after HTTP shutdown..."); } } while ( 0); |
838 | return NS_ERROR_NOT_AVAILABLE; |
839 | } |
840 | |
841 | return NS_ImplementChannelOpen(this, aStream); |
842 | } |
843 | |
844 | //----------------------------------------------------------------------------- |
845 | // HttpBaseChannel::nsIUploadChannel |
846 | //----------------------------------------------------------------------------- |
847 | |
848 | NS_IMETHODIMPnsresult |
849 | HttpBaseChannel::GetUploadStream(nsIInputStream** stream) { |
850 | NS_ENSURE_ARG_POINTER(stream)do { if ((__builtin_expect(!!(!(stream)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "stream" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 850); return NS_ERROR_INVALID_POINTER; } } while (false); |
851 | *stream = do_AddRef(mUploadStream).take(); |
852 | return NS_OK; |
853 | } |
854 | |
855 | NS_IMETHODIMPnsresult |
856 | HttpBaseChannel::SetUploadStream(nsIInputStream* stream, |
857 | const nsACString& contentTypeArg, |
858 | int64_t contentLength) { |
859 | // NOTE: for backwards compatibility and for compatibility with old style |
860 | // plugins, |stream| may include headers, specifically Content-Type and |
861 | // Content-Length headers. in this case, |contentType| and |contentLength| |
862 | // would be unspecified. this is traditionally the case of a POST request, |
863 | // and so we select POST as the request method if contentType and |
864 | // contentLength are unspecified. |
865 | |
866 | if (stream) { |
867 | nsAutoCString method; |
868 | bool hasHeaders = false; |
869 | |
870 | // This method and ExplicitSetUploadStream mean different things by "empty |
871 | // content type string". This method means "no header", but |
872 | // ExplicitSetUploadStream means "header with empty value". So we have to |
873 | // massage the contentType argument into the form ExplicitSetUploadStream |
874 | // expects. |
875 | nsCOMPtr<nsIMIMEInputStream> mimeStream; |
876 | nsCString contentType(contentTypeArg); |
877 | if (contentType.IsEmpty()) { |
878 | contentType.SetIsVoid(true); |
879 | method = "POST"_ns; |
880 | |
881 | // MIME streams are a special case, and include headers which need to be |
882 | // copied to the channel. |
883 | mimeStream = do_QueryInterface(stream); |
884 | if (mimeStream) { |
885 | // Copy non-origin related headers to the channel. |
886 | nsCOMPtr<nsIHttpHeaderVisitor> visitor = |
887 | new AddHeadersToChannelVisitor(this); |
888 | mimeStream->VisitHeaders(visitor); |
889 | |
890 | return ExplicitSetUploadStream(stream, contentType, contentLength, |
891 | method, hasHeaders); |
892 | } |
893 | |
894 | hasHeaders = true; |
895 | } else { |
896 | method = "PUT"_ns; |
897 | |
898 | MOZ_ASSERT(do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface (stream, getter_AddRefs(mimeStream)))), 0))))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(((bool)(__builtin_expect(!!( NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream )))), 0)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream)))), 0)))" " (" "nsIMIMEInputStream should not be set with an explicit content type" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 900); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream)))), 0)))" ") (" "nsIMIMEInputStream should not be set with an explicit content type" ")"); do { *((volatile int*)__null) = 900; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
899 | NS_FAILED(CallQueryInterface(stream, getter_AddRefs(mimeStream))),do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface (stream, getter_AddRefs(mimeStream)))), 0))))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(((bool)(__builtin_expect(!!( NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream )))), 0)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream)))), 0)))" " (" "nsIMIMEInputStream should not be set with an explicit content type" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 900); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream)))), 0)))" ") (" "nsIMIMEInputStream should not be set with an explicit content type" ")"); do { *((volatile int*)__null) = 900; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
900 | "nsIMIMEInputStream should not be set with an explicit content type")do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface (stream, getter_AddRefs(mimeStream)))), 0))))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(((bool)(__builtin_expect(!!( NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream )))), 0)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream)))), 0)))" " (" "nsIMIMEInputStream should not be set with an explicit content type" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 900); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface(stream, getter_AddRefs(mimeStream)))), 0)))" ") (" "nsIMIMEInputStream should not be set with an explicit content type" ")"); do { *((volatile int*)__null) = 900; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
901 | } |
902 | return ExplicitSetUploadStream(stream, contentType, contentLength, method, |
903 | hasHeaders); |
904 | } |
905 | |
906 | // if stream is null, ExplicitSetUploadStream returns error. |
907 | // So we need special case for GET method. |
908 | StoreUploadStreamHasHeaders(false); |
909 | SetRequestMethod("GET"_ns); // revert to GET request |
910 | mUploadStream = nullptr; |
911 | return NS_OK; |
912 | } |
913 | |
914 | namespace { |
915 | |
916 | class MIMEHeaderCopyVisitor final : public nsIHttpHeaderVisitor { |
917 | public: |
918 | explicit MIMEHeaderCopyVisitor(nsIMIMEInputStream* aDest) : mDest(aDest) {} |
919 | |
920 | NS_DECL_ISUPPORTSpublic: virtual nsresult QueryInterface(const nsIID& aIID , void** aInstancePtr) override; virtual MozExternalRefCountType AddRef(void) override; virtual MozExternalRefCountType Release (void) override; using HasThreadSafeRefCnt = std::false_type; protected: nsAutoRefCnt mRefCnt; nsAutoOwningThread _mOwningThread ; public: |
921 | NS_IMETHODvirtual nsresult VisitHeader(const nsACString& aName, |
922 | const nsACString& aValue) override { |
923 | return mDest->AddHeader(PromiseFlatCStringTPromiseFlatString<char>(aName).get(), |
924 | PromiseFlatCStringTPromiseFlatString<char>(aValue).get()); |
925 | } |
926 | |
927 | private: |
928 | ~MIMEHeaderCopyVisitor() = default; |
929 | |
930 | nsCOMPtr<nsIMIMEInputStream> mDest; |
931 | }; |
932 | |
933 | NS_IMPL_ISUPPORTS(MIMEHeaderCopyVisitor, nsIHttpHeaderVisitor)MozExternalRefCountType MIMEHeaderCopyVisitor::AddRef(void) { static_assert(!std::is_destructible_v<MIMEHeaderCopyVisitor >, "Reference-counted class " "MIMEHeaderCopyVisitor" " should not have a public destructor. " "Make this class's destructor non-public"); do { static_assert ( mozilla::detail::AssertionConditionType<decltype(int32_t (mRefCnt) >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) >= 0))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) >= 0" " (" "illegal refcnt" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 933); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) >= 0" ") (" "illegal refcnt" ")"); do { *((volatile int*)__null) = 933; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("MIMEHeaderCopyVisitor" != nullptr)>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!("MIMEHeaderCopyVisitor" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"MIMEHeaderCopyVisitor\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 933); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"MIMEHeaderCopyVisitor\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 933; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("MIMEHeaderCopyVisitor" " not thread-safe"); nsrefcnt count = ++mRefCnt; NS_LogAddRef((this), (count), ("MIMEHeaderCopyVisitor" ), (uint32_t)(sizeof(*this))); return count; } MozExternalRefCountType MIMEHeaderCopyVisitor::Release(void) { do { static_assert( mozilla ::detail::AssertionConditionType<decltype(int32_t(mRefCnt) > 0)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(int32_t(mRefCnt) > 0))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("int32_t(mRefCnt) > 0" " (" "dup release" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 933); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) > 0" ") (" "dup release" ")"); do { *((volatile int*)__null) = 933 ; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("MIMEHeaderCopyVisitor" != nullptr)>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!("MIMEHeaderCopyVisitor" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"MIMEHeaderCopyVisitor\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 933); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"MIMEHeaderCopyVisitor\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 933; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("MIMEHeaderCopyVisitor" " not thread-safe"); const char* const nametmp = "MIMEHeaderCopyVisitor"; nsrefcnt count = --mRefCnt; NS_LogRelease((this), (count), (nametmp)) ; if (count == 0) { mRefCnt = 1; delete (this); return 0; } return count; } nsresult MIMEHeaderCopyVisitor::QueryInterface(const nsIID& aIID, void** aInstancePtr) { do { if (!(aInstancePtr )) { NS_DebugBreak(NS_DEBUG_ASSERTION, "QueryInterface requires a non-NULL destination!" , "aInstancePtr", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 933); MOZ_PretendNoReturn(); } } while (0); nsresult rv = NS_ERROR_FAILURE ; static_assert(1 > 0, "Need more arguments to NS_INTERFACE_TABLE" ); static const QITableEntry table[] = { {&mozilla::detail ::kImplementedIID<MIMEHeaderCopyVisitor, nsIHttpHeaderVisitor >, int32_t( reinterpret_cast<char*>(static_cast<nsIHttpHeaderVisitor *>((MIMEHeaderCopyVisitor*)0x1000)) - reinterpret_cast< char*>((MIMEHeaderCopyVisitor*)0x1000))}, {&mozilla::detail ::kImplementedIID<MIMEHeaderCopyVisitor, nsISupports>, int32_t (reinterpret_cast<char*>(static_cast<nsISupports*> ( static_cast<nsIHttpHeaderVisitor*>((MIMEHeaderCopyVisitor *)0x1000))) - reinterpret_cast<char*>((MIMEHeaderCopyVisitor *)0x1000))}, { nullptr, 0 } } ; static_assert(std::size(table ) > 1, "need at least 1 interface"); rv = NS_TableDrivenQI (static_cast<void*>(this), aIID, aInstancePtr, table); return rv; } |
934 | |
935 | static void NormalizeCopyComplete(void* aClosure, nsresult aStatus) { |
936 | #ifdef DEBUG1 |
937 | // Called on the STS thread by NS_AsyncCopy |
938 | nsCOMPtr<nsIEventTarget> sts = |
939 | do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID"@mozilla.org/network/stream-transport-service;1"); |
940 | bool result = false; |
941 | sts->IsOnCurrentThread(&result); |
942 | MOZ_ASSERT(result, "Should only be called on the STS thread.")do { static_assert( mozilla::detail::AssertionConditionType< decltype(result)>::isValid, "invalid assertion condition") ; if ((__builtin_expect(!!(!(!!(result))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("result" " (" "Should only be called on the STS thread." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 942); AnnotateMozCrashReason("MOZ_ASSERT" "(" "result" ") (" "Should only be called on the STS thread." ")"); do { *((volatile int*)__null) = 942; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); |
943 | #endif |
944 | |
945 | RefPtr<GenericPromise::Private> ready = |
946 | already_AddRefed(static_cast<GenericPromise::Private*>(aClosure)); |
947 | if (NS_SUCCEEDED(aStatus)((bool)(__builtin_expect(!!(!NS_FAILED_impl(aStatus)), 1)))) { |
948 | ready->Resolve(true, __func__); |
949 | } else { |
950 | ready->Reject(aStatus, __func__); |
951 | } |
952 | } |
953 | |
954 | // Normalize the upload stream for a HTTP channel, so that is one of the |
955 | // expected and compatible types. Components like WebExtensions and DevTools |
956 | // expect that upload streams in the parent process are cloneable, seekable, and |
957 | // synchronous to read, which this function helps guarantee somewhat efficiently |
958 | // and without loss of information. |
959 | // |
960 | // If the replacement stream outparameter is not initialized to `nullptr`, the |
961 | // returned stream should be used instead of `aUploadStream` as the upload |
962 | // stream for the HTTP channel, and the previous stream should not be touched |
963 | // again. |
964 | // |
965 | // If aReadyPromise is non-nullptr after the function is called, it is a promise |
966 | // which should be awaited before continuing to `AsyncOpen` the HTTP channel, |
967 | // as the replacement stream will not be ready until it is resolved. |
968 | static nsresult NormalizeUploadStream(nsIInputStream* aUploadStream, |
969 | nsIInputStream** aReplacementStream, |
970 | GenericPromise** aReadyPromise) { |
971 | MOZ_ASSERT(XRE_IsParentProcess())do { static_assert( mozilla::detail::AssertionConditionType< decltype(XRE_IsParentProcess())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(XRE_IsParentProcess()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("XRE_IsParentProcess()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 971); AnnotateMozCrashReason("MOZ_ASSERT" "(" "XRE_IsParentProcess()" ")"); do { *((volatile int*)__null) = 971; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
972 | |
973 | *aReplacementStream = nullptr; |
974 | *aReadyPromise = nullptr; |
975 | |
976 | // Unwrap RemoteLazyInputStream and normalize the contents as we're in the |
977 | // parent process. |
978 | if (nsCOMPtr<mozIRemoteLazyInputStream> lazyStream = |
979 | do_QueryInterface(aUploadStream)) { |
980 | nsCOMPtr<nsIInputStream> internal; |
981 | if (NS_SUCCEEDED(((bool)(__builtin_expect(!!(!NS_FAILED_impl(lazyStream->TakeInternalStream (getter_AddRefs(internal)))), 1))) |
982 | lazyStream->TakeInternalStream(getter_AddRefs(internal)))((bool)(__builtin_expect(!!(!NS_FAILED_impl(lazyStream->TakeInternalStream (getter_AddRefs(internal)))), 1)))) { |
983 | nsCOMPtr<nsIInputStream> replacement; |
984 | nsresult rv = NormalizeUploadStream(internal, getter_AddRefs(replacement), |
985 | aReadyPromise); |
986 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 986); return rv; } } while (false); |
987 | |
988 | if (replacement) { |
989 | replacement.forget(aReplacementStream); |
990 | } else { |
991 | internal.forget(aReplacementStream); |
992 | } |
993 | return NS_OK; |
994 | } |
995 | } |
996 | |
997 | // Preserve MIME information on the stream when normalizing. |
998 | if (nsCOMPtr<nsIMIMEInputStream> mime = do_QueryInterface(aUploadStream)) { |
999 | nsCOMPtr<nsIInputStream> data; |
1000 | nsresult rv = mime->GetData(getter_AddRefs(data)); |
1001 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1001); return rv; } } while (false); |
1002 | |
1003 | nsCOMPtr<nsIInputStream> replacement; |
1004 | rv = |
1005 | NormalizeUploadStream(data, getter_AddRefs(replacement), aReadyPromise); |
1006 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1006); return rv; } } while (false); |
1007 | |
1008 | if (replacement) { |
1009 | nsCOMPtr<nsIMIMEInputStream> replacementMime( |
1010 | do_CreateInstance("@mozilla.org/network/mime-input-stream;1", &rv)); |
1011 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1011); return rv; } } while (false); |
1012 | |
1013 | nsCOMPtr<nsIHttpHeaderVisitor> visitor = |
1014 | new MIMEHeaderCopyVisitor(replacementMime); |
1015 | rv = mime->VisitHeaders(visitor); |
1016 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1016); return rv; } } while (false); |
1017 | |
1018 | rv = replacementMime->SetData(replacement); |
1019 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1019); return rv; } } while (false); |
1020 | |
1021 | replacementMime.forget(aReplacementStream); |
1022 | } |
1023 | return NS_OK; |
1024 | } |
1025 | |
1026 | // Preserve "real" buffered input streams which wrap data (i.e. are backed by |
1027 | // nsBufferedInputStream), but normalize the wrapped stream. |
1028 | if (nsCOMPtr<nsIBufferedInputStream> buffered = |
1029 | do_QueryInterface(aUploadStream)) { |
1030 | nsCOMPtr<nsIInputStream> data; |
1031 | if (NS_SUCCEEDED(buffered->GetData(getter_AddRefs(data)))((bool)(__builtin_expect(!!(!NS_FAILED_impl(buffered->GetData (getter_AddRefs(data)))), 1)))) { |
1032 | nsCOMPtr<nsIInputStream> replacement; |
1033 | nsresult rv = NormalizeUploadStream(data, getter_AddRefs(replacement), |
1034 | aReadyPromise); |
1035 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1035); return rv; } } while (false); |
1036 | if (replacement) { |
1037 | // This buffer size should be kept in sync with HTMLFormSubmission. |
1038 | rv = NS_NewBufferedInputStream(aReplacementStream, replacement.forget(), |
1039 | 8192); |
1040 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1040); return rv; } } while (false); |
1041 | } |
1042 | return NS_OK; |
1043 | } |
1044 | } |
1045 | |
1046 | // Preserve multiplex input streams, normalizing each individual inner stream |
1047 | // to avoid unnecessary copying. |
1048 | if (nsCOMPtr<nsIMultiplexInputStream> multiplex = |
1049 | do_QueryInterface(aUploadStream)) { |
1050 | uint32_t count = multiplex->GetCount(); |
1051 | nsTArray<nsCOMPtr<nsIInputStream>> streams(count); |
1052 | nsTArray<RefPtr<GenericPromise>> promises(count); |
1053 | bool replace = false; |
1054 | for (uint32_t i = 0; i < count; ++i) { |
1055 | nsCOMPtr<nsIInputStream> inner; |
1056 | nsresult rv = multiplex->GetStream(i, getter_AddRefs(inner)); |
1057 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1057); return rv; } } while (false); |
1058 | |
1059 | RefPtr<GenericPromise> promise; |
1060 | nsCOMPtr<nsIInputStream> replacement; |
1061 | rv = NormalizeUploadStream(inner, getter_AddRefs(replacement), |
1062 | getter_AddRefs(promise)); |
1063 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1063); return rv; } } while (false); |
1064 | if (promise) { |
1065 | promises.AppendElement(promise); |
1066 | } |
1067 | if (replacement) { |
1068 | streams.AppendElement(replacement); |
1069 | replace = true; |
1070 | } else { |
1071 | streams.AppendElement(inner); |
1072 | } |
1073 | } |
1074 | |
1075 | // If any of the inner streams needed to be replaced, replace the entire |
1076 | // nsIMultiplexInputStream. |
1077 | if (replace) { |
1078 | nsresult rv; |
1079 | nsCOMPtr<nsIMultiplexInputStream> replacement = |
1080 | do_CreateInstance("@mozilla.org/io/multiplex-input-stream;1", &rv); |
1081 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1081); return rv; } } while (false); |
1082 | for (auto& stream : streams) { |
1083 | rv = replacement->AppendStream(stream); |
1084 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1084); return rv; } } while (false); |
1085 | } |
1086 | |
1087 | MOZ_ALWAYS_SUCCEEDS(CallQueryInterface(replacement, aReplacementStream))do { if ((__builtin_expect(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl (CallQueryInterface(replacement, aReplacementStream))), 1)))) , 1))) { } else { do { do { } while (false); MOZ_ReportCrash( "" "NS_SUCCEEDED(CallQueryInterface(replacement, aReplacementStream))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1087); AnnotateMozCrashReason("MOZ_CRASH(" "NS_SUCCEEDED(CallQueryInterface(replacement, aReplacementStream))" ")"); do { *((volatile int*)__null) = 1087; __attribute__((nomerge )) ::abort(); } while (false); } while (false); } } while (false ); |
1088 | } |
1089 | |
1090 | // Wait for all inner promises to settle before resolving the final promise. |
1091 | if (!promises.IsEmpty()) { |
1092 | RefPtr<GenericPromise> ready = |
1093 | GenericPromise::AllSettled(GetCurrentSerialEventTarget(), promises) |
1094 | ->Then(GetCurrentSerialEventTarget(), __func__, |
1095 | [](GenericPromise::AllSettledPromiseType:: |
1096 | ResolveOrRejectValue&& aResults) |
1097 | -> RefPtr<GenericPromise> { |
1098 | MOZ_ASSERT(aResults.IsResolve(),do { static_assert( mozilla::detail::AssertionConditionType< decltype(aResults.IsResolve())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aResults.IsResolve()))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("aResults.IsResolve()" " (" "AllSettled never rejects" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1099); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aResults.IsResolve()" ") (" "AllSettled never rejects" ")"); do { *((volatile int* )__null) = 1099; __attribute__((nomerge)) ::abort(); } while ( false); } } while (false) |
1099 | "AllSettled never rejects")do { static_assert( mozilla::detail::AssertionConditionType< decltype(aResults.IsResolve())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aResults.IsResolve()))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("aResults.IsResolve()" " (" "AllSettled never rejects" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1099); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aResults.IsResolve()" ") (" "AllSettled never rejects" ")"); do { *((volatile int* )__null) = 1099; __attribute__((nomerge)) ::abort(); } while ( false); } } while (false); |
1100 | for (auto& result : aResults.ResolveValue()) { |
1101 | if (result.IsReject()) { |
1102 | return GenericPromise::CreateAndReject( |
1103 | result.RejectValue(), __func__); |
1104 | } |
1105 | } |
1106 | return GenericPromise::CreateAndResolve(true, __func__); |
1107 | }); |
1108 | ready.forget(aReadyPromise); |
1109 | } |
1110 | return NS_OK; |
1111 | } |
1112 | |
1113 | // If the stream is cloneable, seekable and non-async, we can allow it. Async |
1114 | // input streams can cause issues, as various consumers of input streams |
1115 | // expect the payload to be synchronous and `Available()` to be the length of |
1116 | // the stream, which is not true for asynchronous streams. |
1117 | nsCOMPtr<nsIAsyncInputStream> async = do_QueryInterface(aUploadStream); |
1118 | nsCOMPtr<nsISeekableStream> seekable = do_QueryInterface(aUploadStream); |
1119 | if (NS_InputStreamIsCloneable(aUploadStream) && seekable && !async) { |
1120 | return NS_OK; |
1121 | } |
1122 | |
1123 | // Asynchronously copy our non-normalized stream into a StorageStream so that |
1124 | // it is seekable, cloneable, and synchronous once the copy completes. |
1125 | |
1126 | NS_WARNING("Upload Stream is being copied into StorageStream")NS_DebugBreak(NS_DEBUG_WARNING, "Upload Stream is being copied into StorageStream" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1126); |
1127 | |
1128 | nsCOMPtr<nsIStorageStream> storageStream; |
1129 | nsresult rv = |
1130 | NS_NewStorageStream(4096, UINT32_MAX(4294967295U), getter_AddRefs(storageStream)); |
1131 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1131); return rv; } } while (false); |
1132 | |
1133 | nsCOMPtr<nsIOutputStream> sink; |
1134 | rv = storageStream->GetOutputStream(0, getter_AddRefs(sink)); |
1135 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1135); return rv; } } while (false); |
1136 | |
1137 | nsCOMPtr<nsIInputStream> replacementStream; |
1138 | rv = storageStream->NewInputStream(0, getter_AddRefs(replacementStream)); |
1139 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1139); return rv; } } while (false); |
1140 | |
1141 | // Ensure the source stream is buffered before starting the copy so we can use |
1142 | // ReadSegments, as nsStorageStream doesn't implement WriteSegments. |
1143 | nsCOMPtr<nsIInputStream> source = aUploadStream; |
1144 | if (!NS_InputStreamIsBuffered(aUploadStream)) { |
1145 | nsCOMPtr<nsIInputStream> bufferedSource; |
1146 | rv = NS_NewBufferedInputStream(getter_AddRefs(bufferedSource), |
1147 | source.forget(), 4096); |
1148 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1148); return rv; } } while (false); |
1149 | source = bufferedSource.forget(); |
1150 | } |
1151 | |
1152 | // Perform an AsyncCopy into the input stream on the STS. |
1153 | nsCOMPtr<nsIEventTarget> target = |
1154 | do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID"@mozilla.org/network/stream-transport-service;1"); |
1155 | RefPtr<GenericPromise::Private> ready = new GenericPromise::Private(__func__); |
1156 | rv = NS_AsyncCopy(source, sink, target, NS_ASYNCCOPY_VIA_READSEGMENTS, 4096, |
1157 | NormalizeCopyComplete, do_AddRef(ready).take()); |
1158 | if (NS_WARN_IF(NS_FAILED(rv))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(rv )), 0))), "NS_FAILED(rv)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1158)) { |
1159 | ready.get()->Release(); |
1160 | return rv; |
1161 | } |
1162 | |
1163 | replacementStream.forget(aReplacementStream); |
1164 | ready.forget(aReadyPromise); |
1165 | return NS_OK; |
1166 | } |
1167 | |
1168 | } // anonymous namespace |
1169 | |
1170 | NS_IMETHODIMPnsresult |
1171 | HttpBaseChannel::CloneUploadStream(int64_t* aContentLength, |
1172 | nsIInputStream** aClonedStream) { |
1173 | NS_ENSURE_ARG_POINTER(aContentLength)do { if ((__builtin_expect(!!(!(aContentLength)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aContentLength" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1173); return NS_ERROR_INVALID_POINTER; } } while (false); |
1174 | NS_ENSURE_ARG_POINTER(aClonedStream)do { if ((__builtin_expect(!!(!(aClonedStream)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aClonedStream" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1174); return NS_ERROR_INVALID_POINTER; } } while (false); |
1175 | *aClonedStream = nullptr; |
1176 | |
1177 | if (!XRE_IsParentProcess()) { |
1178 | NS_WARNING("CloneUploadStream is only supported in the parent process")NS_DebugBreak(NS_DEBUG_WARNING, "CloneUploadStream is only supported in the parent process" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1178); |
1179 | return NS_ERROR_NOT_AVAILABLE; |
1180 | } |
1181 | |
1182 | if (!mUploadStream) { |
1183 | return NS_OK; |
1184 | } |
1185 | |
1186 | nsCOMPtr<nsIInputStream> clonedStream; |
1187 | nsresult rv = |
1188 | NS_CloneInputStream(mUploadStream, getter_AddRefs(clonedStream)); |
1189 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1189); return rv; } } while (false); |
1190 | |
1191 | clonedStream.forget(aClonedStream); |
1192 | |
1193 | *aContentLength = mReqContentLength; |
1194 | return NS_OK; |
1195 | } |
1196 | |
1197 | //----------------------------------------------------------------------------- |
1198 | // HttpBaseChannel::nsIUploadChannel2 |
1199 | //----------------------------------------------------------------------------- |
1200 | |
1201 | NS_IMETHODIMPnsresult |
1202 | HttpBaseChannel::ExplicitSetUploadStream(nsIInputStream* aStream, |
1203 | const nsACString& aContentType, |
1204 | int64_t aContentLength, |
1205 | const nsACString& aMethod, |
1206 | bool aStreamHasHeaders) { |
1207 | // Ensure stream is set and method is valid |
1208 | NS_ENSURE_TRUE(aStream, NS_ERROR_FAILURE)do { if ((__builtin_expect(!!(!(aStream)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aStream" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1208); return NS_ERROR_FAILURE; } } while (false); |
1209 | |
1210 | { |
1211 | DebugOnly<nsCOMPtr<nsIMIMEInputStream>> mimeStream; |
1212 | MOZ_ASSERT(do { static_assert( mozilla::detail::AssertionConditionType< decltype(!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl (CallQueryInterface( aStream, getter_AddRefs(mimeStream.value )))), 0))))>::isValid, "invalid assertion condition"); if ( (__builtin_expect(!!(!(!!(!aStreamHasHeaders || ((bool)(__builtin_expect (!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs (mimeStream.value)))), 0)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" " (" "nsIMIMEInputStream should not include headers" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1215); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" ") (" "nsIMIMEInputStream should not include headers" ")"); do { *((volatile int*)__null) = 1215; __attribute__((nomerge)) :: abort(); } while (false); } } while (false) |
1213 | !aStreamHasHeaders || NS_FAILED(CallQueryInterface(do { static_assert( mozilla::detail::AssertionConditionType< decltype(!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl (CallQueryInterface( aStream, getter_AddRefs(mimeStream.value )))), 0))))>::isValid, "invalid assertion condition"); if ( (__builtin_expect(!!(!(!!(!aStreamHasHeaders || ((bool)(__builtin_expect (!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs (mimeStream.value)))), 0)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" " (" "nsIMIMEInputStream should not include headers" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1215); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" ") (" "nsIMIMEInputStream should not include headers" ")"); do { *((volatile int*)__null) = 1215; __attribute__((nomerge)) :: abort(); } while (false); } } while (false) |
1214 | aStream, getter_AddRefs(mimeStream.value))),do { static_assert( mozilla::detail::AssertionConditionType< decltype(!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl (CallQueryInterface( aStream, getter_AddRefs(mimeStream.value )))), 0))))>::isValid, "invalid assertion condition"); if ( (__builtin_expect(!!(!(!!(!aStreamHasHeaders || ((bool)(__builtin_expect (!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs (mimeStream.value)))), 0)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" " (" "nsIMIMEInputStream should not include headers" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1215); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" ") (" "nsIMIMEInputStream should not include headers" ")"); do { *((volatile int*)__null) = 1215; __attribute__((nomerge)) :: abort(); } while (false); } } while (false) |
1215 | "nsIMIMEInputStream should not include headers")do { static_assert( mozilla::detail::AssertionConditionType< decltype(!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl (CallQueryInterface( aStream, getter_AddRefs(mimeStream.value )))), 0))))>::isValid, "invalid assertion condition"); if ( (__builtin_expect(!!(!(!!(!aStreamHasHeaders || ((bool)(__builtin_expect (!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs (mimeStream.value)))), 0)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" " (" "nsIMIMEInputStream should not include headers" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1215); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!aStreamHasHeaders || ((bool)(__builtin_expect(!!(NS_FAILED_impl(CallQueryInterface( aStream, getter_AddRefs(mimeStream.value)))), 0)))" ") (" "nsIMIMEInputStream should not include headers" ")"); do { *((volatile int*)__null) = 1215; __attribute__((nomerge)) :: abort(); } while (false); } } while (false); |
1216 | } |
1217 | |
1218 | nsresult rv = SetRequestMethod(aMethod); |
1219 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1219); return rv; } } while (false); |
1220 | |
1221 | if (!aStreamHasHeaders && !aContentType.IsVoid()) { |
1222 | if (aContentType.IsEmpty()) { |
1223 | SetEmptyRequestHeader("Content-Type"_ns); |
1224 | } else { |
1225 | SetRequestHeader("Content-Type"_ns, aContentType, false); |
1226 | } |
1227 | } |
1228 | |
1229 | StoreUploadStreamHasHeaders(aStreamHasHeaders); |
1230 | |
1231 | return InternalSetUploadStream(aStream, aContentLength, !aStreamHasHeaders); |
1232 | } |
1233 | |
1234 | nsresult HttpBaseChannel::InternalSetUploadStream( |
1235 | nsIInputStream* aUploadStream, int64_t aContentLength, |
1236 | bool aSetContentLengthHeader) { |
1237 | // If we're not on the main thread, such as for TRR, the content length must |
1238 | // be provided, as we can't normalize our upload stream. |
1239 | if (!NS_IsMainThread()) { |
1240 | if (aContentLength < 0) { |
1241 | MOZ_ASSERT_UNREACHABLE(do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "Upload content length must be explicit off-main-thread" ")" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1242); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "Upload content length must be explicit off-main-thread" ")"); do { *((volatile int*)__null) = 1242; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
1242 | "Upload content length must be explicit off-main-thread")do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "Upload content length must be explicit off-main-thread" ")" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1242); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "Upload content length must be explicit off-main-thread" ")"); do { *((volatile int*)__null) = 1242; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1243 | return NS_ERROR_INVALID_ARG; |
1244 | } |
1245 | |
1246 | nsCOMPtr<nsISeekableStream> seekable = do_QueryInterface(aUploadStream); |
1247 | if (!NS_InputStreamIsCloneable(aUploadStream) || !seekable) { |
1248 | MOZ_ASSERT_UNREACHABLE(do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "Upload stream must be cloneable & seekable off-main-thread" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1249); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "Upload stream must be cloneable & seekable off-main-thread" ")"); do { *((volatile int*)__null) = 1249; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
1249 | "Upload stream must be cloneable & seekable off-main-thread")do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "Upload stream must be cloneable & seekable off-main-thread" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1249); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "Upload stream must be cloneable & seekable off-main-thread" ")"); do { *((volatile int*)__null) = 1249; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1250 | return NS_ERROR_INVALID_ARG; |
1251 | } |
1252 | |
1253 | mUploadStream = aUploadStream; |
1254 | ExplicitSetUploadStreamLength(aContentLength, aSetContentLengthHeader); |
1255 | return NS_OK; |
1256 | } |
1257 | |
1258 | // Normalize the upload stream we're provided to ensure that it is cloneable, |
1259 | // seekable, and synchronous when in the parent process. |
1260 | // |
1261 | // This might be an async operation, in which case ready will be returned and |
1262 | // resolved when the operation is complete. |
1263 | nsCOMPtr<nsIInputStream> replacement; |
1264 | RefPtr<GenericPromise> ready; |
1265 | if (XRE_IsParentProcess()) { |
1266 | nsresult rv = NormalizeUploadStream( |
1267 | aUploadStream, getter_AddRefs(replacement), getter_AddRefs(ready)); |
1268 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1268); return rv; } } while (false); |
1269 | } |
1270 | |
1271 | mUploadStream = replacement ? replacement.get() : aUploadStream; |
1272 | |
1273 | // Once the upload stream is ready, fetch its length before proceeding with |
1274 | // AsyncOpen. |
1275 | auto onReady = [self = RefPtr{this}, aContentLength, aSetContentLengthHeader, |
1276 | stream = mUploadStream]() { |
1277 | auto setLengthAndResume = [self, aSetContentLengthHeader](int64_t aLength) { |
1278 | self->StorePendingUploadStreamNormalization(false); |
1279 | self->ExplicitSetUploadStreamLength(aLength >= 0 ? aLength : 0, |
1280 | aSetContentLengthHeader); |
1281 | self->MaybeResumeAsyncOpen(); |
1282 | }; |
1283 | |
1284 | if (aContentLength >= 0) { |
1285 | setLengthAndResume(aContentLength); |
1286 | return; |
1287 | } |
1288 | |
1289 | int64_t length; |
1290 | if (InputStreamLengthHelper::GetSyncLength(stream, &length)) { |
1291 | setLengthAndResume(length); |
1292 | return; |
1293 | } |
1294 | |
1295 | InputStreamLengthHelper::GetAsyncLength(stream, setLengthAndResume); |
1296 | }; |
1297 | StorePendingUploadStreamNormalization(true); |
1298 | |
1299 | // Resolve onReady synchronously unless a promise is returned. |
1300 | if (ready) { |
1301 | ready->Then(GetCurrentSerialEventTarget(), __func__, |
1302 | [onReady = std::move(onReady)]( |
1303 | GenericPromise::ResolveOrRejectValue&&) { onReady(); }); |
1304 | } else { |
1305 | onReady(); |
1306 | } |
1307 | return NS_OK; |
1308 | } |
1309 | |
1310 | void HttpBaseChannel::ExplicitSetUploadStreamLength( |
1311 | uint64_t aContentLength, bool aSetContentLengthHeader) { |
1312 | // We already have the content length. We don't need to determinate it. |
1313 | mReqContentLength = aContentLength; |
1314 | |
1315 | if (!aSetContentLengthHeader) { |
1316 | return; |
1317 | } |
1318 | |
1319 | nsAutoCString header; |
1320 | header.AssignLiteral("Content-Length"); |
1321 | |
1322 | // Maybe the content-length header has been already set. |
1323 | nsAutoCString value; |
1324 | nsresult rv = GetRequestHeader(header, value); |
1325 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1))) && !value.IsEmpty()) { |
1326 | return; |
1327 | } |
1328 | |
1329 | nsAutoCString contentLengthStr; |
1330 | contentLengthStr.AppendInt(aContentLength); |
1331 | SetRequestHeader(header, contentLengthStr, false); |
1332 | } |
1333 | |
1334 | NS_IMETHODIMPnsresult |
1335 | HttpBaseChannel::GetUploadStreamHasHeaders(bool* hasHeaders) { |
1336 | NS_ENSURE_ARG(hasHeaders)do { if ((__builtin_expect(!!(!(hasHeaders)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "hasHeaders" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1336); return NS_ERROR_INVALID_ARG; } } while (false); |
1337 | |
1338 | *hasHeaders = LoadUploadStreamHasHeaders(); |
1339 | return NS_OK; |
1340 | } |
1341 | |
1342 | bool HttpBaseChannel::MaybeWaitForUploadStreamNormalization( |
1343 | nsIStreamListener* aListener, nsISupports* aContext) { |
1344 | MOZ_ASSERT(NS_IsMainThread())do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1344); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ")"); do { *((volatile int*)__null) = 1344; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1345 | MOZ_ASSERT(!LoadAsyncOpenWaitingForStreamNormalization(),do { static_assert( mozilla::detail::AssertionConditionType< decltype(!LoadAsyncOpenWaitingForStreamNormalization())>:: isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!LoadAsyncOpenWaitingForStreamNormalization()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("!LoadAsyncOpenWaitingForStreamNormalization()" " (" "AsyncOpen() called twice?" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1346); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!LoadAsyncOpenWaitingForStreamNormalization()" ") (" "AsyncOpen() called twice?" ")"); do { *((volatile int *)__null) = 1346; __attribute__((nomerge)) ::abort(); } while (false); } } while (false) |
1346 | "AsyncOpen() called twice?")do { static_assert( mozilla::detail::AssertionConditionType< decltype(!LoadAsyncOpenWaitingForStreamNormalization())>:: isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!LoadAsyncOpenWaitingForStreamNormalization()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("!LoadAsyncOpenWaitingForStreamNormalization()" " (" "AsyncOpen() called twice?" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1346); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!LoadAsyncOpenWaitingForStreamNormalization()" ") (" "AsyncOpen() called twice?" ")"); do { *((volatile int *)__null) = 1346; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); |
1347 | |
1348 | if (!LoadPendingUploadStreamNormalization()) { |
1349 | return false; |
1350 | } |
1351 | |
1352 | mListener = aListener; |
1353 | StoreAsyncOpenWaitingForStreamNormalization(true); |
1354 | return true; |
1355 | } |
1356 | |
1357 | void HttpBaseChannel::MaybeResumeAsyncOpen() { |
1358 | MOZ_ASSERT(NS_IsMainThread())do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1358); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ")"); do { *((volatile int*)__null) = 1358; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1359 | MOZ_ASSERT(!LoadPendingUploadStreamNormalization())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!LoadPendingUploadStreamNormalization())>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!(!LoadPendingUploadStreamNormalization()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!LoadPendingUploadStreamNormalization()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1359); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!LoadPendingUploadStreamNormalization()" ")"); do { *((volatile int*)__null) = 1359; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1360 | |
1361 | if (!LoadAsyncOpenWaitingForStreamNormalization()) { |
1362 | return; |
1363 | } |
1364 | |
1365 | nsCOMPtr<nsIStreamListener> listener; |
1366 | listener.swap(mListener); |
1367 | |
1368 | StoreAsyncOpenWaitingForStreamNormalization(false); |
1369 | |
1370 | nsresult rv = AsyncOpen(listener); |
1371 | if (NS_WARN_IF(NS_FAILED(rv))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(rv )), 0))), "NS_FAILED(rv)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1371)) { |
1372 | DoAsyncAbort(rv); |
1373 | } |
1374 | } |
1375 | |
1376 | //----------------------------------------------------------------------------- |
1377 | // HttpBaseChannel::nsIEncodedChannel |
1378 | //----------------------------------------------------------------------------- |
1379 | |
1380 | NS_IMETHODIMPnsresult |
1381 | HttpBaseChannel::GetApplyConversion(bool* value) { |
1382 | *value = LoadApplyConversion(); |
1383 | return NS_OK; |
1384 | } |
1385 | |
1386 | NS_IMETHODIMPnsresult |
1387 | HttpBaseChannel::SetApplyConversion(bool value) { |
1388 | LOG(("HttpBaseChannel::SetApplyConversion [this=%p value=%d]\n", this,do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetApplyConversion [this=%p value=%d]\n", this, value); } } while (0) |
1389 | value))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetApplyConversion [this=%p value=%d]\n", this, value); } } while (0); |
1390 | StoreApplyConversion(value); |
1391 | return NS_OK; |
1392 | } |
1393 | |
1394 | nsresult HttpBaseChannel::DoApplyContentConversions( |
1395 | nsIStreamListener* aNextListener, nsIStreamListener** aNewNextListener) { |
1396 | return DoApplyContentConversions(aNextListener, aNewNextListener, nullptr); |
1397 | } |
1398 | |
1399 | // create a listener chain that looks like this |
1400 | // http-channel -> decompressor (n times) -> InterceptFailedOnSTop -> |
1401 | // channel-creator-listener |
1402 | // |
1403 | // we need to do this because not every decompressor has fully streamed output |
1404 | // so may need a call to OnStopRequest to identify its completion state.. and if |
1405 | // it creates an error there the channel status code needs to be updated before |
1406 | // calling the terminal listener. Having the decompress do it via cancel() means |
1407 | // channels cannot effectively be used in two contexts (specifically this one |
1408 | // and a peek context for sniffing) |
1409 | // |
1410 | class InterceptFailedOnStop : public nsIThreadRetargetableStreamListener { |
1411 | virtual ~InterceptFailedOnStop() = default; |
1412 | nsCOMPtr<nsIStreamListener> mNext; |
1413 | HttpBaseChannel* mChannel; |
1414 | |
1415 | public: |
1416 | InterceptFailedOnStop(nsIStreamListener* arg, HttpBaseChannel* chan) |
1417 | : mNext(arg), mChannel(chan) {} |
1418 | NS_DECL_THREADSAFE_ISUPPORTSpublic: virtual nsresult QueryInterface(const nsIID& aIID , void** aInstancePtr) override; virtual MozExternalRefCountType AddRef(void) override; virtual MozExternalRefCountType Release (void) override; using HasThreadSafeRefCnt = std::true_type; protected : ::mozilla::ThreadSafeAutoRefCnt mRefCnt; nsAutoOwningThread _mOwningThread; public: |
1419 | NS_DECL_NSITHREADRETARGETABLESTREAMLISTENERvirtual nsresult CheckListenerChain(void) override; virtual nsresult OnDataFinished(nsresult aStatusCode) override; |
1420 | |
1421 | NS_IMETHODvirtual nsresult OnStartRequest(nsIRequest* aRequest) override { |
1422 | return mNext->OnStartRequest(aRequest); |
1423 | } |
1424 | |
1425 | NS_IMETHODvirtual nsresult OnStopRequest(nsIRequest* aRequest, |
1426 | nsresult aStatusCode) override { |
1427 | if (NS_FAILED(aStatusCode)((bool)(__builtin_expect(!!(NS_FAILED_impl(aStatusCode)), 0)) ) && NS_SUCCEEDED(mChannel->mStatus)((bool)(__builtin_expect(!!(!NS_FAILED_impl(mChannel->mStatus )), 1)))) { |
1428 | LOG(("HttpBaseChannel::InterceptFailedOnStop %p seting status %" PRIx32,do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::InterceptFailedOnStop %p seting status %" "x", mChannel, static_cast<uint32_t>(aStatusCode)); } } while (0) |
1429 | mChannel, static_cast<uint32_t>(aStatusCode)))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::InterceptFailedOnStop %p seting status %" "x", mChannel, static_cast<uint32_t>(aStatusCode)); } } while (0); |
1430 | mChannel->mStatus = aStatusCode; |
1431 | } |
1432 | return mNext->OnStopRequest(aRequest, aStatusCode); |
1433 | } |
1434 | |
1435 | NS_IMETHODvirtual nsresult OnDataAvailable(nsIRequest* aRequest, nsIInputStream* aInputStream, |
1436 | uint64_t aOffset, uint32_t aCount) override { |
1437 | return mNext->OnDataAvailable(aRequest, aInputStream, aOffset, aCount); |
1438 | } |
1439 | }; |
1440 | |
1441 | NS_IMPL_ADDREF(InterceptFailedOnStop)MozExternalRefCountType InterceptFailedOnStop::AddRef(void) { static_assert(!std::is_destructible_v<InterceptFailedOnStop >, "Reference-counted class " "InterceptFailedOnStop" " should not have a public destructor. " "Make this class's destructor non-public"); do { static_assert ( mozilla::detail::AssertionConditionType<decltype(int32_t (mRefCnt) >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) >= 0))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) >= 0" " (" "illegal refcnt" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1441); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) >= 0" ") (" "illegal refcnt" ")"); do { *((volatile int*)__null) = 1441; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("InterceptFailedOnStop" != nullptr)>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!("InterceptFailedOnStop" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"InterceptFailedOnStop\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1441); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"InterceptFailedOnStop\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 1441; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("InterceptFailedOnStop" " not thread-safe"); nsrefcnt count = ++mRefCnt; NS_LogAddRef((this), (count), ("InterceptFailedOnStop" ), (uint32_t)(sizeof(*this))); return count; } |
1442 | NS_IMPL_RELEASE(InterceptFailedOnStop)MozExternalRefCountType InterceptFailedOnStop::Release(void) { do { static_assert( mozilla::detail::AssertionConditionType< decltype(int32_t(mRefCnt) > 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) > 0))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) > 0" " (" "dup release" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1442); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) > 0" ") (" "dup release" ")"); do { *((volatile int*)__null) = 1442 ; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("InterceptFailedOnStop" != nullptr)>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!("InterceptFailedOnStop" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"InterceptFailedOnStop\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1442); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"InterceptFailedOnStop\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 1442; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("InterceptFailedOnStop" " not thread-safe"); const char* const nametmp = "InterceptFailedOnStop"; nsrefcnt count = --mRefCnt; NS_LogRelease((this), (count), (nametmp)) ; if (count == 0) { mRefCnt = 1; delete (this); return 0; } return count; } |
1443 | |
1444 | NS_INTERFACE_MAP_BEGIN(InterceptFailedOnStop)nsresult InterceptFailedOnStop::QueryInterface(const nsIID& aIID, void** aInstancePtr) { do { if (!(aInstancePtr)) { NS_DebugBreak (NS_DEBUG_ASSERTION, "QueryInterface requires a non-NULL destination!" , "aInstancePtr", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1444); MOZ_PretendNoReturn(); } } while (0); nsISupports* foundInterface ; |
1445 | NS_INTERFACE_MAP_ENTRY(nsIStreamListener)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIStreamListener>)) foundInterface = static_cast<nsIStreamListener*>(this); else |
1446 | NS_INTERFACE_MAP_ENTRY(nsIRequestObserver)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIRequestObserver>)) foundInterface = static_cast<nsIRequestObserver*>(this); else |
1447 | NS_INTERFACE_MAP_ENTRY(nsIThreadRetargetableStreamListener)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsIThreadRetargetableStreamListener> )) foundInterface = static_cast<nsIThreadRetargetableStreamListener *>(this); else |
1448 | NS_INTERFACE_MAP_ENTRY_AMBIGUOUS(nsISupports, nsIRequestObserver)if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t <decltype(*this)>, nsISupports>)) foundInterface = static_cast <nsISupports*>(static_cast<nsIRequestObserver*>(this )); else |
1449 | NS_INTERFACE_MAP_ENDfoundInterface = 0; nsresult status; if (!foundInterface) { do { static_assert( mozilla::detail::AssertionConditionType< decltype(!aIID.Equals((nsISupports::COMTypeInfo<nsISupports , void>::kIID)))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!aIID.Equals((nsISupports::COMTypeInfo <nsISupports, void>::kIID))))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("!aIID.Equals((nsISupports::COMTypeInfo<nsISupports, void>::kIID))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1449); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!aIID.Equals((nsISupports::COMTypeInfo<nsISupports, void>::kIID))" ")"); do { *((volatile int*)__null) = 1449; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); status = NS_NOINTERFACE ; } else { (foundInterface)->AddRef(); status = NS_OK; } * aInstancePtr = foundInterface; return status; } |
1450 | |
1451 | NS_IMETHODIMPnsresult |
1452 | InterceptFailedOnStop::CheckListenerChain() { |
1453 | nsCOMPtr<nsIThreadRetargetableStreamListener> listener = |
1454 | do_QueryInterface(mNext); |
1455 | if (!listener) { |
1456 | return NS_ERROR_NO_INTERFACE; |
1457 | } |
1458 | |
1459 | return listener->CheckListenerChain(); |
1460 | } |
1461 | |
1462 | NS_IMETHODIMPnsresult |
1463 | InterceptFailedOnStop::OnDataFinished(nsresult aStatus) { |
1464 | nsCOMPtr<nsIThreadRetargetableStreamListener> listener = |
1465 | do_QueryInterface(mNext); |
1466 | if (listener) { |
1467 | return listener->OnDataFinished(aStatus); |
1468 | } |
1469 | |
1470 | return NS_OK; |
1471 | } |
1472 | |
1473 | NS_IMETHODIMPnsresult |
1474 | HttpBaseChannel::DoApplyContentConversions(nsIStreamListener* aNextListener, |
1475 | nsIStreamListener** aNewNextListener, |
1476 | nsISupports* aCtxt) { |
1477 | *aNewNextListener = nullptr; |
1478 | if (!mResponseHead || !aNextListener) { |
1479 | return NS_OK; |
1480 | } |
1481 | |
1482 | LOG(("HttpBaseChannel::DoApplyContentConversions [this=%p]\n", this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::DoApplyContentConversions [this=%p]\n", this ); } } while (0); |
1483 | |
1484 | if (!LoadApplyConversion()) { |
1485 | LOG(("not applying conversion per ApplyConversion\n"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "not applying conversion per ApplyConversion\n"); } } while (0); |
1486 | return NS_OK; |
1487 | } |
1488 | |
1489 | if (LoadHasAppliedConversion()) { |
1490 | LOG(("not applying conversion because HasAppliedConversion is true\n"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "not applying conversion because HasAppliedConversion is true\n" ); } } while (0); |
1491 | return NS_OK; |
1492 | } |
1493 | |
1494 | if (LoadDeliveringAltData()) { |
1495 | MOZ_ASSERT(!mAvailableCachedAltDataType.IsEmpty())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mAvailableCachedAltDataType.IsEmpty())>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!(!mAvailableCachedAltDataType.IsEmpty()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mAvailableCachedAltDataType.IsEmpty()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1495); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mAvailableCachedAltDataType.IsEmpty()" ")"); do { *((volatile int*)__null) = 1495; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1496 | LOG(("not applying conversion because delivering alt-data\n"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "not applying conversion because delivering alt-data\n"); } } while (0); |
1497 | return NS_OK; |
1498 | } |
1499 | |
1500 | nsAutoCString contentEncoding; |
1501 | nsresult rv = |
1502 | mResponseHead->GetHeader(nsHttp::Content_Encoding, contentEncoding); |
1503 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0))) || contentEncoding.IsEmpty()) return NS_OK; |
1504 | |
1505 | nsCOMPtr<nsIStreamListener> nextListener = |
1506 | new InterceptFailedOnStop(aNextListener, this); |
1507 | |
1508 | // The encodings are listed in the order they were applied |
1509 | // (see rfc 2616 section 14.11), so they need to removed in reverse |
1510 | // order. This is accomplished because the converter chain ends up |
1511 | // being a stack with the last converter created being the first one |
1512 | // to accept the raw network data. |
1513 | |
1514 | char* cePtr = contentEncoding.BeginWriting(); |
1515 | uint32_t count = 0; |
1516 | while (char* val = nsCRT::strtok(cePtr, HTTP_LWS" \t" ",", &cePtr)) { |
1517 | if (++count > 16) { |
1518 | // That's ridiculous. We only understand 2 different ones :) |
1519 | // but for compatibility with old code, we will just carry on without |
1520 | // removing the encodings |
1521 | LOG(("Too many Content-Encodings. Ignoring remainder.\n"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "Too many Content-Encodings. Ignoring remainder.\n"); } } while (0); |
1522 | break; |
1523 | } |
1524 | |
1525 | if (gHttpHandler->IsAcceptableEncoding(val, |
1526 | isSecureOrTrustworthyURL(mURI))) { |
1527 | RefPtr<nsHTTPCompressConv> converter = new nsHTTPCompressConv(); |
1528 | nsAutoCString from(val); |
1529 | ToLowerCase(from); |
1530 | rv = converter->AsyncConvertData(from.get(), "uncompressed", nextListener, |
1531 | aCtxt); |
1532 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
1533 | LOG(("Unexpected failure of AsyncConvertData %s\n", val))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "Unexpected failure of AsyncConvertData %s\n", val); } } while (0); |
1534 | return rv; |
1535 | } |
1536 | |
1537 | LOG(("converter removed '%s' content-encoding\n", val))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "converter removed '%s' content-encoding\n", val); } } while (0); |
1538 | if (Telemetry::CanRecordPrereleaseData()) { |
1539 | int mode = 0; |
1540 | if (from.EqualsLiteral("gzip") || from.EqualsLiteral("x-gzip")) { |
1541 | mode = 1; |
1542 | } else if (from.EqualsLiteral("deflate") || |
1543 | from.EqualsLiteral("x-deflate")) { |
1544 | mode = 2; |
1545 | } else if (from.EqualsLiteral("br")) { |
1546 | mode = 3; |
1547 | } else if (from.EqualsLiteral("zstd")) { |
1548 | mode = 4; |
1549 | } |
1550 | Telemetry::Accumulate(Telemetry::HTTP_CONTENT_ENCODING, mode); |
1551 | } |
1552 | nextListener = converter; |
1553 | } else { |
1554 | if (val) LOG(("Unknown content encoding '%s', ignoring\n", val))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "Unknown content encoding '%s', ignoring\n", val); } } while (0); |
1555 | } |
1556 | } |
1557 | *aNewNextListener = do_AddRef(nextListener).take(); |
1558 | return NS_OK; |
1559 | } |
1560 | |
1561 | NS_IMETHODIMPnsresult |
1562 | HttpBaseChannel::GetContentEncodings(nsIUTF8StringEnumerator** aEncodings) { |
1563 | if (!mResponseHead) { |
1564 | *aEncodings = nullptr; |
1565 | return NS_OK; |
1566 | } |
1567 | |
1568 | nsAutoCString encoding; |
1569 | Unused << mResponseHead->GetHeader(nsHttp::Content_Encoding, encoding); |
1570 | if (encoding.IsEmpty()) { |
1571 | *aEncodings = nullptr; |
1572 | return NS_OK; |
1573 | } |
1574 | RefPtr<nsContentEncodings> enumerator = |
1575 | new nsContentEncodings(this, encoding.get()); |
1576 | enumerator.forget(aEncodings); |
1577 | return NS_OK; |
1578 | } |
1579 | |
1580 | //----------------------------------------------------------------------------- |
1581 | // HttpBaseChannel::nsContentEncodings <public> |
1582 | //----------------------------------------------------------------------------- |
1583 | |
1584 | HttpBaseChannel::nsContentEncodings::nsContentEncodings( |
1585 | nsIHttpChannel* aChannel, const char* aEncodingHeader) |
1586 | : mEncodingHeader(aEncodingHeader), mChannel(aChannel), mReady(false) { |
1587 | mCurEnd = aEncodingHeader + strlen(aEncodingHeader); |
1588 | mCurStart = mCurEnd; |
1589 | } |
1590 | |
1591 | //----------------------------------------------------------------------------- |
1592 | // HttpBaseChannel::nsContentEncodings::nsISimpleEnumerator |
1593 | //----------------------------------------------------------------------------- |
1594 | |
1595 | NS_IMETHODIMPnsresult |
1596 | HttpBaseChannel::nsContentEncodings::HasMore(bool* aMoreEncodings) { |
1597 | if (mReady) { |
1598 | *aMoreEncodings = true; |
1599 | return NS_OK; |
1600 | } |
1601 | |
1602 | nsresult rv = PrepareForNext(); |
1603 | *aMoreEncodings = NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1))); |
1604 | return NS_OK; |
1605 | } |
1606 | |
1607 | NS_IMETHODIMPnsresult |
1608 | HttpBaseChannel::nsContentEncodings::GetNext(nsACString& aNextEncoding) { |
1609 | aNextEncoding.Truncate(); |
1610 | if (!mReady) { |
1611 | nsresult rv = PrepareForNext(); |
1612 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
1613 | return NS_ERROR_FAILURE; |
1614 | } |
1615 | } |
1616 | |
1617 | const nsACString& encoding = Substring(mCurStart, mCurEnd); |
1618 | |
1619 | nsACString::const_iterator start, end; |
1620 | encoding.BeginReading(start); |
1621 | encoding.EndReading(end); |
1622 | |
1623 | bool haveType = false; |
1624 | if (CaseInsensitiveFindInReadable("gzip"_ns, start, end)) { |
1625 | aNextEncoding.AssignLiteral(APPLICATION_GZIP"application/x-gzip"); |
1626 | haveType = true; |
1627 | } |
1628 | |
1629 | if (!haveType) { |
1630 | encoding.BeginReading(start); |
1631 | if (CaseInsensitiveFindInReadable("compress"_ns, start, end)) { |
1632 | aNextEncoding.AssignLiteral(APPLICATION_COMPRESS"application/x-compress"); |
1633 | haveType = true; |
1634 | } |
1635 | } |
1636 | |
1637 | if (!haveType) { |
1638 | encoding.BeginReading(start); |
1639 | if (CaseInsensitiveFindInReadable("deflate"_ns, start, end)) { |
1640 | aNextEncoding.AssignLiteral(APPLICATION_ZIP"application/zip"); |
1641 | haveType = true; |
1642 | } |
1643 | } |
1644 | |
1645 | if (!haveType) { |
1646 | encoding.BeginReading(start); |
1647 | if (CaseInsensitiveFindInReadable("br"_ns, start, end)) { |
1648 | aNextEncoding.AssignLiteral(APPLICATION_BROTLI"application/brotli"); |
1649 | haveType = true; |
1650 | } |
1651 | } |
1652 | |
1653 | if (!haveType) { |
1654 | encoding.BeginReading(start); |
1655 | if (CaseInsensitiveFindInReadable("zstd"_ns, start, end)) { |
1656 | aNextEncoding.AssignLiteral(APPLICATION_ZSTD"application/zstd"); |
1657 | haveType = true; |
1658 | } |
1659 | } |
1660 | |
1661 | // Prepare to fetch the next encoding |
1662 | mCurEnd = mCurStart; |
1663 | mReady = false; |
1664 | |
1665 | if (haveType) return NS_OK; |
1666 | |
1667 | NS_WARNING("Unknown encoding type")NS_DebugBreak(NS_DEBUG_WARNING, "Unknown encoding type", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1667); |
1668 | return NS_ERROR_FAILURE; |
1669 | } |
1670 | |
1671 | //----------------------------------------------------------------------------- |
1672 | // HttpBaseChannel::nsContentEncodings::nsISupports |
1673 | //----------------------------------------------------------------------------- |
1674 | |
1675 | NS_IMPL_ISUPPORTS(HttpBaseChannel::nsContentEncodings, nsIUTF8StringEnumerator,MozExternalRefCountType HttpBaseChannel::nsContentEncodings:: AddRef(void) { static_assert(!std::is_destructible_v<HttpBaseChannel ::nsContentEncodings>, "Reference-counted class " "HttpBaseChannel::nsContentEncodings" " should not have a public destructor. " "Make this class's destructor non-public" ); do { static_assert( mozilla::detail::AssertionConditionType <decltype(int32_t(mRefCnt) >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) >= 0))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) >= 0" " (" "illegal refcnt" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) >= 0" ") (" "illegal refcnt" ")"); do { *((volatile int*)__null) = 1676; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("HttpBaseChannel::nsContentEncodings" != nullptr )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!("HttpBaseChannel::nsContentEncodings" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"HttpBaseChannel::nsContentEncodings\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"HttpBaseChannel::nsContentEncodings\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 1676; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("HttpBaseChannel::nsContentEncodings" " not thread-safe" ); nsrefcnt count = ++mRefCnt; NS_LogAddRef((this), (count), ( "HttpBaseChannel::nsContentEncodings"), (uint32_t)(sizeof(*this ))); return count; } MozExternalRefCountType HttpBaseChannel:: nsContentEncodings::Release(void) { do { static_assert( mozilla ::detail::AssertionConditionType<decltype(int32_t(mRefCnt) > 0)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(int32_t(mRefCnt) > 0))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("int32_t(mRefCnt) > 0" " (" "dup release" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) > 0" ") (" "dup release" ")"); do { *((volatile int*)__null) = 1676 ; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("HttpBaseChannel::nsContentEncodings" != nullptr )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!("HttpBaseChannel::nsContentEncodings" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"HttpBaseChannel::nsContentEncodings\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"HttpBaseChannel::nsContentEncodings\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 1676; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("HttpBaseChannel::nsContentEncodings" " not thread-safe" ); const char* const nametmp = "HttpBaseChannel::nsContentEncodings" ; nsrefcnt count = --mRefCnt; NS_LogRelease((this), (count), ( nametmp)); if (count == 0) { mRefCnt = 1; delete (this); return 0; } return count; } nsresult HttpBaseChannel::nsContentEncodings ::QueryInterface(const nsIID& aIID, void** aInstancePtr) { do { if (!(aInstancePtr)) { NS_DebugBreak(NS_DEBUG_ASSERTION , "QueryInterface requires a non-NULL destination!", "aInstancePtr" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); MOZ_PretendNoReturn(); } } while (0); nsresult rv = NS_ERROR_FAILURE ; static_assert(2 > 0, "Need more arguments to NS_INTERFACE_TABLE" ); static const QITableEntry table[] = { {&mozilla::detail ::kImplementedIID<HttpBaseChannel::nsContentEncodings, nsIUTF8StringEnumerator >, int32_t( reinterpret_cast<char*>(static_cast<nsIUTF8StringEnumerator *>((HttpBaseChannel::nsContentEncodings*)0x1000)) - reinterpret_cast <char*>((HttpBaseChannel::nsContentEncodings*)0x1000))} , {&mozilla::detail::kImplementedIID<HttpBaseChannel:: nsContentEncodings, nsIStringEnumerator>, int32_t( reinterpret_cast <char*>(static_cast<nsIStringEnumerator*>((HttpBaseChannel ::nsContentEncodings*)0x1000)) - reinterpret_cast<char*> ((HttpBaseChannel::nsContentEncodings*)0x1000))}, {&mozilla ::detail::kImplementedIID<HttpBaseChannel::nsContentEncodings , nsISupports>, int32_t(reinterpret_cast<char*>(static_cast <nsISupports*>( static_cast<nsIUTF8StringEnumerator* >((HttpBaseChannel::nsContentEncodings*)0x1000))) - reinterpret_cast <char*>((HttpBaseChannel::nsContentEncodings*)0x1000))} , { nullptr, 0 } } ; static_assert(std::size(table) > 1, "need at least 1 interface" ); rv = NS_TableDrivenQI(static_cast<void*>(this), aIID , aInstancePtr, table); return rv; } |
1676 | nsIStringEnumerator)MozExternalRefCountType HttpBaseChannel::nsContentEncodings:: AddRef(void) { static_assert(!std::is_destructible_v<HttpBaseChannel ::nsContentEncodings>, "Reference-counted class " "HttpBaseChannel::nsContentEncodings" " should not have a public destructor. " "Make this class's destructor non-public" ); do { static_assert( mozilla::detail::AssertionConditionType <decltype(int32_t(mRefCnt) >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(int32_t(mRefCnt) >= 0))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("int32_t(mRefCnt) >= 0" " (" "illegal refcnt" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) >= 0" ") (" "illegal refcnt" ")"); do { *((volatile int*)__null) = 1676; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("HttpBaseChannel::nsContentEncodings" != nullptr )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!("HttpBaseChannel::nsContentEncodings" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"HttpBaseChannel::nsContentEncodings\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"HttpBaseChannel::nsContentEncodings\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 1676; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("HttpBaseChannel::nsContentEncodings" " not thread-safe" ); nsrefcnt count = ++mRefCnt; NS_LogAddRef((this), (count), ( "HttpBaseChannel::nsContentEncodings"), (uint32_t)(sizeof(*this ))); return count; } MozExternalRefCountType HttpBaseChannel:: nsContentEncodings::Release(void) { do { static_assert( mozilla ::detail::AssertionConditionType<decltype(int32_t(mRefCnt) > 0)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(int32_t(mRefCnt) > 0))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("int32_t(mRefCnt) > 0" " (" "dup release" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "int32_t(mRefCnt) > 0" ") (" "dup release" ")"); do { *((volatile int*)__null) = 1676 ; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); do { static_assert( mozilla::detail::AssertionConditionType <decltype("HttpBaseChannel::nsContentEncodings" != nullptr )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!("HttpBaseChannel::nsContentEncodings" != nullptr))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("\"HttpBaseChannel::nsContentEncodings\" != nullptr" " (" "Must specify a name" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); AnnotateMozCrashReason("MOZ_ASSERT" "(" "\"HttpBaseChannel::nsContentEncodings\" != nullptr" ") (" "Must specify a name" ")"); do { *((volatile int*)__null ) = 1676; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); if (!mRefCnt.isThreadSafe) _mOwningThread .AssertOwnership("HttpBaseChannel::nsContentEncodings" " not thread-safe" ); const char* const nametmp = "HttpBaseChannel::nsContentEncodings" ; nsrefcnt count = --mRefCnt; NS_LogRelease((this), (count), ( nametmp)); if (count == 0) { mRefCnt = 1; delete (this); return 0; } return count; } nsresult HttpBaseChannel::nsContentEncodings ::QueryInterface(const nsIID& aIID, void** aInstancePtr) { do { if (!(aInstancePtr)) { NS_DebugBreak(NS_DEBUG_ASSERTION , "QueryInterface requires a non-NULL destination!", "aInstancePtr" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1676); MOZ_PretendNoReturn(); } } while (0); nsresult rv = NS_ERROR_FAILURE ; static_assert(2 > 0, "Need more arguments to NS_INTERFACE_TABLE" ); static const QITableEntry table[] = { {&mozilla::detail ::kImplementedIID<HttpBaseChannel::nsContentEncodings, nsIUTF8StringEnumerator >, int32_t( reinterpret_cast<char*>(static_cast<nsIUTF8StringEnumerator *>((HttpBaseChannel::nsContentEncodings*)0x1000)) - reinterpret_cast <char*>((HttpBaseChannel::nsContentEncodings*)0x1000))} , {&mozilla::detail::kImplementedIID<HttpBaseChannel:: nsContentEncodings, nsIStringEnumerator>, int32_t( reinterpret_cast <char*>(static_cast<nsIStringEnumerator*>((HttpBaseChannel ::nsContentEncodings*)0x1000)) - reinterpret_cast<char*> ((HttpBaseChannel::nsContentEncodings*)0x1000))}, {&mozilla ::detail::kImplementedIID<HttpBaseChannel::nsContentEncodings , nsISupports>, int32_t(reinterpret_cast<char*>(static_cast <nsISupports*>( static_cast<nsIUTF8StringEnumerator* >((HttpBaseChannel::nsContentEncodings*)0x1000))) - reinterpret_cast <char*>((HttpBaseChannel::nsContentEncodings*)0x1000))} , { nullptr, 0 } } ; static_assert(std::size(table) > 1, "need at least 1 interface" ); rv = NS_TableDrivenQI(static_cast<void*>(this), aIID , aInstancePtr, table); return rv; } |
1677 | |
1678 | //----------------------------------------------------------------------------- |
1679 | // HttpBaseChannel::nsContentEncodings <private> |
1680 | //----------------------------------------------------------------------------- |
1681 | |
1682 | nsresult HttpBaseChannel::nsContentEncodings::PrepareForNext(void) { |
1683 | MOZ_ASSERT(mCurStart == mCurEnd, "Indeterminate state")do { static_assert( mozilla::detail::AssertionConditionType< decltype(mCurStart == mCurEnd)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mCurStart == mCurEnd))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("mCurStart == mCurEnd" " (" "Indeterminate state" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1683); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mCurStart == mCurEnd" ") (" "Indeterminate state" ")"); do { *((volatile int*)__null ) = 1683; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); |
1684 | |
1685 | // At this point both mCurStart and mCurEnd point to somewhere |
1686 | // past the end of the next thing we want to return |
1687 | |
1688 | while (mCurEnd != mEncodingHeader) { |
1689 | --mCurEnd; |
1690 | if (*mCurEnd != ',' && !nsCRT::IsAsciiSpace(*mCurEnd)) break; |
1691 | } |
1692 | if (mCurEnd == mEncodingHeader) { |
1693 | return NS_ERROR_NOT_AVAILABLE; // no more encodings |
1694 | } |
1695 | ++mCurEnd; |
1696 | |
1697 | // At this point mCurEnd points to the first char _after_ the |
1698 | // header we want. Furthermore, mCurEnd - 1 != mEncodingHeader |
1699 | |
1700 | mCurStart = mCurEnd - 1; |
1701 | while (mCurStart != mEncodingHeader && *mCurStart != ',' && |
1702 | !nsCRT::IsAsciiSpace(*mCurStart)) { |
1703 | --mCurStart; |
1704 | } |
1705 | if (*mCurStart == ',' || nsCRT::IsAsciiSpace(*mCurStart)) { |
1706 | ++mCurStart; // we stopped because of a weird char, so move up one |
1707 | } |
1708 | |
1709 | // At this point mCurStart and mCurEnd bracket the encoding string |
1710 | // we want. Check that it's not "identity" |
1711 | if (Substring(mCurStart, mCurEnd) |
1712 | .Equals("identity", nsCaseInsensitiveCStringComparator)) { |
1713 | mCurEnd = mCurStart; |
1714 | return PrepareForNext(); |
1715 | } |
1716 | |
1717 | mReady = true; |
1718 | return NS_OK; |
1719 | } |
1720 | |
1721 | //----------------------------------------------------------------------------- |
1722 | // HttpBaseChannel::nsIHttpChannel |
1723 | //----------------------------------------------------------------------------- |
1724 | |
1725 | NS_IMETHODIMPnsresult |
1726 | HttpBaseChannel::GetChannelId(uint64_t* aChannelId) { |
1727 | NS_ENSURE_ARG_POINTER(aChannelId)do { if ((__builtin_expect(!!(!(aChannelId)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aChannelId" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1727); return NS_ERROR_INVALID_POINTER; } } while (false); |
1728 | *aChannelId = mChannelId; |
1729 | return NS_OK; |
1730 | } |
1731 | |
1732 | NS_IMETHODIMPnsresult |
1733 | HttpBaseChannel::SetChannelId(uint64_t aChannelId) { |
1734 | mChannelId = aChannelId; |
1735 | return NS_OK; |
1736 | } |
1737 | |
1738 | NS_IMETHODIMPnsresult HttpBaseChannel::GetTopLevelContentWindowId(uint64_t* aWindowId) { |
1739 | if (!mContentWindowId) { |
1740 | nsCOMPtr<nsILoadContext> loadContext; |
1741 | GetCallback(loadContext); |
1742 | if (loadContext) { |
1743 | nsCOMPtr<mozIDOMWindowProxy> topWindow; |
1744 | loadContext->GetTopWindow(getter_AddRefs(topWindow)); |
1745 | if (topWindow) { |
1746 | if (nsPIDOMWindowInner* inner = |
1747 | nsPIDOMWindowOuter::From(topWindow)->GetCurrentInnerWindow()) { |
1748 | mContentWindowId = inner->WindowID(); |
1749 | } |
1750 | } |
1751 | } |
1752 | } |
1753 | *aWindowId = mContentWindowId; |
1754 | return NS_OK; |
1755 | } |
1756 | |
1757 | NS_IMETHODIMPnsresult HttpBaseChannel::SetBrowserId(uint64_t aId) { |
1758 | mBrowserId = aId; |
1759 | return NS_OK; |
1760 | } |
1761 | |
1762 | NS_IMETHODIMPnsresult HttpBaseChannel::GetBrowserId(uint64_t* aId) { |
1763 | EnsureBrowserId(); |
1764 | *aId = mBrowserId; |
1765 | return NS_OK; |
1766 | } |
1767 | |
1768 | NS_IMETHODIMPnsresult HttpBaseChannel::SetTopLevelContentWindowId(uint64_t aWindowId) { |
1769 | mContentWindowId = aWindowId; |
1770 | return NS_OK; |
1771 | } |
1772 | |
1773 | NS_IMETHODIMPnsresult |
1774 | HttpBaseChannel::IsThirdPartyTrackingResource(bool* aIsTrackingResource) { |
1775 | MOZ_ASSERT(do { static_assert( mozilla::detail::AssertionConditionType< decltype(!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags ))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags )))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1776); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags)" ")"); do { *((volatile int*)__null) = 1776; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
1776 | !(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags))do { static_assert( mozilla::detail::AssertionConditionType< decltype(!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags ))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags )))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1776); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!(mFirstPartyClassificationFlags && mThirdPartyClassificationFlags)" ")"); do { *((volatile int*)__null) = 1776; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1777 | *aIsTrackingResource = UrlClassifierCommon::IsTrackingClassificationFlag( |
1778 | mThirdPartyClassificationFlags, |
1779 | mLoadInfo->GetOriginAttributes().IsPrivateBrowsing()); |
1780 | return NS_OK; |
1781 | } |
1782 | |
1783 | NS_IMETHODIMPnsresult |
1784 | HttpBaseChannel::IsThirdPartySocialTrackingResource( |
1785 | bool* aIsThirdPartySocialTrackingResource) { |
1786 | MOZ_ASSERT(!mFirstPartyClassificationFlags ||do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1787); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags" ")"); do { *((volatile int*)__null) = 1787; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
1787 | !mThirdPartyClassificationFlags)do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1787); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mFirstPartyClassificationFlags || !mThirdPartyClassificationFlags" ")"); do { *((volatile int*)__null) = 1787; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
1788 | *aIsThirdPartySocialTrackingResource = |
1789 | UrlClassifierCommon::IsSocialTrackingClassificationFlag( |
1790 | mThirdPartyClassificationFlags); |
1791 | return NS_OK; |
1792 | } |
1793 | |
1794 | NS_IMETHODIMPnsresult |
1795 | HttpBaseChannel::GetClassificationFlags(uint32_t* aFlags) { |
1796 | if (mThirdPartyClassificationFlags) { |
1797 | *aFlags = mThirdPartyClassificationFlags; |
1798 | } else { |
1799 | *aFlags = mFirstPartyClassificationFlags; |
1800 | } |
1801 | return NS_OK; |
1802 | } |
1803 | |
1804 | NS_IMETHODIMPnsresult |
1805 | HttpBaseChannel::GetFirstPartyClassificationFlags(uint32_t* aFlags) { |
1806 | *aFlags = mFirstPartyClassificationFlags; |
1807 | return NS_OK; |
1808 | } |
1809 | |
1810 | NS_IMETHODIMPnsresult |
1811 | HttpBaseChannel::GetThirdPartyClassificationFlags(uint32_t* aFlags) { |
1812 | *aFlags = mThirdPartyClassificationFlags; |
1813 | return NS_OK; |
1814 | } |
1815 | |
1816 | NS_IMETHODIMPnsresult |
1817 | HttpBaseChannel::GetTransferSize(uint64_t* aTransferSize) { |
1818 | MutexAutoLock lock(mOnDataFinishedMutex); |
1819 | *aTransferSize = mTransferSize; |
1820 | return NS_OK; |
1821 | } |
1822 | |
1823 | NS_IMETHODIMPnsresult |
1824 | HttpBaseChannel::GetRequestSize(uint64_t* aRequestSize) { |
1825 | *aRequestSize = mRequestSize; |
1826 | return NS_OK; |
1827 | } |
1828 | |
1829 | NS_IMETHODIMPnsresult |
1830 | HttpBaseChannel::GetDecodedBodySize(uint64_t* aDecodedBodySize) { |
1831 | *aDecodedBodySize = mDecodedBodySize; |
1832 | return NS_OK; |
1833 | } |
1834 | |
1835 | NS_IMETHODIMPnsresult |
1836 | HttpBaseChannel::GetEncodedBodySize(uint64_t* aEncodedBodySize) { |
1837 | MutexAutoLock lock(mOnDataFinishedMutex); |
1838 | *aEncodedBodySize = mEncodedBodySize; |
1839 | return NS_OK; |
1840 | } |
1841 | |
1842 | NS_IMETHODIMPnsresult |
1843 | HttpBaseChannel::GetSupportsHTTP3(bool* aSupportsHTTP3) { |
1844 | *aSupportsHTTP3 = mSupportsHTTP3; |
1845 | return NS_OK; |
1846 | } |
1847 | |
1848 | NS_IMETHODIMPnsresult |
1849 | HttpBaseChannel::GetHasHTTPSRR(bool* aHasHTTPSRR) { |
1850 | *aHasHTTPSRR = LoadHasHTTPSRR(); |
1851 | return NS_OK; |
1852 | } |
1853 | |
1854 | NS_IMETHODIMPnsresult |
1855 | HttpBaseChannel::GetRequestMethod(nsACString& aMethod) { |
1856 | mRequestHead.Method(aMethod); |
1857 | return NS_OK; |
1858 | } |
1859 | |
1860 | NS_IMETHODIMPnsresult |
1861 | HttpBaseChannel::SetRequestMethod(const nsACString& aMethod) { |
1862 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1862); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1862, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1862); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1862); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 1862; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
1863 | |
1864 | mLoadInfo->SetIsGETRequest(aMethod.Equals("GET")); |
1865 | |
1866 | const nsCString& flatMethod = PromiseFlatCStringTPromiseFlatString<char>(aMethod); |
1867 | |
1868 | // Method names are restricted to valid HTTP tokens. |
1869 | if (!nsHttp::IsValidToken(flatMethod)) return NS_ERROR_INVALID_ARG; |
1870 | |
1871 | mRequestHead.SetMethod(flatMethod); |
1872 | return NS_OK; |
1873 | } |
1874 | |
1875 | NS_IMETHODIMPnsresult |
1876 | HttpBaseChannel::GetReferrerInfo(nsIReferrerInfo** aReferrerInfo) { |
1877 | NS_ENSURE_ARG_POINTER(aReferrerInfo)do { if ((__builtin_expect(!!(!(aReferrerInfo)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aReferrerInfo" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1877); return NS_ERROR_INVALID_POINTER; } } while (false); |
1878 | *aReferrerInfo = do_AddRef(mReferrerInfo).take(); |
1879 | return NS_OK; |
1880 | } |
1881 | |
1882 | nsresult HttpBaseChannel::SetReferrerInfoInternal( |
1883 | nsIReferrerInfo* aReferrerInfo, bool aClone, bool aCompute, |
1884 | bool aRespectBeforeConnect) { |
1885 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetReferrerInfoInternal [this=%p aClone(%d) " "aCompute(%d)]\n", this, aClone, aCompute); } } while (0) |
1886 | ("HttpBaseChannel::SetReferrerInfoInternal [this=%p aClone(%d) "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetReferrerInfoInternal [this=%p aClone(%d) " "aCompute(%d)]\n", this, aClone, aCompute); } } while (0) |
1887 | "aCompute(%d)]\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetReferrerInfoInternal [this=%p aClone(%d) " "aCompute(%d)]\n", this, aClone, aCompute); } } while (0) |
1888 | this, aClone, aCompute))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetReferrerInfoInternal [this=%p aClone(%d) " "aCompute(%d)]\n", this, aClone, aCompute); } } while (0); |
1889 | if (aRespectBeforeConnect) { |
1890 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1890); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1890, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1890); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1890); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 1890; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
1891 | } |
1892 | |
1893 | mReferrerInfo = aReferrerInfo; |
1894 | |
1895 | // clear existing referrer, if any |
1896 | nsresult rv = ClearReferrerHeader(); |
1897 | if (NS_WARN_IF(NS_FAILED(rv))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(rv )), 0))), "NS_FAILED(rv)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1897)) { |
1898 | return rv; |
1899 | } |
1900 | |
1901 | if (!mReferrerInfo) { |
1902 | return NS_OK; |
1903 | } |
1904 | |
1905 | if (aClone) { |
1906 | mReferrerInfo = static_cast<dom::ReferrerInfo*>(aReferrerInfo)->Clone(); |
1907 | } |
1908 | |
1909 | dom::ReferrerInfo* referrerInfo = |
1910 | static_cast<dom::ReferrerInfo*>(mReferrerInfo.get()); |
1911 | |
1912 | // Don't set referrerInfo if it has not been initialized. |
1913 | if (!referrerInfo->IsInitialized()) { |
1914 | mReferrerInfo = nullptr; |
1915 | return NS_ERROR_NOT_INITIALIZED; |
1916 | } |
1917 | |
1918 | if (aClone) { |
1919 | // Record the telemetry once we set the referrer info to the channel |
1920 | // successfully. |
1921 | referrerInfo->RecordTelemetry(this); |
1922 | } |
1923 | |
1924 | if (aCompute) { |
1925 | rv = referrerInfo->ComputeReferrer(this); |
1926 | if (NS_WARN_IF(NS_FAILED(rv))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(rv )), 0))), "NS_FAILED(rv)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1926)) { |
1927 | return rv; |
1928 | } |
1929 | } |
1930 | |
1931 | nsCOMPtr<nsIURI> computedReferrer = mReferrerInfo->GetComputedReferrer(); |
1932 | if (!computedReferrer) { |
1933 | return NS_OK; |
1934 | } |
1935 | |
1936 | nsAutoCString spec; |
1937 | rv = computedReferrer->GetSpec(spec); |
1938 | if (NS_WARN_IF(NS_FAILED(rv))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(rv )), 0))), "NS_FAILED(rv)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1938)) { |
1939 | return rv; |
1940 | } |
1941 | |
1942 | return SetReferrerHeader(spec, aRespectBeforeConnect); |
1943 | } |
1944 | |
1945 | NS_IMETHODIMPnsresult |
1946 | HttpBaseChannel::SetReferrerInfo(nsIReferrerInfo* aReferrerInfo) { |
1947 | return SetReferrerInfoInternal(aReferrerInfo, true, true, true); |
1948 | } |
1949 | |
1950 | NS_IMETHODIMPnsresult |
1951 | HttpBaseChannel::SetReferrerInfoWithoutClone(nsIReferrerInfo* aReferrerInfo) { |
1952 | return SetReferrerInfoInternal(aReferrerInfo, false, true, true); |
1953 | } |
1954 | |
1955 | // Return the channel's proxy URI, or if it doesn't exist, the |
1956 | // channel's main URI. |
1957 | NS_IMETHODIMPnsresult |
1958 | HttpBaseChannel::GetProxyURI(nsIURI** aOut) { |
1959 | NS_ENSURE_ARG_POINTER(aOut)do { if ((__builtin_expect(!!(!(aOut)), 0))) { NS_DebugBreak( NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aOut" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 1959); return NS_ERROR_INVALID_POINTER; } } while (false); |
1960 | nsCOMPtr<nsIURI> result(mProxyURI); |
1961 | result.forget(aOut); |
1962 | return NS_OK; |
1963 | } |
1964 | |
1965 | NS_IMETHODIMPnsresult |
1966 | HttpBaseChannel::GetRequestHeader(const nsACString& aHeader, |
1967 | nsACString& aValue) { |
1968 | aValue.Truncate(); |
1969 | |
1970 | // XXX might be better to search the header list directly instead of |
1971 | // hitting the http atom hash table. |
1972 | nsHttpAtom atom = nsHttp::ResolveAtom(aHeader); |
1973 | if (!atom) return NS_ERROR_NOT_AVAILABLE; |
1974 | |
1975 | return mRequestHead.GetHeader(atom, aValue); |
1976 | } |
1977 | |
1978 | NS_IMETHODIMPnsresult |
1979 | HttpBaseChannel::SetRequestHeader(const nsACString& aHeader, |
1980 | const nsACString& aValue, bool aMerge) { |
1981 | return SetRequestHeaderInternal(aHeader, aValue, aMerge, |
1982 | nsHttpHeaderArray::eVarietyRequestOverride); |
1983 | } |
1984 | |
1985 | nsresult HttpBaseChannel::SetRequestHeaderInternal( |
1986 | const nsACString& aHeader, const nsACString& aValue, bool aMerge, |
1987 | nsHttpHeaderArray::HeaderVariety aVariety) { |
1988 | const nsCString& flatHeader = PromiseFlatCStringTPromiseFlatString<char>(aHeader); |
1989 | const nsCString& flatValue = PromiseFlatCStringTPromiseFlatString<char>(aValue); |
1990 | |
1991 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetRequestHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, flatHeader.get(), flatValue.get(), aMerge ); } } while (0) |
1992 | ("HttpBaseChannel::SetRequestHeader [this=%p header=\"%s\" value=\"%s\" "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetRequestHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, flatHeader.get(), flatValue.get(), aMerge ); } } while (0) |
1993 | "merge=%u]\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetRequestHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, flatHeader.get(), flatValue.get(), aMerge ); } } while (0) |
1994 | this, flatHeader.get(), flatValue.get(), aMerge))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetRequestHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, flatHeader.get(), flatValue.get(), aMerge ); } } while (0); |
1995 | |
1996 | // Verify header names are valid HTTP tokens and header values are reasonably |
1997 | // close to whats allowed in RFC 2616. |
1998 | if (!nsHttp::IsValidToken(flatHeader) || |
1999 | !nsHttp::IsReasonableHeaderValue(flatValue)) { |
2000 | return NS_ERROR_INVALID_ARG; |
2001 | } |
2002 | |
2003 | // Mark that the User-Agent header has been modified. |
2004 | if (nsHttp::ResolveAtom(aHeader) == nsHttp::User_Agent) { |
2005 | StoreIsUserAgentHeaderModified(true); |
2006 | } |
2007 | |
2008 | return mRequestHead.SetHeader(aHeader, flatValue, aMerge); |
2009 | } |
2010 | |
2011 | NS_IMETHODIMPnsresult |
2012 | HttpBaseChannel::SetNewReferrerInfo(const nsACString& aUrl, |
2013 | nsIReferrerInfo::ReferrerPolicyIDL aPolicy, |
2014 | bool aSendReferrer) { |
2015 | nsresult rv; |
2016 | // Create URI from string |
2017 | nsCOMPtr<nsIURI> aURI; |
2018 | rv = NS_NewURI(getter_AddRefs(aURI), aUrl); |
2019 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2019); return rv; } } while (false); |
2020 | // Create new ReferrerInfo and initialize it. |
2021 | nsCOMPtr<nsIReferrerInfo> referrerInfo = new mozilla::dom::ReferrerInfo(); |
2022 | rv = referrerInfo->Init(aPolicy, aSendReferrer, aURI); |
2023 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2023); return rv; } } while (false); |
2024 | // Set ReferrerInfo |
2025 | return SetReferrerInfo(referrerInfo); |
2026 | } |
2027 | |
2028 | NS_IMETHODIMPnsresult |
2029 | HttpBaseChannel::SetEmptyRequestHeader(const nsACString& aHeader) { |
2030 | const nsCString& flatHeader = PromiseFlatCStringTPromiseFlatString<char>(aHeader); |
2031 | |
2032 | LOG(("HttpBaseChannel::SetEmptyRequestHeader [this=%p header=\"%s\"]\n", this,do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetEmptyRequestHeader [this=%p header=\"%s\"]\n" , this, flatHeader.get()); } } while (0) |
2033 | flatHeader.get()))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetEmptyRequestHeader [this=%p header=\"%s\"]\n" , this, flatHeader.get()); } } while (0); |
2034 | |
2035 | // Verify header names are valid HTTP tokens and header values are reasonably |
2036 | // close to whats allowed in RFC 2616. |
2037 | if (!nsHttp::IsValidToken(flatHeader)) { |
2038 | return NS_ERROR_INVALID_ARG; |
2039 | } |
2040 | |
2041 | // Mark that the User-Agent header has been modified. |
2042 | if (nsHttp::ResolveAtom(aHeader) == nsHttp::User_Agent) { |
2043 | StoreIsUserAgentHeaderModified(true); |
2044 | } |
2045 | |
2046 | return mRequestHead.SetEmptyHeader(aHeader); |
2047 | } |
2048 | |
2049 | NS_IMETHODIMPnsresult |
2050 | HttpBaseChannel::VisitRequestHeaders(nsIHttpHeaderVisitor* visitor) { |
2051 | return mRequestHead.VisitHeaders(visitor); |
2052 | } |
2053 | |
2054 | NS_IMETHODIMPnsresult |
2055 | HttpBaseChannel::VisitNonDefaultRequestHeaders(nsIHttpHeaderVisitor* visitor) { |
2056 | return mRequestHead.VisitHeaders(visitor, |
2057 | nsHttpHeaderArray::eFilterSkipDefault); |
2058 | } |
2059 | |
2060 | NS_IMETHODIMPnsresult |
2061 | HttpBaseChannel::GetResponseHeader(const nsACString& header, |
2062 | nsACString& value) { |
2063 | value.Truncate(); |
2064 | |
2065 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2066 | |
2067 | nsHttpAtom atom = nsHttp::ResolveAtom(header); |
2068 | if (!atom) return NS_ERROR_NOT_AVAILABLE; |
2069 | |
2070 | return mResponseHead->GetHeader(atom, value); |
2071 | } |
2072 | |
2073 | NS_IMETHODIMPnsresult |
2074 | HttpBaseChannel::SetResponseHeader(const nsACString& header, |
2075 | const nsACString& value, bool merge) { |
2076 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetResponseHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, TPromiseFlatString<char>(header). get(), TPromiseFlatString<char>(value).get(), merge); } } while (0) |
2077 | ("HttpBaseChannel::SetResponseHeader [this=%p header=\"%s\" value=\"%s\" "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetResponseHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, TPromiseFlatString<char>(header). get(), TPromiseFlatString<char>(value).get(), merge); } } while (0) |
2078 | "merge=%u]\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetResponseHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, TPromiseFlatString<char>(header). get(), TPromiseFlatString<char>(value).get(), merge); } } while (0) |
2079 | this, PromiseFlatCString(header).get(), PromiseFlatCString(value).get(),do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetResponseHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, TPromiseFlatString<char>(header). get(), TPromiseFlatString<char>(value).get(), merge); } } while (0) |
2080 | merge))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetResponseHeader [this=%p header=\"%s\" value=\"%s\" " "merge=%u]\n", this, TPromiseFlatString<char>(header). get(), TPromiseFlatString<char>(value).get(), merge); } } while (0); |
2081 | |
2082 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2083 | |
2084 | nsHttpAtom atom = nsHttp::ResolveAtom(header); |
2085 | if (!atom) return NS_ERROR_NOT_AVAILABLE; |
2086 | |
2087 | // these response headers must not be changed |
2088 | if (atom == nsHttp::Content_Type || atom == nsHttp::Content_Length || |
2089 | atom == nsHttp::Content_Encoding || atom == nsHttp::Trailer || |
2090 | atom == nsHttp::Transfer_Encoding) { |
2091 | return NS_ERROR_ILLEGAL_VALUE; |
2092 | } |
2093 | |
2094 | StoreResponseHeadersModified(true); |
2095 | |
2096 | return mResponseHead->SetHeader(header, value, merge); |
2097 | } |
2098 | |
2099 | NS_IMETHODIMPnsresult |
2100 | HttpBaseChannel::VisitResponseHeaders(nsIHttpHeaderVisitor* visitor) { |
2101 | if (!mResponseHead) { |
2102 | return NS_ERROR_NOT_AVAILABLE; |
2103 | } |
2104 | return mResponseHead->VisitHeaders(visitor, |
2105 | nsHttpHeaderArray::eFilterResponse); |
2106 | } |
2107 | |
2108 | NS_IMETHODIMPnsresult |
2109 | HttpBaseChannel::GetOriginalResponseHeader(const nsACString& aHeader, |
2110 | nsIHttpHeaderVisitor* aVisitor) { |
2111 | if (!mResponseHead) { |
2112 | return NS_ERROR_NOT_AVAILABLE; |
2113 | } |
2114 | |
2115 | nsHttpAtom atom = nsHttp::ResolveAtom(aHeader); |
2116 | if (!atom) { |
2117 | return NS_ERROR_NOT_AVAILABLE; |
2118 | } |
2119 | |
2120 | return mResponseHead->GetOriginalHeader(atom, aVisitor); |
2121 | } |
2122 | |
2123 | NS_IMETHODIMPnsresult |
2124 | HttpBaseChannel::VisitOriginalResponseHeaders(nsIHttpHeaderVisitor* aVisitor) { |
2125 | if (!mResponseHead) { |
2126 | return NS_ERROR_NOT_AVAILABLE; |
2127 | } |
2128 | |
2129 | return mResponseHead->VisitHeaders( |
2130 | aVisitor, nsHttpHeaderArray::eFilterResponseOriginal); |
2131 | } |
2132 | |
2133 | NS_IMETHODIMPnsresult |
2134 | HttpBaseChannel::GetAllowSTS(bool* value) { |
2135 | NS_ENSURE_ARG_POINTER(value)do { if ((__builtin_expect(!!(!(value)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "value" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2135); return NS_ERROR_INVALID_POINTER; } } while (false); |
2136 | *value = LoadAllowSTS(); |
2137 | return NS_OK; |
2138 | } |
2139 | |
2140 | NS_IMETHODIMPnsresult |
2141 | HttpBaseChannel::SetAllowSTS(bool value) { |
2142 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2142); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2142, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2142); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2142); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 2142; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
2143 | StoreAllowSTS(value); |
2144 | return NS_OK; |
2145 | } |
2146 | |
2147 | NS_IMETHODIMPnsresult |
2148 | HttpBaseChannel::GetIsOCSP(bool* value) { |
2149 | NS_ENSURE_ARG_POINTER(value)do { if ((__builtin_expect(!!(!(value)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "value" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2149); return NS_ERROR_INVALID_POINTER; } } while (false); |
2150 | *value = LoadIsOCSP(); |
2151 | return NS_OK; |
2152 | } |
2153 | |
2154 | NS_IMETHODIMPnsresult |
2155 | HttpBaseChannel::SetIsOCSP(bool value) { |
2156 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2156); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2156, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2156); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2156); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 2156; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
2157 | StoreIsOCSP(value); |
2158 | return NS_OK; |
2159 | } |
2160 | |
2161 | NS_IMETHODIMPnsresult |
2162 | HttpBaseChannel::GetIsUserAgentHeaderModified(bool* value) { |
2163 | NS_ENSURE_ARG_POINTER(value)do { if ((__builtin_expect(!!(!(value)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "value" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2163); return NS_ERROR_INVALID_POINTER; } } while (false); |
2164 | *value = LoadIsUserAgentHeaderModified(); |
2165 | return NS_OK; |
2166 | } |
2167 | |
2168 | NS_IMETHODIMPnsresult |
2169 | HttpBaseChannel::SetIsUserAgentHeaderModified(bool value) { |
2170 | StoreIsUserAgentHeaderModified(value); |
2171 | return NS_OK; |
2172 | } |
2173 | |
2174 | NS_IMETHODIMPnsresult |
2175 | HttpBaseChannel::GetRedirectionLimit(uint32_t* value) { |
2176 | NS_ENSURE_ARG_POINTER(value)do { if ((__builtin_expect(!!(!(value)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "value" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2176); return NS_ERROR_INVALID_POINTER; } } while (false); |
2177 | *value = mRedirectionLimit; |
2178 | return NS_OK; |
2179 | } |
2180 | |
2181 | NS_IMETHODIMPnsresult |
2182 | HttpBaseChannel::SetRedirectionLimit(uint32_t value) { |
2183 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2183); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2183, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2183); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2183); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 2183; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
2184 | |
2185 | mRedirectionLimit = std::min<uint32_t>(value, 0xff); |
2186 | return NS_OK; |
2187 | } |
2188 | |
2189 | nsresult HttpBaseChannel::OverrideSecurityInfo( |
2190 | nsITransportSecurityInfo* aSecurityInfo) { |
2191 | MOZ_ASSERT(!mSecurityInfo,do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mSecurityInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!mSecurityInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mSecurityInfo" " (" "This can only be called when we don't have a security info " "object already" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2193); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mSecurityInfo" ") (" "This can only be called when we don't have a security info " "object already" ")"); do { *((volatile int*)__null) = 2193; __attribute__((nomerge)) ::abort(); } while (false); } } while (false) |
2192 | "This can only be called when we don't have a security info "do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mSecurityInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!mSecurityInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mSecurityInfo" " (" "This can only be called when we don't have a security info " "object already" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2193); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mSecurityInfo" ") (" "This can only be called when we don't have a security info " "object already" ")"); do { *((volatile int*)__null) = 2193; __attribute__((nomerge)) ::abort(); } while (false); } } while (false) |
2193 | "object already")do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mSecurityInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!mSecurityInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mSecurityInfo" " (" "This can only be called when we don't have a security info " "object already" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2193); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mSecurityInfo" ") (" "This can only be called when we don't have a security info " "object already" ")"); do { *((volatile int*)__null) = 2193; __attribute__((nomerge)) ::abort(); } while (false); } } while (false); |
2194 | MOZ_RELEASE_ASSERT(do { static_assert( mozilla::detail::AssertionConditionType< decltype(aSecurityInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aSecurityInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aSecurityInfo" " (" "This can only be called with a valid security info object" ")" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2196); AnnotateMozCrashReason("MOZ_RELEASE_ASSERT" "(" "aSecurityInfo" ") (" "This can only be called with a valid security info object" ")"); do { *((volatile int*)__null) = 2196; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
2195 | aSecurityInfo,do { static_assert( mozilla::detail::AssertionConditionType< decltype(aSecurityInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aSecurityInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aSecurityInfo" " (" "This can only be called with a valid security info object" ")" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2196); AnnotateMozCrashReason("MOZ_RELEASE_ASSERT" "(" "aSecurityInfo" ") (" "This can only be called with a valid security info object" ")"); do { *((volatile int*)__null) = 2196; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
2196 | "This can only be called with a valid security info object")do { static_assert( mozilla::detail::AssertionConditionType< decltype(aSecurityInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aSecurityInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aSecurityInfo" " (" "This can only be called with a valid security info object" ")" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2196); AnnotateMozCrashReason("MOZ_RELEASE_ASSERT" "(" "aSecurityInfo" ") (" "This can only be called with a valid security info object" ")"); do { *((volatile int*)__null) = 2196; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
2197 | MOZ_ASSERT(!BypassServiceWorker(),do { static_assert( mozilla::detail::AssertionConditionType< decltype(!BypassServiceWorker())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!BypassServiceWorker()))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("!BypassServiceWorker()" " (" "This can only be called on channels that are not bypassing " "interception" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2199); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!BypassServiceWorker()" ") (" "This can only be called on channels that are not bypassing " "interception" ")"); do { *((volatile int*)__null) = 2199; __attribute__ ((nomerge)) ::abort(); } while (false); } } while (false) |
2198 | "This can only be called on channels that are not bypassing "do { static_assert( mozilla::detail::AssertionConditionType< decltype(!BypassServiceWorker())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!BypassServiceWorker()))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("!BypassServiceWorker()" " (" "This can only be called on channels that are not bypassing " "interception" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2199); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!BypassServiceWorker()" ") (" "This can only be called on channels that are not bypassing " "interception" ")"); do { *((volatile int*)__null) = 2199; __attribute__ ((nomerge)) ::abort(); } while (false); } } while (false) |
2199 | "interception")do { static_assert( mozilla::detail::AssertionConditionType< decltype(!BypassServiceWorker())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!BypassServiceWorker()))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("!BypassServiceWorker()" " (" "This can only be called on channels that are not bypassing " "interception" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2199); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!BypassServiceWorker()" ") (" "This can only be called on channels that are not bypassing " "interception" ")"); do { *((volatile int*)__null) = 2199; __attribute__ ((nomerge)) ::abort(); } while (false); } } while (false); |
2200 | MOZ_ASSERT(LoadResponseCouldBeSynthesized(),do { static_assert( mozilla::detail::AssertionConditionType< decltype(LoadResponseCouldBeSynthesized())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadResponseCouldBeSynthesized ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("LoadResponseCouldBeSynthesized()" " (" "This can only be called on channels that can be intercepted" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2201); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadResponseCouldBeSynthesized()" ") (" "This can only be called on channels that can be intercepted" ")"); do { *((volatile int*)__null) = 2201; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
2201 | "This can only be called on channels that can be intercepted")do { static_assert( mozilla::detail::AssertionConditionType< decltype(LoadResponseCouldBeSynthesized())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadResponseCouldBeSynthesized ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("LoadResponseCouldBeSynthesized()" " (" "This can only be called on channels that can be intercepted" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2201); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadResponseCouldBeSynthesized()" ") (" "This can only be called on channels that can be intercepted" ")"); do { *((volatile int*)__null) = 2201; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
2202 | if (mSecurityInfo) { |
2203 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo mSecurityInfo is null! " "[this=%p]\n", this); } } while (0) |
2204 | ("HttpBaseChannel::OverrideSecurityInfo mSecurityInfo is null! "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo mSecurityInfo is null! " "[this=%p]\n", this); } } while (0) |
2205 | "[this=%p]\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo mSecurityInfo is null! " "[this=%p]\n", this); } } while (0) |
2206 | this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo mSecurityInfo is null! " "[this=%p]\n", this); } } while (0); |
2207 | return NS_ERROR_UNEXPECTED; |
2208 | } |
2209 | if (!LoadResponseCouldBeSynthesized()) { |
2210 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo channel cannot be intercepted! " "[this=%p]\n", this); } } while (0) |
2211 | ("HttpBaseChannel::OverrideSecurityInfo channel cannot be intercepted! "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo channel cannot be intercepted! " "[this=%p]\n", this); } } while (0) |
2212 | "[this=%p]\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo channel cannot be intercepted! " "[this=%p]\n", this); } } while (0) |
2213 | this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::OverrideSecurityInfo channel cannot be intercepted! " "[this=%p]\n", this); } } while (0); |
2214 | return NS_ERROR_UNEXPECTED; |
2215 | } |
2216 | |
2217 | mSecurityInfo = aSecurityInfo; |
2218 | return NS_OK; |
2219 | } |
2220 | |
2221 | NS_IMETHODIMPnsresult |
2222 | HttpBaseChannel::IsNoStoreResponse(bool* value) { |
2223 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2224 | *value = mResponseHead->NoStore(); |
2225 | return NS_OK; |
2226 | } |
2227 | |
2228 | NS_IMETHODIMPnsresult |
2229 | HttpBaseChannel::IsNoCacheResponse(bool* value) { |
2230 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2231 | *value = mResponseHead->NoCache(); |
2232 | if (!*value) *value = mResponseHead->ExpiresInPast(); |
2233 | return NS_OK; |
2234 | } |
2235 | |
2236 | NS_IMETHODIMPnsresult |
2237 | HttpBaseChannel::IsPrivateResponse(bool* value) { |
2238 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2239 | *value = mResponseHead->Private(); |
2240 | return NS_OK; |
2241 | } |
2242 | |
2243 | NS_IMETHODIMPnsresult |
2244 | HttpBaseChannel::GetResponseStatus(uint32_t* aValue) { |
2245 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2246 | *aValue = mResponseHead->Status(); |
2247 | return NS_OK; |
2248 | } |
2249 | |
2250 | NS_IMETHODIMPnsresult |
2251 | HttpBaseChannel::GetResponseStatusText(nsACString& aValue) { |
2252 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2253 | nsAutoCString version; |
2254 | // https://fetch.spec.whatwg.org : |
2255 | // Responses over an HTTP/2 connection will always have the empty byte |
2256 | // sequence as status message as HTTP/2 does not support them. |
2257 | if (NS_WARN_IF(NS_FAILED(GetProtocolVersion(version)))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(GetProtocolVersion (version))), 0))), "NS_FAILED(GetProtocolVersion(version))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2257) || |
2258 | !version.EqualsLiteral("h2")) { |
2259 | mResponseHead->StatusText(aValue); |
2260 | } |
2261 | return NS_OK; |
2262 | } |
2263 | |
2264 | NS_IMETHODIMPnsresult |
2265 | HttpBaseChannel::GetRequestSucceeded(bool* aValue) { |
2266 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
2267 | uint32_t status = mResponseHead->Status(); |
2268 | *aValue = (status / 100 == 2); |
2269 | return NS_OK; |
2270 | } |
2271 | |
2272 | NS_IMETHODIMPnsresult |
2273 | HttpBaseChannel::RedirectTo(nsIURI* targetURI) { |
2274 | NS_ENSURE_ARG(targetURI)do { if ((__builtin_expect(!!(!(targetURI)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "targetURI" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2274); return NS_ERROR_INVALID_ARG; } } while (false); |
2275 | |
2276 | nsAutoCString spec; |
2277 | targetURI->GetAsciiSpec(spec); |
2278 | LOG(("HttpBaseChannel::RedirectTo [this=%p, uri=%s]", this, spec.get()))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::RedirectTo [this=%p, uri=%s]", this, spec .get()); } } while (0); |
2279 | LogCallingScriptLocation(this); |
2280 | |
2281 | // We cannot redirect after OnStartRequest of the listener |
2282 | // has been called, since to redirect we have to switch channels |
2283 | // and the dance with OnStartRequest et al has to start over. |
2284 | // This would break the nsIStreamListener contract. |
2285 | NS_ENSURE_FALSE(LoadOnStartRequestCalled(), NS_ERROR_NOT_AVAILABLE)do { if ((__builtin_expect(!!(!(!(LoadOnStartRequestCalled()) )), 0))) { NS_DebugBreak(NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!(LoadOnStartRequestCalled())" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2285); return NS_ERROR_NOT_AVAILABLE; } } while (false); |
2286 | |
2287 | // The first parameter is the URI we would like to redirect to |
2288 | // The second parameter should default to false if normal redirect |
2289 | mAPIRedirectTo = |
2290 | Some(mozilla::MakeCompactPair(nsCOMPtr<nsIURI>(targetURI), false)); |
2291 | |
2292 | // Only Web Extensions are allowed to redirect a channel to a data: |
2293 | // URI. To avoid any bypasses after the channel was flagged by |
2294 | // the WebRequst API, we are dropping the flag here. |
2295 | mLoadInfo->SetAllowInsecureRedirectToDataURI(false); |
2296 | |
2297 | // We may want to rewrite origin allowance, hence we need an |
2298 | // artificial response head. |
2299 | if (!mResponseHead) { |
2300 | mResponseHead.reset(new nsHttpResponseHead()); |
2301 | } |
2302 | return NS_OK; |
2303 | } |
2304 | |
2305 | NS_IMETHODIMPnsresult |
2306 | HttpBaseChannel::TransparentRedirectTo(nsIURI* targetURI) { |
2307 | LOG(("HttpBaseChannel::TransparentRedirectTo [this=%p]", this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::TransparentRedirectTo [this=%p]", this); } } while (0); |
2308 | RedirectTo(targetURI); |
2309 | MOZ_ASSERT(mAPIRedirectTo, "How did this happen?")do { static_assert( mozilla::detail::AssertionConditionType< decltype(mAPIRedirectTo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mAPIRedirectTo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mAPIRedirectTo" " (" "How did this happen?" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2309); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mAPIRedirectTo" ") (" "How did this happen?" ")"); do { *((volatile int*)__null ) = 2309; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); |
2310 | mAPIRedirectTo->second() = true; |
2311 | return NS_OK; |
2312 | } |
2313 | |
2314 | NS_IMETHODIMPnsresult |
2315 | HttpBaseChannel::UpgradeToSecure() { |
2316 | // Upgrades are handled internally between http-on-modify-request and |
2317 | // http-on-before-connect, which means upgrades are only possible during |
2318 | // on-modify, or WebRequest.onBeforeRequest in Web Extensions. Once we are |
2319 | // past the code path where upgrades are handled, attempting an upgrade |
2320 | // will throw an error. |
2321 | NS_ENSURE_TRUE(LoadUpgradableToSecure(), NS_ERROR_NOT_AVAILABLE)do { if ((__builtin_expect(!!(!(LoadUpgradableToSecure())), 0 ))) { NS_DebugBreak(NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "LoadUpgradableToSecure()" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2321); return NS_ERROR_NOT_AVAILABLE; } } while (false); |
2322 | |
2323 | StoreUpgradeToSecure(true); |
2324 | // todo: Currently UpgradeToSecure() is called only by web extensions, if |
2325 | // that ever changes, we need to update the following telemetry collection |
2326 | // to reflect any future changes. |
2327 | mLoadInfo->SetHttpsUpgradeTelemetry(nsILoadInfo::WEB_EXTENSION_UPGRADE); |
2328 | |
2329 | return NS_OK; |
2330 | } |
2331 | |
2332 | NS_IMETHODIMPnsresult |
2333 | HttpBaseChannel::GetRequestObserversCalled(bool* aCalled) { |
2334 | NS_ENSURE_ARG_POINTER(aCalled)do { if ((__builtin_expect(!!(!(aCalled)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aCalled" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2334); return NS_ERROR_INVALID_POINTER; } } while (false); |
2335 | *aCalled = LoadRequestObserversCalled(); |
2336 | return NS_OK; |
2337 | } |
2338 | |
2339 | NS_IMETHODIMPnsresult |
2340 | HttpBaseChannel::SetRequestObserversCalled(bool aCalled) { |
2341 | StoreRequestObserversCalled(aCalled); |
2342 | return NS_OK; |
2343 | } |
2344 | |
2345 | NS_IMETHODIMPnsresult |
2346 | HttpBaseChannel::GetRequestContextID(uint64_t* aRCID) { |
2347 | NS_ENSURE_ARG_POINTER(aRCID)do { if ((__builtin_expect(!!(!(aRCID)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aRCID" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2347); return NS_ERROR_INVALID_POINTER; } } while (false); |
2348 | *aRCID = mRequestContextID; |
2349 | return NS_OK; |
2350 | } |
2351 | |
2352 | NS_IMETHODIMPnsresult |
2353 | HttpBaseChannel::SetRequestContextID(uint64_t aRCID) { |
2354 | mRequestContextID = aRCID; |
2355 | return NS_OK; |
2356 | } |
2357 | |
2358 | NS_IMETHODIMPnsresult |
2359 | HttpBaseChannel::GetIsMainDocumentChannel(bool* aValue) { |
2360 | NS_ENSURE_ARG_POINTER(aValue)do { if ((__builtin_expect(!!(!(aValue)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aValue" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2360); return NS_ERROR_INVALID_POINTER; } } while (false); |
2361 | *aValue = IsNavigation(); |
2362 | return NS_OK; |
2363 | } |
2364 | |
2365 | NS_IMETHODIMPnsresult |
2366 | HttpBaseChannel::SetIsMainDocumentChannel(bool aValue) { |
2367 | StoreForceMainDocumentChannel(aValue); |
2368 | return NS_OK; |
2369 | } |
2370 | |
2371 | NS_IMETHODIMPnsresult |
2372 | HttpBaseChannel::GetProtocolVersion(nsACString& aProtocolVersion) { |
2373 | // Try to use ALPN if available and if it is not for a proxy, i.e if an |
2374 | // https proxy was not used or if https proxy was used but the connection to |
2375 | // the origin server is also https. In the case, an https proxy was used and |
2376 | // the connection to the origin server was http, mSecurityInfo will be from |
2377 | // the proxy. |
2378 | if (!mConnectionInfo || !mConnectionInfo->UsingHttpsProxy() || |
2379 | mConnectionInfo->EndToEndSSL()) { |
2380 | nsAutoCString protocol; |
2381 | if (mSecurityInfo && |
2382 | NS_SUCCEEDED(mSecurityInfo->GetNegotiatedNPN(protocol))((bool)(__builtin_expect(!!(!NS_FAILED_impl(mSecurityInfo-> GetNegotiatedNPN(protocol))), 1))) && |
2383 | !protocol.IsEmpty()) { |
2384 | // The negotiated protocol was not empty so we can use it. |
2385 | aProtocolVersion = protocol; |
2386 | return NS_OK; |
2387 | } |
2388 | } |
2389 | |
2390 | if (mResponseHead) { |
2391 | HttpVersion version = mResponseHead->Version(); |
2392 | aProtocolVersion.Assign(nsHttp::GetProtocolVersion(version)); |
2393 | return NS_OK; |
2394 | } |
2395 | |
2396 | return NS_ERROR_NOT_AVAILABLE; |
2397 | } |
2398 | |
2399 | //----------------------------------------------------------------------------- |
2400 | // HttpBaseChannel::nsIHttpChannelInternal |
2401 | //----------------------------------------------------------------------------- |
2402 | |
2403 | NS_IMETHODIMPnsresult |
2404 | HttpBaseChannel::SetTopWindowURIIfUnknown(nsIURI* aTopWindowURI) { |
2405 | if (!aTopWindowURI) { |
2406 | return NS_ERROR_INVALID_ARG; |
2407 | } |
2408 | |
2409 | if (mTopWindowURI) { |
2410 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "mTopWindowURI is already set.\n" , this); } } while (0) |
2411 | ("HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "mTopWindowURI is already set.\n" , this); } } while (0) |
2412 | "mTopWindowURI is already set.\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "mTopWindowURI is already set.\n" , this); } } while (0) |
2413 | this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "mTopWindowURI is already set.\n" , this); } } while (0); |
2414 | return NS_ERROR_FAILURE; |
2415 | } |
2416 | |
2417 | nsCOMPtr<nsIURI> topWindowURI; |
2418 | Unused << GetTopWindowURI(getter_AddRefs(topWindowURI)); |
2419 | |
2420 | // Don't modify |mTopWindowURI| if we can get one from GetTopWindowURI(). |
2421 | if (topWindowURI) { |
2422 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "Return an error since we got a top window uri.\n" , this); } } while (0) |
2423 | ("HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "Return an error since we got a top window uri.\n" , this); } } while (0) |
2424 | "Return an error since we got a top window uri.\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "Return an error since we got a top window uri.\n" , this); } } while (0) |
2425 | this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::SetTopWindowURIIfUnknown [this=%p] " "Return an error since we got a top window uri.\n" , this); } } while (0); |
2426 | return NS_ERROR_FAILURE; |
2427 | } |
2428 | |
2429 | mTopWindowURI = aTopWindowURI; |
2430 | return NS_OK; |
2431 | } |
2432 | |
2433 | NS_IMETHODIMPnsresult |
2434 | HttpBaseChannel::GetTopWindowURI(nsIURI** aTopWindowURI) { |
2435 | nsCOMPtr<nsIURI> uriBeingLoaded = |
2436 | AntiTrackingUtils::MaybeGetDocumentURIBeingLoaded(this); |
2437 | return GetTopWindowURI(uriBeingLoaded, aTopWindowURI); |
2438 | } |
2439 | |
2440 | nsresult HttpBaseChannel::GetTopWindowURI(nsIURI* aURIBeingLoaded, |
2441 | nsIURI** aTopWindowURI) { |
2442 | nsresult rv = NS_OK; |
2443 | nsCOMPtr<mozIThirdPartyUtil> util; |
2444 | // Only compute the top window URI once. In e10s, this must be computed in the |
2445 | // child. The parent gets the top window URI through HttpChannelOpenArgs. |
2446 | if (!mTopWindowURI) { |
2447 | util = components::ThirdPartyUtil::Service(); |
2448 | if (!util) { |
2449 | return NS_ERROR_NOT_AVAILABLE; |
2450 | } |
2451 | nsCOMPtr<mozIDOMWindowProxy> win; |
2452 | rv = util->GetTopWindowForChannel(this, aURIBeingLoaded, |
2453 | getter_AddRefs(win)); |
2454 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))) { |
2455 | rv = util->GetURIFromWindow(win, getter_AddRefs(mTopWindowURI)); |
2456 | #if DEBUG1 |
2457 | if (mTopWindowURI) { |
2458 | nsCString spec; |
2459 | if (NS_SUCCEEDED(mTopWindowURI->GetSpec(spec))((bool)(__builtin_expect(!!(!NS_FAILED_impl(mTopWindowURI-> GetSpec(spec))), 1)))) { |
2460 | LOG(("HttpChannelBase::Setting topwindow URI spec %s [this=%p]\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::Setting topwindow URI spec %s [this=%p]\n" , spec.get(), this); } } while (0) |
2461 | spec.get(), this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpChannelBase::Setting topwindow URI spec %s [this=%p]\n" , spec.get(), this); } } while (0); |
2462 | } |
2463 | } |
2464 | #endif |
2465 | } |
2466 | } |
2467 | *aTopWindowURI = do_AddRef(mTopWindowURI).take(); |
2468 | return rv; |
2469 | } |
2470 | |
2471 | NS_IMETHODIMPnsresult |
2472 | HttpBaseChannel::GetDocumentURI(nsIURI** aDocumentURI) { |
2473 | NS_ENSURE_ARG_POINTER(aDocumentURI)do { if ((__builtin_expect(!!(!(aDocumentURI)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aDocumentURI" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2473); return NS_ERROR_INVALID_POINTER; } } while (false); |
2474 | *aDocumentURI = do_AddRef(mDocumentURI).take(); |
2475 | return NS_OK; |
2476 | } |
2477 | |
2478 | NS_IMETHODIMPnsresult |
2479 | HttpBaseChannel::SetDocumentURI(nsIURI* aDocumentURI) { |
2480 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2480); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2480, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2480); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2480); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 2480; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
2481 | mDocumentURI = aDocumentURI; |
2482 | return NS_OK; |
2483 | } |
2484 | |
2485 | NS_IMETHODIMPnsresult |
2486 | HttpBaseChannel::GetRequestVersion(uint32_t* major, uint32_t* minor) { |
2487 | HttpVersion version = mRequestHead.Version(); |
2488 | |
2489 | if (major) { |
2490 | *major = static_cast<uint32_t>(version) / 10; |
2491 | } |
2492 | if (minor) { |
2493 | *minor = static_cast<uint32_t>(version) % 10; |
2494 | } |
2495 | |
2496 | return NS_OK; |
2497 | } |
2498 | |
2499 | NS_IMETHODIMPnsresult |
2500 | HttpBaseChannel::GetResponseVersion(uint32_t* major, uint32_t* minor) { |
2501 | if (!mResponseHead) { |
2502 | *major = *minor = 0; // we should at least be kind about it |
2503 | return NS_ERROR_NOT_AVAILABLE; |
2504 | } |
2505 | |
2506 | HttpVersion version = mResponseHead->Version(); |
2507 | |
2508 | if (major) { |
2509 | *major = static_cast<uint32_t>(version) / 10; |
2510 | } |
2511 | if (minor) { |
2512 | *minor = static_cast<uint32_t>(version) % 10; |
2513 | } |
2514 | |
2515 | return NS_OK; |
2516 | } |
2517 | |
2518 | bool HttpBaseChannel::IsBrowsingContextDiscarded() const { |
2519 | // If there is no loadGroup attached to the current channel, we check the |
2520 | // global private browsing state for the private channel instead. For |
2521 | // non-private channel, we will always return false here. |
2522 | // |
2523 | // Note that we can only access the global private browsing state in the |
2524 | // parent process. So, we will fallback to just return false in the content |
2525 | // process. |
2526 | if (!mLoadGroup) { |
2527 | if (!XRE_IsParentProcess()) { |
2528 | return false; |
2529 | } |
2530 | |
2531 | return mLoadInfo->GetOriginAttributes().IsPrivateBrowsing() && |
2532 | !dom::CanonicalBrowsingContext::IsPrivateBrowsingActive(); |
2533 | } |
2534 | |
2535 | return mLoadGroup->GetIsBrowsingContextDiscarded(); |
2536 | } |
2537 | |
2538 | // https://mikewest.github.io/corpp/#process-navigation-response |
2539 | nsresult HttpBaseChannel::ProcessCrossOriginEmbedderPolicyHeader() { |
2540 | nsresult rv; |
2541 | if (!StaticPrefs::browser_tabs_remote_useCrossOriginEmbedderPolicy()) { |
2542 | return NS_OK; |
2543 | } |
2544 | |
2545 | // Only consider Cross-Origin-Embedder-Policy for document loads. |
2546 | if (mLoadInfo->GetExternalContentPolicyType() != |
2547 | ExtContentPolicy::TYPE_DOCUMENT && |
2548 | mLoadInfo->GetExternalContentPolicyType() != |
2549 | ExtContentPolicy::TYPE_SUBDOCUMENT) { |
2550 | return NS_OK; |
2551 | } |
2552 | |
2553 | nsILoadInfo::CrossOriginEmbedderPolicy resultPolicy = |
2554 | nsILoadInfo::EMBEDDER_POLICY_NULL; |
2555 | bool isCoepCredentiallessEnabled; |
2556 | rv = mLoadInfo->GetIsOriginTrialCoepCredentiallessEnabledForTopLevel( |
2557 | &isCoepCredentiallessEnabled); |
2558 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2558); return rv; } } while (false); |
2559 | rv = GetResponseEmbedderPolicy(isCoepCredentiallessEnabled, &resultPolicy); |
2560 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
2561 | return NS_OK; |
2562 | } |
2563 | |
2564 | // https://html.spec.whatwg.org/multipage/origin.html#coep |
2565 | if (mLoadInfo->GetExternalContentPolicyType() == |
2566 | ExtContentPolicy::TYPE_SUBDOCUMENT && |
2567 | !nsHttpChannel::IsRedirectStatus(mResponseHead->Status()) && |
2568 | mLoadInfo->GetLoadingEmbedderPolicy() != |
2569 | nsILoadInfo::EMBEDDER_POLICY_NULL && |
2570 | resultPolicy != nsILoadInfo::EMBEDDER_POLICY_REQUIRE_CORP && |
2571 | resultPolicy != nsILoadInfo::EMBEDDER_POLICY_CREDENTIALLESS) { |
2572 | return NS_ERROR_DOM_COEP_FAILED; |
2573 | } |
2574 | |
2575 | return NS_OK; |
2576 | } |
2577 | |
2578 | // https://mikewest.github.io/corpp/#corp-check |
2579 | nsresult HttpBaseChannel::ProcessCrossOriginResourcePolicyHeader() { |
2580 | // Fetch 4.5.9 |
2581 | dom::RequestMode requestMode; |
2582 | MOZ_ALWAYS_SUCCEEDS(GetRequestMode(&requestMode))do { if ((__builtin_expect(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl (GetRequestMode(&requestMode))), 1)))), 1))) { } else { do { do { } while (false); MOZ_ReportCrash("" "NS_SUCCEEDED(GetRequestMode(&requestMode))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2582); AnnotateMozCrashReason("MOZ_CRASH(" "NS_SUCCEEDED(GetRequestMode(&requestMode))" ")"); do { *((volatile int*)__null) = 2582; __attribute__((nomerge )) ::abort(); } while (false); } while (false); } } while (false ); |
2583 | // XXX this seems wrong per spec? What about navigate |
2584 | if (requestMode != RequestMode::No_cors) { |
2585 | return NS_OK; |
2586 | } |
2587 | |
2588 | // We only apply this for resources. |
2589 | auto extContentPolicyType = mLoadInfo->GetExternalContentPolicyType(); |
2590 | if (extContentPolicyType == ExtContentPolicy::TYPE_DOCUMENT || |
2591 | extContentPolicyType == ExtContentPolicy::TYPE_WEBSOCKET || |
2592 | extContentPolicyType == ExtContentPolicy::TYPE_SAVEAS_DOWNLOAD) { |
2593 | return NS_OK; |
2594 | } |
2595 | |
2596 | if (extContentPolicyType == ExtContentPolicy::TYPE_SUBDOCUMENT) { |
2597 | // COEP pref off, skip CORP checking for subdocument. |
2598 | if (!StaticPrefs::browser_tabs_remote_useCrossOriginEmbedderPolicy()) { |
2599 | return NS_OK; |
2600 | } |
2601 | // COEP 3.2.1.2 when request targets a nested browsing context then embedder |
2602 | // policy value is "unsafe-none", then return allowed. |
2603 | if (mLoadInfo->GetLoadingEmbedderPolicy() == |
2604 | nsILoadInfo::EMBEDDER_POLICY_NULL) { |
2605 | return NS_OK; |
2606 | } |
2607 | } |
2608 | |
2609 | MOZ_ASSERT(mLoadInfo->GetLoadingPrincipal(),do { static_assert( mozilla::detail::AssertionConditionType< decltype(mLoadInfo->GetLoadingPrincipal())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mLoadInfo->GetLoadingPrincipal ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("mLoadInfo->GetLoadingPrincipal()" " (" "Resources should always have a LoadingPrincipal" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2610); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mLoadInfo->GetLoadingPrincipal()" ") (" "Resources should always have a LoadingPrincipal" ")") ; do { *((volatile int*)__null) = 2610; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
2610 | "Resources should always have a LoadingPrincipal")do { static_assert( mozilla::detail::AssertionConditionType< decltype(mLoadInfo->GetLoadingPrincipal())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mLoadInfo->GetLoadingPrincipal ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("mLoadInfo->GetLoadingPrincipal()" " (" "Resources should always have a LoadingPrincipal" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2610); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mLoadInfo->GetLoadingPrincipal()" ") (" "Resources should always have a LoadingPrincipal" ")") ; do { *((volatile int*)__null) = 2610; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
2611 | if (!mResponseHead) { |
2612 | return NS_OK; |
2613 | } |
2614 | |
2615 | if (mLoadInfo->GetLoadingPrincipal()->IsSystemPrincipal()) { |
2616 | return NS_OK; |
2617 | } |
2618 | |
2619 | nsAutoCString content; |
2620 | Unused << mResponseHead->GetHeader(nsHttp::Cross_Origin_Resource_Policy, |
2621 | content); |
2622 | |
2623 | if (StaticPrefs::browser_tabs_remote_useCrossOriginEmbedderPolicy()) { |
2624 | if (content.IsEmpty()) { |
2625 | if (mLoadInfo->GetLoadingEmbedderPolicy() == |
2626 | nsILoadInfo::EMBEDDER_POLICY_CREDENTIALLESS) { |
2627 | bool requestIncludesCredentials = false; |
2628 | nsresult rv = GetCorsIncludeCredentials(&requestIncludesCredentials); |
2629 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
2630 | return NS_OK; |
2631 | } |
2632 | // COEP: Set policy to `same-origin` if: response’s |
2633 | // request-includes-credentials is true, or forNavigation is true. |
2634 | if (requestIncludesCredentials || |
2635 | extContentPolicyType == ExtContentPolicyType::TYPE_SUBDOCUMENT) { |
2636 | content = "same-origin"_ns; |
2637 | } |
2638 | } else if (mLoadInfo->GetLoadingEmbedderPolicy() == |
2639 | nsILoadInfo::EMBEDDER_POLICY_REQUIRE_CORP) { |
2640 | // COEP 3.2.1.6 If policy is null, and embedder policy is |
2641 | // "require-corp", set policy to "same-origin". Note that we treat |
2642 | // invalid value as "cross-origin", which spec indicates. We might want |
2643 | // to make that stricter. |
2644 | content = "same-origin"_ns; |
2645 | } |
2646 | } |
2647 | } |
2648 | |
2649 | if (content.IsEmpty()) { |
2650 | return NS_OK; |
2651 | } |
2652 | |
2653 | nsCOMPtr<nsIPrincipal> channelOrigin; |
2654 | nsContentUtils::GetSecurityManager()->GetChannelResultPrincipal( |
2655 | this, getter_AddRefs(channelOrigin)); |
2656 | |
2657 | // Cross-Origin-Resource-Policy = %s"same-origin" / %s"same-site" / |
2658 | // %s"cross-origin" |
2659 | if (content.EqualsLiteral("same-origin")) { |
2660 | if (!channelOrigin->Equals(mLoadInfo->GetLoadingPrincipal())) { |
2661 | return NS_ERROR_DOM_CORP_FAILED; |
2662 | } |
2663 | return NS_OK; |
2664 | } |
2665 | if (content.EqualsLiteral("same-site")) { |
2666 | nsAutoCString documentBaseDomain; |
2667 | nsAutoCString resourceBaseDomain; |
2668 | mLoadInfo->GetLoadingPrincipal()->GetBaseDomain(documentBaseDomain); |
2669 | channelOrigin->GetBaseDomain(resourceBaseDomain); |
2670 | if (documentBaseDomain != resourceBaseDomain) { |
2671 | return NS_ERROR_DOM_CORP_FAILED; |
2672 | } |
2673 | |
2674 | nsCOMPtr<nsIURI> resourceURI = channelOrigin->GetURI(); |
2675 | if (!mLoadInfo->GetLoadingPrincipal()->SchemeIs("https") && |
2676 | resourceURI->SchemeIs("https")) { |
2677 | return NS_ERROR_DOM_CORP_FAILED; |
2678 | } |
2679 | |
2680 | return NS_OK; |
2681 | } |
2682 | |
2683 | return NS_OK; |
2684 | } |
2685 | |
2686 | // See https://gist.github.com/annevk/6f2dd8c79c77123f39797f6bdac43f3e |
2687 | // This method runs steps 1-4 of the algorithm to compare |
2688 | // cross-origin-opener policies |
2689 | static bool CompareCrossOriginOpenerPolicies( |
2690 | nsILoadInfo::CrossOriginOpenerPolicy documentPolicy, |
2691 | nsIPrincipal* documentOrigin, |
2692 | nsILoadInfo::CrossOriginOpenerPolicy resultPolicy, |
2693 | nsIPrincipal* resultOrigin) { |
2694 | if (documentPolicy == nsILoadInfo::OPENER_POLICY_UNSAFE_NONE && |
2695 | resultPolicy == nsILoadInfo::OPENER_POLICY_UNSAFE_NONE) { |
2696 | return true; |
2697 | } |
2698 | |
2699 | if (documentPolicy == nsILoadInfo::OPENER_POLICY_UNSAFE_NONE || |
2700 | resultPolicy == nsILoadInfo::OPENER_POLICY_UNSAFE_NONE) { |
2701 | return false; |
2702 | } |
2703 | |
2704 | if (documentPolicy == resultPolicy && documentOrigin->Equals(resultOrigin)) { |
2705 | return true; |
2706 | } |
2707 | |
2708 | return false; |
2709 | } |
2710 | |
2711 | // This runs steps 1-5 of the algorithm when navigating a top level document. |
2712 | // See https://gist.github.com/annevk/6f2dd8c79c77123f39797f6bdac43f3e |
2713 | nsresult HttpBaseChannel::ComputeCrossOriginOpenerPolicyMismatch() { |
2714 | MOZ_ASSERT(XRE_IsParentProcess())do { static_assert( mozilla::detail::AssertionConditionType< decltype(XRE_IsParentProcess())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(XRE_IsParentProcess()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("XRE_IsParentProcess()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2714); AnnotateMozCrashReason("MOZ_ASSERT" "(" "XRE_IsParentProcess()" ")"); do { *((volatile int*)__null) = 2714; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
2715 | |
2716 | StoreHasCrossOriginOpenerPolicyMismatch(false); |
2717 | if (!StaticPrefs::browser_tabs_remote_useCrossOriginOpenerPolicy()) { |
2718 | return NS_OK; |
2719 | } |
2720 | |
2721 | // Only consider Cross-Origin-Opener-Policy for toplevel document loads. |
2722 | if (mLoadInfo->GetExternalContentPolicyType() != |
2723 | ExtContentPolicy::TYPE_DOCUMENT) { |
2724 | return NS_OK; |
2725 | } |
2726 | |
2727 | // Maybe the channel failed and we have no response head? |
2728 | if (!mResponseHead) { |
2729 | // Not having a response head is not a hard failure at the point where |
2730 | // this method is called. |
2731 | return NS_OK; |
2732 | } |
2733 | |
2734 | RefPtr<mozilla::dom::BrowsingContext> ctx; |
2735 | mLoadInfo->GetBrowsingContext(getter_AddRefs(ctx)); |
2736 | |
2737 | // In xpcshell-tests we don't always have a browsingContext |
2738 | if (!ctx) { |
2739 | return NS_OK; |
2740 | } |
2741 | |
2742 | nsCOMPtr<nsIPrincipal> resultOrigin; |
2743 | nsContentUtils::GetSecurityManager()->GetChannelResultPrincipal( |
2744 | this, getter_AddRefs(resultOrigin)); |
2745 | |
2746 | // Get the policy of the active document, and the policy for the result. |
2747 | nsILoadInfo::CrossOriginOpenerPolicy documentPolicy = ctx->GetOpenerPolicy(); |
2748 | nsILoadInfo::CrossOriginOpenerPolicy resultPolicy = |
2749 | nsILoadInfo::OPENER_POLICY_UNSAFE_NONE; |
2750 | Unused << ComputeCrossOriginOpenerPolicy(documentPolicy, &resultPolicy); |
2751 | mComputedCrossOriginOpenerPolicy = resultPolicy; |
2752 | |
2753 | // Add a permission to mark this site as high-value into the permission DB. |
2754 | if (resultPolicy != nsILoadInfo::OPENER_POLICY_UNSAFE_NONE) { |
2755 | mozilla::dom::AddHighValuePermission( |
2756 | resultOrigin, mozilla::dom::kHighValueCOOPPermission); |
2757 | } |
2758 | |
2759 | // If bc's popup sandboxing flag set is not empty and potentialCOOP is |
2760 | // non-null, then navigate bc to a network error and abort these steps. |
2761 | if (resultPolicy != nsILoadInfo::OPENER_POLICY_UNSAFE_NONE && |
2762 | mLoadInfo->GetSandboxFlags()) { |
2763 | LOG((do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::ComputeCrossOriginOpenerPolicyMismatch network error " "for non empty sandboxing and non null COOP"); } } while (0) |
2764 | "HttpBaseChannel::ComputeCrossOriginOpenerPolicyMismatch network error "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::ComputeCrossOriginOpenerPolicyMismatch network error " "for non empty sandboxing and non null COOP"); } } while (0) |
2765 | "for non empty sandboxing and non null COOP"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::ComputeCrossOriginOpenerPolicyMismatch network error " "for non empty sandboxing and non null COOP"); } } while (0); |
2766 | return NS_ERROR_DOM_COOP_FAILED; |
2767 | } |
2768 | |
2769 | // In xpcshell-tests we don't always have a current window global |
2770 | RefPtr<mozilla::dom::WindowGlobalParent> currentWindowGlobal = |
2771 | ctx->Canonical()->GetCurrentWindowGlobal(); |
2772 | if (!currentWindowGlobal) { |
2773 | return NS_OK; |
2774 | } |
2775 | |
2776 | // We use the top window principal as the documentOrigin |
2777 | nsCOMPtr<nsIPrincipal> documentOrigin = |
2778 | currentWindowGlobal->DocumentPrincipal(); |
2779 | |
2780 | bool compareResult = CompareCrossOriginOpenerPolicies( |
2781 | documentPolicy, documentOrigin, resultPolicy, resultOrigin); |
2782 | |
2783 | if (LOG_ENABLED()(__builtin_expect(!!(mozilla::detail::log_test(mozilla::net:: gHttpLog, mozilla::LogLevel::Verbose)), 0))) { |
2784 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::HasCrossOriginOpenerPolicyMismatch - " "doc:%d result:%d - compare:%d\n" , documentPolicy, resultPolicy, compareResult); } } while (0) |
2785 | ("HttpBaseChannel::HasCrossOriginOpenerPolicyMismatch - "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::HasCrossOriginOpenerPolicyMismatch - " "doc:%d result:%d - compare:%d\n" , documentPolicy, resultPolicy, compareResult); } } while (0) |
2786 | "doc:%d result:%d - compare:%d\n",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::HasCrossOriginOpenerPolicyMismatch - " "doc:%d result:%d - compare:%d\n" , documentPolicy, resultPolicy, compareResult); } } while (0) |
2787 | documentPolicy, resultPolicy, compareResult))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::HasCrossOriginOpenerPolicyMismatch - " "doc:%d result:%d - compare:%d\n" , documentPolicy, resultPolicy, compareResult); } } while (0); |
2788 | nsAutoCString docOrigin("(null)"); |
2789 | nsCOMPtr<nsIURI> uri = documentOrigin->GetURI(); |
2790 | if (uri) { |
2791 | uri->GetSpec(docOrigin); |
2792 | } |
2793 | nsAutoCString resOrigin("(null)"); |
2794 | uri = resultOrigin->GetURI(); |
2795 | if (uri) { |
2796 | uri->GetSpec(resOrigin); |
2797 | } |
2798 | LOG(("doc origin:%s - res origin: %s\n", docOrigin.get(), resOrigin.get()))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "doc origin:%s - res origin: %s\n", docOrigin.get(), resOrigin .get()); } } while (0); |
2799 | } |
2800 | |
2801 | if (compareResult) { |
2802 | return NS_OK; |
2803 | } |
2804 | |
2805 | // If one of the following is false: |
2806 | // - document's policy is same-origin-allow-popups |
2807 | // - resultPolicy is null |
2808 | // - doc is the initial about:blank document |
2809 | // then we have a mismatch. |
2810 | |
2811 | if (documentPolicy != nsILoadInfo::OPENER_POLICY_SAME_ORIGIN_ALLOW_POPUPS) { |
2812 | StoreHasCrossOriginOpenerPolicyMismatch(true); |
2813 | return NS_OK; |
2814 | } |
2815 | |
2816 | if (resultPolicy != nsILoadInfo::OPENER_POLICY_UNSAFE_NONE) { |
2817 | StoreHasCrossOriginOpenerPolicyMismatch(true); |
2818 | return NS_OK; |
2819 | } |
2820 | |
2821 | if (!currentWindowGlobal->IsInitialDocument()) { |
2822 | StoreHasCrossOriginOpenerPolicyMismatch(true); |
2823 | return NS_OK; |
2824 | } |
2825 | |
2826 | return NS_OK; |
2827 | } |
2828 | |
2829 | nsresult HttpBaseChannel::ProcessCrossOriginSecurityHeaders() { |
2830 | StoreProcessCrossOriginSecurityHeadersCalled(true); |
2831 | nsresult rv = ProcessCrossOriginEmbedderPolicyHeader(); |
2832 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
2833 | return rv; |
2834 | } |
2835 | rv = ProcessCrossOriginResourcePolicyHeader(); |
2836 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
2837 | return rv; |
2838 | } |
2839 | return ComputeCrossOriginOpenerPolicyMismatch(); |
2840 | } |
2841 | |
2842 | enum class Report { Error, Warning }; |
2843 | |
2844 | // Helper Function to report messages to the console when the loaded |
2845 | // script had a wrong MIME type. |
2846 | void ReportMimeTypeMismatch(HttpBaseChannel* aChannel, const char* aMessageName, |
2847 | nsIURI* aURI, const nsACString& aContentType, |
2848 | Report report) { |
2849 | NS_ConvertUTF8toUTF16 spec(aURI->GetSpecOrDefault()); |
2850 | NS_ConvertUTF8toUTF16 contentType(aContentType); |
2851 | |
2852 | aChannel->LogMimeTypeMismatch(nsCString(aMessageName), |
2853 | report == Report::Warning, spec, contentType); |
2854 | } |
2855 | |
2856 | // Check and potentially enforce X-Content-Type-Options: nosniff |
2857 | nsresult ProcessXCTO(HttpBaseChannel* aChannel, nsIURI* aURI, |
2858 | nsHttpResponseHead* aResponseHead, |
2859 | nsILoadInfo* aLoadInfo) { |
2860 | if (!aURI || !aResponseHead || !aLoadInfo) { |
2861 | // if there is no uri, no response head or no loadInfo, then there is |
2862 | // nothing to do |
2863 | return NS_OK; |
2864 | } |
2865 | |
2866 | // 1) Query the XCTO header and check if 'nosniff' is the first value. |
2867 | nsAutoCString contentTypeOptionsHeader; |
2868 | if (!aResponseHead->GetContentTypeOptionsHeader(contentTypeOptionsHeader)) { |
2869 | // if failed to get XCTO header, then there is nothing to do. |
2870 | return NS_OK; |
2871 | } |
2872 | |
2873 | // let's compare the header (ignoring case) |
2874 | // e.g. "NoSniFF" -> "nosniff" |
2875 | // if it's not 'nosniff' then there is nothing to do here |
2876 | if (!contentTypeOptionsHeader.EqualsIgnoreCase("nosniff")) { |
2877 | // since we are getting here, the XCTO header was sent; |
2878 | // a non matching value most likely means a mistake happenend; |
2879 | // e.g. sending 'nosnif' instead of 'nosniff', let's log a warning. |
2880 | AutoTArray<nsString, 1> params; |
2881 | CopyUTF8toUTF16(contentTypeOptionsHeader, *params.AppendElement()); |
2882 | RefPtr<dom::Document> doc; |
2883 | aLoadInfo->GetLoadingDocument(getter_AddRefs(doc)); |
2884 | nsContentUtils::ReportToConsole(nsIScriptError::warningFlag, "XCTO"_ns, doc, |
2885 | nsContentUtils::eSECURITY_PROPERTIES, |
2886 | "XCTOHeaderValueMissing", params); |
2887 | return NS_OK; |
2888 | } |
2889 | |
2890 | // 2) Query the content type from the channel |
2891 | nsAutoCString contentType; |
2892 | aResponseHead->ContentType(contentType); |
2893 | |
2894 | // 3) Compare the expected MIME type with the actual type |
2895 | if (aLoadInfo->GetExternalContentPolicyType() == |
2896 | ExtContentPolicy::TYPE_STYLESHEET) { |
2897 | if (contentType.EqualsLiteral(TEXT_CSS"text/css")) { |
2898 | return NS_OK; |
2899 | } |
2900 | ReportMimeTypeMismatch(aChannel, "MimeTypeMismatch2", aURI, contentType, |
2901 | Report::Error); |
2902 | return NS_ERROR_CORRUPTED_CONTENT; |
2903 | } |
2904 | |
2905 | if (aLoadInfo->GetExternalContentPolicyType() == |
2906 | ExtContentPolicy::TYPE_SCRIPT) { |
2907 | if (nsContentUtils::IsJavascriptMIMEType( |
2908 | NS_ConvertUTF8toUTF16(contentType))) { |
2909 | return NS_OK; |
2910 | } |
2911 | ReportMimeTypeMismatch(aChannel, "MimeTypeMismatch2", aURI, contentType, |
2912 | Report::Error); |
2913 | return NS_ERROR_CORRUPTED_CONTENT; |
2914 | } |
2915 | |
2916 | auto policyType = aLoadInfo->GetExternalContentPolicyType(); |
2917 | if (policyType == ExtContentPolicy::TYPE_DOCUMENT || |
2918 | policyType == ExtContentPolicy::TYPE_SUBDOCUMENT) { |
2919 | // If the header XCTO nosniff is set for any browsing context, then |
2920 | // we set the skipContentSniffing flag on the Loadinfo. Within |
2921 | // GetMIMETypeFromContent we then bail early and do not do any sniffing. |
2922 | aLoadInfo->SetSkipContentSniffing(true); |
2923 | return NS_OK; |
2924 | } |
2925 | |
2926 | return NS_OK; |
2927 | } |
2928 | |
2929 | // Ensure that a load of type script has correct MIME type |
2930 | nsresult EnsureMIMEOfScript(HttpBaseChannel* aChannel, nsIURI* aURI, |
2931 | nsHttpResponseHead* aResponseHead, |
2932 | nsILoadInfo* aLoadInfo) { |
2933 | if (!aURI || !aResponseHead || !aLoadInfo) { |
2934 | // if there is no uri, no response head or no loadInfo, then there is |
2935 | // nothing to do |
2936 | return NS_OK; |
2937 | } |
2938 | |
2939 | if (aLoadInfo->GetExternalContentPolicyType() != |
2940 | ExtContentPolicy::TYPE_SCRIPT) { |
2941 | // if this is not a script load, then there is nothing to do |
2942 | return NS_OK; |
2943 | } |
2944 | |
2945 | nsAutoCString contentType; |
2946 | aResponseHead->ContentType(contentType); |
2947 | NS_ConvertUTF8toUTF16 typeString(contentType); |
2948 | |
2949 | if (nsContentUtils::IsJavascriptMIMEType(typeString)) { |
2950 | // script load has type script |
2951 | AccumulateCategorical( |
2952 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::javaScript); |
2953 | return NS_OK; |
2954 | } |
2955 | |
2956 | nsContentPolicyType internalType = aLoadInfo->InternalContentPolicyType(); |
2957 | bool isModule = |
2958 | internalType == nsIContentPolicy::TYPE_INTERNAL_MODULE || |
2959 | internalType == nsIContentPolicy::TYPE_INTERNAL_MODULE_PRELOAD; |
2960 | |
2961 | if (isModule && nsContentUtils::IsJsonMimeType(typeString)) { |
2962 | AccumulateCategorical( |
2963 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::javaScript); |
2964 | return NS_OK; |
2965 | } |
2966 | |
2967 | switch (aLoadInfo->InternalContentPolicyType()) { |
2968 | case nsIContentPolicy::TYPE_SCRIPT: |
2969 | case nsIContentPolicy::TYPE_INTERNAL_SCRIPT: |
2970 | case nsIContentPolicy::TYPE_INTERNAL_SCRIPT_PRELOAD: |
2971 | case nsIContentPolicy::TYPE_INTERNAL_MODULE: |
2972 | case nsIContentPolicy::TYPE_INTERNAL_MODULE_PRELOAD: |
2973 | case nsIContentPolicy::TYPE_INTERNAL_CHROMEUTILS_COMPILED_SCRIPT: |
2974 | case nsIContentPolicy::TYPE_INTERNAL_FRAME_MESSAGEMANAGER_SCRIPT: |
2975 | AccumulateCategorical( |
2976 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::script_load); |
2977 | break; |
2978 | case nsIContentPolicy::TYPE_INTERNAL_WORKER: |
2979 | case nsIContentPolicy::TYPE_INTERNAL_WORKER_STATIC_MODULE: |
2980 | case nsIContentPolicy::TYPE_INTERNAL_SHARED_WORKER: |
2981 | AccumulateCategorical( |
2982 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::worker_load); |
2983 | break; |
2984 | case nsIContentPolicy::TYPE_INTERNAL_SERVICE_WORKER: |
2985 | AccumulateCategorical( |
2986 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::serviceworker_load); |
2987 | break; |
2988 | case nsIContentPolicy::TYPE_INTERNAL_WORKER_IMPORT_SCRIPTS: |
2989 | AccumulateCategorical( |
2990 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::importScript_load); |
2991 | break; |
2992 | case nsIContentPolicy::TYPE_INTERNAL_AUDIOWORKLET: |
2993 | case nsIContentPolicy::TYPE_INTERNAL_PAINTWORKLET: |
2994 | AccumulateCategorical( |
2995 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::worklet_load); |
2996 | break; |
2997 | default: |
2998 | MOZ_ASSERT_UNREACHABLE("unexpected script type")do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "unexpected script type" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 2998); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "unexpected script type" ")"); do { *((volatile int*)__null) = 2998; __attribute__((nomerge)) :: abort(); } while (false); } } while (false); |
2999 | break; |
3000 | } |
3001 | |
3002 | if (aLoadInfo->GetLoadingPrincipal()->IsSameOrigin(aURI)) { |
3003 | // same origin |
3004 | AccumulateCategorical( |
3005 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::same_origin); |
3006 | } else { |
3007 | bool cors = false; |
3008 | nsAutoCString corsOrigin; |
3009 | nsresult rv = aResponseHead->GetHeader( |
3010 | nsHttp::ResolveAtom("Access-Control-Allow-Origin"_ns), corsOrigin); |
3011 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))) { |
3012 | if (corsOrigin.Equals("*")) { |
3013 | cors = true; |
3014 | } else { |
3015 | nsCOMPtr<nsIURI> corsOriginURI; |
3016 | rv = NS_NewURI(getter_AddRefs(corsOriginURI), corsOrigin); |
3017 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))) { |
3018 | if (aLoadInfo->GetLoadingPrincipal()->IsSameOrigin(corsOriginURI)) { |
3019 | cors = true; |
3020 | } |
3021 | } |
3022 | } |
3023 | } |
3024 | if (cors) { |
3025 | // cors origin |
3026 | AccumulateCategorical( |
3027 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::CORS_origin); |
3028 | } else { |
3029 | // cross origin |
3030 | AccumulateCategorical( |
3031 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::cross_origin); |
3032 | } |
3033 | } |
3034 | |
3035 | bool block = false; |
3036 | if (StringBeginsWith(contentType, "image/"_ns)) { |
3037 | // script load has type image |
3038 | AccumulateCategorical( |
3039 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::image); |
3040 | block = true; |
3041 | } else if (StringBeginsWith(contentType, "audio/"_ns)) { |
3042 | // script load has type audio |
3043 | AccumulateCategorical( |
3044 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::audio); |
3045 | block = true; |
3046 | } else if (StringBeginsWith(contentType, "video/"_ns)) { |
3047 | // script load has type video |
3048 | AccumulateCategorical( |
3049 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::video); |
3050 | block = true; |
3051 | } else if (StringBeginsWith(contentType, "text/csv"_ns)) { |
3052 | // script load has type text/csv |
3053 | AccumulateCategorical( |
3054 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::text_csv); |
3055 | block = true; |
3056 | } |
3057 | |
3058 | if (block) { |
3059 | ReportMimeTypeMismatch(aChannel, "BlockScriptWithWrongMimeType2", aURI, |
3060 | contentType, Report::Error); |
3061 | return NS_ERROR_CORRUPTED_CONTENT; |
3062 | } |
3063 | |
3064 | if (StringBeginsWith(contentType, "text/plain"_ns)) { |
3065 | // script load has type text/plain |
3066 | AccumulateCategorical( |
3067 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::text_plain); |
3068 | } else if (StringBeginsWith(contentType, "text/xml"_ns)) { |
3069 | // script load has type text/xml |
3070 | AccumulateCategorical( |
3071 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::text_xml); |
3072 | } else if (StringBeginsWith(contentType, "application/octet-stream"_ns)) { |
3073 | // script load has type application/octet-stream |
3074 | AccumulateCategorical( |
3075 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::app_octet_stream); |
3076 | } else if (StringBeginsWith(contentType, "application/xml"_ns)) { |
3077 | // script load has type application/xml |
3078 | AccumulateCategorical( |
3079 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::app_xml); |
3080 | } else if (StringBeginsWith(contentType, "application/json"_ns)) { |
3081 | // script load has type application/json |
3082 | AccumulateCategorical( |
3083 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::app_json); |
3084 | } else if (StringBeginsWith(contentType, "text/json"_ns)) { |
3085 | // script load has type text/json |
3086 | AccumulateCategorical( |
3087 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::text_json); |
3088 | } else if (StringBeginsWith(contentType, "text/html"_ns)) { |
3089 | // script load has type text/html |
3090 | AccumulateCategorical( |
3091 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::text_html); |
3092 | } else if (contentType.IsEmpty()) { |
3093 | // script load has no type |
3094 | AccumulateCategorical( |
3095 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::empty); |
3096 | } else { |
3097 | // script load has unknown type |
3098 | AccumulateCategorical( |
3099 | Telemetry::LABELS_SCRIPT_BLOCK_INCORRECT_MIME_3::unknown); |
3100 | } |
3101 | |
3102 | // We restrict importScripts() in worker code to JavaScript MIME types. |
3103 | if (internalType == nsIContentPolicy::TYPE_INTERNAL_WORKER_IMPORT_SCRIPTS || |
3104 | internalType == nsIContentPolicy::TYPE_INTERNAL_WORKER_STATIC_MODULE) { |
3105 | ReportMimeTypeMismatch(aChannel, "BlockImportScriptsWithWrongMimeType", |
3106 | aURI, contentType, Report::Error); |
3107 | return NS_ERROR_CORRUPTED_CONTENT; |
3108 | } |
3109 | |
3110 | if (internalType == nsIContentPolicy::TYPE_INTERNAL_WORKER || |
3111 | internalType == nsIContentPolicy::TYPE_INTERNAL_SHARED_WORKER) { |
3112 | // Do not block the load if the feature is not enabled. |
3113 | if (!StaticPrefs::security_block_Worker_with_wrong_mime()) { |
3114 | return NS_OK; |
3115 | } |
3116 | |
3117 | ReportMimeTypeMismatch(aChannel, "BlockWorkerWithWrongMimeType", aURI, |
3118 | contentType, Report::Error); |
3119 | return NS_ERROR_CORRUPTED_CONTENT; |
3120 | } |
3121 | |
3122 | // ES6 modules require a strict MIME type check. |
3123 | if (isModule) { |
3124 | ReportMimeTypeMismatch(aChannel, "BlockModuleWithWrongMimeType", aURI, |
3125 | contentType, Report::Error); |
3126 | return NS_ERROR_CORRUPTED_CONTENT; |
3127 | } |
3128 | |
3129 | return NS_OK; |
3130 | } |
3131 | |
3132 | // Warn when a load of type script uses a wrong MIME type and |
3133 | // wasn't blocked by EnsureMIMEOfScript or ProcessXCTO. |
3134 | void WarnWrongMIMEOfScript(HttpBaseChannel* aChannel, nsIURI* aURI, |
3135 | nsHttpResponseHead* aResponseHead, |
3136 | nsILoadInfo* aLoadInfo) { |
3137 | if (!aURI || !aResponseHead || !aLoadInfo) { |
3138 | // If there is no uri, no response head or no loadInfo, then there is |
3139 | // nothing to do. |
3140 | return; |
3141 | } |
3142 | |
3143 | if (aLoadInfo->GetExternalContentPolicyType() != |
3144 | ExtContentPolicy::TYPE_SCRIPT) { |
3145 | // If this is not a script load, then there is nothing to do. |
3146 | return; |
3147 | } |
3148 | |
3149 | bool succeeded; |
3150 | MOZ_ALWAYS_SUCCEEDS(aChannel->GetRequestSucceeded(&succeeded))do { if ((__builtin_expect(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl (aChannel->GetRequestSucceeded(&succeeded))), 1)))), 1 ))) { } else { do { do { } while (false); MOZ_ReportCrash("" "NS_SUCCEEDED(aChannel->GetRequestSucceeded(&succeeded))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3150); AnnotateMozCrashReason("MOZ_CRASH(" "NS_SUCCEEDED(aChannel->GetRequestSucceeded(&succeeded))" ")"); do { *((volatile int*)__null) = 3150; __attribute__((nomerge )) ::abort(); } while (false); } while (false); } } while (false ); |
3151 | if (!succeeded) { |
3152 | // Do not warn for failed loads: HTTP error pages are usually in HTML. |
3153 | return; |
3154 | } |
3155 | |
3156 | nsAutoCString contentType; |
3157 | aResponseHead->ContentType(contentType); |
3158 | NS_ConvertUTF8toUTF16 typeString(contentType); |
3159 | |
3160 | if (nsContentUtils::IsJavascriptMIMEType(typeString)) { |
3161 | return; |
3162 | } |
3163 | |
3164 | nsContentPolicyType internalType = aLoadInfo->InternalContentPolicyType(); |
3165 | bool isModule = |
3166 | internalType == nsIContentPolicy::TYPE_INTERNAL_MODULE || |
3167 | internalType == nsIContentPolicy::TYPE_INTERNAL_MODULE_PRELOAD; |
3168 | if (isModule && nsContentUtils::IsJsonMimeType(typeString)) { |
3169 | return; |
3170 | } |
3171 | |
3172 | ReportMimeTypeMismatch(aChannel, "WarnScriptWithWrongMimeType", aURI, |
3173 | contentType, Report::Warning); |
3174 | } |
3175 | |
3176 | nsresult HttpBaseChannel::ValidateMIMEType() { |
3177 | nsresult rv = EnsureMIMEOfScript(this, mURI, mResponseHead.get(), mLoadInfo); |
3178 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
3179 | return rv; |
3180 | } |
3181 | |
3182 | rv = ProcessXCTO(this, mURI, mResponseHead.get(), mLoadInfo); |
3183 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
3184 | return rv; |
3185 | } |
3186 | |
3187 | WarnWrongMIMEOfScript(this, mURI, mResponseHead.get(), mLoadInfo); |
3188 | return NS_OK; |
3189 | } |
3190 | |
3191 | bool HttpBaseChannel::ShouldFilterOpaqueResponse( |
3192 | OpaqueResponseFilterFetch aFilterType) const { |
3193 | MOZ_ASSERT(ShouldBlockOpaqueResponse())do { static_assert( mozilla::detail::AssertionConditionType< decltype(ShouldBlockOpaqueResponse())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(ShouldBlockOpaqueResponse()) )), 0))) { do { } while (false); MOZ_ReportAssertionFailure("ShouldBlockOpaqueResponse()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3193); AnnotateMozCrashReason("MOZ_ASSERT" "(" "ShouldBlockOpaqueResponse()" ")"); do { *((volatile int*)__null) = 3193; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3194 | |
3195 | if (!mLoadInfo || ConfiguredFilterFetchResponseBehaviour() != aFilterType) { |
3196 | return false; |
3197 | } |
3198 | |
3199 | // We should filter a response in the parent if it is opaque and is the result |
3200 | // of a fetch() function from the Fetch specification. |
3201 | return mLoadInfo->InternalContentPolicyType() == nsIContentPolicy::TYPE_FETCH; |
3202 | } |
3203 | |
3204 | bool HttpBaseChannel::ShouldBlockOpaqueResponse() const { |
3205 | if (!mURI || !mResponseHead || !mLoadInfo) { |
3206 | // if there is no uri, no response head or no loadInfo, then there is |
3207 | // nothing to do |
3208 | LOGORB("No block: no mURI, mResponseHead, or mLoadInfo")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: no mURI, mResponseHead, or mLoadInfo" , __func__, this); } } while (0); |
3209 | return false; |
3210 | } |
3211 | |
3212 | nsCOMPtr<nsIPrincipal> principal = mLoadInfo->GetLoadingPrincipal(); |
3213 | if (!principal || principal->IsSystemPrincipal()) { |
3214 | // If it's a top-level load or a system principal, then there is nothing to |
3215 | // do. |
3216 | LOGORB("No block: top-level load or system principal")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: top-level load or system principal" , __func__, this); } } while (0); |
3217 | return false; |
3218 | } |
3219 | |
3220 | // Check if the response is a opaque response, which means requestMode should |
3221 | // be RequestMode::No_cors and responseType should be ResponseType::Opaque. |
3222 | nsContentPolicyType contentPolicy = mLoadInfo->InternalContentPolicyType(); |
3223 | |
3224 | // Skip the RequestMode would be RequestMode::Navigate |
3225 | if (contentPolicy == nsIContentPolicy::TYPE_DOCUMENT || |
3226 | contentPolicy == nsIContentPolicy::TYPE_SUBDOCUMENT || |
3227 | contentPolicy == nsIContentPolicy::TYPE_INTERNAL_FRAME || |
3228 | contentPolicy == nsIContentPolicy::TYPE_INTERNAL_IFRAME || |
3229 | // Skip the RequestMode would be RequestMode::Same_origin |
3230 | contentPolicy == nsIContentPolicy::TYPE_INTERNAL_WORKER || |
3231 | contentPolicy == nsIContentPolicy::TYPE_INTERNAL_SHARED_WORKER) { |
3232 | return false; |
3233 | } |
3234 | |
3235 | uint32_t securityMode = mLoadInfo->GetSecurityMode(); |
3236 | // Skip when RequestMode would not be RequestMode::no_cors |
3237 | if (securityMode != |
3238 | nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT && |
3239 | securityMode != nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL) { |
3240 | LOGORB("No block: not no_cors requests")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: not no_cors requests" , __func__, this); } } while (0); |
3241 | return false; |
3242 | } |
3243 | |
3244 | // Only continue when ResponseType would be ResponseType::Opaque |
3245 | if (mLoadInfo->GetTainting() != mozilla::LoadTainting::Opaque) { |
3246 | LOGORB("No block: not opaque response")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: not opaque response", __func__, this); } } while (0); |
3247 | return false; |
3248 | } |
3249 | |
3250 | auto extContentPolicyType = mLoadInfo->GetExternalContentPolicyType(); |
3251 | if (extContentPolicyType == ExtContentPolicy::TYPE_OBJECT || |
3252 | extContentPolicyType == ExtContentPolicy::TYPE_OBJECT_SUBREQUEST || |
3253 | extContentPolicyType == ExtContentPolicy::TYPE_WEBSOCKET || |
3254 | extContentPolicyType == ExtContentPolicy::TYPE_SAVEAS_DOWNLOAD) { |
3255 | LOGORB("No block: object || websocket request || save as download")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: object || websocket request || save as download" , __func__, this); } } while (0); |
3256 | return false; |
3257 | } |
3258 | |
3259 | // Ignore the request from object or embed elements |
3260 | if (mLoadInfo->GetIsFromObjectOrEmbed()) { |
3261 | LOGORB("No block: Request From <object> or <embed>")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: Request From <object> or <embed>" , __func__, this); } } while (0); |
3262 | return false; |
3263 | } |
3264 | |
3265 | // Exclude no_cors System XHR |
3266 | if (extContentPolicyType == ExtContentPolicy::TYPE_XMLHTTPREQUEST) { |
3267 | if (securityMode == |
3268 | nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT) { |
3269 | LOGORB("No block: System XHR")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: System XHR", __func__ , this); } } while (0); |
3270 | return false; |
3271 | } |
3272 | } |
3273 | |
3274 | uint32_t httpsOnlyStatus = mLoadInfo->GetHttpsOnlyStatus(); |
3275 | if (httpsOnlyStatus & nsILoadInfo::HTTPS_ONLY_BYPASS_ORB) { |
3276 | LOGORB("No block: HTTPS_ONLY_BYPASS_ORB")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: HTTPS_ONLY_BYPASS_ORB" , __func__, this); } } while (0); |
3277 | return false; |
3278 | } |
3279 | |
3280 | bool isInDevToolsContext; |
3281 | mLoadInfo->GetIsInDevToolsContext(&isInDevToolsContext); |
3282 | if (isInDevToolsContext) { |
3283 | LOGORB("No block: Request created by devtools")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "No block: Request created by devtools" , __func__, this); } } while (0); |
3284 | return false; |
3285 | } |
3286 | |
3287 | return true; |
3288 | } |
3289 | |
3290 | OpaqueResponse HttpBaseChannel::BlockOrFilterOpaqueResponse( |
3291 | OpaqueResponseBlocker* aORB, const nsAString& aReason, |
3292 | const OpaqueResponseBlockedTelemetryReason aTelemetryReason, |
3293 | const char* aFormat, ...) { |
3294 | NimbusFeatures::RecordExposureEvent("opaqueResponseBlocking"_ns, true); |
3295 | |
3296 | const bool shouldFilter = |
3297 | ShouldFilterOpaqueResponse(OpaqueResponseFilterFetch::BlockedByORB); |
3298 | |
3299 | if (MOZ_UNLIKELY(MOZ_LOG_TEST(GetORBLog(), LogLevel::Debug))(__builtin_expect(!!((__builtin_expect(!!(mozilla::detail::log_test (GetORBLog(), LogLevel::Debug)), 0))), 0))) { |
3300 | va_list ap; |
3301 | va_start(ap, aFormat)__builtin_va_start(ap, aFormat); |
3302 | nsVprintfCString logString(aFormat, ap); |
3303 | va_end(ap)__builtin_va_end(ap); |
3304 | |
3305 | LOGORB("%s: %s", shouldFilter ? "Filtered" : "Blocked", logString.get())do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "%s: %s", __func__, this, shouldFilter ? "Filtered" : "Blocked", logString.get()); } } while (0); |
3306 | } |
3307 | |
3308 | if (shouldFilter) { |
3309 | Telemetry::AccumulateCategorical( |
3310 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::FILTERED_FETCH); |
3311 | // The existence of `mORB` depends on `BlockOrFilterOpaqueResponse` being |
3312 | // called before or after sniffing has completed. |
3313 | // Another requirement is that `OpaqueResponseFilter` must come after |
3314 | // `OpaqueResponseBlocker`, which is why in the case of having an |
3315 | // `OpaqueResponseBlocker` we let it handle creating an |
3316 | // `OpaqueResponseFilter`. |
3317 | if (aORB) { |
3318 | MOZ_DIAGNOSTIC_ASSERT(!mORB || aORB == mORB)do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mORB || aORB == mORB)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!mORB || aORB == mORB))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("!mORB || aORB == mORB" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3318); AnnotateMozCrashReason("MOZ_DIAGNOSTIC_ASSERT" "(" "!mORB || aORB == mORB" ")"); do { *((volatile int*)__null) = 3318; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3319 | aORB->FilterResponse(); |
3320 | } else { |
3321 | mListener = new OpaqueResponseFilter(mListener); |
3322 | } |
3323 | return OpaqueResponse::Allow; |
3324 | } |
3325 | |
3326 | LogORBError(aReason, aTelemetryReason); |
3327 | return OpaqueResponse::Block; |
3328 | } |
3329 | |
3330 | // The specification for ORB is currently being written: |
3331 | // https://whatpr.org/fetch/1442.html#orb-algorithm |
3332 | // The `opaque-response-safelist check` is implemented in: |
3333 | // * `HttpBaseChannel::PerformOpaqueResponseSafelistCheckBeforeSniff` |
3334 | // * `nsHttpChannel::DisableIsOpaqueResponseAllowedAfterSniffCheck` |
3335 | // * `HttpBaseChannel::PerformOpaqueResponseSafelistCheckAfterSniff` |
3336 | // * `OpaqueResponseBlocker::ValidateJavaScript` |
3337 | OpaqueResponse |
3338 | HttpBaseChannel::PerformOpaqueResponseSafelistCheckBeforeSniff() { |
3339 | MOZ_ASSERT(XRE_IsParentProcess())do { static_assert( mozilla::detail::AssertionConditionType< decltype(XRE_IsParentProcess())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(XRE_IsParentProcess()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("XRE_IsParentProcess()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3339); AnnotateMozCrashReason("MOZ_ASSERT" "(" "XRE_IsParentProcess()" ")"); do { *((volatile int*)__null) = 3339; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3340 | |
3341 | // https://whatpr.org/fetch/1442.html#http-fetch, step 6.4 |
3342 | if (!ShouldBlockOpaqueResponse()) { |
3343 | return OpaqueResponse::Allow; |
3344 | } |
3345 | |
3346 | // Regardless of if ORB is enabled or not, we check if we should filter the |
3347 | // response in the parent. This way data won't reach a content process that |
3348 | // will create a filtered `Response` object. This is enabled when |
3349 | // 'browser.opaqueResponseBlocking.filterFetchResponse' is |
3350 | // `OpaqueResponseFilterFetch::All`. |
3351 | // See https://fetch.spec.whatwg.org/#concept-filtered-response-opaque |
3352 | if (ShouldFilterOpaqueResponse(OpaqueResponseFilterFetch::All)) { |
3353 | mListener = new OpaqueResponseFilter(mListener); |
3354 | |
3355 | // If we're filtering a response in the parent, there will be no data to |
3356 | // determine if it should be blocked or not so the only option we have is to |
3357 | // allow it. |
3358 | return OpaqueResponse::Allow; |
3359 | } |
3360 | |
3361 | if (!mCachedOpaqueResponseBlockingPref) { |
3362 | return OpaqueResponse::Allow; |
3363 | } |
3364 | |
3365 | // If ORB is enabled, we check if we should filter the response in the parent. |
3366 | // This way data won't reach a content process that will create a filtered |
3367 | // `Response` object. We allow ORB to determine if the response should be |
3368 | // blocked or filtered, but regardless no data should reach the content |
3369 | // process. This is enabled when |
3370 | // 'browser.opaqueResponseBlocking.filterFetchResponse' is |
3371 | // `OpaqueResponseFilterFetch::AllowedByORB`. |
3372 | // See https://fetch.spec.whatwg.org/#concept-filtered-response-opaque |
3373 | if (ShouldFilterOpaqueResponse(OpaqueResponseFilterFetch::AllowedByORB)) { |
3374 | mListener = new OpaqueResponseFilter(mListener); |
3375 | } |
3376 | |
3377 | glean::opaque_response_blocking::cross_origin_opaque_response_count.Add(1); |
3378 | |
3379 | PROFILER_MARKER_TEXT("ORB safelist check", NETWORK, {}, "Before sniff"_ns)do { ; do { if (profiler_is_collecting_markers()) { ::profiler_add_marker_impl ("ORB safelist check", ::geckoprofiler::category::NETWORK, {} , ::geckoprofiler::markers::TextMarker{}, "Before sniff"_ns); } } while (false); } while (false); |
3380 | |
3381 | // https://whatpr.org/fetch/1442.html#orb-algorithm |
3382 | // Step 1 |
3383 | nsAutoCString contentType; |
3384 | mResponseHead->ContentType(contentType); |
3385 | |
3386 | // Step 2 |
3387 | nsAutoCString contentTypeOptionsHeader; |
3388 | bool nosniff = |
3389 | mResponseHead->GetContentTypeOptionsHeader(contentTypeOptionsHeader) && |
3390 | contentTypeOptionsHeader.EqualsIgnoreCase("nosniff"); |
3391 | |
3392 | // Step 3 |
3393 | switch (GetOpaqueResponseBlockedReason(contentType, mResponseHead->Status(), |
3394 | nosniff)) { |
3395 | case OpaqueResponseBlockedReason::ALLOWED_SAFE_LISTED: |
3396 | // Step 3.1 |
3397 | return OpaqueResponse::Allow; |
3398 | case OpaqueResponseBlockedReason::ALLOWED_SAFE_LISTED_SPEC_BREAKING: |
3399 | LOGORB("Allowed %s in a spec breaking way", contentType.get())do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "Allowed %s in a spec breaking way" , __func__, this, contentType.get()); } } while (0); |
3400 | return OpaqueResponse::Allow; |
3401 | case OpaqueResponseBlockedReason::BLOCKED_BLOCKLISTED_NEVER_SNIFFED: |
3402 | return BlockOrFilterOpaqueResponse( |
3403 | mORB, u"mimeType is an opaque-blocklisted-never-sniffed MIME type"_ns, |
3404 | OpaqueResponseBlockedTelemetryReason::MIME_NEVER_SNIFFED, |
3405 | "BLOCKED_BLOCKLISTED_NEVER_SNIFFED"); |
3406 | case OpaqueResponseBlockedReason::BLOCKED_206_AND_BLOCKLISTED: |
3407 | // Step 3.3 |
3408 | return BlockOrFilterOpaqueResponse( |
3409 | mORB, |
3410 | u"response's status is 206 and mimeType is an opaque-blocklisted MIME type"_ns, |
3411 | OpaqueResponseBlockedTelemetryReason::RESP_206_BLCLISTED, |
3412 | "BLOCKED_206_AND_BLOCKEDLISTED"); |
3413 | case OpaqueResponseBlockedReason:: |
3414 | BLOCKED_NOSNIFF_AND_EITHER_BLOCKLISTED_OR_TEXTPLAIN: |
3415 | // Step 3.4 |
3416 | return BlockOrFilterOpaqueResponse( |
3417 | mORB, |
3418 | u"nosniff is true and mimeType is an opaque-blocklisted MIME type or its essence is 'text/plain'"_ns, |
3419 | OpaqueResponseBlockedTelemetryReason::NOSNIFF_BLC_OR_TEXTP, |
3420 | "BLOCKED_NOSNIFF_AND_EITHER_BLOCKLISTED_OR_TEXTPLAIN"); |
3421 | default: |
3422 | break; |
3423 | } |
3424 | |
3425 | // Step 4 |
3426 | // If it's a media subsequent request, we assume that it will only be made |
3427 | // after a successful initial request. |
3428 | bool isMediaRequest; |
3429 | mLoadInfo->GetIsMediaRequest(&isMediaRequest); |
3430 | if (isMediaRequest) { |
3431 | bool isMediaInitialRequest; |
3432 | mLoadInfo->GetIsMediaInitialRequest(&isMediaInitialRequest); |
3433 | if (!isMediaInitialRequest) { |
3434 | return OpaqueResponse::Allow; |
3435 | } |
3436 | } |
3437 | |
3438 | // Step 5 |
3439 | if (mResponseHead->Status() == 206 && |
3440 | !IsFirstPartialResponse(*mResponseHead)) { |
3441 | return BlockOrFilterOpaqueResponse( |
3442 | mORB, u"response status is 206 and not first partial response"_ns, |
3443 | OpaqueResponseBlockedTelemetryReason::RESP_206_BLCLISTED, |
3444 | "Is not a valid partial response given 0"); |
3445 | } |
3446 | |
3447 | // Setup for steps 6, 7, 8 and 10. |
3448 | // Steps 6 and 7 are handled by the sniffer framework. |
3449 | // Steps 8 and 10 by are handled by |
3450 | // `nsHttpChannel::DisableIsOpaqueResponseAllowedAfterSniffCheck` |
3451 | if (mLoadFlags & nsIChannel::LOAD_CALL_CONTENT_SNIFFERS) { |
3452 | mSnifferCategoryType = SnifferCategoryType::All; |
3453 | } else { |
3454 | mSnifferCategoryType = SnifferCategoryType::OpaqueResponseBlocking; |
3455 | } |
3456 | |
3457 | mLoadFlags |= (nsIChannel::LOAD_CALL_CONTENT_SNIFFERS | |
3458 | nsIChannel::LOAD_MEDIA_SNIFFER_OVERRIDES_CONTENT_TYPE); |
3459 | |
3460 | // Install an input stream listener that performs ORB checks that depend on |
3461 | // inspecting the incoming data. It is crucial that `OnStartRequest` is called |
3462 | // on this listener either after sniffing is completed or that we skip |
3463 | // sniffing, otherwise `OpaqueResponseBlocker` will allow responses that it |
3464 | // shouldn't. |
3465 | mORB = new OpaqueResponseBlocker(mListener, this, contentType, nosniff); |
3466 | mListener = mORB; |
3467 | |
3468 | nsAutoCString contentEncoding; |
3469 | nsresult rv = |
3470 | mResponseHead->GetHeader(nsHttp::Content_Encoding, contentEncoding); |
3471 | |
3472 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1))) && !contentEncoding.IsEmpty()) { |
3473 | return OpaqueResponse::SniffCompressed; |
3474 | } |
3475 | mLoadFlags |= (nsIChannel::LOAD_CALL_CONTENT_SNIFFERS | |
3476 | nsIChannel::LOAD_MEDIA_SNIFFER_OVERRIDES_CONTENT_TYPE); |
3477 | return OpaqueResponse::Sniff; |
3478 | } |
3479 | |
3480 | // The specification for ORB is currently being written: |
3481 | // https://whatpr.org/fetch/1442.html#orb-algorithm |
3482 | // The `opaque-response-safelist check` is implemented in: |
3483 | // * `HttpBaseChannel::PerformOpaqueResponseSafelistCheckBeforeSniff` |
3484 | // * `nsHttpChannel::DisableIsOpaqueResponseAllowedAfterSniffCheck` |
3485 | // * `HttpBaseChannel::PerformOpaqueResponseSafelistCheckAfterSniff` |
3486 | // * `OpaqueResponseBlocker::ValidateJavaScript` |
3487 | OpaqueResponse HttpBaseChannel::PerformOpaqueResponseSafelistCheckAfterSniff( |
3488 | const nsACString& aContentType, bool aNoSniff) { |
3489 | PROFILER_MARKER_TEXT("ORB safelist check", NETWORK, {}, "After sniff"_ns)do { ; do { if (profiler_is_collecting_markers()) { ::profiler_add_marker_impl ("ORB safelist check", ::geckoprofiler::category::NETWORK, {} , ::geckoprofiler::markers::TextMarker{}, "After sniff"_ns); } } while (false); } while (false); |
3490 | |
3491 | // https://whatpr.org/fetch/1442.html#orb-algorithm |
3492 | MOZ_ASSERT(XRE_IsParentProcess())do { static_assert( mozilla::detail::AssertionConditionType< decltype(XRE_IsParentProcess())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(XRE_IsParentProcess()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("XRE_IsParentProcess()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3492); AnnotateMozCrashReason("MOZ_ASSERT" "(" "XRE_IsParentProcess()" ")"); do { *((volatile int*)__null) = 3492; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3493 | MOZ_ASSERT(mCachedOpaqueResponseBlockingPref)do { static_assert( mozilla::detail::AssertionConditionType< decltype(mCachedOpaqueResponseBlockingPref)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mCachedOpaqueResponseBlockingPref ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "mCachedOpaqueResponseBlockingPref", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3493); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mCachedOpaqueResponseBlockingPref" ")"); do { *((volatile int*)__null) = 3493; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3494 | |
3495 | // Step 9 |
3496 | bool isMediaRequest; |
3497 | mLoadInfo->GetIsMediaRequest(&isMediaRequest); |
3498 | if (isMediaRequest) { |
3499 | return BlockOrFilterOpaqueResponse( |
3500 | mORB, u"after sniff: media request"_ns, |
3501 | OpaqueResponseBlockedTelemetryReason::AFTER_SNIFF_MEDIA, |
3502 | "media request"); |
3503 | } |
3504 | |
3505 | // Step 11 |
3506 | if (aNoSniff) { |
3507 | return BlockOrFilterOpaqueResponse( |
3508 | mORB, u"after sniff: nosniff is true"_ns, |
3509 | OpaqueResponseBlockedTelemetryReason::AFTER_SNIFF_NOSNIFF, "nosniff"); |
3510 | } |
3511 | |
3512 | // Step 12 |
3513 | if (mResponseHead && |
3514 | (mResponseHead->Status() < 200 || mResponseHead->Status() > 299)) { |
3515 | return BlockOrFilterOpaqueResponse( |
3516 | mORB, u"after sniff: status code is not in allowed range"_ns, |
3517 | OpaqueResponseBlockedTelemetryReason::AFTER_SNIFF_STA_CODE, |
3518 | "status code (%d) is not allowed", mResponseHead->Status()); |
3519 | } |
3520 | |
3521 | // Step 13 |
3522 | if (!mResponseHead || aContentType.IsEmpty()) { |
3523 | LOGORB("Allowed: mimeType is failure")do { const ::mozilla::LogModule* moz_real_module = GetORBLog( ); if ((__builtin_expect(!!(mozilla::detail::log_test(moz_real_module , LogLevel::Debug)), 0))) { mozilla::detail::log_print(moz_real_module , LogLevel::Debug, "%s: %p " "Allowed: mimeType is failure", __func__ , this); } } while (0); |
3524 | return OpaqueResponse::Allow; |
3525 | } |
3526 | |
3527 | // Step 14 |
3528 | if (StringBeginsWith(aContentType, "image/"_ns) || |
3529 | StringBeginsWith(aContentType, "video/"_ns) || |
3530 | StringBeginsWith(aContentType, "audio/"_ns)) { |
3531 | return BlockOrFilterOpaqueResponse( |
3532 | mORB, |
3533 | u"after sniff: content-type declares image/video/audio, but sniffing fails"_ns, |
3534 | OpaqueResponseBlockedTelemetryReason::AFTER_SNIFF_CT_FAIL, |
3535 | "ContentType is image/video/audio"); |
3536 | } |
3537 | |
3538 | return OpaqueResponse::Sniff; |
3539 | } |
3540 | |
3541 | bool HttpBaseChannel::NeedOpaqueResponseAllowedCheckAfterSniff() const { |
3542 | return mORB ? mORB->IsSniffing() : false; |
3543 | } |
3544 | |
3545 | void HttpBaseChannel::BlockOpaqueResponseAfterSniff( |
3546 | const nsAString& aReason, |
3547 | const OpaqueResponseBlockedTelemetryReason aTelemetryReason) { |
3548 | MOZ_DIAGNOSTIC_ASSERT(mORB)do { static_assert( mozilla::detail::AssertionConditionType< decltype(mORB)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(mORB))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("mORB", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3548); AnnotateMozCrashReason("MOZ_DIAGNOSTIC_ASSERT" "(" "mORB" ")"); do { *((volatile int*)__null) = 3548; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3549 | LogORBError(aReason, aTelemetryReason); |
3550 | mORB->BlockResponse(this, NS_BINDING_ABORTED); |
3551 | } |
3552 | |
3553 | void HttpBaseChannel::AllowOpaqueResponseAfterSniff() { |
3554 | MOZ_DIAGNOSTIC_ASSERT(mORB)do { static_assert( mozilla::detail::AssertionConditionType< decltype(mORB)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(mORB))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("mORB", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3554); AnnotateMozCrashReason("MOZ_DIAGNOSTIC_ASSERT" "(" "mORB" ")"); do { *((volatile int*)__null) = 3554; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3555 | mORB->AllowResponse(); |
3556 | } |
3557 | |
3558 | void HttpBaseChannel::SetChannelBlockedByOpaqueResponse() { |
3559 | mChannelBlockedByOpaqueResponse = true; |
3560 | |
3561 | RefPtr<dom::BrowsingContext> browsingContext = |
3562 | dom::BrowsingContext::GetCurrentTopByBrowserId(mBrowserId); |
3563 | if (!browsingContext) { |
3564 | return; |
3565 | } |
3566 | |
3567 | dom::WindowContext* windowContext = browsingContext->GetTopWindowContext(); |
3568 | if (windowContext) { |
3569 | windowContext->Canonical()->SetShouldReportHasBlockedOpaqueResponse( |
3570 | mLoadInfo->InternalContentPolicyType()); |
3571 | } |
3572 | } |
3573 | |
3574 | NS_IMETHODIMPnsresult |
3575 | HttpBaseChannel::SetCookieHeaders(const nsTArray<nsCString>& aCookieHeaders) { |
3576 | if (mLoadFlags & LOAD_ANONYMOUS) return NS_OK; |
3577 | |
3578 | if (IsBrowsingContextDiscarded()) { |
3579 | return NS_OK; |
3580 | } |
3581 | |
3582 | // empty header isn't an error |
3583 | if (aCookieHeaders.IsEmpty()) { |
3584 | return NS_OK; |
3585 | } |
3586 | |
3587 | nsICookieService* cs = gHttpHandler->GetCookieService(); |
3588 | NS_ENSURE_TRUE(cs, NS_ERROR_FAILURE)do { if ((__builtin_expect(!!(!(cs)), 0))) { NS_DebugBreak(NS_DEBUG_WARNING , "NS_ENSURE_TRUE(" "cs" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3588); return NS_ERROR_FAILURE; } } while (false); |
3589 | |
3590 | for (const nsCString& cookieHeader : aCookieHeaders) { |
3591 | nsresult rv = cs->SetCookieStringFromHttp(mURI, cookieHeader, this); |
3592 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3592); return rv; } } while (false); |
3593 | } |
3594 | |
3595 | return NS_OK; |
3596 | } |
3597 | |
3598 | NS_IMETHODIMPnsresult |
3599 | HttpBaseChannel::GetThirdPartyFlags(uint32_t* aFlags) { |
3600 | *aFlags = LoadThirdPartyFlags(); |
3601 | return NS_OK; |
3602 | } |
3603 | |
3604 | NS_IMETHODIMPnsresult |
3605 | HttpBaseChannel::SetThirdPartyFlags(uint32_t aFlags) { |
3606 | ENSURE_CALLED_BEFORE_ASYNC_OPEN()do { if (LoadIsPending() || LoadWasOpened()) { nsPrintfCString msg("'%s' called after AsyncOpen: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3606); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3606, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3606); } } while (0); } do { if ((__builtin_expect(!!(!(!LoadIsPending ())), 0))) { NS_DebugBreak(NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!LoadIsPending()" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3606); return NS_ERROR_IN_PROGRESS; } } while (false); do { if ((__builtin_expect(!!(!(!LoadWasOpened())), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!LoadWasOpened()" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3606); return NS_ERROR_ALREADY_OPENED; } } while (false); } while (0); |
3607 | |
3608 | StoreThirdPartyFlags(aFlags); |
3609 | return NS_OK; |
3610 | } |
3611 | |
3612 | NS_IMETHODIMPnsresult |
3613 | HttpBaseChannel::GetForceAllowThirdPartyCookie(bool* aForce) { |
3614 | *aForce = !!(LoadThirdPartyFlags() & |
3615 | nsIHttpChannelInternal::THIRD_PARTY_FORCE_ALLOW); |
3616 | return NS_OK; |
3617 | } |
3618 | |
3619 | NS_IMETHODIMPnsresult |
3620 | HttpBaseChannel::SetForceAllowThirdPartyCookie(bool aForce) { |
3621 | ENSURE_CALLED_BEFORE_ASYNC_OPEN()do { if (LoadIsPending() || LoadWasOpened()) { nsPrintfCString msg("'%s' called after AsyncOpen: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3621); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3621, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3621); } } while (0); } do { if ((__builtin_expect(!!(!(!LoadIsPending ())), 0))) { NS_DebugBreak(NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!LoadIsPending()" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3621); return NS_ERROR_IN_PROGRESS; } } while (false); do { if ((__builtin_expect(!!(!(!LoadWasOpened())), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!LoadWasOpened()" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3621); return NS_ERROR_ALREADY_OPENED; } } while (false); } while (0); |
3622 | |
3623 | if (aForce) { |
3624 | StoreThirdPartyFlags(LoadThirdPartyFlags() | |
3625 | nsIHttpChannelInternal::THIRD_PARTY_FORCE_ALLOW); |
3626 | } else { |
3627 | StoreThirdPartyFlags(LoadThirdPartyFlags() & |
3628 | ~nsIHttpChannelInternal::THIRD_PARTY_FORCE_ALLOW); |
3629 | } |
3630 | |
3631 | return NS_OK; |
3632 | } |
3633 | |
3634 | NS_IMETHODIMPnsresult |
3635 | HttpBaseChannel::GetCanceled(bool* aCanceled) { |
3636 | *aCanceled = mCanceled; |
3637 | return NS_OK; |
3638 | } |
3639 | |
3640 | NS_IMETHODIMPnsresult |
3641 | HttpBaseChannel::GetChannelIsForDownload(bool* aChannelIsForDownload) { |
3642 | *aChannelIsForDownload = LoadChannelIsForDownload(); |
3643 | return NS_OK; |
3644 | } |
3645 | |
3646 | NS_IMETHODIMPnsresult |
3647 | HttpBaseChannel::SetChannelIsForDownload(bool aChannelIsForDownload) { |
3648 | StoreChannelIsForDownload(aChannelIsForDownload); |
3649 | return NS_OK; |
3650 | } |
3651 | |
3652 | NS_IMETHODIMPnsresult |
3653 | HttpBaseChannel::SetCacheKeysRedirectChain(nsTArray<nsCString>* cacheKeys) { |
3654 | auto RedirectedCachekeys = mRedirectedCachekeys.Lock(); |
3655 | auto& ref = RedirectedCachekeys.ref(); |
3656 | ref = WrapUnique(cacheKeys); |
3657 | return NS_OK; |
3658 | } |
3659 | |
3660 | NS_IMETHODIMPnsresult |
3661 | HttpBaseChannel::GetLocalAddress(nsACString& addr) { |
3662 | if (mSelfAddr.raw.family == PR_AF_UNSPEC0) return NS_ERROR_NOT_AVAILABLE; |
3663 | |
3664 | addr.SetLength(kIPv6CStrBufSize); |
3665 | mSelfAddr.ToStringBuffer(addr.BeginWriting(), kIPv6CStrBufSize); |
3666 | addr.SetLength(strlen(addr.BeginReading())); |
3667 | |
3668 | return NS_OK; |
3669 | } |
3670 | |
3671 | NS_IMETHODIMPnsresult |
3672 | HttpBaseChannel::TakeAllSecurityMessages( |
3673 | nsCOMArray<nsISecurityConsoleMessage>& aMessages) { |
3674 | MOZ_ASSERT(NS_IsMainThread())do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3674); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ")"); do { *((volatile int*)__null) = 3674; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3675 | |
3676 | aMessages.Clear(); |
3677 | for (const auto& pair : mSecurityConsoleMessages) { |
3678 | nsresult rv; |
3679 | nsCOMPtr<nsISecurityConsoleMessage> message = |
3680 | do_CreateInstance(NS_SECURITY_CONSOLE_MESSAGE_CONTRACTID"@mozilla.org/securityconsole/message;1", &rv); |
3681 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3681); return rv; } } while (false); |
3682 | |
3683 | message->SetTag(pair.first); |
3684 | message->SetCategory(pair.second); |
3685 | aMessages.AppendElement(message); |
3686 | } |
3687 | |
3688 | MOZ_ASSERT(mSecurityConsoleMessages.Length() == aMessages.Length())do { static_assert( mozilla::detail::AssertionConditionType< decltype(mSecurityConsoleMessages.Length() == aMessages.Length ())>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(mSecurityConsoleMessages.Length() == aMessages.Length ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("mSecurityConsoleMessages.Length() == aMessages.Length()", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3688); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mSecurityConsoleMessages.Length() == aMessages.Length()" ")"); do { *((volatile int*)__null) = 3688; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3689 | mSecurityConsoleMessages.Clear(); |
3690 | |
3691 | return NS_OK; |
3692 | } |
3693 | |
3694 | /* Please use this method with care. This can cause the message |
3695 | * queue to grow large and cause the channel to take up a lot |
3696 | * of memory. Use only static string messages and do not add |
3697 | * server side data to the queue, as that can be large. |
3698 | * Add only a limited number of messages to the queue to keep |
3699 | * the channel size down and do so only in rare erroneous situations. |
3700 | * More information can be found here: |
3701 | * https://bugzilla.mozilla.org/show_bug.cgi?id=846918 |
3702 | */ |
3703 | nsresult HttpBaseChannel::AddSecurityMessage( |
3704 | const nsAString& aMessageTag, const nsAString& aMessageCategory) { |
3705 | MOZ_ASSERT(NS_IsMainThread())do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3705); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ")"); do { *((volatile int*)__null) = 3705; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
3706 | |
3707 | nsresult rv; |
3708 | |
3709 | // nsSecurityConsoleMessage is not thread-safe refcounted. |
3710 | // Delay the object construction until requested. |
3711 | // See TakeAllSecurityMessages() |
3712 | std::pair<nsString, nsString> pair(aMessageTag, aMessageCategory); |
3713 | mSecurityConsoleMessages.AppendElement(std::move(pair)); |
3714 | |
3715 | nsCOMPtr<nsIConsoleService> console( |
3716 | do_GetService(NS_CONSOLESERVICE_CONTRACTID"@mozilla.org/consoleservice;1")); |
3717 | if (!console) { |
3718 | return NS_ERROR_FAILURE; |
3719 | } |
3720 | |
3721 | nsCOMPtr<nsILoadInfo> loadInfo = LoadInfo(); |
3722 | |
3723 | auto innerWindowID = loadInfo->GetInnerWindowID(); |
3724 | |
3725 | nsAutoString errorText; |
3726 | rv = nsContentUtils::GetLocalizedString( |
3727 | nsContentUtils::eSECURITY_PROPERTIES, |
3728 | NS_ConvertUTF16toUTF8(aMessageTag).get(), errorText); |
3729 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3729); return rv; } } while (false); |
3730 | |
3731 | nsCOMPtr<nsIScriptError> error(do_CreateInstance(NS_SCRIPTERROR_CONTRACTID"@mozilla.org/scripterror;1")); |
3732 | error->InitWithSourceURI(errorText, mURI, 0, 0, nsIScriptError::warningFlag, |
3733 | NS_ConvertUTF16toUTF8(aMessageCategory), |
3734 | innerWindowID); |
3735 | |
3736 | console->LogMessage(error); |
3737 | |
3738 | return NS_OK; |
3739 | } |
3740 | |
3741 | NS_IMETHODIMPnsresult |
3742 | HttpBaseChannel::GetLocalPort(int32_t* port) { |
3743 | NS_ENSURE_ARG_POINTER(port)do { if ((__builtin_expect(!!(!(port)), 0))) { NS_DebugBreak( NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "port" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3743); return NS_ERROR_INVALID_POINTER; } } while (false); |
3744 | |
3745 | if (mSelfAddr.raw.family == PR_AF_INET2) { |
3746 | *port = (int32_t)ntohs(mSelfAddr.inet.port)__bswap_16 (mSelfAddr.inet.port); |
3747 | } else if (mSelfAddr.raw.family == PR_AF_INET610) { |
3748 | *port = (int32_t)ntohs(mSelfAddr.inet6.port)__bswap_16 (mSelfAddr.inet6.port); |
3749 | } else { |
3750 | return NS_ERROR_NOT_AVAILABLE; |
3751 | } |
3752 | |
3753 | return NS_OK; |
3754 | } |
3755 | |
3756 | NS_IMETHODIMPnsresult |
3757 | HttpBaseChannel::GetRemoteAddress(nsACString& addr) { |
3758 | if (mPeerAddr.raw.family == PR_AF_UNSPEC0) return NS_ERROR_NOT_AVAILABLE; |
3759 | |
3760 | addr.SetLength(kIPv6CStrBufSize); |
3761 | mPeerAddr.ToStringBuffer(addr.BeginWriting(), kIPv6CStrBufSize); |
3762 | addr.SetLength(strlen(addr.BeginReading())); |
3763 | |
3764 | return NS_OK; |
3765 | } |
3766 | |
3767 | NS_IMETHODIMPnsresult |
3768 | HttpBaseChannel::GetRemotePort(int32_t* port) { |
3769 | NS_ENSURE_ARG_POINTER(port)do { if ((__builtin_expect(!!(!(port)), 0))) { NS_DebugBreak( NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "port" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3769); return NS_ERROR_INVALID_POINTER; } } while (false); |
3770 | |
3771 | if (mPeerAddr.raw.family == PR_AF_INET2) { |
3772 | *port = (int32_t)ntohs(mPeerAddr.inet.port)__bswap_16 (mPeerAddr.inet.port); |
3773 | } else if (mPeerAddr.raw.family == PR_AF_INET610) { |
3774 | *port = (int32_t)ntohs(mPeerAddr.inet6.port)__bswap_16 (mPeerAddr.inet6.port); |
3775 | } else { |
3776 | return NS_ERROR_NOT_AVAILABLE; |
3777 | } |
3778 | |
3779 | return NS_OK; |
3780 | } |
3781 | |
3782 | NS_IMETHODIMPnsresult |
3783 | HttpBaseChannel::HTTPUpgrade(const nsACString& aProtocolName, |
3784 | nsIHttpUpgradeListener* aListener) { |
3785 | NS_ENSURE_ARG(!aProtocolName.IsEmpty())do { if ((__builtin_expect(!!(!(!aProtocolName.IsEmpty())), 0 ))) { NS_DebugBreak(NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!aProtocolName.IsEmpty()" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3785); return NS_ERROR_INVALID_ARG; } } while (false); |
3786 | NS_ENSURE_ARG_POINTER(aListener)do { if ((__builtin_expect(!!(!(aListener)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aListener" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3786); return NS_ERROR_INVALID_POINTER; } } while (false); |
3787 | |
3788 | mUpgradeProtocol = aProtocolName; |
3789 | mUpgradeProtocolCallback = aListener; |
3790 | return NS_OK; |
3791 | } |
3792 | |
3793 | NS_IMETHODIMPnsresult |
3794 | HttpBaseChannel::GetOnlyConnect(bool* aOnlyConnect) { |
3795 | NS_ENSURE_ARG_POINTER(aOnlyConnect)do { if ((__builtin_expect(!!(!(aOnlyConnect)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aOnlyConnect" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3795); return NS_ERROR_INVALID_POINTER; } } while (false); |
3796 | |
3797 | *aOnlyConnect = mCaps & NS_HTTP_CONNECT_ONLY(1 << 16); |
3798 | return NS_OK; |
3799 | } |
3800 | |
3801 | NS_IMETHODIMPnsresult |
3802 | HttpBaseChannel::SetConnectOnly(bool aTlsTunnel) { |
3803 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3803); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3803, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3803); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3803); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 3803; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
3804 | |
3805 | if (!mUpgradeProtocolCallback) { |
3806 | return NS_ERROR_FAILURE; |
3807 | } |
3808 | |
3809 | mCaps |= NS_HTTP_CONNECT_ONLY(1 << 16); |
3810 | if (aTlsTunnel) { |
3811 | mCaps |= NS_HTTP_TLS_TUNNEL(1 << 29); |
3812 | } |
3813 | mProxyResolveFlags = nsIProtocolProxyService::RESOLVE_PREFER_HTTPS_PROXY | |
3814 | nsIProtocolProxyService::RESOLVE_ALWAYS_TUNNEL; |
3815 | return SetLoadFlags(nsIRequest::INHIBIT_CACHING | nsIChannel::LOAD_ANONYMOUS | |
3816 | nsIRequest::LOAD_BYPASS_CACHE | |
3817 | nsIChannel::LOAD_BYPASS_SERVICE_WORKER); |
3818 | } |
3819 | |
3820 | NS_IMETHODIMPnsresult |
3821 | HttpBaseChannel::GetAllowSpdy(bool* aAllowSpdy) { |
3822 | NS_ENSURE_ARG_POINTER(aAllowSpdy)do { if ((__builtin_expect(!!(!(aAllowSpdy)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aAllowSpdy" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3822); return NS_ERROR_INVALID_POINTER; } } while (false); |
3823 | |
3824 | *aAllowSpdy = LoadAllowSpdy(); |
3825 | return NS_OK; |
3826 | } |
3827 | |
3828 | NS_IMETHODIMPnsresult |
3829 | HttpBaseChannel::SetAllowSpdy(bool aAllowSpdy) { |
3830 | StoreAllowSpdy(aAllowSpdy); |
3831 | return NS_OK; |
3832 | } |
3833 | |
3834 | NS_IMETHODIMPnsresult |
3835 | HttpBaseChannel::GetAllowHttp3(bool* aAllowHttp3) { |
3836 | NS_ENSURE_ARG_POINTER(aAllowHttp3)do { if ((__builtin_expect(!!(!(aAllowHttp3)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aAllowHttp3" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3836); return NS_ERROR_INVALID_POINTER; } } while (false); |
3837 | |
3838 | *aAllowHttp3 = LoadAllowHttp3(); |
3839 | return NS_OK; |
3840 | } |
3841 | |
3842 | NS_IMETHODIMPnsresult |
3843 | HttpBaseChannel::SetAllowHttp3(bool aAllowHttp3) { |
3844 | StoreAllowHttp3(aAllowHttp3); |
3845 | return NS_OK; |
3846 | } |
3847 | |
3848 | NS_IMETHODIMPnsresult |
3849 | HttpBaseChannel::GetAllowAltSvc(bool* aAllowAltSvc) { |
3850 | NS_ENSURE_ARG_POINTER(aAllowAltSvc)do { if ((__builtin_expect(!!(!(aAllowAltSvc)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aAllowAltSvc" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3850); return NS_ERROR_INVALID_POINTER; } } while (false); |
3851 | |
3852 | *aAllowAltSvc = LoadAllowAltSvc(); |
3853 | return NS_OK; |
3854 | } |
3855 | |
3856 | NS_IMETHODIMPnsresult |
3857 | HttpBaseChannel::SetAllowAltSvc(bool aAllowAltSvc) { |
3858 | StoreAllowAltSvc(aAllowAltSvc); |
3859 | return NS_OK; |
3860 | } |
3861 | |
3862 | NS_IMETHODIMPnsresult |
3863 | HttpBaseChannel::GetBeConservative(bool* aBeConservative) { |
3864 | NS_ENSURE_ARG_POINTER(aBeConservative)do { if ((__builtin_expect(!!(!(aBeConservative)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aBeConservative" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3864); return NS_ERROR_INVALID_POINTER; } } while (false); |
3865 | |
3866 | *aBeConservative = LoadBeConservative(); |
3867 | return NS_OK; |
3868 | } |
3869 | |
3870 | NS_IMETHODIMPnsresult |
3871 | HttpBaseChannel::SetBeConservative(bool aBeConservative) { |
3872 | StoreBeConservative(aBeConservative); |
3873 | return NS_OK; |
3874 | } |
3875 | |
3876 | bool HttpBaseChannel::BypassProxy() { |
3877 | return StaticPrefs::network_proxy_allow_bypass() && LoadBypassProxy(); |
3878 | } |
3879 | |
3880 | NS_IMETHODIMPnsresult |
3881 | HttpBaseChannel::GetBypassProxy(bool* aBypassProxy) { |
3882 | NS_ENSURE_ARG_POINTER(aBypassProxy)do { if ((__builtin_expect(!!(!(aBypassProxy)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aBypassProxy" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3882); return NS_ERROR_INVALID_POINTER; } } while (false); |
3883 | |
3884 | *aBypassProxy = BypassProxy(); |
3885 | return NS_OK; |
3886 | } |
3887 | |
3888 | NS_IMETHODIMPnsresult |
3889 | HttpBaseChannel::SetBypassProxy(bool aBypassProxy) { |
3890 | if (StaticPrefs::network_proxy_allow_bypass()) { |
3891 | StoreBypassProxy(aBypassProxy); |
3892 | } else { |
3893 | NS_WARNING("bypassProxy set but network.proxy.allow_bypass is disabled")NS_DebugBreak(NS_DEBUG_WARNING, "bypassProxy set but network.proxy.allow_bypass is disabled" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3893); |
3894 | return NS_ERROR_FAILURE; |
3895 | } |
3896 | return NS_OK; |
3897 | } |
3898 | |
3899 | NS_IMETHODIMPnsresult |
3900 | HttpBaseChannel::GetIsTRRServiceChannel(bool* aIsTRRServiceChannel) { |
3901 | NS_ENSURE_ARG_POINTER(aIsTRRServiceChannel)do { if ((__builtin_expect(!!(!(aIsTRRServiceChannel)), 0))) { NS_DebugBreak(NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aIsTRRServiceChannel" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3901); return NS_ERROR_INVALID_POINTER; } } while (false); |
3902 | |
3903 | *aIsTRRServiceChannel = LoadIsTRRServiceChannel(); |
3904 | return NS_OK; |
3905 | } |
3906 | |
3907 | NS_IMETHODIMPnsresult |
3908 | HttpBaseChannel::SetIsTRRServiceChannel(bool aIsTRRServiceChannel) { |
3909 | StoreIsTRRServiceChannel(aIsTRRServiceChannel); |
3910 | return NS_OK; |
3911 | } |
3912 | |
3913 | NS_IMETHODIMPnsresult |
3914 | HttpBaseChannel::GetIsResolvedByTRR(bool* aResolvedByTRR) { |
3915 | NS_ENSURE_ARG_POINTER(aResolvedByTRR)do { if ((__builtin_expect(!!(!(aResolvedByTRR)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aResolvedByTRR" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3915); return NS_ERROR_INVALID_POINTER; } } while (false); |
3916 | *aResolvedByTRR = LoadResolvedByTRR(); |
3917 | return NS_OK; |
3918 | } |
3919 | |
3920 | NS_IMETHODIMPnsresult |
3921 | HttpBaseChannel::GetEffectiveTRRMode(nsIRequest::TRRMode* aEffectiveTRRMode) { |
3922 | *aEffectiveTRRMode = mEffectiveTRRMode; |
3923 | return NS_OK; |
3924 | } |
3925 | |
3926 | NS_IMETHODIMPnsresult |
3927 | HttpBaseChannel::GetTrrSkipReason(nsITRRSkipReason::value* aTrrSkipReason) { |
3928 | *aTrrSkipReason = mTRRSkipReason; |
3929 | return NS_OK; |
3930 | } |
3931 | |
3932 | NS_IMETHODIMPnsresult |
3933 | HttpBaseChannel::GetIsLoadedBySocketProcess(bool* aResult) { |
3934 | NS_ENSURE_ARG_POINTER(aResult)do { if ((__builtin_expect(!!(!(aResult)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aResult" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3934); return NS_ERROR_INVALID_POINTER; } } while (false); |
3935 | *aResult = LoadLoadedBySocketProcess(); |
3936 | return NS_OK; |
3937 | } |
3938 | |
3939 | NS_IMETHODIMPnsresult |
3940 | HttpBaseChannel::GetTlsFlags(uint32_t* aTlsFlags) { |
3941 | NS_ENSURE_ARG_POINTER(aTlsFlags)do { if ((__builtin_expect(!!(!(aTlsFlags)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aTlsFlags" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3941); return NS_ERROR_INVALID_POINTER; } } while (false); |
3942 | |
3943 | *aTlsFlags = mTlsFlags; |
3944 | return NS_OK; |
3945 | } |
3946 | |
3947 | NS_IMETHODIMPnsresult |
3948 | HttpBaseChannel::SetTlsFlags(uint32_t aTlsFlags) { |
3949 | mTlsFlags = aTlsFlags; |
3950 | return NS_OK; |
3951 | } |
3952 | |
3953 | NS_IMETHODIMPnsresult |
3954 | HttpBaseChannel::GetApiRedirectToURI(nsIURI** aResult) { |
3955 | if (!mAPIRedirectTo) { |
3956 | return NS_ERROR_NOT_AVAILABLE; |
3957 | } |
3958 | NS_ENSURE_ARG_POINTER(aResult)do { if ((__builtin_expect(!!(!(aResult)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aResult" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3958); return NS_ERROR_INVALID_POINTER; } } while (false); |
3959 | *aResult = do_AddRef(mAPIRedirectTo->first()).take(); |
3960 | return NS_OK; |
3961 | } |
3962 | |
3963 | NS_IMETHODIMPnsresult |
3964 | HttpBaseChannel::GetResponseTimeoutEnabled(bool* aEnable) { |
3965 | if (NS_WARN_IF(!aEnable)NS_warn_if_impl(!aEnable, "!aEnable", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3965)) { |
3966 | return NS_ERROR_NULL_POINTER; |
3967 | } |
3968 | *aEnable = LoadResponseTimeoutEnabled(); |
3969 | return NS_OK; |
3970 | } |
3971 | |
3972 | NS_IMETHODIMPnsresult |
3973 | HttpBaseChannel::SetResponseTimeoutEnabled(bool aEnable) { |
3974 | StoreResponseTimeoutEnabled(aEnable); |
3975 | return NS_OK; |
3976 | } |
3977 | |
3978 | NS_IMETHODIMPnsresult |
3979 | HttpBaseChannel::GetInitialRwin(uint32_t* aRwin) { |
3980 | if (NS_WARN_IF(!aRwin)NS_warn_if_impl(!aRwin, "!aRwin", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3980)) { |
3981 | return NS_ERROR_NULL_POINTER; |
3982 | } |
3983 | *aRwin = mInitialRwin; |
3984 | return NS_OK; |
3985 | } |
3986 | |
3987 | NS_IMETHODIMPnsresult |
3988 | HttpBaseChannel::SetInitialRwin(uint32_t aRwin) { |
3989 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3989); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3989, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3989); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 3989); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 3989; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
3990 | mInitialRwin = aRwin; |
3991 | return NS_OK; |
3992 | } |
3993 | |
3994 | NS_IMETHODIMPnsresult |
3995 | HttpBaseChannel::ForcePending(bool aForcePending) { |
3996 | StoreForcePending(aForcePending); |
3997 | return NS_OK; |
3998 | } |
3999 | |
4000 | NS_IMETHODIMPnsresult |
4001 | HttpBaseChannel::GetLastModifiedTime(PRTime* lastModifiedTime) { |
4002 | if (!mResponseHead) return NS_ERROR_NOT_AVAILABLE; |
4003 | uint32_t lastMod; |
4004 | nsresult rv = mResponseHead->GetLastModifiedValue(&lastMod); |
4005 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4005); return rv; } } while (false); |
4006 | *lastModifiedTime = lastMod; |
4007 | return NS_OK; |
4008 | } |
4009 | |
4010 | NS_IMETHODIMPnsresult |
4011 | HttpBaseChannel::GetCorsIncludeCredentials(bool* aInclude) { |
4012 | *aInclude = LoadCorsIncludeCredentials(); |
4013 | return NS_OK; |
4014 | } |
4015 | |
4016 | NS_IMETHODIMPnsresult |
4017 | HttpBaseChannel::SetCorsIncludeCredentials(bool aInclude) { |
4018 | StoreCorsIncludeCredentials(aInclude); |
4019 | return NS_OK; |
4020 | } |
4021 | |
4022 | NS_IMETHODIMPnsresult |
4023 | HttpBaseChannel::GetRequestMode(RequestMode* aMode) { |
4024 | *aMode = mRequestMode; |
4025 | return NS_OK; |
4026 | } |
4027 | |
4028 | NS_IMETHODIMPnsresult |
4029 | HttpBaseChannel::SetRequestMode(RequestMode aMode) { |
4030 | mRequestMode = aMode; |
4031 | return NS_OK; |
4032 | } |
4033 | |
4034 | NS_IMETHODIMPnsresult |
4035 | HttpBaseChannel::GetRedirectMode(uint32_t* aMode) { |
4036 | *aMode = mRedirectMode; |
4037 | return NS_OK; |
4038 | } |
4039 | |
4040 | NS_IMETHODIMPnsresult |
4041 | HttpBaseChannel::SetRedirectMode(uint32_t aMode) { |
4042 | mRedirectMode = aMode; |
4043 | return NS_OK; |
4044 | } |
4045 | |
4046 | namespace { |
4047 | |
4048 | bool ContainsAllFlags(uint32_t aLoadFlags, uint32_t aMask) { |
4049 | return (aLoadFlags & aMask) == aMask; |
4050 | } |
4051 | |
4052 | } // anonymous namespace |
4053 | |
4054 | NS_IMETHODIMPnsresult |
4055 | HttpBaseChannel::GetFetchCacheMode(uint32_t* aFetchCacheMode) { |
4056 | NS_ENSURE_ARG_POINTER(aFetchCacheMode)do { if ((__builtin_expect(!!(!(aFetchCacheMode)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aFetchCacheMode" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4056); return NS_ERROR_INVALID_POINTER; } } while (false); |
4057 | |
4058 | // Otherwise try to guess an appropriate cache mode from the load flags. |
4059 | if (ContainsAllFlags(mLoadFlags, INHIBIT_CACHING | LOAD_BYPASS_CACHE)) { |
4060 | *aFetchCacheMode = nsIHttpChannelInternal::FETCH_CACHE_MODE_NO_STORE; |
4061 | } else if (ContainsAllFlags(mLoadFlags, LOAD_BYPASS_CACHE)) { |
4062 | *aFetchCacheMode = nsIHttpChannelInternal::FETCH_CACHE_MODE_RELOAD; |
4063 | } else if (ContainsAllFlags(mLoadFlags, VALIDATE_ALWAYS) || |
4064 | LoadForceValidateCacheContent()) { |
4065 | *aFetchCacheMode = nsIHttpChannelInternal::FETCH_CACHE_MODE_NO_CACHE; |
4066 | } else if (ContainsAllFlags( |
4067 | mLoadFlags, |
4068 | VALIDATE_NEVER | nsICachingChannel::LOAD_ONLY_FROM_CACHE)) { |
4069 | *aFetchCacheMode = nsIHttpChannelInternal::FETCH_CACHE_MODE_ONLY_IF_CACHED; |
4070 | } else if (ContainsAllFlags(mLoadFlags, VALIDATE_NEVER)) { |
4071 | *aFetchCacheMode = nsIHttpChannelInternal::FETCH_CACHE_MODE_FORCE_CACHE; |
4072 | } else { |
4073 | *aFetchCacheMode = nsIHttpChannelInternal::FETCH_CACHE_MODE_DEFAULT; |
4074 | } |
4075 | |
4076 | return NS_OK; |
4077 | } |
4078 | |
4079 | namespace { |
4080 | |
4081 | void SetCacheFlags(uint32_t& aLoadFlags, uint32_t aFlags) { |
4082 | // First, clear any possible cache related flags. |
4083 | uint32_t allPossibleFlags = |
4084 | nsIRequest::INHIBIT_CACHING | nsIRequest::LOAD_BYPASS_CACHE | |
4085 | nsIRequest::VALIDATE_ALWAYS | nsIRequest::LOAD_FROM_CACHE | |
4086 | nsICachingChannel::LOAD_ONLY_FROM_CACHE; |
4087 | aLoadFlags &= ~allPossibleFlags; |
4088 | |
4089 | // Then set the new flags. |
4090 | aLoadFlags |= aFlags; |
4091 | } |
4092 | |
4093 | } // anonymous namespace |
4094 | |
4095 | NS_IMETHODIMPnsresult |
4096 | HttpBaseChannel::SetFetchCacheMode(uint32_t aFetchCacheMode) { |
4097 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4097); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4097, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4097); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4097); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 4097; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
4098 | |
4099 | // Now, set the load flags that implement each cache mode. |
4100 | switch (aFetchCacheMode) { |
4101 | case nsIHttpChannelInternal::FETCH_CACHE_MODE_DEFAULT: |
4102 | // The "default" mode means to use the http cache normally and |
4103 | // respect any http cache-control headers. We effectively want |
4104 | // to clear our cache related load flags. |
4105 | SetCacheFlags(mLoadFlags, 0); |
4106 | break; |
4107 | case nsIHttpChannelInternal::FETCH_CACHE_MODE_NO_STORE: |
4108 | // no-store means don't consult the cache on the way to the network, and |
4109 | // don't store the response in the cache even if it's cacheable. |
4110 | SetCacheFlags(mLoadFlags, INHIBIT_CACHING | LOAD_BYPASS_CACHE); |
4111 | break; |
4112 | case nsIHttpChannelInternal::FETCH_CACHE_MODE_RELOAD: |
4113 | // reload means don't consult the cache on the way to the network, but |
4114 | // do store the response in the cache if possible. |
4115 | SetCacheFlags(mLoadFlags, LOAD_BYPASS_CACHE); |
4116 | break; |
4117 | case nsIHttpChannelInternal::FETCH_CACHE_MODE_NO_CACHE: |
4118 | // no-cache means always validate what's in the cache. |
4119 | SetCacheFlags(mLoadFlags, VALIDATE_ALWAYS); |
4120 | break; |
4121 | case nsIHttpChannelInternal::FETCH_CACHE_MODE_FORCE_CACHE: |
4122 | // force-cache means don't validate unless if the response would vary. |
4123 | SetCacheFlags(mLoadFlags, VALIDATE_NEVER); |
4124 | break; |
4125 | case nsIHttpChannelInternal::FETCH_CACHE_MODE_ONLY_IF_CACHED: |
4126 | // only-if-cached means only from cache, no network, no validation, |
4127 | // generate a network error if the document was't in the cache. The |
4128 | // privacy implications of these flags (making it fast/easy to check if |
4129 | // the user has things in their cache without any network traffic side |
4130 | // effects) are addressed in the Request constructor which |
4131 | // enforces/requires same-origin request mode. |
4132 | SetCacheFlags(mLoadFlags, |
4133 | VALIDATE_NEVER | nsICachingChannel::LOAD_ONLY_FROM_CACHE); |
4134 | break; |
4135 | } |
4136 | |
4137 | #ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED1 |
4138 | uint32_t finalMode = 0; |
4139 | MOZ_ALWAYS_SUCCEEDS(GetFetchCacheMode(&finalMode))do { if ((__builtin_expect(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl (GetFetchCacheMode(&finalMode))), 1)))), 1))) { } else { do { do { } while (false); MOZ_ReportCrash("" "NS_SUCCEEDED(GetFetchCacheMode(&finalMode))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4139); AnnotateMozCrashReason("MOZ_CRASH(" "NS_SUCCEEDED(GetFetchCacheMode(&finalMode))" ")"); do { *((volatile int*)__null) = 4139; __attribute__((nomerge )) ::abort(); } while (false); } while (false); } } while (false ); |
4140 | MOZ_DIAGNOSTIC_ASSERT(finalMode == aFetchCacheMode)do { static_assert( mozilla::detail::AssertionConditionType< decltype(finalMode == aFetchCacheMode)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(finalMode == aFetchCacheMode ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "finalMode == aFetchCacheMode", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4140); AnnotateMozCrashReason("MOZ_DIAGNOSTIC_ASSERT" "(" "finalMode == aFetchCacheMode" ")"); do { *((volatile int*)__null) = 4140; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4141 | #endif // MOZ_DIAGNOSTIC_ASSERT_ENABLED |
4142 | |
4143 | return NS_OK; |
4144 | } |
4145 | |
4146 | NS_IMETHODIMPnsresult |
4147 | HttpBaseChannel::SetIntegrityMetadata(const nsAString& aIntegrityMetadata) { |
4148 | mIntegrityMetadata = aIntegrityMetadata; |
4149 | return NS_OK; |
4150 | } |
4151 | |
4152 | NS_IMETHODIMPnsresult |
4153 | HttpBaseChannel::GetIntegrityMetadata(nsAString& aIntegrityMetadata) { |
4154 | aIntegrityMetadata = mIntegrityMetadata; |
4155 | return NS_OK; |
4156 | } |
4157 | |
4158 | //----------------------------------------------------------------------------- |
4159 | // HttpBaseChannel::nsISupportsPriority |
4160 | //----------------------------------------------------------------------------- |
4161 | |
4162 | NS_IMETHODIMPnsresult |
4163 | HttpBaseChannel::GetPriority(int32_t* value) { |
4164 | *value = mPriority; |
4165 | return NS_OK; |
4166 | } |
4167 | |
4168 | NS_IMETHODIMPnsresult |
4169 | HttpBaseChannel::AdjustPriority(int32_t delta) { |
4170 | return SetPriority(mPriority + delta); |
4171 | } |
4172 | |
4173 | //----------------------------------------------------------------------------- |
4174 | // HttpBaseChannel::nsIResumableChannel |
4175 | //----------------------------------------------------------------------------- |
4176 | |
4177 | NS_IMETHODIMPnsresult |
4178 | HttpBaseChannel::GetEntityID(nsACString& aEntityID) { |
4179 | // Don't return an entity ID for Non-GET requests which require |
4180 | // additional data |
4181 | if (!mRequestHead.IsGet()) { |
4182 | return NS_ERROR_NOT_RESUMABLE; |
4183 | } |
4184 | |
4185 | uint64_t size = UINT64_MAX(18446744073709551615UL); |
4186 | nsAutoCString etag, lastmod; |
4187 | if (mResponseHead) { |
4188 | // Don't return an entity if the server sent the following header: |
4189 | // Accept-Ranges: none |
4190 | // Not sending the Accept-Ranges header means we can still try |
4191 | // sending range requests. |
4192 | nsAutoCString acceptRanges; |
4193 | Unused << mResponseHead->GetHeader(nsHttp::Accept_Ranges, acceptRanges); |
4194 | if (!acceptRanges.IsEmpty() && |
4195 | !nsHttp::FindToken(acceptRanges.get(), "bytes", |
4196 | HTTP_HEADER_VALUE_SEPS" \t" ",")) { |
4197 | return NS_ERROR_NOT_RESUMABLE; |
4198 | } |
4199 | |
4200 | size = mResponseHead->TotalEntitySize(); |
4201 | Unused << mResponseHead->GetHeader(nsHttp::Last_Modified, lastmod); |
4202 | Unused << mResponseHead->GetHeader(nsHttp::ETag, etag); |
4203 | } |
4204 | nsCString entityID; |
4205 | NS_EscapeURL(etag.BeginReading(), etag.Length(), |
4206 | esc_AlwaysCopy | esc_FileBaseName | esc_Forced, entityID); |
4207 | entityID.Append('/'); |
4208 | entityID.AppendInt(int64_t(size)); |
4209 | entityID.Append('/'); |
4210 | entityID.Append(lastmod); |
4211 | // NOTE: Appending lastmod as the last part avoids having to escape it |
4212 | |
4213 | aEntityID = entityID; |
4214 | |
4215 | return NS_OK; |
4216 | } |
4217 | |
4218 | //----------------------------------------------------------------------------- |
4219 | // HttpBaseChannel::nsIConsoleReportCollector |
4220 | //----------------------------------------------------------------------------- |
4221 | |
4222 | void HttpBaseChannel::AddConsoleReport( |
4223 | uint32_t aErrorFlags, const nsACString& aCategory, |
4224 | nsContentUtils::PropertiesFile aPropertiesFile, |
4225 | const nsACString& aSourceFileURI, uint32_t aLineNumber, |
4226 | uint32_t aColumnNumber, const nsACString& aMessageName, |
4227 | const nsTArray<nsString>& aStringParams) { |
4228 | mReportCollector->AddConsoleReport(aErrorFlags, aCategory, aPropertiesFile, |
4229 | aSourceFileURI, aLineNumber, aColumnNumber, |
4230 | aMessageName, aStringParams); |
4231 | |
4232 | // If this channel is already part of a loadGroup, we can flush this console |
4233 | // report immediately. |
4234 | HttpBaseChannel::MaybeFlushConsoleReports(); |
4235 | } |
4236 | |
4237 | void HttpBaseChannel::FlushReportsToConsole(uint64_t aInnerWindowID, |
4238 | ReportAction aAction) { |
4239 | mReportCollector->FlushReportsToConsole(aInnerWindowID, aAction); |
4240 | } |
4241 | |
4242 | void HttpBaseChannel::FlushReportsToConsoleForServiceWorkerScope( |
4243 | const nsACString& aScope, ReportAction aAction) { |
4244 | mReportCollector->FlushReportsToConsoleForServiceWorkerScope(aScope, aAction); |
4245 | } |
4246 | |
4247 | void HttpBaseChannel::FlushConsoleReports(dom::Document* aDocument, |
4248 | ReportAction aAction) { |
4249 | mReportCollector->FlushConsoleReports(aDocument, aAction); |
4250 | } |
4251 | |
4252 | void HttpBaseChannel::FlushConsoleReports(nsILoadGroup* aLoadGroup, |
4253 | ReportAction aAction) { |
4254 | mReportCollector->FlushConsoleReports(aLoadGroup, aAction); |
4255 | } |
4256 | |
4257 | void HttpBaseChannel::FlushConsoleReports( |
4258 | nsIConsoleReportCollector* aCollector) { |
4259 | mReportCollector->FlushConsoleReports(aCollector); |
4260 | } |
4261 | |
4262 | void HttpBaseChannel::StealConsoleReports( |
4263 | nsTArray<net::ConsoleReportCollected>& aReports) { |
4264 | mReportCollector->StealConsoleReports(aReports); |
4265 | } |
4266 | |
4267 | void HttpBaseChannel::ClearConsoleReports() { |
4268 | mReportCollector->ClearConsoleReports(); |
4269 | } |
4270 | |
4271 | bool HttpBaseChannel::IsNavigation() { |
4272 | return LoadForceMainDocumentChannel() || (mLoadFlags & LOAD_DOCUMENT_URI); |
4273 | } |
4274 | |
4275 | bool HttpBaseChannel::BypassServiceWorker() const { |
4276 | return mLoadFlags & LOAD_BYPASS_SERVICE_WORKER; |
4277 | } |
4278 | |
4279 | bool HttpBaseChannel::ShouldIntercept(nsIURI* aURI) { |
4280 | nsCOMPtr<nsINetworkInterceptController> controller; |
4281 | GetCallback(controller); |
4282 | bool shouldIntercept = false; |
4283 | |
4284 | if (!StaticPrefs::dom_serviceWorkers_enabled()) { |
4285 | return false; |
4286 | } |
4287 | |
4288 | // We should never intercept internal redirects. The ServiceWorker code |
4289 | // can trigger interntal redirects as the result of a FetchEvent. If |
4290 | // we re-intercept then an infinite loop can occur. |
4291 | // |
4292 | // Its also important that we do not set the LOAD_BYPASS_SERVICE_WORKER |
4293 | // flag because an internal redirect occurs. Its possible that another |
4294 | // interception should occur after the internal redirect. For example, |
4295 | // if the ServiceWorker chooses not to call respondWith() the channel |
4296 | // will be reset with an internal redirect. If the request is a navigation |
4297 | // and the network then triggers a redirect its possible the new URL |
4298 | // should be intercepted again. |
4299 | // |
4300 | // Note, HSTS upgrade redirects are often treated the same as internal |
4301 | // redirects. In this case, however, we intentionally allow interception |
4302 | // of HSTS upgrade redirects. This matches the expected spec behavior and |
4303 | // does not run the risk of infinite loops as described above. |
4304 | bool internalRedirect = |
4305 | mLastRedirectFlags & nsIChannelEventSink::REDIRECT_INTERNAL; |
4306 | |
4307 | if (controller && mLoadInfo && !BypassServiceWorker() && !internalRedirect) { |
4308 | nsresult rv = controller->ShouldPrepareForIntercept( |
4309 | aURI ? aURI : mURI.get(), this, &shouldIntercept); |
4310 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
4311 | return false; |
4312 | } |
4313 | } |
4314 | return shouldIntercept; |
4315 | } |
4316 | |
4317 | void HttpBaseChannel::AddAsNonTailRequest() { |
4318 | MOZ_ASSERT(NS_IsMainThread())do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4318); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ")"); do { *((volatile int*)__null) = 4318; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4319 | |
4320 | if (EnsureRequestContext()) { |
4321 | LOG((do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::AddAsNonTailRequest this=%p, rc=%p, already added=%d" , this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest ()); } } while (0) |
4322 | "HttpBaseChannel::AddAsNonTailRequest this=%p, rc=%p, already added=%d",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::AddAsNonTailRequest this=%p, rc=%p, already added=%d" , this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest ()); } } while (0) |
4323 | this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest()))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::AddAsNonTailRequest this=%p, rc=%p, already added=%d" , this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest ()); } } while (0); |
4324 | |
4325 | if (!LoadAddedAsNonTailRequest()) { |
4326 | mRequestContext->AddNonTailRequest(); |
4327 | StoreAddedAsNonTailRequest(true); |
4328 | } |
4329 | } |
4330 | } |
4331 | |
4332 | void HttpBaseChannel::RemoveAsNonTailRequest() { |
4333 | MOZ_ASSERT(NS_IsMainThread())do { static_assert( mozilla::detail::AssertionConditionType< decltype(NS_IsMainThread())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(NS_IsMainThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("NS_IsMainThread()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4333); AnnotateMozCrashReason("MOZ_ASSERT" "(" "NS_IsMainThread()" ")"); do { *((volatile int*)__null) = 4333; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4334 | |
4335 | if (mRequestContext) { |
4336 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::RemoveAsNonTailRequest this=%p, rc=%p, already " "added=%d", this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest ()); } } while (0) |
4337 | ("HttpBaseChannel::RemoveAsNonTailRequest this=%p, rc=%p, already "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::RemoveAsNonTailRequest this=%p, rc=%p, already " "added=%d", this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest ()); } } while (0) |
4338 | "added=%d",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::RemoveAsNonTailRequest this=%p, rc=%p, already " "added=%d", this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest ()); } } while (0) |
4339 | this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest()))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::RemoveAsNonTailRequest this=%p, rc=%p, already " "added=%d", this, mRequestContext.get(), (bool)LoadAddedAsNonTailRequest ()); } } while (0); |
4340 | |
4341 | if (LoadAddedAsNonTailRequest()) { |
4342 | mRequestContext->RemoveNonTailRequest(); |
4343 | StoreAddedAsNonTailRequest(false); |
4344 | } |
4345 | } |
4346 | } |
4347 | |
4348 | #ifdef DEBUG1 |
4349 | void HttpBaseChannel::AssertPrivateBrowsingId() { |
4350 | nsCOMPtr<nsILoadContext> loadContext; |
4351 | NS_QueryNotificationCallbacks(this, loadContext); |
4352 | |
4353 | if (!loadContext) { |
4354 | return; |
4355 | } |
4356 | |
4357 | // We skip testing of favicon loading here since it could be triggered by XUL |
4358 | // image which uses SystemPrincipal. The SystemPrincpal doesn't have |
4359 | // mPrivateBrowsingId. |
4360 | if (mLoadInfo->GetLoadingPrincipal() && |
4361 | mLoadInfo->GetLoadingPrincipal()->IsSystemPrincipal() && |
4362 | mLoadInfo->InternalContentPolicyType() == |
4363 | nsIContentPolicy::TYPE_INTERNAL_IMAGE_FAVICON) { |
4364 | return; |
4365 | } |
4366 | |
4367 | OriginAttributes docShellAttrs; |
4368 | loadContext->GetOriginAttributes(docShellAttrs); |
4369 | MOZ_ASSERT(mLoadInfo->GetOriginAttributes().mPrivateBrowsingId ==do { static_assert( mozilla::detail::AssertionConditionType< decltype(mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mLoadInfo->GetOriginAttributes ().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" " (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4372); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" ") (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")"); do { *((volatile int*)__null) = 4372; __attribute__ ((nomerge)) ::abort(); } while (false); } } while (false) |
4370 | docShellAttrs.mPrivateBrowsingId,do { static_assert( mozilla::detail::AssertionConditionType< decltype(mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mLoadInfo->GetOriginAttributes ().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" " (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4372); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" ") (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")"); do { *((volatile int*)__null) = 4372; __attribute__ ((nomerge)) ::abort(); } while (false); } } while (false) |
4371 | "PrivateBrowsingId values are not the same between LoadInfo and "do { static_assert( mozilla::detail::AssertionConditionType< decltype(mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mLoadInfo->GetOriginAttributes ().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" " (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4372); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" ") (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")"); do { *((volatile int*)__null) = 4372; __attribute__ ((nomerge)) ::abort(); } while (false); } } while (false) |
4372 | "LoadContext.")do { static_assert( mozilla::detail::AssertionConditionType< decltype(mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(mLoadInfo->GetOriginAttributes ().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" " (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4372); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mLoadInfo->GetOriginAttributes().mPrivateBrowsingId == docShellAttrs.mPrivateBrowsingId" ") (" "PrivateBrowsingId values are not the same between LoadInfo and " "LoadContext." ")"); do { *((volatile int*)__null) = 4372; __attribute__ ((nomerge)) ::abort(); } while (false); } } while (false); |
4373 | } |
4374 | #endif |
4375 | |
4376 | already_AddRefed<nsILoadInfo> HttpBaseChannel::CloneLoadInfoForRedirect( |
4377 | nsIURI* aNewURI, uint32_t aRedirectFlags) { |
4378 | // make a copy of the loadinfo, append to the redirectchain |
4379 | // this will be set on the newly created channel for the redirect target. |
4380 | nsCOMPtr<nsILoadInfo> newLoadInfo = |
4381 | static_cast<mozilla::net::LoadInfo*>(mLoadInfo.get())->Clone(); |
4382 | |
4383 | ExtContentPolicyType contentPolicyType = |
4384 | mLoadInfo->GetExternalContentPolicyType(); |
4385 | if (contentPolicyType == ExtContentPolicy::TYPE_DOCUMENT || |
4386 | contentPolicyType == ExtContentPolicy::TYPE_SUBDOCUMENT) { |
4387 | // Reset PrincipalToInherit to a null principal. We'll credit the the |
4388 | // redirecting resource's result principal as the new principal's precursor. |
4389 | // This means that a data: URI will end up loading in a process based on the |
4390 | // redirected-from URI. |
4391 | nsCOMPtr<nsIPrincipal> redirectPrincipal; |
4392 | nsContentUtils::GetSecurityManager()->GetChannelResultPrincipal( |
4393 | this, getter_AddRefs(redirectPrincipal)); |
4394 | nsCOMPtr<nsIPrincipal> nullPrincipalToInherit = |
4395 | NullPrincipal::CreateWithInheritedAttributes(redirectPrincipal); |
4396 | newLoadInfo->SetPrincipalToInherit(nullPrincipalToInherit); |
4397 | } |
4398 | |
4399 | bool isTopLevelDoc = newLoadInfo->GetExternalContentPolicyType() == |
4400 | ExtContentPolicy::TYPE_DOCUMENT; |
4401 | |
4402 | if (isTopLevelDoc) { |
4403 | // re-compute the origin attributes of the loadInfo if it's top-level load. |
4404 | nsCOMPtr<nsILoadContext> loadContext; |
4405 | NS_QueryNotificationCallbacks(this, loadContext); |
4406 | OriginAttributes docShellAttrs; |
4407 | if (loadContext) { |
4408 | loadContext->GetOriginAttributes(docShellAttrs); |
4409 | } |
4410 | |
4411 | OriginAttributes attrs = newLoadInfo->GetOriginAttributes(); |
4412 | |
4413 | MOZ_ASSERT(do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mUserContextId == attrs.mUserContextId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mUserContextId == attrs.mUserContextId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mUserContextId == attrs.mUserContextId" " (" "docshell and necko should have the same userContextId attribute." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4415); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mUserContextId == attrs.mUserContextId" ") (" "docshell and necko should have the same userContextId attribute." ")"); do { *((volatile int*)__null) = 4415; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
4414 | docShellAttrs.mUserContextId == attrs.mUserContextId,do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mUserContextId == attrs.mUserContextId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mUserContextId == attrs.mUserContextId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mUserContextId == attrs.mUserContextId" " (" "docshell and necko should have the same userContextId attribute." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4415); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mUserContextId == attrs.mUserContextId" ") (" "docshell and necko should have the same userContextId attribute." ")"); do { *((volatile int*)__null) = 4415; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
4415 | "docshell and necko should have the same userContextId attribute.")do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mUserContextId == attrs.mUserContextId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mUserContextId == attrs.mUserContextId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mUserContextId == attrs.mUserContextId" " (" "docshell and necko should have the same userContextId attribute." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4415); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mUserContextId == attrs.mUserContextId" ") (" "docshell and necko should have the same userContextId attribute." ")"); do { *((volatile int*)__null) = 4415; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4416 | MOZ_ASSERT(do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId" " (" "docshell and necko should have the same privateBrowsingId attribute." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4418); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId" ") (" "docshell and necko should have the same privateBrowsingId attribute." ")"); do { *((volatile int*)__null) = 4418; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
4417 | docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId,do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId" " (" "docshell and necko should have the same privateBrowsingId attribute." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4418); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId" ") (" "docshell and necko should have the same privateBrowsingId attribute." ")"); do { *((volatile int*)__null) = 4418; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
4418 | "docshell and necko should have the same privateBrowsingId attribute.")do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId" " (" "docshell and necko should have the same privateBrowsingId attribute." ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4418); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mPrivateBrowsingId == attrs.mPrivateBrowsingId" ") (" "docshell and necko should have the same privateBrowsingId attribute." ")"); do { *((volatile int*)__null) = 4418; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4419 | MOZ_ASSERT(docShellAttrs.mGeckoViewSessionContextId ==do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" " (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4422); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" ") (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")"); do { *((volatile int*)__null) = 4422; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
4420 | attrs.mGeckoViewSessionContextId,do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" " (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4422); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" ") (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")"); do { *((volatile int*)__null) = 4422; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
4421 | "docshell and necko should have the same "do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" " (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4422); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" ") (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")"); do { *((volatile int*)__null) = 4422; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
4422 | "geckoViewSessionContextId attribute")do { static_assert( mozilla::detail::AssertionConditionType< decltype(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" " (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4422); AnnotateMozCrashReason("MOZ_ASSERT" "(" "docShellAttrs.mGeckoViewSessionContextId == attrs.mGeckoViewSessionContextId" ") (" "docshell and necko should have the same " "geckoViewSessionContextId attribute" ")"); do { *((volatile int*)__null) = 4422; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4423 | |
4424 | attrs = docShellAttrs; |
4425 | attrs.SetFirstPartyDomain(true, aNewURI); |
4426 | newLoadInfo->SetOriginAttributes(attrs); |
4427 | |
4428 | // re-compute the upgrade insecure requests bit for document navigations |
4429 | // since it should only apply to same-origin navigations (redirects). |
4430 | // we only do this if the CSP of the triggering element (the cspToInherit) |
4431 | // uses 'upgrade-insecure-requests', otherwise UIR does not apply. |
4432 | nsCOMPtr<nsIContentSecurityPolicy> csp = newLoadInfo->GetCspToInherit(); |
4433 | if (csp) { |
4434 | bool upgradeInsecureRequests = false; |
4435 | csp->GetUpgradeInsecureRequests(&upgradeInsecureRequests); |
4436 | if (upgradeInsecureRequests) { |
4437 | nsCOMPtr<nsIPrincipal> resultPrincipal = |
4438 | BasePrincipal::CreateContentPrincipal( |
4439 | aNewURI, newLoadInfo->GetOriginAttributes()); |
4440 | bool isConsideredSameOriginforUIR = |
4441 | nsContentSecurityUtils::IsConsideredSameOriginForUIR( |
4442 | newLoadInfo->TriggeringPrincipal(), resultPrincipal); |
4443 | static_cast<mozilla::net::LoadInfo*>(newLoadInfo.get()) |
4444 | ->SetUpgradeInsecureRequests(isConsideredSameOriginforUIR); |
4445 | } |
4446 | } |
4447 | } |
4448 | |
4449 | // Leave empty, we want a 'clean ground' when creating the new channel. |
4450 | // This will be ensured to be either set by the protocol handler or set |
4451 | // to the redirect target URI properly after the channel creation. |
4452 | newLoadInfo->SetResultPrincipalURI(nullptr); |
4453 | |
4454 | bool isInternalRedirect = |
4455 | (aRedirectFlags & (nsIChannelEventSink::REDIRECT_INTERNAL | |
4456 | nsIChannelEventSink::REDIRECT_STS_UPGRADE)); |
4457 | |
4458 | // Reset our sandboxed null principal ID when cloning loadInfo for an |
4459 | // externally visible redirect. |
4460 | if (!isInternalRedirect) { |
4461 | // If we've redirected from http to something that isn't, clear |
4462 | // the "external" flag, as loads that now go to other apps should be |
4463 | // allowed to go ahead and not trip infinite-loop protection |
4464 | // (see bug 1717314 for context). |
4465 | if (!aNewURI->SchemeIs("http") && !aNewURI->SchemeIs("https")) { |
4466 | newLoadInfo->SetLoadTriggeredFromExternal(false); |
4467 | } |
4468 | newLoadInfo->ResetSandboxedNullPrincipalID(); |
4469 | |
4470 | // Reset HTTPS-first and -only status on http redirect. To not unexpectedly |
4471 | // downgrade requests that weren't upgraded via HTTPS-First (Bug 1904238). |
4472 | if (isTopLevelDoc) { |
4473 | Unused << newLoadInfo->SetHttpsOnlyStatus( |
4474 | nsILoadInfo::HTTPS_ONLY_UNINITIALIZED); |
4475 | } |
4476 | } |
4477 | |
4478 | newLoadInfo->AppendRedirectHistoryEntry(this, isInternalRedirect); |
4479 | |
4480 | return newLoadInfo.forget(); |
4481 | } |
4482 | |
4483 | //----------------------------------------------------------------------------- |
4484 | // nsHttpChannel::nsITraceableChannel |
4485 | //----------------------------------------------------------------------------- |
4486 | |
4487 | NS_IMETHODIMPnsresult |
4488 | HttpBaseChannel::SetNewListener(nsIStreamListener* aListener, |
4489 | bool aMustApplyContentConversion, |
4490 | nsIStreamListener** _retval) { |
4491 | LOG((do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetNewListener [this=%p, mListener=%p, newListener=%p]" , this, mListener.get(), aListener); } } while (0) |
4492 | "HttpBaseChannel::SetNewListener [this=%p, mListener=%p, newListener=%p]",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetNewListener [this=%p, mListener=%p, newListener=%p]" , this, mListener.get(), aListener); } } while (0) |
4493 | this, mListener.get(), aListener))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetNewListener [this=%p, mListener=%p, newListener=%p]" , this, mListener.get(), aListener); } } while (0); |
4494 | |
4495 | if (!LoadTracingEnabled()) return NS_ERROR_FAILURE; |
4496 | |
4497 | NS_ENSURE_STATE(mListener)do { if ((__builtin_expect(!!(!(mListener)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "mListener" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4497); return NS_ERROR_UNEXPECTED; } } while (false); |
4498 | NS_ENSURE_ARG_POINTER(aListener)do { if ((__builtin_expect(!!(!(aListener)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aListener" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4498); return NS_ERROR_INVALID_POINTER; } } while (false); |
4499 | |
4500 | nsCOMPtr<nsIStreamListener> wrapper = new nsStreamListenerWrapper(mListener); |
4501 | |
4502 | wrapper.forget(_retval); |
4503 | mListener = aListener; |
4504 | if (aMustApplyContentConversion) { |
4505 | StoreListenerRequiresContentConversion(true); |
4506 | } |
4507 | return NS_OK; |
4508 | } |
4509 | |
4510 | //----------------------------------------------------------------------------- |
4511 | // HttpBaseChannel helpers |
4512 | //----------------------------------------------------------------------------- |
4513 | |
4514 | void HttpBaseChannel::ReleaseListeners() { |
4515 | MOZ_ASSERT(mCurrentThread->IsOnCurrentThread(),do { static_assert( mozilla::detail::AssertionConditionType< decltype(mCurrentThread->IsOnCurrentThread())>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!(mCurrentThread->IsOnCurrentThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mCurrentThread->IsOnCurrentThread()" " (" "Should only be called on the current thread" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4516); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mCurrentThread->IsOnCurrentThread()" ") (" "Should only be called on the current thread" ")"); do { *((volatile int*)__null) = 4516; __attribute__((nomerge)) :: abort(); } while (false); } } while (false) |
4516 | "Should only be called on the current thread")do { static_assert( mozilla::detail::AssertionConditionType< decltype(mCurrentThread->IsOnCurrentThread())>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!(mCurrentThread->IsOnCurrentThread()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("mCurrentThread->IsOnCurrentThread()" " (" "Should only be called on the current thread" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4516); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mCurrentThread->IsOnCurrentThread()" ") (" "Should only be called on the current thread" ")"); do { *((volatile int*)__null) = 4516; __attribute__((nomerge)) :: abort(); } while (false); } } while (false); |
4517 | |
4518 | mListener = nullptr; |
4519 | mCallbacks = nullptr; |
4520 | mProgressSink = nullptr; |
4521 | mCompressListener = nullptr; |
4522 | mORB = nullptr; |
4523 | } |
4524 | |
4525 | void HttpBaseChannel::DoNotifyListener() { |
4526 | LOG(("HttpBaseChannel::DoNotifyListener this=%p", this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::DoNotifyListener this=%p", this); } } while (0); |
4527 | |
4528 | // In case nsHttpChannel::OnStartRequest wasn't called (e.g. due to flag |
4529 | // LOAD_ONLY_IF_MODIFIED) we want to set AfterOnStartRequestBegun to true |
4530 | // before notifying listener. |
4531 | if (!LoadAfterOnStartRequestBegun()) { |
4532 | StoreAfterOnStartRequestBegun(true); |
4533 | } |
4534 | |
4535 | if (mListener && !LoadOnStartRequestCalled()) { |
4536 | nsCOMPtr<nsIStreamListener> listener = mListener; |
4537 | StoreOnStartRequestCalled(true); |
4538 | listener->OnStartRequest(this); |
4539 | } |
4540 | StoreOnStartRequestCalled(true); |
4541 | |
4542 | // Make sure IsPending is set to false. At this moment we are done from |
4543 | // the point of view of our consumer and we have to report our self |
4544 | // as not-pending. |
4545 | StoreIsPending(false); |
4546 | |
4547 | // notify "http-on-before-stop-request" observers |
4548 | gHttpHandler->OnBeforeStopRequest(this); |
4549 | |
4550 | if (mListener && !LoadOnStopRequestCalled()) { |
4551 | nsCOMPtr<nsIStreamListener> listener = mListener; |
4552 | StoreOnStopRequestCalled(true); |
4553 | listener->OnStopRequest(this, mStatus); |
4554 | } |
4555 | StoreOnStopRequestCalled(true); |
4556 | |
4557 | // notify "http-on-stop-request" observers |
4558 | gHttpHandler->OnStopRequest(this); |
4559 | |
4560 | // This channel has finished its job, potentially release any tail-blocked |
4561 | // requests with this. |
4562 | RemoveAsNonTailRequest(); |
4563 | |
4564 | // We have to make sure to drop the references to listeners and callbacks |
4565 | // no longer needed. |
4566 | ReleaseListeners(); |
4567 | |
4568 | DoNotifyListenerCleanup(); |
4569 | |
4570 | // If this is a navigation, then we must let the docshell flush the reports |
4571 | // to the console later. The LoadDocument() is pointing at the detached |
4572 | // document that started the navigation. We want to show the reports on the |
4573 | // new document. Otherwise the console is wiped and the user never sees |
4574 | // the information. |
4575 | if (!IsNavigation()) { |
4576 | if (mLoadGroup) { |
4577 | FlushConsoleReports(mLoadGroup); |
4578 | } else { |
4579 | RefPtr<dom::Document> doc; |
4580 | mLoadInfo->GetLoadingDocument(getter_AddRefs(doc)); |
4581 | FlushConsoleReports(doc); |
4582 | } |
4583 | } |
4584 | } |
4585 | |
4586 | void HttpBaseChannel::AddCookiesToRequest() { |
4587 | if (mLoadFlags & LOAD_ANONYMOUS) { |
4588 | return; |
4589 | } |
4590 | |
4591 | bool useCookieService = (XRE_IsParentProcess()); |
4592 | nsAutoCString cookie; |
4593 | if (useCookieService) { |
4594 | nsICookieService* cs = gHttpHandler->GetCookieService(); |
4595 | if (cs) { |
4596 | cs->GetCookieStringFromHttp(mURI, this, cookie); |
4597 | } |
4598 | |
4599 | if (cookie.IsEmpty()) { |
4600 | cookie = mUserSetCookieHeader; |
4601 | } else if (!mUserSetCookieHeader.IsEmpty()) { |
4602 | cookie.AppendLiteral("; "); |
4603 | cookie.Append(mUserSetCookieHeader); |
4604 | } |
4605 | } else { |
4606 | cookie = mUserSetCookieHeader; |
4607 | } |
4608 | |
4609 | // If we are in the child process, we want the parent seeing any |
4610 | // cookie headers that might have been set by SetRequestHeader() |
4611 | SetRequestHeader(nsHttp::Cookie.val(), cookie, false); |
4612 | } |
4613 | |
4614 | /* static */ |
4615 | void HttpBaseChannel::PropagateReferenceIfNeeded( |
4616 | nsIURI* aURI, nsCOMPtr<nsIURI>& aRedirectURI) { |
4617 | bool hasRef = false; |
4618 | nsresult rv = aRedirectURI->GetHasRef(&hasRef); |
4619 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1))) && !hasRef) { |
4620 | nsAutoCString ref; |
4621 | aURI->GetRef(ref); |
4622 | if (!ref.IsEmpty()) { |
4623 | // NOTE: SetRef will fail if mRedirectURI is immutable |
4624 | // (e.g. an about: URI)... Oh well. |
4625 | Unused << NS_MutateURI(aRedirectURI).SetRef(ref).Finalize(aRedirectURI); |
4626 | } |
4627 | } |
4628 | } |
4629 | |
4630 | bool HttpBaseChannel::ShouldRewriteRedirectToGET( |
4631 | uint32_t httpStatus, nsHttpRequestHead::ParsedMethodType method) { |
4632 | // for 301 and 302, only rewrite POST |
4633 | if (httpStatus == 301 || httpStatus == 302) { |
4634 | return method == nsHttpRequestHead::kMethod_Post; |
4635 | } |
4636 | |
4637 | // rewrite for 303 unless it was HEAD |
4638 | if (httpStatus == 303) return method != nsHttpRequestHead::kMethod_Head; |
4639 | |
4640 | // otherwise, such as for 307, do not rewrite |
4641 | return false; |
4642 | } |
4643 | |
4644 | NS_IMETHODIMPnsresult |
4645 | HttpBaseChannel::ShouldStripRequestBodyHeader(const nsACString& aMethod, |
4646 | bool* aResult) { |
4647 | *aResult = false; |
4648 | uint32_t httpStatus = 0; |
4649 | if (NS_FAILED(GetResponseStatus(&httpStatus))((bool)(__builtin_expect(!!(NS_FAILED_impl(GetResponseStatus( &httpStatus))), 0)))) { |
4650 | return NS_OK; |
4651 | } |
4652 | |
4653 | nsAutoCString method(aMethod); |
4654 | nsHttpRequestHead::ParsedMethodType parsedMethod; |
4655 | nsHttpRequestHead::ParseMethod(method, parsedMethod); |
4656 | // Fetch 4.4.11, which is slightly different than the perserved method |
4657 | // algrorithm: strip request-body-header for GET->GET redirection for 303. |
4658 | *aResult = |
4659 | ShouldRewriteRedirectToGET(httpStatus, parsedMethod) && |
4660 | !(httpStatus == 303 && parsedMethod == nsHttpRequestHead::kMethod_Get); |
4661 | |
4662 | return NS_OK; |
4663 | } |
4664 | |
4665 | HttpBaseChannel::ReplacementChannelConfig |
4666 | HttpBaseChannel::CloneReplacementChannelConfig(bool aPreserveMethod, |
4667 | uint32_t aRedirectFlags, |
4668 | ReplacementReason aReason) { |
4669 | ReplacementChannelConfig config; |
4670 | config.redirectFlags = aRedirectFlags; |
4671 | config.classOfService = mClassOfService; |
4672 | |
4673 | if (mPrivateBrowsingOverriden) { |
4674 | config.privateBrowsing = Some(mPrivateBrowsing); |
4675 | } |
4676 | |
4677 | if (mReferrerInfo) { |
4678 | // When cloning for a document channel replacement (parent process |
4679 | // copying values for a new content process channel), this happens after |
4680 | // OnStartRequest so we have the headers for the response available. |
4681 | // We don't want to apply them to the referrer for the channel though, |
4682 | // since that is the referrer for the current document, and the header |
4683 | // should only apply to navigations from the current document. |
4684 | if (aReason == ReplacementReason::DocumentChannel) { |
4685 | config.referrerInfo = mReferrerInfo; |
4686 | } else { |
4687 | dom::ReferrerPolicy referrerPolicy = dom::ReferrerPolicy::_empty; |
4688 | nsAutoCString tRPHeaderCValue; |
4689 | Unused << GetResponseHeader("referrer-policy"_ns, tRPHeaderCValue); |
4690 | NS_ConvertUTF8toUTF16 tRPHeaderValue(tRPHeaderCValue); |
4691 | |
4692 | if (!tRPHeaderValue.IsEmpty()) { |
4693 | referrerPolicy = |
4694 | dom::ReferrerInfo::ReferrerPolicyFromHeaderString(tRPHeaderValue); |
4695 | } |
4696 | |
4697 | // In case we are here because an upgrade happened through mixed content |
4698 | // upgrading, CSP upgrade-insecure-requests, HTTPS-Only or HTTPS-First, we |
4699 | // have to recalculate the referrer based on the original referrer to |
4700 | // account for the different scheme. This does NOT apply to HSTS. |
4701 | // See Bug 1857894 and order of https://fetch.spec.whatwg.org/#main-fetch. |
4702 | // Otherwise, if we have a new referrer policy, we want to recalculate the |
4703 | // referrer based on the old computed referrer (Bug 1678545). |
4704 | bool wasNonHSTSUpgrade = |
4705 | (aRedirectFlags & nsIChannelEventSink::REDIRECT_STS_UPGRADE) && |
4706 | (!mLoadInfo->GetHstsStatus()); |
4707 | if (wasNonHSTSUpgrade) { |
4708 | nsCOMPtr<nsIURI> referrer = mReferrerInfo->GetOriginalReferrer(); |
4709 | config.referrerInfo = |
4710 | new dom::ReferrerInfo(referrer, mReferrerInfo->ReferrerPolicy(), |
4711 | mReferrerInfo->GetSendReferrer()); |
4712 | } else if (referrerPolicy != dom::ReferrerPolicy::_empty) { |
4713 | nsCOMPtr<nsIURI> referrer = mReferrerInfo->GetComputedReferrer(); |
4714 | config.referrerInfo = new dom::ReferrerInfo( |
4715 | referrer, referrerPolicy, mReferrerInfo->GetSendReferrer()); |
4716 | } else { |
4717 | config.referrerInfo = mReferrerInfo; |
4718 | } |
4719 | } |
4720 | } |
4721 | |
4722 | nsCOMPtr<nsITimedChannel> oldTimedChannel( |
4723 | do_QueryInterface(static_cast<nsIHttpChannel*>(this))); |
4724 | if (oldTimedChannel) { |
4725 | config.timedChannelInfo = Some(dom::TimedChannelInfo()); |
4726 | config.timedChannelInfo->redirectCount() = mRedirectCount; |
4727 | config.timedChannelInfo->internalRedirectCount() = mInternalRedirectCount; |
4728 | config.timedChannelInfo->asyncOpen() = mAsyncOpenTime; |
4729 | config.timedChannelInfo->channelCreation() = mChannelCreationTimestamp; |
4730 | config.timedChannelInfo->redirectStart() = mRedirectStartTimeStamp; |
4731 | config.timedChannelInfo->redirectEnd() = mRedirectEndTimeStamp; |
4732 | config.timedChannelInfo->initiatorType() = mInitiatorType; |
4733 | config.timedChannelInfo->allRedirectsSameOrigin() = |
4734 | LoadAllRedirectsSameOrigin(); |
4735 | config.timedChannelInfo->allRedirectsPassTimingAllowCheck() = |
4736 | LoadAllRedirectsPassTimingAllowCheck(); |
4737 | // Execute the timing allow check to determine whether |
4738 | // to report the redirect timing info |
4739 | nsCOMPtr<nsILoadInfo> loadInfo = LoadInfo(); |
4740 | // TYPE_DOCUMENT loads don't have a loadingPrincipal, so we can't set |
4741 | // AllRedirectsPassTimingAllowCheck on them. |
4742 | if (loadInfo->GetExternalContentPolicyType() != |
4743 | ExtContentPolicy::TYPE_DOCUMENT) { |
4744 | nsCOMPtr<nsIPrincipal> principal = loadInfo->GetLoadingPrincipal(); |
4745 | config.timedChannelInfo->timingAllowCheckForPrincipal() = |
4746 | Some(oldTimedChannel->TimingAllowCheck(principal)); |
4747 | } |
4748 | |
4749 | config.timedChannelInfo->allRedirectsPassTimingAllowCheck() = |
4750 | LoadAllRedirectsPassTimingAllowCheck(); |
4751 | config.timedChannelInfo->launchServiceWorkerStart() = |
4752 | mLaunchServiceWorkerStart; |
4753 | config.timedChannelInfo->launchServiceWorkerEnd() = mLaunchServiceWorkerEnd; |
4754 | config.timedChannelInfo->dispatchFetchEventStart() = |
4755 | mDispatchFetchEventStart; |
4756 | config.timedChannelInfo->dispatchFetchEventEnd() = mDispatchFetchEventEnd; |
4757 | config.timedChannelInfo->handleFetchEventStart() = mHandleFetchEventStart; |
4758 | config.timedChannelInfo->handleFetchEventEnd() = mHandleFetchEventEnd; |
4759 | config.timedChannelInfo->responseStart() = |
4760 | mTransactionTimings.responseStart; |
4761 | config.timedChannelInfo->responseEnd() = mTransactionTimings.responseEnd; |
4762 | } |
4763 | |
4764 | if (aPreserveMethod) { |
4765 | // since preserveMethod is true, we need to ensure that the appropriate |
4766 | // request method gets set on the channel, regardless of whether or not |
4767 | // we set the upload stream above. This means SetRequestMethod() will |
4768 | // be called twice if ExplicitSetUploadStream() gets called above. |
4769 | |
4770 | nsAutoCString method; |
4771 | mRequestHead.Method(method); |
4772 | config.method = Some(method); |
4773 | |
4774 | if (mUploadStream) { |
4775 | // rewind upload stream |
4776 | nsCOMPtr<nsISeekableStream> seekable = do_QueryInterface(mUploadStream); |
4777 | if (seekable) { |
4778 | seekable->Seek(nsISeekableStream::NS_SEEK_SET, 0); |
4779 | } |
4780 | config.uploadStream = mUploadStream; |
4781 | } |
4782 | config.uploadStreamLength = mReqContentLength; |
4783 | config.uploadStreamHasHeaders = LoadUploadStreamHasHeaders(); |
4784 | |
4785 | nsAutoCString contentType; |
4786 | nsresult rv = mRequestHead.GetHeader(nsHttp::Content_Type, contentType); |
4787 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))) { |
4788 | config.contentType = Some(contentType); |
4789 | } |
4790 | |
4791 | nsAutoCString contentLength; |
4792 | rv = mRequestHead.GetHeader(nsHttp::Content_Length, contentLength); |
4793 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))) { |
4794 | config.contentLength = Some(contentLength); |
4795 | } |
4796 | } |
4797 | |
4798 | return config; |
4799 | } |
4800 | |
4801 | /* static */ void HttpBaseChannel::ConfigureReplacementChannel( |
4802 | nsIChannel* newChannel, const ReplacementChannelConfig& config, |
4803 | ReplacementReason aReason) { |
4804 | nsCOMPtr<nsIClassOfService> cos(do_QueryInterface(newChannel)); |
4805 | if (cos) { |
4806 | cos->SetClassOfService(config.classOfService); |
4807 | } |
4808 | |
4809 | // Try to preserve the privacy bit if it has been overridden |
4810 | if (config.privateBrowsing) { |
4811 | nsCOMPtr<nsIPrivateBrowsingChannel> newPBChannel = |
4812 | do_QueryInterface(newChannel); |
4813 | if (newPBChannel) { |
4814 | newPBChannel->SetPrivate(*config.privateBrowsing); |
4815 | } |
4816 | } |
4817 | |
4818 | // Transfer the timing data (if we are dealing with an nsITimedChannel). |
4819 | nsCOMPtr<nsITimedChannel> newTimedChannel(do_QueryInterface(newChannel)); |
4820 | if (config.timedChannelInfo && newTimedChannel) { |
4821 | // If we're an internal redirect, or a document channel replacement, |
4822 | // then we shouldn't record any new timing for this and just copy |
4823 | // over the existing values. |
4824 | bool shouldHideTiming = aReason != ReplacementReason::Redirect; |
4825 | if (shouldHideTiming) { |
4826 | newTimedChannel->SetRedirectCount( |
4827 | config.timedChannelInfo->redirectCount()); |
4828 | int32_t newCount = config.timedChannelInfo->internalRedirectCount() + 1; |
4829 | newTimedChannel->SetInternalRedirectCount(std::max( |
4830 | newCount, static_cast<int32_t>( |
4831 | config.timedChannelInfo->internalRedirectCount()))); |
4832 | } else { |
4833 | int32_t newCount = config.timedChannelInfo->redirectCount() + 1; |
4834 | newTimedChannel->SetRedirectCount(std::max( |
4835 | newCount, |
4836 | static_cast<int32_t>(config.timedChannelInfo->redirectCount()))); |
4837 | newTimedChannel->SetInternalRedirectCount( |
4838 | config.timedChannelInfo->internalRedirectCount()); |
4839 | } |
4840 | |
4841 | if (shouldHideTiming) { |
4842 | if (!config.timedChannelInfo->channelCreation().IsNull()) { |
4843 | newTimedChannel->SetChannelCreation( |
4844 | config.timedChannelInfo->channelCreation()); |
4845 | } |
4846 | |
4847 | if (!config.timedChannelInfo->asyncOpen().IsNull()) { |
4848 | newTimedChannel->SetAsyncOpen(config.timedChannelInfo->asyncOpen()); |
4849 | } |
4850 | } |
4851 | |
4852 | // If the RedirectStart is null, we will use the AsyncOpen value of the |
4853 | // previous channel (this is the first redirect in the redirects chain). |
4854 | if (config.timedChannelInfo->redirectStart().IsNull()) { |
4855 | // Only do this for real redirects. Internal redirects should be hidden. |
4856 | if (!shouldHideTiming) { |
4857 | newTimedChannel->SetRedirectStart(config.timedChannelInfo->asyncOpen()); |
4858 | } |
4859 | } else { |
4860 | newTimedChannel->SetRedirectStart( |
4861 | config.timedChannelInfo->redirectStart()); |
4862 | } |
4863 | |
4864 | // For internal redirects just propagate the last redirect end time |
4865 | // forward. Otherwise the new redirect end time is the last response |
4866 | // end time. |
4867 | TimeStamp newRedirectEnd; |
4868 | if (shouldHideTiming) { |
4869 | newRedirectEnd = config.timedChannelInfo->redirectEnd(); |
4870 | } else if (!config.timedChannelInfo->responseEnd().IsNull()) { |
4871 | newRedirectEnd = config.timedChannelInfo->responseEnd(); |
4872 | } else { |
4873 | newRedirectEnd = TimeStamp::Now(); |
4874 | } |
4875 | newTimedChannel->SetRedirectEnd(newRedirectEnd); |
4876 | |
4877 | newTimedChannel->SetInitiatorType(config.timedChannelInfo->initiatorType()); |
4878 | |
4879 | nsCOMPtr<nsILoadInfo> loadInfo = newChannel->LoadInfo(); |
4880 | MOZ_ASSERT(loadInfo)do { static_assert( mozilla::detail::AssertionConditionType< decltype(loadInfo)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(loadInfo))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("loadInfo", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4880); AnnotateMozCrashReason("MOZ_ASSERT" "(" "loadInfo" ")" ); do { *((volatile int*)__null) = 4880; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4881 | |
4882 | newTimedChannel->SetAllRedirectsSameOrigin( |
4883 | config.timedChannelInfo->allRedirectsSameOrigin()); |
4884 | |
4885 | if (config.timedChannelInfo->timingAllowCheckForPrincipal()) { |
4886 | newTimedChannel->SetAllRedirectsPassTimingAllowCheck( |
4887 | config.timedChannelInfo->allRedirectsPassTimingAllowCheck() && |
4888 | *config.timedChannelInfo->timingAllowCheckForPrincipal()); |
4889 | } |
4890 | |
4891 | // Propagate service worker measurements across redirects. The |
4892 | // PeformanceResourceTiming.workerStart API expects to see the |
4893 | // worker start time after a redirect. |
4894 | newTimedChannel->SetLaunchServiceWorkerStart( |
4895 | config.timedChannelInfo->launchServiceWorkerStart()); |
4896 | newTimedChannel->SetLaunchServiceWorkerEnd( |
4897 | config.timedChannelInfo->launchServiceWorkerEnd()); |
4898 | newTimedChannel->SetDispatchFetchEventStart( |
4899 | config.timedChannelInfo->dispatchFetchEventStart()); |
4900 | newTimedChannel->SetDispatchFetchEventEnd( |
4901 | config.timedChannelInfo->dispatchFetchEventEnd()); |
4902 | newTimedChannel->SetHandleFetchEventStart( |
4903 | config.timedChannelInfo->handleFetchEventStart()); |
4904 | newTimedChannel->SetHandleFetchEventEnd( |
4905 | config.timedChannelInfo->handleFetchEventEnd()); |
4906 | } |
4907 | |
4908 | nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(newChannel); |
4909 | if (!httpChannel) { |
4910 | return; // no other options to set |
4911 | } |
4912 | |
4913 | if (config.uploadStream) { |
4914 | nsCOMPtr<nsIUploadChannel> uploadChannel = do_QueryInterface(httpChannel); |
4915 | nsCOMPtr<nsIUploadChannel2> uploadChannel2 = do_QueryInterface(httpChannel); |
4916 | if (uploadChannel2 || uploadChannel) { |
4917 | // replicate original call to SetUploadStream... |
4918 | if (uploadChannel2) { |
4919 | const nsACString& ctype = |
4920 | config.contentType ? *config.contentType : VoidCString(); |
4921 | // If header is not present mRequestHead.HasHeaderValue will truncated |
4922 | // it. But we want to end up with a void string, not an empty string, |
4923 | // because ExplicitSetUploadStream treats the former as "no header" and |
4924 | // the latter as "header with empty string value". |
4925 | |
4926 | const nsACString& method = |
4927 | config.method ? *config.method : VoidCString(); |
4928 | |
4929 | uploadChannel2->ExplicitSetUploadStream( |
4930 | config.uploadStream, ctype, config.uploadStreamLength, method, |
4931 | config.uploadStreamHasHeaders); |
4932 | } else { |
4933 | if (config.uploadStreamHasHeaders) { |
4934 | uploadChannel->SetUploadStream(config.uploadStream, ""_ns, |
4935 | config.uploadStreamLength); |
4936 | } else { |
4937 | nsAutoCString ctype; |
4938 | if (config.contentType) { |
4939 | ctype = *config.contentType; |
4940 | } else { |
4941 | ctype = "application/octet-stream"_ns; |
4942 | } |
4943 | if (config.contentLength && !config.contentLength->IsEmpty()) { |
4944 | uploadChannel->SetUploadStream( |
4945 | config.uploadStream, ctype, |
4946 | nsCRT::atoll(config.contentLength->get())); |
4947 | } |
4948 | } |
4949 | } |
4950 | } |
4951 | } |
4952 | |
4953 | if (config.referrerInfo) { |
4954 | DebugOnly<nsresult> success{}; |
4955 | success = httpChannel->SetReferrerInfo(config.referrerInfo); |
4956 | MOZ_ASSERT(NS_SUCCEEDED(success))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(success) ), 1))))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(success) ), 1)))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(success)), 1)))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4956); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(success)), 1)))" ")"); do { *((volatile int*)__null) = 4956; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4957 | } |
4958 | |
4959 | if (config.method) { |
4960 | DebugOnly<nsresult> rv = httpChannel->SetRequestMethod(*config.method); |
4961 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 4961); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 4961; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
4962 | } |
4963 | } |
4964 | |
4965 | HttpBaseChannel::ReplacementChannelConfig::ReplacementChannelConfig( |
4966 | const dom::ReplacementChannelConfigInit& aInit) { |
4967 | redirectFlags = aInit.redirectFlags(); |
4968 | classOfService = aInit.classOfService(); |
4969 | privateBrowsing = aInit.privateBrowsing(); |
4970 | method = aInit.method(); |
4971 | referrerInfo = aInit.referrerInfo(); |
4972 | timedChannelInfo = aInit.timedChannelInfo(); |
4973 | uploadStream = aInit.uploadStream(); |
4974 | uploadStreamLength = aInit.uploadStreamLength(); |
4975 | uploadStreamHasHeaders = aInit.uploadStreamHasHeaders(); |
4976 | contentType = aInit.contentType(); |
4977 | contentLength = aInit.contentLength(); |
4978 | } |
4979 | |
4980 | dom::ReplacementChannelConfigInit |
4981 | HttpBaseChannel::ReplacementChannelConfig::Serialize() { |
4982 | dom::ReplacementChannelConfigInit config; |
4983 | config.redirectFlags() = redirectFlags; |
4984 | config.classOfService() = classOfService; |
4985 | config.privateBrowsing() = privateBrowsing; |
4986 | config.method() = method; |
4987 | config.referrerInfo() = referrerInfo; |
4988 | config.timedChannelInfo() = timedChannelInfo; |
4989 | config.uploadStream() = |
4990 | uploadStream ? RemoteLazyInputStream::WrapStream(uploadStream) : nullptr; |
4991 | config.uploadStreamLength() = uploadStreamLength; |
4992 | config.uploadStreamHasHeaders() = uploadStreamHasHeaders; |
4993 | config.contentType() = contentType; |
4994 | config.contentLength() = contentLength; |
4995 | |
4996 | return config; |
4997 | } |
4998 | |
4999 | nsresult HttpBaseChannel::SetupReplacementChannel(nsIURI* newURI, |
5000 | nsIChannel* newChannel, |
5001 | bool preserveMethod, |
5002 | uint32_t redirectFlags) { |
5003 | nsresult rv; |
5004 | |
5005 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p newChannel=%p preserveMethod=%d]" , this, newChannel, preserveMethod); } } while (0) |
5006 | ("HttpBaseChannel::SetupReplacementChannel "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p newChannel=%p preserveMethod=%d]" , this, newChannel, preserveMethod); } } while (0) |
5007 | "[this=%p newChannel=%p preserveMethod=%d]",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p newChannel=%p preserveMethod=%d]" , this, newChannel, preserveMethod); } } while (0) |
5008 | this, newChannel, preserveMethod))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p newChannel=%p preserveMethod=%d]" , this, newChannel, preserveMethod); } } while (0); |
5009 | |
5010 | // Ensure the channel's loadInfo's result principal URI so that it's |
5011 | // either non-null or updated to the redirect target URI. |
5012 | // We must do this because in case the loadInfo's result principal URI |
5013 | // is null, it would be taken from OriginalURI of the channel. But we |
5014 | // overwrite it with the whole redirect chain first URI before opening |
5015 | // the target channel, hence the information would be lost. |
5016 | // If the protocol handler that created the channel wants to use |
5017 | // the originalURI of the channel as the principal URI, this fulfills |
5018 | // that request - newURI is the original URI of the channel. |
5019 | nsCOMPtr<nsILoadInfo> newLoadInfo = newChannel->LoadInfo(); |
5020 | nsCOMPtr<nsIURI> resultPrincipalURI; |
5021 | rv = newLoadInfo->GetResultPrincipalURI(getter_AddRefs(resultPrincipalURI)); |
5022 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5022); return rv; } } while (false); |
5023 | if (!resultPrincipalURI) { |
5024 | rv = newLoadInfo->SetResultPrincipalURI(newURI); |
5025 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5025); return rv; } } while (false); |
5026 | } |
5027 | |
5028 | nsLoadFlags loadFlags = mLoadFlags; |
5029 | loadFlags |= LOAD_REPLACE; |
5030 | |
5031 | // if the original channel was using SSL and this channel is not using |
5032 | // SSL, then no need to inhibit persistent caching. however, if the |
5033 | // original channel was not using SSL and has INHIBIT_PERSISTENT_CACHING |
5034 | // set, then allow the flag to apply to the redirected channel as well. |
5035 | // since we force set INHIBIT_PERSISTENT_CACHING on all HTTPS channels, |
5036 | // we only need to check if the original channel was using SSL. |
5037 | if (mURI->SchemeIs("https")) { |
5038 | loadFlags &= ~INHIBIT_PERSISTENT_CACHING; |
5039 | } |
5040 | |
5041 | newChannel->SetLoadFlags(loadFlags); |
5042 | |
5043 | nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(newChannel); |
5044 | |
5045 | ReplacementReason redirectType = |
5046 | redirectFlags & (nsIChannelEventSink::REDIRECT_INTERNAL | |
5047 | nsIChannelEventSink::REDIRECT_TRANSPARENT) |
5048 | ? ReplacementReason::InternalRedirect |
5049 | : ReplacementReason::Redirect; |
5050 | ReplacementChannelConfig config = CloneReplacementChannelConfig( |
5051 | preserveMethod, redirectFlags, redirectType); |
5052 | ConfigureReplacementChannel(newChannel, config, redirectType); |
5053 | |
5054 | // Check whether or not this was a cross-domain redirect. |
5055 | nsCOMPtr<nsITimedChannel> newTimedChannel(do_QueryInterface(newChannel)); |
5056 | bool sameOriginWithOriginalUri = SameOriginWithOriginalUri(newURI); |
5057 | if (config.timedChannelInfo && newTimedChannel) { |
5058 | newTimedChannel->SetAllRedirectsSameOrigin( |
5059 | config.timedChannelInfo->allRedirectsSameOrigin() && |
5060 | sameOriginWithOriginalUri); |
5061 | } |
5062 | |
5063 | newChannel->SetLoadGroup(mLoadGroup); |
5064 | newChannel->SetNotificationCallbacks(mCallbacks); |
5065 | // TODO: create tests for cross-origin redirect in bug 1662896. |
5066 | if (sameOriginWithOriginalUri) { |
5067 | newChannel->SetContentDisposition(mContentDispositionHint); |
5068 | if (mContentDispositionFilename) { |
5069 | newChannel->SetContentDispositionFilename(*mContentDispositionFilename); |
5070 | } |
5071 | } |
5072 | |
5073 | if (!httpChannel) return NS_OK; // no other options to set |
5074 | |
5075 | // Preserve the CORS preflight information. |
5076 | nsCOMPtr<nsIHttpChannelInternal> httpInternal = do_QueryInterface(newChannel); |
5077 | if (httpInternal) { |
5078 | httpInternal->SetLastRedirectFlags(redirectFlags); |
5079 | |
5080 | if (LoadRequireCORSPreflight()) { |
5081 | httpInternal->SetCorsPreflightParameters(mUnsafeHeaders, false, false); |
5082 | } |
5083 | } |
5084 | |
5085 | // convey the LoadAllowSTS() flags |
5086 | rv = httpChannel->SetAllowSTS(LoadAllowSTS()); |
5087 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5087); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5087; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5088 | |
5089 | // convey the Accept header value |
5090 | { |
5091 | nsAutoCString oldAcceptValue; |
5092 | nsresult hasHeader = mRequestHead.GetHeader(nsHttp::Accept, oldAcceptValue); |
5093 | if (NS_SUCCEEDED(hasHeader)((bool)(__builtin_expect(!!(!NS_FAILED_impl(hasHeader)), 1)))) { |
5094 | rv = httpChannel->SetRequestHeader("Accept"_ns, oldAcceptValue, false); |
5095 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5095); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5095; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5096 | } |
5097 | } |
5098 | |
5099 | // convey the User-Agent header value |
5100 | // since we might be setting custom user agent from DevTools. |
5101 | if (httpInternal && mRequestMode == RequestMode::No_cors && |
5102 | redirectType == ReplacementReason::Redirect) { |
5103 | nsAutoCString oldUserAgent; |
5104 | nsresult hasHeader = |
5105 | mRequestHead.GetHeader(nsHttp::User_Agent, oldUserAgent); |
5106 | if (NS_SUCCEEDED(hasHeader)((bool)(__builtin_expect(!!(!NS_FAILED_impl(hasHeader)), 1)))) { |
5107 | rv = httpChannel->SetRequestHeader("User-Agent"_ns, oldUserAgent, false); |
5108 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5108); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5108; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5109 | } |
5110 | } |
5111 | |
5112 | // convery the IsUserAgentHeaderModified value. |
5113 | if (httpInternal) { |
5114 | rv = httpInternal->SetIsUserAgentHeaderModified( |
5115 | LoadIsUserAgentHeaderModified()); |
5116 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5116); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5116; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5117 | } |
5118 | |
5119 | // share the request context - see bug 1236650 |
5120 | rv = httpChannel->SetRequestContextID(mRequestContextID); |
5121 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5121); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5121; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5122 | |
5123 | // When on the parent process, the channel can't attempt to get it itself. |
5124 | // When on the child process, it would be waste to query it again. |
5125 | rv = httpChannel->SetBrowserId(mBrowserId); |
5126 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5126); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5126; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5127 | |
5128 | // Not setting this flag would break carrying permissions down to the child |
5129 | // process when the channel is artificially forced to be a main document load. |
5130 | rv = httpChannel->SetIsMainDocumentChannel(LoadForceMainDocumentChannel()); |
5131 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5131); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5131; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5132 | |
5133 | // Preserve the loading order |
5134 | nsCOMPtr<nsISupportsPriority> p = do_QueryInterface(newChannel); |
5135 | if (p) { |
5136 | p->SetPriority(mPriority); |
5137 | } |
5138 | |
5139 | if (httpInternal) { |
5140 | // Convey third party cookie, conservative, and spdy flags. |
5141 | rv = httpInternal->SetThirdPartyFlags(LoadThirdPartyFlags()); |
5142 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5142); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5142; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5143 | rv = httpInternal->SetAllowSpdy(LoadAllowSpdy()); |
5144 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5144); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5144; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5145 | rv = httpInternal->SetAllowHttp3(LoadAllowHttp3()); |
5146 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5146); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5146; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5147 | rv = httpInternal->SetAllowAltSvc(LoadAllowAltSvc()); |
5148 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5148); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5148; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5149 | rv = httpInternal->SetBeConservative(LoadBeConservative()); |
5150 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5150); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5150; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5151 | rv = httpInternal->SetIsTRRServiceChannel(LoadIsTRRServiceChannel()); |
5152 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5152); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5152; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5153 | rv = httpInternal->SetTlsFlags(mTlsFlags); |
5154 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5154); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5154; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5155 | |
5156 | // Ensure the type of realChannel involves all types it may redirect to. |
5157 | // Such as nsHttpChannel and InterceptedChannel. |
5158 | // Even thought InterceptedChannel itself doesn't require these information, |
5159 | // it may still be necessary for the following redirections. |
5160 | // E.g. nsHttpChannel -> InterceptedChannel -> nsHttpChannel |
5161 | RefPtr<HttpBaseChannel> realChannel; |
5162 | CallQueryInterface(newChannel, realChannel.StartAssignment()); |
5163 | if (realChannel) { |
5164 | realChannel->SetTopWindowURI(mTopWindowURI); |
5165 | |
5166 | realChannel->StoreTaintedOriginFlag( |
5167 | ShouldTaintReplacementChannelOrigin(newChannel, redirectFlags)); |
5168 | } |
5169 | |
5170 | // update the DocumentURI indicator since we are being redirected. |
5171 | // if this was a top-level document channel, then the new channel |
5172 | // should have its mDocumentURI point to newURI; otherwise, we |
5173 | // just need to pass along our mDocumentURI to the new channel. |
5174 | if (newURI && (mURI == mDocumentURI)) { |
5175 | rv = httpInternal->SetDocumentURI(newURI); |
5176 | } else { |
5177 | rv = httpInternal->SetDocumentURI(mDocumentURI); |
5178 | } |
5179 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5179); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5179; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5180 | |
5181 | // if there is a chain of keys for redirect-responses we transfer it to |
5182 | // the new channel (see bug #561276) |
5183 | { |
5184 | auto redirectedCachekeys = mRedirectedCachekeys.Lock(); |
5185 | auto& ref = redirectedCachekeys.ref(); |
5186 | if (ref) { |
5187 | LOG(do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p] transferring chain of redirect cache-keys" , this); } } while (0) |
5188 | ("HttpBaseChannel::SetupReplacementChannel "do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p] transferring chain of redirect cache-keys" , this); } } while (0) |
5189 | "[this=%p] transferring chain of redirect cache-keys",do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p] transferring chain of redirect cache-keys" , this); } } while (0) |
5190 | this))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetupReplacementChannel " "[this=%p] transferring chain of redirect cache-keys" , this); } } while (0); |
5191 | rv = httpInternal->SetCacheKeysRedirectChain(ref.release()); |
5192 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5192); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5192; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5193 | } |
5194 | } |
5195 | |
5196 | // Preserve Request mode. |
5197 | rv = httpInternal->SetRequestMode(mRequestMode); |
5198 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5198); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5198; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5199 | |
5200 | // Preserve Redirect mode flag. |
5201 | rv = httpInternal->SetRedirectMode(mRedirectMode); |
5202 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5202); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5202; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5203 | |
5204 | // Preserve Integrity metadata. |
5205 | rv = httpInternal->SetIntegrityMetadata(mIntegrityMetadata); |
5206 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5206); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5206; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5207 | |
5208 | httpInternal->SetAltDataForChild(LoadAltDataForChild()); |
5209 | if (LoadDisableAltDataCache()) { |
5210 | httpInternal->DisableAltDataCache(); |
5211 | } |
5212 | } |
5213 | |
5214 | // transfer any properties |
5215 | nsCOMPtr<nsIWritablePropertyBag> bag(do_QueryInterface(newChannel)); |
5216 | if (bag) { |
5217 | for (const auto& entry : mPropertyHash) { |
5218 | bag->SetProperty(entry.GetKey(), entry.GetWeak()); |
5219 | } |
5220 | } |
5221 | |
5222 | // Pass the preferred alt-data type on to the new channel. |
5223 | nsCOMPtr<nsICacheInfoChannel> cacheInfoChan(do_QueryInterface(newChannel)); |
5224 | if (cacheInfoChan) { |
5225 | for (auto& data : mPreferredCachedAltDataTypes) { |
5226 | cacheInfoChan->PreferAlternativeDataType(data.type(), data.contentType(), |
5227 | data.deliverAltData()); |
5228 | } |
5229 | |
5230 | if (LoadForceValidateCacheContent()) { |
5231 | Unused << cacheInfoChan->SetForceValidateCacheContent(true); |
5232 | } |
5233 | } |
5234 | |
5235 | if (redirectFlags & (nsIChannelEventSink::REDIRECT_INTERNAL | |
5236 | nsIChannelEventSink::REDIRECT_STS_UPGRADE)) { |
5237 | // Copy non-origin related headers to the new channel. |
5238 | nsCOMPtr<nsIHttpHeaderVisitor> visitor = |
5239 | new AddHeadersToChannelVisitor(httpChannel); |
5240 | rv = mRequestHead.VisitHeaders(visitor); |
5241 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5241); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5241; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5242 | } |
5243 | |
5244 | // we need to strip Authentication headers for cross-origin requests |
5245 | // Ref: https://fetch.spec.whatwg.org/#http-redirect-fetch |
5246 | nsAutoCString authHeader; |
5247 | if (NS_SUCCEEDED(((bool)(__builtin_expect(!!(!NS_FAILED_impl(httpChannel->GetRequestHeader ("Authorization"_ns, authHeader))), 1))) |
5248 | httpChannel->GetRequestHeader("Authorization"_ns, authHeader))((bool)(__builtin_expect(!!(!NS_FAILED_impl(httpChannel->GetRequestHeader ("Authorization"_ns, authHeader))), 1))) && |
5249 | NS_ShouldRemoveAuthHeaderOnRedirect(static_cast<nsIChannel*>(this), |
5250 | newChannel, redirectFlags)) { |
5251 | rv = httpChannel->SetRequestHeader("Authorization"_ns, ""_ns, false); |
5252 | MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType< decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) )))>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1) ))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5252); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" ")"); do { *((volatile int*)__null) = 5252; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5253 | } |
5254 | |
5255 | return NS_OK; |
5256 | } |
5257 | |
5258 | // check whether the new channel is of same origin as the current channel |
5259 | bool HttpBaseChannel::IsNewChannelSameOrigin(nsIChannel* aNewChannel) { |
5260 | bool isSameOrigin = false; |
5261 | nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager(); |
5262 | |
5263 | if (!ssm) { |
5264 | return false; |
5265 | } |
5266 | |
5267 | nsCOMPtr<nsIURI> newURI; |
5268 | NS_GetFinalChannelURI(aNewChannel, getter_AddRefs(newURI)); |
5269 | |
5270 | nsresult rv = ssm->CheckSameOriginURI(newURI, mURI, false, false); |
5271 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))) { |
5272 | isSameOrigin = true; |
5273 | } |
5274 | |
5275 | return isSameOrigin; |
5276 | } |
5277 | |
5278 | bool HttpBaseChannel::ShouldTaintReplacementChannelOrigin( |
5279 | nsIChannel* aNewChannel, uint32_t aRedirectFlags) { |
5280 | if (LoadTaintedOriginFlag()) { |
5281 | return true; |
5282 | } |
5283 | |
5284 | if (NS_IsInternalSameURIRedirect(this, aNewChannel, aRedirectFlags) || |
5285 | NS_IsHSTSUpgradeRedirect(this, aNewChannel, aRedirectFlags)) { |
5286 | return false; |
5287 | } |
5288 | |
5289 | // If new channel is not of same origin we need to taint unless |
5290 | // mURI <-> mOriginalURI/LoadingPrincipal are same origin. |
5291 | if (IsNewChannelSameOrigin(aNewChannel)) { |
5292 | return false; |
5293 | } |
5294 | |
5295 | nsresult rv; |
5296 | |
5297 | if (mLoadInfo->GetLoadingPrincipal()) { |
5298 | bool sameOrigin = false; |
5299 | rv = mLoadInfo->GetLoadingPrincipal()->IsSameOrigin(mURI, &sameOrigin); |
5300 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
5301 | return true; |
5302 | } |
5303 | return !sameOrigin; |
5304 | } |
5305 | if (!mOriginalURI) { |
5306 | return true; |
5307 | } |
5308 | |
5309 | nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager(); |
5310 | if (!ssm) { |
5311 | return true; |
5312 | } |
5313 | |
5314 | rv = ssm->CheckSameOriginURI(mOriginalURI, mURI, false, false); |
5315 | return NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0))); |
5316 | } |
5317 | |
5318 | // Redirect Tracking |
5319 | bool HttpBaseChannel::SameOriginWithOriginalUri(nsIURI* aURI) { |
5320 | nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager(); |
5321 | bool isPrivateWin = mLoadInfo->GetOriginAttributes().IsPrivateBrowsing(); |
5322 | nsresult rv = |
5323 | ssm->CheckSameOriginURI(aURI, mOriginalURI, false, isPrivateWin); |
5324 | return (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))); |
5325 | } |
5326 | |
5327 | //----------------------------------------------------------------------------- |
5328 | // HttpBaseChannel::nsIClassifiedChannel |
5329 | |
5330 | NS_IMETHODIMPnsresult |
5331 | HttpBaseChannel::GetMatchedList(nsACString& aList) { |
5332 | aList = mMatchedList; |
5333 | return NS_OK; |
5334 | } |
5335 | |
5336 | NS_IMETHODIMPnsresult |
5337 | HttpBaseChannel::GetMatchedProvider(nsACString& aProvider) { |
5338 | aProvider = mMatchedProvider; |
5339 | return NS_OK; |
5340 | } |
5341 | |
5342 | NS_IMETHODIMPnsresult |
5343 | HttpBaseChannel::GetMatchedFullHash(nsACString& aFullHash) { |
5344 | aFullHash = mMatchedFullHash; |
5345 | return NS_OK; |
5346 | } |
5347 | |
5348 | NS_IMETHODIMPnsresult |
5349 | HttpBaseChannel::SetMatchedInfo(const nsACString& aList, |
5350 | const nsACString& aProvider, |
5351 | const nsACString& aFullHash) { |
5352 | NS_ENSURE_ARG(!aList.IsEmpty())do { if ((__builtin_expect(!!(!(!aList.IsEmpty())), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!aList.IsEmpty()" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5352); return NS_ERROR_INVALID_ARG; } } while (false); |
5353 | |
5354 | mMatchedList = aList; |
5355 | mMatchedProvider = aProvider; |
5356 | mMatchedFullHash = aFullHash; |
5357 | return NS_OK; |
5358 | } |
5359 | |
5360 | NS_IMETHODIMPnsresult |
5361 | HttpBaseChannel::GetMatchedTrackingLists(nsTArray<nsCString>& aLists) { |
5362 | aLists = mMatchedTrackingLists.Clone(); |
5363 | return NS_OK; |
5364 | } |
5365 | |
5366 | NS_IMETHODIMPnsresult |
5367 | HttpBaseChannel::GetMatchedTrackingFullHashes( |
5368 | nsTArray<nsCString>& aFullHashes) { |
5369 | aFullHashes = mMatchedTrackingFullHashes.Clone(); |
5370 | return NS_OK; |
5371 | } |
5372 | |
5373 | NS_IMETHODIMPnsresult |
5374 | HttpBaseChannel::SetMatchedTrackingInfo( |
5375 | const nsTArray<nsCString>& aLists, const nsTArray<nsCString>& aFullHashes) { |
5376 | NS_ENSURE_ARG(!aLists.IsEmpty())do { if ((__builtin_expect(!!(!(!aLists.IsEmpty())), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "!aLists.IsEmpty()" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5376); return NS_ERROR_INVALID_ARG; } } while (false); |
5377 | // aFullHashes can be empty for non hash-matching algorithm, for example, |
5378 | // host based test entries in preference. |
5379 | |
5380 | mMatchedTrackingLists = aLists.Clone(); |
5381 | mMatchedTrackingFullHashes = aFullHashes.Clone(); |
5382 | return NS_OK; |
5383 | } |
5384 | //----------------------------------------------------------------------------- |
5385 | // HttpBaseChannel::nsITimedChannel |
5386 | //----------------------------------------------------------------------------- |
5387 | |
5388 | NS_IMETHODIMPnsresult |
5389 | HttpBaseChannel::GetChannelCreation(TimeStamp* _retval) { |
5390 | *_retval = mChannelCreationTimestamp; |
5391 | return NS_OK; |
5392 | } |
5393 | |
5394 | NS_IMETHODIMPnsresult |
5395 | HttpBaseChannel::SetChannelCreation(TimeStamp aValue) { |
5396 | MOZ_DIAGNOSTIC_ASSERT(!aValue.IsNull())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!aValue.IsNull())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!aValue.IsNull()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!aValue.IsNull()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5396); AnnotateMozCrashReason("MOZ_DIAGNOSTIC_ASSERT" "(" "!aValue.IsNull()" ")"); do { *((volatile int*)__null) = 5396; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5397 | TimeDuration adjust = aValue - mChannelCreationTimestamp; |
5398 | mChannelCreationTimestamp = aValue; |
5399 | mChannelCreationTime += (PRTime)adjust.ToMicroseconds(); |
5400 | return NS_OK; |
5401 | } |
5402 | |
5403 | NS_IMETHODIMPnsresult |
5404 | HttpBaseChannel::GetAsyncOpen(TimeStamp* _retval) { |
5405 | *_retval = mAsyncOpenTime; |
5406 | return NS_OK; |
5407 | } |
5408 | |
5409 | NS_IMETHODIMPnsresult |
5410 | HttpBaseChannel::SetAsyncOpen(TimeStamp aValue) { |
5411 | MOZ_DIAGNOSTIC_ASSERT(!aValue.IsNull())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!aValue.IsNull())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!aValue.IsNull()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!aValue.IsNull()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5411); AnnotateMozCrashReason("MOZ_DIAGNOSTIC_ASSERT" "(" "!aValue.IsNull()" ")"); do { *((volatile int*)__null) = 5411; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5412 | mAsyncOpenTime = aValue; |
5413 | StoreAsyncOpenTimeOverriden(true); |
5414 | return NS_OK; |
5415 | } |
5416 | |
5417 | /** |
5418 | * @return the number of redirects. There is no check for cross-domain |
5419 | * redirects. This check must be done by the consumers. |
5420 | */ |
5421 | NS_IMETHODIMPnsresult |
5422 | HttpBaseChannel::GetRedirectCount(uint8_t* aRedirectCount) { |
5423 | *aRedirectCount = mRedirectCount; |
5424 | return NS_OK; |
5425 | } |
5426 | |
5427 | NS_IMETHODIMPnsresult |
5428 | HttpBaseChannel::SetRedirectCount(uint8_t aRedirectCount) { |
5429 | mRedirectCount = aRedirectCount; |
5430 | return NS_OK; |
5431 | } |
5432 | |
5433 | NS_IMETHODIMPnsresult |
5434 | HttpBaseChannel::GetInternalRedirectCount(uint8_t* aRedirectCount) { |
5435 | *aRedirectCount = mInternalRedirectCount; |
5436 | return NS_OK; |
5437 | } |
5438 | |
5439 | NS_IMETHODIMPnsresult |
5440 | HttpBaseChannel::SetInternalRedirectCount(uint8_t aRedirectCount) { |
5441 | mInternalRedirectCount = aRedirectCount; |
5442 | return NS_OK; |
5443 | } |
5444 | |
5445 | NS_IMETHODIMPnsresult |
5446 | HttpBaseChannel::GetRedirectStart(TimeStamp* _retval) { |
5447 | *_retval = mRedirectStartTimeStamp; |
5448 | return NS_OK; |
5449 | } |
5450 | |
5451 | NS_IMETHODIMPnsresult |
5452 | HttpBaseChannel::SetRedirectStart(TimeStamp aRedirectStart) { |
5453 | mRedirectStartTimeStamp = aRedirectStart; |
5454 | return NS_OK; |
5455 | } |
5456 | |
5457 | NS_IMETHODIMPnsresult |
5458 | HttpBaseChannel::GetRedirectEnd(TimeStamp* _retval) { |
5459 | *_retval = mRedirectEndTimeStamp; |
5460 | return NS_OK; |
5461 | } |
5462 | |
5463 | NS_IMETHODIMPnsresult |
5464 | HttpBaseChannel::SetRedirectEnd(TimeStamp aRedirectEnd) { |
5465 | mRedirectEndTimeStamp = aRedirectEnd; |
5466 | return NS_OK; |
5467 | } |
5468 | |
5469 | NS_IMETHODIMPnsresult |
5470 | HttpBaseChannel::GetAllRedirectsSameOrigin(bool* aAllRedirectsSameOrigin) { |
5471 | *aAllRedirectsSameOrigin = LoadAllRedirectsSameOrigin(); |
5472 | return NS_OK; |
5473 | } |
5474 | |
5475 | NS_IMETHODIMPnsresult |
5476 | HttpBaseChannel::SetAllRedirectsSameOrigin(bool aAllRedirectsSameOrigin) { |
5477 | StoreAllRedirectsSameOrigin(aAllRedirectsSameOrigin); |
5478 | return NS_OK; |
5479 | } |
5480 | |
5481 | NS_IMETHODIMPnsresult |
5482 | HttpBaseChannel::GetAllRedirectsPassTimingAllowCheck(bool* aPassesCheck) { |
5483 | *aPassesCheck = LoadAllRedirectsPassTimingAllowCheck(); |
5484 | return NS_OK; |
5485 | } |
5486 | |
5487 | NS_IMETHODIMPnsresult |
5488 | HttpBaseChannel::SetAllRedirectsPassTimingAllowCheck(bool aPassesCheck) { |
5489 | StoreAllRedirectsPassTimingAllowCheck(aPassesCheck); |
5490 | return NS_OK; |
5491 | } |
5492 | |
5493 | // https://fetch.spec.whatwg.org/#cors-check |
5494 | bool HttpBaseChannel::PerformCORSCheck() { |
5495 | // Step 1 |
5496 | // Let origin be the result of getting `Access-Control-Allow-Origin` |
5497 | // from response’s header list. |
5498 | nsAutoCString origin; |
5499 | nsresult rv = GetResponseHeader("Access-Control-Allow-Origin"_ns, origin); |
5500 | |
5501 | // Step 2 |
5502 | // If origin is null, then return failure. (Note: null, not 'null'). |
5503 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0))) || origin.IsVoid()) { |
5504 | return false; |
5505 | } |
5506 | |
5507 | // Step 3 |
5508 | // If request’s credentials mode is not "include" |
5509 | // and origin is `*`, then return success. |
5510 | uint32_t cookiePolicy = mLoadInfo->GetCookiePolicy(); |
5511 | if (cookiePolicy != nsILoadInfo::SEC_COOKIES_INCLUDE && |
5512 | origin.EqualsLiteral("*")) { |
5513 | return true; |
5514 | } |
5515 | |
5516 | // Step 4 |
5517 | // If the result of byte-serializing a request origin |
5518 | // with request is not origin, then return failure. |
5519 | nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager(); |
5520 | nsCOMPtr<nsIPrincipal> resourcePrincipal; |
5521 | rv = ssm->GetChannelURIPrincipal(this, getter_AddRefs(resourcePrincipal)); |
5522 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0))) || !resourcePrincipal) { |
5523 | return false; |
5524 | } |
5525 | nsAutoCString serializedOrigin; |
5526 | nsContentSecurityManager::GetSerializedOrigin( |
5527 | mLoadInfo->TriggeringPrincipal(), resourcePrincipal, serializedOrigin, |
5528 | mLoadInfo); |
5529 | if (!serializedOrigin.Equals(origin)) { |
5530 | return false; |
5531 | } |
5532 | |
5533 | // Step 5 |
5534 | // If request’s credentials mode is not "include", then return success. |
5535 | if (cookiePolicy != nsILoadInfo::SEC_COOKIES_INCLUDE) { |
5536 | return true; |
5537 | } |
5538 | |
5539 | // Step 6 |
5540 | // Let credentials be the result of getting |
5541 | // `Access-Control-Allow-Credentials` from response’s header list. |
5542 | nsAutoCString credentials; |
5543 | rv = GetResponseHeader("Access-Control-Allow-Credentials"_ns, credentials); |
5544 | |
5545 | // Step 7 and 8 |
5546 | // If credentials is `true`, then return success. |
5547 | // (else) return failure. |
5548 | return NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1))) && credentials.EqualsLiteral("true"); |
5549 | } |
5550 | |
5551 | NS_IMETHODIMPnsresult |
5552 | HttpBaseChannel::BodyInfoAccessAllowedCheck(nsIPrincipal* aOrigin, |
5553 | BodyInfoAccess* _retval) { |
5554 | // Per the Fetch spec, https://fetch.spec.whatwg.org/#response-body-info, |
5555 | // the bodyInfo for Resource Timing and Navigation Timing info consists of |
5556 | // encoded size, decoded size, and content type. It is however made opaque |
5557 | // whenever the response is turned into a network error, which sets its |
5558 | // bodyInfo to its default values (sizes=0, content-type=""). |
5559 | |
5560 | // Case 1: |
5561 | // "no-cors" -> Upon success, fetch will return an opaque filtered response. |
5562 | // An opaque(-redirect) filtered response is a filtered response |
5563 | // whose ... body info is a new response body info. |
5564 | auto tainting = mLoadInfo->GetTainting(); |
5565 | if (tainting == mozilla::LoadTainting::Opaque) { |
5566 | *_retval = BodyInfoAccess::DISALLOWED; |
5567 | return NS_OK; |
5568 | } |
5569 | |
5570 | // Case 2: |
5571 | // If request’s response tainting is "cors" and a CORS check for request |
5572 | // and response returns failure, then return a network error. |
5573 | if (tainting == mozilla::LoadTainting::CORS && !PerformCORSCheck()) { |
5574 | *_retval = BodyInfoAccess::DISALLOWED; |
5575 | return NS_OK; |
5576 | } |
5577 | |
5578 | // Otherwise: |
5579 | // The fetch response handover, given a fetch params fetchParams |
5580 | // and a response response, run these steps: |
5581 | // processResponseEndOfBody: |
5582 | // - If fetchParams’s request’s mode is not "navigate" or response’s |
5583 | // has-cross-origin-redirects is false: |
5584 | // - Let mimeType be the result of extracting a MIME type from |
5585 | // response’s header list. |
5586 | // - If mimeType is not failure, then set bodyInfo’s content type to the |
5587 | // result of minimizing a supported MIME type given mimeType. |
5588 | dom::RequestMode requestMode; |
5589 | MOZ_ALWAYS_SUCCEEDS(GetRequestMode(&requestMode))do { if ((__builtin_expect(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl (GetRequestMode(&requestMode))), 1)))), 1))) { } else { do { do { } while (false); MOZ_ReportCrash("" "NS_SUCCEEDED(GetRequestMode(&requestMode))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5589); AnnotateMozCrashReason("MOZ_CRASH(" "NS_SUCCEEDED(GetRequestMode(&requestMode))" ")"); do { *((volatile int*)__null) = 5589; __attribute__((nomerge )) ::abort(); } while (false); } while (false); } } while (false ); |
5590 | if (requestMode != RequestMode::Navigate || LoadAllRedirectsSameOrigin()) { |
5591 | *_retval = BodyInfoAccess::ALLOW_ALL; |
5592 | return NS_OK; |
5593 | } |
5594 | |
5595 | *_retval = BodyInfoAccess::ALLOW_SIZES; |
5596 | return NS_OK; |
5597 | } |
5598 | |
5599 | // https://fetch.spec.whatwg.org/#tao-check |
5600 | NS_IMETHODIMPnsresult |
5601 | HttpBaseChannel::TimingAllowCheck(nsIPrincipal* aOrigin, bool* _retval) { |
5602 | nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager(); |
5603 | nsCOMPtr<nsIPrincipal> resourcePrincipal; |
5604 | nsresult rv = |
5605 | ssm->GetChannelURIPrincipal(this, getter_AddRefs(resourcePrincipal)); |
5606 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0))) || !resourcePrincipal || !aOrigin) { |
5607 | *_retval = false; |
5608 | return NS_OK; |
5609 | } |
5610 | |
5611 | bool sameOrigin = false; |
5612 | rv = resourcePrincipal->Equals(aOrigin, &sameOrigin); |
Value stored to 'rv' is never read | |
5613 | |
5614 | nsAutoCString serializedOrigin; |
5615 | nsContentSecurityManager::GetSerializedOrigin(aOrigin, resourcePrincipal, |
5616 | serializedOrigin, mLoadInfo); |
5617 | |
5618 | // All redirects are same origin |
5619 | if (sameOrigin && (!serializedOrigin.IsEmpty() && |
5620 | !serializedOrigin.EqualsLiteral("null"))) { |
5621 | *_retval = true; |
5622 | return NS_OK; |
5623 | } |
5624 | |
5625 | nsAutoCString headerValue; |
5626 | rv = GetResponseHeader("Timing-Allow-Origin"_ns, headerValue); |
5627 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
5628 | *_retval = false; |
5629 | return NS_OK; |
5630 | } |
5631 | |
5632 | Tokenizer p(headerValue); |
5633 | Tokenizer::Token t; |
5634 | |
5635 | p.Record(); |
5636 | nsAutoCString headerItem; |
5637 | while (p.Next(t)) { |
5638 | if (t.Type() == Tokenizer::TOKEN_EOF || |
5639 | t.Equals(Tokenizer::Token::Char(','))) { |
5640 | p.Claim(headerItem); |
5641 | nsHttp::TrimHTTPWhitespace(headerItem, headerItem); |
5642 | // If the list item contains a case-sensitive match for the value of the |
5643 | // origin, or a wildcard, return pass |
5644 | if (headerItem == serializedOrigin || headerItem == "*") { |
5645 | *_retval = true; |
5646 | return NS_OK; |
5647 | } |
5648 | // We start recording again for the following items in the list |
5649 | p.Record(); |
5650 | } |
5651 | } |
5652 | |
5653 | *_retval = false; |
5654 | return NS_OK; |
5655 | } |
5656 | |
5657 | NS_IMETHODIMPnsresult |
5658 | HttpBaseChannel::GetLaunchServiceWorkerStart(TimeStamp* _retval) { |
5659 | MOZ_ASSERT(_retval)do { static_assert( mozilla::detail::AssertionConditionType< decltype(_retval)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(_retval))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("_retval", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5659); AnnotateMozCrashReason("MOZ_ASSERT" "(" "_retval" ")" ); do { *((volatile int*)__null) = 5659; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5660 | *_retval = mLaunchServiceWorkerStart; |
5661 | return NS_OK; |
5662 | } |
5663 | |
5664 | NS_IMETHODIMPnsresult |
5665 | HttpBaseChannel::SetLaunchServiceWorkerStart(TimeStamp aTimeStamp) { |
5666 | mLaunchServiceWorkerStart = aTimeStamp; |
5667 | return NS_OK; |
5668 | } |
5669 | |
5670 | NS_IMETHODIMPnsresult |
5671 | HttpBaseChannel::GetLaunchServiceWorkerEnd(TimeStamp* _retval) { |
5672 | MOZ_ASSERT(_retval)do { static_assert( mozilla::detail::AssertionConditionType< decltype(_retval)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(_retval))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("_retval", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5672); AnnotateMozCrashReason("MOZ_ASSERT" "(" "_retval" ")" ); do { *((volatile int*)__null) = 5672; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5673 | *_retval = mLaunchServiceWorkerEnd; |
5674 | return NS_OK; |
5675 | } |
5676 | |
5677 | NS_IMETHODIMPnsresult |
5678 | HttpBaseChannel::SetLaunchServiceWorkerEnd(TimeStamp aTimeStamp) { |
5679 | mLaunchServiceWorkerEnd = aTimeStamp; |
5680 | return NS_OK; |
5681 | } |
5682 | |
5683 | NS_IMETHODIMPnsresult |
5684 | HttpBaseChannel::GetDispatchFetchEventStart(TimeStamp* _retval) { |
5685 | MOZ_ASSERT(_retval)do { static_assert( mozilla::detail::AssertionConditionType< decltype(_retval)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(_retval))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("_retval", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5685); AnnotateMozCrashReason("MOZ_ASSERT" "(" "_retval" ")" ); do { *((volatile int*)__null) = 5685; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5686 | *_retval = mDispatchFetchEventStart; |
5687 | return NS_OK; |
5688 | } |
5689 | |
5690 | NS_IMETHODIMPnsresult |
5691 | HttpBaseChannel::SetDispatchFetchEventStart(TimeStamp aTimeStamp) { |
5692 | mDispatchFetchEventStart = aTimeStamp; |
5693 | return NS_OK; |
5694 | } |
5695 | |
5696 | NS_IMETHODIMPnsresult |
5697 | HttpBaseChannel::GetDispatchFetchEventEnd(TimeStamp* _retval) { |
5698 | MOZ_ASSERT(_retval)do { static_assert( mozilla::detail::AssertionConditionType< decltype(_retval)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(_retval))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("_retval", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5698); AnnotateMozCrashReason("MOZ_ASSERT" "(" "_retval" ")" ); do { *((volatile int*)__null) = 5698; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5699 | *_retval = mDispatchFetchEventEnd; |
5700 | return NS_OK; |
5701 | } |
5702 | |
5703 | NS_IMETHODIMPnsresult |
5704 | HttpBaseChannel::SetDispatchFetchEventEnd(TimeStamp aTimeStamp) { |
5705 | mDispatchFetchEventEnd = aTimeStamp; |
5706 | return NS_OK; |
5707 | } |
5708 | |
5709 | NS_IMETHODIMPnsresult |
5710 | HttpBaseChannel::GetHandleFetchEventStart(TimeStamp* _retval) { |
5711 | MOZ_ASSERT(_retval)do { static_assert( mozilla::detail::AssertionConditionType< decltype(_retval)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(_retval))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("_retval", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5711); AnnotateMozCrashReason("MOZ_ASSERT" "(" "_retval" ")" ); do { *((volatile int*)__null) = 5711; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5712 | *_retval = mHandleFetchEventStart; |
5713 | return NS_OK; |
5714 | } |
5715 | |
5716 | NS_IMETHODIMPnsresult |
5717 | HttpBaseChannel::SetHandleFetchEventStart(TimeStamp aTimeStamp) { |
5718 | mHandleFetchEventStart = aTimeStamp; |
5719 | return NS_OK; |
5720 | } |
5721 | |
5722 | NS_IMETHODIMPnsresult |
5723 | HttpBaseChannel::GetHandleFetchEventEnd(TimeStamp* _retval) { |
5724 | MOZ_ASSERT(_retval)do { static_assert( mozilla::detail::AssertionConditionType< decltype(_retval)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(_retval))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("_retval", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5724); AnnotateMozCrashReason("MOZ_ASSERT" "(" "_retval" ")" ); do { *((volatile int*)__null) = 5724; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
5725 | *_retval = mHandleFetchEventEnd; |
5726 | return NS_OK; |
5727 | } |
5728 | |
5729 | NS_IMETHODIMPnsresult |
5730 | HttpBaseChannel::SetHandleFetchEventEnd(TimeStamp aTimeStamp) { |
5731 | mHandleFetchEventEnd = aTimeStamp; |
5732 | return NS_OK; |
5733 | } |
5734 | |
5735 | NS_IMETHODIMPnsresult |
5736 | HttpBaseChannel::GetDomainLookupStart(TimeStamp* _retval) { |
5737 | *_retval = mTransactionTimings.domainLookupStart; |
5738 | return NS_OK; |
5739 | } |
5740 | |
5741 | NS_IMETHODIMPnsresult |
5742 | HttpBaseChannel::GetDomainLookupEnd(TimeStamp* _retval) { |
5743 | *_retval = mTransactionTimings.domainLookupEnd; |
5744 | return NS_OK; |
5745 | } |
5746 | |
5747 | NS_IMETHODIMPnsresult |
5748 | HttpBaseChannel::GetConnectStart(TimeStamp* _retval) { |
5749 | *_retval = mTransactionTimings.connectStart; |
5750 | return NS_OK; |
5751 | } |
5752 | |
5753 | NS_IMETHODIMPnsresult |
5754 | HttpBaseChannel::GetTcpConnectEnd(TimeStamp* _retval) { |
5755 | *_retval = mTransactionTimings.tcpConnectEnd; |
5756 | return NS_OK; |
5757 | } |
5758 | |
5759 | NS_IMETHODIMPnsresult |
5760 | HttpBaseChannel::GetSecureConnectionStart(TimeStamp* _retval) { |
5761 | *_retval = mTransactionTimings.secureConnectionStart; |
5762 | return NS_OK; |
5763 | } |
5764 | |
5765 | NS_IMETHODIMPnsresult |
5766 | HttpBaseChannel::GetConnectEnd(TimeStamp* _retval) { |
5767 | *_retval = mTransactionTimings.connectEnd; |
5768 | return NS_OK; |
5769 | } |
5770 | |
5771 | NS_IMETHODIMPnsresult |
5772 | HttpBaseChannel::GetRequestStart(TimeStamp* _retval) { |
5773 | *_retval = mTransactionTimings.requestStart; |
5774 | return NS_OK; |
5775 | } |
5776 | |
5777 | NS_IMETHODIMPnsresult |
5778 | HttpBaseChannel::GetResponseStart(TimeStamp* _retval) { |
5779 | *_retval = mTransactionTimings.responseStart; |
5780 | return NS_OK; |
5781 | } |
5782 | |
5783 | NS_IMETHODIMPnsresult |
5784 | HttpBaseChannel::GetResponseEnd(TimeStamp* _retval) { |
5785 | *_retval = mTransactionTimings.responseEnd; |
5786 | return NS_OK; |
5787 | } |
5788 | |
5789 | NS_IMETHODIMPnsresult |
5790 | HttpBaseChannel::GetCacheReadStart(TimeStamp* _retval) { |
5791 | *_retval = mCacheReadStart; |
5792 | return NS_OK; |
5793 | } |
5794 | |
5795 | NS_IMETHODIMPnsresult |
5796 | HttpBaseChannel::GetCacheReadEnd(TimeStamp* _retval) { |
5797 | *_retval = mCacheReadEnd; |
5798 | return NS_OK; |
5799 | } |
5800 | |
5801 | NS_IMETHODIMPnsresult |
5802 | HttpBaseChannel::GetTransactionPending(TimeStamp* _retval) { |
5803 | *_retval = mTransactionTimings.transactionPending; |
5804 | return NS_OK; |
5805 | } |
5806 | |
5807 | NS_IMETHODIMPnsresult |
5808 | HttpBaseChannel::GetInitiatorType(nsAString& aInitiatorType) { |
5809 | aInitiatorType = mInitiatorType; |
5810 | return NS_OK; |
5811 | } |
5812 | |
5813 | NS_IMETHODIMPnsresult |
5814 | HttpBaseChannel::SetInitiatorType(const nsAString& aInitiatorType) { |
5815 | mInitiatorType = aInitiatorType; |
5816 | return NS_OK; |
5817 | } |
5818 | |
5819 | #define IMPL_TIMING_ATTR(name) \ |
5820 | NS_IMETHODIMPnsresult \ |
5821 | HttpBaseChannel::Get##name##Time(PRTime* _retval) { \ |
5822 | TimeStamp stamp; \ |
5823 | Get##name(&stamp); \ |
5824 | if (stamp.IsNull()) { \ |
5825 | *_retval = 0; \ |
5826 | return NS_OK; \ |
5827 | } \ |
5828 | *_retval = \ |
5829 | mChannelCreationTime + \ |
5830 | (PRTime)((stamp - mChannelCreationTimestamp).ToSeconds() * 1e6); \ |
5831 | return NS_OK; \ |
5832 | } |
5833 | |
5834 | IMPL_TIMING_ATTR(ChannelCreation) |
5835 | IMPL_TIMING_ATTR(AsyncOpen) |
5836 | IMPL_TIMING_ATTR(LaunchServiceWorkerStart) |
5837 | IMPL_TIMING_ATTR(LaunchServiceWorkerEnd) |
5838 | IMPL_TIMING_ATTR(DispatchFetchEventStart) |
5839 | IMPL_TIMING_ATTR(DispatchFetchEventEnd) |
5840 | IMPL_TIMING_ATTR(HandleFetchEventStart) |
5841 | IMPL_TIMING_ATTR(HandleFetchEventEnd) |
5842 | IMPL_TIMING_ATTR(DomainLookupStart) |
5843 | IMPL_TIMING_ATTR(DomainLookupEnd) |
5844 | IMPL_TIMING_ATTR(ConnectStart) |
5845 | IMPL_TIMING_ATTR(TcpConnectEnd) |
5846 | IMPL_TIMING_ATTR(SecureConnectionStart) |
5847 | IMPL_TIMING_ATTR(ConnectEnd) |
5848 | IMPL_TIMING_ATTR(RequestStart) |
5849 | IMPL_TIMING_ATTR(ResponseStart) |
5850 | IMPL_TIMING_ATTR(ResponseEnd) |
5851 | IMPL_TIMING_ATTR(CacheReadStart) |
5852 | IMPL_TIMING_ATTR(CacheReadEnd) |
5853 | IMPL_TIMING_ATTR(RedirectStart) |
5854 | IMPL_TIMING_ATTR(RedirectEnd) |
5855 | IMPL_TIMING_ATTR(TransactionPending) |
5856 | |
5857 | #undef IMPL_TIMING_ATTR |
5858 | |
5859 | void HttpBaseChannel::MaybeReportTimingData() { |
5860 | // There is no point in continuing, since the performance object in the parent |
5861 | // isn't the same as the one in the child which will be reporting resource |
5862 | // performance. |
5863 | if (XRE_IsE10sParentProcess()) { |
5864 | return; |
5865 | } |
5866 | |
5867 | // Devtools can create fetch requests on behalf the content document. |
5868 | // If we don't exclude these requests, they'd also be reported |
5869 | // to the content document. |
5870 | bool isInDevToolsContext; |
5871 | mLoadInfo->GetIsInDevToolsContext(&isInDevToolsContext); |
5872 | if (isInDevToolsContext) { |
5873 | return; |
5874 | } |
5875 | |
5876 | mozilla::dom::PerformanceStorage* documentPerformance = |
5877 | mLoadInfo->GetPerformanceStorage(); |
5878 | if (documentPerformance) { |
5879 | documentPerformance->AddEntry(this, this); |
5880 | return; |
5881 | } |
5882 | |
5883 | if (!nsGlobalWindowInner::GetInnerWindowWithId( |
5884 | mLoadInfo->GetInnerWindowID())) { |
5885 | // The inner window is in a different process. |
5886 | dom::ContentChild* child = dom::ContentChild::GetSingleton(); |
5887 | |
5888 | if (!child) { |
5889 | return; |
5890 | } |
5891 | nsAutoString initiatorType; |
5892 | nsAutoString entryName; |
5893 | |
5894 | UniquePtr<dom::PerformanceTimingData> performanceTimingData( |
5895 | dom::PerformanceTimingData::Create(this, this, 0, initiatorType, |
5896 | entryName)); |
5897 | if (!performanceTimingData) { |
5898 | return; |
5899 | } |
5900 | |
5901 | LoadInfoArgs loadInfoArgs; |
5902 | mozilla::ipc::LoadInfoToLoadInfoArgs(mLoadInfo, &loadInfoArgs); |
5903 | child->SendReportFrameTimingData(loadInfoArgs, entryName, initiatorType, |
5904 | std::move(performanceTimingData)); |
5905 | } |
5906 | } |
5907 | |
5908 | NS_IMETHODIMPnsresult |
5909 | HttpBaseChannel::SetReportResourceTiming(bool enabled) { |
5910 | StoreReportTiming(enabled); |
5911 | return NS_OK; |
5912 | } |
5913 | |
5914 | NS_IMETHODIMPnsresult |
5915 | HttpBaseChannel::GetReportResourceTiming(bool* _retval) { |
5916 | *_retval = LoadReportTiming(); |
5917 | return NS_OK; |
5918 | } |
5919 | |
5920 | nsIURI* HttpBaseChannel::GetReferringPage() { |
5921 | nsCOMPtr<nsPIDOMWindowInner> pDomWindow = GetInnerDOMWindow(); |
5922 | if (!pDomWindow) { |
5923 | return nullptr; |
5924 | } |
5925 | return pDomWindow->GetDocumentURI(); |
5926 | } |
5927 | |
5928 | nsPIDOMWindowInner* HttpBaseChannel::GetInnerDOMWindow() { |
5929 | nsCOMPtr<nsILoadContext> loadContext; |
5930 | NS_QueryNotificationCallbacks(this, loadContext); |
5931 | if (!loadContext) { |
5932 | return nullptr; |
5933 | } |
5934 | nsCOMPtr<mozIDOMWindowProxy> domWindow; |
5935 | loadContext->GetAssociatedWindow(getter_AddRefs(domWindow)); |
5936 | if (!domWindow) { |
5937 | return nullptr; |
5938 | } |
5939 | auto* pDomWindow = nsPIDOMWindowOuter::From(domWindow); |
5940 | if (!pDomWindow) { |
5941 | return nullptr; |
5942 | } |
5943 | nsCOMPtr<nsPIDOMWindowInner> innerWindow = |
5944 | pDomWindow->GetCurrentInnerWindow(); |
5945 | if (!innerWindow) { |
5946 | return nullptr; |
5947 | } |
5948 | |
5949 | return innerWindow; |
5950 | } |
5951 | |
5952 | //----------------------------------------------------------------------------- |
5953 | // HttpBaseChannel::nsIThrottledInputChannel |
5954 | //----------------------------------------------------------------------------- |
5955 | |
5956 | NS_IMETHODIMPnsresult |
5957 | HttpBaseChannel::SetThrottleQueue(nsIInputChannelThrottleQueue* aQueue) { |
5958 | if (!XRE_IsParentProcess()) { |
5959 | return NS_ERROR_FAILURE; |
5960 | } |
5961 | |
5962 | mThrottleQueue = aQueue; |
5963 | return NS_OK; |
5964 | } |
5965 | |
5966 | NS_IMETHODIMPnsresult |
5967 | HttpBaseChannel::GetThrottleQueue(nsIInputChannelThrottleQueue** aQueue) { |
5968 | NS_ENSURE_ARG_POINTER(aQueue)do { if ((__builtin_expect(!!(!(aQueue)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aQueue" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 5968); return NS_ERROR_INVALID_POINTER; } } while (false); |
5969 | nsCOMPtr<nsIInputChannelThrottleQueue> queue = mThrottleQueue; |
5970 | queue.forget(aQueue); |
5971 | return NS_OK; |
5972 | } |
5973 | |
5974 | //------------------------------------------------------------------------------ |
5975 | |
5976 | bool HttpBaseChannel::EnsureRequestContextID() { |
5977 | if (mRequestContextID) { |
5978 | // Already have a request context ID, no need to do the rest of this work |
5979 | LOG(("HttpBaseChannel::EnsureRequestContextID this=%p id=%" PRIx64, this,do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::EnsureRequestContextID this=%p id=%" "l" "x" , this, mRequestContextID); } } while (0) |
5980 | mRequestContextID))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::EnsureRequestContextID this=%p id=%" "l" "x" , this, mRequestContextID); } } while (0); |
5981 | return true; |
5982 | } |
5983 | |
5984 | // Find the loadgroup at the end of the chain in order |
5985 | // to make sure all channels derived from the load group |
5986 | // use the same connection scope. |
5987 | nsCOMPtr<nsILoadGroupChild> childLoadGroup = do_QueryInterface(mLoadGroup); |
5988 | if (!childLoadGroup) { |
5989 | return false; |
5990 | } |
5991 | |
5992 | nsCOMPtr<nsILoadGroup> rootLoadGroup; |
5993 | childLoadGroup->GetRootLoadGroup(getter_AddRefs(rootLoadGroup)); |
5994 | if (!rootLoadGroup) { |
5995 | return false; |
5996 | } |
5997 | |
5998 | // Set the load group connection scope on this channel and its transaction |
5999 | rootLoadGroup->GetRequestContextID(&mRequestContextID); |
6000 | |
6001 | LOG(("HttpBaseChannel::EnsureRequestContextID this=%p id=%" PRIx64, this,do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::EnsureRequestContextID this=%p id=%" "l" "x" , this, mRequestContextID); } } while (0) |
6002 | mRequestContextID))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::EnsureRequestContextID this=%p id=%" "l" "x" , this, mRequestContextID); } } while (0); |
6003 | |
6004 | return true; |
6005 | } |
6006 | |
6007 | bool HttpBaseChannel::EnsureRequestContext() { |
6008 | if (mRequestContext) { |
6009 | // Already have a request context, no need to do the rest of this work |
6010 | return true; |
6011 | } |
6012 | |
6013 | if (!EnsureRequestContextID()) { |
6014 | return false; |
6015 | } |
6016 | |
6017 | nsIRequestContextService* rcsvc = gHttpHandler->GetRequestContextService(); |
6018 | if (!rcsvc) { |
6019 | return false; |
6020 | } |
6021 | |
6022 | rcsvc->GetRequestContext(mRequestContextID, getter_AddRefs(mRequestContext)); |
6023 | return static_cast<bool>(mRequestContext); |
6024 | } |
6025 | |
6026 | void HttpBaseChannel::EnsureBrowserId() { |
6027 | if (mBrowserId) { |
6028 | return; |
6029 | } |
6030 | |
6031 | RefPtr<dom::BrowsingContext> bc; |
6032 | MOZ_ALWAYS_SUCCEEDS(mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))do { if ((__builtin_expect(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl (mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))), 1))) ), 1))) { } else { do { do { } while (false); MOZ_ReportCrash ("" "NS_SUCCEEDED(mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6032); AnnotateMozCrashReason("MOZ_CRASH(" "NS_SUCCEEDED(mLoadInfo->GetBrowsingContext(getter_AddRefs(bc)))" ")"); do { *((volatile int*)__null) = 6032; __attribute__((nomerge )) ::abort(); } while (false); } while (false); } } while (false ); |
6033 | |
6034 | if (bc) { |
6035 | mBrowserId = bc->GetBrowserId(); |
6036 | } |
6037 | } |
6038 | |
6039 | void HttpBaseChannel::SetCorsPreflightParameters( |
6040 | const nsTArray<nsCString>& aUnsafeHeaders, |
6041 | bool aShouldStripRequestBodyHeader, bool aShouldStripAuthHeader) { |
6042 | MOZ_RELEASE_ASSERT(!LoadRequestObserversCalled())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!LoadRequestObserversCalled())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!LoadRequestObserversCalled( )))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!LoadRequestObserversCalled()", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6042); AnnotateMozCrashReason("MOZ_RELEASE_ASSERT" "(" "!LoadRequestObserversCalled()" ")"); do { *((volatile int*)__null) = 6042; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6043 | |
6044 | StoreRequireCORSPreflight(true); |
6045 | mUnsafeHeaders = aUnsafeHeaders.Clone(); |
6046 | if (aShouldStripRequestBodyHeader || aShouldStripAuthHeader) { |
6047 | mUnsafeHeaders.RemoveElementsBy([&](const nsCString& aHeader) { |
6048 | return (aShouldStripRequestBodyHeader && |
6049 | (aHeader.LowerCaseEqualsASCII("content-type") || |
6050 | aHeader.LowerCaseEqualsASCII("content-encoding") || |
6051 | aHeader.LowerCaseEqualsASCII("content-language") || |
6052 | aHeader.LowerCaseEqualsASCII("content-location"))) || |
6053 | (aShouldStripAuthHeader && |
6054 | aHeader.LowerCaseEqualsASCII("authorization")); |
6055 | }); |
6056 | } |
6057 | } |
6058 | |
6059 | void HttpBaseChannel::SetAltDataForChild(bool aIsForChild) { |
6060 | StoreAltDataForChild(aIsForChild); |
6061 | } |
6062 | |
6063 | NS_IMETHODIMPnsresult |
6064 | HttpBaseChannel::GetBlockAuthPrompt(bool* aValue) { |
6065 | if (!aValue) { |
6066 | return NS_ERROR_FAILURE; |
6067 | } |
6068 | |
6069 | *aValue = LoadBlockAuthPrompt(); |
6070 | return NS_OK; |
6071 | } |
6072 | |
6073 | NS_IMETHODIMPnsresult |
6074 | HttpBaseChannel::SetBlockAuthPrompt(bool aValue) { |
6075 | ENSURE_CALLED_BEFORE_CONNECT()do { if (LoadRequestObserversCalled()) { nsPrintfCString msg( "'%s' called too late: %s +%d", __FUNCTION__, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6075); do { bool abort = true; const char* e = PR_GetEnv("NECKO_ERRORS_ARE_FATAL" ); if (e) abort = (*e == '0') ? false : true; if (abort) { msg .AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=0 in your environment " "to convert this error into a warning.)"); MOZ_Crash("/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6075, msg.get()); } else { msg.AppendLiteral( " (set NECKO_ERRORS_ARE_FATAL=1 in your environment " "to convert this warning into a fatal error.)"); NS_DebugBreak (NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6075); } } while (0); if (LoadIsPending()) return NS_ERROR_IN_PROGRESS ; do { static_assert( mozilla::detail::AssertionConditionType <decltype(LoadWasOpened())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(LoadWasOpened()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("LoadWasOpened()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6075); AnnotateMozCrashReason("MOZ_ASSERT" "(" "LoadWasOpened()" ")"); do { *((volatile int*)__null) = 6075; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); return NS_ERROR_ALREADY_OPENED ; } } while (0); |
6076 | |
6077 | StoreBlockAuthPrompt(aValue); |
6078 | return NS_OK; |
6079 | } |
6080 | |
6081 | NS_IMETHODIMPnsresult |
6082 | HttpBaseChannel::GetConnectionInfoHashKey(nsACString& aConnectionInfoHashKey) { |
6083 | if (!mConnectionInfo) { |
6084 | return NS_ERROR_FAILURE; |
6085 | } |
6086 | aConnectionInfoHashKey.Assign(mConnectionInfo->HashKey()); |
6087 | return NS_OK; |
6088 | } |
6089 | |
6090 | NS_IMETHODIMPnsresult |
6091 | HttpBaseChannel::GetLastRedirectFlags(uint32_t* aValue) { |
6092 | NS_ENSURE_ARG(aValue)do { if ((__builtin_expect(!!(!(aValue)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aValue" ") failed", nullptr , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6092); return NS_ERROR_INVALID_ARG; } } while (false); |
6093 | *aValue = mLastRedirectFlags; |
6094 | return NS_OK; |
6095 | } |
6096 | |
6097 | NS_IMETHODIMPnsresult |
6098 | HttpBaseChannel::SetLastRedirectFlags(uint32_t aValue) { |
6099 | mLastRedirectFlags = aValue; |
6100 | return NS_OK; |
6101 | } |
6102 | |
6103 | NS_IMETHODIMPnsresult |
6104 | HttpBaseChannel::GetNavigationStartTimeStamp(TimeStamp* aTimeStamp) { |
6105 | return NS_ERROR_NOT_IMPLEMENTED; |
6106 | } |
6107 | |
6108 | NS_IMETHODIMPnsresult |
6109 | HttpBaseChannel::SetNavigationStartTimeStamp(TimeStamp aTimeStamp) { |
6110 | return NS_ERROR_NOT_IMPLEMENTED; |
6111 | } |
6112 | |
6113 | nsresult HttpBaseChannel::CheckRedirectLimit(nsIURI* aNewURI, |
6114 | uint32_t aRedirectFlags) const { |
6115 | if (aRedirectFlags & nsIChannelEventSink::REDIRECT_INTERNAL) { |
6116 | // for internal redirect due to auth retry we do not have any limit |
6117 | // as we might restrict the number of times a user might retry |
6118 | // authentication |
6119 | if (aRedirectFlags & nsIChannelEventSink::REDIRECT_AUTH_RETRY) { |
6120 | return NS_OK; |
6121 | } |
6122 | // Some platform features, like Service Workers, depend on internal |
6123 | // redirects. We should allow some number of internal redirects above |
6124 | // and beyond the normal redirect limit so these features continue |
6125 | // to work. |
6126 | static const int8_t kMinInternalRedirects = 5; |
6127 | |
6128 | if (mInternalRedirectCount >= (mRedirectionLimit + kMinInternalRedirects)) { |
6129 | LOG(("internal redirection limit reached!\n"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "internal redirection limit reached!\n"); } } while (0); |
6130 | return NS_ERROR_REDIRECT_LOOP; |
6131 | } |
6132 | return NS_OK; |
6133 | } |
6134 | |
6135 | MOZ_ASSERT(aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY |do { static_assert( mozilla::detail::AssertionConditionType< decltype(aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink ::REDIRECT_STS_UPGRADE))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aRedirectFlags & (nsIChannelEventSink ::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6137); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)" ")"); do { *((volatile int*)__null) = 6137; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
6136 | nsIChannelEventSink::REDIRECT_PERMANENT |do { static_assert( mozilla::detail::AssertionConditionType< decltype(aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink ::REDIRECT_STS_UPGRADE))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aRedirectFlags & (nsIChannelEventSink ::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6137); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)" ")"); do { *((volatile int*)__null) = 6137; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
6137 | nsIChannelEventSink::REDIRECT_STS_UPGRADE))do { static_assert( mozilla::detail::AssertionConditionType< decltype(aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink ::REDIRECT_STS_UPGRADE))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aRedirectFlags & (nsIChannelEventSink ::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6137); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aRedirectFlags & (nsIChannelEventSink::REDIRECT_TEMPORARY | nsIChannelEventSink::REDIRECT_PERMANENT | nsIChannelEventSink::REDIRECT_STS_UPGRADE)" ")"); do { *((volatile int*)__null) = 6137; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6138 | |
6139 | if (mRedirectCount >= mRedirectionLimit) { |
6140 | LOG(("redirection limit reached!\n"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "redirection limit reached!\n"); } } while (0); |
6141 | return NS_ERROR_REDIRECT_LOOP; |
6142 | } |
6143 | |
6144 | // in case https-only mode is enabled which upgrades top-level requests to |
6145 | // https and the page answers with a redirect (meta, 302, win.location, ...) |
6146 | // then this method can break the cycle which causes the https-only exception |
6147 | // page to appear. Note that https-first mode breaks upgrade downgrade endless |
6148 | // loops within ShouldUpgradeHttpsFirstRequest because https-first does not |
6149 | // display an exception page but needs a soft fallback/downgrade. |
6150 | if (nsHTTPSOnlyUtils::IsUpgradeDowngradeEndlessLoop( |
6151 | mURI, aNewURI, mLoadInfo, |
6152 | {nsHTTPSOnlyUtils::UpgradeDowngradeEndlessLoopOptions:: |
6153 | EnforceForHTTPSOnlyMode})) { |
6154 | // Mark that we didn't upgrade to https due to loop detection in https-only |
6155 | // mode to show https-only error page. We know that we are in https-only |
6156 | // mode, because we passed `EnforceForHTTPSOnlyMode` to |
6157 | // `IsUpgradeDowngradeEndlessLoop`. In other words we upgrade the request |
6158 | // with https-only mode, but then immediately cancel the request. |
6159 | uint32_t httpsOnlyStatus = mLoadInfo->GetHttpsOnlyStatus(); |
6160 | if (httpsOnlyStatus & nsILoadInfo::HTTPS_ONLY_UNINITIALIZED) { |
6161 | httpsOnlyStatus ^= nsILoadInfo::HTTPS_ONLY_UNINITIALIZED; |
6162 | httpsOnlyStatus |= |
6163 | nsILoadInfo::HTTPS_ONLY_UPGRADED_LISTENER_NOT_REGISTERED; |
6164 | mLoadInfo->SetHttpsOnlyStatus(httpsOnlyStatus); |
6165 | } |
6166 | |
6167 | LOG(("upgrade downgrade redirect loop!\n"))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "upgrade downgrade redirect loop!\n"); } } while (0); |
6168 | return NS_ERROR_REDIRECT_LOOP; |
6169 | } |
6170 | // in case of http-first mode we want to add an exception to disable the |
6171 | // upgrade behavior if we have upgrade-downgrade loop to break the loop and |
6172 | // load the http request next |
6173 | if (mozilla::StaticPrefs:: |
6174 | dom_security_https_first_add_exception_on_failure() && |
6175 | nsHTTPSOnlyUtils::IsUpgradeDowngradeEndlessLoop( |
6176 | mURI, aNewURI, mLoadInfo, |
6177 | {nsHTTPSOnlyUtils::UpgradeDowngradeEndlessLoopOptions:: |
6178 | EnforceForHTTPSFirstMode})) { |
6179 | nsHTTPSOnlyUtils::AddHTTPSFirstException(mURI, mLoadInfo); |
6180 | } |
6181 | |
6182 | return NS_OK; |
6183 | } |
6184 | |
6185 | // NOTE: This function duplicates code from nsBaseChannel. This will go away |
6186 | // once HTTP uses nsBaseChannel (part of bug 312760) |
6187 | /* static */ |
6188 | void HttpBaseChannel::CallTypeSniffers(void* aClosure, const uint8_t* aData, |
6189 | uint32_t aCount) { |
6190 | nsIChannel* chan = static_cast<nsIChannel*>(aClosure); |
6191 | const char* snifferType = [chan]() { |
6192 | if (RefPtr<nsHttpChannel> httpChannel = do_QueryObject(chan)) { |
6193 | switch (httpChannel->GetSnifferCategoryType()) { |
6194 | case SnifferCategoryType::NetContent: |
6195 | return NS_CONTENT_SNIFFER_CATEGORY"net-content-sniffers"; |
6196 | case SnifferCategoryType::OpaqueResponseBlocking: |
6197 | return NS_ORB_SNIFFER_CATEGORY"orb-content-sniffers"; |
6198 | case SnifferCategoryType::All: |
6199 | return NS_CONTENT_AND_ORB_SNIFFER_CATEGORY"net-and-orb-content-sniffers"; |
6200 | default: |
6201 | MOZ_ASSERT_UNREACHABLE("Unexpected SnifferCategoryType!")do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "Unexpected SnifferCategoryType!" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6201); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "Unexpected SnifferCategoryType!" ")"); do { *((volatile int*)__null) = 6201; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6202 | } |
6203 | } |
6204 | |
6205 | return NS_CONTENT_SNIFFER_CATEGORY"net-content-sniffers"; |
6206 | }(); |
6207 | |
6208 | nsAutoCString newType; |
6209 | NS_SniffContent(snifferType, chan, aData, aCount, newType); |
6210 | if (!newType.IsEmpty()) { |
6211 | chan->SetContentType(newType); |
6212 | } |
6213 | } |
6214 | |
6215 | template <class T> |
6216 | static void ParseServerTimingHeader( |
6217 | const UniquePtr<T>& aHeader, nsTArray<nsCOMPtr<nsIServerTiming>>& aOutput) { |
6218 | if (!aHeader) { |
6219 | return; |
6220 | } |
6221 | |
6222 | nsAutoCString serverTimingHeader; |
6223 | Unused << aHeader->GetHeader(nsHttp::Server_Timing, serverTimingHeader); |
6224 | if (serverTimingHeader.IsEmpty()) { |
6225 | return; |
6226 | } |
6227 | |
6228 | ServerTimingParser parser(serverTimingHeader); |
6229 | parser.Parse(); |
6230 | |
6231 | nsTArray<nsCOMPtr<nsIServerTiming>> array = parser.TakeServerTimingHeaders(); |
6232 | aOutput.AppendElements(array); |
6233 | } |
6234 | |
6235 | NS_IMETHODIMPnsresult |
6236 | HttpBaseChannel::GetServerTiming(nsIArray** aServerTiming) { |
6237 | nsresult rv; |
6238 | NS_ENSURE_ARG_POINTER(aServerTiming)do { if ((__builtin_expect(!!(!(aServerTiming)), 0))) { NS_DebugBreak (NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aServerTiming" ") failed" , nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6238); return NS_ERROR_INVALID_POINTER; } } while (false); |
6239 | |
6240 | nsCOMPtr<nsIMutableArray> array = do_CreateInstance(NS_ARRAY_CONTRACTID"@mozilla.org/array;1", &rv); |
6241 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6241); return rv; } } while (false); |
6242 | |
6243 | nsTArray<nsCOMPtr<nsIServerTiming>> data; |
6244 | rv = GetNativeServerTiming(data); |
6245 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6245); return rv; } } while (false); |
6246 | |
6247 | for (const auto& entry : data) { |
6248 | array->AppendElement(entry); |
6249 | } |
6250 | |
6251 | array.forget(aServerTiming); |
6252 | return NS_OK; |
6253 | } |
6254 | |
6255 | NS_IMETHODIMPnsresult |
6256 | HttpBaseChannel::GetNativeServerTiming( |
6257 | nsTArray<nsCOMPtr<nsIServerTiming>>& aServerTiming) { |
6258 | aServerTiming.Clear(); |
6259 | |
6260 | if (nsContentUtils::ComputeIsSecureContext(this)) { |
6261 | ParseServerTimingHeader(mResponseHead, aServerTiming); |
6262 | ParseServerTimingHeader(mResponseTrailers, aServerTiming); |
6263 | } |
6264 | |
6265 | return NS_OK; |
6266 | } |
6267 | |
6268 | NS_IMETHODIMPnsresult |
6269 | HttpBaseChannel::CancelByURLClassifier(nsresult aErrorCode) { |
6270 | MOZ_ASSERT(do { static_assert( mozilla::detail::AssertionConditionType< decltype(UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode (aErrorCode))>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode (aErrorCode)))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode(aErrorCode)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6271); AnnotateMozCrashReason("MOZ_ASSERT" "(" "UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode(aErrorCode)" ")"); do { *((volatile int*)__null) = 6271; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
6271 | UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode(aErrorCode))do { static_assert( mozilla::detail::AssertionConditionType< decltype(UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode (aErrorCode))>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode (aErrorCode)))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode(aErrorCode)" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6271); AnnotateMozCrashReason("MOZ_ASSERT" "(" "UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode(aErrorCode)" ")"); do { *((volatile int*)__null) = 6271; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6272 | return Cancel(aErrorCode); |
6273 | } |
6274 | |
6275 | NS_IMETHODIMPnsresult HttpBaseChannel::SetIPv4Disabled() { |
6276 | mCaps |= NS_HTTP_DISABLE_IPV4(1 << 17); |
6277 | return NS_OK; |
6278 | } |
6279 | |
6280 | NS_IMETHODIMPnsresult HttpBaseChannel::SetIPv6Disabled() { |
6281 | mCaps |= NS_HTTP_DISABLE_IPV6(1 << 18); |
6282 | return NS_OK; |
6283 | } |
6284 | |
6285 | NS_IMETHODIMPnsresult HttpBaseChannel::GetResponseEmbedderPolicy( |
6286 | bool aIsOriginTrialCoepCredentiallessEnabled, |
6287 | nsILoadInfo::CrossOriginEmbedderPolicy* aOutPolicy) { |
6288 | *aOutPolicy = nsILoadInfo::EMBEDDER_POLICY_NULL; |
6289 | if (!mResponseHead) { |
6290 | return NS_ERROR_NOT_AVAILABLE; |
6291 | } |
6292 | |
6293 | if (!nsContentUtils::ComputeIsSecureContext(this)) { |
6294 | // Feature is only available for secure contexts. |
6295 | return NS_OK; |
6296 | } |
6297 | |
6298 | nsAutoCString content; |
6299 | Unused << mResponseHead->GetHeader(nsHttp::Cross_Origin_Embedder_Policy, |
6300 | content); |
6301 | *aOutPolicy = NS_GetCrossOriginEmbedderPolicyFromHeader( |
6302 | content, aIsOriginTrialCoepCredentiallessEnabled); |
6303 | return NS_OK; |
6304 | } |
6305 | |
6306 | // Obtain a cross-origin opener-policy from a response response and a |
6307 | // cross-origin opener policy initiator. |
6308 | // https://gist.github.com/annevk/6f2dd8c79c77123f39797f6bdac43f3e |
6309 | NS_IMETHODIMPnsresult HttpBaseChannel::ComputeCrossOriginOpenerPolicy( |
6310 | nsILoadInfo::CrossOriginOpenerPolicy aInitiatorPolicy, |
6311 | nsILoadInfo::CrossOriginOpenerPolicy* aOutPolicy) { |
6312 | MOZ_ASSERT(aOutPolicy)do { static_assert( mozilla::detail::AssertionConditionType< decltype(aOutPolicy)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aOutPolicy))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aOutPolicy", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6312); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aOutPolicy" ")"); do { *((volatile int*)__null) = 6312; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6313 | *aOutPolicy = nsILoadInfo::OPENER_POLICY_UNSAFE_NONE; |
6314 | |
6315 | if (!mResponseHead) { |
6316 | return NS_ERROR_NOT_AVAILABLE; |
6317 | } |
6318 | |
6319 | // COOP headers are ignored for insecure-context loads. |
6320 | if (!nsContentUtils::ComputeIsSecureContext(this)) { |
6321 | return NS_OK; |
6322 | } |
6323 | |
6324 | nsAutoCString openerPolicy; |
6325 | Unused << mResponseHead->GetHeader(nsHttp::Cross_Origin_Opener_Policy, |
6326 | openerPolicy); |
6327 | |
6328 | // Cross-Origin-Opener-Policy = %s"same-origin" / |
6329 | // %s"same-origin-allow-popups" / |
6330 | // %s"unsafe-none"; case-sensitive |
6331 | |
6332 | nsCOMPtr<nsISFVService> sfv = GetSFVService(); |
6333 | |
6334 | nsCOMPtr<nsISFVItem> item; |
6335 | nsresult rv = sfv->ParseItem(openerPolicy, getter_AddRefs(item)); |
6336 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
6337 | return rv; |
6338 | } |
6339 | |
6340 | nsCOMPtr<nsISFVBareItem> value; |
6341 | rv = item->GetValue(getter_AddRefs(value)); |
6342 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
6343 | return rv; |
6344 | } |
6345 | |
6346 | nsCOMPtr<nsISFVToken> token = do_QueryInterface(value); |
6347 | if (!token) { |
6348 | return NS_ERROR_UNEXPECTED; |
6349 | } |
6350 | |
6351 | rv = token->GetValue(openerPolicy); |
6352 | if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) { |
6353 | return rv; |
6354 | } |
6355 | |
6356 | nsILoadInfo::CrossOriginOpenerPolicy policy = |
6357 | nsILoadInfo::OPENER_POLICY_UNSAFE_NONE; |
6358 | |
6359 | if (openerPolicy.EqualsLiteral("same-origin")) { |
6360 | policy = nsILoadInfo::OPENER_POLICY_SAME_ORIGIN; |
6361 | } else if (openerPolicy.EqualsLiteral("same-origin-allow-popups")) { |
6362 | policy = nsILoadInfo::OPENER_POLICY_SAME_ORIGIN_ALLOW_POPUPS; |
6363 | } |
6364 | if (policy == nsILoadInfo::OPENER_POLICY_SAME_ORIGIN) { |
6365 | nsILoadInfo::CrossOriginEmbedderPolicy coep = |
6366 | nsILoadInfo::EMBEDDER_POLICY_NULL; |
6367 | bool isCoepCredentiallessEnabled; |
6368 | rv = mLoadInfo->GetIsOriginTrialCoepCredentiallessEnabledForTopLevel( |
6369 | &isCoepCredentiallessEnabled); |
6370 | if (!isCoepCredentiallessEnabled) { |
6371 | nsAutoCString originTrialToken; |
6372 | Unused << mResponseHead->GetHeader(nsHttp::OriginTrial, originTrialToken); |
6373 | if (!originTrialToken.IsEmpty()) { |
6374 | nsCOMPtr<nsIPrincipal> resultPrincipal; |
6375 | rv = nsContentUtils::GetSecurityManager()->GetChannelResultPrincipal( |
6376 | this, getter_AddRefs(resultPrincipal)); |
6377 | if (!NS_WARN_IF(NS_FAILED(rv))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(rv )), 0))), "NS_FAILED(rv)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6377)) { |
6378 | OriginTrials trials; |
6379 | trials.UpdateFromToken(NS_ConvertASCIItoUTF16(originTrialToken), |
6380 | resultPrincipal); |
6381 | if (trials.IsEnabled(OriginTrial::CoepCredentialless)) { |
6382 | isCoepCredentiallessEnabled = true; |
6383 | } |
6384 | } |
6385 | } |
6386 | } |
6387 | |
6388 | NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl (__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName (__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with " "result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t >(__rv), name ? " (" : "", name ? name : "", name ? ")" : "" ); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6388); return rv; } } while (false); |
6389 | if (NS_SUCCEEDED(((bool)(__builtin_expect(!!(!NS_FAILED_impl(GetResponseEmbedderPolicy (isCoepCredentiallessEnabled, &coep))), 1))) |
6390 | GetResponseEmbedderPolicy(isCoepCredentiallessEnabled, &coep))((bool)(__builtin_expect(!!(!NS_FAILED_impl(GetResponseEmbedderPolicy (isCoepCredentiallessEnabled, &coep))), 1))) && |
6391 | (coep == nsILoadInfo::EMBEDDER_POLICY_REQUIRE_CORP || |
6392 | coep == nsILoadInfo::EMBEDDER_POLICY_CREDENTIALLESS)) { |
6393 | policy = |
6394 | nsILoadInfo::OPENER_POLICY_SAME_ORIGIN_EMBEDDER_POLICY_REQUIRE_CORP; |
6395 | } |
6396 | } |
6397 | |
6398 | *aOutPolicy = policy; |
6399 | return NS_OK; |
6400 | } |
6401 | |
6402 | NS_IMETHODIMPnsresult |
6403 | HttpBaseChannel::GetCrossOriginOpenerPolicy( |
6404 | nsILoadInfo::CrossOriginOpenerPolicy* aPolicy) { |
6405 | MOZ_ASSERT(aPolicy)do { static_assert( mozilla::detail::AssertionConditionType< decltype(aPolicy)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(aPolicy))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("aPolicy", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6405); AnnotateMozCrashReason("MOZ_ASSERT" "(" "aPolicy" ")" ); do { *((volatile int*)__null) = 6405; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6406 | if (!aPolicy) { |
6407 | return NS_ERROR_INVALID_ARG; |
6408 | } |
6409 | // If this method is called before OnStartRequest (ie. before we call |
6410 | // ComputeCrossOriginOpenerPolicy) or if we were unable to compute the |
6411 | // policy we'll throw an error. |
6412 | if (!LoadOnStartRequestCalled()) { |
6413 | return NS_ERROR_NOT_AVAILABLE; |
6414 | } |
6415 | *aPolicy = mComputedCrossOriginOpenerPolicy; |
6416 | return NS_OK; |
6417 | } |
6418 | |
6419 | NS_IMETHODIMPnsresult |
6420 | HttpBaseChannel::HasCrossOriginOpenerPolicyMismatch(bool* aIsMismatch) { |
6421 | // This should only be called in parent process. |
6422 | MOZ_ASSERT(XRE_IsParentProcess())do { static_assert( mozilla::detail::AssertionConditionType< decltype(XRE_IsParentProcess())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(XRE_IsParentProcess()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("XRE_IsParentProcess()" , "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6422); AnnotateMozCrashReason("MOZ_ASSERT" "(" "XRE_IsParentProcess()" ")"); do { *((volatile int*)__null) = 6422; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6423 | *aIsMismatch = LoadHasCrossOriginOpenerPolicyMismatch(); |
6424 | return NS_OK; |
6425 | } |
6426 | |
6427 | void HttpBaseChannel::MaybeFlushConsoleReports() { |
6428 | // Flush if we have a known window ID. |
6429 | if (mLoadInfo->GetInnerWindowID() > 0) { |
6430 | FlushReportsToConsole(mLoadInfo->GetInnerWindowID()); |
6431 | return; |
6432 | } |
6433 | |
6434 | // If this channel is part of a loadGroup, we can flush the console reports |
6435 | // immediately. |
6436 | nsCOMPtr<nsILoadGroup> loadGroup; |
6437 | nsresult rv = GetLoadGroup(getter_AddRefs(loadGroup)); |
6438 | if (NS_SUCCEEDED(rv)((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1))) && loadGroup) { |
6439 | FlushConsoleReports(loadGroup); |
6440 | } |
6441 | } |
6442 | |
6443 | void HttpBaseChannel::DoDiagnosticAssertWhenOnStopNotCalledOnDestroy() {} |
6444 | |
6445 | bool HttpBaseChannel::Http3Allowed() const { |
6446 | bool isDirectOrNoProxy = |
6447 | mProxyInfo ? static_cast<nsProxyInfo*>(mProxyInfo.get())->IsDirect() |
6448 | : true; |
6449 | return !mUpgradeProtocolCallback && isDirectOrNoProxy && |
6450 | !(mCaps & NS_HTTP_BE_CONSERVATIVE(1 << 11)) && !LoadBeConservative() && |
6451 | LoadAllowHttp3(); |
6452 | } |
6453 | |
6454 | UniquePtr<nsHttpResponseHead> |
6455 | HttpBaseChannel::MaybeCloneResponseHeadForCachedResource() { |
6456 | if (!mResponseHead) { |
6457 | return nullptr; |
6458 | } |
6459 | |
6460 | return MakeUnique<nsHttpResponseHead>(*mResponseHead); |
6461 | } |
6462 | |
6463 | void HttpBaseChannel::SetDummyChannelForCachedResource( |
6464 | const nsHttpResponseHead* aMaybeResponseHead /* = nullptr */) { |
6465 | mDummyChannelForCachedResource = true; |
6466 | MOZ_ASSERT(!mResponseHead,do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mResponseHead)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!mResponseHead))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mResponseHead" " (" "SetDummyChannelForCachedResource should only be called once" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6467); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mResponseHead" ") (" "SetDummyChannelForCachedResource should only be called once" ")"); do { *((volatile int*)__null) = 6467; __attribute__((nomerge )) ::abort(); } while (false); } } while (false) |
6467 | "SetDummyChannelForCachedResource should only be called once")do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mResponseHead)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!mResponseHead))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mResponseHead" " (" "SetDummyChannelForCachedResource should only be called once" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6467); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mResponseHead" ") (" "SetDummyChannelForCachedResource should only be called once" ")"); do { *((volatile int*)__null) = 6467; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6468 | if (aMaybeResponseHead) { |
6469 | mResponseHead = MakeUnique<nsHttpResponseHead>(*aMaybeResponseHead); |
6470 | } else { |
6471 | mResponseHead = MakeUnique<nsHttpResponseHead>(); |
6472 | } |
6473 | } |
6474 | |
6475 | void HttpBaseChannel::SetEarlyHints( |
6476 | nsTArray<EarlyHintConnectArgs>&& aEarlyHints) { |
6477 | mEarlyHints = std::move(aEarlyHints); |
6478 | } |
6479 | |
6480 | nsTArray<EarlyHintConnectArgs>&& HttpBaseChannel::TakeEarlyHints() { |
6481 | return std::move(mEarlyHints); |
6482 | } |
6483 | |
6484 | NS_IMETHODIMPnsresult |
6485 | HttpBaseChannel::SetEarlyHintPreloaderId(uint64_t aEarlyHintPreloaderId) { |
6486 | mEarlyHintPreloaderId = aEarlyHintPreloaderId; |
6487 | return NS_OK; |
6488 | } |
6489 | |
6490 | NS_IMETHODIMPnsresult |
6491 | HttpBaseChannel::GetEarlyHintPreloaderId(uint64_t* aEarlyHintPreloaderId) { |
6492 | NS_ENSURE_ARG_POINTER(aEarlyHintPreloaderId)do { if ((__builtin_expect(!!(!(aEarlyHintPreloaderId)), 0))) { NS_DebugBreak(NS_DEBUG_WARNING, "NS_ENSURE_TRUE(" "aEarlyHintPreloaderId" ") failed", nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6492); return NS_ERROR_INVALID_POINTER; } } while (false); |
6493 | *aEarlyHintPreloaderId = mEarlyHintPreloaderId; |
6494 | return NS_OK; |
6495 | } |
6496 | |
6497 | NS_IMETHODIMPnsresult |
6498 | HttpBaseChannel::SetClassicScriptHintCharset( |
6499 | const nsAString& aClassicScriptHintCharset) { |
6500 | mClassicScriptHintCharset = aClassicScriptHintCharset; |
6501 | return NS_OK; |
6502 | } |
6503 | |
6504 | NS_IMETHODIMPnsresult HttpBaseChannel::GetClassicScriptHintCharset( |
6505 | nsAString& aClassicScriptHintCharset) { |
6506 | aClassicScriptHintCharset = mClassicScriptHintCharset; |
6507 | return NS_OK; |
6508 | } |
6509 | |
6510 | NS_IMETHODIMPnsresult HttpBaseChannel::SetDocumentCharacterSet( |
6511 | const nsAString& aDocumentCharacterSet) { |
6512 | mDocumentCharacterSet = aDocumentCharacterSet; |
6513 | return NS_OK; |
6514 | } |
6515 | |
6516 | NS_IMETHODIMPnsresult HttpBaseChannel::GetDocumentCharacterSet( |
6517 | nsAString& aDocumentCharacterSet) { |
6518 | aDocumentCharacterSet = mDocumentCharacterSet; |
6519 | return NS_OK; |
6520 | } |
6521 | |
6522 | void HttpBaseChannel::SetConnectionInfo(nsHttpConnectionInfo* aCI) { |
6523 | mConnectionInfo = aCI ? aCI->Clone() : nullptr; |
6524 | } |
6525 | |
6526 | NS_IMETHODIMPnsresult |
6527 | HttpBaseChannel::GetIsProxyUsed(bool* aIsProxyUsed) { |
6528 | if (mProxyInfo) { |
6529 | if (!static_cast<nsProxyInfo*>(mProxyInfo.get())->IsDirect()) { |
6530 | StoreIsProxyUsed(true); |
6531 | } |
6532 | } |
6533 | *aIsProxyUsed = LoadIsProxyUsed(); |
6534 | return NS_OK; |
6535 | } |
6536 | |
6537 | static void CollectORBBlockTelemetry( |
6538 | const OpaqueResponseBlockedTelemetryReason aTelemetryReason, |
6539 | ExtContentPolicy aPolicy) { |
6540 | Telemetry::LABELS_ORB_BLOCK_REASON label{ |
6541 | static_cast<uint32_t>(aTelemetryReason)}; |
6542 | Telemetry::AccumulateCategorical(label); |
6543 | |
6544 | switch (aPolicy) { |
6545 | case ExtContentPolicy::TYPE_INVALID: |
6546 | Telemetry::AccumulateCategorical( |
6547 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::INVALID); |
6548 | break; |
6549 | case ExtContentPolicy::TYPE_OTHER: |
6550 | Telemetry::AccumulateCategorical( |
6551 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::OTHER); |
6552 | break; |
6553 | case ExtContentPolicy::TYPE_FETCH: |
6554 | Telemetry::AccumulateCategorical( |
6555 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::BLOCKED_FETCH); |
6556 | break; |
6557 | case ExtContentPolicy::TYPE_SCRIPT: |
6558 | Telemetry::AccumulateCategorical( |
6559 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::SCRIPT); |
6560 | break; |
6561 | case ExtContentPolicy::TYPE_JSON: |
6562 | Telemetry::AccumulateCategorical( |
6563 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::JSON); |
6564 | break; |
6565 | case ExtContentPolicy::TYPE_IMAGE: |
6566 | Telemetry::AccumulateCategorical( |
6567 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::IMAGE); |
6568 | break; |
6569 | case ExtContentPolicy::TYPE_STYLESHEET: |
6570 | Telemetry::AccumulateCategorical( |
6571 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::STYLESHEET); |
6572 | break; |
6573 | case ExtContentPolicy::TYPE_XMLHTTPREQUEST: |
6574 | Telemetry::AccumulateCategorical( |
6575 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::XMLHTTPREQUEST); |
6576 | break; |
6577 | case ExtContentPolicy::TYPE_DTD: |
6578 | Telemetry::AccumulateCategorical( |
6579 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::DTD); |
6580 | break; |
6581 | case ExtContentPolicy::TYPE_FONT: |
6582 | Telemetry::AccumulateCategorical( |
6583 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::FONT); |
6584 | break; |
6585 | case ExtContentPolicy::TYPE_MEDIA: |
6586 | Telemetry::AccumulateCategorical( |
6587 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::MEDIA); |
6588 | break; |
6589 | case ExtContentPolicy::TYPE_CSP_REPORT: |
6590 | Telemetry::AccumulateCategorical( |
6591 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::CSP_REPORT); |
6592 | break; |
6593 | case ExtContentPolicy::TYPE_XSLT: |
6594 | Telemetry::AccumulateCategorical( |
6595 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::XSLT); |
6596 | break; |
6597 | case ExtContentPolicy::TYPE_IMAGESET: |
6598 | Telemetry::AccumulateCategorical( |
6599 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::IMAGESET); |
6600 | break; |
6601 | case ExtContentPolicy::TYPE_WEB_MANIFEST: |
6602 | Telemetry::AccumulateCategorical( |
6603 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::WEB_MANIFEST); |
6604 | break; |
6605 | case ExtContentPolicy::TYPE_SPECULATIVE: |
6606 | Telemetry::AccumulateCategorical( |
6607 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::SPECULATIVE); |
6608 | break; |
6609 | case ExtContentPolicy::TYPE_UA_FONT: |
6610 | Telemetry::AccumulateCategorical( |
6611 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::UA_FONT); |
6612 | break; |
6613 | case ExtContentPolicy::TYPE_PROXIED_WEBRTC_MEDIA: |
6614 | Telemetry::AccumulateCategorical( |
6615 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::PROXIED_WEBRTC_MEDIA); |
6616 | break; |
6617 | case ExtContentPolicy::TYPE_PING: |
6618 | Telemetry::AccumulateCategorical( |
6619 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::PING); |
6620 | break; |
6621 | case ExtContentPolicy::TYPE_BEACON: |
6622 | Telemetry::AccumulateCategorical( |
6623 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::BEACON); |
6624 | break; |
6625 | case ExtContentPolicy::TYPE_WEB_TRANSPORT: |
6626 | Telemetry::AccumulateCategorical( |
6627 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::WEB_TRANSPORT); |
6628 | break; |
6629 | case ExtContentPolicy::TYPE_WEB_IDENTITY: |
6630 | // Don't bother extending the telemetry for this. |
6631 | Telemetry::AccumulateCategorical( |
6632 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::OTHER); |
6633 | break; |
6634 | case ExtContentPolicy::TYPE_DOCUMENT: |
6635 | case ExtContentPolicy::TYPE_SUBDOCUMENT: |
6636 | case ExtContentPolicy::TYPE_OBJECT: |
6637 | case ExtContentPolicy::TYPE_OBJECT_SUBREQUEST: |
6638 | case ExtContentPolicy::TYPE_WEBSOCKET: |
6639 | case ExtContentPolicy::TYPE_SAVEAS_DOWNLOAD: |
6640 | MOZ_ASSERT_UNREACHABLE("Shouldn't block this type")do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " "Shouldn't block this type" ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6640); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " "Shouldn't block this type" ")"); do { *((volatile int*)__null) = 6640; __attribute__((nomerge )) ::abort(); } while (false); } } while (false); |
6641 | // DOCUMENT, SUBDOCUMENT, OBJECT, OBJECT_SUBREQUEST, |
6642 | // WEBSOCKET and SAVEAS_DOWNLOAD are excluded from ORB |
6643 | Telemetry::AccumulateCategorical( |
6644 | Telemetry::LABELS_ORB_BLOCK_INITIATOR::EXCLUDED); |
6645 | break; |
6646 | // Do not add default: so that compilers can catch the missing case. |
6647 | } |
6648 | } |
6649 | |
6650 | void HttpBaseChannel::LogORBError( |
6651 | const nsAString& aReason, |
6652 | const OpaqueResponseBlockedTelemetryReason aTelemetryReason) { |
6653 | auto policy = mLoadInfo->GetExternalContentPolicyType(); |
6654 | CollectORBBlockTelemetry(aTelemetryReason, policy); |
6655 | |
6656 | // Blocking `ExtContentPolicy::TYPE_BEACON` isn't web observable, so keep |
6657 | // quiet in the console about blocking it. |
6658 | if (policy == ExtContentPolicy::TYPE_BEACON) { |
6659 | return; |
6660 | } |
6661 | |
6662 | RefPtr<dom::Document> doc; |
6663 | mLoadInfo->GetLoadingDocument(getter_AddRefs(doc)); |
6664 | |
6665 | nsAutoCString uri; |
6666 | nsresult rv = nsContentUtils::AnonymizeURI(mURI, uri); |
6667 | if (NS_WARN_IF(NS_FAILED(rv))NS_warn_if_impl(((bool)(__builtin_expect(!!(NS_FAILED_impl(rv )), 0))), "NS_FAILED(rv)", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6667)) { |
6668 | return; |
6669 | } |
6670 | |
6671 | uint64_t contentWindowId; |
6672 | GetTopLevelContentWindowId(&contentWindowId); |
6673 | if (contentWindowId) { |
6674 | nsContentUtils::ReportToConsoleByWindowID( |
6675 | u"A resource is blocked by OpaqueResponseBlocking, please check browser console for details."_ns, |
6676 | nsIScriptError::warningFlag, "ORB"_ns, contentWindowId, |
6677 | SourceLocation(mURI.get())); |
6678 | } |
6679 | |
6680 | AutoTArray<nsString, 2> params; |
6681 | params.AppendElement(NS_ConvertUTF8toUTF16(uri)); |
6682 | params.AppendElement(aReason); |
6683 | nsContentUtils::ReportToConsole(nsIScriptError::warningFlag, "ORB"_ns, doc, |
6684 | nsContentUtils::eNECKO_PROPERTIES, |
6685 | "ResourceBlockedORB", params); |
6686 | } |
6687 | |
6688 | NS_IMETHODIMPnsresult HttpBaseChannel::SetEarlyHintLinkType( |
6689 | uint32_t aEarlyHintLinkType) { |
6690 | mEarlyHintLinkType = aEarlyHintLinkType; |
6691 | return NS_OK; |
6692 | } |
6693 | |
6694 | NS_IMETHODIMPnsresult HttpBaseChannel::GetEarlyHintLinkType( |
6695 | uint32_t* aEarlyHintLinkType) { |
6696 | *aEarlyHintLinkType = mEarlyHintLinkType; |
6697 | return NS_OK; |
6698 | } |
6699 | |
6700 | NS_IMETHODIMPnsresult |
6701 | HttpBaseChannel::SetHasContentDecompressed(bool aValue) { |
6702 | LOG(("HttpBaseChannel::SetHasContentDecompressed [this=%p value=%d]\n", this,do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetHasContentDecompressed [this=%p value=%d]\n" , this, aValue); } } while (0) |
6703 | aValue))do { const ::mozilla::LogModule* moz_real_module = mozilla::net ::gHttpLog; if ((__builtin_expect(!!(mozilla::detail::log_test (moz_real_module, mozilla::LogLevel::Verbose)), 0))) { mozilla ::detail::log_print(moz_real_module, mozilla::LogLevel::Verbose , "HttpBaseChannel::SetHasContentDecompressed [this=%p value=%d]\n" , this, aValue); } } while (0); |
6704 | mHasContentDecompressed = aValue; |
6705 | return NS_OK; |
6706 | } |
6707 | NS_IMETHODIMPnsresult |
6708 | HttpBaseChannel::GetHasContentDecompressed(bool* value) { |
6709 | *value = mHasContentDecompressed; |
6710 | return NS_OK; |
6711 | } |
6712 | |
6713 | NS_IMETHODIMPnsresult |
6714 | HttpBaseChannel::SetRenderBlocking(bool aRenderBlocking) { |
6715 | mRenderBlocking = aRenderBlocking; |
6716 | return NS_OK; |
6717 | } |
6718 | |
6719 | NS_IMETHODIMPnsresult |
6720 | HttpBaseChannel::GetRenderBlocking(bool* aRenderBlocking) { |
6721 | *aRenderBlocking = mRenderBlocking; |
6722 | return NS_OK; |
6723 | } |
6724 | |
6725 | NS_IMETHODIMPnsresult HttpBaseChannel::GetLastTransportStatus( |
6726 | nsresult* aLastTransportStatus) { |
6727 | return NS_ERROR_NOT_IMPLEMENTED; |
6728 | } |
6729 | |
6730 | void HttpBaseChannel::SetFetchPriorityDOM( |
6731 | mozilla::dom::FetchPriority aPriority) { |
6732 | switch (aPriority) { |
6733 | case mozilla::dom::FetchPriority::Auto: |
6734 | SetFetchPriority(nsIClassOfService::FETCHPRIORITY_AUTO); |
6735 | return; |
6736 | case mozilla::dom::FetchPriority::High: |
6737 | SetFetchPriority(nsIClassOfService::FETCHPRIORITY_HIGH); |
6738 | return; |
6739 | case mozilla::dom::FetchPriority::Low: |
6740 | SetFetchPriority(nsIClassOfService::FETCHPRIORITY_LOW); |
6741 | return; |
6742 | default: |
6743 | MOZ_ASSERT_UNREACHABLE()do { static_assert( mozilla::detail::AssertionConditionType< decltype(false)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while ( false); MOZ_ReportAssertionFailure("false" " (" "MOZ_ASSERT_UNREACHABLE: " ")", "/var/lib/jenkins/workspace/firefox-scan-build/netwerk/protocol/http/HttpBaseChannel.cpp" , 6743); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") (" "MOZ_ASSERT_UNREACHABLE: " ")"); do { *((volatile int*)__null ) = 6743; __attribute__((nomerge)) ::abort(); } while (false) ; } } while (false); |
6744 | } |
6745 | } |
6746 | |
6747 | } // namespace net |
6748 | } // namespace mozilla |