2015-03-02 16:20:00 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "mozilla/dom/cache/TypeUtils.h"
|
|
|
|
|
|
|
|
#include "mozilla/unused.h"
|
|
|
|
#include "mozilla/dom/CacheBinding.h"
|
|
|
|
#include "mozilla/dom/InternalRequest.h"
|
|
|
|
#include "mozilla/dom/Request.h"
|
|
|
|
#include "mozilla/dom/Response.h"
|
2015-03-22 09:52:12 +03:00
|
|
|
#include "mozilla/dom/cache/CachePushStreamChild.h"
|
2015-04-16 22:00:15 +03:00
|
|
|
#include "mozilla/dom/cache/CacheTypes.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "mozilla/dom/cache/ReadStream.h"
|
|
|
|
#include "mozilla/ipc/BackgroundChild.h"
|
|
|
|
#include "mozilla/ipc/PBackgroundChild.h"
|
|
|
|
#include "mozilla/ipc/PFileDescriptorSetChild.h"
|
|
|
|
#include "mozilla/ipc/InputStreamUtils.h"
|
|
|
|
#include "nsCOMPtr.h"
|
|
|
|
#include "nsIAsyncInputStream.h"
|
|
|
|
#include "nsIAsyncOutputStream.h"
|
|
|
|
#include "nsIIPCSerializableInputStream.h"
|
2015-04-15 19:47:03 +03:00
|
|
|
#include "nsQueryObject.h"
|
2015-06-17 03:39:05 +03:00
|
|
|
#include "nsPromiseFlatString.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
#include "nsStreamUtils.h"
|
|
|
|
#include "nsString.h"
|
|
|
|
#include "nsURLParsers.h"
|
2015-04-07 16:13:05 +03:00
|
|
|
#include "nsCRT.h"
|
|
|
|
#include "nsHttp.h"
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-04-29 18:59:43 +03:00
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
namespace cache {
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-03-22 09:52:12 +03:00
|
|
|
using mozilla::ipc::BackgroundChild;
|
|
|
|
using mozilla::ipc::FileDescriptor;
|
|
|
|
using mozilla::ipc::PBackgroundChild;
|
|
|
|
using mozilla::ipc::PFileDescriptorSetChild;
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-04-29 18:59:43 +03:00
|
|
|
namespace {
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-04-07 16:13:05 +03:00
|
|
|
static bool
|
|
|
|
HasVaryStar(mozilla::dom::InternalHeaders* aHeaders)
|
|
|
|
{
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<nsCString, 16> varyHeaders;
|
2015-04-07 16:13:05 +03:00
|
|
|
ErrorResult rv;
|
|
|
|
aHeaders->GetAll(NS_LITERAL_CSTRING("vary"), varyHeaders, rv);
|
|
|
|
MOZ_ALWAYS_TRUE(!rv.Failed());
|
|
|
|
|
|
|
|
for (uint32_t i = 0; i < varyHeaders.Length(); ++i) {
|
|
|
|
nsAutoCString varyValue(varyHeaders[i]);
|
|
|
|
char* rawBuffer = varyValue.BeginWriting();
|
|
|
|
char* token = nsCRT::strtok(rawBuffer, NS_HTTP_HEADER_SEPS, &rawBuffer);
|
|
|
|
for (; token;
|
|
|
|
token = nsCRT::strtok(rawBuffer, NS_HTTP_HEADER_SEPS, &rawBuffer)) {
|
|
|
|
nsDependentCString header(token);
|
|
|
|
if (header.EqualsLiteral("*")) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-03-22 09:52:12 +03:00
|
|
|
void
|
2015-04-16 22:00:15 +03:00
|
|
|
SerializeNormalStream(nsIInputStream* aStream, CacheReadStream& aReadStreamOut)
|
2015-03-22 09:52:12 +03:00
|
|
|
{
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<FileDescriptor, 4> fds;
|
2015-03-22 09:52:12 +03:00
|
|
|
SerializeInputStream(aStream, aReadStreamOut.params(), fds);
|
|
|
|
|
|
|
|
PFileDescriptorSetChild* fdSet = nullptr;
|
|
|
|
if (!fds.IsEmpty()) {
|
|
|
|
// We should not be serializing until we have an actor ready
|
|
|
|
PBackgroundChild* manager = BackgroundChild::GetForCurrentThread();
|
|
|
|
MOZ_ASSERT(manager);
|
|
|
|
|
|
|
|
fdSet = manager->SendPFileDescriptorSetConstructor(fds[0]);
|
|
|
|
for (uint32_t i = 1; i < fds.Length(); ++i) {
|
2015-11-02 08:53:26 +03:00
|
|
|
Unused << fdSet->SendAddFileDescriptor(fds[i]);
|
2015-03-22 09:52:12 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fdSet) {
|
|
|
|
aReadStreamOut.fds() = fdSet;
|
|
|
|
} else {
|
|
|
|
aReadStreamOut.fds() = void_t();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:15 +03:00
|
|
|
void
|
|
|
|
ToHeadersEntryList(nsTArray<HeadersEntry>& aOut, InternalHeaders* aHeaders)
|
|
|
|
{
|
|
|
|
MOZ_ASSERT(aHeaders);
|
|
|
|
|
2016-02-02 18:36:30 +03:00
|
|
|
AutoTArray<InternalHeaders::Entry, 16> entryList;
|
2015-04-16 22:00:15 +03:00
|
|
|
aHeaders->GetEntries(entryList);
|
|
|
|
|
|
|
|
for (uint32_t i = 0; i < entryList.Length(); ++i) {
|
|
|
|
InternalHeaders::Entry& entry = entryList[i];
|
|
|
|
aOut.AppendElement(HeadersEntry(entry.mName, entry.mValue));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
already_AddRefed<InternalRequest>
|
|
|
|
TypeUtils::ToInternalRequest(const RequestOrUSVString& aIn,
|
|
|
|
BodyAction aBodyAction, ErrorResult& aRv)
|
|
|
|
{
|
|
|
|
if (aIn.IsRequest()) {
|
|
|
|
Request& request = aIn.GetAsRequest();
|
|
|
|
|
|
|
|
// Check and set bodyUsed flag immediately because its on Request
|
|
|
|
// instead of InternalRequest.
|
|
|
|
CheckAndSetBodyUsed(&request, aBodyAction, aRv);
|
|
|
|
if (aRv.Failed()) { return nullptr; }
|
|
|
|
|
|
|
|
return request.GetInternalRequest();
|
|
|
|
}
|
|
|
|
|
|
|
|
return ToInternalRequest(aIn.GetAsUSVString(), aRv);
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<InternalRequest>
|
|
|
|
TypeUtils::ToInternalRequest(const OwningRequestOrUSVString& aIn,
|
|
|
|
BodyAction aBodyAction, ErrorResult& aRv)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (aIn.IsRequest()) {
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<Request> request = aIn.GetAsRequest().get();
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
// Check and set bodyUsed flag immediately because its on Request
|
|
|
|
// instead of InternalRequest.
|
|
|
|
CheckAndSetBodyUsed(request, aBodyAction, aRv);
|
|
|
|
if (aRv.Failed()) { return nullptr; }
|
|
|
|
|
|
|
|
return request->GetInternalRequest();
|
|
|
|
}
|
|
|
|
|
|
|
|
return ToInternalRequest(aIn.GetAsUSVString(), aRv);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToCacheRequest(CacheRequest& aOut, InternalRequest* aIn,
|
2015-04-29 18:59:43 +03:00
|
|
|
BodyAction aBodyAction, SchemeAction aSchemeAction,
|
|
|
|
ErrorResult& aRv)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
|
|
|
MOZ_ASSERT(aIn);
|
|
|
|
|
|
|
|
aIn->GetMethod(aOut.method());
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
nsAutoCString url;
|
|
|
|
aIn->GetURL(url);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
bool schemeValid;
|
2015-06-17 03:39:05 +03:00
|
|
|
ProcessURL(url, &schemeValid, &aOut.urlWithoutQuery(), &aOut.urlQuery(), aRv);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (aRv.Failed()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!schemeValid) {
|
|
|
|
if (aSchemeAction == TypeErrorOnInvalidScheme) {
|
2015-06-17 03:39:05 +03:00
|
|
|
NS_ConvertUTF8toUTF16 urlUTF16(url);
|
2015-11-20 21:36:46 +03:00
|
|
|
aRv.ThrowTypeError<MSG_INVALID_URL_SCHEME>(NS_LITERAL_STRING("Request"),
|
|
|
|
urlUTF16);
|
2015-03-02 16:20:00 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
aIn->GetReferrer(aOut.referrer());
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalHeaders> headers = aIn->Headers();
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(headers);
|
2015-04-16 22:00:15 +03:00
|
|
|
ToHeadersEntryList(aOut.headers(), headers);
|
2015-03-02 16:20:00 +03:00
|
|
|
aOut.headersGuard() = headers->Guard();
|
|
|
|
aOut.mode() = aIn->Mode();
|
|
|
|
aOut.credentials() = aIn->GetCredentialsMode();
|
2015-03-25 23:38:42 +03:00
|
|
|
aOut.contentPolicyType() = aIn->ContentPolicyType();
|
2015-03-22 20:12:43 +03:00
|
|
|
aOut.requestCache() = aIn->GetCacheMode();
|
2015-09-01 00:26:30 +03:00
|
|
|
aOut.requestRedirect() = aIn->GetRedirectMode();
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
if (aBodyAction == IgnoreBody) {
|
|
|
|
aOut.body() = void_t();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// BodyUsed flag is checked and set previously in ToInternalRequest()
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> stream;
|
|
|
|
aIn->GetBody(getter_AddRefs(stream));
|
|
|
|
SerializeCacheStream(stream, &aOut.body(), aRv);
|
|
|
|
if (NS_WARN_IF(aRv.Failed())) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToCacheResponseWithoutBody(CacheResponse& aOut,
|
|
|
|
InternalResponse& aIn, ErrorResult& aRv)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
|
|
|
aOut.type() = aIn.Type();
|
|
|
|
|
2015-10-16 00:07:49 +03:00
|
|
|
aIn.GetUnfilteredUrl(aOut.url());
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
if (aOut.url() != EmptyCString()) {
|
2015-03-02 16:20:00 +03:00
|
|
|
// Pass all Response URL schemes through... The spec only requires we take
|
|
|
|
// action on invalid schemes for Request objects.
|
2015-06-17 03:39:05 +03:00
|
|
|
ProcessURL(aOut.url(), nullptr, nullptr, nullptr, aRv);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (aRv.Failed()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:26:30 +03:00
|
|
|
aOut.status() = aIn.GetUnfilteredStatus();
|
|
|
|
aOut.statusText() = aIn.GetUnfilteredStatusText();
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalHeaders> headers = aIn.UnfilteredHeaders();
|
2015-03-02 16:20:00 +03:00
|
|
|
MOZ_ASSERT(headers);
|
2015-04-07 16:13:05 +03:00
|
|
|
if (HasVaryStar(headers)) {
|
2015-10-05 19:38:14 +03:00
|
|
|
aRv.ThrowTypeError<MSG_RESPONSE_HAS_VARY_STAR>();
|
2015-04-07 16:13:05 +03:00
|
|
|
return;
|
|
|
|
}
|
2015-04-16 22:00:15 +03:00
|
|
|
ToHeadersEntryList(aOut.headers(), headers);
|
2015-03-02 16:20:00 +03:00
|
|
|
aOut.headersGuard() = headers->Guard();
|
2015-05-25 21:21:05 +03:00
|
|
|
aOut.channelInfo() = aIn.GetChannelInfo().AsIPCChannelInfo();
|
2015-06-05 07:39:34 +03:00
|
|
|
if (aIn.GetPrincipalInfo()) {
|
|
|
|
aOut.principalInfo() = *aIn.GetPrincipalInfo();
|
|
|
|
} else {
|
|
|
|
aOut.principalInfo() = void_t();
|
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToCacheResponse(CacheResponse& aOut, Response& aIn, ErrorResult& aRv)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
|
|
|
if (aIn.BodyUsed()) {
|
2015-10-05 19:38:14 +03:00
|
|
|
aRv.ThrowTypeError<MSG_FETCH_BODY_CONSUMED_ERROR>();
|
2015-03-02 16:20:00 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalResponse> ir = aIn.GetInternalResponse();
|
2015-04-16 22:00:15 +03:00
|
|
|
ToCacheResponseWithoutBody(aOut, *ir, aRv);
|
2015-04-07 16:13:05 +03:00
|
|
|
if (NS_WARN_IF(aRv.Failed())) {
|
|
|
|
return;
|
|
|
|
}
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> stream;
|
2015-09-01 00:26:30 +03:00
|
|
|
ir->GetUnfilteredBody(getter_AddRefs(stream));
|
2015-03-02 16:20:00 +03:00
|
|
|
if (stream) {
|
|
|
|
aIn.SetBodyUsed();
|
|
|
|
}
|
|
|
|
|
|
|
|
SerializeCacheStream(stream, &aOut.body(), aRv);
|
|
|
|
if (NS_WARN_IF(aRv.Failed())) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
void
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToCacheQueryParams(CacheQueryParams& aOut,
|
|
|
|
const CacheQueryOptions& aIn)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
|
|
|
aOut.ignoreSearch() = aIn.mIgnoreSearch;
|
|
|
|
aOut.ignoreMethod() = aIn.mIgnoreMethod;
|
|
|
|
aOut.ignoreVary() = aIn.mIgnoreVary;
|
|
|
|
aOut.cacheNameSet() = aIn.mCacheName.WasPassed();
|
|
|
|
if (aOut.cacheNameSet()) {
|
|
|
|
aOut.cacheName() = aIn.mCacheName.Value();
|
|
|
|
} else {
|
|
|
|
aOut.cacheName() = NS_LITERAL_STRING("");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<Response>
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToResponse(const CacheResponse& aIn)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
2015-03-17 18:47:01 +03:00
|
|
|
if (aIn.type() == ResponseType::Error) {
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalResponse> error = InternalResponse::NetworkError();
|
|
|
|
RefPtr<Response> r = new Response(GetGlobalObject(), error);
|
2015-03-17 18:47:01 +03:00
|
|
|
return r.forget();
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalResponse> ir = new InternalResponse(aIn.status(),
|
2015-03-17 18:47:01 +03:00
|
|
|
aIn.statusText());
|
2015-06-17 03:39:05 +03:00
|
|
|
ir->SetUrl(aIn.url());
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalHeaders> internalHeaders =
|
2015-04-16 22:00:15 +03:00
|
|
|
ToInternalHeaders(aIn.headers(), aIn.headersGuard());
|
2015-03-02 16:20:00 +03:00
|
|
|
ErrorResult result;
|
|
|
|
ir->Headers()->SetGuard(aIn.headersGuard(), result);
|
|
|
|
MOZ_ASSERT(!result.Failed());
|
|
|
|
ir->Headers()->Fill(*internalHeaders, result);
|
|
|
|
MOZ_ASSERT(!result.Failed());
|
|
|
|
|
2015-05-25 21:21:05 +03:00
|
|
|
ir->InitChannelInfo(aIn.channelInfo());
|
2015-06-05 07:39:34 +03:00
|
|
|
if (aIn.principalInfo().type() == mozilla::ipc::OptionalPrincipalInfo::TPrincipalInfo) {
|
|
|
|
UniquePtr<mozilla::ipc::PrincipalInfo> info(new mozilla::ipc::PrincipalInfo(aIn.principalInfo().get_PrincipalInfo()));
|
|
|
|
ir->SetPrincipalInfo(Move(info));
|
|
|
|
}
|
2015-03-05 00:18:47 +03:00
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
nsCOMPtr<nsIInputStream> stream = ReadStream::Create(aIn.body());
|
|
|
|
ir->SetBody(stream);
|
|
|
|
|
2015-03-17 18:47:01 +03:00
|
|
|
switch (aIn.type())
|
|
|
|
{
|
|
|
|
case ResponseType::Basic:
|
|
|
|
ir = ir->BasicResponse();
|
|
|
|
break;
|
|
|
|
case ResponseType::Cors:
|
|
|
|
ir = ir->CORSResponse();
|
|
|
|
break;
|
2015-09-01 00:26:30 +03:00
|
|
|
case ResponseType::Default:
|
|
|
|
break;
|
|
|
|
case ResponseType::Opaque:
|
|
|
|
ir = ir->OpaqueResponse();
|
|
|
|
break;
|
|
|
|
case ResponseType::Opaqueredirect:
|
|
|
|
ir = ir->OpaqueRedirectResponse();
|
|
|
|
break;
|
2015-03-17 18:47:01 +03:00
|
|
|
default:
|
|
|
|
MOZ_CRASH("Unexpected ResponseType!");
|
|
|
|
}
|
|
|
|
MOZ_ASSERT(ir);
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<Response> ref = new Response(GetGlobalObject(), ir);
|
2015-03-02 16:20:00 +03:00
|
|
|
return ref.forget();
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<InternalRequest>
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToInternalRequest(const CacheRequest& aIn)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalRequest> internalRequest = new InternalRequest();
|
2015-03-02 16:20:00 +03:00
|
|
|
|
|
|
|
internalRequest->SetMethod(aIn.method());
|
2015-06-17 03:39:05 +03:00
|
|
|
|
|
|
|
nsAutoCString url(aIn.urlWithoutQuery());
|
|
|
|
url.Append(aIn.urlQuery());
|
|
|
|
internalRequest->SetURL(url);
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
internalRequest->SetReferrer(aIn.referrer());
|
|
|
|
internalRequest->SetMode(aIn.mode());
|
|
|
|
internalRequest->SetCredentialsMode(aIn.credentials());
|
2015-03-25 23:38:42 +03:00
|
|
|
internalRequest->SetContentPolicyType(aIn.contentPolicyType());
|
2015-03-22 20:12:43 +03:00
|
|
|
internalRequest->SetCacheMode(aIn.requestCache());
|
2015-09-01 00:26:30 +03:00
|
|
|
internalRequest->SetRedirectMode(aIn.requestRedirect());
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalHeaders> internalHeaders =
|
2015-04-16 22:00:15 +03:00
|
|
|
ToInternalHeaders(aIn.headers(), aIn.headersGuard());
|
2015-03-02 16:20:00 +03:00
|
|
|
ErrorResult result;
|
2015-10-27 19:23:34 +03:00
|
|
|
|
|
|
|
// Be careful to fill the headers before setting the guard in order to
|
|
|
|
// correctly re-create the original headers.
|
2015-03-02 16:20:00 +03:00
|
|
|
internalRequest->Headers()->Fill(*internalHeaders, result);
|
|
|
|
MOZ_ASSERT(!result.Failed());
|
|
|
|
|
2015-10-27 19:23:34 +03:00
|
|
|
internalRequest->Headers()->SetGuard(aIn.headersGuard(), result);
|
|
|
|
MOZ_ASSERT(!result.Failed());
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
nsCOMPtr<nsIInputStream> stream = ReadStream::Create(aIn.body());
|
|
|
|
|
|
|
|
internalRequest->SetBody(stream);
|
|
|
|
|
|
|
|
return internalRequest.forget();
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<Request>
|
2015-04-16 22:00:15 +03:00
|
|
|
TypeUtils::ToRequest(const CacheRequest& aIn)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalRequest> internalRequest = ToInternalRequest(aIn);
|
|
|
|
RefPtr<Request> request = new Request(GetGlobalObject(), internalRequest);
|
2015-03-02 16:20:00 +03:00
|
|
|
return request.forget();
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:15 +03:00
|
|
|
// static
|
|
|
|
already_AddRefed<InternalHeaders>
|
|
|
|
TypeUtils::ToInternalHeaders(const nsTArray<HeadersEntry>& aHeadersEntryList,
|
|
|
|
HeadersGuardEnum aGuard)
|
|
|
|
{
|
|
|
|
nsTArray<InternalHeaders::Entry> entryList(aHeadersEntryList.Length());
|
|
|
|
|
|
|
|
for (uint32_t i = 0; i < aHeadersEntryList.Length(); ++i) {
|
|
|
|
const HeadersEntry& headersEntry = aHeadersEntryList[i];
|
|
|
|
entryList.AppendElement(InternalHeaders::Entry(headersEntry.name(),
|
|
|
|
headersEntry.value()));
|
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<InternalHeaders> ref = new InternalHeaders(Move(entryList), aGuard);
|
2015-04-16 22:00:15 +03:00
|
|
|
return ref.forget();
|
|
|
|
}
|
|
|
|
|
2015-04-29 18:59:43 +03:00
|
|
|
// Utility function to remove the fragment from a URL, check its scheme, and optionally
|
|
|
|
// provide a URL without the query. We're not using nsIURL or URL to do this because
|
|
|
|
// they require going to the main thread.
|
|
|
|
// static
|
|
|
|
void
|
2015-06-17 03:39:05 +03:00
|
|
|
TypeUtils::ProcessURL(nsACString& aUrl, bool* aSchemeValidOut,
|
2015-06-17 03:39:05 +03:00
|
|
|
nsACString* aUrlWithoutQueryOut,nsACString* aUrlQueryOut,
|
|
|
|
ErrorResult& aRv)
|
2015-04-29 18:59:43 +03:00
|
|
|
{
|
2015-06-17 03:39:05 +03:00
|
|
|
const nsAFlatCString& flatURL = PromiseFlatCString(aUrl);
|
2015-04-29 18:59:43 +03:00
|
|
|
const char* url = flatURL.get();
|
|
|
|
|
|
|
|
// off the main thread URL parsing using nsStdURLParser.
|
|
|
|
nsCOMPtr<nsIURLParser> urlParser = new nsStdURLParser();
|
|
|
|
|
|
|
|
uint32_t pathPos;
|
|
|
|
int32_t pathLen;
|
|
|
|
uint32_t schemePos;
|
|
|
|
int32_t schemeLen;
|
|
|
|
aRv = urlParser->ParseURL(url, flatURL.Length(), &schemePos, &schemeLen,
|
|
|
|
nullptr, nullptr, // ignore authority
|
|
|
|
&pathPos, &pathLen);
|
|
|
|
if (NS_WARN_IF(aRv.Failed())) { return; }
|
|
|
|
|
|
|
|
if (aSchemeValidOut) {
|
|
|
|
nsAutoCString scheme(Substring(flatURL, schemePos, schemeLen));
|
|
|
|
*aSchemeValidOut = scheme.LowerCaseEqualsLiteral("http") ||
|
2016-01-28 22:40:07 +03:00
|
|
|
scheme.LowerCaseEqualsLiteral("https") ||
|
|
|
|
scheme.LowerCaseEqualsLiteral("app");
|
2015-04-29 18:59:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t queryPos;
|
|
|
|
int32_t queryLen;
|
|
|
|
|
|
|
|
aRv = urlParser->ParsePath(url + pathPos, flatURL.Length() - pathPos,
|
|
|
|
nullptr, nullptr, // ignore filepath
|
|
|
|
&queryPos, &queryLen,
|
2015-08-13 18:22:19 +03:00
|
|
|
nullptr, nullptr);
|
2015-04-29 18:59:43 +03:00
|
|
|
if (NS_WARN_IF(aRv.Failed())) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aUrlWithoutQueryOut) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-06-17 03:39:05 +03:00
|
|
|
MOZ_ASSERT(aUrlQueryOut);
|
|
|
|
|
2015-04-29 18:59:43 +03:00
|
|
|
if (queryLen < 0) {
|
|
|
|
*aUrlWithoutQueryOut = aUrl;
|
2015-06-17 03:39:05 +03:00
|
|
|
*aUrlQueryOut = EmptyCString();
|
2015-04-29 18:59:43 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// ParsePath gives us query position relative to the start of the path
|
|
|
|
queryPos += pathPos;
|
|
|
|
|
|
|
|
*aUrlWithoutQueryOut = Substring(aUrl, 0, queryPos - 1);
|
2015-06-17 03:39:05 +03:00
|
|
|
*aUrlQueryOut = Substring(aUrl, queryPos - 1, queryLen + 1);
|
2015-04-29 18:59:43 +03:00
|
|
|
}
|
|
|
|
|
2015-03-02 16:20:00 +03:00
|
|
|
void
|
|
|
|
TypeUtils::CheckAndSetBodyUsed(Request* aRequest, BodyAction aBodyAction,
|
|
|
|
ErrorResult& aRv)
|
|
|
|
{
|
|
|
|
MOZ_ASSERT(aRequest);
|
|
|
|
|
|
|
|
if (aBodyAction == IgnoreBody) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aRequest->BodyUsed()) {
|
2015-10-05 19:38:14 +03:00
|
|
|
aRv.ThrowTypeError<MSG_FETCH_BODY_CONSUMED_ERROR>();
|
2015-03-02 16:20:00 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> stream;
|
|
|
|
aRequest->GetBody(getter_AddRefs(stream));
|
|
|
|
if (stream) {
|
|
|
|
aRequest->SetBodyUsed();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<InternalRequest>
|
|
|
|
TypeUtils::ToInternalRequest(const nsAString& aIn, ErrorResult& aRv)
|
|
|
|
{
|
|
|
|
RequestOrUSVString requestOrString;
|
|
|
|
requestOrString.SetAsUSVString().Rebind(aIn.Data(), aIn.Length());
|
|
|
|
|
|
|
|
// Re-create a GlobalObject stack object so we can use webidl Constructors.
|
|
|
|
AutoJSAPI jsapi;
|
|
|
|
if (NS_WARN_IF(!jsapi.Init(GetGlobalObject()))) {
|
|
|
|
aRv.Throw(NS_ERROR_UNEXPECTED);
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
JSContext* cx = jsapi.cx();
|
|
|
|
GlobalObject global(cx, GetGlobalObject()->GetGlobalJSObject());
|
|
|
|
MOZ_ASSERT(!global.Failed());
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<Request> request = Request::Constructor(global, requestOrString,
|
2015-03-02 16:20:00 +03:00
|
|
|
RequestInit(), aRv);
|
|
|
|
if (NS_WARN_IF(aRv.Failed())) { return nullptr; }
|
|
|
|
|
|
|
|
return request->GetInternalRequest();
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
TypeUtils::SerializeCacheStream(nsIInputStream* aStream,
|
2015-04-16 22:00:15 +03:00
|
|
|
CacheReadStreamOrVoid* aStreamOut,
|
2015-03-02 16:20:00 +03:00
|
|
|
ErrorResult& aRv)
|
|
|
|
{
|
|
|
|
*aStreamOut = void_t();
|
|
|
|
if (!aStream) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-22 09:52:12 +03:00
|
|
|
// Option 1: Send a cache-specific ReadStream if we can.
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<ReadStream> controlled = do_QueryObject(aStream);
|
2015-03-02 16:20:00 +03:00
|
|
|
if (controlled) {
|
|
|
|
controlled->Serialize(aStreamOut);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-04-16 22:00:15 +03:00
|
|
|
CacheReadStream readStream;
|
2015-03-02 16:20:00 +03:00
|
|
|
readStream.controlChild() = nullptr;
|
|
|
|
readStream.controlParent() = nullptr;
|
2015-03-22 09:52:12 +03:00
|
|
|
readStream.pushStreamChild() = nullptr;
|
|
|
|
readStream.pushStreamParent() = nullptr;
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-03-22 09:52:12 +03:00
|
|
|
// Option 2: Do normal stream serialization if its supported.
|
|
|
|
nsCOMPtr<nsIIPCSerializableInputStream> serial = do_QueryInterface(aStream);
|
|
|
|
if (serial) {
|
|
|
|
SerializeNormalStream(aStream, readStream);
|
2015-03-02 16:20:00 +03:00
|
|
|
|
2015-03-22 09:52:12 +03:00
|
|
|
// Option 3: As a last resort push data across manually. Should only be
|
|
|
|
// needed for nsPipe input stream. Only works for async,
|
|
|
|
// non-blocking streams.
|
2015-03-02 16:20:00 +03:00
|
|
|
} else {
|
2015-03-22 09:52:12 +03:00
|
|
|
SerializePushStream(aStream, readStream, aRv);
|
|
|
|
if (NS_WARN_IF(aRv.Failed())) { return; }
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
*aStreamOut = readStream;
|
|
|
|
}
|
|
|
|
|
2015-03-22 09:52:12 +03:00
|
|
|
void
|
|
|
|
TypeUtils::SerializePushStream(nsIInputStream* aStream,
|
2015-04-16 22:00:15 +03:00
|
|
|
CacheReadStream& aReadStreamOut,
|
2015-03-22 09:52:12 +03:00
|
|
|
ErrorResult& aRv)
|
2015-03-02 16:20:00 +03:00
|
|
|
{
|
2015-03-22 09:52:12 +03:00
|
|
|
nsCOMPtr<nsIAsyncInputStream> asyncStream = do_QueryInterface(aStream);
|
|
|
|
if (NS_WARN_IF(!asyncStream)) {
|
|
|
|
aRv = NS_ERROR_FAILURE;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool nonBlocking = false;
|
|
|
|
aRv = asyncStream->IsNonBlocking(&nonBlocking);
|
|
|
|
if (NS_WARN_IF(aRv.Failed())) { return; }
|
|
|
|
if (NS_WARN_IF(!nonBlocking)) {
|
|
|
|
aRv = NS_ERROR_FAILURE;
|
|
|
|
return;
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
2015-03-22 09:52:12 +03:00
|
|
|
aReadStreamOut.pushStreamChild() = CreatePushStream(asyncStream);
|
|
|
|
MOZ_ASSERT(aReadStreamOut.pushStreamChild());
|
|
|
|
aReadStreamOut.params() = void_t();
|
|
|
|
aReadStreamOut.fds() = void_t();
|
|
|
|
|
|
|
|
// CachePushStreamChild::Start() must be called after sending the stream
|
|
|
|
// across to the parent side.
|
2015-03-02 16:20:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace cache
|
|
|
|
} // namespace dom
|
|
|
|
} // namespace mozilla
|