2019-08-15 20:27:07 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "FetchEventOpChild.h"
|
|
|
|
|
|
|
|
#include <utility>
|
|
|
|
|
|
|
|
#include "MainThreadUtils.h"
|
|
|
|
#include "nsContentPolicyUtils.h"
|
|
|
|
#include "nsContentUtils.h"
|
|
|
|
#include "nsDebug.h"
|
|
|
|
#include "nsError.h"
|
|
|
|
#include "nsIChannel.h"
|
|
|
|
#include "nsIConsoleReportCollector.h"
|
|
|
|
#include "nsIContentPolicy.h"
|
|
|
|
#include "nsIInputStream.h"
|
|
|
|
#include "nsILoadInfo.h"
|
|
|
|
#include "nsINetworkInterceptController.h"
|
|
|
|
#include "nsIObserverService.h"
|
|
|
|
#include "nsIScriptError.h"
|
|
|
|
#include "nsISupportsImpl.h"
|
|
|
|
#include "nsIURI.h"
|
|
|
|
#include "nsNetUtil.h"
|
|
|
|
#include "nsProxyRelease.h"
|
|
|
|
#include "nsTArray.h"
|
|
|
|
#include "nsThreadUtils.h"
|
|
|
|
|
|
|
|
#include "ServiceWorkerPrivate.h"
|
|
|
|
#include "mozilla/Assertions.h"
|
|
|
|
#include "mozilla/LoadInfo.h"
|
|
|
|
#include "mozilla/Services.h"
|
2021-07-13 00:10:26 +03:00
|
|
|
#include "mozilla/StaticPrefs_dom.h"
|
2019-08-15 20:27:07 +03:00
|
|
|
#include "mozilla/Telemetry.h"
|
2019-10-12 02:22:31 +03:00
|
|
|
#include "mozilla/UniquePtr.h"
|
2019-08-15 20:27:07 +03:00
|
|
|
#include "mozilla/Unused.h"
|
2019-10-12 02:22:31 +03:00
|
|
|
#include "mozilla/ipc/BackgroundChild.h"
|
2022-01-04 17:42:35 +03:00
|
|
|
#include "mozilla/dom/FetchService.h"
|
2019-08-15 20:27:07 +03:00
|
|
|
#include "mozilla/dom/InternalHeaders.h"
|
|
|
|
#include "mozilla/dom/InternalResponse.h"
|
|
|
|
#include "mozilla/dom/PRemoteWorkerControllerChild.h"
|
|
|
|
#include "mozilla/dom/ServiceWorkerRegistrationInfo.h"
|
|
|
|
#include "mozilla/net/NeckoChannelParams.h"
|
2023-12-13 16:15:12 +03:00
|
|
|
#include "mozilla/dom/RemoteWorkerControllerChild.h"
|
2019-08-15 20:27:07 +03:00
|
|
|
|
2022-05-09 23:41:13 +03:00
|
|
|
namespace mozilla::dom {
|
2019-08-15 20:27:07 +03:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2021-11-08 16:29:32 +03:00
|
|
|
bool CSPPermitsResponse(nsILoadInfo* aLoadInfo,
|
|
|
|
SafeRefPtr<InternalResponse> aResponse,
|
2019-08-15 20:27:07 +03:00
|
|
|
const nsACString& aWorkerScriptSpec) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(aLoadInfo);
|
|
|
|
|
|
|
|
nsCString url = aResponse->GetUnfilteredURL();
|
|
|
|
if (url.IsEmpty()) {
|
|
|
|
// Synthetic response.
|
|
|
|
url = aWorkerScriptSpec;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
nsresult rv = NS_NewURI(getter_AddRefs(uri), url, nullptr, nullptr);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
int16_t decision = nsIContentPolicy::ACCEPT;
|
2024-01-08 18:47:42 +03:00
|
|
|
rv = NS_CheckContentLoadPolicy(uri, aLoadInfo, &decision);
|
2019-08-15 20:27:07 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return decision == nsIContentPolicy::ACCEPT;
|
|
|
|
}
|
|
|
|
|
|
|
|
void AsyncLog(nsIInterceptedChannel* aChannel, const nsACString& aScriptSpec,
|
|
|
|
uint32_t aLineNumber, uint32_t aColumnNumber,
|
|
|
|
const nsACString& aMessageName, nsTArray<nsString>&& aParams) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(aChannel);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIConsoleReportCollector> reporter =
|
|
|
|
aChannel->GetConsoleReportCollector();
|
|
|
|
|
|
|
|
if (reporter) {
|
|
|
|
// NOTE: is appears that `const nsTArray<nsString>&` is required for
|
|
|
|
// nsIConsoleReportCollector::AddConsoleReport to resolve to the correct
|
|
|
|
// overload.
|
|
|
|
const nsTArray<nsString> params = std::move(aParams);
|
|
|
|
|
|
|
|
reporter->AddConsoleReport(
|
|
|
|
nsIScriptError::errorFlag, "Service Worker Interception"_ns,
|
|
|
|
nsContentUtils::eDOM_PROPERTIES, aScriptSpec, aLineNumber,
|
|
|
|
aColumnNumber, aMessageName, params);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
class SynthesizeResponseWatcher final : public nsIInterceptedBodyCallback {
|
|
|
|
public:
|
|
|
|
NS_DECL_THREADSAFE_ISUPPORTS
|
|
|
|
|
|
|
|
SynthesizeResponseWatcher(
|
|
|
|
const nsMainThreadPtrHandle<nsIInterceptedChannel>& aInterceptedChannel,
|
|
|
|
const nsMainThreadPtrHandle<ServiceWorkerRegistrationInfo>& aRegistration,
|
|
|
|
const bool aIsNonSubresourceRequest,
|
|
|
|
FetchEventRespondWithClosure&& aClosure, nsAString&& aRequestURL)
|
|
|
|
: mInterceptedChannel(aInterceptedChannel),
|
|
|
|
mRegistration(aRegistration),
|
|
|
|
mIsNonSubresourceRequest(aIsNonSubresourceRequest),
|
|
|
|
mClosure(std::move(aClosure)),
|
|
|
|
mRequestURL(std::move(aRequestURL)) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
MOZ_ASSERT(mRegistration);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHOD
|
|
|
|
BodyComplete(nsresult aRv) override {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(aRv))) {
|
|
|
|
AsyncLog(mInterceptedChannel, mClosure.respondWithScriptSpec(),
|
|
|
|
mClosure.respondWithLineNumber(),
|
|
|
|
mClosure.respondWithColumnNumber(),
|
|
|
|
"InterceptionFailedWithURL"_ns, {mRequestURL});
|
|
|
|
|
|
|
|
CancelInterception(NS_ERROR_INTERCEPTION_FAILED);
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult rv = mInterceptedChannel->FinishSynthesizedResponse();
|
|
|
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
CancelInterception(rv);
|
|
|
|
}
|
|
|
|
|
|
|
|
mInterceptedChannel = nullptr;
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// See FetchEventOpChild::MaybeScheduleRegistrationUpdate() for comments.
|
|
|
|
void CancelInterception(nsresult aStatus) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
MOZ_ASSERT(mRegistration);
|
|
|
|
|
|
|
|
mInterceptedChannel->CancelInterception(aStatus);
|
|
|
|
|
|
|
|
if (mIsNonSubresourceRequest) {
|
|
|
|
mRegistration->MaybeScheduleUpdate();
|
|
|
|
} else {
|
|
|
|
mRegistration->MaybeScheduleTimeCheckAndUpdate();
|
|
|
|
}
|
|
|
|
|
|
|
|
mInterceptedChannel = nullptr;
|
|
|
|
mRegistration = nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
~SynthesizeResponseWatcher() {
|
|
|
|
if (NS_WARN_IF(mInterceptedChannel)) {
|
|
|
|
CancelInterception(NS_ERROR_DOM_ABORT_ERR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsMainThreadPtrHandle<nsIInterceptedChannel> mInterceptedChannel;
|
|
|
|
nsMainThreadPtrHandle<ServiceWorkerRegistrationInfo> mRegistration;
|
|
|
|
const bool mIsNonSubresourceRequest;
|
|
|
|
const FetchEventRespondWithClosure mClosure;
|
|
|
|
const nsString mRequestURL;
|
|
|
|
};
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(SynthesizeResponseWatcher, nsIInterceptedBodyCallback)
|
|
|
|
|
|
|
|
} // anonymous namespace
|
|
|
|
|
2019-10-12 02:22:31 +03:00
|
|
|
/* static */ RefPtr<GenericPromise> FetchEventOpChild::SendFetchEvent(
|
2019-08-15 20:27:07 +03:00
|
|
|
PRemoteWorkerControllerChild* aManager,
|
2021-11-19 19:45:19 +03:00
|
|
|
ParentToParentServiceWorkerFetchEventOpArgs&& aArgs,
|
2019-08-15 20:27:07 +03:00
|
|
|
nsCOMPtr<nsIInterceptedChannel> aInterceptedChannel,
|
|
|
|
RefPtr<ServiceWorkerRegistrationInfo> aRegistration,
|
2022-05-11 22:40:47 +03:00
|
|
|
RefPtr<FetchServicePromises>&& aPreloadResponseReadyPromises,
|
2019-08-15 20:27:07 +03:00
|
|
|
RefPtr<KeepAliveToken>&& aKeepAliveToken) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(aManager);
|
|
|
|
MOZ_ASSERT(aInterceptedChannel);
|
|
|
|
MOZ_ASSERT(aKeepAliveToken);
|
|
|
|
|
|
|
|
FetchEventOpChild* actor = new FetchEventOpChild(
|
|
|
|
std::move(aArgs), std::move(aInterceptedChannel),
|
2022-05-11 22:40:47 +03:00
|
|
|
std::move(aRegistration), std::move(aPreloadResponseReadyPromises),
|
2021-11-09 23:24:27 +03:00
|
|
|
std::move(aKeepAliveToken));
|
2019-10-12 02:22:31 +03:00
|
|
|
|
2021-11-09 23:24:27 +03:00
|
|
|
actor->mWasSent = true;
|
2023-08-07 21:31:03 +03:00
|
|
|
RefPtr<GenericPromise> promise = actor->mPromiseHolder.Ensure(__func__);
|
2019-08-15 20:27:07 +03:00
|
|
|
Unused << aManager->SendPFetchEventOpConstructor(actor, actor->mArgs);
|
2023-08-07 21:31:03 +03:00
|
|
|
// NOTE: actor may have been destroyed
|
|
|
|
return promise;
|
2019-08-15 20:27:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
FetchEventOpChild::~FetchEventOpChild() {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannelHandled);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(mPromiseHolder.IsEmpty());
|
|
|
|
}
|
|
|
|
|
|
|
|
FetchEventOpChild::FetchEventOpChild(
|
2021-11-19 19:45:19 +03:00
|
|
|
ParentToParentServiceWorkerFetchEventOpArgs&& aArgs,
|
2019-08-15 20:27:07 +03:00
|
|
|
nsCOMPtr<nsIInterceptedChannel>&& aInterceptedChannel,
|
|
|
|
RefPtr<ServiceWorkerRegistrationInfo>&& aRegistration,
|
2022-05-11 22:40:47 +03:00
|
|
|
RefPtr<FetchServicePromises>&& aPreloadResponseReadyPromises,
|
2019-08-15 20:27:07 +03:00
|
|
|
RefPtr<KeepAliveToken>&& aKeepAliveToken)
|
|
|
|
: mArgs(std::move(aArgs)),
|
|
|
|
mInterceptedChannel(std::move(aInterceptedChannel)),
|
|
|
|
mRegistration(std::move(aRegistration)),
|
2022-01-04 17:42:35 +03:00
|
|
|
mKeepAliveToken(std::move(aKeepAliveToken)),
|
2022-05-11 22:40:47 +03:00
|
|
|
mPreloadResponseReadyPromises(std::move(aPreloadResponseReadyPromises)) {
|
|
|
|
if (mPreloadResponseReadyPromises) {
|
2021-11-09 23:24:27 +03:00
|
|
|
// This promise should be configured to use synchronous dispatch, so if it's
|
|
|
|
// already resolved when we run this code then the callback will be called
|
|
|
|
// synchronously and pass the preload response with the constructor message.
|
|
|
|
//
|
|
|
|
// Note that it's fine to capture the this pointer in the callbacks because
|
|
|
|
// we disconnect the request in Recv__delete__().
|
2022-05-11 22:40:47 +03:00
|
|
|
mPreloadResponseReadyPromises->GetResponseAvailablePromise()
|
2021-11-09 23:24:27 +03:00
|
|
|
->Then(
|
|
|
|
GetCurrentSerialEventTarget(), __func__,
|
2022-02-27 03:26:22 +03:00
|
|
|
[this](FetchServiceResponse&& aResponse) {
|
2021-11-09 23:24:27 +03:00
|
|
|
if (!mWasSent) {
|
|
|
|
// The actor wasn't sent yet, we can still send the preload
|
|
|
|
// response with it.
|
2022-05-11 22:40:47 +03:00
|
|
|
mArgs.preloadResponse() =
|
|
|
|
Some(aResponse->ToParentToParentInternalResponse());
|
2021-11-09 23:24:27 +03:00
|
|
|
} else {
|
|
|
|
// It's too late to send the preload response with the actor, we
|
|
|
|
// have to send it in a separate message.
|
2022-05-11 22:40:47 +03:00
|
|
|
SendPreloadResponse(
|
|
|
|
aResponse->ToParentToParentInternalResponse());
|
2021-11-09 23:24:27 +03:00
|
|
|
}
|
2022-05-11 22:40:47 +03:00
|
|
|
mPreloadResponseAvailablePromiseRequestHolder.Complete();
|
2021-11-09 23:24:27 +03:00
|
|
|
},
|
|
|
|
[this](const CopyableErrorResult&) {
|
2022-05-11 22:40:47 +03:00
|
|
|
mPreloadResponseAvailablePromiseRequestHolder.Complete();
|
2021-11-09 23:24:27 +03:00
|
|
|
})
|
2022-05-11 22:40:47 +03:00
|
|
|
->Track(mPreloadResponseAvailablePromiseRequestHolder);
|
|
|
|
|
2023-02-23 05:52:54 +03:00
|
|
|
mPreloadResponseReadyPromises->GetResponseTimingPromise()
|
|
|
|
->Then(
|
|
|
|
GetCurrentSerialEventTarget(), __func__,
|
|
|
|
[this](ResponseTiming&& aTiming) {
|
|
|
|
if (!mWasSent) {
|
|
|
|
// The actor wasn't sent yet, we can still send the preload
|
|
|
|
// response timing with it.
|
|
|
|
mArgs.preloadResponseTiming() = Some(std::move(aTiming));
|
|
|
|
} else {
|
|
|
|
SendPreloadResponseTiming(aTiming);
|
|
|
|
}
|
|
|
|
mPreloadResponseTimingPromiseRequestHolder.Complete();
|
|
|
|
},
|
|
|
|
[this](const CopyableErrorResult&) {
|
|
|
|
mPreloadResponseTimingPromiseRequestHolder.Complete();
|
|
|
|
})
|
|
|
|
->Track(mPreloadResponseTimingPromiseRequestHolder);
|
|
|
|
|
2022-05-11 22:40:47 +03:00
|
|
|
mPreloadResponseReadyPromises->GetResponseEndPromise()
|
|
|
|
->Then(
|
|
|
|
GetCurrentSerialEventTarget(), __func__,
|
|
|
|
[this](ResponseEndArgs&& aResponse) {
|
|
|
|
if (!mWasSent) {
|
|
|
|
// The actor wasn't sent yet, we can still send the preload
|
|
|
|
// response end args with it.
|
|
|
|
mArgs.preloadResponseEndArgs() = Some(std::move(aResponse));
|
|
|
|
} else {
|
|
|
|
// It's too late to send the preload response end with the
|
|
|
|
// actor, we have to send it in a separate message.
|
|
|
|
SendPreloadResponseEnd(aResponse);
|
|
|
|
}
|
|
|
|
mPreloadResponseReadyPromises = nullptr;
|
|
|
|
mPreloadResponseEndPromiseRequestHolder.Complete();
|
|
|
|
},
|
|
|
|
[this](const CopyableErrorResult&) {
|
|
|
|
mPreloadResponseReadyPromises = nullptr;
|
|
|
|
mPreloadResponseEndPromiseRequestHolder.Complete();
|
|
|
|
})
|
|
|
|
->Track(mPreloadResponseEndPromiseRequestHolder);
|
2021-11-09 23:24:27 +03:00
|
|
|
}
|
|
|
|
}
|
2019-08-15 20:27:07 +03:00
|
|
|
|
|
|
|
mozilla::ipc::IPCResult FetchEventOpChild::RecvAsyncLog(
|
|
|
|
const nsCString& aScriptSpec, const uint32_t& aLineNumber,
|
|
|
|
const uint32_t& aColumnNumber, const nsCString& aMessageName,
|
|
|
|
nsTArray<nsString>&& aParams) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
|
|
|
|
AsyncLog(mInterceptedChannel, aScriptSpec, aLineNumber, aColumnNumber,
|
|
|
|
aMessageName, std::move(aParams));
|
|
|
|
|
|
|
|
return IPC_OK();
|
|
|
|
}
|
|
|
|
|
|
|
|
mozilla::ipc::IPCResult FetchEventOpChild::RecvRespondWith(
|
2021-11-19 19:45:19 +03:00
|
|
|
ParentToParentFetchEventRespondWithResult&& aResult) {
|
2019-08-15 20:27:07 +03:00
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
2023-12-13 16:15:12 +03:00
|
|
|
RefPtr<RemoteWorkerControllerChild> mgr =
|
|
|
|
static_cast<RemoteWorkerControllerChild*>(Manager());
|
|
|
|
|
|
|
|
mInterceptedChannel->SetRemoteWorkerLaunchStart(
|
|
|
|
mgr->GetRemoteWorkerLaunchStart());
|
|
|
|
mInterceptedChannel->SetRemoteWorkerLaunchEnd(
|
|
|
|
mgr->GetRemoteWorkerLaunchEnd());
|
|
|
|
|
2019-08-15 20:27:07 +03:00
|
|
|
switch (aResult.type()) {
|
2021-11-19 19:45:19 +03:00
|
|
|
case ParentToParentFetchEventRespondWithResult::
|
|
|
|
TParentToParentSynthesizeResponseArgs:
|
Bug 1693074 - Adding telemetry for evaluating the duration of fetch event dispatching and response synthesizing. r=dom-worker-reviewers,asuth
This patch tries to record the fetch event dispatching time, the response's synthesizing time, and interception resetting time.
Fetch event dispatching time is the time duration between interception starts, which is the time point of InterceptedHttpChannel::AsyncOpenInternal(), and the fetch handler starts. It includes the InterceptedHttpChannel setup time, ServiceWorker launch time, FetchEventOp propagation through IPC, a FetchEvent creation, initialization, and dispatching/scheduling on worker scope.
Response synthesizing time is the time duration between the fetch handler finishes, which is the resolving/rejecting promise of respondWith(), to the finish of pumping the synthesized response to InterceptedHttpChannel, which is the time point of calling InterceptedHttpChannel::OnStopRequest(). It includes the response propagation through IPC, response header and body synthesis, and pumping synthesized response to the channel.
Interception resetting time is the time duration between the fetch handler finishes and redirecting InterceptedHttpChannel to a normal HTTP channel.
Since the fetch handler is executed on the process where the service worker spawned, the timestamps related to the fetch handler need to be get on that process. So this patch adds the FetchHandlerStart and FetchHandlerFinish on IPCFetchEventRespondWithResult related types to propagate the timestamps to the parent process.
Depends on D118398
Differential Revision: https://phabricator.services.mozilla.com/D118399
2021-08-22 14:02:18 +03:00
|
|
|
mInterceptedChannel->SetFetchHandlerStart(
|
2021-11-19 19:45:19 +03:00
|
|
|
aResult.get_ParentToParentSynthesizeResponseArgs()
|
Bug 1693074 - Adding telemetry for evaluating the duration of fetch event dispatching and response synthesizing. r=dom-worker-reviewers,asuth
This patch tries to record the fetch event dispatching time, the response's synthesizing time, and interception resetting time.
Fetch event dispatching time is the time duration between interception starts, which is the time point of InterceptedHttpChannel::AsyncOpenInternal(), and the fetch handler starts. It includes the InterceptedHttpChannel setup time, ServiceWorker launch time, FetchEventOp propagation through IPC, a FetchEvent creation, initialization, and dispatching/scheduling on worker scope.
Response synthesizing time is the time duration between the fetch handler finishes, which is the resolving/rejecting promise of respondWith(), to the finish of pumping the synthesized response to InterceptedHttpChannel, which is the time point of calling InterceptedHttpChannel::OnStopRequest(). It includes the response propagation through IPC, response header and body synthesis, and pumping synthesized response to the channel.
Interception resetting time is the time duration between the fetch handler finishes and redirecting InterceptedHttpChannel to a normal HTTP channel.
Since the fetch handler is executed on the process where the service worker spawned, the timestamps related to the fetch handler need to be get on that process. So this patch adds the FetchHandlerStart and FetchHandlerFinish on IPCFetchEventRespondWithResult related types to propagate the timestamps to the parent process.
Depends on D118398
Differential Revision: https://phabricator.services.mozilla.com/D118399
2021-08-22 14:02:18 +03:00
|
|
|
.timeStamps()
|
|
|
|
.fetchHandlerStart());
|
|
|
|
mInterceptedChannel->SetFetchHandlerFinish(
|
2021-11-19 19:45:19 +03:00
|
|
|
aResult.get_ParentToParentSynthesizeResponseArgs()
|
Bug 1693074 - Adding telemetry for evaluating the duration of fetch event dispatching and response synthesizing. r=dom-worker-reviewers,asuth
This patch tries to record the fetch event dispatching time, the response's synthesizing time, and interception resetting time.
Fetch event dispatching time is the time duration between interception starts, which is the time point of InterceptedHttpChannel::AsyncOpenInternal(), and the fetch handler starts. It includes the InterceptedHttpChannel setup time, ServiceWorker launch time, FetchEventOp propagation through IPC, a FetchEvent creation, initialization, and dispatching/scheduling on worker scope.
Response synthesizing time is the time duration between the fetch handler finishes, which is the resolving/rejecting promise of respondWith(), to the finish of pumping the synthesized response to InterceptedHttpChannel, which is the time point of calling InterceptedHttpChannel::OnStopRequest(). It includes the response propagation through IPC, response header and body synthesis, and pumping synthesized response to the channel.
Interception resetting time is the time duration between the fetch handler finishes and redirecting InterceptedHttpChannel to a normal HTTP channel.
Since the fetch handler is executed on the process where the service worker spawned, the timestamps related to the fetch handler need to be get on that process. So this patch adds the FetchHandlerStart and FetchHandlerFinish on IPCFetchEventRespondWithResult related types to propagate the timestamps to the parent process.
Depends on D118398
Differential Revision: https://phabricator.services.mozilla.com/D118399
2021-08-22 14:02:18 +03:00
|
|
|
.timeStamps()
|
|
|
|
.fetchHandlerFinish());
|
2021-11-19 19:45:19 +03:00
|
|
|
SynthesizeResponse(
|
|
|
|
std::move(aResult.get_ParentToParentSynthesizeResponseArgs()));
|
2019-08-15 20:27:07 +03:00
|
|
|
break;
|
2021-11-19 19:45:19 +03:00
|
|
|
case ParentToParentFetchEventRespondWithResult::TResetInterceptionArgs:
|
Bug 1693074 - Adding telemetry for evaluating the duration of fetch event dispatching and response synthesizing. r=dom-worker-reviewers,asuth
This patch tries to record the fetch event dispatching time, the response's synthesizing time, and interception resetting time.
Fetch event dispatching time is the time duration between interception starts, which is the time point of InterceptedHttpChannel::AsyncOpenInternal(), and the fetch handler starts. It includes the InterceptedHttpChannel setup time, ServiceWorker launch time, FetchEventOp propagation through IPC, a FetchEvent creation, initialization, and dispatching/scheduling on worker scope.
Response synthesizing time is the time duration between the fetch handler finishes, which is the resolving/rejecting promise of respondWith(), to the finish of pumping the synthesized response to InterceptedHttpChannel, which is the time point of calling InterceptedHttpChannel::OnStopRequest(). It includes the response propagation through IPC, response header and body synthesis, and pumping synthesized response to the channel.
Interception resetting time is the time duration between the fetch handler finishes and redirecting InterceptedHttpChannel to a normal HTTP channel.
Since the fetch handler is executed on the process where the service worker spawned, the timestamps related to the fetch handler need to be get on that process. So this patch adds the FetchHandlerStart and FetchHandlerFinish on IPCFetchEventRespondWithResult related types to propagate the timestamps to the parent process.
Depends on D118398
Differential Revision: https://phabricator.services.mozilla.com/D118399
2021-08-22 14:02:18 +03:00
|
|
|
mInterceptedChannel->SetFetchHandlerStart(
|
|
|
|
aResult.get_ResetInterceptionArgs().timeStamps().fetchHandlerStart());
|
|
|
|
mInterceptedChannel->SetFetchHandlerFinish(
|
|
|
|
aResult.get_ResetInterceptionArgs()
|
|
|
|
.timeStamps()
|
|
|
|
.fetchHandlerFinish());
|
2021-07-13 00:10:26 +03:00
|
|
|
ResetInterception(false);
|
2019-08-15 20:27:07 +03:00
|
|
|
break;
|
2021-11-19 19:45:19 +03:00
|
|
|
case ParentToParentFetchEventRespondWithResult::TCancelInterceptionArgs:
|
Bug 1693074 - Adding telemetry for evaluating the duration of fetch event dispatching and response synthesizing. r=dom-worker-reviewers,asuth
This patch tries to record the fetch event dispatching time, the response's synthesizing time, and interception resetting time.
Fetch event dispatching time is the time duration between interception starts, which is the time point of InterceptedHttpChannel::AsyncOpenInternal(), and the fetch handler starts. It includes the InterceptedHttpChannel setup time, ServiceWorker launch time, FetchEventOp propagation through IPC, a FetchEvent creation, initialization, and dispatching/scheduling on worker scope.
Response synthesizing time is the time duration between the fetch handler finishes, which is the resolving/rejecting promise of respondWith(), to the finish of pumping the synthesized response to InterceptedHttpChannel, which is the time point of calling InterceptedHttpChannel::OnStopRequest(). It includes the response propagation through IPC, response header and body synthesis, and pumping synthesized response to the channel.
Interception resetting time is the time duration between the fetch handler finishes and redirecting InterceptedHttpChannel to a normal HTTP channel.
Since the fetch handler is executed on the process where the service worker spawned, the timestamps related to the fetch handler need to be get on that process. So this patch adds the FetchHandlerStart and FetchHandlerFinish on IPCFetchEventRespondWithResult related types to propagate the timestamps to the parent process.
Depends on D118398
Differential Revision: https://phabricator.services.mozilla.com/D118399
2021-08-22 14:02:18 +03:00
|
|
|
mInterceptedChannel->SetFetchHandlerStart(
|
|
|
|
aResult.get_CancelInterceptionArgs()
|
|
|
|
.timeStamps()
|
|
|
|
.fetchHandlerStart());
|
|
|
|
mInterceptedChannel->SetFetchHandlerFinish(
|
|
|
|
aResult.get_CancelInterceptionArgs()
|
|
|
|
.timeStamps()
|
|
|
|
.fetchHandlerFinish());
|
2019-08-15 20:27:07 +03:00
|
|
|
CancelInterception(aResult.get_CancelInterceptionArgs().status());
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
MOZ_CRASH("Unknown IPCFetchEventRespondWithResult type!");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return IPC_OK();
|
|
|
|
}
|
|
|
|
|
|
|
|
mozilla::ipc::IPCResult FetchEventOpChild::Recv__delete__(
|
|
|
|
const ServiceWorkerFetchEventOpResult& aResult) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mRegistration);
|
|
|
|
|
|
|
|
if (NS_WARN_IF(!mInterceptedChannelHandled)) {
|
|
|
|
MOZ_ASSERT(NS_FAILED(aResult.rv()));
|
|
|
|
NS_WARNING(
|
|
|
|
"Failed to handle intercepted network request; canceling "
|
|
|
|
"interception!");
|
|
|
|
|
|
|
|
CancelInterception(aResult.rv());
|
|
|
|
}
|
|
|
|
|
|
|
|
mPromiseHolder.ResolveIfExists(true, __func__);
|
2022-09-21 11:48:26 +03:00
|
|
|
|
|
|
|
// FetchEvent is completed.
|
|
|
|
// Disconnect preload response related promises and cancel the preload.
|
2022-05-11 22:40:47 +03:00
|
|
|
mPreloadResponseAvailablePromiseRequestHolder.DisconnectIfExists();
|
2023-02-23 05:52:54 +03:00
|
|
|
mPreloadResponseTimingPromiseRequestHolder.DisconnectIfExists();
|
2022-05-11 22:40:47 +03:00
|
|
|
mPreloadResponseEndPromiseRequestHolder.DisconnectIfExists();
|
|
|
|
if (mPreloadResponseReadyPromises) {
|
2022-01-04 17:42:35 +03:00
|
|
|
RefPtr<FetchService> fetchService = FetchService::GetInstance();
|
2022-05-11 22:40:47 +03:00
|
|
|
fetchService->CancelFetch(std::move(mPreloadResponseReadyPromises));
|
2022-01-04 17:42:35 +03:00
|
|
|
}
|
2019-08-15 20:27:07 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* This corresponds to the "Fire Functional Event" algorithm's step 9:
|
|
|
|
*
|
|
|
|
* "If the time difference in seconds calculated by the current time minus
|
|
|
|
* registration's last update check time is greater than 84600, invoke Soft
|
|
|
|
* Update algorithm with registration."
|
|
|
|
*
|
|
|
|
* TODO: this is probably being called later than it should be; it should be
|
|
|
|
* called ASAP after dispatching the FetchEvent.
|
|
|
|
*/
|
|
|
|
mRegistration->MaybeScheduleTimeCheckAndUpdate();
|
|
|
|
|
|
|
|
return IPC_OK();
|
|
|
|
}
|
|
|
|
|
|
|
|
void FetchEventOpChild::ActorDestroy(ActorDestroyReason) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
// If `Recv__delete__` was called, it would have resolved the promise already.
|
|
|
|
mPromiseHolder.RejectIfExists(NS_ERROR_DOM_ABORT_ERR, __func__);
|
|
|
|
|
|
|
|
if (NS_WARN_IF(!mInterceptedChannelHandled)) {
|
|
|
|
Unused << Recv__delete__(NS_ERROR_DOM_ABORT_ERR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult FetchEventOpChild::StartSynthesizedResponse(
|
2021-11-19 19:45:19 +03:00
|
|
|
ParentToParentSynthesizeResponseArgs&& aArgs) {
|
2019-08-15 20:27:07 +03:00
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
MOZ_ASSERT(!mInterceptedChannelHandled);
|
|
|
|
MOZ_ASSERT(mRegistration);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* TODO: moving the IPCInternalResponse won't do anything right now because
|
|
|
|
* there isn't a prefect-forwarding or rvalue-ref-parameter overload of
|
|
|
|
* `InternalResponse::FromIPC().`
|
|
|
|
*/
|
2021-11-08 16:29:32 +03:00
|
|
|
SafeRefPtr<InternalResponse> response =
|
2019-08-15 20:27:07 +03:00
|
|
|
InternalResponse::FromIPC(aArgs.internalResponse());
|
|
|
|
if (NS_WARN_IF(!response)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIChannel> underlyingChannel;
|
|
|
|
nsresult rv =
|
|
|
|
mInterceptedChannel->GetChannel(getter_AddRefs(underlyingChannel));
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv)) || NS_WARN_IF(!underlyingChannel)) {
|
|
|
|
return NS_FAILED(rv) ? rv : NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = underlyingChannel->LoadInfo();
|
2021-11-08 16:29:32 +03:00
|
|
|
if (!CSPPermitsResponse(loadInfo, response.clonePtr(),
|
2021-11-19 19:45:19 +03:00
|
|
|
mArgs.common().workerScriptSpec())) {
|
2019-08-15 20:27:07 +03:00
|
|
|
return NS_ERROR_CONTENT_BLOCKED;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_ASSERT(response->GetChannelInfo().IsInitialized());
|
|
|
|
ChannelInfo channelInfo = response->GetChannelInfo();
|
|
|
|
rv = mInterceptedChannel->SetChannelInfo(&channelInfo);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return NS_ERROR_INTERCEPTION_FAILED;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = mInterceptedChannel->SynthesizeStatus(
|
|
|
|
response->GetUnfilteredStatus(), response->GetUnfilteredStatusText());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
AutoTArray<InternalHeaders::Entry, 5> entries;
|
|
|
|
response->UnfilteredHeaders()->GetEntries(entries);
|
|
|
|
for (auto& entry : entries) {
|
|
|
|
mInterceptedChannel->SynthesizeHeader(entry.mName, entry.mValue);
|
|
|
|
}
|
|
|
|
|
|
|
|
auto castLoadInfo = static_cast<mozilla::net::LoadInfo*>(loadInfo.get());
|
|
|
|
castLoadInfo->SynthesizeServiceWorkerTainting(response->GetTainting());
|
|
|
|
|
|
|
|
// Get the preferred alternative data type of the outer channel
|
2020-09-23 18:17:15 +03:00
|
|
|
nsAutoCString preferredAltDataType(""_ns);
|
2019-08-15 20:27:07 +03:00
|
|
|
nsCOMPtr<nsICacheInfoChannel> outerChannel =
|
|
|
|
do_QueryInterface(underlyingChannel);
|
|
|
|
if (outerChannel &&
|
|
|
|
!outerChannel->PreferredAlternativeDataTypes().IsEmpty()) {
|
|
|
|
preferredAltDataType.Assign(
|
|
|
|
outerChannel->PreferredAlternativeDataTypes()[0].type());
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> body;
|
|
|
|
if (preferredAltDataType.Equals(response->GetAlternativeDataType())) {
|
|
|
|
body = response->TakeAlternativeBody();
|
|
|
|
}
|
|
|
|
if (!body) {
|
|
|
|
response->GetUnfilteredBody(getter_AddRefs(body));
|
|
|
|
} else {
|
|
|
|
Telemetry::ScalarAdd(Telemetry::ScalarID::SW_ALTERNATIVE_BODY_USED_COUNT,
|
|
|
|
1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Propagate the URL to the content if the request mode is not "navigate".
|
|
|
|
// Note that, we only reflect the final URL if the response.redirected is
|
|
|
|
// false. We propagate all the URLs if the response.redirected is true.
|
2021-11-19 19:45:19 +03:00
|
|
|
const IPCInternalRequest& request = mArgs.common().internalRequest();
|
2019-08-15 20:27:07 +03:00
|
|
|
nsAutoCString responseURL;
|
|
|
|
if (request.requestMode() != RequestMode::Navigate) {
|
|
|
|
responseURL = response->GetUnfilteredURL();
|
|
|
|
|
|
|
|
// Similar to how we apply the request fragment to redirects automatically
|
|
|
|
// we also want to apply it automatically when propagating the response
|
|
|
|
// URL from a service worker interception. Currently response.url strips
|
|
|
|
// the fragment, so this will never conflict with an existing fragment
|
|
|
|
// on the response. In the future we will have to check for a response
|
|
|
|
// fragment and avoid overriding in that case.
|
|
|
|
if (!request.fragment().IsEmpty() && !responseURL.IsEmpty()) {
|
|
|
|
MOZ_ASSERT(!responseURL.Contains('#'));
|
|
|
|
responseURL.AppendLiteral("#");
|
|
|
|
responseURL.Append(request.fragment());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsMainThreadPtrHandle<nsIInterceptedChannel> interceptedChannel(
|
|
|
|
new nsMainThreadPtrHolder<nsIInterceptedChannel>(
|
|
|
|
"nsIInterceptedChannel", mInterceptedChannel, false));
|
|
|
|
|
|
|
|
nsMainThreadPtrHandle<ServiceWorkerRegistrationInfo> registration(
|
|
|
|
new nsMainThreadPtrHolder<ServiceWorkerRegistrationInfo>(
|
|
|
|
"ServiceWorkerRegistrationInfo", mRegistration, false));
|
|
|
|
|
|
|
|
nsCString requestURL = request.urlList().LastElement();
|
|
|
|
if (!request.fragment().IsEmpty()) {
|
|
|
|
requestURL.AppendLiteral("#");
|
|
|
|
requestURL.Append(request.fragment());
|
|
|
|
}
|
|
|
|
|
|
|
|
RefPtr<SynthesizeResponseWatcher> watcher = new SynthesizeResponseWatcher(
|
2021-11-19 19:45:19 +03:00
|
|
|
interceptedChannel, registration,
|
|
|
|
mArgs.common().isNonSubresourceRequest(), std::move(aArgs.closure()),
|
|
|
|
NS_ConvertUTF8toUTF16(responseURL));
|
2019-08-15 20:27:07 +03:00
|
|
|
|
|
|
|
rv = mInterceptedChannel->StartSynthesizedResponse(
|
|
|
|
body, watcher, nullptr /* TODO */, responseURL, response->IsRedirected());
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIObserverService> obsService = services::GetObserverService();
|
|
|
|
if (obsService) {
|
|
|
|
obsService->NotifyObservers(underlyingChannel,
|
|
|
|
"service-worker-synthesized-response", nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2021-11-19 19:45:19 +03:00
|
|
|
void FetchEventOpChild::SynthesizeResponse(
|
|
|
|
ParentToParentSynthesizeResponseArgs&& aArgs) {
|
2019-08-15 20:27:07 +03:00
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
MOZ_ASSERT(!mInterceptedChannelHandled);
|
|
|
|
|
|
|
|
nsresult rv = StartSynthesizedResponse(std::move(aArgs));
|
|
|
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
NS_WARNING("Failed to synthesize response!");
|
|
|
|
|
|
|
|
mInterceptedChannel->CancelInterception(rv);
|
|
|
|
}
|
|
|
|
|
|
|
|
mInterceptedChannelHandled = true;
|
|
|
|
|
|
|
|
MaybeScheduleRegistrationUpdate();
|
|
|
|
}
|
|
|
|
|
2021-07-13 00:10:26 +03:00
|
|
|
void FetchEventOpChild::ResetInterception(bool aBypass) {
|
2019-08-15 20:27:07 +03:00
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
MOZ_ASSERT(!mInterceptedChannelHandled);
|
|
|
|
|
2021-07-13 00:10:26 +03:00
|
|
|
nsresult rv = mInterceptedChannel->ResetInterception(aBypass);
|
2019-08-15 20:27:07 +03:00
|
|
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
NS_WARNING("Failed to resume intercepted network request!");
|
|
|
|
|
|
|
|
mInterceptedChannel->CancelInterception(rv);
|
|
|
|
}
|
|
|
|
|
|
|
|
mInterceptedChannelHandled = true;
|
|
|
|
|
|
|
|
MaybeScheduleRegistrationUpdate();
|
|
|
|
}
|
|
|
|
|
|
|
|
void FetchEventOpChild::CancelInterception(nsresult aStatus) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mInterceptedChannel);
|
|
|
|
MOZ_ASSERT(!mInterceptedChannelHandled);
|
|
|
|
MOZ_ASSERT(NS_FAILED(aStatus));
|
|
|
|
|
2021-07-13 00:10:26 +03:00
|
|
|
// Report a navigation fault if this is a navigation (and we have an active
|
|
|
|
// worker, which should be the case in non-shutdown/content-process-crash
|
|
|
|
// situations).
|
|
|
|
RefPtr<ServiceWorkerInfo> mActive = mRegistration->GetActive();
|
2021-11-19 19:45:19 +03:00
|
|
|
if (mActive && mArgs.common().isNonSubresourceRequest()) {
|
2021-07-13 00:10:26 +03:00
|
|
|
mActive->ReportNavigationFault();
|
2021-07-21 02:35:11 +03:00
|
|
|
// Additional mitigations such as unregistering the registration are handled
|
|
|
|
// in ServiceWorkerRegistrationInfo::MaybeScheduleUpdate which will be
|
|
|
|
// called by MaybeScheduleRegistrationUpdate which gets called by our call
|
|
|
|
// to ResetInterception.
|
2021-07-13 00:10:26 +03:00
|
|
|
if (StaticPrefs::dom_serviceWorkers_mitigations_bypass_on_fault()) {
|
|
|
|
ResetInterception(true);
|
|
|
|
return;
|
|
|
|
}
|
2021-07-13 00:10:26 +03:00
|
|
|
}
|
|
|
|
|
2019-08-15 20:27:07 +03:00
|
|
|
mInterceptedChannel->CancelInterception(aStatus);
|
|
|
|
mInterceptedChannelHandled = true;
|
|
|
|
|
|
|
|
MaybeScheduleRegistrationUpdate();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This corresponds to the "Handle Fetch" algorithm's steps 20.3, 21.2, and
|
|
|
|
* 22.2:
|
|
|
|
*
|
|
|
|
* "If request is a non-subresource request, or request is a subresource
|
|
|
|
* request and the time difference in seconds calculated by the current time
|
|
|
|
* minus registration's last update check time is greater than 86400, invoke
|
|
|
|
* Soft Update algorithm with registration."
|
|
|
|
*/
|
|
|
|
void FetchEventOpChild::MaybeScheduleRegistrationUpdate() const {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mRegistration);
|
|
|
|
MOZ_ASSERT(mInterceptedChannelHandled);
|
|
|
|
|
2021-11-19 19:45:19 +03:00
|
|
|
if (mArgs.common().isNonSubresourceRequest()) {
|
2019-08-15 20:27:07 +03:00
|
|
|
mRegistration->MaybeScheduleUpdate();
|
|
|
|
} else {
|
|
|
|
mRegistration->MaybeScheduleTimeCheckAndUpdate();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-09 23:41:13 +03:00
|
|
|
} // namespace mozilla::dom
|