/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef mozilla_dom_PerformanceResourceTiming_h___ #define mozilla_dom_PerformanceResourceTiming_h___ #include "mozilla/UniquePtr.h" #include "nsCOMPtr.h" #include "Performance.h" #include "PerformanceEntry.h" #include "PerformanceServerTiming.h" #include "PerformanceTiming.h" namespace mozilla::dom { // http://www.w3.org/TR/resource-timing/#performanceresourcetiming class PerformanceResourceTiming : public PerformanceEntry { public: using TimeStamp = mozilla::TimeStamp; NS_DECL_ISUPPORTS_INHERITED NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS_INHERITED( PerformanceResourceTiming, PerformanceEntry) // aPerformanceTimingData and aPerformance must be non-null PerformanceResourceTiming( UniquePtr&& aPerformanceTimingData, Performance* aPerformance, const nsAString& aName); virtual JSObject* WrapObject(JSContext* aCx, JS::Handle aGivenProto) override; virtual DOMHighResTimeStamp StartTime() const override; virtual DOMHighResTimeStamp Duration() const override { return ResponseEnd() - StartTime(); } void GetInitiatorType(nsAString& aInitiatorType) const { aInitiatorType = mInitiatorType; } void SetInitiatorType(const nsAString& aInitiatorType) { mInitiatorType = aInitiatorType; } void GetNextHopProtocol(nsAString& aNextHopProtocol) const { aNextHopProtocol = mTimingData->NextHopProtocol(); } DOMHighResTimeStamp WorkerStart() const { return mTimingData->WorkerStartHighRes(mPerformance); } DOMHighResTimeStamp FetchStart() const; DOMHighResTimeStamp RedirectStart(Maybe& aSubjectPrincipal, bool aEnsureSameOriginAndIgnoreTAO) const { // We have to check if all the redirect URIs whether had the same origin or // different origins with TAO headers set (since there is no check in // RedirectStartHighRes()) return ReportRedirectForCaller(aSubjectPrincipal, aEnsureSameOriginAndIgnoreTAO) ? mTimingData->RedirectStartHighRes(mPerformance) : 0; } virtual DOMHighResTimeStamp RedirectStart( Maybe& aSubjectPrincipal) const { return RedirectStart(aSubjectPrincipal, false /* aEnsureSameOriginAndIgnoreTAO */); } DOMHighResTimeStamp RedirectEnd(Maybe& aSubjectPrincipal, bool aEnsureSameOriginAndIgnoreTAO) const { // We have to check if all the redirect URIs whether had the same origin or // different origins with TAO headers set (since there is no check in // RedirectEndHighRes()) return ReportRedirectForCaller(aSubjectPrincipal, aEnsureSameOriginAndIgnoreTAO) ? mTimingData->RedirectEndHighRes(mPerformance) : 0; } virtual DOMHighResTimeStamp RedirectEnd( Maybe& aSubjectPrincipal) const { return RedirectEnd(aSubjectPrincipal, false /* aEnsureSameOriginAndIgnoreTAO */); } DOMHighResTimeStamp DomainLookupStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->DomainLookupStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp DomainLookupEnd( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->DomainLookupEndHighRes(mPerformance) : 0; } DOMHighResTimeStamp ConnectStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->ConnectStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp ConnectEnd( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->ConnectEndHighRes(mPerformance) : 0; } DOMHighResTimeStamp RequestStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->RequestStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp ResponseStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->ResponseStartHighRes(mPerformance) : 0; } DOMHighResTimeStamp ResponseEnd() const { return mTimingData->ResponseEndHighRes(mPerformance); } DOMHighResTimeStamp SecureConnectionStart( Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->SecureConnectionStartHighRes(mPerformance) : 0; } virtual const PerformanceResourceTiming* ToResourceTiming() const override { return this; } uint64_t TransferSize(Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->TransferSize() : 0; } uint64_t EncodedBodySize(Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->EncodedBodySize() : 0; } uint64_t DecodedBodySize(Maybe& aSubjectPrincipal) const { return TimingAllowedForCaller(aSubjectPrincipal) ? mTimingData->DecodedBodySize() : 0; } void GetServerTiming(nsTArray>& aRetval, Maybe& aSubjectPrincipal); size_t SizeOfIncludingThis( mozilla::MallocSizeOf aMallocSizeOf) const override; protected: virtual ~PerformanceResourceTiming(); size_t SizeOfExcludingThis( mozilla::MallocSizeOf aMallocSizeOf) const override; // Check if caller has access to cross-origin timings, either by the rules // from the spec, or based on addon permissions. bool TimingAllowedForCaller(Maybe& aCaller) const; // Check if cross-origin redirects should be reported to the caller. bool ReportRedirectForCaller(Maybe& aCaller, bool aEnsureSameOriginAndIgnoreTAO) const; nsString mInitiatorType; const UniquePtr mTimingData; // always non-null RefPtr mPerformance; // The same initial requested URI as the `name` attribute. nsCOMPtr mOriginalURI; private: mutable Maybe mCachedStartTime; }; } // namespace mozilla::dom #endif /* mozilla_dom_PerformanceResourceTiming_h___ */