зеркало из https://github.com/mozilla/gecko-dev.git
1040 строки
36 KiB
C++
1040 строки
36 KiB
C++
/* vim:set ts=2 sw=2 sts=2 et cindent: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "ChannelMediaResource.h"
|
|
|
|
#include "mozilla/Preferences.h"
|
|
#include "mozilla/dom/HTMLMediaElement.h"
|
|
#include "mozilla/net/OpaqueResponseUtils.h"
|
|
#include "nsIAsyncVerifyRedirectCallback.h"
|
|
#include "nsICachingChannel.h"
|
|
#include "nsIClassOfService.h"
|
|
#include "nsIHttpChannel.h"
|
|
#include "nsIInputStream.h"
|
|
#include "nsIThreadRetargetableRequest.h"
|
|
#include "nsITimedChannel.h"
|
|
#include "nsHttp.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
static const uint32_t HTTP_PARTIAL_RESPONSE_CODE = 206;
|
|
static const uint32_t HTTP_OK_CODE = 200;
|
|
static const uint32_t HTTP_REQUESTED_RANGE_NOT_SATISFIABLE_CODE = 416;
|
|
|
|
mozilla::LazyLogModule gMediaResourceLog("MediaResource");
|
|
// Debug logging macro with object pointer and class name.
|
|
#define LOG(msg, ...) \
|
|
DDMOZ_LOG(gMediaResourceLog, mozilla::LogLevel::Debug, msg, ##__VA_ARGS__)
|
|
|
|
namespace mozilla {
|
|
|
|
ChannelMediaResource::ChannelMediaResource(MediaResourceCallback* aCallback,
|
|
nsIChannel* aChannel, nsIURI* aURI,
|
|
int64_t aStreamLength,
|
|
bool aIsPrivateBrowsing)
|
|
: BaseMediaResource(aCallback, aChannel, aURI),
|
|
mCacheStream(this, aIsPrivateBrowsing),
|
|
mSuspendAgent(mCacheStream),
|
|
mKnownStreamLength(aStreamLength) {}
|
|
|
|
ChannelMediaResource::~ChannelMediaResource() {
|
|
MOZ_ASSERT(mClosed);
|
|
MOZ_ASSERT(!mChannel);
|
|
MOZ_ASSERT(!mListener);
|
|
if (mSharedInfo) {
|
|
mSharedInfo->mResources.RemoveElement(this);
|
|
}
|
|
}
|
|
|
|
// ChannelMediaResource::Listener just observes the channel and
|
|
// forwards notifications to the ChannelMediaResource. We use multiple
|
|
// listener objects so that when we open a new stream for a seek we can
|
|
// disconnect the old listener from the ChannelMediaResource and hook up
|
|
// a new listener, so notifications from the old channel are discarded
|
|
// and don't confuse us.
|
|
NS_IMPL_ISUPPORTS(ChannelMediaResource::Listener, nsIRequestObserver,
|
|
nsIStreamListener, nsIChannelEventSink, nsIInterfaceRequestor,
|
|
nsIThreadRetargetableStreamListener)
|
|
|
|
nsresult ChannelMediaResource::Listener::OnStartRequest(nsIRequest* aRequest) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
if (!mResource) return NS_OK;
|
|
return mResource->OnStartRequest(aRequest, mOffset);
|
|
}
|
|
|
|
nsresult ChannelMediaResource::Listener::OnStopRequest(nsIRequest* aRequest,
|
|
nsresult aStatus) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
if (!mResource) return NS_OK;
|
|
return mResource->OnStopRequest(aRequest, aStatus);
|
|
}
|
|
|
|
nsresult ChannelMediaResource::Listener::OnDataAvailable(
|
|
nsIRequest* aRequest, nsIInputStream* aStream, uint64_t aOffset,
|
|
uint32_t aCount) {
|
|
// This might happen off the main thread.
|
|
RefPtr<ChannelMediaResource> res;
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
res = mResource;
|
|
}
|
|
// Note Rekove() might happen at the same time to reset mResource. We check
|
|
// the load ID to determine if the data is from an old channel.
|
|
return res ? res->OnDataAvailable(mLoadID, aStream, aCount) : NS_OK;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::Listener::AsyncOnChannelRedirect(
|
|
nsIChannel* aOld, nsIChannel* aNew, uint32_t aFlags,
|
|
nsIAsyncVerifyRedirectCallback* cb) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
nsresult rv = NS_OK;
|
|
if (mResource) {
|
|
rv = mResource->OnChannelRedirect(aOld, aNew, aFlags, mOffset);
|
|
}
|
|
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
cb->OnRedirectVerifyCallback(NS_OK);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::Listener::CheckListenerChain() { return NS_OK; }
|
|
|
|
nsresult ChannelMediaResource::Listener::GetInterface(const nsIID& aIID,
|
|
void** aResult) {
|
|
return QueryInterface(aIID, aResult);
|
|
}
|
|
|
|
void ChannelMediaResource::Listener::Revoke() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MutexAutoLock lock(mMutex);
|
|
mResource = nullptr;
|
|
}
|
|
|
|
static bool IsPayloadCompressed(nsIHttpChannel* aChannel) {
|
|
nsAutoCString encoding;
|
|
Unused << aChannel->GetResponseHeader("Content-Encoding"_ns, encoding);
|
|
return encoding.Length() > 0;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::OnStartRequest(nsIRequest* aRequest,
|
|
int64_t aRequestOffset) {
|
|
NS_ASSERTION(mChannel.get() == aRequest, "Wrong channel!");
|
|
MOZ_DIAGNOSTIC_ASSERT(!mClosed);
|
|
|
|
MediaDecoderOwner* owner = mCallback->GetMediaOwner();
|
|
MOZ_DIAGNOSTIC_ASSERT(owner);
|
|
dom::HTMLMediaElement* element = owner->GetMediaElement();
|
|
MOZ_DIAGNOSTIC_ASSERT(element);
|
|
|
|
nsresult status;
|
|
nsresult rv = aRequest->GetStatus(&status);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
if (status == NS_BINDING_ABORTED) {
|
|
// Request was aborted before we had a chance to receive any data, or
|
|
// even an OnStartRequest(). Close the channel. This is important, as
|
|
// we don't want to mess up our state, as if we're cloned that would
|
|
// cause the clone to copy incorrect metadata (like whether we're
|
|
// infinite for example).
|
|
CloseChannel();
|
|
return status;
|
|
}
|
|
|
|
if (element->ShouldCheckAllowOrigin()) {
|
|
// If the request was cancelled by nsCORSListenerProxy due to failing
|
|
// the CORS security check, send an error through to the media element.
|
|
if (status == NS_ERROR_DOM_BAD_URI) {
|
|
mCallback->NotifyNetworkError(MediaResult(status, "CORS not allowed"));
|
|
return NS_ERROR_DOM_BAD_URI;
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsIHttpChannel> hc = do_QueryInterface(aRequest);
|
|
bool seekable = false;
|
|
int64_t length = -1;
|
|
int64_t startOffset = aRequestOffset;
|
|
|
|
if (hc) {
|
|
uint32_t responseStatus = 0;
|
|
Unused << hc->GetResponseStatus(&responseStatus);
|
|
bool succeeded = false;
|
|
Unused << hc->GetRequestSucceeded(&succeeded);
|
|
|
|
if (!succeeded && NS_SUCCEEDED(status)) {
|
|
// HTTP-level error (e.g. 4xx); treat this as a fatal network-level error.
|
|
// We might get this on a seek.
|
|
// (Note that lower-level errors indicated by NS_FAILED(status) are
|
|
// handled in OnStopRequest.)
|
|
// A 416 error should treated as EOF here... it's possible
|
|
// that we don't get Content-Length, we read N bytes, then we
|
|
// suspend and resume, the resume reopens the channel and we seek to
|
|
// offset N, but there are no more bytes, so we get a 416
|
|
// "Requested Range Not Satisfiable".
|
|
if (responseStatus == HTTP_REQUESTED_RANGE_NOT_SATISFIABLE_CODE) {
|
|
// OnStopRequest will not be fired, so we need to do some of its
|
|
// work here. Note we need to pass the load ID first so the following
|
|
// NotifyDataEnded() can pass the ID check.
|
|
mCacheStream.NotifyLoadID(mLoadID);
|
|
mCacheStream.NotifyDataEnded(mLoadID, status);
|
|
} else {
|
|
mCallback->NotifyNetworkError(
|
|
MediaResult(NS_ERROR_FAILURE, "HTTP error"));
|
|
}
|
|
|
|
// This disconnects our listener so we don't get any more data. We
|
|
// certainly don't want an error page to end up in our cache!
|
|
CloseChannel();
|
|
return NS_OK;
|
|
}
|
|
|
|
nsAutoCString ranges;
|
|
Unused << hc->GetResponseHeader("Accept-Ranges"_ns, ranges);
|
|
bool acceptsRanges =
|
|
net::nsHttp::FindToken(ranges.get(), "bytes", HTTP_HEADER_VALUE_SEPS);
|
|
|
|
int64_t contentLength = -1;
|
|
const bool isCompressed = IsPayloadCompressed(hc);
|
|
if (!isCompressed) {
|
|
hc->GetContentLength(&contentLength);
|
|
}
|
|
|
|
// Check response code for byte-range requests (seeking, chunk requests).
|
|
// We don't expect to get a 206 response for a compressed stream, but
|
|
// double check just to be sure.
|
|
if (!isCompressed && responseStatus == HTTP_PARTIAL_RESPONSE_CODE) {
|
|
// Parse Content-Range header.
|
|
int64_t rangeStart = 0;
|
|
int64_t rangeEnd = 0;
|
|
int64_t rangeTotal = 0;
|
|
rv = ParseContentRangeHeader(hc, rangeStart, rangeEnd, rangeTotal);
|
|
|
|
// We received 'Content-Range', so the server accepts range requests.
|
|
bool gotRangeHeader = NS_SUCCEEDED(rv);
|
|
|
|
if (gotRangeHeader) {
|
|
startOffset = rangeStart;
|
|
// We received 'Content-Range', so the server accepts range requests.
|
|
// Notify media cache about the length and start offset of data
|
|
// received. Note: If aRangeTotal == -1, then the total bytes is unknown
|
|
// at this stage.
|
|
// For now, tell the decoder that the stream is infinite.
|
|
if (rangeTotal != -1) {
|
|
contentLength = std::max(contentLength, rangeTotal);
|
|
}
|
|
}
|
|
acceptsRanges = gotRangeHeader;
|
|
} else if (responseStatus == HTTP_OK_CODE) {
|
|
// HTTP_OK_CODE means data will be sent from the start of the stream.
|
|
startOffset = 0;
|
|
|
|
if (aRequestOffset > 0) {
|
|
// If HTTP_OK_CODE is responded for a non-zero range request, we have
|
|
// to assume seeking doesn't work.
|
|
acceptsRanges = false;
|
|
}
|
|
}
|
|
if (aRequestOffset == 0 && contentLength >= 0 &&
|
|
(responseStatus == HTTP_OK_CODE ||
|
|
responseStatus == HTTP_PARTIAL_RESPONSE_CODE)) {
|
|
length = contentLength;
|
|
}
|
|
// XXX we probably should examine the Content-Range header in case
|
|
// the server gave us a range which is not quite what we asked for
|
|
|
|
// If we get an HTTP_OK_CODE response to our byte range request,
|
|
// and the server isn't sending Accept-Ranges:bytes then we don't
|
|
// support seeking. We also can't seek in compressed streams.
|
|
seekable = !isCompressed && acceptsRanges;
|
|
} else {
|
|
// Not an HTTP channel. Assume data will be sent from position zero.
|
|
startOffset = 0;
|
|
}
|
|
|
|
// Update principals before OnDataAvailable() putting the data in the cache.
|
|
// This is important, we want to make sure all principals are updated before
|
|
// any consumer can see the new data.
|
|
UpdatePrincipal();
|
|
if (owner->HasError()) {
|
|
// Updating the principal resulted in an error. Abort the load.
|
|
CloseChannel();
|
|
return NS_OK;
|
|
}
|
|
|
|
mCacheStream.NotifyDataStarted(mLoadID, startOffset, seekable, length);
|
|
mIsTransportSeekable = seekable;
|
|
if (mFirstReadLength < 0) {
|
|
mFirstReadLength = length;
|
|
}
|
|
|
|
mSuspendAgent.Delegate(mChannel);
|
|
|
|
// Fires an initial progress event.
|
|
owner->DownloadProgressed();
|
|
|
|
nsCOMPtr<nsIThreadRetargetableRequest> retarget;
|
|
if (Preferences::GetBool("media.omt_data_delivery.enabled", false) &&
|
|
(retarget = do_QueryInterface(aRequest))) {
|
|
// Note this will not always succeed. We need to handle the case where
|
|
// all resources sharing the same cache might run their data callbacks
|
|
// on different threads.
|
|
retarget->RetargetDeliveryTo(mCacheStream.OwnerThread());
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
bool ChannelMediaResource::IsTransportSeekable() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
// We Report the transport as seekable if we know we will never seek into
|
|
// the underlying transport. As the MediaCache reads content by block of
|
|
// BLOCK_SIZE bytes, so the content length is less it will always be fully
|
|
// read from offset = 0 and we can then always successfully seek within this
|
|
// buffered content.
|
|
return mIsTransportSeekable ||
|
|
(mFirstReadLength > 0 &&
|
|
mFirstReadLength < MediaCacheStream::BLOCK_SIZE);
|
|
}
|
|
|
|
nsresult ChannelMediaResource::ParseContentRangeHeader(
|
|
nsIHttpChannel* aHttpChan, int64_t& aRangeStart, int64_t& aRangeEnd,
|
|
int64_t& aRangeTotal) const {
|
|
NS_ENSURE_ARG(aHttpChan);
|
|
|
|
nsAutoCString rangeStr;
|
|
nsresult rv = aHttpChan->GetResponseHeader("Content-Range"_ns, rangeStr);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
NS_ENSURE_FALSE(rangeStr.IsEmpty(), NS_ERROR_ILLEGAL_VALUE);
|
|
|
|
auto rangeOrErr = net::ParseContentRangeHeaderString(rangeStr);
|
|
NS_ENSURE_FALSE(rangeOrErr.isErr(), rangeOrErr.unwrapErr());
|
|
|
|
aRangeStart = std::get<0>(rangeOrErr.inspect());
|
|
aRangeEnd = std::get<1>(rangeOrErr.inspect());
|
|
aRangeTotal = std::get<2>(rangeOrErr.inspect());
|
|
|
|
LOG("Received bytes [%" PRId64 "] to [%" PRId64 "] of [%" PRId64
|
|
"] for decoder[%p]",
|
|
aRangeStart, aRangeEnd, aRangeTotal, mCallback.get());
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::OnStopRequest(nsIRequest* aRequest,
|
|
nsresult aStatus) {
|
|
NS_ASSERTION(mChannel.get() == aRequest, "Wrong channel!");
|
|
NS_ASSERTION(!mSuspendAgent.IsSuspended(),
|
|
"How can OnStopRequest fire while we're suspended?");
|
|
MOZ_DIAGNOSTIC_ASSERT(!mClosed);
|
|
|
|
// Move this request back into the foreground. This is necessary for
|
|
// requests owned by video documents to ensure the load group fires
|
|
// OnStopRequest when restoring from session history.
|
|
nsLoadFlags loadFlags;
|
|
DebugOnly<nsresult> rv = mChannel->GetLoadFlags(&loadFlags);
|
|
NS_ASSERTION(NS_SUCCEEDED(rv), "GetLoadFlags() failed!");
|
|
|
|
if (loadFlags & nsIRequest::LOAD_BACKGROUND) {
|
|
Unused << NS_WARN_IF(NS_FAILED(ModifyLoadFlags(loadFlags & ~nsIRequest::LOAD_BACKGROUND)));
|
|
}
|
|
|
|
// Note that aStatus might have succeeded --- this might be a normal close
|
|
// --- even in situations where the server cut us off because we were
|
|
// suspended. It is also possible that the server sends us fewer bytes than
|
|
// requested. So we need to "reopen on error" in that case too. The only
|
|
// cases where we don't need to reopen are when *we* closed the stream.
|
|
// But don't reopen if we need to seek and we don't think we can... that would
|
|
// cause us to just re-read the stream, which would be really bad.
|
|
/*
|
|
* | length | offset | reopen |
|
|
* +--------+-----------+----------+
|
|
* | -1 | 0 | yes |
|
|
* +--------+-----------+----------+
|
|
* | -1 | > 0 | seekable |
|
|
* +--------+-----------+----------+
|
|
* | 0 | X | no |
|
|
* +--------+-----------+----------+
|
|
* | > 0 | 0 | yes |
|
|
* +--------+-----------+----------+
|
|
* | > 0 | != length | seekable |
|
|
* +--------+-----------+----------+
|
|
* | > 0 | == length | no |
|
|
*/
|
|
if (aStatus != NS_ERROR_PARSED_DATA_CACHED && aStatus != NS_BINDING_ABORTED) {
|
|
auto lengthAndOffset = mCacheStream.GetLengthAndOffset();
|
|
int64_t length = lengthAndOffset.mLength;
|
|
int64_t offset = lengthAndOffset.mOffset;
|
|
if ((offset == 0 || mIsTransportSeekable) && offset != length) {
|
|
// If the stream did close normally, restart the channel if we're either
|
|
// at the start of the resource, or if the server is seekable and we're
|
|
// not at the end of stream. We don't restart the stream if we're at the
|
|
// end because not all web servers handle this case consistently; see:
|
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=1373618#c36
|
|
nsresult rv = Seek(offset, false);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
return rv;
|
|
}
|
|
// Close the streams that failed due to error. This will cause all
|
|
// client Read and Seek operations on those streams to fail. Blocked
|
|
// Reads will also be woken up.
|
|
Close();
|
|
}
|
|
}
|
|
|
|
mCacheStream.NotifyDataEnded(mLoadID, aStatus);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::OnChannelRedirect(nsIChannel* aOld,
|
|
nsIChannel* aNew,
|
|
uint32_t aFlags,
|
|
int64_t aOffset) {
|
|
// OnChannelRedirect() is followed by OnStartRequest() where we will
|
|
// call mSuspendAgent.Delegate().
|
|
mChannel = aNew;
|
|
return SetupChannelHeaders(aOffset);
|
|
}
|
|
|
|
nsresult ChannelMediaResource::CopySegmentToCache(
|
|
nsIInputStream* aInStream, void* aClosure, const char* aFromSegment,
|
|
uint32_t aToOffset, uint32_t aCount, uint32_t* aWriteCount) {
|
|
*aWriteCount = aCount;
|
|
Closure* closure = static_cast<Closure*>(aClosure);
|
|
MediaCacheStream* cacheStream = &closure->mResource->mCacheStream;
|
|
if (cacheStream->OwnerThread()->IsOnCurrentThread()) {
|
|
cacheStream->NotifyDataReceived(
|
|
closure->mLoadID, aCount,
|
|
reinterpret_cast<const uint8_t*>(aFromSegment));
|
|
return NS_OK;
|
|
}
|
|
|
|
RefPtr<ChannelMediaResource> self = closure->mResource;
|
|
uint32_t loadID = closure->mLoadID;
|
|
UniquePtr<uint8_t[]> data = MakeUnique<uint8_t[]>(aCount);
|
|
memcpy(data.get(), aFromSegment, aCount);
|
|
cacheStream->OwnerThread()->Dispatch(NS_NewRunnableFunction(
|
|
"MediaCacheStream::NotifyDataReceived",
|
|
[self, loadID, data = std::move(data), aCount]() {
|
|
self->mCacheStream.NotifyDataReceived(loadID, aCount, data.get());
|
|
}));
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::OnDataAvailable(uint32_t aLoadID,
|
|
nsIInputStream* aStream,
|
|
uint32_t aCount) {
|
|
// This might happen off the main thread.
|
|
Closure closure{aLoadID, this};
|
|
uint32_t count = aCount;
|
|
while (count > 0) {
|
|
uint32_t read;
|
|
nsresult rv =
|
|
aStream->ReadSegments(CopySegmentToCache, &closure, count, &read);
|
|
if (NS_FAILED(rv)) return rv;
|
|
NS_ASSERTION(read > 0, "Read 0 bytes while data was available?");
|
|
count -= read;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
int64_t ChannelMediaResource::CalculateStreamLength() const {
|
|
if (!mChannel) {
|
|
return -1;
|
|
}
|
|
|
|
nsCOMPtr<nsIHttpChannel> hc = do_QueryInterface(mChannel);
|
|
if (!hc) {
|
|
return -1;
|
|
}
|
|
|
|
bool succeeded = false;
|
|
Unused << hc->GetRequestSucceeded(&succeeded);
|
|
if (!succeeded) {
|
|
return -1;
|
|
}
|
|
|
|
// We can't determine the length of uncompressed payload.
|
|
const bool isCompressed = IsPayloadCompressed(hc);
|
|
if (isCompressed) {
|
|
return -1;
|
|
}
|
|
|
|
int64_t contentLength = -1;
|
|
if (NS_FAILED(hc->GetContentLength(&contentLength))) {
|
|
return -1;
|
|
}
|
|
|
|
uint32_t responseStatus = 0;
|
|
Unused << hc->GetResponseStatus(&responseStatus);
|
|
if (responseStatus != HTTP_PARTIAL_RESPONSE_CODE) {
|
|
return contentLength;
|
|
}
|
|
|
|
// We have an HTTP Byte Range response. The Content-Length is the length
|
|
// of the response, not the resource. We need to parse the Content-Range
|
|
// header and extract the range total in order to get the stream length.
|
|
int64_t rangeStart = 0;
|
|
int64_t rangeEnd = 0;
|
|
int64_t rangeTotal = 0;
|
|
bool gotRangeHeader = NS_SUCCEEDED(
|
|
ParseContentRangeHeader(hc, rangeStart, rangeEnd, rangeTotal));
|
|
if (gotRangeHeader && rangeTotal != -1) {
|
|
contentLength = std::max(contentLength, rangeTotal);
|
|
}
|
|
return contentLength;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::Open(nsIStreamListener** aStreamListener) {
|
|
NS_ASSERTION(NS_IsMainThread(), "Only call on main thread");
|
|
MOZ_ASSERT(aStreamListener);
|
|
MOZ_ASSERT(mChannel);
|
|
|
|
int64_t streamLength =
|
|
mKnownStreamLength < 0 ? CalculateStreamLength() : mKnownStreamLength;
|
|
nsresult rv = mCacheStream.Init(streamLength);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
mSharedInfo = new SharedInfo;
|
|
mSharedInfo->mResources.AppendElement(this);
|
|
|
|
mIsLiveStream = streamLength < 0;
|
|
mListener = new Listener(this, 0, ++mLoadID);
|
|
*aStreamListener = mListener;
|
|
NS_ADDREF(*aStreamListener);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::OpenChannel(int64_t aOffset) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_DIAGNOSTIC_ASSERT(!mClosed);
|
|
MOZ_ASSERT(mChannel);
|
|
MOZ_ASSERT(!mListener, "Listener should have been removed by now");
|
|
|
|
mListener = new Listener(this, aOffset, ++mLoadID);
|
|
nsresult rv = mChannel->SetNotificationCallbacks(mListener.get());
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = SetupChannelHeaders(aOffset);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = mChannel->AsyncOpen(mListener);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Tell the media element that we are fetching data from a channel.
|
|
MediaDecoderOwner* owner = mCallback->GetMediaOwner();
|
|
MOZ_DIAGNOSTIC_ASSERT(owner);
|
|
dom::HTMLMediaElement* element = owner->GetMediaElement();
|
|
MOZ_DIAGNOSTIC_ASSERT(element);
|
|
element->DownloadResumed();
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ChannelMediaResource::SetupChannelHeaders(int64_t aOffset) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_DIAGNOSTIC_ASSERT(!mClosed);
|
|
|
|
// Always use a byte range request even if we're reading from the start
|
|
// of the resource.
|
|
// This enables us to detect if the stream supports byte range
|
|
// requests, and therefore seeking, early.
|
|
nsCOMPtr<nsIHttpChannel> hc = do_QueryInterface(mChannel);
|
|
if (hc) {
|
|
// Use |mOffset| if seeking in a complete file download.
|
|
nsAutoCString rangeString("bytes=");
|
|
rangeString.AppendInt(aOffset);
|
|
rangeString.Append('-');
|
|
nsresult rv = hc->SetRequestHeader("Range"_ns, rangeString, false);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Send Accept header for video and audio types only (Bug 489071)
|
|
MediaDecoderOwner* owner = mCallback->GetMediaOwner();
|
|
MOZ_DIAGNOSTIC_ASSERT(owner);
|
|
dom::HTMLMediaElement* element = owner->GetMediaElement();
|
|
MOZ_DIAGNOSTIC_ASSERT(element);
|
|
element->SetRequestHeaders(hc);
|
|
} else {
|
|
NS_ASSERTION(aOffset == 0, "Don't know how to seek on this channel type");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
RefPtr<GenericPromise> ChannelMediaResource::Close() {
|
|
NS_ASSERTION(NS_IsMainThread(), "Only call on main thread");
|
|
|
|
if (!mClosed) {
|
|
CloseChannel();
|
|
mClosed = true;
|
|
return mCacheStream.Close();
|
|
}
|
|
return GenericPromise::CreateAndResolve(true, __func__);
|
|
}
|
|
|
|
already_AddRefed<nsIPrincipal> ChannelMediaResource::GetCurrentPrincipal() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
return do_AddRef(mSharedInfo->mPrincipal);
|
|
}
|
|
|
|
bool ChannelMediaResource::HadCrossOriginRedirects() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
return mSharedInfo->mHadCrossOriginRedirects;
|
|
}
|
|
|
|
bool ChannelMediaResource::CanClone() {
|
|
return !mClosed && mCacheStream.IsAvailableForSharing();
|
|
}
|
|
|
|
already_AddRefed<BaseMediaResource> ChannelMediaResource::CloneData(
|
|
MediaResourceCallback* aCallback) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_ASSERT(CanClone(), "Stream can't be cloned");
|
|
|
|
RefPtr<ChannelMediaResource> resource =
|
|
new ChannelMediaResource(aCallback, nullptr, mURI, mKnownStreamLength);
|
|
|
|
resource->mIsLiveStream = mIsLiveStream;
|
|
resource->mIsTransportSeekable = mIsTransportSeekable;
|
|
resource->mSharedInfo = mSharedInfo;
|
|
mSharedInfo->mResources.AppendElement(resource.get());
|
|
|
|
// Initially the clone is treated as suspended by the cache, because
|
|
// we don't have a channel. If the cache needs to read data from the clone
|
|
// it will call CacheClientResume (or CacheClientSeek with aResume true)
|
|
// which will recreate the channel. This way, if all of the media data
|
|
// is already in the cache we don't create an unnecessary HTTP channel
|
|
// and perform a useless HTTP transaction.
|
|
resource->mCacheStream.InitAsClone(&mCacheStream);
|
|
return resource.forget();
|
|
}
|
|
|
|
void ChannelMediaResource::CloseChannel() {
|
|
NS_ASSERTION(NS_IsMainThread(), "Only call on main thread");
|
|
|
|
// Revoking listener should be done before canceling the channel, because
|
|
// canceling the channel might cause the input stream to release its buffer.
|
|
// If we don't do revoke first, it's possible that `OnDataAvailable` would be
|
|
// called later and then incorrectly access that released buffer.
|
|
if (mListener) {
|
|
mListener->Revoke();
|
|
mListener = nullptr;
|
|
}
|
|
|
|
if (mChannel) {
|
|
mSuspendAgent.Revoke();
|
|
// The status we use here won't be passed to the decoder, since
|
|
// we've already revoked the listener. It can however be passed
|
|
// to nsDocumentViewer::LoadComplete if our channel is the one
|
|
// that kicked off creation of a video document. We don't want that
|
|
// document load to think there was an error.
|
|
// NS_ERROR_PARSED_DATA_CACHED is the best thing we have for that
|
|
// at the moment.
|
|
mChannel->Cancel(NS_ERROR_PARSED_DATA_CACHED);
|
|
mChannel = nullptr;
|
|
}
|
|
}
|
|
|
|
nsresult ChannelMediaResource::ReadFromCache(char* aBuffer, int64_t aOffset,
|
|
uint32_t aCount) {
|
|
return mCacheStream.ReadFromCache(aBuffer, aOffset, aCount);
|
|
}
|
|
|
|
nsresult ChannelMediaResource::ReadAt(int64_t aOffset, char* aBuffer,
|
|
uint32_t aCount, uint32_t* aBytes) {
|
|
NS_ASSERTION(!NS_IsMainThread(), "Don't call on main thread");
|
|
return mCacheStream.ReadAt(aOffset, aBuffer, aCount, aBytes);
|
|
}
|
|
|
|
void ChannelMediaResource::ThrottleReadahead(bool bThrottle) {
|
|
mCacheStream.ThrottleReadahead(bThrottle);
|
|
}
|
|
|
|
nsresult ChannelMediaResource::GetCachedRanges(MediaByteRangeSet& aRanges) {
|
|
return mCacheStream.GetCachedRanges(aRanges);
|
|
}
|
|
|
|
void ChannelMediaResource::Suspend(bool aCloseImmediately) {
|
|
NS_ASSERTION(NS_IsMainThread(), "Don't call on non-main thread");
|
|
|
|
if (mClosed) {
|
|
// Nothing to do when we are closed.
|
|
return;
|
|
}
|
|
|
|
MediaDecoderOwner* owner = mCallback->GetMediaOwner();
|
|
MOZ_DIAGNOSTIC_ASSERT(owner);
|
|
dom::HTMLMediaElement* element = owner->GetMediaElement();
|
|
MOZ_DIAGNOSTIC_ASSERT(element);
|
|
|
|
if (mChannel && aCloseImmediately && mIsTransportSeekable) {
|
|
CloseChannel();
|
|
}
|
|
|
|
if (mSuspendAgent.Suspend()) {
|
|
element->DownloadSuspended();
|
|
}
|
|
}
|
|
|
|
void ChannelMediaResource::Resume() {
|
|
NS_ASSERTION(NS_IsMainThread(), "Don't call on non-main thread");
|
|
|
|
if (mClosed) {
|
|
// Nothing to do when we are closed.
|
|
return;
|
|
}
|
|
|
|
MediaDecoderOwner* owner = mCallback->GetMediaOwner();
|
|
MOZ_DIAGNOSTIC_ASSERT(owner);
|
|
dom::HTMLMediaElement* element = owner->GetMediaElement();
|
|
MOZ_DIAGNOSTIC_ASSERT(element);
|
|
|
|
if (mSuspendAgent.Resume()) {
|
|
if (mChannel) {
|
|
// Just wake up our existing channel
|
|
element->DownloadResumed();
|
|
} else {
|
|
mCacheStream.NotifyResume();
|
|
}
|
|
}
|
|
}
|
|
|
|
nsresult ChannelMediaResource::RecreateChannel() {
|
|
MOZ_DIAGNOSTIC_ASSERT(!mClosed);
|
|
|
|
nsLoadFlags loadFlags = nsICachingChannel::LOAD_BYPASS_LOCAL_CACHE_IF_BUSY |
|
|
(mLoadInBackground ? nsIRequest::LOAD_BACKGROUND : 0);
|
|
|
|
MediaDecoderOwner* owner = mCallback->GetMediaOwner();
|
|
MOZ_DIAGNOSTIC_ASSERT(owner);
|
|
dom::HTMLMediaElement* element = owner->GetMediaElement();
|
|
MOZ_DIAGNOSTIC_ASSERT(element);
|
|
|
|
nsCOMPtr<nsILoadGroup> loadGroup = element->GetDocumentLoadGroup();
|
|
NS_ENSURE_TRUE(loadGroup, NS_ERROR_NULL_POINTER);
|
|
|
|
nsSecurityFlags securityFlags =
|
|
element->ShouldCheckAllowOrigin()
|
|
? nsILoadInfo::SEC_REQUIRE_CORS_INHERITS_SEC_CONTEXT
|
|
: nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT;
|
|
|
|
if (element->GetCORSMode() == CORS_USE_CREDENTIALS) {
|
|
securityFlags |= nsILoadInfo::SEC_COOKIES_INCLUDE;
|
|
}
|
|
|
|
MOZ_ASSERT(element->IsAnyOfHTMLElements(nsGkAtoms::audio, nsGkAtoms::video));
|
|
nsContentPolicyType contentPolicyType =
|
|
element->IsHTMLElement(nsGkAtoms::audio)
|
|
? nsIContentPolicy::TYPE_INTERNAL_AUDIO
|
|
: nsIContentPolicy::TYPE_INTERNAL_VIDEO;
|
|
|
|
// If element has 'triggeringprincipal' attribute, we will use the value as
|
|
// triggeringPrincipal for the channel, otherwise it will default to use
|
|
// aElement->NodePrincipal().
|
|
// This function returns true when element has 'triggeringprincipal', so if
|
|
// setAttrs is true we will override the origin attributes on the channel
|
|
// later.
|
|
nsCOMPtr<nsIPrincipal> triggeringPrincipal;
|
|
bool setAttrs = nsContentUtils::QueryTriggeringPrincipal(
|
|
element, getter_AddRefs(triggeringPrincipal));
|
|
|
|
nsresult rv = NS_NewChannelWithTriggeringPrincipal(
|
|
getter_AddRefs(mChannel), mURI, element, triggeringPrincipal,
|
|
securityFlags, contentPolicyType,
|
|
nullptr, // aPerformanceStorage
|
|
loadGroup,
|
|
nullptr, // aCallbacks
|
|
loadFlags);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = mChannel->LoadInfo();
|
|
if (setAttrs) {
|
|
// The function simply returns NS_OK, so we ignore the return value.
|
|
Unused << loadInfo->SetOriginAttributes(
|
|
triggeringPrincipal->OriginAttributesRef());
|
|
}
|
|
|
|
Unused << loadInfo->SetIsMediaRequest(true);
|
|
|
|
nsCOMPtr<nsIClassOfService> cos(do_QueryInterface(mChannel));
|
|
if (cos) {
|
|
// Unconditionally disable throttling since we want the media to fluently
|
|
// play even when we switch the tab to background.
|
|
cos->AddClassFlags(nsIClassOfService::DontThrottle);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
void ChannelMediaResource::CacheClientNotifyDataReceived() {
|
|
mCallback->AbstractMainThread()->Dispatch(NewRunnableMethod(
|
|
"MediaResourceCallback::NotifyDataArrived", mCallback.get(),
|
|
&MediaResourceCallback::NotifyDataArrived));
|
|
}
|
|
|
|
void ChannelMediaResource::CacheClientNotifyDataEnded(nsresult aStatus) {
|
|
mCallback->AbstractMainThread()->Dispatch(NS_NewRunnableFunction(
|
|
"ChannelMediaResource::CacheClientNotifyDataEnded",
|
|
[self = RefPtr<ChannelMediaResource>(this), aStatus]() {
|
|
if (NS_SUCCEEDED(aStatus)) {
|
|
self->mIsLiveStream = false;
|
|
}
|
|
self->mCallback->NotifyDataEnded(aStatus);
|
|
}));
|
|
}
|
|
|
|
void ChannelMediaResource::CacheClientNotifyPrincipalChanged() {
|
|
NS_ASSERTION(NS_IsMainThread(), "Don't call on non-main thread");
|
|
|
|
mCallback->NotifyPrincipalChanged();
|
|
}
|
|
|
|
void ChannelMediaResource::UpdatePrincipal() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_ASSERT(mChannel);
|
|
nsIScriptSecurityManager* secMan = nsContentUtils::GetSecurityManager();
|
|
if (!secMan) {
|
|
return;
|
|
}
|
|
bool hadData = mSharedInfo->mPrincipal != nullptr;
|
|
nsCOMPtr<nsIPrincipal> principal;
|
|
secMan->GetChannelResultPrincipal(mChannel, getter_AddRefs(principal));
|
|
if (nsContentUtils::CombineResourcePrincipals(&mSharedInfo->mPrincipal,
|
|
principal)) {
|
|
for (auto* r : mSharedInfo->mResources) {
|
|
r->CacheClientNotifyPrincipalChanged();
|
|
}
|
|
if (!mChannel) { // Sometimes cleared during NotifyPrincipalChanged()
|
|
return;
|
|
}
|
|
}
|
|
nsCOMPtr<nsILoadInfo> loadInfo = mChannel->LoadInfo();
|
|
auto mode = loadInfo->GetSecurityMode();
|
|
if (mode != nsILoadInfo::SEC_REQUIRE_CORS_INHERITS_SEC_CONTEXT) {
|
|
MOZ_ASSERT(
|
|
mode == nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT ||
|
|
mode == nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL,
|
|
"no-cors request");
|
|
bool finalResponseIsOpaque =
|
|
// GetChannelResultPrincipal() returns the original request URL for
|
|
// null-origin Responses from ServiceWorker, in which case the URL
|
|
// does not indicate the real source of data. Such null-origin
|
|
// Responses have Basic LoadTainting. CORS filtered Responses from
|
|
// ServiceWorker also cannot be mixed with no-cors cross-origin
|
|
// responses.
|
|
loadInfo->GetTainting() == LoadTainting::Opaque &&
|
|
// Although intermediate cross-origin redirects back to URIs with
|
|
// loadingPrincipal will have LoadTainting::Opaque and will taint the
|
|
// media element, they are not considered opaque when verifying
|
|
// network responses; they can be mixed with non-opaque responses from
|
|
// subsequent loads on the same-origin finalURI.
|
|
!nsContentUtils::CheckMayLoad(loadInfo->GetLoadingPrincipal(), mChannel,
|
|
/*allowIfInheritsPrincipal*/ true);
|
|
if (!hadData) { // First response with data
|
|
mSharedInfo->mFinalResponsesAreOpaque = finalResponseIsOpaque;
|
|
} else if (mSharedInfo->mFinalResponsesAreOpaque != finalResponseIsOpaque) {
|
|
for (auto* r : mSharedInfo->mResources) {
|
|
r->mCallback->NotifyNetworkError(MediaResult(
|
|
NS_ERROR_CONTENT_BLOCKED, "opaque and non-opaque responses"));
|
|
}
|
|
// Our caller, OnStartRequest() will CloseChannel() on discovering the
|
|
// error, so no data will be read from the channel.
|
|
return;
|
|
}
|
|
}
|
|
// ChannelMediaResource can recreate the channel. When this happens, we don't
|
|
// want to overwrite mHadCrossOriginRedirects because the new channel could
|
|
// skip intermediate redirects.
|
|
if (!mSharedInfo->mHadCrossOriginRedirects) {
|
|
nsCOMPtr<nsITimedChannel> timedChannel = do_QueryInterface(mChannel);
|
|
if (timedChannel) {
|
|
bool allRedirectsSameOrigin = false;
|
|
mSharedInfo->mHadCrossOriginRedirects =
|
|
NS_SUCCEEDED(timedChannel->GetAllRedirectsSameOrigin(
|
|
&allRedirectsSameOrigin)) &&
|
|
!allRedirectsSameOrigin;
|
|
}
|
|
}
|
|
}
|
|
|
|
void ChannelMediaResource::CacheClientNotifySuspendedStatusChanged(
|
|
bool aSuspended) {
|
|
mCallback->AbstractMainThread()->Dispatch(NewRunnableMethod<bool>(
|
|
"MediaResourceCallback::NotifySuspendedStatusChanged", mCallback.get(),
|
|
&MediaResourceCallback::NotifySuspendedStatusChanged, aSuspended));
|
|
}
|
|
|
|
nsresult ChannelMediaResource::Seek(int64_t aOffset, bool aResume) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
if (mClosed) {
|
|
// Nothing to do when we are closed.
|
|
return NS_OK;
|
|
}
|
|
|
|
LOG("Seek requested for aOffset [%" PRId64 "]", aOffset);
|
|
|
|
CloseChannel();
|
|
|
|
if (aResume) {
|
|
mSuspendAgent.Resume();
|
|
}
|
|
|
|
// Don't create a new channel if we are still suspended. The channel will
|
|
// be recreated when we are resumed.
|
|
if (mSuspendAgent.IsSuspended()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv = RecreateChannel();
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
return OpenChannel(aOffset);
|
|
}
|
|
|
|
void ChannelMediaResource::CacheClientSeek(int64_t aOffset, bool aResume) {
|
|
RefPtr<ChannelMediaResource> self = this;
|
|
nsCOMPtr<nsIRunnable> r = NS_NewRunnableFunction(
|
|
"ChannelMediaResource::Seek", [self, aOffset, aResume]() {
|
|
nsresult rv = self->Seek(aOffset, aResume);
|
|
if (NS_FAILED(rv)) {
|
|
// Close the streams that failed due to error. This will cause all
|
|
// client Read and Seek operations on those streams to fail. Blocked
|
|
// Reads will also be woken up.
|
|
self->Close();
|
|
}
|
|
});
|
|
mCallback->AbstractMainThread()->Dispatch(r.forget());
|
|
}
|
|
|
|
void ChannelMediaResource::CacheClientSuspend() {
|
|
mCallback->AbstractMainThread()->Dispatch(
|
|
NewRunnableMethod<bool>("ChannelMediaResource::Suspend", this,
|
|
&ChannelMediaResource::Suspend, false));
|
|
}
|
|
|
|
void ChannelMediaResource::CacheClientResume() {
|
|
mCallback->AbstractMainThread()->Dispatch(NewRunnableMethod(
|
|
"ChannelMediaResource::Resume", this, &ChannelMediaResource::Resume));
|
|
}
|
|
|
|
int64_t ChannelMediaResource::GetNextCachedData(int64_t aOffset) {
|
|
return mCacheStream.GetNextCachedData(aOffset);
|
|
}
|
|
|
|
int64_t ChannelMediaResource::GetCachedDataEnd(int64_t aOffset) {
|
|
return mCacheStream.GetCachedDataEnd(aOffset);
|
|
}
|
|
|
|
bool ChannelMediaResource::IsDataCachedToEndOfResource(int64_t aOffset) {
|
|
return mCacheStream.IsDataCachedToEndOfStream(aOffset);
|
|
}
|
|
|
|
bool ChannelMediaResource::IsSuspended() { return mSuspendAgent.IsSuspended(); }
|
|
|
|
void ChannelMediaResource::SetReadMode(MediaCacheStream::ReadMode aMode) {
|
|
mCacheStream.SetReadMode(aMode);
|
|
}
|
|
|
|
void ChannelMediaResource::SetPlaybackRate(uint32_t aBytesPerSecond) {
|
|
mCacheStream.SetPlaybackRate(aBytesPerSecond);
|
|
}
|
|
|
|
void ChannelMediaResource::Pin() { mCacheStream.Pin(); }
|
|
|
|
void ChannelMediaResource::Unpin() { mCacheStream.Unpin(); }
|
|
|
|
double ChannelMediaResource::GetDownloadRate(bool* aIsReliable) {
|
|
return mCacheStream.GetDownloadRate(aIsReliable);
|
|
}
|
|
|
|
int64_t ChannelMediaResource::GetLength() { return mCacheStream.GetLength(); }
|
|
|
|
void ChannelMediaResource::GetDebugInfo(dom::MediaResourceDebugInfo& aInfo) {
|
|
mCacheStream.GetDebugInfo(aInfo.mCacheStream);
|
|
}
|
|
|
|
// ChannelSuspendAgent
|
|
|
|
bool ChannelSuspendAgent::Suspend() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
SuspendInternal();
|
|
if (++mSuspendCount == 1) {
|
|
mCacheStream.NotifyClientSuspended(true);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void ChannelSuspendAgent::SuspendInternal() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
if (mChannel) {
|
|
bool isPending = false;
|
|
nsresult rv = mChannel->IsPending(&isPending);
|
|
if (NS_SUCCEEDED(rv) && isPending && !mIsChannelSuspended) {
|
|
mChannel->Suspend();
|
|
mIsChannelSuspended = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
bool ChannelSuspendAgent::Resume() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_ASSERT(IsSuspended(), "Resume without suspend!");
|
|
|
|
if (--mSuspendCount == 0) {
|
|
if (mChannel && mIsChannelSuspended) {
|
|
mChannel->Resume();
|
|
mIsChannelSuspended = false;
|
|
}
|
|
mCacheStream.NotifyClientSuspended(false);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void ChannelSuspendAgent::Delegate(nsIChannel* aChannel) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_ASSERT(aChannel);
|
|
MOZ_ASSERT(!mChannel, "The previous channel not closed.");
|
|
MOZ_ASSERT(!mIsChannelSuspended);
|
|
|
|
mChannel = aChannel;
|
|
// Ensure the suspend status of the channel matches our suspend count.
|
|
if (IsSuspended()) {
|
|
SuspendInternal();
|
|
}
|
|
}
|
|
|
|
void ChannelSuspendAgent::Revoke() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
if (!mChannel) {
|
|
// Channel already revoked. Nothing to do.
|
|
return;
|
|
}
|
|
|
|
// Before closing the channel, it needs to be resumed to make sure its
|
|
// internal state is correct. Besides, We need to suspend the channel after
|
|
// recreating.
|
|
if (mIsChannelSuspended) {
|
|
mChannel->Resume();
|
|
mIsChannelSuspended = false;
|
|
}
|
|
mChannel = nullptr;
|
|
}
|
|
|
|
bool ChannelSuspendAgent::IsSuspended() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
return (mSuspendCount > 0);
|
|
}
|
|
|
|
} // namespace mozilla
|