Source code

Revision control

Copy as Markdown

Other Tools

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_dom_PerformanceResourceTiming_h___
#define mozilla_dom_PerformanceResourceTiming_h___
#include "mozilla/UniquePtr.h"
#include "nsCOMPtr.h"
#include "Performance.h"
#include "PerformanceEntry.h"
#include "PerformanceServerTiming.h"
#include "PerformanceTiming.h"
namespace mozilla::dom {
enum class RenderBlockingStatusType : uint8_t;
#define IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(name) \
DOMHighResTimeStamp name(nsIPrincipal& aSubjectPrincipal) const { \
bool allowed = !mTimingData->RedirectCountReal() \
? TimingAllowedForCaller(aSubjectPrincipal) \
: ReportRedirectForCaller(aSubjectPrincipal, false); \
return allowed ? mTimingData->name##HighRes(mPerformance) : 0; \
}
#define IMPL_RESOURCE_TIMING_TAO_PROTECTED_SIZE_PROP(name) \
uint64_t name(nsIPrincipal& aSubjectPrincipal) const { \
bool allowed = !mTimingData->RedirectCountReal() \
? TimingAllowedForCaller(aSubjectPrincipal) \
: ReportRedirectForCaller(aSubjectPrincipal, false); \
return allowed ? mTimingData->name() : 0; \
}
#define IMPL_RESOURCE_TIMING_CORS_PROTECTED_SIZE_PROP(name) \
uint64_t name(nsIPrincipal& aSubjectPrincipal) const { \
if (BodyInfoAccessAllowedForCaller(aSubjectPrincipal)) { \
return mTimingData->name(); \
} \
return 0; \
}
class PerformanceResourceTiming : public PerformanceEntry {
public:
using TimeStamp = mozilla::TimeStamp;
NS_DECL_ISUPPORTS_INHERITED
NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS_INHERITED(
PerformanceResourceTiming, PerformanceEntry)
// aPerformanceTimingData and aPerformance must be non-null
PerformanceResourceTiming(
UniquePtr<PerformanceTimingData>&& aPerformanceTimingData,
Performance* aPerformance, const nsAString& aName);
virtual JSObject* WrapObject(JSContext* aCx,
JS::Handle<JSObject*> aGivenProto) override;
virtual DOMHighResTimeStamp StartTime() const override;
virtual DOMHighResTimeStamp Duration() const override {
return ResponseEnd() - StartTime();
}
void GetInitiatorType(nsAString& aInitiatorType) const {
aInitiatorType = mInitiatorType;
}
void SetInitiatorType(const nsAString& aInitiatorType) {
mInitiatorType = aInitiatorType;
}
RenderBlockingStatusType RenderBlockingStatus() const;
void GetNextHopProtocol(nsAString& aNextHopProtocol) const {
if (mTimingData->TimingAllowed()) {
aNextHopProtocol = mTimingData->NextHopProtocol();
}
}
DOMHighResTimeStamp WorkerStart() const {
return mTimingData->WorkerStartHighRes(mPerformance);
}
DOMHighResTimeStamp FetchStart() const;
DOMHighResTimeStamp RedirectStart(nsIPrincipal& aSubjectPrincipal,
bool aEnsureSameOriginAndIgnoreTAO) const {
// We have to check if all the redirect URIs whether had the same origin or
// different origins with TAO headers set (since there is no check in
// RedirectStartHighRes())
return ReportRedirectForCaller(aSubjectPrincipal,
aEnsureSameOriginAndIgnoreTAO)
? mTimingData->RedirectStartHighRes(mPerformance)
: 0;
}
virtual DOMHighResTimeStamp RedirectStart(
nsIPrincipal& aSubjectPrincipal) const {
return RedirectStart(aSubjectPrincipal,
false /* aEnsureSameOriginAndIgnoreTAO */);
}
DOMHighResTimeStamp RedirectEnd(nsIPrincipal& aSubjectPrincipal,
bool aEnsureSameOriginAndIgnoreTAO) const {
// We have to check if all the redirect URIs whether had the same origin or
// different origins with TAO headers set (since there is no check in
// RedirectEndHighRes())
return ReportRedirectForCaller(aSubjectPrincipal,
aEnsureSameOriginAndIgnoreTAO)
? mTimingData->RedirectEndHighRes(mPerformance)
: 0;
}
virtual DOMHighResTimeStamp RedirectEnd(
nsIPrincipal& aSubjectPrincipal) const {
return RedirectEnd(aSubjectPrincipal,
false /* aEnsureSameOriginAndIgnoreTAO */);
}
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(DomainLookupStart)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(DomainLookupEnd)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(ConnectStart)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(ConnectEnd)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(RequestStart)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(ResponseStart)
DOMHighResTimeStamp ResponseEnd() const {
return mTimingData->ResponseEndHighRes(mPerformance);
}
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(SecureConnectionStart)
virtual const PerformanceResourceTiming* ToResourceTiming() const override {
return this;
}
IMPL_RESOURCE_TIMING_CORS_PROTECTED_SIZE_PROP(EncodedBodySize);
IMPL_RESOURCE_TIMING_CORS_PROTECTED_SIZE_PROP(DecodedBodySize);
uint64_t TransferSize(nsIPrincipal& aSubjectPrincipal) const {
const bool allowed =
!mTimingData->RedirectCountReal()
? TimingAllowedForCaller(aSubjectPrincipal)
: ReportRedirectForCaller(aSubjectPrincipal, false);
if (!allowed) {
return 0;
}
// Resource is cached.
if (!mTimingData->TransferSize()) {
return 0;
}
auto encodedBodySize = EncodedBodySize(aSubjectPrincipal);
// The constant number added to transferSize replaces exposing the
// total byte size of the HTTP headers, as that may expose the
// presence of certain cookies.
return encodedBodySize + 300;
}
uint16_t ResponseStatus(nsIPrincipal& aSubjectPrincipal) const {
if (BodyInfoAccessAllowedForCaller(aSubjectPrincipal)) {
return mTimingData->ResponseStatus();
}
return 0;
}
void GetContentType(nsAString& aContentType,
nsIPrincipal& aSubjectPrincipal) const {
if (BodyInfoAccessAllowedForCaller(aSubjectPrincipal) ==
nsITimedChannel::BodyInfoAccess::ALLOW_ALL) {
aContentType = mTimingData->ContentType();
}
}
void GetServerTiming(nsTArray<RefPtr<PerformanceServerTiming>>& aRetval,
nsIPrincipal& aSubjectPrincipal);
size_t SizeOfIncludingThis(
mozilla::MallocSizeOf aMallocSizeOf) const override;
protected:
virtual ~PerformanceResourceTiming();
size_t SizeOfExcludingThis(
mozilla::MallocSizeOf aMallocSizeOf) const override;
// Check if caller has access to the bodyInfo of the request, per Fetch spec.
nsITimedChannel::BodyInfoAccess BodyInfoAccessAllowedForCaller(
nsIPrincipal& aCaller) const;
// Check if caller has access to cross-origin timings, either by the rules
// from the spec, or based on addon permissions.
bool TimingAllowedForCaller(nsIPrincipal& aCaller) const;
// Check if cross-origin redirects should be reported to the caller.
bool ReportRedirectForCaller(nsIPrincipal& aCaller,
bool aEnsureSameOriginAndIgnoreTAO) const;
nsString mInitiatorType;
const UniquePtr<PerformanceTimingData> mTimingData; // always non-null
RefPtr<Performance> mPerformance;
// The same initial requested URI as the `name` attribute.
nsCOMPtr<nsIURI> mOriginalURI;
private:
mutable Maybe<DOMHighResTimeStamp> mCachedStartTime;
};
} // namespace mozilla::dom
#endif /* mozilla_dom_PerformanceResourceTiming_h___ */