1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "PerformanceResourceTiming.h"
#include "mozilla/dom/PerformanceResourceTimingBinding.h"
#include "nsArrayUtils.h"
#include "nsGkAtoms.h"
#include "nsNetUtil.h"
using namespace mozilla::dom;
NS_IMPL_CYCLE_COLLECTION_INHERITED(PerformanceResourceTiming, PerformanceEntry,
mPerformance)
NS_IMPL_CYCLE_COLLECTION_TRACE_BEGIN_INHERITED(PerformanceResourceTiming,
PerformanceEntry)
NS_IMPL_CYCLE_COLLECTION_TRACE_END
NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(PerformanceResourceTiming)
NS_INTERFACE_MAP_END_INHERITING(PerformanceEntry)
NS_IMPL_ADDREF_INHERITED(PerformanceResourceTiming, PerformanceEntry)
NS_IMPL_RELEASE_INHERITED(PerformanceResourceTiming, PerformanceEntry)
PerformanceResourceTiming::PerformanceResourceTiming(
UniquePtr<PerformanceTimingData>&& aPerformanceTiming,
Performance* aPerformance, const nsAString& aName)
: PerformanceEntry(aPerformance->GetParentObject(), aName,
nsGkAtoms::resource),
mTimingData(std::move(aPerformanceTiming)),
mPerformance(aPerformance) {
MOZ_RELEASE_ASSERT(mTimingData);
MOZ_ASSERT(aPerformance, "Parent performance object should be provided");
if (NS_IsMainThread()) {
// Used to check if an addon content script has access to this timing.
// We don't need it in workers, and ignore mOriginalURI if null.
NS_NewURI(getter_AddRefs(mOriginalURI), aName);
}
}
PerformanceResourceTiming::~PerformanceResourceTiming() = default;
DOMHighResTimeStamp PerformanceResourceTiming::FetchStart() const {
if (mTimingData->TimingAllowed()) {
return mTimingData->FetchStartHighRes(mPerformance);
}
return StartTime();
}
DOMHighResTimeStamp PerformanceResourceTiming::StartTime() const {
// Force the start time to be the earliest of:
// - RedirectStart
// - WorkerStart
// - AsyncOpen
// Ignore zero values. The RedirectStart and WorkerStart values
// can come from earlier redirected channels prior to the AsyncOpen
// time being recorded.
if (mCachedStartTime.isNothing()) {
DOMHighResTimeStamp redirect =
mTimingData->RedirectStartHighRes(mPerformance);
redirect = redirect ? redirect : DBL_MAX;
DOMHighResTimeStamp worker = mTimingData->WorkerStartHighRes(mPerformance);
worker = worker ? worker : DBL_MAX;
DOMHighResTimeStamp asyncOpen = mTimingData->AsyncOpenHighRes(mPerformance);
mCachedStartTime.emplace(std::min(asyncOpen, std::min(redirect, worker)));
}
return mCachedStartTime.value();
}
JSObject* PerformanceResourceTiming::WrapObject(
JSContext* aCx, JS::Handle<JSObject*> aGivenProto) {
return PerformanceResourceTiming_Binding::Wrap(aCx, this, aGivenProto);
}
size_t PerformanceResourceTiming::SizeOfIncludingThis(
mozilla::MallocSizeOf aMallocSizeOf) const {
return aMallocSizeOf(this) + SizeOfExcludingThis(aMallocSizeOf);
}
size_t PerformanceResourceTiming::SizeOfExcludingThis(
mozilla::MallocSizeOf aMallocSizeOf) const {
return PerformanceEntry::SizeOfExcludingThis(aMallocSizeOf) +
mInitiatorType.SizeOfExcludingThisIfUnshared(aMallocSizeOf) +
mTimingData->ContentType().SizeOfExcludingThisIfUnshared(
aMallocSizeOf) +
mTimingData->NextHopProtocol().SizeOfExcludingThisIfUnshared(
aMallocSizeOf);
}
void PerformanceResourceTiming::GetServerTiming(
nsTArray<RefPtr<PerformanceServerTiming>>& aRetval,
nsIPrincipal& aSubjectPrincipal) {
aRetval.Clear();
if (!TimingAllowedForCaller(aSubjectPrincipal)) {
return;
}
nsTArray<nsCOMPtr<nsIServerTiming>> serverTimingArray =
mTimingData->GetServerTiming();
uint32_t length = serverTimingArray.Length();
for (uint32_t index = 0; index < length; ++index) {
nsCOMPtr<nsIServerTiming> serverTiming = serverTimingArray.ElementAt(index);
MOZ_ASSERT(serverTiming);
aRetval.AppendElement(
new PerformanceServerTiming(GetParentObject(), serverTiming));
}
}
nsITimedChannel::BodyInfoAccess
PerformanceResourceTiming::BodyInfoAccessAllowedForCaller(
nsIPrincipal& aCaller) const {
// If the addon has permission to access the cross-origin resource,
// allow it full access to the bodyInfo.
if (mOriginalURI &&
BasePrincipal::Cast(&aCaller)->AddonAllowsLoad(mOriginalURI)) {
return nsITimedChannel::BodyInfoAccess::ALLOW_ALL;
}
return mTimingData->BodyInfoAccessAllowed();
}
bool PerformanceResourceTiming::TimingAllowedForCaller(
nsIPrincipal& aCaller) const {
if (mTimingData->TimingAllowed()) {
return true;
}
// Check if the addon has permission to access the cross-origin resource.
return mOriginalURI &&
BasePrincipal::Cast(&aCaller)->AddonAllowsLoad(mOriginalURI);
}
bool PerformanceResourceTiming::ReportRedirectForCaller(
nsIPrincipal& aCaller, bool aEnsureSameOriginAndIgnoreTAO) const {
if (mTimingData->ShouldReportCrossOriginRedirect(
aEnsureSameOriginAndIgnoreTAO)) {
return true;
}
// Only report cross-origin redirect if the addon has <all_urls> permission.
return BasePrincipal::Cast(&aCaller)->AddonHasPermission(
nsGkAtoms::all_urlsPermission);
}
RenderBlockingStatusType PerformanceResourceTiming::RenderBlockingStatus()
const {
return mTimingData->RenderBlockingStatus();
}
|