Source code

Revision control

Copy as Markdown

Other Tools

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
/* loading of CSS style sheets using the network APIs */
#include "mozilla/css/Loader.h"
#include "MainThreadUtils.h"
#include "mozilla/ArrayUtils.h"
#include "mozilla/css/ErrorReporter.h"
#include "mozilla/dom/DocGroup.h"
#include "mozilla/dom/FetchPriority.h"
#include "mozilla/dom/SRILogHelper.h"
#include "mozilla/IntegerPrintfMacros.h"
#include "mozilla/AutoRestore.h"
#include "mozilla/LoadInfo.h"
#include "mozilla/Logging.h"
#include "mozilla/MemoryReporting.h"
#include "mozilla/PreloadHashKey.h"
#include "mozilla/ResultExtensions.h"
#include "mozilla/SchedulerGroup.h"
#include "mozilla/URLPreloader.h"
#include "nsIChildChannel.h"
#include "nsIPrincipal.h"
#include "nsISupportsPriority.h"
#include "nsITimedChannel.h"
#include "nsICachingChannel.h"
#include "nsSyncLoadService.h"
#include "nsContentSecurityManager.h"
#include "nsCOMPtr.h"
#include "nsString.h"
#include "nsIContent.h"
#include "nsIContentInlines.h"
#include "nsICookieJarSettings.h"
#include "mozilla/dom/Document.h"
#include "nsIURI.h"
#include "nsContentUtils.h"
#include "nsIScriptSecurityManager.h"
#include "nsContentPolicyUtils.h"
#include "nsIHttpChannel.h"
#include "nsIHttpChannelInternal.h"
#include "nsIClassOfService.h"
#include "nsIScriptError.h"
#include "nsMimeTypes.h"
#include "nsICSSLoaderObserver.h"
#include "nsThreadUtils.h"
#include "nsGkAtoms.h"
#include "nsIThreadInternal.h"
#include "nsINetworkPredictor.h"
#include "nsQueryActor.h"
#include "nsStringStream.h"
#include "mozilla/dom/MediaList.h"
#include "mozilla/dom/ShadowRoot.h"
#include "mozilla/dom/URL.h"
#include "mozilla/net/UrlClassifierFeatureFactory.h"
#include "mozilla/AsyncEventDispatcher.h"
#include "mozilla/ProfilerLabels.h"
#include "mozilla/ServoBindings.h"
#include "mozilla/StyleSheet.h"
#include "mozilla/StyleSheetInlines.h"
#include "mozilla/ConsoleReportCollector.h"
#include "mozilla/ServoUtils.h"
#include "mozilla/css/StreamLoader.h"
#include "mozilla/SharedStyleSheetCache.h"
#include "mozilla/StaticPrefs_layout.h"
#include "mozilla/StaticPrefs_network.h"
#include "mozilla/StaticPrefs_dom.h"
#include "mozilla/StaticPrefs_network.h"
#include "mozilla/Try.h"
#include "ReferrerInfo.h"
#include "nsXULPrototypeCache.h"
#include "nsError.h"
#include "mozilla/dom/SRICheck.h"
#include "mozilla/Encoding.h"
using namespace mozilla::dom;
// 1024 bytes is specified in https://drafts.csswg.org/css-syntax/
#define SNIFFING_BUFFER_SIZE 1024
/**
* OVERALL ARCHITECTURE
*
* The CSS Loader gets requests to load various sorts of style sheets:
* inline style from <style> elements, linked style, @import-ed child
* sheets, non-document sheets. The loader handles the following tasks:
* 1) Creation of the actual style sheet objects: CreateSheet()
* 2) setting of the right media, title, enabled state, etc on the
* sheet: PrepareSheet()
* 3) Insertion of the sheet in the proper cascade order:
* InsertSheetInTree() and InsertChildSheet()
* 4) Load of the sheet: LoadSheet() including security checks
* 5) Parsing of the sheet: ParseSheet()
* 6) Cleanup: SheetComplete()
*
* The detailed documentation for these functions is found with the
* function implementations.
*
* The following helper object is used:
* SheetLoadData -- a small class that is used to store all the
* information needed for the loading of a sheet;
* this class handles listening for the stream
* loader completion and also handles charset
* determination.
*/
extern mozilla::LazyLogModule sCssLoaderLog;
mozilla::LazyLogModule sCssLoaderLog("nsCSSLoader");
static mozilla::LazyLogModule gSriPRLog("SRI");
static bool IsPrivilegedURI(nsIURI* aURI) {
return aURI->SchemeIs("chrome") || aURI->SchemeIs("resource");
}
#define LOG_ERROR(args) MOZ_LOG(sCssLoaderLog, mozilla::LogLevel::Error, args)
#define LOG_WARN(args) MOZ_LOG(sCssLoaderLog, mozilla::LogLevel::Warning, args)
#define LOG_DEBUG(args) MOZ_LOG(sCssLoaderLog, mozilla::LogLevel::Debug, args)
#define LOG(args) LOG_DEBUG(args)
#define LOG_ERROR_ENABLED() \
MOZ_LOG_TEST(sCssLoaderLog, mozilla::LogLevel::Error)
#define LOG_WARN_ENABLED() \
MOZ_LOG_TEST(sCssLoaderLog, mozilla::LogLevel::Warning)
#define LOG_DEBUG_ENABLED() \
MOZ_LOG_TEST(sCssLoaderLog, mozilla::LogLevel::Debug)
#define LOG_ENABLED() LOG_DEBUG_ENABLED()
#define LOG_URI(format, uri) \
PR_BEGIN_MACRO \
NS_ASSERTION(uri, "Logging null uri"); \
if (LOG_ENABLED()) { \
LOG((format, uri->GetSpecOrDefault().get())); \
} \
PR_END_MACRO
// And some convenience strings...
static const char* const gStateStrings[] = {"NeedsParser", "Pending", "Loading",
"Complete"};
namespace mozilla {
SheetLoadDataHashKey::SheetLoadDataHashKey(const css::SheetLoadData& aLoadData)
: mURI(aLoadData.mURI),
mPrincipal(aLoadData.mTriggeringPrincipal),
mLoaderPrincipal(aLoadData.mLoader->LoaderPrincipal()),
mPartitionPrincipal(aLoadData.mLoader->PartitionedPrincipal()),
mEncodingGuess(aLoadData.mGuessedEncoding),
mCORSMode(aLoadData.mSheet->GetCORSMode()),
mParsingMode(aLoadData.mSheet->ParsingMode()),
mCompatMode(aLoadData.mCompatMode),
mIsLinkRelPreload(aLoadData.IsLinkRelPreload()) {
MOZ_COUNT_CTOR(SheetLoadDataHashKey);
MOZ_ASSERT(mURI);
MOZ_ASSERT(mPrincipal);
MOZ_ASSERT(mLoaderPrincipal);
MOZ_ASSERT(mPartitionPrincipal);
aLoadData.mSheet->GetIntegrity(mSRIMetadata);
}
bool SheetLoadDataHashKey::KeyEquals(const SheetLoadDataHashKey& aKey) const {
{
bool eq;
if (NS_FAILED(mURI->Equals(aKey.mURI, &eq)) || !eq) {
return false;
}
}
LOG_URI("KeyEquals(%s)\n", mURI);
if (mParsingMode != aKey.mParsingMode) {
LOG((" > Parsing mode mismatch\n"));
return false;
}
// Chrome URIs ignore everything else.
if (IsPrivilegedURI(mURI)) {
return true;
}
if (!mPrincipal->Equals(aKey.mPrincipal)) {
LOG((" > Principal mismatch\n"));
return false;
}
// We only check for partition principal equality if any of the loads are
// triggered by a document rather than e.g. an extension (which have different
// origins than the loader principal).
if (mPrincipal->Equals(mLoaderPrincipal) ||
aKey.mPrincipal->Equals(aKey.mLoaderPrincipal)) {
if (!mPartitionPrincipal->Equals(aKey.mPartitionPrincipal)) {
LOG((" > Partition principal mismatch\n"));
return false;
}
}
if (mCORSMode != aKey.mCORSMode) {
LOG((" > CORS mismatch\n"));
return false;
}
if (mCompatMode != aKey.mCompatMode) {
LOG((" > Quirks mismatch\n"));
return false;
}
// If encoding differs, then don't reuse the cache.
//
// TODO(emilio): When the encoding is determined from the request (either
// BOM or Content-Length or @charset), we could do a bit better,
// theoretically.
if (mEncodingGuess != aKey.mEncodingGuess) {
LOG((" > Encoding guess mismatch\n"));
return false;
}
// Consuming stylesheet tags must never coalesce to <link preload> initiated
// speculative loads with a weaker SRI hash or its different value. This
// check makes sure that regular loads will never find such a weaker preload
// and rather start a new, independent load with new, stronger SRI checker
// set up, so that integrity is ensured.
if (mIsLinkRelPreload != aKey.mIsLinkRelPreload) {
const auto& linkPreloadMetadata =
mIsLinkRelPreload ? mSRIMetadata : aKey.mSRIMetadata;
const auto& consumerPreloadMetadata =
mIsLinkRelPreload ? aKey.mSRIMetadata : mSRIMetadata;
if (!consumerPreloadMetadata.CanTrustBeDelegatedTo(linkPreloadMetadata)) {
LOG((" > Preload SRI metadata mismatch\n"));
return false;
}
}
return true;
}
namespace css {
static NotNull<const Encoding*> GetFallbackEncoding(
Loader& aLoader, nsINode* aOwningNode,
const Encoding* aPreloadOrParentDataEncoding) {
const Encoding* encoding;
// Now try the charset on the <link> or processing instruction
// that loaded us
if (aOwningNode) {
nsAutoString label16;
LinkStyle::FromNode(*aOwningNode)->GetCharset(label16);
encoding = Encoding::ForLabel(label16);
if (encoding) {
return WrapNotNull(encoding);
}
}
// Try preload or parent sheet encoding.
if (aPreloadOrParentDataEncoding) {
return WrapNotNull(aPreloadOrParentDataEncoding);
}
if (auto* doc = aLoader.GetDocument()) {
// Use the document charset.
return doc->GetDocumentCharacterSet();
}
return UTF_8_ENCODING;
}
/********************************
* SheetLoadData implementation *
********************************/
NS_IMPL_ISUPPORTS(SheetLoadData, nsISupports)
SheetLoadData::SheetLoadData(
css::Loader* aLoader, const nsAString& aTitle, nsIURI* aURI,
StyleSheet* aSheet, SyncLoad aSyncLoad, nsINode* aOwningNode,
IsAlternate aIsAlternate, MediaMatched aMediaMatches,
StylePreloadKind aPreloadKind, nsICSSLoaderObserver* aObserver,
nsIPrincipal* aTriggeringPrincipal, nsIReferrerInfo* aReferrerInfo,
const nsAString& aNonce, FetchPriority aFetchPriority)
: mLoader(aLoader),
mTitle(aTitle),
mEncoding(nullptr),
mURI(aURI),
mSheet(aSheet),
mPendingChildren(0),
mSyncLoad(aSyncLoad == SyncLoad::Yes),
mIsNonDocumentSheet(false),
mIsChildSheet(aSheet->GetParentSheet()),
mIsBeingParsed(false),
mIsLoading(false),
mIsCancelled(false),
mMustNotify(false),
mHadOwnerNode(!!aOwningNode),
mWasAlternate(aIsAlternate == IsAlternate::Yes),
mMediaMatched(aMediaMatches == MediaMatched::Yes),
mUseSystemPrincipal(false),
mSheetAlreadyComplete(false),
mIsCrossOriginNoCORS(false),
mBlockResourceTiming(false),
mLoadFailed(false),
mPreloadKind(aPreloadKind),
mObserver(aObserver),
mTriggeringPrincipal(aTriggeringPrincipal),
mReferrerInfo(aReferrerInfo),
mNonce(aNonce),
mFetchPriority{aFetchPriority},
mGuessedEncoding(GetFallbackEncoding(*aLoader, aOwningNode, nullptr)),
mCompatMode(aLoader->CompatMode(aPreloadKind)),
mRecordErrors(
aLoader && aLoader->GetDocument() &&
css::ErrorReporter::ShouldReportErrors(*aLoader->GetDocument())) {
MOZ_ASSERT(!aOwningNode || dom::LinkStyle::FromNode(*aOwningNode),
"Must implement LinkStyle");
MOZ_ASSERT(mTriggeringPrincipal);
MOZ_ASSERT(mLoader, "Must have a loader!");
}
SheetLoadData::SheetLoadData(css::Loader* aLoader, nsIURI* aURI,
StyleSheet* aSheet, SheetLoadData* aParentData,
nsICSSLoaderObserver* aObserver,
nsIPrincipal* aTriggeringPrincipal,
nsIReferrerInfo* aReferrerInfo)
: mLoader(aLoader),
mEncoding(nullptr),
mURI(aURI),
mSheet(aSheet),
mParentData(aParentData),
mPendingChildren(0),
mSyncLoad(aParentData && aParentData->mSyncLoad),
mIsNonDocumentSheet(aParentData && aParentData->mIsNonDocumentSheet),
mIsChildSheet(aSheet->GetParentSheet()),
mIsBeingParsed(false),
mIsLoading(false),
mIsCancelled(false),
mMustNotify(false),
mHadOwnerNode(false),
mWasAlternate(false),
mMediaMatched(true),
mUseSystemPrincipal(aParentData && aParentData->mUseSystemPrincipal),
mSheetAlreadyComplete(false),
mIsCrossOriginNoCORS(false),
mBlockResourceTiming(false),
mLoadFailed(false),
mPreloadKind(StylePreloadKind::None),
mObserver(aObserver),
mTriggeringPrincipal(aTriggeringPrincipal),
mReferrerInfo(aReferrerInfo),
mNonce(u""_ns),
mFetchPriority(FetchPriority::Auto),
mGuessedEncoding(GetFallbackEncoding(
*aLoader, nullptr, aParentData ? aParentData->mEncoding : nullptr)),
mCompatMode(aLoader->CompatMode(mPreloadKind)),
mRecordErrors(
aLoader && aLoader->GetDocument() &&
css::ErrorReporter::ShouldReportErrors(*aLoader->GetDocument())) {
MOZ_ASSERT(mLoader, "Must have a loader!");
MOZ_ASSERT(mTriggeringPrincipal);
MOZ_ASSERT(!mUseSystemPrincipal || mSyncLoad,
"Shouldn't use system principal for async loads");
MOZ_ASSERT_IF(aParentData, mIsChildSheet);
}
SheetLoadData::SheetLoadData(
css::Loader* aLoader, nsIURI* aURI, StyleSheet* aSheet, SyncLoad aSyncLoad,
UseSystemPrincipal aUseSystemPrincipal, StylePreloadKind aPreloadKind,
const Encoding* aPreloadEncoding, nsICSSLoaderObserver* aObserver,
nsIPrincipal* aTriggeringPrincipal, nsIReferrerInfo* aReferrerInfo,
const nsAString& aNonce, FetchPriority aFetchPriority)
: mLoader(aLoader),
mEncoding(nullptr),
mURI(aURI),
mSheet(aSheet),
mPendingChildren(0),
mSyncLoad(aSyncLoad == SyncLoad::Yes),
mIsNonDocumentSheet(true),
mIsChildSheet(false),
mIsBeingParsed(false),
mIsLoading(false),
mIsCancelled(false),
mMustNotify(false),
mHadOwnerNode(false),
mWasAlternate(false),
mMediaMatched(true),
mUseSystemPrincipal(aUseSystemPrincipal == UseSystemPrincipal::Yes),
mSheetAlreadyComplete(false),
mIsCrossOriginNoCORS(false),
mBlockResourceTiming(false),
mLoadFailed(false),
mPreloadKind(aPreloadKind),
mObserver(aObserver),
mTriggeringPrincipal(aTriggeringPrincipal),
mReferrerInfo(aReferrerInfo),
mNonce(aNonce),
mFetchPriority(aFetchPriority),
mGuessedEncoding(
GetFallbackEncoding(*aLoader, nullptr, aPreloadEncoding)),
mCompatMode(aLoader->CompatMode(aPreloadKind)),
mRecordErrors(
aLoader && aLoader->GetDocument() &&
css::ErrorReporter::ShouldReportErrors(*aLoader->GetDocument())) {
MOZ_ASSERT(mTriggeringPrincipal);
MOZ_ASSERT(mLoader, "Must have a loader!");
MOZ_ASSERT(!mUseSystemPrincipal || mSyncLoad,
"Shouldn't use system principal for async loads");
MOZ_ASSERT(!aSheet->GetParentSheet(), "Shouldn't be used for child loads");
}
SheetLoadData::~SheetLoadData() {
MOZ_RELEASE_ASSERT(mSheetCompleteCalled || mIntentionallyDropped,
"Should always call SheetComplete, except when "
"dropping the load");
}
RefPtr<StyleSheet> SheetLoadData::ValueForCache() const {
// We need to clone the sheet on insertion to the cache because otherwise the
// stylesheets can keep full windows alive via either their JS wrapper, or via
// StyleSheet::mRelevantGlobal.
//
// If this ever changes, then you also need to fix up the memory reporting in
// both SizeOfIncludingThis and nsXULPrototypeCache::CollectMemoryReports.
return mSheet->Clone(nullptr, nullptr);
}
void SheetLoadData::PrioritizeAsPreload(nsIChannel* aChannel) {
if (nsCOMPtr<nsISupportsPriority> sp = do_QueryInterface(aChannel)) {
sp->AdjustPriority(nsISupportsPriority::PRIORITY_HIGHEST);
}
}
void SheetLoadData::StartPendingLoad() {
mLoader->LoadSheet(*this, Loader::SheetState::NeedsParser, 0,
Loader::PendingLoad::Yes);
}
already_AddRefed<AsyncEventDispatcher>
SheetLoadData::PrepareLoadEventIfNeeded() {
nsCOMPtr<nsINode> node = mSheet->GetOwnerNode();
if (!node) {
return nullptr;
}
MOZ_ASSERT(!RootLoadData().IsLinkRelPreload(),
"rel=preload handled elsewhere");
RefPtr<AsyncEventDispatcher> dispatcher;
if (BlocksLoadEvent()) {
dispatcher = new LoadBlockingAsyncEventDispatcher(
node, mLoadFailed ? u"error"_ns : u"load"_ns, CanBubble::eNo,
ChromeOnlyDispatch::eNo);
} else {
// Fire the load event on the link, but don't block the document load.
dispatcher =
new AsyncEventDispatcher(node, mLoadFailed ? u"error"_ns : u"load"_ns,
CanBubble::eNo, ChromeOnlyDispatch::eNo);
}
return dispatcher.forget();
}
nsINode* SheetLoadData::GetRequestingNode() const {
if (nsINode* node = mSheet->GetOwnerNodeOfOutermostSheet()) {
return node;
}
return mLoader->GetDocument();
}
/*********************
* Style sheet reuse *
*********************/
bool LoaderReusableStyleSheets::FindReusableStyleSheet(
nsIURI* aURL, RefPtr<StyleSheet>& aResult) {
MOZ_ASSERT(aURL);
for (size_t i = mReusableSheets.Length(); i > 0; --i) {
size_t index = i - 1;
bool sameURI;
MOZ_ASSERT(mReusableSheets[index]->GetOriginalURI());
nsresult rv =
aURL->Equals(mReusableSheets[index]->GetOriginalURI(), &sameURI);
if (!NS_FAILED(rv) && sameURI) {
aResult = mReusableSheets[index];
mReusableSheets.RemoveElementAt(index);
return true;
}
}
return false;
}
/*************************
* Loader Implementation *
*************************/
Loader::Loader()
: mDocument(nullptr),
mDocumentCompatMode(eCompatibility_FullStandards),
mReporter(new ConsoleReportCollector()) {}
Loader::Loader(DocGroup* aDocGroup) : Loader() { mDocGroup = aDocGroup; }
Loader::Loader(Document* aDocument) : Loader() {
MOZ_ASSERT(aDocument, "We should get a valid document from the caller!");
mDocument = aDocument;
mIsDocumentAssociated = true;
mDocumentCompatMode = aDocument->GetCompatibilityMode();
mSheets = SharedStyleSheetCache::Get();
RegisterInSheetCache();
}
// Note: no real need to revoke our stylesheet loaded events -- they hold strong
// references to us, so if we're going away that means they're all done.
Loader::~Loader() = default;
void Loader::RegisterInSheetCache() {
MOZ_ASSERT(mDocument);
MOZ_ASSERT(mSheets);
mSheets->RegisterLoader(*this);
}
void Loader::DeregisterFromSheetCache() {
MOZ_ASSERT(mDocument);
MOZ_ASSERT(mSheets);
mSheets->CancelLoadsForLoader(*this);
mSheets->UnregisterLoader(*this);
}
void Loader::DropDocumentReference() {
// Flush out pending datas just so we don't leak by accident.
if (mSheets) {
DeregisterFromSheetCache();
}
mDocument = nullptr;
}
void Loader::DocumentStyleSheetSetChanged() {
MOZ_ASSERT(mDocument);
// start any pending alternates that aren't alternates anymore
mSheets->StartPendingLoadsForLoader(*this, [&](const SheetLoadData& aData) {
return IsAlternateSheet(aData.mTitle, true) != IsAlternate::Yes;
});
}
static const char kCharsetSym[] = "@charset \"";
static bool GetCharsetFromData(const char* aStyleSheetData,
uint32_t aDataLength, nsACString& aCharset) {
aCharset.Truncate();
if (aDataLength <= sizeof(kCharsetSym) - 1) return false;
if (strncmp(aStyleSheetData, kCharsetSym, sizeof(kCharsetSym) - 1)) {
return false;
}
for (uint32_t i = sizeof(kCharsetSym) - 1; i < aDataLength; ++i) {
char c = aStyleSheetData[i];
if (c == '"') {
++i;
if (i < aDataLength && aStyleSheetData[i] == ';') {
return true;
}
// fail
break;
}
aCharset.Append(c);
}
// Did not see end quote or semicolon
aCharset.Truncate();
return false;
}
NotNull<const Encoding*> SheetLoadData::DetermineNonBOMEncoding(
const nsACString& aSegment, nsIChannel* aChannel) const {
const Encoding* encoding;
nsAutoCString label;
// Check HTTP
if (aChannel && NS_SUCCEEDED(aChannel->GetContentCharset(label))) {
encoding = Encoding::ForLabel(label);
if (encoding) {
return WrapNotNull(encoding);
}
}
// Check @charset
auto sniffingLength = aSegment.Length();
if (sniffingLength > SNIFFING_BUFFER_SIZE) {
sniffingLength = SNIFFING_BUFFER_SIZE;
}
if (GetCharsetFromData(aSegment.BeginReading(), sniffingLength, label)) {
encoding = Encoding::ForLabel(label);
if (encoding == UTF_16BE_ENCODING || encoding == UTF_16LE_ENCODING) {
return UTF_8_ENCODING;
}
if (encoding) {
return WrapNotNull(encoding);
}
}
return mGuessedEncoding;
}
static nsresult VerifySheetIntegrity(const SRIMetadata& aMetadata,
nsIChannel* aChannel,
const nsACString& aFirst,
const nsACString& aSecond,
const nsACString& aSourceFileURI,
nsIConsoleReportCollector* aReporter) {
NS_ENSURE_ARG_POINTER(aReporter);
if (MOZ_LOG_TEST(SRILogHelper::GetSriLog(), LogLevel::Debug)) {
nsAutoCString requestURL;
nsCOMPtr<nsIURI> originalURI;
if (aChannel &&
NS_SUCCEEDED(aChannel->GetOriginalURI(getter_AddRefs(originalURI))) &&
originalURI) {
originalURI->GetAsciiSpec(requestURL);
}
MOZ_LOG(SRILogHelper::GetSriLog(), LogLevel::Debug,
("VerifySheetIntegrity (unichar stream)"));
}
SRICheckDataVerifier verifier(aMetadata, aSourceFileURI, aReporter);
nsresult rv =
verifier.Update(aFirst.Length(), (const uint8_t*)aFirst.BeginReading());
NS_ENSURE_SUCCESS(rv, rv);
rv =
verifier.Update(aSecond.Length(), (const uint8_t*)aSecond.BeginReading());
NS_ENSURE_SUCCESS(rv, rv);
return verifier.Verify(aMetadata, aChannel, aSourceFileURI, aReporter);
}
static bool AllLoadsCanceled(const SheetLoadData& aData) {
const SheetLoadData* data = &aData;
do {
if (!data->IsCancelled()) {
return false;
}
} while ((data = data->mNext));
return true;
}
/*
* Stream completion code shared by Stylo and the old style system.
*
* Here we need to check that the load did not give us an http error
* page and check the mimetype on the channel to make sure we're not
* loading non-text/css data in standards mode.
*/
nsresult SheetLoadData::VerifySheetReadyToParse(
nsresult aStatus, const nsACString& aBytes1, const nsACString& aBytes2,
nsIChannel* aChannel, nsIURI* aFinalChannelURI,
nsIPrincipal* aChannelResultPrincipal) {
LOG(("SheetLoadData::VerifySheetReadyToParse"));
NS_ASSERTION((!NS_IsMainThread() || !mLoader->mSyncCallback),
"Synchronous callback from necko");
if (AllLoadsCanceled(*this)) {
if (NS_IsMainThread()) {
LOG_WARN((" All loads are canceled, dropping"));
mLoader->SheetComplete(*this, NS_BINDING_ABORTED);
}
return NS_OK;
}
if (!NS_IsMainThread() && mRecordErrors) {
// we cannot parse sheet OMT if we need to record errors
return NS_OK;
}
if (NS_FAILED(aStatus)) {
if (NS_IsMainThread()) {
LOG_WARN(
(" Load failed: status 0x%" PRIx32, static_cast<uint32_t>(aStatus)));
// Handle sheet not loading error because source was a tracking URL (or
// fingerprinting, cryptomining, etc).
// We make a note of this sheet node by including it in a dedicated
// array of blocked tracking nodes under its parent document.
//
// Multiple sheet load instances might be tied to this request,
// we annotate each one linked to a valid owning element (node).
if (net::UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode(
aStatus)) {
if (Document* doc = mLoader->GetDocument()) {
for (SheetLoadData* data = this; data; data = data->mNext) {
// owner node may be null but AddBlockTrackingNode can cope
doc->AddBlockedNodeByClassifier(data->mSheet->GetOwnerNode());
}
}
}
mLoader->SheetComplete(*this, aStatus);
}
return NS_OK;
}
if (!aChannel) {
MOZ_ASSERT(NS_IsMainThread());
mLoader->SheetComplete(*this, NS_OK);
return NS_OK;
}
nsCOMPtr<nsIURI> originalURI;
aChannel->GetOriginalURI(getter_AddRefs(originalURI));
// If the channel's original URI is "chrome:", we want that, since
// the observer code in nsXULPrototypeCache depends on chrome stylesheets
// having a chrome URI. (Whether or not chrome stylesheets come through
// this codepath seems nondeterministic.)
// Otherwise we want the potentially-HTTP-redirected URI.
if (!aFinalChannelURI || !originalURI) {
MOZ_ASSERT(NS_IsMainThread());
NS_ERROR("Someone just violated the nsIRequest contract");
LOG_WARN((" Channel without a URI. Bad!"));
mLoader->SheetComplete(*this, NS_ERROR_UNEXPECTED);
return NS_OK;
}
nsCOMPtr<nsIPrincipal> principal;
nsIScriptSecurityManager* secMan = nsContentUtils::GetSecurityManager();
nsresult result = NS_ERROR_NOT_AVAILABLE;
if (secMan) { // Could be null if we already shut down
if (mUseSystemPrincipal) {
result = secMan->GetSystemPrincipal(getter_AddRefs(principal));
} else {
if (aChannelResultPrincipal) {
principal = aChannelResultPrincipal;
result = NS_OK;
}
}
}
if (NS_FAILED(result)) {
if (NS_IsMainThread()) {
LOG_WARN((" Couldn't get principal"));
mLoader->SheetComplete(*this, result);
}
return NS_OK;
}
mSheet->SetPrincipal(principal);
// If it's an HTTP channel, we want to make sure this is not an
// error document we got.
if (nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aChannel)) {
bool requestSucceeded;
result = httpChannel->GetRequestSucceeded(&requestSucceeded);
if (NS_SUCCEEDED(result) && !requestSucceeded) {
if (NS_IsMainThread()) {
LOG((" Load returned an error page"));
mLoader->SheetComplete(*this, NS_ERROR_NOT_AVAILABLE);
}
return NS_OK;
}
nsCString sourceMapURL;
if (nsContentUtils::GetSourceMapURL(httpChannel, sourceMapURL)) {
mSheet->SetSourceMapURL(std::move(sourceMapURL));
}
}
nsAutoCString contentType;
aChannel->GetContentType(contentType);
// In standards mode, a style sheet must have one of these MIME
// types to be processed at all. In quirks mode, we accept any
// MIME type, but only if the style sheet is same-origin with the
// requesting document or parent sheet. See bug 524223.
bool validType = contentType.EqualsLiteral("text/css") ||
contentType.EqualsLiteral(UNKNOWN_CONTENT_TYPE) ||
contentType.IsEmpty();
if (!validType) {
if (!NS_IsMainThread()) {
return NS_OK;
}
const char* errorMessage;
uint32_t errorFlag;
bool sameOrigin = true;
bool subsumed;
result = mTriggeringPrincipal->Subsumes(principal, &subsumed);
if (NS_FAILED(result) || !subsumed) {
sameOrigin = false;
}
if (sameOrigin && mCompatMode == eCompatibility_NavQuirks) {
errorMessage = "MimeNotCssWarn";
errorFlag = nsIScriptError::warningFlag;
} else {
errorMessage = "MimeNotCss";
errorFlag = nsIScriptError::errorFlag;
}
AutoTArray<nsString, 2> strings;
CopyUTF8toUTF16(aFinalChannelURI->GetSpecOrDefault(),
*strings.AppendElement());
CopyASCIItoUTF16(contentType, *strings.AppendElement());
nsCOMPtr<nsIURI> referrer = ReferrerInfo()->GetOriginalReferrer();
nsContentUtils::ReportToConsole(
errorFlag, "CSS Loader"_ns, mLoader->mDocument,
nsContentUtils::eCSS_PROPERTIES, errorMessage, strings, referrer);
if (errorFlag == nsIScriptError::errorFlag) {
LOG_WARN(
(" Ignoring sheet with improper MIME type %s", contentType.get()));
mLoader->SheetComplete(*this, NS_ERROR_NOT_AVAILABLE);
return NS_OK;
}
}
SRIMetadata sriMetadata;
mSheet->GetIntegrity(sriMetadata);
if (!sriMetadata.IsEmpty()) {
if (!NS_IsMainThread()) {
// We dont process any further in OMT.
// This is because we have some main-thread only accesses below.
// We need to find a way to optimize this handling.
// See Bug 1882046.
return NS_OK;
}
nsAutoCString sourceUri;
if (mLoader->mDocument && mLoader->mDocument->GetDocumentURI()) {
mLoader->mDocument->GetDocumentURI()->GetAsciiSpec(sourceUri);
}
nsresult rv = VerifySheetIntegrity(sriMetadata, aChannel, aBytes1, aBytes2,
sourceUri, mLoader->mReporter);
nsCOMPtr<nsILoadGroup> loadGroup;
aChannel->GetLoadGroup(getter_AddRefs(loadGroup));
if (loadGroup) {
mLoader->mReporter->FlushConsoleReports(loadGroup);
} else {
mLoader->mReporter->FlushConsoleReports(mLoader->mDocument);
}
if (NS_FAILED(rv)) {
LOG((" Load was blocked by SRI"));
MOZ_LOG(gSriPRLog, LogLevel::Debug,
("css::Loader::OnStreamComplete, bad metadata"));
mLoader->SheetComplete(*this, NS_ERROR_SRI_CORRUPT);
return NS_OK;
}
}
if (mSheet->GetCORSMode() == CORS_NONE &&
!mTriggeringPrincipal->Subsumes(principal)) {
mIsCrossOriginNoCORS = true;
}
// Enough to set the URIs on mSheet, since any sibling datas we have share
// the same mInner as mSheet and will thus get the same URI.
mSheet->SetURIs(aFinalChannelURI, originalURI, aFinalChannelURI);
ReferrerPolicy policy =
nsContentUtils::GetReferrerPolicyFromChannel(aChannel);
nsCOMPtr<nsIReferrerInfo> referrerInfo =
ReferrerInfo::CreateForExternalCSSResources(mSheet, policy);
mSheet->SetReferrerInfo(referrerInfo);
return NS_OK_PARSE_SHEET;
}
Loader::IsAlternate Loader::IsAlternateSheet(const nsAString& aTitle,
bool aHasAlternateRel) {
// A sheet is alternate if it has a nonempty title that doesn't match the
// currently selected style set. But if there _is_ no currently selected
// style set, the sheet wasn't marked as an alternate explicitly, and aTitle
// is nonempty, we should select the style set corresponding to aTitle, since
// that's a preferred sheet.
if (aTitle.IsEmpty()) {
return IsAlternate::No;
}
if (mDocument) {
const nsString& currentSheetSet = mDocument->GetCurrentStyleSheetSet();
if (!aHasAlternateRel && currentSheetSet.IsEmpty()) {
// There's no preferred set yet, and we now have a sheet with a title.
// Make that be the preferred set.
// FIXME(emilio): This is kinda wild, can we do it somewhere else?
mDocument->SetPreferredStyleSheetSet(aTitle);
// We're definitely not an alternate. Also, beware that at this point
// currentSheetSet may dangle.
return IsAlternate::No;
}
if (aTitle.Equals(currentSheetSet)) {
return IsAlternate::No;
}
}
return IsAlternate::Yes;
}
nsresult Loader::CheckContentPolicy(nsIPrincipal* aLoadingPrincipal,
nsIPrincipal* aTriggeringPrincipal,
nsIURI* aTargetURI,
nsINode* aRequestingNode,
const nsAString& aNonce,
StylePreloadKind aPreloadKind) {
// When performing a system load don't consult content policies.
if (!mDocument) {
return NS_OK;
}
nsContentPolicyType contentPolicyType =
aPreloadKind == StylePreloadKind::None
? nsIContentPolicy::TYPE_INTERNAL_STYLESHEET
: nsIContentPolicy::TYPE_INTERNAL_STYLESHEET_PRELOAD;
nsCOMPtr<nsILoadInfo> secCheckLoadInfo = new net::LoadInfo(
aLoadingPrincipal, aTriggeringPrincipal, aRequestingNode,
nsILoadInfo::SEC_ONLY_FOR_EXPLICIT_CONTENTSEC_CHECK, contentPolicyType);
secCheckLoadInfo->SetCspNonce(aNonce);
int16_t shouldLoad = nsIContentPolicy::ACCEPT;
nsresult rv =
NS_CheckContentLoadPolicy(aTargetURI, secCheckLoadInfo, &shouldLoad,
nsContentUtils::GetContentPolicy());
if (NS_FAILED(rv) || NS_CP_REJECTED(shouldLoad)) {
// Asynchronously notify observers (e.g devtools) of CSP failure.
nsContentUtils::AddScriptRunner(NS_NewRunnableFunction(
"Loader::NotifyOnFailedCheckPolicy",
[targetURI = RefPtr<nsIURI>(aTargetURI),
requestingNode = RefPtr<nsINode>(aRequestingNode),
contentPolicyType]() {
nsCOMPtr<nsIChannel> channel;
NS_NewChannel(
getter_AddRefs(channel), targetURI, requestingNode,
nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT,
contentPolicyType);
NS_SetRequestBlockingReason(
channel, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_GENERAL);
nsCOMPtr<nsIObserverService> obsService =
services::GetObserverService();
if (obsService) {
obsService->NotifyObservers(
channel, "http-on-failed-opening-request", nullptr);
}
}));
return NS_ERROR_CONTENT_BLOCKED;
}
return NS_OK;
}
static void RecordUseCountersIfNeeded(Document* aDoc,
const StyleSheet& aSheet) {
if (!aDoc) {
return;
}
const StyleUseCounters* docCounters = aDoc->GetStyleUseCounters();
if (!docCounters) {
return;
}
if (aSheet.URLData()->ChromeRulesEnabled()) {
return;
}
const auto* sheetCounters = aSheet.GetStyleUseCounters();
if (!sheetCounters) {
return;
}
Servo_UseCounters_Merge(docCounters, sheetCounters);
aDoc->MaybeWarnAboutZoom();
}
/**
* CreateSheet() creates a StyleSheet object for the given URI.
*
* We check for an existing style sheet object for that uri in various caches
* and clone it if we find it. Cloned sheets will have the title/media/enabled
* state of the sheet they are clones off; make sure to call PrepareSheet() on
* the result of CreateSheet().
*/
std::tuple<RefPtr<StyleSheet>, Loader::SheetState> Loader::CreateSheet(
nsIURI* aURI, nsIContent* aLinkingContent,
nsIPrincipal* aTriggeringPrincipal, css::SheetParsingMode aParsingMode,
CORSMode aCORSMode, const Encoding* aPreloadOrParentDataEncoding,
const nsAString& aIntegrity, bool aSyncLoad,
StylePreloadKind aPreloadKind) {
MOZ_ASSERT(aURI, "This path is not taken for inline stylesheets");
LOG(("css::Loader::CreateSheet(%s)", aURI->GetSpecOrDefault().get()));
SRIMetadata sriMetadata;
if (!aIntegrity.IsEmpty()) {
MOZ_LOG(gSriPRLog, LogLevel::Debug,
("css::Loader::CreateSheet, integrity=%s",
NS_ConvertUTF16toUTF8(aIntegrity).get()));
nsAutoCString sourceUri;
if (mDocument && mDocument->GetDocumentURI()) {
mDocument->GetDocumentURI()->GetAsciiSpec(sourceUri);
}
SRICheck::IntegrityMetadata(aIntegrity, sourceUri, mReporter, &sriMetadata);
}
if (mSheets) {
SheetLoadDataHashKey key(aURI, aTriggeringPrincipal, LoaderPrincipal(),
PartitionedPrincipal(),
GetFallbackEncoding(*this, aLinkingContent,
aPreloadOrParentDataEncoding),
aCORSMode, aParsingMode, CompatMode(aPreloadKind),
sriMetadata, aPreloadKind);
auto cacheResult = mSheets->Lookup(*this, key, aSyncLoad);
if (cacheResult.mState != CachedSubResourceState::Miss) {
SheetState sheetState = SheetState::Complete;
RefPtr<StyleSheet> sheet;
if (cacheResult.mCompleteValue) {
sheet = cacheResult.mCompleteValue->Clone(nullptr, nullptr);
mDocument->SetDidHitCompleteSheetCache();
RecordUseCountersIfNeeded(mDocument, *sheet);
mLoadsPerformed.PutEntry(key);
} else {
MOZ_ASSERT(cacheResult.mLoadingOrPendingValue);
sheet = cacheResult.mLoadingOrPendingValue->ValueForCache();
sheetState = cacheResult.mState == CachedSubResourceState::Loading
? SheetState::Loading
: SheetState::Pending;
}
LOG((" Hit cache with state: %s", gStateStrings[size_t(sheetState)]));
return {std::move(sheet), sheetState};
}
}
nsIURI* sheetURI = aURI;
nsIURI* baseURI = aURI;
nsIURI* originalURI = aURI;
auto sheet = MakeRefPtr<StyleSheet>(aParsingMode, aCORSMode, sriMetadata);
sheet->SetURIs(sheetURI, originalURI, baseURI);
nsCOMPtr<nsIReferrerInfo> referrerInfo =
ReferrerInfo::CreateForExternalCSSResources(sheet);
sheet->SetReferrerInfo(referrerInfo);
LOG((" Needs parser"));
return {std::move(sheet), SheetState::NeedsParser};
}
static Loader::MediaMatched MediaListMatches(const MediaList* aMediaList,
const Document* aDocument) {
if (!aMediaList || !aDocument) {
return Loader::MediaMatched::Yes;
}
if (aMediaList->Matches(*aDocument)) {
return Loader::MediaMatched::Yes;
}
return Loader::MediaMatched::No;
}
/**
* PrepareSheet() handles setting the media and title on the sheet, as
* well as setting the enabled state based on the title and whether
* the sheet had "alternate" in its rel.
*/
Loader::MediaMatched Loader::PrepareSheet(
StyleSheet& aSheet, const nsAString& aTitle, const nsAString& aMediaString,
MediaList* aMediaList, IsAlternate aIsAlternate,
IsExplicitlyEnabled aIsExplicitlyEnabled) {
RefPtr<MediaList> mediaList(aMediaList);
if (!aMediaString.IsEmpty()) {
NS_ASSERTION(!aMediaList,
"must not provide both aMediaString and aMediaList");
mediaList = MediaList::Create(NS_ConvertUTF16toUTF8(aMediaString));
}
aSheet.SetMedia(do_AddRef(mediaList));
aSheet.SetTitle(aTitle);
aSheet.SetEnabled(aIsAlternate == IsAlternate::No ||
aIsExplicitlyEnabled == IsExplicitlyEnabled::Yes);
return MediaListMatches(mediaList, mDocument);
}
/**
* InsertSheetInTree handles ordering of sheets in the document or shadow root.
*
* Here we have two types of sheets -- those with linking elements and
* those without. The latter are loaded by Link: headers, and are only added to
* the document.
*
* The following constraints are observed:
* 1) Any sheet with a linking element comes after all sheets without
* linking elements
* 2) Sheets without linking elements are inserted in the order in
* which the inserting requests come in, since all of these are
* inserted during header data processing in the content sink
* 3) Sheets with linking elements are ordered based on document order
* as determined by CompareDocumentPosition.
*/
void Loader::InsertSheetInTree(StyleSheet& aSheet) {
LOG(("css::Loader::InsertSheetInTree"));
MOZ_ASSERT(mDocument, "Must have a document to insert into");
nsINode* owningNode = aSheet.GetOwnerNode();
MOZ_ASSERT(!owningNode || owningNode->IsInUncomposedDoc() ||
owningNode->IsInShadowTree(),
"Why would we insert it anywhere?");
ShadowRoot* shadow = owningNode ? owningNode->GetContainingShadow() : nullptr;
auto& target = shadow ? static_cast<DocumentOrShadowRoot&>(*shadow)
: static_cast<DocumentOrShadowRoot&>(*mDocument);
// XXX Need to cancel pending sheet loads for this element, if any
int32_t sheetCount = target.SheetCount();
/*
* Start the walk at the _end_ of the list, since in the typical
* case we'll just want to append anyway. We want to break out of
* the loop when insertionPoint points to just before the index we
* want to insert at. In other words, when we leave the loop
* insertionPoint is the index of the stylesheet that immediately
* precedes the one we're inserting.
*/
int32_t insertionPoint = sheetCount - 1;
for (; insertionPoint >= 0; --insertionPoint) {
nsINode* sheetOwner = target.SheetAt(insertionPoint)->GetOwnerNode();
if (sheetOwner && !owningNode) {
// Keep moving; all sheets with a sheetOwner come after all
// sheets without a linkingNode
continue;
}
if (!sheetOwner) {
// Aha! The current sheet has no sheet owner, so we want to insert after
// it no matter whether we have a linking content or not.
break;
}
MOZ_ASSERT(owningNode != sheetOwner, "Why do we still have our old sheet?");
// Have to compare
if (nsContentUtils::PositionIsBefore(sheetOwner, owningNode)) {
// The current sheet comes before us, and it better be the first
// such, because now we break
break;
}
}
++insertionPoint;
if (shadow) {
shadow->InsertSheetAt(insertionPoint, aSheet);
} else {
mDocument->InsertSheetAt(insertionPoint, aSheet);
}
LOG((" Inserting into target (doc: %d) at position %d",
target.AsNode().IsDocument(), insertionPoint));
}
/**
* InsertChildSheet handles ordering of @import-ed sheet in their
* parent sheets. Here we want to just insert based on order of the
* @import rules that imported the sheets. In theory we can't just
* append to the end because the CSSOM can insert @import rules. In
* practice, we get the call to load the child sheet before the CSSOM
* has finished inserting the @import rule, so we have no idea where
* to put it anyway. So just append for now. (In the future if we
* want to insert the sheet at the correct position, we'll need to
* restore CSSStyleSheet::InsertStyleSheetAt, which was removed in
*/
void Loader::InsertChildSheet(StyleSheet& aSheet, StyleSheet& aParentSheet) {
LOG(("css::Loader::InsertChildSheet"));
// child sheets should always start out enabled, even if they got
// cloned off of top-level sheets which were disabled
aSheet.SetEnabled(true);
aParentSheet.AppendStyleSheet(aSheet);
LOG((" Inserting into parent sheet"));
}
nsresult Loader::LoadSheetSyncInternal(SheetLoadData& aLoadData,
SheetState aSheetState) {
LOG((" Synchronous load"));
MOZ_ASSERT(!aLoadData.mObserver, "Observer for a sync load?");
MOZ_ASSERT(aSheetState == SheetState::NeedsParser,
"Sync loads can't reuse existing async loads");
nsINode* requestingNode = aLoadData.GetRequestingNode();
nsresult rv = NS_OK;
// Create a StreamLoader instance to which we will feed
// the data from the sync load. Do this before creating the
// channel to make error recovery simpler.
auto streamLoader = MakeRefPtr<StreamLoader>(aLoadData);
if (mDocument) {
net::PredictorLearn(aLoadData.mURI, mDocument->GetDocumentURI(),
nsINetworkPredictor::LEARN_LOAD_SUBRESOURCE, mDocument);
}
// Synchronous loads should only be used internally. Therefore no CORS
// policy is needed.
nsSecurityFlags securityFlags =
nsContentSecurityManager::ComputeSecurityFlags(
CORSMode::CORS_NONE, nsContentSecurityManager::CORSSecurityMapping::
CORS_NONE_MAPS_TO_INHERITED_CONTEXT);
securityFlags |= nsILoadInfo::SEC_ALLOW_CHROME;
nsContentPolicyType contentPolicyType =
aLoadData.mPreloadKind == StylePreloadKind::None
? nsIContentPolicy::TYPE_INTERNAL_STYLESHEET
: nsIContentPolicy::TYPE_INTERNAL_STYLESHEET_PRELOAD;
// Just load it
nsCOMPtr<nsIChannel> channel;
// Note that we are calling NS_NewChannelWithTriggeringPrincipal() with both
// a node and a principal.
// This is because of a case where the node is the document being styled and
// the principal is the stylesheet (perhaps from a different origin) that is
// applying the styles.
if (requestingNode) {
rv = NS_NewChannelWithTriggeringPrincipal(
getter_AddRefs(channel), aLoadData.mURI, requestingNode,
aLoadData.mTriggeringPrincipal, securityFlags, contentPolicyType);
} else {
MOZ_ASSERT(aLoadData.mTriggeringPrincipal->Equals(LoaderPrincipal()));
auto result = URLPreloader::ReadURI(aLoadData.mURI);
if (result.isOk()) {
nsCOMPtr<nsIInputStream> stream;
MOZ_TRY(
NS_NewCStringInputStream(getter_AddRefs(stream), result.unwrap()));
rv = NS_NewInputStreamChannel(
getter_AddRefs(channel), aLoadData.mURI, stream.forget(),
aLoadData.mTriggeringPrincipal, securityFlags, contentPolicyType);
} else {
rv = NS_NewChannel(getter_AddRefs(channel), aLoadData.mURI,
aLoadData.mTriggeringPrincipal, securityFlags,
contentPolicyType);
}
}
if (NS_FAILED(rv)) {
LOG_ERROR((" Failed to create channel"));
streamLoader->ChannelOpenFailed(rv);
SheetComplete(aLoadData, rv);
return rv;
}
nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
loadInfo->SetCspNonce(aLoadData.Nonce());
nsCOMPtr<nsIInputStream> stream;
rv = channel->Open(getter_AddRefs(stream));
if (NS_FAILED(rv)) {
LOG_ERROR((" Failed to open URI synchronously"));
streamLoader->ChannelOpenFailed(rv);
SheetComplete(aLoadData, rv);
return rv;
}
// Force UA sheets to be UTF-8.
// XXX this is only necessary because the default in
// SheetLoadData::OnDetermineCharset is wrong (bug 521039).
channel->SetContentCharset("UTF-8"_ns);
// Manually feed the streamloader the contents of the stream.
// This will call back into OnStreamComplete
// and thence to ParseSheet. Regardless of whether this fails,
// SheetComplete has been called.
return nsSyncLoadService::PushSyncStreamToListener(stream.forget(),
streamLoader, channel);
}
bool Loader::MaybeDeferLoad(SheetLoadData& aLoadData, SheetState aSheetState,
PendingLoad aPendingLoad,
const SheetLoadDataHashKey& aKey) {
MOZ_ASSERT(mSheets);
// If we have at least one other load ongoing, then we can defer it until
// all non-pending loads are done.
if (aSheetState == SheetState::NeedsParser &&
aPendingLoad == PendingLoad::No && aLoadData.ShouldDefer() &&
mOngoingLoadCount > mPendingLoadCount + 1) {
LOG((" Deferring sheet load"));
++mPendingLoadCount;
mSheets->DeferLoad(aKey, aLoadData);
return true;
}
return false;
}
bool Loader::MaybeCoalesceLoadAndNotifyOpen(SheetLoadData& aLoadData,
SheetState aSheetState,
const SheetLoadDataHashKey& aKey,
const PreloadHashKey& aPreloadKey) {
bool coalescedLoad = false;
auto cacheState = [&aSheetState] {
switch (aSheetState) {
case SheetState::Complete:
return CachedSubResourceState::Complete;
case SheetState::Pending:
return CachedSubResourceState::Pending;
case SheetState::Loading:
return CachedSubResourceState::Loading;
case SheetState::NeedsParser:
return CachedSubResourceState::Miss;
}
MOZ_ASSERT_UNREACHABLE("wat");
return CachedSubResourceState::Miss;
}();
if ((coalescedLoad = mSheets->CoalesceLoad(aKey, aLoadData, cacheState))) {
if (aSheetState == SheetState::Pending) {
++mPendingLoadCount;
} else {
aLoadData.NotifyOpen(
aPreloadKey, mDocument,
aLoadData.IsLinkRelPreload() /* TODO: why not `IsPreload()`?*/);
}
}
return coalescedLoad;
}
/**
* LoadSheet handles the actual load of a sheet. If the load is
* supposed to be synchronous it just opens a channel synchronously
* using the given uri, wraps the resulting stream in a converter
* stream and calls ParseSheet. Otherwise it tries to look for an
* existing load for this URI and piggyback on it. Failing all that,
* a new load is kicked off asynchronously.
*/
nsresult Loader::LoadSheet(SheetLoadData& aLoadData, SheetState aSheetState,
uint64_t aEarlyHintPreloaderId,
PendingLoad aPendingLoad) {
LOG(("css::Loader::LoadSheet"));
MOZ_ASSERT(aLoadData.mURI, "Need a URI to load");
MOZ_ASSERT(aLoadData.mSheet, "Need a sheet to load into");
MOZ_ASSERT(aSheetState != SheetState::Complete, "Why bother?");
MOZ_ASSERT(!aLoadData.mUseSystemPrincipal || aLoadData.mSyncLoad,
"Shouldn't use system principal for async loads");
LOG_URI(" Load from: '%s'", aLoadData.mURI);
// If we're firing a pending load, this load is already accounted for the
// first time it went through this function.
if (aPendingLoad == PendingLoad::No) {
if (aLoadData.BlocksLoadEvent()) {
IncrementOngoingLoadCountAndMaybeBlockOnload();
}
// We technically never defer non-top-level sheets, so this condition could
// be outside the branch, but conceptually it should be here.
if (aLoadData.mParentData) {
++aLoadData.mParentData->mPendingChildren;
}
}
if (!mDocument && !aLoadData.mIsNonDocumentSheet) {
// No point starting the load; just release all the data and such.
LOG_WARN((" No document and not non-document sheet; pre-dropping load"));
SheetComplete(aLoadData, NS_BINDING_ABORTED);
return NS_BINDING_ABORTED;
}
if (aLoadData.mSyncLoad) {
return LoadSheetSyncInternal(aLoadData, aSheetState);
}
SheetLoadDataHashKey key(aLoadData);
auto preloadKey = PreloadHashKey::CreateAsStyle(aLoadData);
if (mSheets) {
if (MaybeDeferLoad(aLoadData, aSheetState, aPendingLoad, key)) {
return NS_OK;
}
if (MaybeCoalesceLoadAndNotifyOpen(aLoadData, aSheetState, key,
preloadKey)) {
// All done here; once the load completes we'll be marked complete
// automatically.
return NS_OK;
}
}
aLoadData.NotifyOpen(preloadKey, mDocument, aLoadData.IsLinkRelPreload());
return LoadSheetAsyncInternal(aLoadData, aEarlyHintPreloaderId, key);
}
void Loader::AdjustPriority(const SheetLoadData& aLoadData,
nsIChannel* aChannel) {
if (!aLoadData.ShouldDefer() && aLoadData.IsLinkRelPreload()) {
SheetLoadData::PrioritizeAsPreload(aChannel);
}
if (!StaticPrefs::network_fetchpriority_enabled()) {
return;
}
nsCOMPtr<nsISupportsPriority> sp = do_QueryInterface(aChannel);
if (!sp) {
return;
}
// Adjusting priorites is specified as implementation-defined.
// See corresponding preferences in StaticPrefList.yaml for more context.
const int32_t supportsPriorityDelta = [&]() {
if (aLoadData.ShouldDefer()) {
return FETCH_PRIORITY_ADJUSTMENT_FOR(deferred_style,
aLoadData.mFetchPriority);
}
if (aLoadData.IsLinkRelPreload()) {
return FETCH_PRIORITY_ADJUSTMENT_FOR(link_preload_style,
aLoadData.mFetchPriority);
}
return FETCH_PRIORITY_ADJUSTMENT_FOR(non_deferred_style,
aLoadData.mFetchPriority);
}();
sp->AdjustPriority(supportsPriorityDelta);
#ifdef DEBUG
int32_t adjustedPriority;
sp->GetPriority(&adjustedPriority);
LogPriorityMapping(sCssLoaderLog, aLoadData.mFetchPriority, adjustedPriority);
#endif
}
nsresult Loader::LoadSheetAsyncInternal(SheetLoadData& aLoadData,
uint64_t aEarlyHintPreloaderId,
const SheetLoadDataHashKey& aKey) {
nsresult rv = NS_OK;
SRIMetadata sriMetadata;
aLoadData.mSheet->GetIntegrity(sriMetadata);
nsINode* requestingNode = aLoadData.GetRequestingNode();
nsCOMPtr<nsILoadGroup> loadGroup;
nsCOMPtr<nsICookieJarSettings> cookieJarSettings;
if (mDocument) {
loadGroup = mDocument->GetDocumentLoadGroup();
// load for a document with no loadgrup indicates that something is
// completely bogus, let's bail out early.
if (!loadGroup) {
LOG_ERROR((" Failed to query loadGroup from document"));
SheetComplete(aLoadData, NS_ERROR_UNEXPECTED);
return NS_ERROR_UNEXPECTED;
}
cookieJarSettings = mDocument->CookieJarSettings();
}
#ifdef DEBUG
AutoRestore<bool> syncCallbackGuard(mSyncCallback);
mSyncCallback = true;
#endif
nsSecurityFlags securityFlags =
nsContentSecurityManager::ComputeSecurityFlags(
aLoadData.mSheet->GetCORSMode(),
nsContentSecurityManager::CORSSecurityMapping::
CORS_NONE_MAPS_TO_INHERITED_CONTEXT);
securityFlags |= nsILoadInfo::SEC_ALLOW_CHROME;
nsContentPolicyType contentPolicyType =
aLoadData.mPreloadKind == StylePreloadKind::None
? nsIContentPolicy::TYPE_INTERNAL_STYLESHEET
: nsIContentPolicy::TYPE_INTERNAL_STYLESHEET_PRELOAD;
nsCOMPtr<nsIChannel> channel;
// Note we are calling NS_NewChannelWithTriggeringPrincipal here with a node
// and a principal. This is because of a case where the node is the document
// being styled and the principal is the stylesheet (perhaps from a different
// origin) that is applying the styles.
if (requestingNode) {
rv = NS_NewChannelWithTriggeringPrincipal(
getter_AddRefs(channel), aLoadData.mURI, requestingNode,
aLoadData.mTriggeringPrincipal, securityFlags, contentPolicyType,
/* PerformanceStorage */ nullptr, loadGroup);
} else {
MOZ_ASSERT(aLoadData.mTriggeringPrincipal->Equals(LoaderPrincipal()));
rv = NS_NewChannel(getter_AddRefs(channel), aLoadData.mURI,
aLoadData.mTriggeringPrincipal, securityFlags,
contentPolicyType, cookieJarSettings,
/* aPerformanceStorage */ nullptr, loadGroup);
}
if (NS_FAILED(rv)) {
LOG_ERROR((" Failed to create channel"));
SheetComplete(aLoadData, rv);
return rv;
}
nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
loadInfo->SetCspNonce(aLoadData.Nonce());
if (!aLoadData.ShouldDefer()) {
if (nsCOMPtr<nsIClassOfService> cos = do_QueryInterface(channel)) {
cos->AddClassFlags(nsIClassOfService::Leader);
}
if (aLoadData.IsLinkRelPreload()) {
SheetLoadData::AddLoadBackgroundFlag(channel);
}
}
AdjustPriority(aLoadData, channel);
if (nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(channel)) {
if (nsCOMPtr<nsIReferrerInfo> referrerInfo = aLoadData.ReferrerInfo()) {
rv = httpChannel->SetReferrerInfo(referrerInfo);
Unused << NS_WARN_IF(NS_FAILED(rv));
}
nsCOMPtr<nsIHttpChannelInternal> internalChannel =
do_QueryInterface(httpChannel);
if (internalChannel) {
rv = internalChannel->SetIntegrityMetadata(
sriMetadata.GetIntegrityString());
NS_ENSURE_SUCCESS(rv, rv);
}
// Set the initiator type
if (nsCOMPtr<nsITimedChannel> timedChannel =
do_QueryInterface(httpChannel)) {
if (aLoadData.mParentData) {
timedChannel->SetInitiatorType(u"css"_ns);
// This is a child sheet load.
//
// The resource timing of the sub-resources that a document loads
// should normally be reported to the document. One exception is any
// sub-resources of any cross-origin resources that are loaded. We
// don't mind reporting timing data for a direct child cross-origin
// resource since the resource that linked to it (and hence potentially
// anything in that parent origin) is aware that the cross-origin
// resources is to be loaded. However, we do not want to report
// timings for any sub-resources that a cross-origin resource may load
// since that obviously leaks information about what the cross-origin
// resource loads, which is bad.
//
// In addition to checking whether we're an immediate child resource of
// a cross-origin resource (by checking if mIsCrossOriginNoCORS is set
// to true on our parent), we also check our parent to see whether it
// itself is a sub-resource of a cross-origin resource by checking
// mBlockResourceTiming. If that is set then we too are such a
// sub-resource and so we set the flag on ourself too to propagate it
// on down.
if (aLoadData.mParentData->mIsCrossOriginNoCORS ||
aLoadData.mParentData->mBlockResourceTiming) {
// Set a flag so any other stylesheet triggered by this one will
// not be reported
aLoadData.mBlockResourceTiming = true;
// Mark the channel so PerformanceMainThread::AddEntry will not
// report the resource.
timedChannel->SetReportResourceTiming(false);
}
} else if (aEarlyHintPreloaderId) {
timedChannel->SetInitiatorType(u"early-hints"_ns);
} else {
timedChannel->SetInitiatorType(u"link"_ns);
}
}
}
// Now tell the channel we expect text/css data back.... We do
// this before opening it, so it's only treated as a hint.
channel->SetContentType("text/css"_ns);
// We don't have to hold on to the stream loader. The ownership
// model is: Necko owns the stream loader, which owns the load data,
// which owns us
auto streamLoader = MakeRefPtr<StreamLoader>(aLoadData);
if (mDocument) {
net::PredictorLearn(aLoadData.mURI, mDocument->GetDocumentURI(),
nsINetworkPredictor::LEARN_LOAD_SUBRESOURCE, mDocument);
}
if (aEarlyHintPreloaderId) {
nsCOMPtr<nsIHttpChannelInternal> channelInternal =
do_QueryInterface(channel);
NS_ENSURE_TRUE(channelInternal != nullptr, NS_ERROR_FAILURE);
rv = channelInternal->SetEarlyHintPreloaderId(aEarlyHintPreloaderId);
NS_ENSURE_SUCCESS(rv, rv);
}
rv = channel->AsyncOpen(streamLoader);
if (NS_FAILED(rv)) {
LOG_ERROR((" Failed to create stream loader"));
streamLoader->ChannelOpenFailed(rv);
// NOTE: NotifyStop will be done in SheetComplete -> NotifyObservers.
aLoadData.NotifyStart(channel);
SheetComplete(aLoadData, rv);
return rv;
}
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
if (nsCOMPtr<nsIHttpChannelInternal> hci = do_QueryInterface(channel)) {
hci->DoDiagnosticAssertWhenOnStopNotCalledOnDestroy();
}
#endif
if (mSheets) {
mSheets->LoadStarted(aKey, aLoadData);
}
return NS_OK;
}
/**
* ParseSheet handles parsing the data stream.
*/
Loader::Completed Loader::ParseSheet(
const nsACString& aBytes, const RefPtr<SheetLoadDataHolder>& aLoadData,
AllowAsyncParse aAllowAsync) {
LOG(("css::Loader::ParseSheet"));
SheetLoadData* loadData = aLoadData->get();
MOZ_ASSERT(loadData);
if (loadData->mURI) {
LOG_URI(" Load succeeded for URI: '%s', parsing", loadData->mURI);
}
AUTO_PROFILER_LABEL_CATEGORY_PAIR_RELEVANT_FOR_JS(LAYOUT_CSSParsing);
++mParsedSheetCount;
loadData->mIsBeingParsed = true;
StyleSheet* sheet = loadData->mSheet;
MOZ_ASSERT(sheet);
// Some cases, like inline style and UA stylesheets, need to be parsed
// synchronously. The former may trigger child loads, the latter must not.
if (loadData->mSyncLoad || aAllowAsync == AllowAsyncParse::No) {
sheet->ParseSheetSync(this, aBytes, loadData);
loadData->mIsBeingParsed = false;
bool noPendingChildren = loadData->mPendingChildren == 0;
MOZ_ASSERT_IF(loadData->mSyncLoad, noPendingChildren);
if (noPendingChildren) {
SheetComplete(*loadData, NS_OK);
return Completed::Yes;
}
return Completed::No;
}
// This parse does not need to be synchronous. \o/
//
// Note that load is already blocked from
// IncrementOngoingLoadCountAndMaybeBlockOnload(), and will be unblocked from
// SheetFinishedParsingAsync which will end up in NotifyObservers as needed.
sheet->ParseSheet(*this, aBytes, aLoadData)
->Then(
GetMainThreadSerialEventTarget(), __func__,
[loadData = aLoadData](bool aDummy) {
MOZ_ASSERT(NS_IsMainThread());
loadData->get()->SheetFinishedParsingAsync();
},
[] { MOZ_CRASH("rejected parse promise"); });
return Completed::No;
}
void Loader::NotifyObservers(SheetLoadData& aData, nsresult aStatus) {
RecordUseCountersIfNeeded(mDocument, *aData.mSheet);
RefPtr loadDispatcher = aData.PrepareLoadEventIfNeeded();
if (aData.mURI) {
mLoadsPerformed.PutEntry(SheetLoadDataHashKey(aData));
aData.NotifyStop(aStatus);
// NOTE(emilio): This needs to happen before notifying observers, as
// FontFaceSet for example checks for pending sheet loads from the
// StyleSheetLoaded callback.
if (aData.BlocksLoadEvent()) {
DecrementOngoingLoadCountAndMaybeUnblockOnload();
if (mPendingLoadCount && mPendingLoadCount == mOngoingLoadCount) {
LOG((" No more loading sheets; starting deferred loads"));
StartDeferredLoads();
}
}
}
if (!aData.mTitle.IsEmpty() && NS_SUCCEEDED(aStatus)) {
nsContentUtils::AddScriptRunner(NS_NewRunnableFunction(
"Loader::NotifyObservers - Create PageStyle actor",
[doc = RefPtr{mDocument}] {
// Force creating the page style actor, if available.
// This will no-op if no actor with this name is registered (outside
// of desktop Firefox).
nsCOMPtr<nsISupports> pageStyleActor =
do_QueryActor("PageStyle", doc);
Unused << pageStyleActor;
}));
}
if (aData.mMustNotify) {
if (nsCOMPtr<nsICSSLoaderObserver> observer = std::move(aData.mObserver)) {
LOG((" Notifying observer %p for data %p. deferred: %d", observer.get(),
&aData, aData.ShouldDefer()));
observer->StyleSheetLoaded(aData.mSheet, aData.ShouldDefer(), aStatus);
}
for (nsCOMPtr<nsICSSLoaderObserver> obs : mObservers.ForwardRange()) {
LOG((" Notifying global observer %p for data %p. deferred: %d",
obs.get(), &aData, aData.ShouldDefer()));
obs->StyleSheetLoaded(aData.mSheet, aData.ShouldDefer(), aStatus);
}
if (loadDispatcher) {
loadDispatcher->RunDOMEventWhenSafe();
}
} else if (loadDispatcher) {
loadDispatcher->PostDOMEvent();
}
}
/**
* SheetComplete is the do-it-all cleanup function. It removes the
* load data from the "loading" hashtable, adds the sheet to the
* "completed" hashtable, massages the XUL cache, handles siblings of
* the load data (other loads for the same URI), handles unblocking
* blocked parent loads as needed, and most importantly calls
* NS_RELEASE on the load data to destroy the whole mess.
*/
void Loader::SheetComplete(SheetLoadData& aLoadData, nsresult aStatus) {
LOG(("css::Loader::SheetComplete, status: 0x%" PRIx32,
static_cast<uint32_t>(aStatus)));
SharedStyleSheetCache::LoadCompleted(mSheets.get(), aLoadData, aStatus);
}
// static
void Loader::MarkLoadTreeFailed(SheetLoadData& aLoadData,
Loader* aOnlyForLoader) {
if (aLoadData.mURI) {
LOG_URI(" Load failed: '%s'", aLoadData.mURI);
}
SheetLoadData* data = &aLoadData;
do {
if (!aOnlyForLoader || aOnlyForLoader == data->mLoader) {
data->mLoadFailed = true;
data->mSheet->MaybeRejectReplacePromise();
}
if (data->mParentData) {
MarkLoadTreeFailed(*data->mParentData, aOnlyForLoader);
}
data = data->mNext;
} while (data);
}
RefPtr<StyleSheet> Loader::LookupInlineSheetInCache(
const nsAString& aBuffer, nsIPrincipal* aSheetPrincipal) {
auto result = mInlineSheets.Lookup(aBuffer);
if (!result) {
return nullptr;
}
StyleSheet* sheet = result.Data();
if (NS_WARN_IF(sheet->HasModifiedRules())) {
// Remove it now that we know that we're never going to use this stylesheet
// again.
result.Remove();
return nullptr;
}
if (NS_WARN_IF(!sheet->Principal()->Equals(aSheetPrincipal))) {
// If the sheet is going to have different access rights, don't return it
// from the cache.
return nullptr;
}
return sheet->Clone(nullptr, nullptr);
}
void Loader::MaybeNotifyPreloadUsed(SheetLoadData& aData) {
if (!mDocument) {
return;
}
auto key = PreloadHashKey::CreateAsStyle(aData);
RefPtr<PreloaderBase> preload = mDocument->Preloads().LookupPreload(key);
if (!preload) {
return;
}
preload->NotifyUsage(mDocument);
}
Result<Loader::LoadSheetResult, nsresult> Loader::LoadInlineStyle(
const SheetInfo& aInfo, const nsAString& aBuffer,
nsICSSLoaderObserver* aObserver) {
LOG(("css::Loader::LoadInlineStyle"));
MOZ_ASSERT(aInfo.mContent);
if (!mEnabled) {
LOG_WARN((" Not enabled"));
return Err(NS_ERROR_NOT_AVAILABLE);
}
if (!mDocument) {
return Err(NS_ERROR_NOT_INITIALIZED);
}
MOZ_ASSERT(LinkStyle::FromNodeOrNull(aInfo.mContent),
"Element is not a style linking element!");
// Since we're not planning to load a URI, no need to hand a principal to the
// load data or to CreateSheet().
// Check IsAlternateSheet now, since it can mutate our document.
auto isAlternate = IsAlternateSheet(aInfo.mTitle, aInfo.mHasAlternateRel);
LOG((" Sheet is alternate: %d", static_cast<int>(isAlternate)));
// Use the document's base URL so that @import in the inline sheet picks up
// the right base.
nsIURI* baseURI = aInfo.mContent->GetBaseURI();
nsIURI* sheetURI = aInfo.mContent->OwnerDoc()->GetDocumentURI();
nsIURI* originalURI = nullptr;
MOZ_ASSERT(aInfo.mIntegrity.IsEmpty());
nsIPrincipal* loadingPrincipal = LoaderPrincipal();
nsIPrincipal* principal = aInfo.mTriggeringPrincipal
? aInfo.mTriggeringPrincipal.get()
: loadingPrincipal;
nsIPrincipal* sheetPrincipal = [&] {
// The triggering principal may be an expanded principal, which is safe to
// use for URL security checks, but not as the loader principal for a
// stylesheet. So treat this as principal inheritance, and downgrade if
// necessary.
//
// FIXME(emilio): Why doing this for inline sheets but not for links?
if (aInfo.mTriggeringPrincipal) {
return BasePrincipal::Cast(aInfo.mTriggeringPrincipal)
->PrincipalToInherit();
}
return LoaderPrincipal();
}();
// We only cache sheets if in shadow trees, since regular document sheets are
// likely to be unique.
const bool isWorthCaching =
StaticPrefs::layout_css_inline_style_caching_always_enabled() ||
aInfo.mContent->IsInShadowTree();
RefPtr<StyleSheet> sheet;
if (isWorthCaching) {
sheet = LookupInlineSheetInCache(aBuffer, sheetPrincipal);
}
const bool isSheetFromCache = !!sheet;
if (!isSheetFromCache) {
sheet = MakeRefPtr<StyleSheet>(eAuthorSheetFeatures, aInfo.mCORSMode,
SRIMetadata{});
sheet->SetURIs(sheetURI, originalURI, baseURI);
nsIReferrerInfo* referrerInfo =
aInfo.mContent->OwnerDoc()->ReferrerInfoForInternalCSSAndSVGResources();
sheet->SetReferrerInfo(referrerInfo);
// We never actually load this, so just set its principal directly.
sheet->SetPrincipal(sheetPrincipal);
}
auto matched = PrepareSheet(*sheet, aInfo.mTitle, aInfo.mMedia, nullptr,
isAlternate, aInfo.mIsExplicitlyEnabled);
if (auto* linkStyle = LinkStyle::FromNode(*aInfo.mContent)) {
linkStyle->SetStyleSheet(sheet);
}
MOZ_ASSERT(sheet->IsComplete() == isSheetFromCache);
Completed completed;
auto data = MakeRefPtr<SheetLoadData>(
this, aInfo.mTitle, /* aURI = */ nullptr, sheet, SyncLoad::No,
aInfo.mContent, isAlternate, matched, StylePreloadKind::None, aObserver,
principal, aInfo.mReferrerInfo, aInfo.mNonce, aInfo.mFetchPriority);
MOZ_ASSERT(data->GetRequestingNode() == aInfo.mContent);
if (isSheetFromCache) {
MOZ_ASSERT(sheet->IsComplete());
MOZ_ASSERT(sheet->GetOwnerNode() == aInfo.mContent);
completed = Completed::Yes;
InsertSheetInTree(*sheet);
NotifyOfCachedLoad(std::move(data));
} else {
// Parse completion releases the load data.
//
// Note that we need to parse synchronously, since the web expects that the
// effects of inline stylesheets are visible immediately (aside from
// @imports).
NS_ConvertUTF16toUTF8 utf8(aBuffer);
RefPtr<SheetLoadDataHolder> holder(
new nsMainThreadPtrHolder<css::SheetLoadData>(__func__, data.get(),
true));
completed = ParseSheet(utf8, holder, AllowAsyncParse::No);
if (completed == Completed::Yes) {
if (isWorthCaching) {
mInlineSheets.InsertOrUpdate(aBuffer, std::move(sheet));
}
} else {
data->mMustNotify = true;
}
}
return LoadSheetResult{completed, isAlternate, matched};
}
Result<Loader::LoadSheetResult, nsresult> Loader::LoadStyleLink(
const SheetInfo& aInfo, nsICSSLoaderObserver* aObserver) {
MOZ_ASSERT(aInfo.mURI, "Must have URL to load");
LOG(("css::Loader::LoadStyleLink"));
LOG_URI(" Link uri: '%s'", aInfo.mURI);
LOG((" Link title: '%s'", NS_ConvertUTF16toUTF8(aInfo.mTitle).get()));
LOG((" Link media: '%s'", NS_ConvertUTF16toUTF8(aInfo.mMedia).get()));
LOG((" Link alternate rel: %d", aInfo.mHasAlternateRel));
if (!mEnabled) {
LOG_WARN((" Not enabled"));
return Err(NS_ERROR_NOT_AVAILABLE);
}
if (!mDocument) {
return Err(NS_ERROR_NOT_INITIALIZED);
}
MOZ_ASSERT_IF(aInfo.mContent,
aInfo.mContent->NodePrincipal() == mDocument->NodePrincipal());
nsIPrincipal* loadingPrincipal = LoaderPrincipal();
nsIPrincipal* principal = aInfo.mTriggeringPrincipal
? aInfo.mTriggeringPrincipal.get()
: loadingPrincipal;
nsINode* requestingNode =
aInfo.mContent ? static_cast<nsINode*>(aInfo.mContent) : mDocument;
const bool syncLoad = [&] {
if (!aInfo.mContent) {
return false;
}
const bool privilegedShadowTree =
aInfo.mContent->IsInShadowTree() &&
(aInfo.mContent->ChromeOnlyAccess() ||
aInfo.mContent->OwnerDoc()->ChromeRulesEnabled());
if (!privilegedShadowTree) {
return false;
}
if (!IsPrivilegedURI(aInfo.mURI)) {
return false;
}
// We're loading a chrome/resource URI in a chrome doc shadow tree or UA
// widget. Load synchronously to avoid FOUC.
return true;
}();
LOG((" Link sync load: '%s'", syncLoad ? "true" : "false"));
MOZ_ASSERT_IF(syncLoad, !aObserver);
nsresult rv =
CheckContentPolicy(loadingPrincipal, principal, aInfo.mURI,
requestingNode, aInfo.mNonce, StylePreloadKind::None);
if (NS_WARN_IF(NS_FAILED(rv))) {
// Don't fire the error event if our document is loaded as data. We're
// supposed to not even try to do loads in that case... Unfortunately, we
// implement that via nsDataDocumentContentPolicy, which doesn't have a good
// way to communicate back to us that _it_ is the thing that blocked the
// load.
if (aInfo.mContent && !mDocument->IsLoadedAsData()) {
// Fire an async error event on it.
RefPtr<AsyncEventDispatcher> loadBlockingAsyncDispatcher =
new LoadBlockingAsyncEventDispatcher(aInfo.mContent, u"error"_ns,
CanBubble::eNo,
ChromeOnlyDispatch::eNo);
loadBlockingAsyncDispatcher->PostDOMEvent();
}
return Err(rv);
}
// Check IsAlternateSheet now, since it can mutate our document and make
// pending sheets go to the non-pending state.
auto isAlternate = IsAlternateSheet(aInfo.mTitle, aInfo.mHasAlternateRel);
auto [sheet, state] = CreateSheet(aInfo, eAuthorSheetFeatures, syncLoad,
StylePreloadKind::None);
LOG((" Sheet is alternate: %d", static_cast<int>(isAlternate)));
auto matched = PrepareSheet(*sheet, aInfo.mTitle, aInfo.mMedia, nullptr,
isAlternate, aInfo.mIsExplicitlyEnabled);
if (auto* linkStyle = LinkStyle::FromNodeOrNull(aInfo.mContent)) {
linkStyle->SetStyleSheet(sheet);
}
MOZ_ASSERT(sheet->IsComplete() == (state == SheetState::Complete));
// We may get here with no content for Link: headers for example.
MOZ_ASSERT(!aInfo.mContent || LinkStyle::FromNode(*aInfo.mContent),
"If there is any node, it should be a LinkStyle");
auto data = MakeRefPtr<SheetLoadData>(
this, aInfo.mTitle, aInfo.mURI, sheet, SyncLoad(syncLoad), aInfo.mContent,
isAlternate, matched, StylePreloadKind::None, aObserver, principal,
aInfo.mReferrerInfo, aInfo.mNonce, aInfo.mFetchPriority);
MOZ_ASSERT(data->GetRequestingNode() == requestingNode);
MaybeNotifyPreloadUsed(*data);
if (state == SheetState::Complete) {
LOG((" Sheet already complete: 0x%p", sheet.get()));
MOZ_ASSERT(sheet->GetOwnerNode() == aInfo.mContent);
InsertSheetInTree(*sheet);
NotifyOfCachedLoad(std::move(data));
return LoadSheetResult{Completed::Yes, isAlternate, matched};
}
// Now we need to actually load it.
auto result = LoadSheetResult{Completed::No, isAlternate, matched};
MOZ_ASSERT(result.ShouldBlock() == !data->ShouldDefer(),
"These should better match!");
// Load completion will free the data
rv = LoadSheet(*data, state, 0);
if (NS_FAILED(rv)) {
return Err(rv);
}
if (!syncLoad) {
data->mMustNotify = true;
}
return result;
}
static bool HaveAncestorDataWithURI(SheetLoadData& aData, nsIURI* aURI) {
if (!aData.mURI) {
// Inline style; this won't have any ancestors
MOZ_ASSERT(!aData.mParentData, "How does inline style have a parent?");
return false;
}
bool equal;
if (NS_FAILED(aData.mURI->Equals(aURI, &equal)) || equal) {
return true;
}
// Datas down the mNext chain have the same URI as aData, so we
// don't have to compare to them. But they might have different
// parents, and we have to check all of those.
SheetLoadData* data = &aData;
do {
if (data->mParentData &&
HaveAncestorDataWithURI(*data->mParentData, aURI)) {
return true;
}
data = data->mNext;
} while (data);
return false;
}
nsresult Loader::LoadChildSheet(StyleSheet& aParentSheet,
SheetLoadData* aParentData, nsIURI* aURL,
dom::MediaList* aMedia,
LoaderReusableStyleSheets* aReusableSheets) {
LOG(("css::Loader::LoadChildSheet"));
MOZ_ASSERT(aURL, "Must have a URI to load");
if (!mEnabled) {
LOG_WARN((" Not enabled"));
return NS_ERROR_NOT_AVAILABLE;
}
LOG_URI(" Child uri: '%s'", aURL);
nsCOMPtr<nsINode> owningNode;
nsINode* requestingNode = aParentSheet.GetOwnerNodeOfOutermostSheet();
if (requestingNode) {
MOZ_ASSERT(LoaderPrincipal() == requestingNode->NodePrincipal());
} else {
requestingNode = mDocument;
}
nsIPrincipal* principal = aParentSheet.Principal();
nsresult rv =
CheckContentPolicy(LoaderPrincipal(), principal, aURL, requestingNode,
/* aNonce = */ u""_ns, StylePreloadKind::None);
if (NS_WARN_IF(NS_FAILED(rv))) {
if (aParentData) {
MarkLoadTreeFailed(*aParentData);
}
return rv;
}
nsCOMPtr<nsICSSLoaderObserver> observer;
if (aParentData) {
LOG((" Have a parent load"));
// Check for cycles
if (HaveAncestorDataWithURI(*aParentData, aURL)) {
// Houston, we have a loop, blow off this child and pretend this never
// happened
LOG_ERROR((" @import cycle detected, dropping load"));
return NS_OK;
}
NS_ASSERTION(aParentData->mSheet == &aParentSheet,
"Unexpected call to LoadChildSheet");
} else {
LOG((" No parent load; must be CSSOM"));
// No parent load data, so the sheet will need to be notified when
// we finish, if it can be, if we do the load asynchronously.
observer = &aParentSheet;
}
// Now that we know it's safe to load this (passes security check and not a
// loop) do so.
RefPtr<StyleSheet> sheet;
SheetState state;
if (aReusableSheets && aReusableSheets->FindReusableStyleSheet(aURL, sheet)) {
state = SheetState::Complete;
} else {
// For now, use CORS_NONE for child sheets
std::tie(sheet, state) = CreateSheet(
aURL, nullptr, principal, aParentSheet.ParsingMode(), CORS_NONE,
aParentData ? aParentData->mEncoding : nullptr,
u""_ns, // integrity is only checked on main sheet
aParentData && aParentData->mSyncLoad, StylePreloadKind::None);
PrepareSheet(*sheet, u""_ns, u""_ns, aMedia, IsAlternate::No,
IsExplicitlyEnabled::No);
}
MOZ_ASSERT(sheet);
InsertChildSheet(*sheet, aParentSheet);
auto data =
MakeRefPtr<SheetLoadData>(this, aURL, sheet, aParentData, observer,
principal, aParentSheet.GetReferrerInfo());
MOZ_ASSERT(data->GetRequestingNode() == requestingNode);
MaybeNotifyPreloadUsed(*data);
if (state == SheetState::Complete) {
LOG((" Sheet already complete"));
// We're completely done. No need to notify, even, since the
// @import rule addition/modification will trigger the right style
// changes automatically.
data->mIntentionallyDropped = true;
return NS_OK;
}
bool syncLoad = data->mSyncLoad;
// Load completion will release the data
rv = LoadSheet(*data, state, 0);
NS_ENSURE_SUCCESS(rv, rv);
if (!syncLoad) {
data->mMustNotify = true;
}
return rv;
}
Result<RefPtr<StyleSheet>, nsresult> Loader::LoadSheetSync(
nsIURI* aURL, SheetParsingMode aParsingMode,
UseSystemPrincipal aUseSystemPrincipal) {
LOG(("css::Loader::LoadSheetSync"));
nsCOMPtr<nsIReferrerInfo> referrerInfo = new ReferrerInfo(nullptr);
return InternalLoadNonDocumentSheet(
aURL, StylePreloadKind::None, aParsingMode, aUseSystemPrincipal, nullptr,
referrerInfo, nullptr, CORS_NONE, u""_ns, u""_ns, 0, FetchPriority::Auto);
}
Result<RefPtr<StyleSheet>, nsresult> Loader::LoadSheet(
nsIURI* aURI, SheetParsingMode aParsingMode,
UseSystemPrincipal aUseSystemPrincipal, nsICSSLoaderObserver* aObserver) {
nsCOMPtr<nsIReferrerInfo> referrerInfo = new ReferrerInfo(nullptr);
return InternalLoadNonDocumentSheet(
aURI, StylePreloadKind::None, aParsingMode, aUseSystemPrincipal, nullptr,
referrerInfo, aObserver, CORS_NONE, u""_ns, u""_ns, 0,
FetchPriority::Auto);
}
Result<RefPtr<StyleSheet>, nsresult> Loader::LoadSheet(
nsIURI* aURL, StylePreloadKind aPreloadKind,
const Encoding* aPreloadEncoding, nsIReferrerInfo* aReferrerInfo,
nsICSSLoaderObserver* aObserver, uint64_t aEarlyHintPreloaderId,
CORSMode aCORSMode, const nsAString& aNonce, const nsAString& aIntegrity,
FetchPriority aFetchPriority) {
LOG(("css::Loader::LoadSheet(aURL, aObserver) api call"));
return InternalLoadNonDocumentSheet(
aURL, aPreloadKind, eAuthorSheetFeatures, UseSystemPrincipal::No,
aPreloadEncoding, aReferrerInfo, aObserver, aCORSMode, aNonce, aIntegrity,
aEarlyHintPreloaderId, aFetchPriority);
}
Result<RefPtr<StyleSheet>, nsresult> Loader::InternalLoadNonDocumentSheet(
nsIURI* aURL, StylePreloadKind aPreloadKind, SheetParsingMode aParsingMode,
UseSystemPrincipal aUseSystemPrincipal, const Encoding* aPreloadEncoding,
nsIReferrerInfo* aReferrerInfo, nsICSSLoaderObserver* aObserver,
CORSMode aCORSMode, const nsAString& aNonce, const nsAString& aIntegrity,
uint64_t aEarlyHintPreloaderId, FetchPriority aFetchPriority) {
MOZ_ASSERT(aURL, "Must have a URI to load");
MOZ_ASSERT(aUseSystemPrincipal == UseSystemPrincipal::No || !aObserver,
"Shouldn't load system-principal sheets async");
MOZ_ASSERT(aReferrerInfo, "Must have referrerInfo");
LOG_URI(" Non-document sheet uri: '%s'", aURL);
if (!mEnabled) {
LOG_WARN((" Not enabled"));
return Err(NS_ERROR_NOT_AVAILABLE);
}
nsIPrincipal* loadingPrincipal = LoaderPrincipal();
nsIPrincipal* triggeringPrincipal = loadingPrincipal;
nsresult rv = CheckContentPolicy(loadingPrincipal, triggeringPrincipal, aURL,
mDocument, aNonce, aPreloadKind);
if (NS_FAILED(rv)) {
return Err(rv);
}
bool syncLoad = !aObserver;
auto [sheet, state] =
CreateSheet(aURL, nullptr, triggeringPrincipal, aParsingMode, aCORSMode,
aPreloadEncoding, aIntegrity, syncLoad, aPreloadKind);
PrepareSheet(*sheet, u""_ns, u""_ns, nullptr, IsAlternate::No,
IsExplicitlyEnabled::No);
auto data = MakeRefPtr<SheetLoadData>(
this, aURL, sheet, SyncLoad(syncLoad), aUseSystemPrincipal, aPreloadKind,
aPreloadEncoding, aObserver, triggeringPrincipal, aReferrerInfo, aNonce,
aFetchPriority);
MOZ_ASSERT(data->GetRequestingNode() == mDocument);
if (state == SheetState::Complete) {
LOG((" Sheet already complete"));
NotifyOfCachedLoad(std::move(data));
return sheet;
}
rv = LoadSheet(*data, state, aEarlyHintPreloaderId);
if (NS_FAILED(rv)) {
return Err(rv);
}
if (aObserver) {
data->mMustNotify = true;
}
return sheet;
}
void Loader::NotifyOfCachedLoad(RefPtr<SheetLoadData> aLoadData) {
LOG(("css::Loader::PostLoadEvent"));
MOZ_ASSERT(aLoadData->mSheet->IsComplete(),
"Only expected to be used for cached sheets");
// If we get to this code, the stylesheet loaded correctly at some point, so
// we can just schedule a load event and don't need to touch the data's
// mLoadFailed.
// Note that we do this here and not from inside our SheetComplete so that we
// don't end up running the load event more async than needed.
MOZ_ASSERT(!aLoadData->mLoadFailed, "Why are we marked as failed?");
aLoadData->mSheetAlreadyComplete = true;
// We need to check mURI to match
// DecrementOngoingLoadCountAndMaybeUnblockOnload().
if (aLoadData->mURI && aLoadData->BlocksLoadEvent()) {
IncrementOngoingLoadCountAndMaybeBlockOnload();
}
SheetComplete(*aLoadData, NS_OK);
}
void Loader::Stop() {
if (mSheets) {
mSheets->CancelLoadsForLoader(*this);
}
}
bool Loader::HasPendingLoads() { return mOngoingLoadCount; }
void Loader::AddObserver(nsICSSLoaderObserver* aObserver) {
MOZ_ASSERT(aObserver, "Must have observer");
mObservers.AppendElementUnlessExists(aObserver);
}
void Loader::RemoveObserver(nsICSSLoaderObserver* aObserver) {
mObservers.RemoveElement(aObserver);
}
void Loader::StartDeferredLoads() {
if (mSheets && mPendingLoadCount) {
mSheets->StartPendingLoadsForLoader(
*this, [](const SheetLoadData&) { return true; });
}
}
NS_IMPL_CYCLE_COLLECTION_CLASS(Loader)
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN(Loader)
NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mSheets);
for (const auto& data : tmp->mInlineSheets.Values()) {
NS_CYCLE_COLLECTION_NOTE_EDGE_NAME(cb, "Inline sheet cache in Loader");
cb.NoteXPCOMChild(data);
}
for (nsCOMPtr<nsICSSLoaderObserver>& obs : tmp->mObservers.ForwardRange()) {
ImplCycleCollectionTraverse(cb, obs, "mozilla::css::Loader.mObservers");
}
NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mDocGroup)
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN(Loader)
if (tmp->mSheets) {
if (tmp->mDocument) {
tmp->DeregisterFromSheetCache();
}
tmp->mSheets = nullptr;
}
tmp->mInlineSheets.Clear();
tmp->mObservers.Clear();
NS_IMPL_CYCLE_COLLECTION_UNLINK(mDocGroup)
NS_IMPL_CYCLE_COLLECTION_UNLINK_END
size_t Loader::SizeOfIncludingThis(MallocSizeOf aMallocSizeOf) const {
size_t n = aMallocSizeOf(this);
n += mObservers.ShallowSizeOfExcludingThis(aMallocSizeOf);
n += mInlineSheets.ShallowSizeOfExcludingThis(aMallocSizeOf);
for (const auto& entry : mInlineSheets) {
n += entry.GetKey().SizeOfExcludingThisIfUnshared(aMallocSizeOf);
// If the sheet has a parent, then its parent will report it so we don't
// have to worry about it here.
const StyleSheet* sheet = entry.GetWeak();
MOZ_ASSERT(!sheet->GetParentSheet(),
"How did an @import rule end up here?");
if (!sheet->GetOwnerNode()) {
n += sheet->SizeOfIncludingThis(aMallocSizeOf);
}
}
// Measurement of the following members may be added later if DMD finds it is
// worthwhile:
// The following members aren't measured:
// - mDocument, because it's a weak backpointer
return n;
}
nsIPrincipal* Loader::LoaderPrincipal() const {
if (mDocument) {
return mDocument->NodePrincipal();
}
// Loaders without a document do system loads.
return nsContentUtils::GetSystemPrincipal();
}
nsIPrincipal* Loader::PartitionedPrincipal() const {
if (mDocument && StaticPrefs::privacy_partition_network_state()) {
return mDocument->PartitionedPrincipal();
}
return LoaderPrincipal();
}
bool Loader::ShouldBypassCache() const {
if (!mDocument) {
return false;
}
RefPtr<nsILoadGroup> lg = mDocument->GetDocumentLoadGroup();
if (!lg) {
return false;
}
nsLoadFlags flags;
if (NS_FAILED(lg->GetLoadFlags(&flags))) {
return false;
}
return flags & (nsIRequest::LOAD_BYPASS_CACHE |
nsICachingChannel::LOAD_BYPASS_LOCAL_CACHE);
}
void Loader::BlockOnload() {
if (mDocument) {
mDocument->BlockOnload();
}
}
void Loader::UnblockOnload(bool aFireSync) {
if (mDocument) {
mDocument->UnblockOnload(aFireSync);
}
}
} // namespace css
} // namespace mozilla