Source code

Revision control

Copy as Markdown

Other Tools

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_dom_PerformanceResourceTiming_h___
#define mozilla_dom_PerformanceResourceTiming_h___
#include "mozilla/UniquePtr.h"
#include "nsCOMPtr.h"
#include "Performance.h"
#include "PerformanceEntry.h"
#include "PerformanceServerTiming.h"
#include "PerformanceTiming.h"
namespace mozilla::dom {
#define IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(name) \
DOMHighResTimeStamp name(nsIPrincipal& aSubjectPrincipal) const { \
bool allowed = !mTimingData->RedirectCountReal() \
? TimingAllowedForCaller(aSubjectPrincipal) \
: ReportRedirectForCaller(aSubjectPrincipal, false); \
return allowed ? mTimingData->name##HighRes(mPerformance) : 0; \
}
#define IMPL_RESOURCE_TIMING_TAO_PROTECTED_SIZE_PROP(name) \
uint64_t name(nsIPrincipal& aSubjectPrincipal) const { \
bool allowed = !mTimingData->RedirectCountReal() \
? TimingAllowedForCaller(aSubjectPrincipal) \
: ReportRedirectForCaller(aSubjectPrincipal, false); \
return allowed ? mTimingData->name() : 0; \
}
class PerformanceResourceTiming : public PerformanceEntry {
public:
using TimeStamp = mozilla::TimeStamp;
NS_DECL_ISUPPORTS_INHERITED
NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS_INHERITED(
PerformanceResourceTiming, PerformanceEntry)
// aPerformanceTimingData and aPerformance must be non-null
PerformanceResourceTiming(
UniquePtr<PerformanceTimingData>&& aPerformanceTimingData,
Performance* aPerformance, const nsAString& aName);
virtual JSObject* WrapObject(JSContext* aCx,
JS::Handle<JSObject*> aGivenProto) override;
virtual DOMHighResTimeStamp StartTime() const override;
virtual DOMHighResTimeStamp Duration() const override {
return ResponseEnd() - StartTime();
}
void GetInitiatorType(nsAString& aInitiatorType) const {
aInitiatorType = mInitiatorType;
}
void SetInitiatorType(const nsAString& aInitiatorType) {
mInitiatorType = aInitiatorType;
}
void GetNextHopProtocol(nsAString& aNextHopProtocol) const {
if (mTimingData->TimingAllowed()) {
aNextHopProtocol = mTimingData->NextHopProtocol();
}
}
DOMHighResTimeStamp WorkerStart() const {
return mTimingData->WorkerStartHighRes(mPerformance);
}
DOMHighResTimeStamp FetchStart() const;
DOMHighResTimeStamp RedirectStart(nsIPrincipal& aSubjectPrincipal,
bool aEnsureSameOriginAndIgnoreTAO) const {
// We have to check if all the redirect URIs whether had the same origin or
// different origins with TAO headers set (since there is no check in
// RedirectStartHighRes())
return ReportRedirectForCaller(aSubjectPrincipal,
aEnsureSameOriginAndIgnoreTAO)
? mTimingData->RedirectStartHighRes(mPerformance)
: 0;
}
virtual DOMHighResTimeStamp RedirectStart(
nsIPrincipal& aSubjectPrincipal) const {
return RedirectStart(aSubjectPrincipal,
false /* aEnsureSameOriginAndIgnoreTAO */);
}
DOMHighResTimeStamp RedirectEnd(nsIPrincipal& aSubjectPrincipal,
bool aEnsureSameOriginAndIgnoreTAO) const {
// We have to check if all the redirect URIs whether had the same origin or
// different origins with TAO headers set (since there is no check in
// RedirectEndHighRes())
return ReportRedirectForCaller(aSubjectPrincipal,
aEnsureSameOriginAndIgnoreTAO)
? mTimingData->RedirectEndHighRes(mPerformance)
: 0;
}
virtual DOMHighResTimeStamp RedirectEnd(
nsIPrincipal& aSubjectPrincipal) const {
return RedirectEnd(aSubjectPrincipal,
false /* aEnsureSameOriginAndIgnoreTAO */);
}
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(DomainLookupStart)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(DomainLookupEnd)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(ConnectStart)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(ConnectEnd)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(RequestStart)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(ResponseStart)
DOMHighResTimeStamp ResponseEnd() const {
return mTimingData->ResponseEndHighRes(mPerformance);
}
IMPL_RESOURCE_TIMING_TAO_PROTECTED_TIMING_PROP(SecureConnectionStart)
virtual const PerformanceResourceTiming* ToResourceTiming() const override {
return this;
}
IMPL_RESOURCE_TIMING_TAO_PROTECTED_SIZE_PROP(TransferSize)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_SIZE_PROP(EncodedBodySize)
IMPL_RESOURCE_TIMING_TAO_PROTECTED_SIZE_PROP(DecodedBodySize)
void GetServerTiming(nsTArray<RefPtr<PerformanceServerTiming>>& aRetval,
nsIPrincipal& aSubjectPrincipal);
size_t SizeOfIncludingThis(
mozilla::MallocSizeOf aMallocSizeOf) const override;
protected:
virtual ~PerformanceResourceTiming();
size_t SizeOfExcludingThis(
mozilla::MallocSizeOf aMallocSizeOf) const override;
// Check if caller has access to cross-origin timings, either by the rules
// from the spec, or based on addon permissions.
bool TimingAllowedForCaller(nsIPrincipal& aCaller) const;
// Check if cross-origin redirects should be reported to the caller.
bool ReportRedirectForCaller(nsIPrincipal& aCaller,
bool aEnsureSameOriginAndIgnoreTAO) const;
nsString mInitiatorType;
const UniquePtr<PerformanceTimingData> mTimingData; // always non-null
RefPtr<Performance> mPerformance;
// The same initial requested URI as the `name` attribute.
nsCOMPtr<nsIURI> mOriginalURI;
private:
mutable Maybe<DOMHighResTimeStamp> mCachedStartTime;
};
} // namespace mozilla::dom
#endif /* mozilla_dom_PerformanceResourceTiming_h___ */