| /* |
| * Copyright (C) 2006-2025 Apple Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. Neither the name of Apple Inc. ("Apple") nor the names of |
| * its contributors may be used to endorse or promote products derived |
| * from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY |
| * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
| * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
| * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY |
| * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
| * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND |
| * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "config.h" |
| #include "SubresourceLoader.h" |
| |
| #include "CachedRawResource.h" |
| #include "CrossOriginAccessControl.h" |
| #include "DiagnosticLoggingClient.h" |
| #include "DiagnosticLoggingKeys.h" |
| #include "DiagnosticLoggingResultType.h" |
| #include "DocumentLoader.h" |
| #include "DocumentPage.h" |
| #include "DocumentPrefetcher.h" |
| #include "DocumentResourceLoader.h" |
| #include "FrameLoader.h" |
| #include "HTTPParsers.h" |
| #include "HTTPStatusCodes.h" |
| #include "InspectorNetworkAgent.h" |
| #include "LinkLoader.h" |
| #include "LocalFrame.h" |
| #include "Logging.h" |
| #include "MemoryCache.h" |
| #include "OriginAccessPatterns.h" |
| #include "ResourceLoadObserver.h" |
| #include "ResourceTiming.h" |
| #include "SecurityOrigin.h" |
| #include "Settings.h" |
| #include <wtf/CompletionHandler.h> |
| #include <wtf/Ref.h> |
| #include <wtf/StdLibExtras.h> |
| #include <wtf/SystemTracing.h> |
| #include <wtf/text/CString.h> |
| #include <wtf/text/MakeString.h> |
| |
| #if PLATFORM(IOS_FAMILY) |
| #include <wtf/cocoa/RuntimeApplicationChecksCocoa.h> |
| #endif |
| |
| #if ENABLE(CONTENT_EXTENSIONS) |
| #include "ResourceLoadInfo.h" |
| #endif |
| |
| #if USE(QUICK_LOOK) |
| #include "LegacyPreviewLoader.h" |
| #include "PreviewConverter.h" |
| #endif |
| |
| #undef SUBRESOURCELOADER_RELEASE_LOG |
| #undef SUBRESOURCELOADER_RELEASE_LOG_ERROR |
| #define PAGE_ID (this->frame() && this->frame()->pageID() ? this->frame()->pageID()->toUInt64() : 0) |
| #define FRAME_ID (this->frame() ? this->frame()->frameID().toUInt64() : 0) |
| #if RELEASE_LOG_DISABLED |
| #define SUBRESOURCELOADER_RELEASE_LOG(fmt, ...) UNUSED_VARIABLE(this) |
| #define SUBRESOURCELOADER_RELEASE_LOG_ERROR(fmt, ...) UNUSED_VARIABLE(this) |
| #else |
| #define SUBRESOURCELOADER_RELEASE_LOG(fmt, ...) RELEASE_LOG_FORWARDABLE(ResourceLoading, fmt, PAGE_ID, FRAME_ID, identifier() ? identifier()->toUInt64() : 0, ##__VA_ARGS__) |
| #define SUBRESOURCELOADER_RELEASE_LOG_ERROR(fmt, ...) RELEASE_LOG_ERROR(ResourceLoading, "%p - [pageID=%" PRIu64 ", frameID=%" PRIu64 ", frameLoader=%p, resourceID=%" PRIu64 "] SubresourceLoader::" fmt, this, PAGE_ID, FRAME_ID, frameLoader(), identifier() ? identifier()->toUInt64() : 0, ##__VA_ARGS__) |
| #endif |
| |
| namespace WebCore { |
| |
| SubresourceLoader::RequestCountTracker::RequestCountTracker(CachedResourceLoader& cachedResourceLoader, const CachedResource& resource) |
| : m_cachedResourceLoader(&cachedResourceLoader) |
| , m_resource(resource) |
| { |
| cachedResourceLoader.incrementRequestCount(resource); |
| } |
| |
| SubresourceLoader::RequestCountTracker::RequestCountTracker(RequestCountTracker&& other) |
| : m_cachedResourceLoader(std::exchange(other.m_cachedResourceLoader, nullptr)) |
| , m_resource(std::exchange(other.m_resource, nullptr)) |
| { |
| } |
| |
| auto SubresourceLoader::RequestCountTracker::operator=(RequestCountTracker&& other) -> RequestCountTracker& |
| { |
| m_cachedResourceLoader = std::exchange(other.m_cachedResourceLoader, nullptr); |
| m_resource = std::exchange(other.m_resource, nullptr); |
| return *this; |
| } |
| |
| SubresourceLoader::RequestCountTracker::~RequestCountTracker() |
| { |
| RefPtr cachedResourceLoader = m_cachedResourceLoader.get(); |
| CachedResourceHandle resource = m_resource.get(); |
| if (cachedResourceLoader && resource) |
| cachedResourceLoader->decrementRequestCount(*resource); |
| } |
| |
| SubresourceLoader::SubresourceLoader(LocalFrame& frame, CachedResource& resource, const ResourceLoaderOptions& options) |
| : ResourceLoader(frame, options) |
| , m_resource(resource) |
| , m_state(Uninitialized) |
| , m_requestCountTracker(std::in_place, frame.protectedDocument()->cachedResourceLoader(), resource) |
| { |
| #if ENABLE(CONTENT_EXTENSIONS) |
| m_resourceType = ContentExtensions::toResourceType(resource.type(), resource.resourceRequest().requester(), frame.isMainFrame()); |
| #endif |
| |
| m_site = CachedResourceLoader::computeFetchMetadataSite(resource.resourceRequest(), resource.type(), options.mode, frame, frame.isMainFrame() && m_documentLoader && m_documentLoader->isRequestFromClientOrUserInput()); |
| ASSERT(!resource.resourceRequest().hasHTTPHeaderField(HTTPHeaderName::SecFetchSite) || resource.resourceRequest().httpHeaderField(HTTPHeaderName::SecFetchSite) == convertEnumerationToString(m_site)); |
| } |
| |
| SubresourceLoader::~SubresourceLoader() |
| { |
| ASSERT(m_state != Initialized); |
| ASSERT(reachedTerminalState()); |
| } |
| |
| void SubresourceLoader::create(LocalFrame& frame, CachedResource& resource, ResourceRequest&& request, const ResourceLoaderOptions& options, CompletionHandler<void(RefPtr<SubresourceLoader>&&)>&& completionHandler) |
| { |
| Ref subloader = adoptRef(*new SubresourceLoader(frame, resource, options)); |
| #if PLATFORM(IOS_FAMILY) |
| if (!WTF::IOSApplication::isWebProcess()) { |
| // On iOS, do not invoke synchronous resource load delegates while resource load scheduling |
| // is disabled to avoid re-entering style selection from a different thread (see <rdar://problem/9121719>). |
| // FIXME: This should be fixed for all ports in <https://bugs.webkit.org/show_bug.cgi?id=56647>. |
| subloader->m_iOSOriginalRequest = request; |
| return completionHandler(WTF::move(subloader)); |
| } |
| #endif |
| subloader->init(WTF::move(request), [subloader, completionHandler = WTF::move(completionHandler)] (bool initialized) mutable { |
| if (!initialized) |
| return completionHandler(nullptr); |
| completionHandler(WTF::move(subloader)); |
| }); |
| } |
| |
| #if PLATFORM(IOS_FAMILY) |
| void SubresourceLoader::startLoading() |
| { |
| // FIXME: this should probably be removed. |
| ASSERT(!WTF::IOSApplication::isWebProcess()); |
| init(ResourceRequest(m_iOSOriginalRequest), [this, protectedThis = Ref { *this }] (bool success) { |
| if (!success) |
| return; |
| m_iOSOriginalRequest = ResourceRequest(); |
| start(); |
| }); |
| } |
| #endif |
| |
| void SubresourceLoader::cancelIfNotFinishing() |
| { |
| if (m_state != Initialized) |
| return; |
| |
| ResourceLoader::cancel(); |
| } |
| |
| void SubresourceLoader::init(ResourceRequest&& request, CompletionHandler<void(bool)>&& completionHandler) |
| { |
| ResourceLoader::init(WTF::move(request), [this, protectedThis = Ref { *this }, completionHandler = WTF::move(completionHandler)] (bool initialized) mutable { |
| if (!initialized) |
| return completionHandler(false); |
| RefPtr documentLoader = this->documentLoader(); |
| if (!documentLoader) { |
| ASSERT_NOT_REACHED(); |
| SUBRESOURCELOADER_RELEASE_LOG_ERROR("init: resource load canceled because document loader is null"); |
| return completionHandler(false); |
| } |
| ASSERT(!reachedTerminalState()); |
| m_state = Initialized; |
| documentLoader->addSubresourceLoader(*this); |
| m_origin = m_resource->origin(); |
| completionHandler(true); |
| }); |
| } |
| |
| bool SubresourceLoader::isSubresourceLoader() const |
| { |
| return true; |
| } |
| |
| void SubresourceLoader::willSendRequestInternal(ResourceRequest&& newRequest, const ResourceResponse& redirectResponse, CompletionHandler<void(ResourceRequest&&)>&& completionHandler) |
| { |
| Ref protectedThis { *this }; |
| |
| if (!newRequest.url().isValid()) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL); |
| cancel(cannotShowURLError()); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| if (newRequest.requester() != ResourceRequestRequester::Main) { |
| ResourceLoadObserver::singleton().logSubresourceLoading(protectedFrame().get(), newRequest, redirectResponse, |
| (isScriptLikeDestination(options().destination) ? ResourceLoadObserver::FetchDestinationIsScriptLike::Yes : ResourceLoadObserver::FetchDestinationIsScriptLike::No)); |
| } |
| |
| auto continueWillSendRequest = [this, protectedThis = Ref { *this }, redirectResponse] (CompletionHandler<void(ResourceRequest&&)>&& completionHandler, ResourceRequest&& newRequest) mutable { |
| if (newRequest.isNull() || reachedTerminalState()) { |
| if (newRequest.isNull()) |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_CANCELLED_INVALID_NEW_REQUEST); |
| else |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_CANCELLED_TERMINAL_STATE); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| ResourceLoader::willSendRequestInternal(WTF::move(newRequest), redirectResponse, [this, protectedThis = Ref { *this }, completionHandler = WTF::move(completionHandler), redirectResponse] (ResourceRequest&& request) mutable { |
| tracePoint(SubresourceLoadWillStart, identifier() ? identifier()->toUInt64() : 0, PAGE_ID, FRAME_ID); |
| |
| if (reachedTerminalState()) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_TERMINAL_STATE_CALLING_COMPLETION_HANDLER); |
| return completionHandler(WTF::move(request)); |
| } |
| |
| if (request.isNull()) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_CANCELLED_INVALID_REQUEST); |
| cancel(); |
| return completionHandler(WTF::move(request)); |
| } |
| |
| if (m_resource->type() == CachedResource::Type::MainResource && !redirectResponse.isNull()) |
| protectedDocumentLoader()->willContinueMainResourceLoadAfterRedirect(request); |
| |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCELOAD_FINISHED); |
| completionHandler(WTF::move(request)); |
| }); |
| }; |
| |
| ASSERT(!newRequest.isNull()); |
| if (!redirectResponse.isNull()) { |
| CachedResourceHandle resource = m_resource.get(); |
| if (options().redirect != FetchOptions::Redirect::Follow) { |
| if (options().redirect == FetchOptions::Redirect::Error) { |
| ResourceError error { errorDomainWebKitInternal, 0, request().url(), makeString("Not allowed to follow a redirection while loading "_s, request().url().string()), ResourceError::Type::AccessControl }; |
| |
| if (RefPtr frame = m_frame.get(); frame && frame->document()) |
| frame->protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, error.localizedDescription()); |
| |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCELOAD_CANCELLED_REDIRECT_NOT_ALLOWED); |
| |
| cancel(error); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| ResourceResponse opaqueRedirectedResponse = redirectResponse; |
| opaqueRedirectedResponse.setType(ResourceResponse::Type::Opaqueredirect); |
| opaqueRedirectedResponse.setTainting(ResourceResponse::Tainting::Opaqueredirect); |
| resource->responseReceived(WTF::move(opaqueRedirectedResponse)); |
| if (reachedTerminalState()) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_REACHED_TERMINAL_STATE); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCE_LOAD_COMPLETED); |
| |
| NetworkLoadMetrics emptyMetrics; |
| didFinishLoading(emptyMetrics); |
| return completionHandler(WTF::move(newRequest)); |
| } else if (m_redirectCount++ >= options().maxRedirectCount) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCE_LOAD_CANCELLED_TOO_MANY_REDIRECTS); |
| cancel(ResourceError(String(), 0, request().url(), "Too many redirections"_s, ResourceError::Type::General)); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| // CachedResources are keyed off their original request URL. |
| // Requesting the same original URL a second time can redirect to a unique second resource. |
| // Therefore, if a redirect to a different destination URL occurs, we should no longer consider this a revalidation of the first resource. |
| // Doing so would have us reusing the resource from the first request if the second request's revalidation succeeds. |
| RefPtr frame = m_frame.get(); |
| if (newRequest.isConditional() && resource->resourceToRevalidate() && newRequest.url() != resource->resourceToRevalidate()->response().url()) { |
| newRequest.makeUnconditional(); |
| MemoryCache::singleton().revalidationFailed(*resource); |
| if (frame && frame->page()) |
| frame->protectedPage()->diagnosticLoggingClient().logDiagnosticMessageWithResult(DiagnosticLoggingKeys::cachedResourceRevalidationKey(), emptyString(), DiagnosticLoggingResultFail, ShouldSample::Yes); |
| } |
| |
| RefPtr documentLoader = this->documentLoader(); |
| Ref originalOrigin = SecurityOrigin::create(redirectResponse.url()); |
| Ref cachedResourceLoader = documentLoader->cachedResourceLoader(); |
| m_site = CachedResourceLoader::computeFetchMetadataSiteAfterRedirection(newRequest, m_resource->type(), options().mode, originalOrigin.get(), m_site, frame && frame->isMainFrame() && documentLoader->isRequestFromClientOrUserInput()); |
| |
| if (!cachedResourceLoader->updateRequestAfterRedirection(resource->type(), newRequest, options(), m_site, originalRequest().url(), redirectResponse.url())) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCE_LOAD_CANCELLED_CANNOT_REQUEST_AFTER_REDIRECTION); |
| cancel(ResourceError { String(), 0, request().url(), "Redirect was not allowed"_s, ResourceError::Type::AccessControl }); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| if (!isPortAllowed(newRequest.url())) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCE_LOAD_CANCELLED_AFTER_USING_BLOCKED_PORT); |
| if (RefPtr frame = m_frame.get()) |
| FrameLoader::reportBlockedLoadFailed(*frame, newRequest.url()); |
| if (frameLoader()) |
| cancel(frameLoader()->blockedError(newRequest)); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| auto accessControlCheckResult = checkRedirectionCrossOriginAccessControl(request(), redirectResponse, newRequest); |
| if (!accessControlCheckResult) { |
| auto errorMessage = makeString("Cross-origin redirection to "_s, newRequest.url().string(), " denied by Cross-Origin Resource Sharing policy: "_s, accessControlCheckResult.error()); |
| if (RefPtr frame = m_frame.get(); frame && frame->document()) |
| frame->protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, errorMessage); |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCE_LOAD_CANCELLED_AFTER_REDIRECT_DENIED_BY_CORS_POLICY); |
| cancel(ResourceError(String(), 0, request().url(), errorMessage, ResourceError::Type::AccessControl)); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| |
| if (resource->isImage() && cachedResourceLoader->shouldDeferImageLoad(newRequest.url())) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCE_LOAD_CANCELLED_AFTER_IMAGE_BEING_DEFERRED); |
| cancel(); |
| return completionHandler(WTF::move(newRequest)); |
| } |
| resource->redirectReceived(WTF::move(newRequest), redirectResponse, [this, protectedThis = Ref { *this }, completionHandler = WTF::move(completionHandler), continueWillSendRequest = WTF::move(continueWillSendRequest)] (ResourceRequest&& request) mutable { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLSENDREQUESTINTERNAL_RESOURCE_DONE_NOTIFYING_CLIENTS); |
| continueWillSendRequest(WTF::move(completionHandler), WTF::move(request)); |
| }); |
| return; |
| } |
| |
| continueWillSendRequest(WTF::move(completionHandler), WTF::move(newRequest)); |
| } |
| |
| void SubresourceLoader::didSendData(unsigned long long bytesSent, unsigned long long totalBytesToBeSent) |
| { |
| ASSERT(m_state == Initialized); |
| Ref protectedThis { *this }; |
| protectedCachedResource()->didSendData(bytesSent, totalBytesToBeSent); |
| } |
| |
| #if USE(QUICK_LOOK) |
| |
| bool SubresourceLoader::shouldCreatePreviewLoaderForResponse(const ResourceResponse& response) const |
| { |
| if (m_resource->type() != CachedResource::Type::MainResource) |
| return false; |
| |
| if (m_previewLoader) |
| return false; |
| |
| return PreviewConverter::supportsMIMEType(response.mimeType()); |
| } |
| |
| void SubresourceLoader::didReceivePreviewResponse(ResourceResponse&& response) |
| { |
| ASSERT(m_state == Initialized); |
| ASSERT(!response.isNull()); |
| ASSERT(m_resource); |
| ResourceLoader::didReceivePreviewResponse(ResourceResponse { response }); |
| protectedCachedResource()->previewResponseReceived(WTF::move(response)); |
| } |
| |
| #endif |
| |
| static bool isLocationURLFailure(const ResourceResponse& response) |
| { |
| auto locationString = response.httpHeaderField(HTTPHeaderName::Location); |
| return !locationString.isNull() && locationString.isEmpty(); |
| } |
| |
| void SubresourceLoader::didReceiveResponse(ResourceResponse&& response, CompletionHandler<void()>&& policyCompletionHandler) |
| { |
| ASSERT(!response.isNull()); |
| ASSERT(m_state == Initialized); |
| |
| CompletionHandlerCallingScope completionHandlerCaller(WTF::move(policyCompletionHandler)); |
| |
| if (response.containsInvalidHTTPHeaders()) { |
| didFail(badResponseHeadersError(request().url())); |
| return; |
| } |
| |
| #if USE(QUICK_LOOK) |
| if (shouldCreatePreviewLoaderForResponse(response)) { |
| lazyInitialize(m_previewLoader, LegacyPreviewLoader::create(*this, response)); |
| if (m_previewLoader->didReceiveResponse(response)) |
| return; |
| } |
| #endif |
| // Implementing step 10 of https://fetch.spec.whatwg.org/#main-fetch for service worker responses. |
| if (response.source() == ResourceResponse::Source::ServiceWorker && response.url() != request().url()) { |
| Ref loader = protectedDocumentLoader()->cachedResourceLoader(); |
| if (!loader->allowedByContentSecurityPolicy(m_resource->type(), response.url(), options(), ContentSecurityPolicy::RedirectResponseReceived::Yes)) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDRECEIVERESPONSE_CANCELING_LOAD_BLOCKED_BY_CONTENT_POLICY); |
| cancel(ResourceError({ }, 0, response.url(), { }, ResourceError::Type::General)); |
| return; |
| } |
| } |
| |
| if (auto error = validateRangeRequestedFlag(request(), response)) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDRECEIVERESPONSE_CANCELING_LOAD_RECEIVED_UNEXPECTED_RANGE_RESPONSE); |
| cancel(WTF::move(*error)); |
| return; |
| } |
| |
| // We want redirect responses to be processed through willSendRequestInternal. Exceptions are |
| // redirection with no or empty Location headers and fetch in manual redirect mode. Or in rare circumstances, |
| // cases of too many redirects from CFNetwork (<rdar://problem/30610988>). |
| #if !PLATFORM(COCOA) |
| ASSERT(response.httpStatusCode() < httpStatus300MultipleChoices || response.httpStatusCode() >= httpStatus400BadRequest || response.httpStatusCode() == httpStatus304NotModified || response.httpHeaderField(HTTPHeaderName::Location).isEmpty() || response.type() == ResourceResponse::Type::Opaqueredirect); |
| #endif |
| |
| // Reference the object in this method since the additional processing can do |
| // anything including removing the last reference to this object; one example of this is 3266216. |
| Ref protectedThis { *this }; |
| |
| if (shouldIncludeCertificateInfo()) |
| response.includeCertificateInfo(); |
| |
| CachedResourceHandle resource = m_resource.get(); |
| if (!resource) { |
| ASSERT_NOT_REACHED(); |
| RELEASE_LOG_FAULT(Loading, "Resource was unexpectedly null in SubresourceLoader::didReceiveResponse"); |
| } |
| |
| RefPtr frame = m_frame.get(); |
| if (resource && resource->resourceToRevalidate()) { |
| if (response.httpStatusCode() == httpStatus304NotModified) { |
| // Existing resource is ok, just use it updating the expiration time. |
| ResourceResponse revalidationResponse = response; |
| revalidationResponse.setSource(ResourceResponse::Source::MemoryCacheAfterValidation); |
| resource->setResponse(ResourceResponse { revalidationResponse }); |
| MemoryCache::singleton().revalidationSucceeded(*resource, resource->response()); |
| if (frame && frame->page()) |
| frame->protectedPage()->diagnosticLoggingClient().logDiagnosticMessageWithResult(DiagnosticLoggingKeys::cachedResourceRevalidationKey(), emptyString(), DiagnosticLoggingResultPass, ShouldSample::Yes); |
| if (!reachedTerminalState()) |
| ResourceLoader::didReceiveResponse(WTF::move(revalidationResponse), [completionHandlerCaller = WTF::move(completionHandlerCaller)] { }); |
| return; |
| } |
| // Did not get 304 response, continue as a regular resource load. |
| MemoryCache::singleton().revalidationFailed(*resource); |
| if (frame && frame->page()) |
| frame->protectedPage()->diagnosticLoggingClient().logDiagnosticMessageWithResult(DiagnosticLoggingKeys::cachedResourceRevalidationKey(), emptyString(), DiagnosticLoggingResultFail, ShouldSample::Yes); |
| } |
| |
| auto accessControlCheckResult = checkResponseCrossOriginAccessControl(response); |
| if (!accessControlCheckResult) { |
| if (frame && frame->document()) |
| frame->protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, accessControlCheckResult.error()); |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDRECEIVERESPONSE_CANCELING_LOAD_BECAUSE_OF_CROSS_ORIGIN_ACCESS_CONTROL); |
| cancel(ResourceError(String(), 0, request().url(), accessControlCheckResult.error(), ResourceError::Type::AccessControl)); |
| return; |
| } |
| |
| if (response.isRedirection()) { |
| if (options().redirect == FetchOptions::Redirect::Follow && isLocationURLFailure(response)) { |
| // Implementing https://fetch.spec.whatwg.org/#concept-http-redirect-fetch step 3 |
| cancel(); |
| return; |
| } |
| if (options().redirect == FetchOptions::Redirect::Manual) { |
| ResourceResponse opaqueRedirectedResponse = response; |
| opaqueRedirectedResponse.setType(ResourceResponse::Type::Opaqueredirect); |
| opaqueRedirectedResponse.setTainting(ResourceResponse::Tainting::Opaqueredirect); |
| if (resource) |
| resource->responseReceived(ResourceResponse { opaqueRedirectedResponse }); |
| if (!reachedTerminalState()) |
| ResourceLoader::didReceiveResponse(WTF::move(opaqueRedirectedResponse), [completionHandlerCaller = WTF::move(completionHandlerCaller)] { }); |
| return; |
| } |
| } |
| |
| if (m_loadingMultipartContent) { |
| if (!m_previousPartResponse.isNull()) { |
| if (resource) { |
| resource->responseReceived(WTF::move(m_previousPartResponse)); |
| // The resource data will change as the next part is loaded, so we need to make a copy. |
| resource->finishLoading(protectedResourceData()->copy().ptr(), { }); |
| } |
| } |
| clearResourceData(); |
| m_previousPartResponse = response; |
| // Since a subresource loader does not load multipart sections progressively, data was delivered to the loader all at once. |
| // After the first multipart section is complete, signal to delegates that this load is "finished" |
| NetworkLoadMetrics emptyMetrics; |
| protectedDocumentLoader()->subresourceLoaderFinishedLoadingOnePart(*this); |
| didFinishLoadingOnePart(emptyMetrics); |
| } else { |
| if (resource) |
| resource->responseReceived(ResourceResponse { response }); |
| } |
| if (reachedTerminalState()) |
| return; |
| |
| bool isResponseMultipart = response.isMultipart(); |
| if (options().mode != FetchOptions::Mode::Navigate && frame && frame->document()) |
| LinkLoader::loadLinksFromHeader(response.httpHeaderField(HTTPHeaderName::Link), protectedDocumentLoader()->url(), *frame->protectedDocument(), LinkLoader::MediaAttributeCheck::SkipMediaAttributeCheck); |
| |
| // https://wicg.github.io/nav-speculation/prefetch.html#clear-prefetch-cache |
| if (frame && frame->settings().clearSiteDataHTTPHeaderEnabled()) { |
| auto clearSiteDataValues = parseClearSiteDataHeader(response); |
| if (clearSiteDataValues.containsAny({ ClearSiteDataValue::Cache, ClearSiteDataValue::PrefetchCache })) { |
| Ref origin = SecurityOrigin::create(response.url()); |
| frame->loader().documentPrefetcher().clearPrefetchedResourcesForOrigin(origin); |
| } |
| } |
| |
| ResourceLoader::didReceiveResponse(WTF::move(response), [this, protectedThis = Ref { *this }, isResponseMultipart, completionHandlerCaller = WTF::move(completionHandlerCaller)]() mutable { |
| if (reachedTerminalState()) |
| return; |
| |
| CachedResourceHandle resource = m_resource.get(); |
| // FIXME: Main resources have a different set of rules for multipart than images do. |
| // Hopefully we can merge those 2 paths. |
| if (isResponseMultipart && resource && resource->type() != CachedResource::Type::MainResource) { |
| m_loadingMultipartContent = true; |
| |
| // We don't count multiParts in a CachedResourceLoader's request count |
| m_requestCountTracker = std::nullopt; |
| if (!resource->isImage()) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDRECEIVERESPONSE_CANCELING_LOAD_BECAUSE_OF_MULTIPART_NON_IMAGE); |
| cancel(); |
| return; |
| } |
| } |
| |
| if (responseHasHTTPStatusCodeError()) { |
| m_loadTiming.markEndTime(); |
| auto* metrics = this->response().deprecatedNetworkLoadMetricsOrNull(); |
| reportResourceTiming(metrics ? *metrics : NetworkLoadMetrics::emptyMetrics()); |
| |
| m_state = Finishing; |
| resource->error(CachedResource::LoadError); |
| cancel(); |
| } |
| |
| if (m_inAsyncResponsePolicyCheck) |
| m_policyForResponseCompletionHandler = completionHandlerCaller.release(); |
| }); |
| } |
| |
| void SubresourceLoader::didReceiveResponsePolicy() |
| { |
| ASSERT(m_inAsyncResponsePolicyCheck); |
| m_inAsyncResponsePolicyCheck = false; |
| if (auto completionHandler = WTF::move(m_policyForResponseCompletionHandler)) |
| completionHandler(); |
| } |
| |
| void SubresourceLoader::didReceiveBuffer(const FragmentedSharedBuffer& buffer, long long encodedDataLength, DataPayloadType dataPayloadType) |
| { |
| #if USE(QUICK_LOOK) |
| if (m_previewLoader && m_previewLoader->didReceiveData(buffer.makeContiguous())) |
| return; |
| #endif |
| |
| CachedResourceHandle resource = m_resource.get(); |
| ASSERT(resource); |
| |
| if (resource->response().httpStatusCode() >= httpStatus400BadRequest && !resource->shouldIgnoreHTTPStatusCodeErrors()) |
| return; |
| ASSERT(!resource->resourceToRevalidate()); |
| ASSERT(!resource->errorOccurred()); |
| ASSERT(m_state == Initialized); |
| // Reference the object in this method since the additional processing can do |
| // anything including removing the last reference to this object; one example of this is 3266216. |
| Ref protectedThis { *this }; |
| |
| ResourceLoader::didReceiveBuffer(buffer, encodedDataLength, dataPayloadType); |
| |
| if (!m_loadingMultipartContent) { |
| if (RefPtr resourceData = this->resourceData()) |
| resource->updateBuffer(*resourceData); |
| else |
| resource->updateData(buffer.makeContiguous()); |
| } |
| } |
| |
| bool SubresourceLoader::responseHasHTTPStatusCodeError() const |
| { |
| CachedResourceHandle resource = m_resource.get(); |
| if (resource->response().httpStatusCode() < httpStatus400BadRequest || resource->shouldIgnoreHTTPStatusCodeErrors()) |
| return false; |
| return true; |
| } |
| |
| static void logResourceLoaded(LocalFrame* frame, CachedResource::Type type) |
| { |
| if (!frame || !frame->page()) |
| return; |
| |
| String resourceType; |
| switch (type) { |
| case CachedResource::Type::MainResource: |
| resourceType = DiagnosticLoggingKeys::mainResourceKey(); |
| break; |
| case CachedResource::Type::ImageResource: |
| resourceType = DiagnosticLoggingKeys::imageKey(); |
| break; |
| #if ENABLE(XSLT) |
| case CachedResource::Type::XSLStyleSheet: |
| #endif |
| case CachedResource::Type::CSSStyleSheet: |
| resourceType = DiagnosticLoggingKeys::styleSheetKey(); |
| break; |
| case CachedResource::Type::JSON: |
| case CachedResource::Type::Script: |
| resourceType = DiagnosticLoggingKeys::scriptKey(); |
| break; |
| case CachedResource::Type::FontResource: |
| case CachedResource::Type::SVGFontResource: |
| resourceType = DiagnosticLoggingKeys::fontKey(); |
| break; |
| case CachedResource::Type::Beacon: |
| case CachedResource::Type::Ping: |
| case CachedResource::Type::MediaResource: |
| #if ENABLE(MODEL_ELEMENT) |
| case CachedResource::Type::EnvironmentMapResource: |
| case CachedResource::Type::ModelResource: |
| #endif |
| case CachedResource::Type::Icon: |
| case CachedResource::Type::RawResource: |
| resourceType = DiagnosticLoggingKeys::rawKey(); |
| break; |
| case CachedResource::Type::SVGDocumentResource: |
| resourceType = DiagnosticLoggingKeys::svgDocumentKey(); |
| break; |
| #if ENABLE(APPLICATION_MANIFEST) |
| case CachedResource::Type::ApplicationManifest: |
| resourceType = DiagnosticLoggingKeys::applicationManifestKey(); |
| break; |
| #endif |
| case CachedResource::Type::LinkPrefetch: |
| #if ENABLE(VIDEO) |
| case CachedResource::Type::TextTrackResource: |
| #endif |
| resourceType = DiagnosticLoggingKeys::otherKey(); |
| break; |
| } |
| |
| frame->protectedPage()->diagnosticLoggingClient().logDiagnosticMessage(DiagnosticLoggingKeys::resourceLoadedKey(), resourceType, ShouldSample::Yes); |
| } |
| |
| Expected<void, String> SubresourceLoader::checkResponseCrossOriginAccessControl(const ResourceResponse& response) |
| { |
| if (!m_resource->isCrossOrigin() || options().mode != FetchOptions::Mode::Cors) |
| return { }; |
| |
| if (response.source() == ResourceResponse::Source::ServiceWorker) { |
| if (response.tainting() == ResourceResponse::Tainting::Opaque) { |
| // FIXME: This should have an error message. |
| return makeUnexpected(String()); |
| } |
| return { }; |
| } |
| |
| ASSERT(m_origin); |
| |
| return passesAccessControlCheck(response, options().credentials == FetchOptions::Credentials::Include ? StoredCredentialsPolicy::Use : StoredCredentialsPolicy::DoNotUse, *protectedOrigin(), &CrossOriginAccessControlCheckDisabler::singleton()); |
| } |
| |
| RefPtr<SecurityOrigin> SubresourceLoader::protectedOrigin() const |
| { |
| return m_origin; |
| } |
| |
| Expected<void, String> SubresourceLoader::checkRedirectionCrossOriginAccessControl(const ResourceRequest& previousRequest, const ResourceResponse& redirectResponse, ResourceRequest& newRequest) |
| { |
| bool crossOriginFlag = m_resource->isCrossOrigin(); |
| bool isNextRequestCrossOrigin = m_origin && !protectedOrigin()->canRequest(newRequest.url(), OriginAccessPatternsForWebProcess::singleton()); |
| |
| if (isNextRequestCrossOrigin) |
| protectedCachedResource()->setCrossOrigin(); |
| bool newCrossOriginFlag = m_resource->isCrossOrigin(); |
| |
| ASSERT(options().mode != FetchOptions::Mode::SameOrigin || !newCrossOriginFlag); |
| |
| // Implementing https://fetch.spec.whatwg.org/#concept-http-redirect-fetch step 7 & 8. |
| if (options().mode == FetchOptions::Mode::Cors) { |
| if (newCrossOriginFlag) { |
| auto locationString = redirectResponse.httpHeaderField(HTTPHeaderName::Location); |
| String errorMessage = validateCrossOriginRedirectionURL(URL(redirectResponse.url(), locationString)); |
| if (!errorMessage.isNull()) |
| return makeUnexpected(WTF::move(errorMessage)); |
| } |
| |
| ASSERT(m_origin); |
| if (crossOriginFlag) { |
| auto accessControlCheckResult = passesAccessControlCheck(redirectResponse, options().storedCredentialsPolicy, *protectedOrigin(), &CrossOriginAccessControlCheckDisabler::singleton()); |
| if (!accessControlCheckResult) |
| return accessControlCheckResult; |
| } |
| } |
| |
| bool redirectingToNewOrigin = false; |
| if (newCrossOriginFlag) { |
| if (!crossOriginFlag && isNextRequestCrossOrigin) |
| redirectingToNewOrigin = true; |
| else |
| redirectingToNewOrigin = !protocolHostAndPortAreEqual(previousRequest.url(), newRequest.url()); |
| } |
| |
| // Implementing https://fetch.spec.whatwg.org/#concept-http-redirect-fetch step 10. |
| if (crossOriginFlag && redirectingToNewOrigin) |
| m_origin = SecurityOrigin::createOpaque(); |
| |
| newRequest.redirectAsGETIfNeeded(previousRequest, redirectResponse); |
| |
| // Implementing https://fetch.spec.whatwg.org/#concept-http-redirect-fetch step 14. |
| updateReferrerPolicy(redirectResponse.httpHeaderField(HTTPHeaderName::ReferrerPolicy)); |
| |
| if (options().mode == FetchOptions::Mode::Cors && redirectingToNewOrigin) { |
| cleanHTTPRequestHeadersForAccessControl(newRequest, options().httpHeadersToKeep); |
| updateRequestForAccessControl(newRequest, *protectedOrigin(), options().storedCredentialsPolicy); |
| } |
| |
| updateRequestReferrer(newRequest, referrerPolicy(), URL { previousRequest.httpReferrer() }, OriginAccessPatternsForWebProcess::singleton()); |
| |
| FrameLoader::addHTTPOriginIfNeeded(newRequest, m_origin ? protectedOrigin()->toString() : String()); |
| |
| return { }; |
| } |
| |
| void SubresourceLoader::updateReferrerPolicy(const String& referrerPolicyValue) |
| { |
| if (auto referrerPolicy = parseReferrerPolicy(referrerPolicyValue, ReferrerPolicySource::HTTPHeader)) { |
| ASSERT(*referrerPolicy != ReferrerPolicy::EmptyString); |
| setReferrerPolicy(*referrerPolicy); |
| } |
| } |
| |
| void SubresourceLoader::didFinishLoading(const NetworkLoadMetrics& networkLoadMetrics) |
| { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDFINISHLOADING); |
| |
| #if USE(QUICK_LOOK) |
| if (m_previewLoader && m_previewLoader->didFinishLoading()) |
| return; |
| #endif |
| |
| if (m_state != Initialized) |
| return; |
| |
| Ref protectedThis { *this }; |
| |
| ASSERT(!reachedTerminalState()); |
| CachedResourceHandle resource = m_resource.get(); |
| if (!resource) |
| return; |
| |
| ASSERT(!resource->resourceToRevalidate()); |
| // FIXME (129394): We should cancel the load when a decode error occurs instead of continuing the load to completion. |
| ASSERT(!resource->errorOccurred() || resource->status() == CachedResource::DecodeError || !resource->isLoading()); |
| LOG(ResourceLoading, "Received '%s'.", resource->url().string().latin1().data()); |
| logResourceLoaded(protectedFrame().get(), resource->type()); |
| |
| m_loadTiming.markEndTime(); |
| |
| if (networkLoadMetrics.isComplete()) |
| reportResourceTiming(networkLoadMetrics); |
| else { |
| // This is the legacy path for platforms (and ResourceHandle paths) that do not provide |
| // complete load metrics in didFinishLoad. In those cases, fall back to the possibility |
| // that they populated partial load timing information on the ResourceResponse. |
| const auto* timing = resource->response().deprecatedNetworkLoadMetricsOrNull(); |
| reportResourceTiming(timing ? *timing : NetworkLoadMetrics::emptyMetrics()); |
| } |
| |
| if (resource->type() != CachedResource::Type::MainResource) |
| tracePoint(SubresourceLoadDidEnd, identifier() ? identifier()->toUInt64() : 0); |
| |
| m_state = Finishing; |
| if (m_loadingMultipartContent && !m_previousPartResponse.isNull()) |
| resource->responseReceived(ResourceResponse { m_previousPartResponse }); |
| resource->finishLoading(protectedResourceData().get(), networkLoadMetrics); |
| |
| if (wasCancelled()) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDFINISHLOADING_CANCELED); |
| return; |
| } |
| |
| resource->finish(); |
| ASSERT(!reachedTerminalState()); |
| didFinishLoadingOnePart(networkLoadMetrics); |
| notifyDone(LoadCompletionType::Finish); |
| |
| if (reachedTerminalState()) { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDFINISHLOADING_REACHED_TERMINAL_STATE); |
| return; |
| } |
| releaseResources(); |
| } |
| |
| void SubresourceLoader::didFail(const ResourceError& error) |
| { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_DIDFAIL, static_cast<int>(error.type()), error.errorCode()); |
| |
| #if USE(QUICK_LOOK) |
| if (m_previewLoader) |
| m_previewLoader->didFail(); |
| #endif |
| |
| if (m_state != Initialized) |
| return; |
| |
| ASSERT(!reachedTerminalState()); |
| CachedResourceHandle resource = m_resource.get(); |
| LOG(ResourceLoading, "Failed to load '%s'.\n", resource->url().string().latin1().data()); |
| |
| RefPtr frame = m_frame.get(); |
| if (frame && frame->document() && error.isAccessControl() && error.domain() != InspectorNetworkAgent::errorDomain() && resource->type() != CachedResource::Type::Ping) |
| frame->protectedDocument()->addConsoleMessage(MessageSource::Security, MessageLevel::Error, error.localizedDescription()); |
| |
| Ref protectedThis { *this }; |
| m_state = Finishing; |
| |
| if (resource->type() != CachedResource::Type::MainResource) |
| tracePoint(SubresourceLoadDidEnd, identifier() ? identifier()->toUInt64() : 0); |
| |
| if (resource->resourceToRevalidate()) |
| MemoryCache::singleton().revalidationFailed(*resource); |
| resource->setResourceError(error); |
| if (!resource->isPreloaded()) |
| MemoryCache::singleton().remove(*resource); |
| resource->error(CachedResource::LoadError); |
| cleanupForError(error); |
| notifyDone(LoadCompletionType::Cancel); |
| if (reachedTerminalState()) |
| return; |
| releaseResources(); |
| } |
| |
| void SubresourceLoader::willCancel(const ResourceError& error) |
| { |
| SUBRESOURCELOADER_RELEASE_LOG(SUBRESOURCELOADER_WILLCANCEL, static_cast<int>(error.type()), error.errorCode()); |
| |
| #if PLATFORM(IOS_FAMILY) |
| // Since we defer initialization to scheduling time on iOS but |
| // CachedResourceLoader stores resources in the memory cache immediately, |
| // m_resource might be cached despite its loader not being initialized. |
| if (m_state != Initialized && m_state != Uninitialized) |
| #else |
| if (m_state != Initialized) |
| #endif |
| return; |
| |
| ASSERT(!reachedTerminalState()); |
| |
| Ref protectedThis { *this }; |
| CachedResourceHandle resource = m_resource.get(); |
| LOG(ResourceLoading, "Cancelled load of '%s'.\n", resource->url().string().latin1().data()); |
| |
| #if PLATFORM(IOS_FAMILY) |
| m_state = m_state == Uninitialized ? CancelledWhileInitializing : Finishing; |
| #else |
| m_state = Finishing; |
| #endif |
| Ref memoryCache = MemoryCache::singleton(); |
| if (resource->resourceToRevalidate()) |
| memoryCache->revalidationFailed(*resource); |
| resource->setResourceError(error); |
| memoryCache->remove(*resource); |
| } |
| |
| void SubresourceLoader::didCancel(LoadWillContinueInAnotherProcess loadWillContinueInAnotherProcess) |
| { |
| if (m_state == Uninitialized || reachedTerminalState()) |
| return; |
| |
| CachedResourceHandle resource = m_resource.get(); |
| ASSERT(resource); |
| |
| if (resource->type() != CachedResource::Type::MainResource) |
| tracePoint(SubresourceLoadDidEnd, identifier() ? identifier()->toUInt64() : 0); |
| |
| resource->cancelLoad(loadWillContinueInAnotherProcess); |
| notifyDone(LoadCompletionType::Cancel); |
| } |
| |
| void SubresourceLoader::notifyDone(LoadCompletionType type) |
| { |
| if (reachedTerminalState()) |
| return; |
| |
| m_requestCountTracker = std::nullopt; |
| bool shouldPerformPostLoadActions = true; |
| #if PLATFORM(IOS_FAMILY) |
| if (m_state == CancelledWhileInitializing) |
| shouldPerformPostLoadActions = false; |
| #endif |
| if (RefPtr documentLoader = this->documentLoader()) |
| documentLoader->protectedCachedResourceLoader()->loadDone(type, shouldPerformPostLoadActions); |
| else |
| SUBRESOURCELOADER_RELEASE_LOG_ERROR("notifyDone: document loader is null. Could not call loadDone()"); |
| |
| if (reachedTerminalState()) |
| return; |
| if (RefPtr documentLoader = this->documentLoader()) |
| documentLoader->removeSubresourceLoader(type, *this); |
| else |
| SUBRESOURCELOADER_RELEASE_LOG_ERROR("notifyDone: document loader is null. Could not call removeSubresourceLoader()"); |
| } |
| |
| void SubresourceLoader::releaseResources() |
| { |
| ASSERT(!reachedTerminalState()); |
| m_requestCountTracker = std::nullopt; |
| #if PLATFORM(IOS_FAMILY) |
| if (m_state != Uninitialized && m_state != CancelledWhileInitializing) |
| #else |
| if (m_state != Uninitialized) |
| #endif |
| protectedCachedResource()->clearLoader(); |
| m_resource = nullptr; |
| ResourceLoader::releaseResources(); |
| } |
| |
| void SubresourceLoader::reportResourceTiming(const NetworkLoadMetrics& networkLoadMetrics) |
| { |
| CachedResourceHandle resource = m_resource.get(); |
| ASSERT(resource); |
| if (!resource || !ResourceTimingInformation::shouldAddResourceTiming(*resource)) |
| return; |
| |
| RefPtr documentLoader = this->documentLoader(); |
| RefPtr document = documentLoader->cachedResourceLoader().document(); |
| if (!document) |
| return; |
| |
| Ref origin = m_origin ? *m_origin : document->securityOrigin(); |
| auto resourceTiming = ResourceTiming::fromLoad(*resource, resource->resourceRequest().url(), resource->initiatorType(), m_loadTiming, networkLoadMetrics, origin); |
| |
| // Worker resources loaded here are all CachedRawResources loaded through WorkerThreadableLoader. |
| // Pass the ResourceTiming information on so that WorkerThreadableLoader may add them to the |
| // Worker's Performance object. |
| if (options().initiatorContext == InitiatorContext::Worker) { |
| ASSERT(m_origin); |
| downcast<CachedRawResource>(*resource).finishedTimingForWorkerLoad(WTF::move(resourceTiming)); |
| return; |
| } |
| |
| ASSERT(options().initiatorContext == InitiatorContext::Document); |
| documentLoader->protectedCachedResourceLoader()->resourceTimingInformation().addResourceTiming(*protectedCachedResource(), *document, WTF::move(resourceTiming)); |
| } |
| |
| const HTTPHeaderMap* SubresourceLoader::originalHeaders() const |
| { |
| return (m_resource && m_resource->originalRequest()) ? &m_resource->originalRequest()->httpHeaderFields() : nullptr; |
| } |
| |
| } // namespace WebCore |
| |
| #undef PAGE_ID |
| #undef FRAME_ID |
| #undef SUBRESOURCELOADER_RELEASE_LOG |
| #undef SUBRESOURCELOADER_RELEASE_LOG_ERROR |