mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-25 13:51:41 +00:00
1533 lines
33 KiB
C++
1533 lines
33 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef mozilla_dom_workers_workerprivate_h__
|
|
#define mozilla_dom_workers_workerprivate_h__
|
|
|
|
#include "mozilla/dom/WorkerCommon.h"
|
|
#include "mozilla/CondVar.h"
|
|
#include "mozilla/DOMEventTargetHelper.h"
|
|
#include "nsIContentSecurityPolicy.h"
|
|
#include "nsIEventTarget.h"
|
|
#include "nsTObserverArray.h"
|
|
|
|
#include "mozilla/dom/Worker.h"
|
|
#include "mozilla/dom/WorkerHolder.h"
|
|
#include "mozilla/dom/WorkerLoadInfo.h"
|
|
#include "mozilla/dom/workerinternals/JSSettings.h"
|
|
#include "mozilla/dom/workerinternals/Queue.h"
|
|
|
|
class nsIConsoleReportCollector;
|
|
class nsIThreadInternal;
|
|
|
|
namespace mozilla {
|
|
namespace dom {
|
|
|
|
// If you change this, the corresponding list in nsIWorkerDebugger.idl needs
|
|
// to be updated too.
|
|
enum WorkerType
|
|
{
|
|
WorkerTypeDedicated,
|
|
WorkerTypeShared,
|
|
WorkerTypeService
|
|
};
|
|
|
|
class ClientInfo;
|
|
class ClientSource;
|
|
class Function;
|
|
class MessagePort;
|
|
class MessagePortIdentifier;
|
|
class PerformanceStorage;
|
|
class SharedWorker;
|
|
class WorkerControlRunnable;
|
|
class WorkerDebugger;
|
|
class WorkerDebuggerGlobalScope;
|
|
class WorkerErrorReport;
|
|
class WorkerEventTarget;
|
|
class WorkerGlobalScope;
|
|
class WorkerRunnable;
|
|
class WorkerThread;
|
|
|
|
// SharedMutex is a small wrapper around an (internal) reference-counted Mutex
|
|
// object. It exists to avoid changing a lot of code to use Mutex* instead of
|
|
// Mutex&.
|
|
class SharedMutex
|
|
{
|
|
typedef mozilla::Mutex Mutex;
|
|
|
|
class RefCountedMutex final : public Mutex
|
|
{
|
|
public:
|
|
explicit RefCountedMutex(const char* aName)
|
|
: Mutex(aName)
|
|
{ }
|
|
|
|
NS_INLINE_DECL_THREADSAFE_REFCOUNTING(RefCountedMutex)
|
|
|
|
private:
|
|
~RefCountedMutex()
|
|
{ }
|
|
};
|
|
|
|
RefPtr<RefCountedMutex> mMutex;
|
|
|
|
public:
|
|
explicit SharedMutex(const char* aName)
|
|
: mMutex(new RefCountedMutex(aName))
|
|
{ }
|
|
|
|
SharedMutex(SharedMutex& aOther)
|
|
: mMutex(aOther.mMutex)
|
|
{ }
|
|
|
|
operator Mutex&()
|
|
{
|
|
return *mMutex;
|
|
}
|
|
|
|
operator const Mutex&() const
|
|
{
|
|
return *mMutex;
|
|
}
|
|
|
|
void
|
|
AssertCurrentThreadOwns() const
|
|
{
|
|
mMutex->AssertCurrentThreadOwns();
|
|
}
|
|
};
|
|
|
|
class WorkerPrivate
|
|
{
|
|
public:
|
|
struct LocationInfo
|
|
{
|
|
nsCString mHref;
|
|
nsCString mProtocol;
|
|
nsCString mHost;
|
|
nsCString mHostname;
|
|
nsCString mPort;
|
|
nsCString mPathname;
|
|
nsCString mSearch;
|
|
nsCString mHash;
|
|
nsString mOrigin;
|
|
};
|
|
|
|
NS_INLINE_DECL_REFCOUNTING(WorkerPrivate)
|
|
|
|
static already_AddRefed<WorkerPrivate>
|
|
Constructor(JSContext* aCx, const nsAString& aScriptURL, bool aIsChromeWorker,
|
|
WorkerType aWorkerType, const nsAString& aWorkerName,
|
|
const nsACString& aServiceWorkerScope,
|
|
WorkerLoadInfo* aLoadInfo, ErrorResult& aRv);
|
|
|
|
enum LoadGroupBehavior
|
|
{
|
|
InheritLoadGroup,
|
|
OverrideLoadGroup
|
|
};
|
|
|
|
static nsresult
|
|
GetLoadInfo(JSContext* aCx, nsPIDOMWindowInner* aWindow,
|
|
WorkerPrivate* aParent,
|
|
const nsAString& aScriptURL, bool aIsChromeWorker,
|
|
LoadGroupBehavior aLoadGroupBehavior, WorkerType aWorkerType,
|
|
WorkerLoadInfo* aLoadInfo);
|
|
|
|
void
|
|
Traverse(nsCycleCollectionTraversalCallback& aCb);
|
|
|
|
void
|
|
ClearSelfAndParentEventTargetRef()
|
|
{
|
|
AssertIsOnParentThread();
|
|
MOZ_ASSERT(mSelfRef);
|
|
mParentEventTargetRef = nullptr;
|
|
mSelfRef = nullptr;
|
|
}
|
|
|
|
// May be called on any thread...
|
|
bool
|
|
Start();
|
|
|
|
// Called on the parent thread.
|
|
bool
|
|
Notify(WorkerStatus aStatus)
|
|
{
|
|
return NotifyPrivate(aStatus);
|
|
}
|
|
|
|
bool
|
|
Cancel()
|
|
{
|
|
return Notify(Canceling);
|
|
}
|
|
|
|
bool
|
|
Kill()
|
|
{
|
|
return Notify(Killing);
|
|
}
|
|
|
|
bool
|
|
Terminate()
|
|
{
|
|
AssertIsOnParentThread();
|
|
return TerminatePrivate();
|
|
}
|
|
|
|
bool
|
|
Close();
|
|
|
|
// The passed principal must be the Worker principal in case of a
|
|
// ServiceWorker and the loading principal for any other type.
|
|
static void
|
|
OverrideLoadInfoLoadGroup(WorkerLoadInfo& aLoadInfo,
|
|
nsIPrincipal* aPrincipal);
|
|
|
|
bool
|
|
IsDebuggerRegistered()
|
|
{
|
|
AssertIsOnMainThread();
|
|
|
|
// No need to lock here since this is only ever modified by the same thread.
|
|
return mDebuggerRegistered;
|
|
}
|
|
|
|
void
|
|
SetIsDebuggerRegistered(bool aDebuggerRegistered)
|
|
{
|
|
AssertIsOnMainThread();
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
MOZ_ASSERT(mDebuggerRegistered != aDebuggerRegistered);
|
|
mDebuggerRegistered = aDebuggerRegistered;
|
|
|
|
mCondVar.Notify();
|
|
}
|
|
|
|
void
|
|
WaitForIsDebuggerRegistered(bool aDebuggerRegistered)
|
|
{
|
|
AssertIsOnParentThread();
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
while (mDebuggerRegistered != aDebuggerRegistered) {
|
|
mCondVar.Wait();
|
|
}
|
|
}
|
|
|
|
WorkerDebugger*
|
|
Debugger() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mDebugger);
|
|
return mDebugger;
|
|
}
|
|
|
|
void
|
|
SetDebugger(WorkerDebugger* aDebugger)
|
|
{
|
|
AssertIsOnMainThread();
|
|
|
|
MOZ_ASSERT(mDebugger != aDebugger);
|
|
mDebugger = aDebugger;
|
|
}
|
|
|
|
JS::UniqueChars
|
|
AdoptDefaultLocale()
|
|
{
|
|
MOZ_ASSERT(mDefaultLocale,
|
|
"the default locale must have been successfully set for anyone "
|
|
"to be trying to adopt it");
|
|
return Move(mDefaultLocale);
|
|
}
|
|
|
|
void
|
|
DoRunLoop(JSContext* aCx);
|
|
|
|
bool
|
|
InterruptCallback(JSContext* aCx);
|
|
|
|
bool
|
|
IsOnCurrentThread();
|
|
|
|
bool
|
|
CloseInternal(JSContext* aCx)
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
return NotifyInternal(aCx, Closing);
|
|
}
|
|
|
|
bool
|
|
FreezeInternal();
|
|
|
|
bool
|
|
ThawInternal();
|
|
|
|
void
|
|
TraverseTimeouts(nsCycleCollectionTraversalCallback& aCallback);
|
|
|
|
void
|
|
UnlinkTimeouts();
|
|
|
|
bool
|
|
ModifyBusyCountFromWorker(bool aIncrease);
|
|
|
|
bool
|
|
AddChildWorker(WorkerPrivate* aChildWorker);
|
|
|
|
void
|
|
RemoveChildWorker(WorkerPrivate* aChildWorker);
|
|
|
|
void
|
|
PostMessageToParent(JSContext* aCx,
|
|
JS::Handle<JS::Value> aMessage,
|
|
const Sequence<JSObject*>& aTransferable,
|
|
ErrorResult& aRv)
|
|
{
|
|
PostMessageToParentInternal(aCx, aMessage, aTransferable, aRv);
|
|
}
|
|
|
|
void
|
|
PostMessageToParentMessagePort(JSContext* aCx,
|
|
JS::Handle<JS::Value> aMessage,
|
|
const Sequence<JSObject*>& aTransferable,
|
|
ErrorResult& aRv);
|
|
|
|
void
|
|
EnterDebuggerEventLoop();
|
|
|
|
void
|
|
LeaveDebuggerEventLoop();
|
|
|
|
void
|
|
PostMessageToDebugger(const nsAString& aMessage);
|
|
|
|
void
|
|
SetDebuggerImmediate(Function& aHandler, ErrorResult& aRv);
|
|
|
|
void
|
|
ReportErrorToDebugger(const nsAString& aFilename, uint32_t aLineno,
|
|
const nsAString& aMessage);
|
|
|
|
bool
|
|
NotifyInternal(JSContext* aCx, WorkerStatus aStatus);
|
|
|
|
void
|
|
ReportError(JSContext* aCx, JS::ConstUTF8CharsZ aToStringResult,
|
|
JSErrorReport* aReport);
|
|
|
|
static void
|
|
ReportErrorToConsole(const char* aMessage);
|
|
|
|
int32_t
|
|
SetTimeout(JSContext* aCx, nsIScriptTimeoutHandler* aHandler,
|
|
int32_t aTimeout, bool aIsInterval,
|
|
ErrorResult& aRv);
|
|
|
|
void
|
|
ClearTimeout(int32_t aId);
|
|
|
|
bool
|
|
RunExpiredTimeouts(JSContext* aCx);
|
|
|
|
bool
|
|
RescheduleTimeoutTimer(JSContext* aCx);
|
|
|
|
void
|
|
UpdateContextOptionsInternal(JSContext* aCx, const JS::ContextOptions& aContextOptions);
|
|
|
|
void
|
|
UpdateLanguagesInternal(const nsTArray<nsString>& aLanguages);
|
|
|
|
void
|
|
UpdateJSWorkerMemoryParameterInternal(JSContext* aCx, JSGCParamKey key, uint32_t aValue);
|
|
|
|
enum WorkerRanOrNot {
|
|
WorkerNeverRan = 0,
|
|
WorkerRan
|
|
};
|
|
|
|
void
|
|
ScheduleDeletion(WorkerRanOrNot aRanOrNot);
|
|
|
|
bool
|
|
CollectRuntimeStats(JS::RuntimeStats* aRtStats, bool aAnonymize);
|
|
|
|
#ifdef JS_GC_ZEAL
|
|
void
|
|
UpdateGCZealInternal(JSContext* aCx, uint8_t aGCZeal, uint32_t aFrequency);
|
|
#endif
|
|
|
|
void
|
|
GarbageCollectInternal(JSContext* aCx, bool aShrinking,
|
|
bool aCollectChildren);
|
|
|
|
void
|
|
CycleCollectInternal(bool aCollectChildren);
|
|
|
|
void
|
|
OfflineStatusChangeEventInternal(bool aIsOffline);
|
|
|
|
void
|
|
MemoryPressureInternal();
|
|
|
|
void
|
|
SetFetchHandlerWasAdded()
|
|
{
|
|
MOZ_ASSERT(IsServiceWorker());
|
|
AssertIsOnWorkerThread();
|
|
mFetchHandlerWasAdded = true;
|
|
}
|
|
|
|
bool
|
|
FetchHandlerWasAdded() const
|
|
{
|
|
MOZ_ASSERT(IsServiceWorker());
|
|
AssertIsOnWorkerThread();
|
|
return mFetchHandlerWasAdded;
|
|
}
|
|
|
|
JSContext*
|
|
GetJSContext() const
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
return mJSContext;
|
|
}
|
|
|
|
WorkerGlobalScope*
|
|
GlobalScope() const
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
return mScope;
|
|
}
|
|
|
|
WorkerDebuggerGlobalScope*
|
|
DebuggerGlobalScope() const
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
return mDebuggerScope;
|
|
}
|
|
|
|
void
|
|
SetThread(WorkerThread* aThread);
|
|
|
|
void
|
|
AssertIsOnWorkerThread() const
|
|
#ifdef DEBUG
|
|
;
|
|
#else
|
|
{ }
|
|
#endif
|
|
|
|
// This may block!
|
|
void
|
|
BeginCTypesCall();
|
|
|
|
// This may block!
|
|
void
|
|
EndCTypesCall();
|
|
|
|
void
|
|
BeginCTypesCallback()
|
|
{
|
|
// If a callback is beginning then we need to do the exact same thing as
|
|
// when a ctypes call ends.
|
|
EndCTypesCall();
|
|
}
|
|
|
|
void
|
|
EndCTypesCallback()
|
|
{
|
|
// If a callback is ending then we need to do the exact same thing as
|
|
// when a ctypes call begins.
|
|
BeginCTypesCall();
|
|
}
|
|
|
|
bool
|
|
ConnectMessagePort(JSContext* aCx, MessagePortIdentifier& aIdentifier);
|
|
|
|
WorkerGlobalScope*
|
|
GetOrCreateGlobalScope(JSContext* aCx);
|
|
|
|
WorkerDebuggerGlobalScope*
|
|
CreateDebuggerGlobalScope(JSContext* aCx);
|
|
|
|
bool
|
|
RegisterBindings(JSContext* aCx, JS::Handle<JSObject*> aGlobal);
|
|
|
|
bool
|
|
RegisterDebuggerBindings(JSContext* aCx, JS::Handle<JSObject*> aGlobal);
|
|
|
|
bool
|
|
OnLine() const
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
return mOnLine;
|
|
}
|
|
|
|
void
|
|
StopSyncLoop(nsIEventTarget* aSyncLoopTarget, bool aResult);
|
|
|
|
bool
|
|
AllPendingRunnablesShouldBeCanceled() const
|
|
{
|
|
return mCancelAllPendingRunnables;
|
|
}
|
|
|
|
void
|
|
ClearMainEventQueue(WorkerRanOrNot aRanOrNot);
|
|
|
|
void
|
|
ClearDebuggerEventQueue();
|
|
|
|
void
|
|
OnProcessNextEvent();
|
|
|
|
void
|
|
AfterProcessNextEvent();
|
|
|
|
void
|
|
AssertValidSyncLoop(nsIEventTarget* aSyncLoopTarget)
|
|
#ifdef DEBUG
|
|
;
|
|
#else
|
|
{ }
|
|
#endif
|
|
|
|
void
|
|
SetWorkerScriptExecutedSuccessfully()
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
// Should only be called once!
|
|
MOZ_ASSERT(!mWorkerScriptExecutedSuccessfully);
|
|
mWorkerScriptExecutedSuccessfully = true;
|
|
}
|
|
|
|
// Only valid after CompileScriptRunnable has finished running!
|
|
bool
|
|
WorkerScriptExecutedSuccessfully() const
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
return mWorkerScriptExecutedSuccessfully;
|
|
}
|
|
|
|
void
|
|
MaybeDispatchLoadFailedRunnable();
|
|
|
|
// Get the event target to use when dispatching to the main thread
|
|
// from this Worker thread. This may be the main thread itself or
|
|
// a ThrottledEventQueue to the main thread.
|
|
nsIEventTarget*
|
|
MainThreadEventTarget();
|
|
|
|
nsresult
|
|
DispatchToMainThread(nsIRunnable* aRunnable,
|
|
uint32_t aFlags = NS_DISPATCH_NORMAL);
|
|
|
|
nsresult
|
|
DispatchToMainThread(already_AddRefed<nsIRunnable> aRunnable,
|
|
uint32_t aFlags = NS_DISPATCH_NORMAL);
|
|
|
|
// Get an event target that will dispatch runnables as control runnables on
|
|
// the worker thread. Implement nsICancelableRunnable if you wish to take
|
|
// action on cancelation.
|
|
nsISerialEventTarget*
|
|
ControlEventTarget();
|
|
|
|
// Get an event target that will attempt to dispatch a normal WorkerRunnable,
|
|
// but if that fails will then fall back to a control runnable.
|
|
nsISerialEventTarget*
|
|
HybridEventTarget();
|
|
|
|
void
|
|
DumpCrashInformation(nsACString& aString);
|
|
|
|
bool
|
|
EnsureClientSource();
|
|
|
|
const ClientInfo&
|
|
GetClientInfo() const;
|
|
|
|
const ClientState
|
|
GetClientState() const;
|
|
|
|
const Maybe<ServiceWorkerDescriptor>
|
|
GetController() const;
|
|
|
|
void
|
|
Control(const ServiceWorkerDescriptor& aServiceWorker);
|
|
|
|
void
|
|
ExecutionReady();
|
|
|
|
PerformanceStorage*
|
|
GetPerformanceStorage();
|
|
|
|
bool
|
|
IsAcceptingEvents()
|
|
{
|
|
AssertIsOnParentThread();
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
return mParentStatus < Terminating;
|
|
}
|
|
|
|
WorkerStatus
|
|
ParentStatusProtected()
|
|
{
|
|
AssertIsOnParentThread();
|
|
MutexAutoLock lock(mMutex);
|
|
return mParentStatus;
|
|
}
|
|
|
|
WorkerStatus
|
|
ParentStatus() const
|
|
{
|
|
mMutex.AssertCurrentThreadOwns();
|
|
return mParentStatus;
|
|
}
|
|
|
|
Worker*
|
|
ParentEventTargetRef() const
|
|
{
|
|
MOZ_DIAGNOSTIC_ASSERT(mParentEventTargetRef);
|
|
return mParentEventTargetRef;
|
|
}
|
|
|
|
void
|
|
SetParentEventTargetRef(Worker* aParentEventTargetRef)
|
|
{
|
|
MOZ_DIAGNOSTIC_ASSERT(aParentEventTargetRef);
|
|
MOZ_DIAGNOSTIC_ASSERT(!mParentEventTargetRef);
|
|
mParentEventTargetRef = aParentEventTargetRef;
|
|
}
|
|
|
|
bool
|
|
ModifyBusyCount(bool aIncrease);
|
|
|
|
// This method is used by RuntimeService to know what is going wrong the
|
|
// shutting down.
|
|
uint32_t
|
|
BusyCount()
|
|
{
|
|
return mBusyCount;
|
|
}
|
|
|
|
// Check whether this worker is a secure context. For use from the parent
|
|
// thread only; the canonical "is secure context" boolean is stored on the
|
|
// compartment of the worker global. The only reason we don't
|
|
// AssertIsOnParentThread() here is so we can assert that this value matches
|
|
// the one on the compartment, which has to be done from the worker thread.
|
|
bool IsSecureContext() const
|
|
{
|
|
return mIsSecureContext;
|
|
}
|
|
|
|
TimeStamp CreationTimeStamp() const
|
|
{
|
|
return mCreationTimeStamp;
|
|
}
|
|
|
|
DOMHighResTimeStamp CreationTime() const
|
|
{
|
|
return mCreationTimeHighRes;
|
|
}
|
|
|
|
DOMHighResTimeStamp TimeStampToDOMHighRes(const TimeStamp& aTimeStamp) const
|
|
{
|
|
MOZ_ASSERT(!aTimeStamp.IsNull());
|
|
TimeDuration duration = aTimeStamp - mCreationTimeStamp;
|
|
return duration.ToMilliseconds();
|
|
}
|
|
|
|
LocationInfo&
|
|
GetLocationInfo()
|
|
{
|
|
return mLocationInfo;
|
|
}
|
|
|
|
void
|
|
CopyJSSettings(workerinternals::JSSettings& aSettings)
|
|
{
|
|
mozilla::MutexAutoLock lock(mMutex);
|
|
aSettings = mJSSettings;
|
|
}
|
|
|
|
void
|
|
CopyJSCompartmentOptions(JS::CompartmentOptions& aOptions)
|
|
{
|
|
mozilla::MutexAutoLock lock(mMutex);
|
|
aOptions = IsChromeWorker() ? mJSSettings.chrome.compartmentOptions
|
|
: mJSSettings.content.compartmentOptions;
|
|
}
|
|
|
|
// The ability to be a chrome worker is orthogonal to the type of
|
|
// worker [Dedicated|Shared|Service].
|
|
bool
|
|
IsChromeWorker() const
|
|
{
|
|
return mIsChromeWorker;
|
|
}
|
|
|
|
WorkerPrivate*
|
|
GetParent() const
|
|
{
|
|
return mParent;
|
|
}
|
|
|
|
bool
|
|
IsFrozen() const
|
|
{
|
|
AssertIsOnParentThread();
|
|
return mParentFrozen;
|
|
}
|
|
|
|
bool
|
|
IsParentWindowPaused() const
|
|
{
|
|
AssertIsOnParentThread();
|
|
return mParentWindowPausedDepth > 0;
|
|
}
|
|
|
|
// When we debug a worker, we want to disconnect the window and the worker
|
|
// communication. This happens calling this method.
|
|
// Note: this method doesn't suspend the worker! Use Freeze/Thaw instead.
|
|
void
|
|
ParentWindowPaused();
|
|
|
|
void
|
|
ParentWindowResumed();
|
|
|
|
const nsString&
|
|
ScriptURL() const
|
|
{
|
|
return mScriptURL;
|
|
}
|
|
|
|
const nsString&
|
|
WorkerName() const
|
|
{
|
|
return mWorkerName;
|
|
}
|
|
|
|
WorkerType
|
|
Type() const
|
|
{
|
|
return mWorkerType;
|
|
}
|
|
|
|
bool
|
|
IsDedicatedWorker() const
|
|
{
|
|
return mWorkerType == WorkerTypeDedicated;
|
|
}
|
|
|
|
bool
|
|
IsSharedWorker() const
|
|
{
|
|
return mWorkerType == WorkerTypeShared;
|
|
}
|
|
|
|
bool
|
|
IsServiceWorker() const
|
|
{
|
|
return mWorkerType == WorkerTypeService;
|
|
}
|
|
|
|
nsContentPolicyType
|
|
ContentPolicyType() const
|
|
{
|
|
return ContentPolicyType(mWorkerType);
|
|
}
|
|
|
|
static nsContentPolicyType
|
|
ContentPolicyType(WorkerType aWorkerType)
|
|
{
|
|
switch (aWorkerType) {
|
|
case WorkerTypeDedicated:
|
|
return nsIContentPolicy::TYPE_INTERNAL_WORKER;
|
|
case WorkerTypeShared:
|
|
return nsIContentPolicy::TYPE_INTERNAL_SHARED_WORKER;
|
|
case WorkerTypeService:
|
|
return nsIContentPolicy::TYPE_INTERNAL_SERVICE_WORKER;
|
|
default:
|
|
MOZ_ASSERT_UNREACHABLE("Invalid worker type");
|
|
return nsIContentPolicy::TYPE_INVALID;
|
|
}
|
|
}
|
|
|
|
nsIScriptContext*
|
|
GetScriptContext() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mScriptContext;
|
|
}
|
|
|
|
const nsCString&
|
|
Domain() const
|
|
{
|
|
return mLoadInfo.mDomain;
|
|
}
|
|
|
|
bool
|
|
IsFromWindow() const
|
|
{
|
|
return mLoadInfo.mFromWindow;
|
|
}
|
|
|
|
nsLoadFlags
|
|
GetLoadFlags() const
|
|
{
|
|
return mLoadInfo.mLoadFlags;
|
|
}
|
|
|
|
uint64_t
|
|
WindowID() const
|
|
{
|
|
return mLoadInfo.mWindowID;
|
|
}
|
|
|
|
uint64_t
|
|
ServiceWorkerID() const
|
|
{
|
|
return GetServiceWorkerDescriptor().Id();
|
|
}
|
|
|
|
const nsCString&
|
|
ServiceWorkerScope() const
|
|
{
|
|
return GetServiceWorkerDescriptor().Scope();
|
|
}
|
|
|
|
nsIURI*
|
|
GetBaseURI() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mBaseURI;
|
|
}
|
|
|
|
void
|
|
SetBaseURI(nsIURI* aBaseURI);
|
|
|
|
nsIURI*
|
|
GetResolvedScriptURI() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mResolvedScriptURI;
|
|
}
|
|
|
|
const nsString&
|
|
ServiceWorkerCacheName() const
|
|
{
|
|
MOZ_DIAGNOSTIC_ASSERT(IsServiceWorker());
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mServiceWorkerCacheName;
|
|
}
|
|
|
|
const ServiceWorkerDescriptor&
|
|
GetServiceWorkerDescriptor() const
|
|
{
|
|
MOZ_DIAGNOSTIC_ASSERT(IsServiceWorker());
|
|
MOZ_DIAGNOSTIC_ASSERT(mLoadInfo.mServiceWorkerDescriptor.isSome());
|
|
return mLoadInfo.mServiceWorkerDescriptor.ref();
|
|
}
|
|
|
|
const ServiceWorkerRegistrationDescriptor&
|
|
GetServiceWorkerRegistrationDescriptor() const
|
|
{
|
|
MOZ_DIAGNOSTIC_ASSERT(IsServiceWorker());
|
|
MOZ_DIAGNOSTIC_ASSERT(mLoadInfo.mServiceWorkerRegistrationDescriptor.isSome());
|
|
return mLoadInfo.mServiceWorkerRegistrationDescriptor.ref();
|
|
}
|
|
|
|
void
|
|
UpdateServiceWorkerState(ServiceWorkerState aState)
|
|
{
|
|
MOZ_DIAGNOSTIC_ASSERT(IsServiceWorker());
|
|
MOZ_DIAGNOSTIC_ASSERT(mLoadInfo.mServiceWorkerDescriptor.isSome());
|
|
return mLoadInfo.mServiceWorkerDescriptor.ref().SetState(aState);
|
|
}
|
|
|
|
const Maybe<ServiceWorkerDescriptor>&
|
|
GetParentController() const
|
|
{
|
|
return mLoadInfo.mParentController;
|
|
}
|
|
|
|
const ChannelInfo&
|
|
GetChannelInfo() const
|
|
{
|
|
return mLoadInfo.mChannelInfo;
|
|
}
|
|
|
|
void
|
|
SetChannelInfo(const ChannelInfo& aChannelInfo)
|
|
{
|
|
AssertIsOnMainThread();
|
|
MOZ_ASSERT(!mLoadInfo.mChannelInfo.IsInitialized());
|
|
MOZ_ASSERT(aChannelInfo.IsInitialized());
|
|
mLoadInfo.mChannelInfo = aChannelInfo;
|
|
}
|
|
|
|
void
|
|
InitChannelInfo(nsIChannel* aChannel)
|
|
{
|
|
mLoadInfo.mChannelInfo.InitFromChannel(aChannel);
|
|
}
|
|
|
|
void
|
|
InitChannelInfo(const ChannelInfo& aChannelInfo)
|
|
{
|
|
mLoadInfo.mChannelInfo = aChannelInfo;
|
|
}
|
|
|
|
nsIPrincipal*
|
|
GetPrincipal() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mPrincipal;
|
|
}
|
|
|
|
nsIPrincipal*
|
|
GetLoadingPrincipal() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mLoadingPrincipal;
|
|
}
|
|
|
|
const nsAString& Origin() const
|
|
{
|
|
return mLoadInfo.mOrigin;
|
|
}
|
|
|
|
nsILoadGroup*
|
|
GetLoadGroup() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mLoadGroup;
|
|
}
|
|
|
|
// This method allows the principal to be retrieved off the main thread.
|
|
// Principals are main-thread objects so the caller must ensure that all
|
|
// access occurs on the main thread.
|
|
nsIPrincipal*
|
|
GetPrincipalDontAssertMainThread() const
|
|
{
|
|
return mLoadInfo.mPrincipal;
|
|
}
|
|
|
|
bool
|
|
UsesSystemPrincipal() const
|
|
{
|
|
return mLoadInfo.mPrincipalIsSystem;
|
|
}
|
|
|
|
const mozilla::ipc::PrincipalInfo&
|
|
GetPrincipalInfo() const
|
|
{
|
|
return *mLoadInfo.mPrincipalInfo;
|
|
}
|
|
|
|
already_AddRefed<nsIChannel>
|
|
ForgetWorkerChannel()
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mChannel.forget();
|
|
}
|
|
|
|
nsPIDOMWindowInner*
|
|
GetWindow()
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mWindow;
|
|
}
|
|
|
|
nsIContentSecurityPolicy*
|
|
GetCSP() const
|
|
{
|
|
AssertIsOnMainThread();
|
|
return mLoadInfo.mCSP;
|
|
}
|
|
|
|
void
|
|
SetCSP(nsIContentSecurityPolicy* aCSP);
|
|
|
|
nsresult
|
|
SetCSPFromHeaderValues(const nsACString& aCSPHeaderValue,
|
|
const nsACString& aCSPReportOnlyHeaderValue);
|
|
|
|
void
|
|
SetReferrerPolicyFromHeaderValue(const nsACString& aReferrerPolicyHeaderValue);
|
|
|
|
net::ReferrerPolicy
|
|
GetReferrerPolicy() const
|
|
{
|
|
return mLoadInfo.mReferrerPolicy;
|
|
}
|
|
|
|
void
|
|
SetReferrerPolicy(net::ReferrerPolicy aReferrerPolicy)
|
|
{
|
|
mLoadInfo.mReferrerPolicy = aReferrerPolicy;
|
|
}
|
|
|
|
bool
|
|
IsEvalAllowed() const
|
|
{
|
|
return mLoadInfo.mEvalAllowed;
|
|
}
|
|
|
|
void
|
|
SetEvalAllowed(bool aEvalAllowed)
|
|
{
|
|
mLoadInfo.mEvalAllowed = aEvalAllowed;
|
|
}
|
|
|
|
bool
|
|
GetReportCSPViolations() const
|
|
{
|
|
return mLoadInfo.mReportCSPViolations;
|
|
}
|
|
|
|
void
|
|
SetReportCSPViolations(bool aReport)
|
|
{
|
|
mLoadInfo.mReportCSPViolations = aReport;
|
|
}
|
|
|
|
bool
|
|
XHRParamsAllowed() const
|
|
{
|
|
return mLoadInfo.mXHRParamsAllowed;
|
|
}
|
|
|
|
void
|
|
SetXHRParamsAllowed(bool aAllowed)
|
|
{
|
|
mLoadInfo.mXHRParamsAllowed = aAllowed;
|
|
}
|
|
|
|
bool
|
|
IsStorageAllowed() const
|
|
{
|
|
return mLoadInfo.mStorageAllowed;
|
|
}
|
|
|
|
const OriginAttributes&
|
|
GetOriginAttributes() const
|
|
{
|
|
return mLoadInfo.mOriginAttributes;
|
|
}
|
|
|
|
// Determine if the SW testing per-window flag is set by devtools
|
|
bool
|
|
ServiceWorkersTestingInWindow() const
|
|
{
|
|
return mLoadInfo.mServiceWorkersTestingInWindow;
|
|
}
|
|
|
|
already_AddRefed<nsIRunnable>
|
|
StealLoadFailedAsyncRunnable()
|
|
{
|
|
return mLoadInfo.mLoadFailedAsyncRunnable.forget();
|
|
}
|
|
|
|
// This is used to handle importScripts(). When the worker is first loaded
|
|
// and executed, it happens in a sync loop. At this point it sets
|
|
// mLoadingWorkerScript to true. importScripts() calls that occur during the
|
|
// execution run in nested sync loops and so this continues to return true,
|
|
// leading to these scripts being cached offline.
|
|
// mLoadingWorkerScript is set to false when the top level loop ends.
|
|
// importScripts() in function calls or event handlers are always fetched
|
|
// from the network.
|
|
bool
|
|
LoadScriptAsPartOfLoadingServiceWorkerScript()
|
|
{
|
|
MOZ_ASSERT(IsServiceWorker());
|
|
return mLoadingWorkerScript;
|
|
}
|
|
|
|
void
|
|
SetLoadingWorkerScript(bool aLoadingWorkerScript)
|
|
{
|
|
// any thread
|
|
MOZ_ASSERT(IsServiceWorker());
|
|
mLoadingWorkerScript = aLoadingWorkerScript;
|
|
}
|
|
|
|
void
|
|
QueueRunnable(nsIRunnable* aRunnable)
|
|
{
|
|
AssertIsOnParentThread();
|
|
mQueuedRunnables.AppendElement(aRunnable);
|
|
}
|
|
|
|
bool
|
|
RegisterSharedWorker(SharedWorker* aSharedWorker, MessagePort* aPort);
|
|
|
|
void
|
|
BroadcastErrorToSharedWorkers(JSContext* aCx,
|
|
const WorkerErrorReport* aReport,
|
|
bool aIsErrorEvent);
|
|
|
|
void
|
|
GetAllSharedWorkers(nsTArray<RefPtr<SharedWorker>>& aSharedWorkers);
|
|
|
|
void
|
|
CloseSharedWorkersForWindow(nsPIDOMWindowInner* aWindow);
|
|
|
|
void
|
|
CloseAllSharedWorkers();
|
|
|
|
void
|
|
FlushReportsToSharedWorkers(nsIConsoleReportCollector* aReporter);
|
|
|
|
// We can assume that an nsPIDOMWindow will be available for Freeze, Thaw
|
|
// as these are only used for globals going in and out of the bfcache.
|
|
//
|
|
// XXXbz: This is a bald-faced lie given the uses in RegisterSharedWorker and
|
|
// CloseSharedWorkersForWindow, which pass null for aWindow to Thaw and Freeze
|
|
// respectively. See bug 1251722.
|
|
bool
|
|
Freeze(nsPIDOMWindowInner* aWindow);
|
|
|
|
bool
|
|
Thaw(nsPIDOMWindowInner* aWindow);
|
|
|
|
void
|
|
EnableDebugger();
|
|
|
|
void
|
|
DisableDebugger();
|
|
|
|
already_AddRefed<WorkerRunnable>
|
|
MaybeWrapAsWorkerRunnable(already_AddRefed<nsIRunnable> aRunnable);
|
|
|
|
bool
|
|
ProxyReleaseMainThreadObjects();
|
|
|
|
void
|
|
GarbageCollect(bool aShrinking);
|
|
|
|
void
|
|
CycleCollect(bool aDummy);
|
|
|
|
nsresult
|
|
SetPrincipalOnMainThread(nsIPrincipal* aPrincipal, nsILoadGroup* aLoadGroup);
|
|
|
|
nsresult
|
|
SetPrincipalFromChannel(nsIChannel* aChannel);
|
|
|
|
bool
|
|
FinalChannelPrincipalIsValid(nsIChannel* aChannel);
|
|
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
|
bool
|
|
PrincipalURIMatchesScriptURL();
|
|
#endif
|
|
|
|
void
|
|
UpdateOverridenLoadGroup(nsILoadGroup* aBaseLoadGroup);
|
|
|
|
void
|
|
WorkerScriptLoaded();
|
|
|
|
nsIDocument* GetDocument() const;
|
|
|
|
void
|
|
MemoryPressure(bool aDummy);
|
|
|
|
void
|
|
UpdateContextOptions(const JS::ContextOptions& aContextOptions);
|
|
|
|
void
|
|
UpdateLanguages(const nsTArray<nsString>& aLanguages);
|
|
|
|
void
|
|
UpdateJSWorkerMemoryParameter(JSGCParamKey key, uint32_t value);
|
|
|
|
#ifdef JS_GC_ZEAL
|
|
void
|
|
UpdateGCZeal(uint8_t aGCZeal, uint32_t aFrequency);
|
|
#endif
|
|
|
|
void
|
|
OfflineStatusChangeEvent(bool aIsOffline);
|
|
|
|
nsresult
|
|
Dispatch(already_AddRefed<WorkerRunnable> aRunnable)
|
|
{
|
|
return DispatchPrivate(Move(aRunnable), nullptr);
|
|
}
|
|
|
|
nsresult
|
|
DispatchControlRunnable(already_AddRefed<WorkerControlRunnable> aWorkerControlRunnable);
|
|
|
|
nsresult
|
|
DispatchDebuggerRunnable(already_AddRefed<WorkerRunnable> aDebuggerRunnable);
|
|
|
|
#ifdef DEBUG
|
|
void
|
|
AssertIsOnParentThread() const;
|
|
|
|
void
|
|
AssertInnerWindowIsCorrect() const;
|
|
#else
|
|
void
|
|
AssertIsOnParentThread() const
|
|
{ }
|
|
|
|
void
|
|
AssertInnerWindowIsCorrect() const
|
|
{ }
|
|
#endif
|
|
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
|
bool
|
|
PrincipalIsValid() const;
|
|
#endif
|
|
|
|
private:
|
|
WorkerPrivate(WorkerPrivate* aParent,
|
|
const nsAString& aScriptURL, bool aIsChromeWorker,
|
|
WorkerType aWorkerType, const nsAString& aWorkerName,
|
|
const nsACString& aServiceWorkerScope,
|
|
WorkerLoadInfo& aLoadInfo);
|
|
|
|
~WorkerPrivate();
|
|
|
|
nsresult
|
|
DispatchPrivate(already_AddRefed<WorkerRunnable> aRunnable,
|
|
nsIEventTarget* aSyncLoopTarget);
|
|
|
|
bool
|
|
NotifyPrivate(WorkerStatus aStatus);
|
|
|
|
bool
|
|
TerminatePrivate()
|
|
{
|
|
return NotifyPrivate(Terminating);
|
|
}
|
|
|
|
bool
|
|
MayContinueRunning()
|
|
{
|
|
AssertIsOnWorkerThread();
|
|
|
|
WorkerStatus status;
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
status = mStatus;
|
|
}
|
|
|
|
if (status < Terminating) {
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void
|
|
CancelAllTimeouts();
|
|
|
|
enum class ProcessAllControlRunnablesResult
|
|
{
|
|
// We did not process anything.
|
|
Nothing,
|
|
// We did process something, states may have changed, but we can keep
|
|
// executing script.
|
|
MayContinue,
|
|
// We did process something, and should not continue executing script.
|
|
Abort
|
|
};
|
|
|
|
ProcessAllControlRunnablesResult
|
|
ProcessAllControlRunnables()
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
return ProcessAllControlRunnablesLocked();
|
|
}
|
|
|
|
ProcessAllControlRunnablesResult
|
|
ProcessAllControlRunnablesLocked();
|
|
|
|
void
|
|
EnableMemoryReporter();
|
|
|
|
void
|
|
DisableMemoryReporter();
|
|
|
|
void
|
|
WaitForWorkerEvents(PRIntervalTime interval = PR_INTERVAL_NO_TIMEOUT);
|
|
|
|
void
|
|
PostMessageToParentInternal(JSContext* aCx,
|
|
JS::Handle<JS::Value> aMessage,
|
|
const Sequence<JSObject*>& aTransferable,
|
|
ErrorResult& aRv);
|
|
|
|
// If the worker shutdown status is equal or greater then aFailStatus, this
|
|
// operation will fail and nullptr will be returned. See WorkerHolder.h for
|
|
// more information about the correct value to use.
|
|
already_AddRefed<nsIEventTarget>
|
|
CreateNewSyncLoop(WorkerStatus aFailStatus);
|
|
|
|
bool
|
|
RunCurrentSyncLoop();
|
|
|
|
bool
|
|
DestroySyncLoop(uint32_t aLoopIndex, nsIThreadInternal* aThread = nullptr);
|
|
|
|
void
|
|
InitializeGCTimers();
|
|
|
|
enum GCTimerMode
|
|
{
|
|
PeriodicTimer = 0,
|
|
IdleTimer,
|
|
NoTimer
|
|
};
|
|
|
|
void
|
|
SetGCTimerMode(GCTimerMode aMode);
|
|
|
|
void
|
|
ShutdownGCTimers();
|
|
|
|
bool
|
|
AddHolder(WorkerHolder* aHolder, WorkerStatus aFailStatus);
|
|
|
|
void
|
|
RemoveHolder(WorkerHolder* aHolder);
|
|
|
|
void
|
|
NotifyHolders(JSContext* aCx, WorkerStatus aStatus);
|
|
|
|
bool
|
|
HasActiveHolders()
|
|
{
|
|
return !(mChildWorkers.IsEmpty() && mTimeouts.IsEmpty() &&
|
|
mHolders.IsEmpty());
|
|
}
|
|
|
|
class EventTarget;
|
|
friend class EventTarget;
|
|
friend class mozilla::dom::WorkerHolder;
|
|
friend class AutoSyncLoopHolder;
|
|
|
|
struct TimeoutInfo;
|
|
|
|
class MemoryReporter;
|
|
friend class MemoryReporter;
|
|
|
|
friend class mozilla::dom::WorkerThread;
|
|
|
|
SharedMutex mMutex;
|
|
mozilla::CondVar mCondVar;
|
|
|
|
WorkerPrivate* mParent;
|
|
|
|
nsString mScriptURL;
|
|
|
|
// This is the worker name for shared workers and dedicated workers.
|
|
nsString mWorkerName;
|
|
|
|
WorkerType mWorkerType;
|
|
|
|
// The worker is owned by its thread, which is represented here. This is set
|
|
// in Constructor() and emptied by WorkerFinishedRunnable, and conditionally
|
|
// traversed by the cycle collector if the busy count is zero.
|
|
//
|
|
// There are 4 ways a worker can be terminated:
|
|
// 1. GC/CC - When the worker is in idle state (busycount == 0), it allows to
|
|
// traverse the 'hidden' mParentEventTargetRef pointer. This is the exposed
|
|
// Worker webidl object. Doing this, CC will be able to detect a cycle and
|
|
// Unlink is called. In Unlink, Worker calls Terminate().
|
|
// 2. Worker::Terminate() is called - the shutdown procedure starts
|
|
// immediately.
|
|
// 3. WorkerScope::Close() is called - Similar to point 2.
|
|
// 4. xpcom-shutdown notification - We call Kill().
|
|
RefPtr<Worker> mParentEventTargetRef;
|
|
RefPtr<WorkerPrivate> mSelfRef;
|
|
|
|
// The lifetime of these objects within LoadInfo is managed explicitly;
|
|
// they do not need to be cycle collected.
|
|
WorkerLoadInfo mLoadInfo;
|
|
LocationInfo mLocationInfo;
|
|
|
|
// Protected by mMutex.
|
|
workerinternals::JSSettings mJSSettings;
|
|
|
|
WorkerDebugger* mDebugger;
|
|
|
|
workerinternals::Queue<WorkerControlRunnable*, 4> mControlQueue;
|
|
workerinternals::Queue<WorkerRunnable*, 4> mDebuggerQueue;
|
|
|
|
// Touched on multiple threads, protected with mMutex.
|
|
JSContext* mJSContext;
|
|
RefPtr<WorkerThread> mThread;
|
|
PRThread* mPRThread;
|
|
|
|
// Things touched on worker thread only.
|
|
RefPtr<WorkerGlobalScope> mScope;
|
|
RefPtr<WorkerDebuggerGlobalScope> mDebuggerScope;
|
|
nsTArray<WorkerPrivate*> mChildWorkers;
|
|
nsTObserverArray<WorkerHolder*> mHolders;
|
|
nsTArray<nsAutoPtr<TimeoutInfo>> mTimeouts;
|
|
RefPtr<ThrottledEventQueue> mMainThreadThrottledEventQueue;
|
|
nsCOMPtr<nsIEventTarget> mMainThreadEventTarget;
|
|
RefPtr<WorkerEventTarget> mWorkerControlEventTarget;
|
|
RefPtr<WorkerEventTarget> mWorkerHybridEventTarget;
|
|
|
|
struct SyncLoopInfo
|
|
{
|
|
explicit SyncLoopInfo(EventTarget* aEventTarget);
|
|
|
|
RefPtr<EventTarget> mEventTarget;
|
|
bool mCompleted;
|
|
bool mResult;
|
|
#ifdef DEBUG
|
|
bool mHasRun;
|
|
#endif
|
|
};
|
|
|
|
// This is only modified on the worker thread, but in DEBUG builds
|
|
// AssertValidSyncLoop function iterates it on other threads. Therefore
|
|
// modifications are done with mMutex held *only* in DEBUG builds.
|
|
nsTArray<nsAutoPtr<SyncLoopInfo>> mSyncLoopStack;
|
|
|
|
nsCOMPtr<nsITimer> mTimer;
|
|
nsCOMPtr<nsITimerCallback> mTimerRunnable;
|
|
|
|
nsCOMPtr<nsITimer> mGCTimer;
|
|
|
|
RefPtr<MemoryReporter> mMemoryReporter;
|
|
|
|
// fired on the main thread if the worker script fails to load
|
|
nsCOMPtr<nsIRunnable> mLoadFailedRunnable;
|
|
|
|
RefPtr<PerformanceStorage> mPerformanceStorage;
|
|
|
|
// Only used for top level workers.
|
|
nsTArray<nsCOMPtr<nsIRunnable>> mQueuedRunnables;
|
|
|
|
// Protected by mMutex.
|
|
nsTArray<RefPtr<WorkerRunnable>> mPreStartRunnables;
|
|
|
|
// Only touched on the parent thread (currently this is always the main
|
|
// thread as SharedWorkers are always top-level).
|
|
nsTArray<RefPtr<SharedWorker>> mSharedWorkers;
|
|
|
|
JS::UniqueChars mDefaultLocale; // nulled during worker JSContext init
|
|
TimeStamp mKillTime;
|
|
WorkerStatus mParentStatus;
|
|
WorkerStatus mStatus;
|
|
UniquePtr<ClientSource> mClientSource;
|
|
|
|
// This is touched on parent thread only, but it can be read on a different
|
|
// thread before crashing because hanging.
|
|
Atomic<uint64_t> mBusyCount;
|
|
|
|
Atomic<bool> mLoadingWorkerScript;
|
|
|
|
TimeStamp mCreationTimeStamp;
|
|
DOMHighResTimeStamp mCreationTimeHighRes;
|
|
|
|
// Things touched on worker thread only.
|
|
uint32_t mNumHoldersPreventingShutdownStart;
|
|
uint32_t mDebuggerEventLoopLevel;
|
|
|
|
uint32_t mErrorHandlerRecursionCount;
|
|
uint32_t mNextTimeoutId;
|
|
|
|
// SharedWorkers may have multiple windows paused, so this must be
|
|
// a count instead of just a boolean.
|
|
uint32_t mParentWindowPausedDepth;
|
|
|
|
bool mFrozen;
|
|
bool mTimerRunning;
|
|
bool mRunningExpiredTimeouts;
|
|
bool mPendingEventQueueClearing;
|
|
bool mCancelAllPendingRunnables;
|
|
bool mPeriodicGCTimerRunning;
|
|
bool mIdleGCTimerRunning;
|
|
bool mWorkerScriptExecutedSuccessfully;
|
|
bool mFetchHandlerWasAdded;
|
|
bool mOnLine;
|
|
bool mMainThreadObjectsForgotten;
|
|
bool mIsChromeWorker;
|
|
bool mParentFrozen;
|
|
|
|
// mIsSecureContext is set once in our constructor; after that it can be read
|
|
// from various threads. We could make this const if we were OK with setting
|
|
// it in the initializer list via calling some function that takes all sorts
|
|
// of state (loadinfo, worker type, parent).
|
|
//
|
|
// It's a bit unfortunate that we have to have an out-of-band boolean for
|
|
// this, but we need access to this state from the parent thread, and we can't
|
|
// use our global object's secure state there.
|
|
bool mIsSecureContext;
|
|
|
|
bool mDebuggerRegistered;
|
|
};
|
|
|
|
class AutoSyncLoopHolder
|
|
{
|
|
WorkerPrivate* mWorkerPrivate;
|
|
nsCOMPtr<nsIEventTarget> mTarget;
|
|
uint32_t mIndex;
|
|
|
|
public:
|
|
// See CreateNewSyncLoop() for more information about the correct value to use
|
|
// for aFailStatus.
|
|
AutoSyncLoopHolder(WorkerPrivate* aWorkerPrivate, WorkerStatus aFailStatus)
|
|
: mWorkerPrivate(aWorkerPrivate)
|
|
, mTarget(aWorkerPrivate->CreateNewSyncLoop(aFailStatus))
|
|
, mIndex(aWorkerPrivate->mSyncLoopStack.Length() - 1)
|
|
{
|
|
aWorkerPrivate->AssertIsOnWorkerThread();
|
|
}
|
|
|
|
~AutoSyncLoopHolder()
|
|
{
|
|
if (mWorkerPrivate && mTarget) {
|
|
mWorkerPrivate->AssertIsOnWorkerThread();
|
|
mWorkerPrivate->StopSyncLoop(mTarget, false);
|
|
mWorkerPrivate->DestroySyncLoop(mIndex);
|
|
}
|
|
}
|
|
|
|
bool
|
|
Run()
|
|
{
|
|
WorkerPrivate* workerPrivate = mWorkerPrivate;
|
|
mWorkerPrivate = nullptr;
|
|
|
|
workerPrivate->AssertIsOnWorkerThread();
|
|
|
|
return workerPrivate->RunCurrentSyncLoop();
|
|
}
|
|
|
|
nsIEventTarget*
|
|
GetEventTarget() const
|
|
{
|
|
// This can be null if CreateNewSyncLoop() fails.
|
|
return mTarget;
|
|
}
|
|
};
|
|
|
|
} // dom namespace
|
|
} // mozilla namespace
|
|
|
|
#endif /* mozilla_dom_workers_workerprivate_h__ */
|