mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-25 22:01:30 +00:00
cdd2029b79
Unlike WorkletPrincipal, a WorkerPrincipal had been a simple static object shared by all Workers. We never needed to consult it about an individual Worker before. Now we do. So we cut it over from a static object to individual objects for each Worker. We have an off main thread access problem for the Principal however, WorkerPrivate has a method UsesSystemPrincipal that returns a bool that was initialized from the Principal on the main thread. We copy that pattern and add a UsesAddonOrExpandedAddonPrincipal method that will be called by the isSystemOrAddonPrincipal method we must implement so we can inheirt from JSPrincipal. Differential Revision: https://phabricator.services.mozilla.com/D47476 --HG-- extra : moz-landing-system : lando
185 lines
5.7 KiB
C++
185 lines
5.7 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef mozilla_dom_workers_WorkerLoadInfo_h
|
|
#define mozilla_dom_workers_WorkerLoadInfo_h
|
|
|
|
#include "mozilla/StorageAccess.h"
|
|
#include "mozilla/dom/ChannelInfo.h"
|
|
#include "mozilla/dom/ServiceWorkerRegistrationDescriptor.h"
|
|
#include "mozilla/dom/WorkerCommon.h"
|
|
|
|
#include "nsIInterfaceRequestor.h"
|
|
#include "nsILoadContext.h"
|
|
#include "nsIRequest.h"
|
|
#include "nsISupportsImpl.h"
|
|
#include "nsIWeakReferenceUtils.h"
|
|
|
|
class nsIChannel;
|
|
class nsIContentSecurityPolicy;
|
|
class nsICookieSettings;
|
|
class nsILoadGroup;
|
|
class nsIPrincipal;
|
|
class nsIRunnable;
|
|
class nsIScriptContext;
|
|
class nsIBrowserChild;
|
|
class nsIURI;
|
|
class nsPIDOMWindowInner;
|
|
|
|
namespace mozilla {
|
|
|
|
namespace ipc {
|
|
class PrincipalInfo;
|
|
class CSPInfo;
|
|
} // namespace ipc
|
|
|
|
namespace dom {
|
|
|
|
class WorkerPrivate;
|
|
|
|
struct WorkerLoadInfoData {
|
|
// All of these should be released in
|
|
// WorkerPrivateParent::ForgetMainThreadObjects.
|
|
nsCOMPtr<nsIURI> mBaseURI;
|
|
nsCOMPtr<nsIURI> mResolvedScriptURI;
|
|
|
|
// This is the principal of the global (parent worker or a window) loading
|
|
// the worker. It can be null if we are executing a ServiceWorker, otherwise,
|
|
// except for data: URL, it must subsumes the worker principal.
|
|
// If we load a data: URL, mPrincipal will be a null principal.
|
|
nsCOMPtr<nsIPrincipal> mLoadingPrincipal;
|
|
nsCOMPtr<nsIPrincipal> mPrincipal;
|
|
nsCOMPtr<nsIPrincipal> mStoragePrincipal;
|
|
|
|
// Taken from the parent context.
|
|
nsCOMPtr<nsICookieSettings> mCookieSettings;
|
|
|
|
nsCOMPtr<nsIScriptContext> mScriptContext;
|
|
nsCOMPtr<nsPIDOMWindowInner> mWindow;
|
|
nsCOMPtr<nsIContentSecurityPolicy> mCSP;
|
|
// Thread boundaries require us to not only store a CSP object, but also a
|
|
// serialized version of the CSP. Reason being: Serializing a CSP to a CSPInfo
|
|
// needs to happen on the main thread, but storing the CSPInfo needs to happen
|
|
// on the worker thread. We move the CSPInfo into the Client within
|
|
// ScriptLoader::PreRun().
|
|
nsAutoPtr<mozilla::ipc::CSPInfo> mCSPInfo;
|
|
|
|
nsCOMPtr<nsIChannel> mChannel;
|
|
nsCOMPtr<nsILoadGroup> mLoadGroup;
|
|
|
|
class InterfaceRequestor final : public nsIInterfaceRequestor {
|
|
NS_DECL_ISUPPORTS
|
|
|
|
public:
|
|
InterfaceRequestor(nsIPrincipal* aPrincipal, nsILoadGroup* aLoadGroup);
|
|
void MaybeAddBrowserChild(nsILoadGroup* aLoadGroup);
|
|
NS_IMETHOD GetInterface(const nsIID& aIID, void** aSink) override;
|
|
|
|
void SetOuterRequestor(nsIInterfaceRequestor* aOuterRequestor) {
|
|
MOZ_ASSERT(!mOuterRequestor);
|
|
MOZ_ASSERT(aOuterRequestor);
|
|
mOuterRequestor = aOuterRequestor;
|
|
}
|
|
|
|
private:
|
|
~InterfaceRequestor() {}
|
|
|
|
already_AddRefed<nsIBrowserChild> GetAnyLiveBrowserChild();
|
|
|
|
nsCOMPtr<nsILoadContext> mLoadContext;
|
|
nsCOMPtr<nsIInterfaceRequestor> mOuterRequestor;
|
|
|
|
// Array of weak references to nsIBrowserChild. We do not want to keep
|
|
// BrowserChild actors alive for long after their ActorDestroy() methods are
|
|
// called.
|
|
nsTArray<nsWeakPtr> mBrowserChildList;
|
|
};
|
|
|
|
// Only set if we have a custom overriden load group
|
|
RefPtr<InterfaceRequestor> mInterfaceRequestor;
|
|
|
|
nsAutoPtr<mozilla::ipc::PrincipalInfo> mPrincipalInfo;
|
|
nsAutoPtr<mozilla::ipc::PrincipalInfo> mStoragePrincipalInfo;
|
|
nsCString mDomain;
|
|
nsString mOrigin; // Derived from mPrincipal; can be used on worker thread.
|
|
|
|
nsString mServiceWorkerCacheName;
|
|
Maybe<ServiceWorkerDescriptor> mServiceWorkerDescriptor;
|
|
Maybe<ServiceWorkerRegistrationDescriptor>
|
|
mServiceWorkerRegistrationDescriptor;
|
|
|
|
Maybe<ServiceWorkerDescriptor> mParentController;
|
|
|
|
nsID mAgentClusterId;
|
|
|
|
ChannelInfo mChannelInfo;
|
|
nsLoadFlags mLoadFlags;
|
|
|
|
uint64_t mWindowID;
|
|
|
|
nsCOMPtr<nsIReferrerInfo> mReferrerInfo;
|
|
bool mFromWindow;
|
|
bool mEvalAllowed;
|
|
bool mReportCSPViolations;
|
|
bool mXHRParamsAllowed;
|
|
bool mPrincipalIsSystem;
|
|
bool mPrincipalIsAddonOrExpandedAddon;
|
|
bool mWatchedByDevtools;
|
|
StorageAccess mStorageAccess;
|
|
bool mFirstPartyStorageAccessGranted;
|
|
bool mServiceWorkersTestingInWindow;
|
|
OriginAttributes mOriginAttributes;
|
|
|
|
enum {
|
|
eNotSet,
|
|
eInsecureContext,
|
|
eSecureContext,
|
|
} mSecureContext;
|
|
|
|
WorkerLoadInfoData();
|
|
WorkerLoadInfoData(WorkerLoadInfoData&& aOther) = default;
|
|
|
|
WorkerLoadInfoData& operator=(WorkerLoadInfoData&& aOther) = default;
|
|
};
|
|
|
|
struct WorkerLoadInfo : WorkerLoadInfoData {
|
|
WorkerLoadInfo();
|
|
WorkerLoadInfo(WorkerLoadInfo&& aOther) noexcept;
|
|
~WorkerLoadInfo();
|
|
|
|
WorkerLoadInfo& operator=(WorkerLoadInfo&& aOther) = default;
|
|
|
|
nsresult SetPrincipalsAndCSPOnMainThread(nsIPrincipal* aPrincipal,
|
|
nsIPrincipal* aStoragePrincipal,
|
|
nsILoadGroup* aLoadGroup,
|
|
nsIContentSecurityPolicy* aCSP);
|
|
|
|
nsresult GetPrincipalsAndLoadGroupFromChannel(
|
|
nsIChannel* aChannel, nsIPrincipal** aPrincipalOut,
|
|
nsIPrincipal** aStoragePrincipalOut, nsILoadGroup** aLoadGroupOut);
|
|
|
|
nsresult SetPrincipalsAndCSPFromChannel(nsIChannel* aChannel);
|
|
|
|
bool FinalChannelPrincipalIsValid(nsIChannel* aChannel);
|
|
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
|
bool PrincipalIsValid() const;
|
|
|
|
bool PrincipalURIMatchesScriptURL();
|
|
#endif
|
|
|
|
bool ProxyReleaseMainThreadObjects(WorkerPrivate* aWorkerPrivate);
|
|
|
|
bool ProxyReleaseMainThreadObjects(
|
|
WorkerPrivate* aWorkerPrivate,
|
|
nsCOMPtr<nsILoadGroup>& aLoadGroupToCancel);
|
|
};
|
|
|
|
} // namespace dom
|
|
} // namespace mozilla
|
|
|
|
#endif // mozilla_dom_workers_WorkerLoadInfo_h
|