2014-07-09 12:37:58 +04:00
|
|
|
/* jshint moz: true, esnext: true */
|
2013-03-29 07:49:41 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
"use strict";
|
|
|
|
|
2015-04-11 06:19:28 +03:00
|
|
|
// Don't modify this, instead set dom.push.debug.
|
2015-09-15 21:19:45 +03:00
|
|
|
var gDebuggingEnabled = false;
|
2013-09-17 03:55:26 +04:00
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
function debug(s) {
|
2015-06-03 15:05:00 +03:00
|
|
|
if (gDebuggingEnabled) {
|
2013-09-17 03:55:26 +04:00
|
|
|
dump("-*- PushService.jsm: " + s + "\n");
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
const Cc = Components.classes;
|
|
|
|
const Ci = Components.interfaces;
|
|
|
|
const Cu = Components.utils;
|
2013-03-29 07:49:41 +04:00
|
|
|
const Cr = Components.results;
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
const {PushDB} = Cu.import("resource://gre/modules/PushDB.jsm");
|
2013-03-29 07:49:41 +04:00
|
|
|
Cu.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
|
|
Cu.import("resource://gre/modules/Services.jsm");
|
|
|
|
Cu.import("resource://gre/modules/Timer.jsm");
|
2013-04-15 23:45:37 +04:00
|
|
|
Cu.import("resource://gre/modules/Preferences.jsm");
|
2014-03-18 18:16:02 +04:00
|
|
|
Cu.import("resource://gre/modules/Promise.jsm");
|
2013-06-13 04:26:44 +04:00
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
const {PushServiceWebSocket} = Cu.import("resource://gre/modules/PushServiceWebSocket.jsm");
|
2015-06-03 15:06:00 +03:00
|
|
|
const {PushServiceHttp2} = Cu.import("resource://gre/modules/PushServiceHttp2.jsm");
|
2015-09-17 15:08:50 +03:00
|
|
|
const {PushCrypto} = Cu.import("resource://gre/modules/PushCrypto.jsm");
|
2014-06-09 08:32:00 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
// Currently supported protocols: WebSocket.
|
2015-06-03 15:06:00 +03:00
|
|
|
const CONNECTION_PROTOCOLS = [PushServiceWebSocket, PushServiceHttp2];
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2013-06-13 04:26:44 +04:00
|
|
|
XPCOMUtils.defineLazyModuleGetter(this, "AlarmService",
|
|
|
|
"resource://gre/modules/AlarmService.jsm");
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2013-05-02 09:15:18 +04:00
|
|
|
this.EXPORTED_SYMBOLS = ["PushService"];
|
|
|
|
|
2015-04-11 06:19:28 +03:00
|
|
|
const prefs = new Preferences("dom.push.");
|
2013-09-17 03:55:26 +04:00
|
|
|
// Set debug first so that all debugging actually works.
|
|
|
|
gDebuggingEnabled = prefs.get("debug");
|
2013-04-09 22:02:00 +04:00
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
const kCHILD_PROCESS_MESSAGES = ["Push:Register", "Push:Unregister",
|
Bug 1190661 - Send push only to child processes when in e10s mode. r=smaug
Earlier, the in-process child process message manager and any content process
child process message managers received the push event. This is because
broadcastAsyncMessage is used, but on e10s we want ServiceWorkers to run in the
child process, so the push should only be dispatched to it. This patch
introduces a list of child process listeners in the PushService (running on the
parent). PushServiceChildPreload sends a message to the PushService iff it is
running in a child process. If there are non-zero child listeners, the
PushService will send a message to all of them, otherwise it will fall back to
broadcastAsyncMessage.
We currently do not add support for precise targeting of child processes. This
is because until Bug 1182117 is fixed, all child process ServiceWorkerManagers
maintain all the service worker registrations internally. Yes this is a bug,
but that is the way things are right now. This makes it impossible to
distinguish which child should handle the notification for a given origin.
Considering we don't ship multi-process e10s, I would like to land this right
now.
When Bug 1182117 is fixed, we can remove this code since the
ServiceWorkerManager will manage registrations in the parent, and it will know
which child process is running which ServiceWorker.
--HG--
extra : commitid : Dgfkg4LqLPK
extra : rebase_source : e64a4f1c757b05fe2939a338c1ad8d14f4015a90
2015-07-31 06:00:21 +03:00
|
|
|
"Push:Registration", "Push:RegisterEventNotificationListener",
|
2015-09-19 04:15:23 +03:00
|
|
|
"child-process-shutdown"];
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
const PUSH_SERVICE_UNINIT = 0;
|
|
|
|
const PUSH_SERVICE_INIT = 1; // No serverURI
|
|
|
|
const PUSH_SERVICE_ACTIVATING = 2;//activating db
|
|
|
|
const PUSH_SERVICE_CONNECTION_DISABLE = 3;
|
|
|
|
const PUSH_SERVICE_ACTIVE_OFFLINE = 4;
|
|
|
|
const PUSH_SERVICE_RUNNING = 5;
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-09-16 20:28:17 +03:00
|
|
|
// Telemetry failure to send push notification to Service Worker reasons.
|
|
|
|
// Key not found in local database.
|
|
|
|
const kDROP_NOTIFICATION_REASON_KEY_NOT_FOUND = 0;
|
|
|
|
// User cleared history.
|
|
|
|
const kDROP_NOTIFICATION_REASON_NO_HISTORY = 1;
|
|
|
|
// Version of message received not newer than previous one.
|
|
|
|
const kDROP_NOTIFICATION_REASON_NO_VERSION_INCREMENT = 2;
|
|
|
|
// Subscription has expired.
|
|
|
|
const kDROP_NOTIFICATION_REASON_EXPIRED = 3;
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
/**
|
|
|
|
* State is change only in couple of functions:
|
|
|
|
* init - change state to PUSH_SERVICE_INIT if state was PUSH_SERVICE_UNINIT
|
|
|
|
* changeServerURL - change state to PUSH_SERVICE_ACTIVATING if serverURL
|
|
|
|
* present or PUSH_SERVICE_INIT if not present.
|
|
|
|
* changeStateConnectionEnabledEvent - it is call on pref change or during
|
|
|
|
* the service activation and it can
|
|
|
|
* change state to
|
|
|
|
* PUSH_SERVICE_CONNECTION_DISABLE
|
|
|
|
* changeStateOfflineEvent - it is called when offline state changes or during
|
|
|
|
* the service activation and it change state to
|
|
|
|
* PUSH_SERVICE_ACTIVE_OFFLINE or
|
|
|
|
* PUSH_SERVICE_RUNNING.
|
|
|
|
* uninit - change state to PUSH_SERVICE_UNINIT.
|
|
|
|
**/
|
|
|
|
|
|
|
|
// This is for starting and stopping service.
|
|
|
|
const STARTING_SERVICE_EVENT = 0;
|
|
|
|
const CHANGING_SERVICE_EVENT = 1;
|
|
|
|
const STOPPING_SERVICE_EVENT = 2;
|
|
|
|
const UNINIT_EVENT = 3;
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2013-05-02 09:15:18 +04:00
|
|
|
/**
|
2015-06-03 15:05:00 +03:00
|
|
|
* The implementation of the push system. It uses WebSockets
|
|
|
|
* (PushServiceWebSocket) to communicate with the server and PushDB (IndexedDB)
|
|
|
|
* for persistence.
|
2013-05-02 09:15:18 +04:00
|
|
|
*/
|
|
|
|
this.PushService = {
|
2015-06-03 15:04:00 +03:00
|
|
|
_service: null,
|
2015-06-03 15:05:00 +03:00
|
|
|
_state: PUSH_SERVICE_UNINIT,
|
|
|
|
_db: null,
|
|
|
|
_options: null,
|
2015-06-26 00:52:57 +03:00
|
|
|
_alarmID: null,
|
2015-06-03 15:05:00 +03:00
|
|
|
|
Bug 1190661 - Send push only to child processes when in e10s mode. r=smaug
Earlier, the in-process child process message manager and any content process
child process message managers received the push event. This is because
broadcastAsyncMessage is used, but on e10s we want ServiceWorkers to run in the
child process, so the push should only be dispatched to it. This patch
introduces a list of child process listeners in the PushService (running on the
parent). PushServiceChildPreload sends a message to the PushService iff it is
running in a child process. If there are non-zero child listeners, the
PushService will send a message to all of them, otherwise it will fall back to
broadcastAsyncMessage.
We currently do not add support for precise targeting of child processes. This
is because until Bug 1182117 is fixed, all child process ServiceWorkerManagers
maintain all the service worker registrations internally. Yes this is a bug,
but that is the way things are right now. This makes it impossible to
distinguish which child should handle the notification for a given origin.
Considering we don't ship multi-process e10s, I would like to land this right
now.
When Bug 1182117 is fixed, we can remove this code since the
ServiceWorkerManager will manage registrations in the parent, and it will know
which child process is running which ServiceWorker.
--HG--
extra : commitid : Dgfkg4LqLPK
extra : rebase_source : e64a4f1c757b05fe2939a338c1ad8d14f4015a90
2015-07-31 06:00:21 +03:00
|
|
|
_childListeners: [],
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
// When serverURI changes (this is used for testing), db is cleaned up and a
|
|
|
|
// a new db is started. This events must be sequential.
|
2015-10-20 02:33:00 +03:00
|
|
|
_stateChangeProcessQueue: null,
|
|
|
|
_stateChangeProcessEnqueue: function(op) {
|
|
|
|
if (!this._stateChangeProcessQueue) {
|
|
|
|
this._stateChangeProcessQueue = Promise.resolve();
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessQueue = this._stateChangeProcessQueue
|
2015-06-03 15:05:00 +03:00
|
|
|
.then(op)
|
|
|
|
.catch(_ => {});
|
|
|
|
},
|
|
|
|
|
|
|
|
// Pending request. If a worker try to register for the same scope again, do
|
|
|
|
// not send a new registration request. Therefore we need queue of pending
|
|
|
|
// register requests. This is the list of scopes which pending registration.
|
|
|
|
_pendingRegisterRequest: {},
|
|
|
|
_notifyActivated: null,
|
|
|
|
_activated: null,
|
|
|
|
_checkActivated: function() {
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVATING) {
|
|
|
|
return Promise.reject({state: 0, error: "Service not active"});
|
|
|
|
} else if (this._state > PUSH_SERVICE_ACTIVATING) {
|
|
|
|
return Promise.resolve();
|
|
|
|
} else {
|
|
|
|
return (this._activated) ? this._activated :
|
|
|
|
this._activated = new Promise((res, rej) =>
|
|
|
|
this._notifyActivated = {resolve: res,
|
|
|
|
reject: rej});
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-06-24 23:34:54 +03:00
|
|
|
_makePendingKey: function(aPageRecord) {
|
|
|
|
return aPageRecord.scope + "|" + aPageRecord.originAttributes;
|
|
|
|
},
|
|
|
|
|
|
|
|
_lookupOrPutPendingRequest: function(aPageRecord) {
|
|
|
|
let key = this._makePendingKey(aPageRecord);
|
|
|
|
if (this._pendingRegisterRequest[key]) {
|
|
|
|
return this._pendingRegisterRequest[key];
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._pendingRegisterRequest[key] = this._registerWithServer(aPageRecord);
|
|
|
|
},
|
|
|
|
|
|
|
|
_deletePendingRequest: function(aPageRecord) {
|
|
|
|
let key = this._makePendingKey(aPageRecord);
|
|
|
|
if (this._pendingRegisterRequest[key]) {
|
|
|
|
delete this._pendingRegisterRequest[key];
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
_setState: function(aNewState) {
|
|
|
|
debug("new state: " + aNewState + " old state: " + this._state);
|
|
|
|
|
|
|
|
if (this._state == aNewState) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this._state == PUSH_SERVICE_ACTIVATING) {
|
|
|
|
// It is not important what is the new state as soon as we leave
|
|
|
|
// PUSH_SERVICE_ACTIVATING
|
|
|
|
this._state = aNewState;
|
|
|
|
if (this._notifyActivated) {
|
|
|
|
if (aNewState < PUSH_SERVICE_ACTIVATING) {
|
|
|
|
this._notifyActivated.reject({state: 0, error: "Service not active"});
|
|
|
|
} else {
|
|
|
|
this._notifyActivated.resolve();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
this._notifyActivated = null;
|
|
|
|
this._activated = null;
|
|
|
|
}
|
|
|
|
this._state = aNewState;
|
|
|
|
},
|
|
|
|
|
|
|
|
_changeStateOfflineEvent: function(offline, calledFromConnEnabledEvent) {
|
|
|
|
debug("changeStateOfflineEvent: " + offline);
|
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVE_OFFLINE &&
|
|
|
|
this._state != PUSH_SERVICE_ACTIVATING &&
|
|
|
|
!calledFromConnEnabledEvent) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (offline) {
|
|
|
|
if (this._state == PUSH_SERVICE_RUNNING) {
|
|
|
|
this._service.disconnect();
|
|
|
|
}
|
|
|
|
this._setState(PUSH_SERVICE_ACTIVE_OFFLINE);
|
|
|
|
} else {
|
|
|
|
if (this._state == PUSH_SERVICE_RUNNING) {
|
|
|
|
// PushService was not in the offline state, but got notification to
|
|
|
|
// go online (a offline notification has not been sent).
|
|
|
|
// Disconnect first.
|
|
|
|
this._service.disconnect();
|
|
|
|
}
|
2015-06-26 00:52:57 +03:00
|
|
|
this._db.getAllUnexpired()
|
|
|
|
.then(records => {
|
|
|
|
if (records.length > 0) {
|
2015-06-03 15:05:00 +03:00
|
|
|
// if there are request waiting
|
2015-06-26 00:52:57 +03:00
|
|
|
this._service.connect(records);
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
this._setState(PUSH_SERVICE_RUNNING);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_changeStateConnectionEnabledEvent: function(enabled) {
|
|
|
|
debug("changeStateConnectionEnabledEvent: " + enabled);
|
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_CONNECTION_DISABLE &&
|
|
|
|
this._state != PUSH_SERVICE_ACTIVATING) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (enabled) {
|
|
|
|
this._changeStateOfflineEvent(Services.io.offline, true);
|
|
|
|
} else {
|
|
|
|
if (this._state == PUSH_SERVICE_RUNNING) {
|
|
|
|
this._service.disconnect();
|
|
|
|
}
|
|
|
|
this._setState(PUSH_SERVICE_CONNECTION_DISABLE);
|
|
|
|
}
|
|
|
|
},
|
2015-06-03 15:04:00 +03:00
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
observe: function observe(aSubject, aTopic, aData) {
|
|
|
|
switch (aTopic) {
|
2013-06-13 04:26:44 +04:00
|
|
|
/*
|
2015-06-03 15:05:00 +03:00
|
|
|
* We need to call uninit() on shutdown to clean up things that modules
|
|
|
|
* aren't very good at automatically cleaning up, so we don't get shutdown
|
|
|
|
* leaks on browser shutdown.
|
2013-06-13 04:26:44 +04:00
|
|
|
*/
|
|
|
|
case "xpcom-shutdown":
|
|
|
|
this.uninit();
|
2015-04-21 21:10:50 +03:00
|
|
|
break;
|
2013-06-13 01:47:42 +04:00
|
|
|
case "network-active-changed": /* On B2G. */
|
|
|
|
case "network:offline-status-changed": /* On desktop. */
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeStateOfflineEvent(aData === "offline", false)
|
|
|
|
);
|
2013-03-29 07:49:41 +04:00
|
|
|
break;
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
case "nsPref:changed":
|
2015-04-11 06:19:28 +03:00
|
|
|
if (aData == "dom.push.serverURL") {
|
|
|
|
debug("dom.push.serverURL changed! websocket. new value " +
|
2013-04-09 22:02:00 +04:00
|
|
|
prefs.get("serverURL"));
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
2015-06-03 15:05:00 +03:00
|
|
|
this._changeServerURL(prefs.get("serverURL"),
|
|
|
|
CHANGING_SERVICE_EVENT)
|
|
|
|
);
|
|
|
|
|
2015-04-11 06:19:28 +03:00
|
|
|
} else if (aData == "dom.push.connection.enabled") {
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled"))
|
|
|
|
);
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2015-04-11 06:19:28 +03:00
|
|
|
} else if (aData == "dom.push.debug") {
|
2013-09-17 03:55:26 +04:00
|
|
|
gDebuggingEnabled = prefs.get("debug");
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
break;
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
case "idle-daily":
|
|
|
|
this._dropExpiredRegistrations();
|
|
|
|
break;
|
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
case "perm-changed":
|
|
|
|
this._onPermissionChange(aSubject, aData).catch(error => {
|
|
|
|
debug("onPermissionChange: Error updating registrations: " +
|
|
|
|
error);
|
|
|
|
})
|
|
|
|
break;
|
|
|
|
|
2013-09-20 22:17:40 +04:00
|
|
|
case "webapps-clear-data":
|
|
|
|
debug("webapps-clear-data");
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
let data = aSubject
|
|
|
|
.QueryInterface(Ci.mozIApplicationClearPrivateDataParams);
|
2013-09-20 22:17:40 +04:00
|
|
|
if (!data) {
|
2015-06-03 15:05:00 +03:00
|
|
|
debug("webapps-clear-data: Failed to get information about " +
|
|
|
|
"application");
|
2013-07-24 17:03:25 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-06-24 23:34:54 +03:00
|
|
|
var originAttributes =
|
|
|
|
ChromeUtils.originAttributesToSuffix({ appId: data.appId,
|
|
|
|
inBrowser: data.browserOnly });
|
|
|
|
this._db.getAllByOriginAttributes(originAttributes)
|
2015-10-06 18:14:25 +03:00
|
|
|
.then(records => Promise.all(records.map(record =>
|
|
|
|
this._db.delete(record.keyID).then(
|
|
|
|
_ => this._unregisterIfConnected(record),
|
|
|
|
err => {
|
|
|
|
debug("webapps-clear-data: " + record.scope +
|
|
|
|
" Could not delete entry " + record.channelID);
|
|
|
|
|
|
|
|
return this._unregisterIfConnected(record);
|
|
|
|
})
|
|
|
|
)
|
|
|
|
));
|
2013-04-05 00:42:35 +04:00
|
|
|
|
2013-05-02 09:15:18 +04:00
|
|
|
break;
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
_unregisterIfConnected: function(record) {
|
|
|
|
if (this._service.isConnected()) {
|
|
|
|
// courtesy, but don't establish a connection
|
|
|
|
// just for it
|
|
|
|
debug("Had a connection, so telling the server");
|
|
|
|
return this._sendUnregister({channelID: record.channelID})
|
|
|
|
.catch(function(e) {
|
|
|
|
debug("Unregister errored " + e);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
// utility function used to add/remove observers in startObservers() and
|
|
|
|
// stopObservers()
|
2015-06-03 15:04:00 +03:00
|
|
|
getNetworkStateChangeEventName: function() {
|
|
|
|
try {
|
|
|
|
Cc["@mozilla.org/network/manager;1"].getService(Ci.nsINetworkManager);
|
|
|
|
return "network-active-changed";
|
|
|
|
} catch (e) {
|
|
|
|
return "network:offline-status-changed";
|
2013-09-25 17:20:06 +04:00
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
_findService: function(serverURI) {
|
|
|
|
var uri;
|
|
|
|
var service;
|
|
|
|
if (serverURI) {
|
|
|
|
for (let connProtocol of CONNECTION_PROTOCOLS) {
|
|
|
|
uri = connProtocol.checkServerURI(serverURI);
|
|
|
|
if (uri) {
|
|
|
|
service = connProtocol;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return [service, uri];
|
|
|
|
},
|
|
|
|
|
|
|
|
_changeServerURL: function(serverURI, event) {
|
|
|
|
debug("changeServerURL");
|
|
|
|
|
|
|
|
switch(event) {
|
|
|
|
case UNINIT_EVENT:
|
|
|
|
return this._stopService(event);
|
|
|
|
|
|
|
|
case STARTING_SERVICE_EVENT:
|
|
|
|
{
|
|
|
|
let [service, uri] = this._findService(serverURI);
|
|
|
|
if (!service) {
|
|
|
|
this._setState(PUSH_SERVICE_INIT);
|
|
|
|
return Promise.resolve();
|
|
|
|
}
|
|
|
|
return this._startService(service, uri, event)
|
2015-10-20 02:33:00 +03:00
|
|
|
.then(_ => this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled")))
|
2015-06-03 15:05:00 +03:00
|
|
|
);
|
|
|
|
}
|
|
|
|
case CHANGING_SERVICE_EVENT:
|
|
|
|
let [service, uri] = this._findService(serverURI);
|
|
|
|
if (service) {
|
|
|
|
if (this._state == PUSH_SERVICE_INIT) {
|
|
|
|
this._setState(PUSH_SERVICE_ACTIVATING);
|
|
|
|
// The service has not been running - start it.
|
|
|
|
return this._startService(service, uri, STARTING_SERVICE_EVENT)
|
2015-10-20 02:33:00 +03:00
|
|
|
.then(_ => this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled")))
|
2015-06-03 15:05:00 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
this._setState(PUSH_SERVICE_ACTIVATING);
|
|
|
|
// If we already had running service - stop service, start the new
|
|
|
|
// one and check connection.enabled and offline state(offline state
|
|
|
|
// check is called in changeStateConnectionEnabledEvent function)
|
|
|
|
return this._stopService(CHANGING_SERVICE_EVENT)
|
|
|
|
.then(_ =>
|
|
|
|
this._startService(service, uri, CHANGING_SERVICE_EVENT)
|
|
|
|
)
|
2015-10-20 02:33:00 +03:00
|
|
|
.then(_ => this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled")))
|
2015-06-03 15:05:00 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (this._state == PUSH_SERVICE_INIT) {
|
|
|
|
return Promise.resolve();
|
|
|
|
|
|
|
|
} else {
|
|
|
|
// The new serverUri is empty or misconfigured - stop service.
|
|
|
|
this._setState(PUSH_SERVICE_INIT);
|
|
|
|
return this._stopService(STOPPING_SERVICE_EVENT);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* PushService initialization is divided into 4 parts:
|
|
|
|
* init() - start listening for xpcom-shutdown and serverURL changes.
|
|
|
|
* state is change to PUSH_SERVICE_INIT
|
|
|
|
* startService() - if serverURL is present this function is called. It starts
|
|
|
|
* listening for broadcasted messages, starts db and
|
|
|
|
* PushService connection (WebSocket).
|
|
|
|
* state is change to PUSH_SERVICE_ACTIVATING.
|
|
|
|
* startObservers() - start other observers.
|
|
|
|
* changeStateConnectionEnabledEvent - checks prefs and offline state.
|
|
|
|
* It changes state to:
|
|
|
|
* PUSH_SERVICE_RUNNING,
|
|
|
|
* PUSH_SERVICE_ACTIVE_OFFLINE or
|
|
|
|
* PUSH_SERVICE_CONNECTION_DISABLE.
|
|
|
|
*/
|
2015-04-21 21:10:50 +03:00
|
|
|
init: function(options = {}) {
|
2013-03-29 07:49:41 +04:00
|
|
|
debug("init()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state > PUSH_SERVICE_UNINIT) {
|
2015-04-21 21:10:50 +03:00
|
|
|
return;
|
|
|
|
}
|
2015-04-19 13:06:21 +03:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this._setState(PUSH_SERVICE_ACTIVATING);
|
|
|
|
|
|
|
|
// Debugging
|
|
|
|
prefs.observe("debug", this);
|
|
|
|
|
|
|
|
Services.obs.addObserver(this, "xpcom-shutdown", false);
|
|
|
|
|
|
|
|
if (options.serverURI) {
|
|
|
|
// this is use for xpcshell test.
|
|
|
|
|
|
|
|
var uri;
|
|
|
|
var service;
|
2015-06-02 14:16:00 +03:00
|
|
|
if (!options.service) {
|
|
|
|
for (let connProtocol of CONNECTION_PROTOCOLS) {
|
|
|
|
uri = connProtocol.checkServerURI(options.serverURI);
|
|
|
|
if (uri) {
|
|
|
|
service = connProtocol;
|
|
|
|
break;
|
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
2015-06-02 14:16:00 +03:00
|
|
|
} else {
|
|
|
|
try {
|
|
|
|
uri = Services.io.newURI(options.serverURI, null, null);
|
|
|
|
service = options.service;
|
|
|
|
} catch(e) {}
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
if (!service) {
|
|
|
|
this._setState(PUSH_SERVICE_INIT);
|
|
|
|
return;
|
|
|
|
}
|
2015-04-11 06:19:28 +03:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
// Start service.
|
2015-06-26 00:52:57 +03:00
|
|
|
this._startService(service, uri, false, options).then(_ => {
|
|
|
|
// Before completing the activation check prefs. This will first check
|
|
|
|
// connection.enabled pref and then check offline state.
|
|
|
|
this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled"));
|
|
|
|
});
|
2015-04-11 06:19:28 +03:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
} else {
|
|
|
|
// This is only used for testing. Different tests require connecting to
|
|
|
|
// slightly different URLs.
|
|
|
|
prefs.observe("serverURL", this);
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
2015-06-03 15:05:00 +03:00
|
|
|
this._changeServerURL(prefs.get("serverURL"), STARTING_SERVICE_EVENT));
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_startObservers: function() {
|
|
|
|
debug("startObservers");
|
|
|
|
|
|
|
|
if (this._state != PUSH_SERVICE_ACTIVATING) {
|
|
|
|
return;
|
|
|
|
}
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2013-09-20 22:17:40 +04:00
|
|
|
Services.obs.addObserver(this, "webapps-clear-data", false);
|
2013-06-13 04:26:44 +04:00
|
|
|
|
|
|
|
// On B2G the NetworkManager interface fires a network-active-changed
|
|
|
|
// event.
|
|
|
|
//
|
|
|
|
// The "active network" is based on priority - i.e. Wi-Fi has higher
|
|
|
|
// priority than data. The PushService should just use the preferred
|
|
|
|
// network, and not care about all interface changes.
|
|
|
|
// network-active-changed is not fired when the network goes offline, but
|
|
|
|
// socket connections time out. The check for Services.io.offline in
|
2015-06-03 15:05:00 +03:00
|
|
|
// PushServiceWebSocket._beginWSSetup() prevents unnecessary retries. When
|
|
|
|
// the network comes back online, network-active-changed is fired.
|
2013-06-13 04:26:44 +04:00
|
|
|
//
|
|
|
|
// On non-B2G platforms, the offline-status-changed event is used to know
|
|
|
|
// when to (dis)connect. It may not fire if the underlying OS changes
|
|
|
|
// networks; in such a case we rely on timeout.
|
|
|
|
//
|
|
|
|
// On B2G both events fire, one after the other, when the network goes
|
|
|
|
// online, so we explicitly check for the presence of NetworkManager and
|
|
|
|
// don't add an observer for offline-status-changed on B2G.
|
2015-06-03 15:04:00 +03:00
|
|
|
this._networkStateChangeEventName = this.getNetworkStateChangeEventName();
|
2015-04-21 21:10:50 +03:00
|
|
|
Services.obs.addObserver(this, this._networkStateChangeEventName, false);
|
2013-06-13 04:26:44 +04:00
|
|
|
|
2013-06-17 22:36:58 +04:00
|
|
|
// Used to monitor if the user wishes to disable Push.
|
|
|
|
prefs.observe("connection.enabled", this);
|
2015-06-26 00:52:57 +03:00
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
// Prunes expired registrations and notifies dormant service workers.
|
2015-06-26 00:52:57 +03:00
|
|
|
Services.obs.addObserver(this, "idle-daily", false);
|
2015-10-06 18:14:25 +03:00
|
|
|
|
|
|
|
// Prunes registrations for sites for which the user revokes push
|
|
|
|
// permissions.
|
|
|
|
Services.obs.addObserver(this, "perm-changed", false);
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
_startService: function(service, serverURI, event, options = {}) {
|
|
|
|
debug("startService");
|
|
|
|
|
|
|
|
if (this._state != PUSH_SERVICE_ACTIVATING) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (event != CHANGING_SERVICE_EVENT) {
|
|
|
|
// if only serverURL is changed we can keep listening for broadcast
|
|
|
|
// messages and queue them.
|
|
|
|
let ppmm = Cc["@mozilla.org/parentprocessmessagemanager;1"]
|
|
|
|
.getService(Ci.nsIMessageBroadcaster);
|
|
|
|
|
|
|
|
kCHILD_PROCESS_MESSAGES.forEach(msgName =>
|
|
|
|
ppmm.addMessageListener(msgName, this)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
this._service = service;
|
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
this._db = options.db;
|
|
|
|
if (!this._db) {
|
2015-06-03 15:05:00 +03:00
|
|
|
this._db = this._service.newPushDB();
|
2015-06-03 15:04:00 +03:00
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
this._service.init(options, this, serverURI);
|
|
|
|
this._startObservers();
|
2015-10-06 18:14:25 +03:00
|
|
|
return this._dropExpiredRegistrations();
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
/**
|
|
|
|
* PushService uninitialization is divided into 3 parts:
|
|
|
|
* stopObservers() - stot observers started in startObservers.
|
|
|
|
* stopService() - It stops listening for broadcasted messages, stops db and
|
|
|
|
* PushService connection (WebSocket).
|
|
|
|
* state is changed to PUSH_SERVICE_INIT.
|
|
|
|
* uninit() - stop listening for xpcom-shutdown and serverURL changes.
|
|
|
|
* state is change to PUSH_SERVICE_UNINIT
|
|
|
|
*/
|
|
|
|
_stopService: function(event) {
|
|
|
|
debug("stopService");
|
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVATING) {
|
2013-06-13 04:26:44 +04:00
|
|
|
return;
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
2013-06-13 04:26:44 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this.stopAlarm();
|
|
|
|
this._stopObservers();
|
2013-05-02 09:15:18 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
if (event != CHANGING_SERVICE_EVENT) {
|
|
|
|
let ppmm = Cc["@mozilla.org/parentprocessmessagemanager;1"]
|
|
|
|
.getService(Ci.nsIMessageBroadcaster);
|
2013-05-02 09:15:18 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
kCHILD_PROCESS_MESSAGES.forEach(
|
|
|
|
msgName => ppmm.removeMessageListener(msgName, this)
|
|
|
|
);
|
|
|
|
}
|
2015-06-03 15:06:00 +03:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this._service.disconnect();
|
|
|
|
this._service.uninit();
|
2015-06-03 15:06:00 +03:00
|
|
|
this._service = null;
|
|
|
|
this.stopAlarm();
|
2013-05-02 09:15:18 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
if (!this._db) {
|
|
|
|
return Promise.resolve();
|
|
|
|
}
|
|
|
|
if (event == UNINIT_EVENT) {
|
|
|
|
// If it is uninitialized just close db.
|
2015-06-03 15:04:00 +03:00
|
|
|
this._db.close();
|
|
|
|
this._db = null;
|
2015-06-03 15:05:00 +03:00
|
|
|
return Promise.resolve();
|
2013-06-13 04:26:44 +04:00
|
|
|
}
|
2013-05-02 09:15:18 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
return this.dropRegistrations()
|
|
|
|
.then(_ => {
|
|
|
|
this._db.close();
|
|
|
|
this._db = null;
|
|
|
|
}, err => {
|
|
|
|
this._db.close();
|
|
|
|
this._db = null;
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
_stopObservers: function() {
|
|
|
|
debug("stopObservers()");
|
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVATING) {
|
2013-03-29 07:49:41 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
prefs.ignore("debug", this);
|
|
|
|
prefs.ignore("connection.enabled", this);
|
|
|
|
|
|
|
|
Services.obs.removeObserver(this, this._networkStateChangeEventName);
|
2015-06-26 00:52:57 +03:00
|
|
|
Services.obs.removeObserver(this, "webapps-clear-data");
|
|
|
|
Services.obs.removeObserver(this, "idle-daily");
|
2015-10-06 18:14:25 +03:00
|
|
|
Services.obs.removeObserver(this, "perm-changed");
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
uninit: function() {
|
|
|
|
debug("uninit()");
|
|
|
|
|
Bug 1190661 - Send push only to child processes when in e10s mode. r=smaug
Earlier, the in-process child process message manager and any content process
child process message managers received the push event. This is because
broadcastAsyncMessage is used, but on e10s we want ServiceWorkers to run in the
child process, so the push should only be dispatched to it. This patch
introduces a list of child process listeners in the PushService (running on the
parent). PushServiceChildPreload sends a message to the PushService iff it is
running in a child process. If there are non-zero child listeners, the
PushService will send a message to all of them, otherwise it will fall back to
broadcastAsyncMessage.
We currently do not add support for precise targeting of child processes. This
is because until Bug 1182117 is fixed, all child process ServiceWorkerManagers
maintain all the service worker registrations internally. Yes this is a bug,
but that is the way things are right now. This makes it impossible to
distinguish which child should handle the notification for a given origin.
Considering we don't ship multi-process e10s, I would like to land this right
now.
When Bug 1182117 is fixed, we can remove this code since the
ServiceWorkerManager will manage registrations in the parent, and it will know
which child process is running which ServiceWorker.
--HG--
extra : commitid : Dgfkg4LqLPK
extra : rebase_source : e64a4f1c757b05fe2939a338c1ad8d14f4015a90
2015-07-31 06:00:21 +03:00
|
|
|
this._childListeners = [];
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
if (this._state == PUSH_SERVICE_UNINIT) {
|
2013-03-29 07:49:41 +04:00
|
|
|
return;
|
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
this._setState(PUSH_SERVICE_UNINIT);
|
|
|
|
|
|
|
|
prefs.ignore("serverURL", this);
|
2015-06-26 00:52:57 +03:00
|
|
|
Services.obs.removeObserver(this, "xpcom-shutdown");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
2015-06-03 15:05:00 +03:00
|
|
|
this._changeServerURL("", UNINIT_EVENT));
|
|
|
|
debug("shutdown complete!");
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
/** |delay| should be in milliseconds. */
|
|
|
|
setAlarm: function(delay) {
|
|
|
|
// Bug 909270: Since calls to AlarmService.add() are async, calls must be
|
|
|
|
// 'queued' to ensure only one alarm is ever active.
|
|
|
|
if (this._settingAlarm) {
|
|
|
|
// onSuccess will handle the set. Overwriting the variable enforces the
|
|
|
|
// last-writer-wins semantics.
|
|
|
|
this._queuedAlarmDelay = delay;
|
|
|
|
this._waitingForAlarmSet = true;
|
2015-04-21 21:10:50 +03:00
|
|
|
return;
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
// Stop any existing alarm.
|
|
|
|
this.stopAlarm();
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
this._settingAlarm = true;
|
|
|
|
AlarmService.add(
|
|
|
|
{
|
|
|
|
date: new Date(Date.now() + delay),
|
|
|
|
ignoreTimezone: true
|
|
|
|
},
|
2015-06-03 15:05:00 +03:00
|
|
|
() => {
|
2015-06-03 15:06:00 +03:00
|
|
|
if (this._state > PUSH_SERVICE_ACTIVATING) {
|
2015-06-03 15:05:00 +03:00
|
|
|
this._service.onAlarmFired();
|
|
|
|
}
|
|
|
|
}, (alarmID) => {
|
2015-06-03 15:04:00 +03:00
|
|
|
this._alarmID = alarmID;
|
|
|
|
debug("Set alarm " + delay + " in the future " + this._alarmID);
|
|
|
|
this._settingAlarm = false;
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
if (this._waitingForAlarmSet) {
|
|
|
|
this._waitingForAlarmSet = false;
|
|
|
|
this.setAlarm(this._queuedAlarmDelay);
|
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
);
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
stopAlarm: function() {
|
|
|
|
if (this._alarmID !== null) {
|
|
|
|
debug("Stopped existing alarm " + this._alarmID);
|
|
|
|
AlarmService.remove(this._alarmID);
|
|
|
|
this._alarmID = null;
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
dropRegistrations: function() {
|
|
|
|
return this._notifyAllAppsRegister()
|
|
|
|
.then(_ => this._db.drop());
|
|
|
|
},
|
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
_notifySubscriptionChangeObservers: function(record) {
|
|
|
|
// Notify XPCOM observers.
|
|
|
|
Services.obs.notifyObservers(
|
|
|
|
null,
|
|
|
|
"push-subscription-change",
|
|
|
|
record.scope
|
|
|
|
);
|
|
|
|
|
|
|
|
let data = {
|
|
|
|
originAttributes: record.originAttributes,
|
|
|
|
scope: record.scope
|
|
|
|
};
|
|
|
|
|
2015-09-16 20:28:17 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_NOTIFY_REGISTRATION_LOST").add();
|
Bug 1190661 - Send push only to child processes when in e10s mode. r=smaug
Earlier, the in-process child process message manager and any content process
child process message managers received the push event. This is because
broadcastAsyncMessage is used, but on e10s we want ServiceWorkers to run in the
child process, so the push should only be dispatched to it. This patch
introduces a list of child process listeners in the PushService (running on the
parent). PushServiceChildPreload sends a message to the PushService iff it is
running in a child process. If there are non-zero child listeners, the
PushService will send a message to all of them, otherwise it will fall back to
broadcastAsyncMessage.
We currently do not add support for precise targeting of child processes. This
is because until Bug 1182117 is fixed, all child process ServiceWorkerManagers
maintain all the service worker registrations internally. Yes this is a bug,
but that is the way things are right now. This makes it impossible to
distinguish which child should handle the notification for a given origin.
Considering we don't ship multi-process e10s, I would like to land this right
now.
When Bug 1182117 is fixed, we can remove this code since the
ServiceWorkerManager will manage registrations in the parent, and it will know
which child process is running which ServiceWorker.
--HG--
extra : commitid : Dgfkg4LqLPK
extra : rebase_source : e64a4f1c757b05fe2939a338c1ad8d14f4015a90
2015-07-31 06:00:21 +03:00
|
|
|
this._notifyListeners('pushsubscriptionchange', data);
|
|
|
|
},
|
|
|
|
|
|
|
|
_notifyListeners: function(name, data) {
|
|
|
|
if (this._childListeners.length > 0) {
|
|
|
|
// Try to send messages to all listeners, but remove any that fail since
|
|
|
|
// the receiver is likely gone away.
|
|
|
|
for (var i = this._childListeners.length - 1; i >= 0; --i) {
|
|
|
|
try {
|
|
|
|
this._childListeners[i].sendAsyncMessage(name, data);
|
|
|
|
} catch(e) {
|
|
|
|
this._childListeners.splice(i, 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
let ppmm = Cc['@mozilla.org/parentprocessmessagemanager;1']
|
|
|
|
.getService(Ci.nsIMessageListenerManager);
|
|
|
|
ppmm.broadcastAsyncMessage(name, data);
|
|
|
|
}
|
2015-06-26 00:52:57 +03:00
|
|
|
},
|
|
|
|
|
2013-04-10 01:12:35 +04:00
|
|
|
// Fires a push-register system message to all applications that have
|
2015-04-11 06:19:28 +03:00
|
|
|
// registration.
|
2015-06-03 15:05:00 +03:00
|
|
|
_notifyAllAppsRegister: function() {
|
2013-03-29 07:49:41 +04:00
|
|
|
debug("notifyAllAppsRegister()");
|
2015-05-12 19:08:00 +03:00
|
|
|
// records are objects describing the registration as stored in IndexedDB.
|
2015-09-17 15:08:50 +03:00
|
|
|
return this._db.getAllUnexpired().then(records => {
|
|
|
|
records.forEach(record => {
|
|
|
|
this._notifySubscriptionChangeObservers(record);
|
|
|
|
});
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:06:00 +03:00
|
|
|
dropRegistrationAndNotifyApp: function(aKeyId) {
|
2015-06-26 00:52:57 +03:00
|
|
|
return this._db.getByKeyID(aKeyId).then(record => {
|
|
|
|
this._notifySubscriptionChangeObservers(record);
|
|
|
|
return this._db.delete(aKeyId);
|
|
|
|
});
|
2015-06-03 15:06:00 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
updateRegistrationAndNotifyApp: function(aOldKey, aRecord) {
|
|
|
|
return this._db.delete(aOldKey)
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(_ => this._db.put(aRecord))
|
|
|
|
.then(record => this._notifySubscriptionChangeObservers(record));
|
2015-06-03 15:06:00 +03:00
|
|
|
},
|
|
|
|
|
2015-09-17 15:08:50 +03:00
|
|
|
ensureP256dhKey: function(record) {
|
|
|
|
if (record.p256dhPublicKey && record.p256dhPrivateKey) {
|
|
|
|
return Promise.resolve(record);
|
|
|
|
}
|
|
|
|
// We do not have a encryption key. so we need to generate it. This
|
|
|
|
// is only going to happen on db upgrade from version 4 to higher.
|
|
|
|
return PushCrypto.generateKeys()
|
|
|
|
.then(exportedKeys => {
|
|
|
|
return this.updateRecordAndNotifyApp(record.keyID, record => {
|
|
|
|
record.p256dhPublicKey = exportedKeys[0];
|
|
|
|
record.p256dhPrivateKey = exportedKeys[1];
|
|
|
|
return record;
|
|
|
|
});
|
|
|
|
}, error => {
|
|
|
|
return this.dropRegistrationAndNotifyApp(record.keyID).then(
|
|
|
|
() => Promise.reject(error));
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2015-09-11 17:51:32 +03:00
|
|
|
updateRecordAndNotifyApp: function(aKeyID, aUpdateFunc) {
|
|
|
|
return this._db.update(aKeyID, aUpdateFunc)
|
2015-09-17 15:08:50 +03:00
|
|
|
.then(record => {
|
|
|
|
this._notifySubscriptionChangeObservers(record);
|
|
|
|
return record;
|
|
|
|
});
|
2015-09-11 17:51:32 +03:00
|
|
|
},
|
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
dropRecordAndNotifyApp: function(aRecord) {
|
|
|
|
return this._db.delete(aRecord.keyID)
|
|
|
|
.then(_ => this._notifySubscriptionChangeObservers(aRecord));
|
|
|
|
},
|
|
|
|
|
2015-09-16 20:28:17 +03:00
|
|
|
_recordDidNotNotify: function(reason) {
|
|
|
|
Services.telemetry.
|
|
|
|
getHistogramById("PUSH_API_NOTIFICATION_RECEIVED_BUT_DID_NOT_NOTIFY").
|
|
|
|
add(reason);
|
|
|
|
},
|
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
/**
|
|
|
|
* Dispatches an incoming message to a service worker, recalculating the
|
|
|
|
* quota for the associated push registration. If the quota is exceeded,
|
|
|
|
* the registration and message will be dropped, and the worker will not
|
|
|
|
* be notified.
|
|
|
|
*
|
|
|
|
* @param {String} keyID The push registration ID.
|
|
|
|
* @param {String} message The message contents.
|
2015-09-17 15:08:50 +03:00
|
|
|
* @param {Object} cryptoParams The message encryption settings.
|
2015-06-26 00:52:57 +03:00
|
|
|
* @param {Function} updateFunc A function that receives the existing
|
|
|
|
* registration record as its argument, and returns a new record. If the
|
|
|
|
* function returns `null` or `undefined`, the record will not be updated.
|
|
|
|
* `PushServiceWebSocket` uses this to drop incoming updates with older
|
|
|
|
* versions.
|
|
|
|
*/
|
2015-09-17 15:08:50 +03:00
|
|
|
receivedPushMessage: function(keyID, message, cryptoParams, updateFunc) {
|
2015-06-26 00:52:57 +03:00
|
|
|
debug("receivedPushMessage()");
|
2015-09-16 20:28:17 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_NOTIFICATION_RECEIVED").add();
|
2015-06-26 00:52:57 +03:00
|
|
|
|
|
|
|
let shouldNotify = false;
|
2015-09-11 17:51:32 +03:00
|
|
|
return this.getByKeyID(keyID).then(record => {
|
2015-06-26 00:52:57 +03:00
|
|
|
if (!record) {
|
2015-09-16 20:28:17 +03:00
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_KEY_NOT_FOUND);
|
2015-06-26 00:52:57 +03:00
|
|
|
throw new Error("No record for key ID " + keyID);
|
|
|
|
}
|
|
|
|
return record.getLastVisit();
|
|
|
|
}).then(lastVisit => {
|
|
|
|
// As a special case, don't notify the service worker if the user
|
|
|
|
// cleared their history.
|
|
|
|
shouldNotify = isFinite(lastVisit);
|
2015-09-16 20:28:17 +03:00
|
|
|
if (!shouldNotify) {
|
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_NO_HISTORY);
|
|
|
|
}
|
2015-06-26 00:52:57 +03:00
|
|
|
return this._db.update(keyID, record => {
|
|
|
|
let newRecord = updateFunc(record);
|
|
|
|
if (!newRecord) {
|
2015-09-16 20:28:17 +03:00
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_NO_VERSION_INCREMENT);
|
2015-06-26 00:52:57 +03:00
|
|
|
return null;
|
|
|
|
}
|
2015-09-17 15:08:50 +03:00
|
|
|
// Because `unregister` is advisory only, we can still receive messages
|
|
|
|
// for stale Simple Push registrations from the server. To work around
|
|
|
|
// this, we check if the record has expired before *and* after updating
|
|
|
|
// the quota.
|
2015-06-26 00:52:57 +03:00
|
|
|
if (newRecord.isExpired()) {
|
|
|
|
debug("receivedPushMessage: Ignoring update for expired key ID " + keyID);
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
newRecord.receivedPush(lastVisit);
|
|
|
|
return newRecord;
|
|
|
|
});
|
|
|
|
}).then(record => {
|
2015-09-11 17:51:32 +03:00
|
|
|
var notified = false;
|
2015-06-26 00:52:57 +03:00
|
|
|
if (!record) {
|
2015-09-11 17:51:32 +03:00
|
|
|
return notified;
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
2015-09-17 15:08:50 +03:00
|
|
|
let decodedPromise;
|
|
|
|
if (cryptoParams) {
|
|
|
|
decodedPromise = PushCrypto.decodeMsg(
|
|
|
|
message,
|
|
|
|
record.p256dhPrivateKey,
|
|
|
|
cryptoParams.dh,
|
|
|
|
cryptoParams.salt,
|
|
|
|
cryptoParams.rs
|
2015-09-17 15:10:42 +03:00
|
|
|
);
|
2015-09-17 15:08:50 +03:00
|
|
|
} else {
|
2015-09-17 15:10:42 +03:00
|
|
|
decodedPromise = Promise.resolve(null);
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
2015-09-17 15:08:50 +03:00
|
|
|
return decodedPromise.then(message => {
|
|
|
|
if (shouldNotify) {
|
|
|
|
notified = this._notifyApp(record, message);
|
|
|
|
}
|
|
|
|
if (record.isExpired()) {
|
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_EXPIRED);
|
|
|
|
// Drop the registration in the background. If the user returns to the
|
|
|
|
// site, the service worker will be notified on the next `idle-daily`
|
|
|
|
// event.
|
|
|
|
this._sendUnregister(record).catch(error => {
|
|
|
|
debug("receivedPushMessage: Unregister error: " + error);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
return notified;
|
|
|
|
});
|
2015-06-26 00:52:57 +03:00
|
|
|
}).catch(error => {
|
|
|
|
debug("receivedPushMessage: Error notifying app: " + error);
|
|
|
|
});
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
_notifyApp: function(aPushRecord, message) {
|
2015-06-24 23:34:54 +03:00
|
|
|
if (!aPushRecord || !aPushRecord.scope ||
|
|
|
|
aPushRecord.originAttributes === undefined) {
|
2015-06-03 15:05:00 +03:00
|
|
|
debug("notifyApp() something is undefined. Dropping notification: " +
|
|
|
|
JSON.stringify(aPushRecord) );
|
2015-09-11 17:51:32 +03:00
|
|
|
return false;
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
|
2015-04-21 21:10:50 +03:00
|
|
|
debug("notifyApp() " + aPushRecord.scope);
|
|
|
|
// Notify XPCOM observers.
|
|
|
|
let notification = Cc["@mozilla.org/push/ObserverNotification;1"]
|
|
|
|
.createInstance(Ci.nsIPushObserverNotification);
|
|
|
|
notification.pushEndpoint = aPushRecord.pushEndpoint;
|
|
|
|
notification.version = aPushRecord.version;
|
2015-09-17 15:10:42 +03:00
|
|
|
|
|
|
|
let payload = ArrayBuffer.isView(message) ?
|
|
|
|
new Uint8Array(message.buffer) : message;
|
|
|
|
if (payload) {
|
|
|
|
notification.data = "";
|
|
|
|
for (let i = 0; i < payload.length; i++) {
|
|
|
|
notification.data += String.fromCharCode(payload[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-28 16:44:00 +03:00
|
|
|
notification.lastPush = aPushRecord.lastPush;
|
|
|
|
notification.pushCount = aPushRecord.pushCount;
|
|
|
|
|
2015-04-21 21:10:50 +03:00
|
|
|
Services.obs.notifyObservers(
|
|
|
|
notification,
|
|
|
|
"push-notification",
|
|
|
|
aPushRecord.scope
|
|
|
|
);
|
2015-04-11 06:19:28 +03:00
|
|
|
|
|
|
|
// If permission has been revoked, trash the message.
|
2015-08-20 02:03:15 +03:00
|
|
|
if (!aPushRecord.hasPermission()) {
|
2015-06-03 15:05:00 +03:00
|
|
|
debug("Does not have permission for push.");
|
2015-09-11 17:51:32 +03:00
|
|
|
return false;
|
2015-04-11 06:19:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
let data = {
|
2015-09-17 15:10:42 +03:00
|
|
|
payload: payload,
|
2015-06-24 23:34:54 +03:00
|
|
|
originAttributes: aPushRecord.originAttributes,
|
2015-04-11 06:19:28 +03:00
|
|
|
scope: aPushRecord.scope
|
|
|
|
};
|
|
|
|
|
2015-09-16 20:28:17 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_NOTIFY").add();
|
Bug 1190661 - Send push only to child processes when in e10s mode. r=smaug
Earlier, the in-process child process message manager and any content process
child process message managers received the push event. This is because
broadcastAsyncMessage is used, but on e10s we want ServiceWorkers to run in the
child process, so the push should only be dispatched to it. This patch
introduces a list of child process listeners in the PushService (running on the
parent). PushServiceChildPreload sends a message to the PushService iff it is
running in a child process. If there are non-zero child listeners, the
PushService will send a message to all of them, otherwise it will fall back to
broadcastAsyncMessage.
We currently do not add support for precise targeting of child processes. This
is because until Bug 1182117 is fixed, all child process ServiceWorkerManagers
maintain all the service worker registrations internally. Yes this is a bug,
but that is the way things are right now. This makes it impossible to
distinguish which child should handle the notification for a given origin.
Considering we don't ship multi-process e10s, I would like to land this right
now.
When Bug 1182117 is fixed, we can remove this code since the
ServiceWorkerManager will manage registrations in the parent, and it will know
which child process is running which ServiceWorker.
--HG--
extra : commitid : Dgfkg4LqLPK
extra : rebase_source : e64a4f1c757b05fe2939a338c1ad8d14f4015a90
2015-07-31 06:00:21 +03:00
|
|
|
this._notifyListeners('push', data);
|
2015-09-11 17:51:32 +03:00
|
|
|
return true;
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:06:00 +03:00
|
|
|
getByKeyID: function(aKeyID) {
|
|
|
|
return this._db.getByKeyID(aKeyID);
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
getAllUnexpired: function() {
|
|
|
|
return this._db.getAllUnexpired();
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-24 23:34:54 +03:00
|
|
|
_sendRequest: function(action, aRecord) {
|
2015-06-03 15:05:00 +03:00
|
|
|
if (this._state == PUSH_SERVICE_CONNECTION_DISABLE) {
|
|
|
|
return Promise.reject({state: 0, error: "Service not active"});
|
|
|
|
} else if (this._state == PUSH_SERVICE_ACTIVE_OFFLINE) {
|
2015-10-27 11:13:00 +03:00
|
|
|
if (this._service.serviceType() == "WebSocket" && action == "unregister") {
|
|
|
|
return Promise.resolve();
|
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
return Promise.reject({state: 0, error: "NetworkError"});
|
|
|
|
}
|
|
|
|
return this._service.request(action, aRecord);
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
/**
|
2013-03-29 07:49:41 +04:00
|
|
|
* Called on message from the child process. aPageRecord is an object sent by
|
|
|
|
* navigator.push, identifying the sending page and other fields.
|
|
|
|
*/
|
2015-06-03 15:05:00 +03:00
|
|
|
_registerWithServer: function(aPageRecord) {
|
2015-06-24 23:34:54 +03:00
|
|
|
debug("registerWithServer()" + JSON.stringify(aPageRecord));
|
2015-04-19 13:06:11 +03:00
|
|
|
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_ATTEMPT").add();
|
2015-06-03 15:05:00 +03:00
|
|
|
return this._sendRequest("register", aPageRecord)
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => this._onRegisterSuccess(record),
|
2015-06-03 15:05:00 +03:00
|
|
|
err => this._onRegisterError(err))
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => {
|
2015-06-24 23:34:54 +03:00
|
|
|
this._deletePendingRequest(aPageRecord);
|
2015-06-26 00:52:57 +03:00
|
|
|
return record;
|
2015-06-03 15:05:00 +03:00
|
|
|
}, err => {
|
2015-06-24 23:34:54 +03:00
|
|
|
this._deletePendingRequest(aPageRecord);
|
2015-06-03 15:05:00 +03:00
|
|
|
throw err;
|
|
|
|
});
|
2015-04-21 21:10:50 +03:00
|
|
|
},
|
2015-04-19 13:06:11 +03:00
|
|
|
|
2015-04-21 21:10:50 +03:00
|
|
|
_register: function(aPageRecord) {
|
2015-06-24 23:34:54 +03:00
|
|
|
debug("_register()");
|
|
|
|
if (!aPageRecord.scope || aPageRecord.originAttributes === undefined) {
|
|
|
|
return Promise.reject({state: 0, error: "NotFoundError"});
|
|
|
|
}
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
return this._checkActivated()
|
2015-06-24 23:34:54 +03:00
|
|
|
.then(_ => this._db.getByIdentifiers(aPageRecord))
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => {
|
|
|
|
if (!record) {
|
2015-06-24 23:34:54 +03:00
|
|
|
return this._lookupOrPutPendingRequest(aPageRecord);
|
2015-04-21 21:10:50 +03:00
|
|
|
}
|
2015-06-26 00:52:57 +03:00
|
|
|
if (record.isExpired()) {
|
2015-10-06 18:14:25 +03:00
|
|
|
return record.quotaChanged().then(isChanged => {
|
|
|
|
if (isChanged) {
|
2015-06-26 00:52:57 +03:00
|
|
|
// If the user revisited the site, drop the expired push
|
|
|
|
// registration and re-register.
|
2015-10-06 18:14:25 +03:00
|
|
|
return this._db.delete(record.keyID);
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
|
|
|
throw {state: 0, error: "NotFoundError"};
|
2015-10-06 18:14:25 +03:00
|
|
|
}).then(_ => this._lookupOrPutPendingRequest(aPageRecord));
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
|
|
|
return record;
|
2015-06-03 15:05:00 +03:00
|
|
|
}, error => {
|
2015-06-24 23:34:54 +03:00
|
|
|
debug("getByIdentifiers failed");
|
2015-06-03 15:05:00 +03:00
|
|
|
throw error;
|
|
|
|
});
|
2015-04-11 06:19:28 +03:00
|
|
|
},
|
|
|
|
|
2015-08-06 03:03:49 +03:00
|
|
|
_sendUnregister: function(aRecord) {
|
|
|
|
Services.telemetry.getHistogramById("PUSH_API_UNSUBSCRIBE_ATTEMPT").add();
|
|
|
|
return this._sendRequest("unregister", aRecord).then(function(v) {
|
|
|
|
Services.telemetry.getHistogramById("PUSH_API_UNSUBSCRIBE_SUCCEEDED").add();
|
|
|
|
return v;
|
|
|
|
}).catch(function(e) {
|
|
|
|
Services.telemetry.getHistogramById("PUSH_API_UNSUBSCRIBE_FAILED").add();
|
|
|
|
return Promise.reject(e);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
/**
|
|
|
|
* Exceptions thrown in _onRegisterSuccess are caught by the promise obtained
|
2015-06-03 15:05:00 +03:00
|
|
|
* from _service.request, causing the promise to be rejected instead.
|
2013-03-29 07:49:41 +04:00
|
|
|
*/
|
2015-06-03 15:05:00 +03:00
|
|
|
_onRegisterSuccess: function(aRecord) {
|
2013-03-29 07:49:41 +04:00
|
|
|
debug("_onRegisterSuccess()");
|
|
|
|
|
2015-06-03 15:06:00 +03:00
|
|
|
return this._db.put(aRecord)
|
2015-08-06 03:03:49 +03:00
|
|
|
.then(record => {
|
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_SUCCEEDED").add();
|
|
|
|
return record;
|
|
|
|
})
|
2015-06-26 00:52:57 +03:00
|
|
|
.catch(error => {
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_FAILED").add()
|
2015-06-07 08:17:04 +03:00
|
|
|
// Unable to save. Destroy the subscription in the background.
|
2015-08-06 03:03:49 +03:00
|
|
|
this._sendUnregister(aRecord).catch(err => {
|
2015-06-07 08:17:04 +03:00
|
|
|
debug("_onRegisterSuccess: Error unregistering stale subscription" +
|
|
|
|
err);
|
|
|
|
});
|
2015-06-03 15:05:00 +03:00
|
|
|
throw error;
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Exceptions thrown in _onRegisterError are caught by the promise obtained
|
2015-06-03 15:05:00 +03:00
|
|
|
* from _service.request, causing the promise to be rejected instead.
|
2013-03-29 07:49:41 +04:00
|
|
|
*/
|
2015-04-21 21:10:50 +03:00
|
|
|
_onRegisterError: function(reply) {
|
2013-03-29 07:49:41 +04:00
|
|
|
debug("_onRegisterError()");
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_FAILED").add()
|
2013-09-17 21:10:36 +04:00
|
|
|
if (!reply.error) {
|
|
|
|
debug("Called without valid error message!");
|
2015-04-21 21:10:50 +03:00
|
|
|
throw "Registration error";
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
2015-04-21 21:10:50 +03:00
|
|
|
throw reply.error;
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
receiveMessage: function(aMessage) {
|
|
|
|
debug("receiveMessage(): " + aMessage.name);
|
|
|
|
|
|
|
|
if (kCHILD_PROCESS_MESSAGES.indexOf(aMessage.name) == -1) {
|
|
|
|
debug("Invalid message from child " + aMessage.name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
Bug 1190661 - Send push only to child processes when in e10s mode. r=smaug
Earlier, the in-process child process message manager and any content process
child process message managers received the push event. This is because
broadcastAsyncMessage is used, but on e10s we want ServiceWorkers to run in the
child process, so the push should only be dispatched to it. This patch
introduces a list of child process listeners in the PushService (running on the
parent). PushServiceChildPreload sends a message to the PushService iff it is
running in a child process. If there are non-zero child listeners, the
PushService will send a message to all of them, otherwise it will fall back to
broadcastAsyncMessage.
We currently do not add support for precise targeting of child processes. This
is because until Bug 1182117 is fixed, all child process ServiceWorkerManagers
maintain all the service worker registrations internally. Yes this is a bug,
but that is the way things are right now. This makes it impossible to
distinguish which child should handle the notification for a given origin.
Considering we don't ship multi-process e10s, I would like to land this right
now.
When Bug 1182117 is fixed, we can remove this code since the
ServiceWorkerManager will manage registrations in the parent, and it will know
which child process is running which ServiceWorker.
--HG--
extra : commitid : Dgfkg4LqLPK
extra : rebase_source : e64a4f1c757b05fe2939a338c1ad8d14f4015a90
2015-07-31 06:00:21 +03:00
|
|
|
if (aMessage.name === "Push:RegisterEventNotificationListener") {
|
|
|
|
debug("Adding child listener");
|
|
|
|
this._childListeners.push(aMessage.target);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aMessage.name === "child-process-shutdown") {
|
|
|
|
debug("Possibly removing child listener");
|
|
|
|
for (var i = this._childListeners.length - 1; i >= 0; --i) {
|
|
|
|
if (this._childListeners[i] == aMessage.target) {
|
|
|
|
debug("Removed child listener");
|
|
|
|
this._childListeners.splice(i, 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-06-24 23:34:54 +03:00
|
|
|
if (!aMessage.target.assertPermission("push")) {
|
|
|
|
debug("Got message from a child process that does not have 'push' permission.");
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
let mm = aMessage.target.QueryInterface(Ci.nsIMessageSender);
|
2015-06-24 23:34:54 +03:00
|
|
|
let pageRecord = aMessage.data;
|
|
|
|
|
|
|
|
let principal = aMessage.principal;
|
|
|
|
if (!principal) {
|
|
|
|
debug("No principal passed!");
|
|
|
|
let message = {
|
2015-06-26 00:52:57 +03:00
|
|
|
requestID: pageRecord.requestID,
|
2015-06-24 23:34:54 +03:00
|
|
|
error: "SecurityError"
|
|
|
|
};
|
2015-09-19 04:15:23 +03:00
|
|
|
mm.sendAsyncMessage("PushService:Register:KO", message);
|
2015-06-24 23:34:54 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pageRecord.originAttributes =
|
|
|
|
ChromeUtils.originAttributesToSuffix(principal.originAttributes);
|
|
|
|
|
|
|
|
if (!pageRecord.scope || pageRecord.originAttributes === undefined) {
|
|
|
|
debug("Incorrect identifier values set! " + JSON.stringify(pageRecord));
|
|
|
|
let message = {
|
2015-06-26 00:52:57 +03:00
|
|
|
requestID: pageRecord.requestID,
|
2015-06-24 23:34:54 +03:00
|
|
|
error: "SecurityError"
|
|
|
|
};
|
2015-09-19 04:15:23 +03:00
|
|
|
mm.sendAsyncMessage("PushService:Register:KO", message);
|
2015-06-24 23:34:54 +03:00
|
|
|
return;
|
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2015-09-19 04:15:23 +03:00
|
|
|
this[aMessage.name.slice("Push:".length).toLowerCase()](pageRecord, mm);
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
register: function(aPageRecord, aMessageManager) {
|
|
|
|
debug("register(): " + JSON.stringify(aPageRecord));
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this._register(aPageRecord)
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => {
|
|
|
|
let message = record.toRegister();
|
2015-06-03 15:06:00 +03:00
|
|
|
message.requestID = aPageRecord.requestID;
|
2015-06-03 15:04:00 +03:00
|
|
|
aMessageManager.sendAsyncMessage("PushService:Register:OK", message);
|
2015-06-03 15:05:00 +03:00
|
|
|
}, error => {
|
2015-06-03 15:04:00 +03:00
|
|
|
let message = {
|
|
|
|
requestID: aPageRecord.requestID,
|
|
|
|
error
|
|
|
|
};
|
|
|
|
aMessageManager.sendAsyncMessage("PushService:Register:KO", message);
|
2015-06-03 15:05:00 +03:00
|
|
|
});
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
/**
|
|
|
|
* Called on message from the child process.
|
|
|
|
*
|
|
|
|
* Why is the record being deleted from the local database before the server
|
|
|
|
* is told?
|
|
|
|
*
|
|
|
|
* Unregistration is for the benefit of the app and the AppServer
|
|
|
|
* so that the AppServer does not keep pinging a channel the UserAgent isn't
|
|
|
|
* watching The important part of the transaction in this case is left to the
|
|
|
|
* app, to tell its server of the unregistration. Even if the request to the
|
|
|
|
* PushServer were to fail, it would not affect correctness of the protocol,
|
2015-06-03 15:06:00 +03:00
|
|
|
* and the server GC would just clean up the channelID/subscription
|
|
|
|
* eventually. Since the appserver doesn't ping it, no data is lost.
|
2013-03-29 07:49:41 +04:00
|
|
|
*
|
|
|
|
* If rather we were to unregister at the server and update the database only
|
|
|
|
* on success: If the server receives the unregister, and deletes the
|
2015-06-03 15:06:00 +03:00
|
|
|
* channelID/subscription, but the response is lost because of network
|
|
|
|
* failure, the application is never informed. In addition the application may
|
|
|
|
* retry the unregister when it fails due to timeout (websocket) or any other
|
|
|
|
* reason at which point the server will say it does not know of this
|
|
|
|
* unregistration. We'll have to make the registration/unregistration phases
|
|
|
|
* have retries and attempts to resend messages from the server, and have the
|
|
|
|
* client acknowledge. On a server, data is cheap, reliable notification is
|
|
|
|
* not.
|
2013-03-29 07:49:41 +04:00
|
|
|
*/
|
2015-04-21 21:10:50 +03:00
|
|
|
_unregister: function(aPageRecord) {
|
2015-06-07 08:17:04 +03:00
|
|
|
debug("_unregister()");
|
2015-06-24 23:34:54 +03:00
|
|
|
if (!aPageRecord.scope || aPageRecord.originAttributes === undefined) {
|
2015-06-03 15:05:00 +03:00
|
|
|
return Promise.reject({state: 0, error: "NotFoundError"});
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
return this._checkActivated()
|
2015-06-24 23:34:54 +03:00
|
|
|
.then(_ => this._db.getByIdentifiers(aPageRecord))
|
2015-05-12 19:08:00 +03:00
|
|
|
.then(record => {
|
|
|
|
if (record === undefined) {
|
2015-07-15 01:01:41 +03:00
|
|
|
return false;
|
2015-05-12 19:08:00 +03:00
|
|
|
}
|
2015-04-21 21:10:50 +03:00
|
|
|
|
2015-06-03 15:06:00 +03:00
|
|
|
return Promise.all([
|
2015-08-06 03:03:49 +03:00
|
|
|
this._sendUnregister(record),
|
2015-06-26 00:52:57 +03:00
|
|
|
this._db.delete(record.keyID),
|
2015-07-15 01:01:41 +03:00
|
|
|
]).then(() => true);
|
2015-05-12 19:08:00 +03:00
|
|
|
});
|
2015-04-21 21:10:50 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
unregister: function(aPageRecord, aMessageManager) {
|
|
|
|
debug("unregister() " + JSON.stringify(aPageRecord));
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this._unregister(aPageRecord)
|
2015-07-15 01:01:41 +03:00
|
|
|
.then(result => {
|
|
|
|
aMessageManager.sendAsyncMessage("PushService:Unregister:OK", {
|
|
|
|
requestID: aPageRecord.requestID,
|
|
|
|
result: result,
|
|
|
|
})
|
|
|
|
}, error => {
|
|
|
|
debug("unregister(): Actual error " + error);
|
|
|
|
aMessageManager.sendAsyncMessage("PushService:Unregister:KO", {
|
|
|
|
requestID: aPageRecord.requestID,
|
|
|
|
})
|
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
);
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-04-21 21:10:51 +03:00
|
|
|
_clearAll: function _clearAll() {
|
2015-06-03 15:05:00 +03:00
|
|
|
return this._checkActivated()
|
|
|
|
.then(_ => this._db.clearAll())
|
2015-07-29 21:33:48 +03:00
|
|
|
.catch(_ => Promise.resolve());
|
|
|
|
},
|
|
|
|
|
|
|
|
_clearForDomain: function(domain) {
|
|
|
|
/**
|
|
|
|
* Copied from ForgetAboutSite.jsm.
|
|
|
|
*
|
|
|
|
* Returns true if the string passed in is part of the root domain of the
|
|
|
|
* current string. For example, if this is "www.mozilla.org", and we pass in
|
|
|
|
* "mozilla.org", this will return true. It would return false the other way
|
|
|
|
* around.
|
|
|
|
*/
|
|
|
|
function hasRootDomain(str, aDomain)
|
|
|
|
{
|
|
|
|
let index = str.indexOf(aDomain);
|
|
|
|
// If aDomain is not found, we know we do not have it as a root domain.
|
|
|
|
if (index == -1)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// If the strings are the same, we obviously have a match.
|
|
|
|
if (str == aDomain)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
// Otherwise, we have aDomain as our root domain iff the index of aDomain is
|
|
|
|
// aDomain.length subtracted from our length and (since we do not have an
|
|
|
|
// exact match) the character before the index is a dot or slash.
|
|
|
|
let prevChar = str[index - 1];
|
|
|
|
return (index == (str.length - aDomain.length)) &&
|
|
|
|
(prevChar == "." || prevChar == "/");
|
|
|
|
}
|
|
|
|
|
|
|
|
let clear = (db, domain) => {
|
|
|
|
db.clearIf(record => {
|
2015-08-20 02:03:15 +03:00
|
|
|
return hasRootDomain(record.uri.prePath, domain);
|
2015-07-29 21:33:48 +03:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._checkActivated()
|
|
|
|
.then(_ => clear(this._db, domain))
|
|
|
|
.catch(e => {
|
|
|
|
debug("Error forgetting about domain! " + e);
|
2015-06-03 15:05:00 +03:00
|
|
|
return Promise.resolve();
|
|
|
|
});
|
2015-04-21 21:10:51 +03:00
|
|
|
},
|
2015-05-12 19:08:00 +03:00
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
/**
|
|
|
|
* Called on message from the child process
|
|
|
|
*/
|
2015-04-21 21:10:50 +03:00
|
|
|
_registration: function(aPageRecord) {
|
2015-06-03 15:05:00 +03:00
|
|
|
debug("_registration()");
|
2015-06-24 23:34:54 +03:00
|
|
|
if (!aPageRecord.scope || aPageRecord.originAttributes === undefined) {
|
|
|
|
return Promise.reject({state: 0, error: "NotFoundError"});
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return this._checkActivated()
|
2015-06-24 23:34:54 +03:00
|
|
|
.then(_ => this._db.getByIdentifiers(aPageRecord))
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => {
|
|
|
|
if (!record) {
|
2015-06-03 15:05:00 +03:00
|
|
|
return null;
|
|
|
|
}
|
2015-06-26 00:52:57 +03:00
|
|
|
if (record.isExpired()) {
|
2015-10-06 18:14:25 +03:00
|
|
|
return record.quotaChanged().then(isChanged => {
|
|
|
|
if (isChanged) {
|
2015-10-30 19:37:22 +03:00
|
|
|
return this._db.delete(record.keyID).then(_ => null);
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
2015-10-30 19:37:22 +03:00
|
|
|
return null;
|
|
|
|
});
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
|
|
|
return record.toRegistration();
|
2015-06-03 15:05:00 +03:00
|
|
|
});
|
2015-04-19 17:20:24 +03:00
|
|
|
},
|
|
|
|
|
2015-04-21 21:10:50 +03:00
|
|
|
registration: function(aPageRecord, aMessageManager) {
|
|
|
|
debug("registration()");
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
return this._registration(aPageRecord)
|
|
|
|
.then(registration =>
|
2015-04-21 21:10:50 +03:00
|
|
|
aMessageManager.sendAsyncMessage("PushService:Registration:OK", {
|
|
|
|
requestID: aPageRecord.requestID,
|
|
|
|
registration
|
2015-06-03 15:05:00 +03:00
|
|
|
}), error =>
|
2015-04-21 21:10:50 +03:00
|
|
|
aMessageManager.sendAsyncMessage("PushService:Registration:KO", {
|
|
|
|
requestID: aPageRecord.requestID,
|
|
|
|
error
|
2015-06-03 15:05:00 +03:00
|
|
|
})
|
|
|
|
);
|
2015-06-26 00:52:57 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
_dropExpiredRegistrations: function() {
|
|
|
|
debug("dropExpiredRegistrations()");
|
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
return this._db.getAllExpired().then(records => {
|
|
|
|
return Promise.all(records.map(record =>
|
|
|
|
record.quotaChanged().then(isChanged => {
|
|
|
|
if (isChanged) {
|
2015-06-26 00:52:57 +03:00
|
|
|
// If the user revisited the site, drop the expired push
|
|
|
|
// registration and notify the associated service worker.
|
2015-10-06 18:14:25 +03:00
|
|
|
return this.dropRecordAndNotifyApp(record);
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
|
|
|
}).catch(error => {
|
|
|
|
debug("dropExpiredRegistrations: Error dropping registration " +
|
|
|
|
record.keyID + ": " + error);
|
2015-10-06 18:14:25 +03:00
|
|
|
})
|
|
|
|
));
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
_onPermissionChange: function(subject, data) {
|
|
|
|
debug("onPermissionChange()");
|
|
|
|
|
|
|
|
if (data == "cleared") {
|
|
|
|
// If the permission list was cleared, drop all registrations
|
|
|
|
// that are subject to quota.
|
|
|
|
return this._db.clearIf(record => {
|
|
|
|
if (record.quotaApplies()) {
|
|
|
|
if (!record.isExpired()) {
|
|
|
|
// Drop the registration in the background.
|
|
|
|
this._unregisterIfConnected(record);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
let permission = subject.QueryInterface(Ci.nsIPermission);
|
2015-10-31 04:16:19 +03:00
|
|
|
if (permission.type != "desktop-notification") {
|
2015-10-06 18:14:25 +03:00
|
|
|
return Promise.resolve();
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._updatePermission(permission, data);
|
|
|
|
},
|
|
|
|
|
|
|
|
_updatePermission: function(permission, type) {
|
|
|
|
debug("updatePermission()");
|
|
|
|
|
|
|
|
let isAllow = permission.capability ==
|
|
|
|
Ci.nsIPermissionManager.ALLOW_ACTION;
|
|
|
|
let isChange = type == "added" || type == "changed";
|
|
|
|
|
|
|
|
if (isAllow && isChange) {
|
|
|
|
// Permission set to "allow". Drop all expired registrations for this
|
|
|
|
// site, notify the associated service workers, and reset the quota
|
|
|
|
// for active registrations.
|
2015-10-31 04:15:48 +03:00
|
|
|
return this._updateByPrincipal(
|
|
|
|
permission.principal,
|
|
|
|
record => this._permissionAllowed(record)
|
|
|
|
);
|
2015-10-06 18:14:25 +03:00
|
|
|
} else if (isChange || (isAllow && type == "deleted")) {
|
|
|
|
// Permission set to "block" or "always ask," or "allow" permission
|
|
|
|
// removed. Expire all registrations for this site.
|
2015-10-31 04:15:48 +03:00
|
|
|
return this._updateByPrincipal(
|
|
|
|
permission.principal,
|
|
|
|
record => this._permissionDenied(record)
|
|
|
|
);
|
2015-10-06 18:14:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return Promise.resolve();
|
|
|
|
},
|
|
|
|
|
2015-10-31 04:15:48 +03:00
|
|
|
_updateByPrincipal: function(principal, updateFunc) {
|
|
|
|
return this._db.updateByOrigin(
|
2015-10-06 18:14:25 +03:00
|
|
|
principal.URI.prePath,
|
2015-10-31 04:15:48 +03:00
|
|
|
ChromeUtils.originAttributesToSuffix(principal.originAttributes),
|
|
|
|
updateFunc
|
2015-10-06 18:14:25 +03:00
|
|
|
);
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Expires all registrations if the push permission is revoked. We only
|
|
|
|
* expire the registration so we can notify the service worker as soon as
|
|
|
|
* the permission is reinstated. If we just deleted the registration, the
|
|
|
|
* worker wouldn't be notified until the next visit to the site.
|
|
|
|
*
|
|
|
|
* @param {Array} A list of records to expire.
|
|
|
|
* @returns {Promise} A promise resolved with the expired records.
|
|
|
|
*/
|
2015-10-31 04:15:48 +03:00
|
|
|
_permissionDenied: function(record) {
|
|
|
|
if (!record.quotaApplies() || record.isExpired()) {
|
2015-10-06 18:14:25 +03:00
|
|
|
// Ignore already-expired records.
|
2015-10-31 04:15:48 +03:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
// Drop the registration in the background.
|
|
|
|
this._unregisterIfConnected(record);
|
|
|
|
record.setQuota(0);
|
|
|
|
return record;
|
2015-10-06 18:14:25 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Drops all expired registrations, notifies the associated service
|
|
|
|
* workers, and resets the quota for active registrations if the push
|
|
|
|
* permission is granted.
|
|
|
|
*
|
|
|
|
* @param {Array} A list of records to refresh.
|
|
|
|
* @returns {Promise} A promise resolved with the refreshed records.
|
|
|
|
*/
|
2015-10-31 04:15:48 +03:00
|
|
|
_permissionAllowed: function(record) {
|
|
|
|
if (!record.quotaApplies()) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
if (record.isExpired()) {
|
|
|
|
// If the registration has expired, drop and notify the worker
|
|
|
|
// unconditionally.
|
|
|
|
this._notifySubscriptionChangeObservers(record);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
record.resetQuota();
|
|
|
|
return record;
|
2015-06-26 00:52:57 +03:00
|
|
|
},
|
2015-04-21 21:10:50 +03:00
|
|
|
};
|