2018-11-29 23:47:20 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "LSObject.h"
|
|
|
|
|
|
|
|
#include "ActorsChild.h"
|
|
|
|
#include "IPCBlobInputStreamThread.h"
|
|
|
|
#include "LocalStorageCommon.h"
|
2019-08-21 23:24:00 +03:00
|
|
|
#include "mozilla/StaticPrefs_dom.h"
|
2018-11-29 23:47:20 +03:00
|
|
|
#include "mozilla/ThreadEventQueue.h"
|
|
|
|
#include "mozilla/dom/quota/QuotaManager.h"
|
|
|
|
#include "mozilla/ipc/BackgroundChild.h"
|
|
|
|
#include "mozilla/ipc/BackgroundUtils.h"
|
|
|
|
#include "mozilla/ipc/PBackgroundChild.h"
|
|
|
|
#include "nsContentUtils.h"
|
|
|
|
#include "nsIScriptObjectPrincipal.h"
|
|
|
|
#include "nsThread.h"
|
|
|
|
|
2019-03-19 14:23:16 +03:00
|
|
|
/**
|
|
|
|
* Automatically cancel and abort synchronous LocalStorage requests (for example
|
|
|
|
* datastore preparation) if they take this long. We've chosen a value that is
|
|
|
|
* long enough that it is unlikely for the problem to be falsely triggered by
|
|
|
|
* slow system I/O. We've also chosen a value long enough so that automated
|
|
|
|
* tests should time out and fail if LocalStorage hangs. Also, this value is
|
|
|
|
* long enough so that testers can notice the (content process) hang; we want to
|
|
|
|
* know about the hangs, not hide them. On the other hand this value is less
|
|
|
|
* than 60 seconds which is used by nsTerminator to crash a hung main process.
|
|
|
|
*/
|
|
|
|
#define FAILSAFE_CANCEL_SYNC_OP_MS 50000
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
class RequestHelper;
|
|
|
|
|
|
|
|
StaticMutex gRequestHelperMutex;
|
2018-12-19 14:38:23 +03:00
|
|
|
nsISerialEventTarget* gSyncLoopEventTarget = nullptr;
|
|
|
|
/**
|
|
|
|
* Tracks whether a sync message has been received to the main thread but not
|
|
|
|
* yet processed. Used by RequestHelper logic to abort effectively synchronous
|
|
|
|
* calls if a sync IPC message is received which could result in deadlock.
|
|
|
|
* This is a boolean because, by definition, the parent can only send one sync
|
|
|
|
* message to the child at a time.
|
|
|
|
*/
|
|
|
|
bool gPendingSyncMessage = false;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Wrapper for the pushed event queue. The wrapper automatically dispatches
|
|
|
|
* runnables to the main thread when pushed event queue is no longer active.
|
|
|
|
* This exists because the event loop spinning can be aborted.
|
|
|
|
*/
|
|
|
|
class NestedEventTargetWrapper final : public nsISerialEventTarget {
|
|
|
|
nsCOMPtr<nsISerialEventTarget> mNestedEventTarget;
|
|
|
|
bool mDisconnected;
|
|
|
|
|
|
|
|
public:
|
|
|
|
explicit NestedEventTargetWrapper(nsISerialEventTarget* aNestedEventTarget)
|
|
|
|
: mNestedEventTarget(aNestedEventTarget), mDisconnected(false) {}
|
|
|
|
|
|
|
|
private:
|
|
|
|
~NestedEventTargetWrapper() {}
|
|
|
|
|
|
|
|
NS_DECL_THREADSAFE_ISUPPORTS
|
|
|
|
|
|
|
|
NS_DECL_NSIEVENTTARGET_FULL
|
|
|
|
};
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2018-11-05 22:04:39 +03:00
|
|
|
/**
|
|
|
|
* Main-thread helper that implements the blocking logic required by
|
|
|
|
* LocalStorage's synchronous semantics. StartAndReturnResponse pushes an
|
|
|
|
* event queue which is a new event target and spins its nested event loop until
|
|
|
|
* a result is received or an abort is necessary due to a PContent-managed sync
|
|
|
|
* IPC message being received. Note that because the event queue is its own
|
|
|
|
* event target, there is no re-entrancy. Normal main-thread runnables will not
|
|
|
|
* get a chance to run. See StartAndReturnResponse() for info on this choice.
|
|
|
|
*
|
|
|
|
* The normal life-cycle of this method looks like:
|
|
|
|
* - Main Thread: LSObject::DoRequestSynchronously creates a RequestHelper and
|
|
|
|
* invokes StartAndReturnResponse(). It pushes the event queue and Dispatches
|
|
|
|
* the RequestHelper to the DOM File Thread.
|
|
|
|
* - DOM File Thread: RequestHelper::Run is called, invoking Start() which
|
|
|
|
* invokes LSObject::StartRequest, which gets-or-creates the PBackground actor
|
|
|
|
* if necessary (which may dispatch a runnable to the nested event queue on
|
|
|
|
* the main thread), sends LSRequest constructor which is provided with a
|
|
|
|
* callback reference to the RequestHelper. State advances to ResponsePending.
|
|
|
|
* - DOM File Thread:: LSRequestChild::Recv__delete__ is received, which invokes
|
|
|
|
* RequestHelepr::OnResponse, advancing the state to Finishing and dispatching
|
|
|
|
* RequestHelper to its own nested event target.
|
|
|
|
* - Main Thread: RequestHelper::Run is called, invoking Finish() which advances
|
|
|
|
* the state to Complete and sets mWaiting to false, allowing the nested event
|
|
|
|
* loop being spun by StartAndReturnResponse to cease spinning and return the
|
|
|
|
* received response.
|
|
|
|
*
|
|
|
|
* See LocalStorageCommon.h for high-level context and method comments for
|
|
|
|
* low-level details.
|
|
|
|
*/
|
2018-11-29 23:47:20 +03:00
|
|
|
class RequestHelper final : public Runnable, public LSRequestChildCallback {
|
|
|
|
enum class State {
|
2018-11-05 22:04:39 +03:00
|
|
|
/**
|
|
|
|
* The RequestHelper has been created and dispatched to the DOM File Thread.
|
|
|
|
*/
|
2018-11-29 23:47:20 +03:00
|
|
|
Initial,
|
2018-11-05 22:04:39 +03:00
|
|
|
/**
|
|
|
|
* Start() has been invoked on the DOM File Thread and
|
|
|
|
* LSObject::StartRequest has been invoked from there, sending an IPC
|
|
|
|
* message to PBackground to service the request. We stay in this state
|
|
|
|
* until a response is received.
|
|
|
|
*/
|
2018-11-29 23:47:20 +03:00
|
|
|
ResponsePending,
|
2018-11-05 22:04:39 +03:00
|
|
|
/**
|
|
|
|
* A response has been received and RequestHelper has been dispatched back
|
|
|
|
* to the nested event loop to call Finish().
|
|
|
|
*/
|
2018-11-29 23:47:20 +03:00
|
|
|
Finishing,
|
2018-11-05 22:04:39 +03:00
|
|
|
/**
|
|
|
|
* Finish() has been called on the main thread. The nested event loop will
|
|
|
|
* terminate imminently and the received response returned to the caller of
|
|
|
|
* StartAndReturnResponse.
|
|
|
|
*/
|
2018-11-29 23:47:20 +03:00
|
|
|
Complete
|
|
|
|
};
|
|
|
|
|
2018-11-05 22:04:39 +03:00
|
|
|
// The object we are issuing a request on behalf of. Present because of the
|
|
|
|
// need to invoke LSObject::StartRequest off the main thread. Dropped on
|
|
|
|
// return to the main-thread in Finish().
|
2018-11-29 23:47:20 +03:00
|
|
|
RefPtr<LSObject> mObject;
|
2018-11-05 22:04:39 +03:00
|
|
|
// The thread the RequestHelper was created on. This should be the main
|
|
|
|
// thread.
|
2018-11-29 23:47:20 +03:00
|
|
|
nsCOMPtr<nsIEventTarget> mOwningEventTarget;
|
2018-11-05 22:04:39 +03:00
|
|
|
// The pushed event queue that we use to spin the event loop without
|
|
|
|
// processing any of the events dispatched at the mOwningEventTarget (which
|
|
|
|
// would result in re-entrancy and violate LocalStorage semantics).
|
2018-12-19 14:38:23 +03:00
|
|
|
nsCOMPtr<nsISerialEventTarget> mNestedEventTarget;
|
|
|
|
// The wrapper for the pushed event queue. The wrapper automatically
|
|
|
|
// dispatches runnables to the main thread when pushed event queue is no
|
|
|
|
// longer active. This exists because the event loop spinning can be aborted.
|
|
|
|
nsCOMPtr<nsISerialEventTarget> mNestedEventTargetWrapper;
|
2018-11-05 22:04:39 +03:00
|
|
|
// The IPC actor handling the request with standard IPC allocation rules.
|
|
|
|
// Our reference is nulled in OnResponse which corresponds to the actor's
|
|
|
|
// __destroy__ method.
|
2018-11-29 23:47:20 +03:00
|
|
|
LSRequestChild* mActor;
|
|
|
|
const LSRequestParams mParams;
|
|
|
|
LSRequestResponse mResponse;
|
|
|
|
nsresult mResultCode;
|
|
|
|
State mState;
|
2018-11-05 22:04:39 +03:00
|
|
|
// Control flag for the nested event loop; once set to false, the loop ends.
|
2018-11-29 23:47:20 +03:00
|
|
|
bool mWaiting;
|
2019-03-19 14:23:16 +03:00
|
|
|
bool mCancelled;
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
public:
|
|
|
|
RequestHelper(LSObject* aObject, const LSRequestParams& aParams)
|
|
|
|
: Runnable("dom::RequestHelper"),
|
|
|
|
mObject(aObject),
|
|
|
|
mOwningEventTarget(GetCurrentThreadEventTarget()),
|
|
|
|
mActor(nullptr),
|
|
|
|
mParams(aParams),
|
|
|
|
mResultCode(NS_OK),
|
|
|
|
mState(State::Initial),
|
2019-03-19 14:23:16 +03:00
|
|
|
mWaiting(true),
|
|
|
|
mCancelled(false) {}
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
bool IsOnOwningThread() const {
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mOwningEventTarget);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
bool current;
|
|
|
|
return NS_SUCCEEDED(mOwningEventTarget->IsOnCurrentThread(¤t)) &&
|
|
|
|
current;
|
|
|
|
}
|
|
|
|
|
|
|
|
void AssertIsOnOwningThread() const {
|
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
MOZ_ASSERT(IsOnOwningThread());
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult StartAndReturnResponse(LSRequestResponse& aResponse);
|
|
|
|
|
|
|
|
private:
|
2018-12-19 14:38:23 +03:00
|
|
|
~RequestHelper() {}
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
nsresult Start();
|
|
|
|
|
|
|
|
void Finish();
|
|
|
|
|
|
|
|
NS_DECL_ISUPPORTS_INHERITED
|
|
|
|
|
|
|
|
NS_DECL_NSIRUNNABLE
|
|
|
|
|
|
|
|
// LSRequestChildCallback
|
|
|
|
void OnResponse(const LSRequestResponse& aResponse) override;
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
LSObject::LSObject(nsPIDOMWindowInner* aWindow, nsIPrincipal* aPrincipal,
|
|
|
|
nsIPrincipal* aStoragePrincipal)
|
|
|
|
: Storage(aWindow, aPrincipal, aStoragePrincipal),
|
2018-11-29 23:47:45 +03:00
|
|
|
mPrivateBrowsingId(0),
|
2018-11-29 23:48:54 +03:00
|
|
|
mInExplicitSnapshot(false) {
|
2018-11-29 23:47:20 +03:00
|
|
|
AssertIsOnOwningThread();
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(NextGenLocalStorageEnabled());
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
LSObject::~LSObject() {
|
|
|
|
AssertIsOnOwningThread();
|
2018-11-29 23:47:45 +03:00
|
|
|
|
|
|
|
DropObserver();
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
2019-03-11 17:35:04 +03:00
|
|
|
// static
|
|
|
|
void LSObject::Initialize() {
|
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
|
|
|
|
nsCOMPtr<nsIEventTarget> domFileThread =
|
|
|
|
IPCBlobInputStreamThread::GetOrCreate();
|
|
|
|
if (NS_WARN_IF(!domFileThread)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
RefPtr<Runnable> runnable =
|
|
|
|
NS_NewRunnableFunction("LSObject::Initialize", []() {
|
|
|
|
AssertIsOnDOMFileThread();
|
|
|
|
|
|
|
|
PBackgroundChild* backgroundActor =
|
|
|
|
BackgroundChild::GetOrCreateForCurrentThread();
|
|
|
|
|
|
|
|
if (NS_WARN_IF(!backgroundActor)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
if (NS_WARN_IF(
|
|
|
|
NS_FAILED(domFileThread->Dispatch(runnable, NS_DISPATCH_NORMAL)))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
// static
|
2018-11-29 23:48:05 +03:00
|
|
|
nsresult LSObject::CreateForWindow(nsPIDOMWindowInner* aWindow,
|
|
|
|
Storage** aStorage) {
|
2018-11-29 23:47:20 +03:00
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(aWindow);
|
|
|
|
MOZ_ASSERT(aStorage);
|
|
|
|
MOZ_ASSERT(NextGenLocalStorageEnabled());
|
2019-05-27 17:06:49 +03:00
|
|
|
MOZ_ASSERT(StorageAllowedForWindow(aWindow) != StorageAccess::eDeny);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
nsCOMPtr<nsIScriptObjectPrincipal> sop = do_QueryInterface(aWindow);
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(sop);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
nsCOMPtr<nsIPrincipal> principal = sop->GetPrincipal();
|
|
|
|
if (NS_WARN_IF(!principal)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
nsCOMPtr<nsIPrincipal> storagePrincipal = sop->GetEffectiveStoragePrincipal();
|
|
|
|
if (NS_WARN_IF(!storagePrincipal)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:05 +03:00
|
|
|
if (nsContentUtils::IsSystemPrincipal(principal)) {
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:49:01 +03:00
|
|
|
// localStorage is not available on some pages on purpose, for example
|
|
|
|
// about:home. Match the old implementation by using GenerateOriginKey
|
|
|
|
// for the check.
|
2019-02-08 23:01:31 +03:00
|
|
|
nsCString originAttrSuffix;
|
|
|
|
nsCString originKey;
|
2019-05-14 08:49:46 +03:00
|
|
|
nsresult rv =
|
|
|
|
GenerateOriginKey(storagePrincipal, originAttrSuffix, originKey);
|
2018-11-29 23:49:01 +03:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:30 +03:00
|
|
|
nsAutoPtr<PrincipalInfo> principalInfo(new PrincipalInfo());
|
2018-11-29 23:49:01 +03:00
|
|
|
rv = PrincipalToPrincipalInfo(principal, principalInfo);
|
2018-11-29 23:47:30 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(principalInfo->type() == PrincipalInfo::TContentPrincipalInfo);
|
2018-11-29 23:47:30 +03:00
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
nsAutoPtr<PrincipalInfo> storagePrincipalInfo(new PrincipalInfo());
|
|
|
|
rv = PrincipalToPrincipalInfo(storagePrincipal, storagePrincipalInfo);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_ASSERT(storagePrincipalInfo->type() ==
|
|
|
|
PrincipalInfo::TContentPrincipalInfo);
|
|
|
|
|
|
|
|
if (NS_WARN_IF(!QuotaManager::IsPrincipalInfoValid(*storagePrincipalInfo))) {
|
2019-02-08 23:02:03 +03:00
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
2019-02-08 23:01:31 +03:00
|
|
|
nsCString suffix;
|
2018-11-29 23:47:45 +03:00
|
|
|
nsCString origin;
|
2019-05-14 08:49:46 +03:00
|
|
|
rv = QuotaManager::GetInfoFromPrincipal(storagePrincipal, &suffix, nullptr,
|
|
|
|
&origin);
|
2018-11-29 23:47:45 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(originAttrSuffix == suffix);
|
2019-02-08 23:01:31 +03:00
|
|
|
|
2018-11-29 23:47:45 +03:00
|
|
|
uint32_t privateBrowsingId;
|
2019-05-14 08:49:46 +03:00
|
|
|
rv = storagePrincipal->GetPrivateBrowsingId(&privateBrowsingId);
|
2018-11-29 23:47:45 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-02-08 23:02:14 +03:00
|
|
|
Maybe<ClientInfo> clientInfo = aWindow->GetClientInfo();
|
|
|
|
if (clientInfo.isNothing()) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
Maybe<nsID> clientId = Some(clientInfo.ref().Id());
|
|
|
|
|
2018-11-29 23:47:45 +03:00
|
|
|
nsString documentURI;
|
2019-01-02 16:05:23 +03:00
|
|
|
if (nsCOMPtr<Document> doc = aWindow->GetExtantDoc()) {
|
2018-11-29 23:47:45 +03:00
|
|
|
rv = doc->GetDocumentURI(documentURI);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
RefPtr<LSObject> object = new LSObject(aWindow, principal, storagePrincipal);
|
2018-11-29 23:47:30 +03:00
|
|
|
object->mPrincipalInfo = std::move(principalInfo);
|
2019-05-14 08:49:46 +03:00
|
|
|
object->mStoragePrincipalInfo = std::move(storagePrincipalInfo);
|
2018-11-29 23:47:45 +03:00
|
|
|
object->mPrivateBrowsingId = privateBrowsingId;
|
2019-02-08 23:02:14 +03:00
|
|
|
object->mClientId = clientId;
|
2018-11-29 23:47:45 +03:00
|
|
|
object->mOrigin = origin;
|
2019-02-08 23:01:31 +03:00
|
|
|
object->mOriginKey = originKey;
|
2018-11-29 23:47:45 +03:00
|
|
|
object->mDocumentURI = documentURI;
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
object.forget(aStorage);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:05 +03:00
|
|
|
// static
|
|
|
|
nsresult LSObject::CreateForPrincipal(nsPIDOMWindowInner* aWindow,
|
|
|
|
nsIPrincipal* aPrincipal,
|
2019-05-14 08:49:46 +03:00
|
|
|
nsIPrincipal* aStoragePrincipal,
|
2018-11-29 23:48:05 +03:00
|
|
|
const nsAString& aDocumentURI,
|
|
|
|
bool aPrivate, LSObject** aObject) {
|
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(aPrincipal);
|
2019-05-14 08:49:46 +03:00
|
|
|
MOZ_ASSERT(aStoragePrincipal);
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(aObject);
|
2018-11-29 23:48:05 +03:00
|
|
|
|
2019-02-08 23:01:31 +03:00
|
|
|
nsCString originAttrSuffix;
|
|
|
|
nsCString originKey;
|
2019-05-14 08:49:46 +03:00
|
|
|
nsresult rv =
|
|
|
|
GenerateOriginKey(aStoragePrincipal, originAttrSuffix, originKey);
|
2018-11-29 23:49:01 +03:00
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:05 +03:00
|
|
|
nsAutoPtr<PrincipalInfo> principalInfo(new PrincipalInfo());
|
2018-11-29 23:49:01 +03:00
|
|
|
rv = PrincipalToPrincipalInfo(aPrincipal, principalInfo);
|
2018-11-29 23:48:05 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(principalInfo->type() == PrincipalInfo::TContentPrincipalInfo ||
|
|
|
|
principalInfo->type() == PrincipalInfo::TSystemPrincipalInfo);
|
2018-11-29 23:48:05 +03:00
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
nsAutoPtr<PrincipalInfo> storagePrincipalInfo(new PrincipalInfo());
|
|
|
|
rv = PrincipalToPrincipalInfo(aStoragePrincipal, storagePrincipalInfo);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_ASSERT(
|
|
|
|
storagePrincipalInfo->type() == PrincipalInfo::TContentPrincipalInfo ||
|
|
|
|
storagePrincipalInfo->type() == PrincipalInfo::TSystemPrincipalInfo);
|
|
|
|
|
|
|
|
if (NS_WARN_IF(!QuotaManager::IsPrincipalInfoValid(*storagePrincipalInfo))) {
|
2019-02-08 23:02:03 +03:00
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
2019-02-08 23:01:31 +03:00
|
|
|
nsCString suffix;
|
2018-11-29 23:48:05 +03:00
|
|
|
nsCString origin;
|
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
if (storagePrincipalInfo->type() == PrincipalInfo::TSystemPrincipalInfo) {
|
2019-02-08 23:01:31 +03:00
|
|
|
QuotaManager::GetInfoForChrome(&suffix, nullptr, &origin);
|
2018-11-29 23:48:05 +03:00
|
|
|
} else {
|
2019-02-08 23:01:31 +03:00
|
|
|
rv = QuotaManager::GetInfoFromPrincipal(aPrincipal, &suffix, nullptr,
|
2018-11-29 23:48:05 +03:00
|
|
|
&origin);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(originAttrSuffix == suffix);
|
2019-02-08 23:01:31 +03:00
|
|
|
|
2019-02-08 23:02:14 +03:00
|
|
|
Maybe<nsID> clientId;
|
|
|
|
if (aWindow) {
|
|
|
|
Maybe<ClientInfo> clientInfo = aWindow->GetClientInfo();
|
|
|
|
if (clientInfo.isNothing()) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
clientId = Some(clientInfo.ref().Id());
|
2019-06-03 16:32:59 +03:00
|
|
|
} else if (Preferences::GetBool("dom.storage.client_validation")) {
|
|
|
|
return NS_ERROR_FAILURE;
|
2019-02-08 23:02:14 +03:00
|
|
|
}
|
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
RefPtr<LSObject> object =
|
|
|
|
new LSObject(aWindow, aPrincipal, aStoragePrincipal);
|
2018-11-29 23:48:05 +03:00
|
|
|
object->mPrincipalInfo = std::move(principalInfo);
|
2019-05-14 08:49:46 +03:00
|
|
|
object->mStoragePrincipalInfo = std::move(storagePrincipalInfo);
|
2018-11-29 23:48:05 +03:00
|
|
|
object->mPrivateBrowsingId = aPrivate ? 1 : 0;
|
2019-02-08 23:02:14 +03:00
|
|
|
object->mClientId = clientId;
|
2018-11-29 23:48:05 +03:00
|
|
|
object->mOrigin = origin;
|
2019-02-08 23:01:31 +03:00
|
|
|
object->mOriginKey = originKey;
|
2018-11-29 23:48:05 +03:00
|
|
|
object->mDocumentURI = aDocumentURI;
|
|
|
|
|
|
|
|
object.forget(aObject);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:30 +03:00
|
|
|
// static
|
2018-12-19 14:38:23 +03:00
|
|
|
already_AddRefed<nsISerialEventTarget> LSObject::GetSyncLoopEventTarget() {
|
|
|
|
MOZ_ASSERT(XRE_IsParentProcess());
|
|
|
|
|
|
|
|
nsCOMPtr<nsISerialEventTarget> target;
|
2018-11-29 23:47:30 +03:00
|
|
|
|
|
|
|
{
|
|
|
|
StaticMutexAutoLock lock(gRequestHelperMutex);
|
2018-12-19 14:38:23 +03:00
|
|
|
target = gSyncLoopEventTarget;
|
2018-11-29 23:47:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return target.forget();
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
// static
|
2018-12-19 14:38:23 +03:00
|
|
|
void LSObject::OnSyncMessageReceived() {
|
|
|
|
nsCOMPtr<nsISerialEventTarget> target;
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
{
|
|
|
|
StaticMutexAutoLock lock(gRequestHelperMutex);
|
2018-12-19 14:38:23 +03:00
|
|
|
target = gSyncLoopEventTarget;
|
|
|
|
gPendingSyncMessage = true;
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
if (target) {
|
|
|
|
RefPtr<Runnable> runnable =
|
|
|
|
NS_NewRunnableFunction("LSObject::CheckFlagRunnable", []() {});
|
|
|
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(
|
|
|
|
target->Dispatch(runnable.forget(), NS_DISPATCH_NORMAL));
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
// static
|
|
|
|
void LSObject::OnSyncMessageHandled() {
|
|
|
|
StaticMutexAutoLock lock(gRequestHelperMutex);
|
|
|
|
gPendingSyncMessage = false;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
LSRequestChild* LSObject::StartRequest(nsIEventTarget* aMainEventTarget,
|
|
|
|
const LSRequestParams& aParams,
|
|
|
|
LSRequestChildCallback* aCallback) {
|
|
|
|
AssertIsOnDOMFileThread();
|
|
|
|
|
2019-03-11 17:35:04 +03:00
|
|
|
PBackgroundChild* backgroundActor =
|
|
|
|
XRE_IsParentProcess()
|
|
|
|
? BackgroundChild::GetOrCreateForCurrentThread(aMainEventTarget)
|
|
|
|
: BackgroundChild::GetForCurrentThread();
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(!backgroundActor)) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2019-10-07 00:05:45 +03:00
|
|
|
LSRequestChild* actor = new LSRequestChild();
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2019-10-07 00:05:45 +03:00
|
|
|
if (!backgroundActor->SendPBackgroundLSRequestConstructor(actor, aParams)) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Must set callback after calling SendPBackgroundLSRequestConstructor since
|
|
|
|
// it can be called synchronously when SendPBackgroundLSRequestConstructor
|
|
|
|
// fails.
|
|
|
|
actor->SetCallback(aCallback);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
return actor;
|
|
|
|
}
|
|
|
|
|
|
|
|
Storage::StorageType LSObject::Type() const {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
return eLocalStorage;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool LSObject::IsForkOf(const Storage* aStorage) const {
|
|
|
|
AssertIsOnOwningThread();
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(aStorage);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2018-11-29 23:47:45 +03:00
|
|
|
if (aStorage->Type() != eLocalStorage) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return static_cast<const LSObject*>(aStorage)->mOrigin == mOrigin;
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
int64_t LSObject::GetOriginQuotaUsage() const {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-05 22:04:39 +03:00
|
|
|
// It's not necessary to return an actual value here. This method is
|
|
|
|
// implemented only because the SessionStore currently needs it to cap the
|
|
|
|
// amount of data it persists to disk (via nsIDOMWindowUtils.getStorageUsage).
|
|
|
|
// Any callers that want to know about storage usage should be asking
|
|
|
|
// QuotaManager directly.
|
|
|
|
//
|
|
|
|
// Note: This may change as LocalStorage is repurposed to be the new
|
|
|
|
// SessionStorage backend.
|
2018-11-29 23:47:20 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t LSObject::GetLength(nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:52 +03:00
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t result;
|
2018-11-29 23:48:47 +03:00
|
|
|
rv = mDatabase->GetLength(this, &result);
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::Key(uint32_t aIndex, nsAString& aResult,
|
|
|
|
nsIPrincipal& aSubjectPrincipal, ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:52 +03:00
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsString result;
|
2018-11-29 23:48:47 +03:00
|
|
|
rv = mDatabase->GetKey(this, aIndex, result);
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
aResult = result;
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::GetItem(const nsAString& aKey, nsAString& aResult,
|
|
|
|
nsIPrincipal& aSubjectPrincipal, ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:52 +03:00
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsString result;
|
2018-11-29 23:48:47 +03:00
|
|
|
rv = mDatabase->GetItem(this, aKey, result);
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
aResult = result;
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::GetSupportedNames(nsTArray<nsString>& aNames) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:52 +03:00
|
|
|
if (!CanUseStorage(*nsContentUtils::SubjectPrincipal())) {
|
|
|
|
// Return just an empty array.
|
|
|
|
aNames.Clear();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:47 +03:00
|
|
|
rv = mDatabase->GetKeys(this, aNames);
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::SetItem(const nsAString& aKey, const nsAString& aValue,
|
|
|
|
nsIPrincipal& aSubjectPrincipal, ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:52 +03:00
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:55 +03:00
|
|
|
LSNotifyInfo info;
|
2018-11-29 23:48:47 +03:00
|
|
|
rv = mDatabase->SetItem(this, aKey, aValue, info);
|
|
|
|
if (rv == NS_ERROR_FILE_NO_DEVICE_SPACE) {
|
|
|
|
rv = NS_ERROR_DOM_QUOTA_EXCEEDED_ERR;
|
|
|
|
}
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
2018-11-29 23:47:55 +03:00
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info.changed()) {
|
|
|
|
OnChange(aKey, info.oldValue(), aValue);
|
2018-11-29 23:47:45 +03:00
|
|
|
}
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::RemoveItem(const nsAString& aKey,
|
|
|
|
nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:52 +03:00
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:55 +03:00
|
|
|
LSNotifyInfo info;
|
2018-11-29 23:48:47 +03:00
|
|
|
rv = mDatabase->RemoveItem(this, aKey, info);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
2018-11-29 23:47:55 +03:00
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info.changed()) {
|
|
|
|
OnChange(aKey, info.oldValue(), VoidString());
|
2018-11-29 23:47:45 +03:00
|
|
|
}
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::Clear(nsIPrincipal& aSubjectPrincipal, ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:52 +03:00
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:55 +03:00
|
|
|
LSNotifyInfo info;
|
2018-11-29 23:48:47 +03:00
|
|
|
rv = mDatabase->Clear(this, info);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
2018-11-29 23:47:55 +03:00
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info.changed()) {
|
2018-11-29 23:47:45 +03:00
|
|
|
OnChange(VoidString(), VoidString(), VoidString());
|
|
|
|
}
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:11 +03:00
|
|
|
void LSObject::Open(nsIPrincipal& aSubjectPrincipal, ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::Close(nsIPrincipal& aSubjectPrincipal, ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
DropDatabase();
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:54 +03:00
|
|
|
void LSObject::BeginExplicitSnapshot(nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mInExplicitSnapshot) {
|
|
|
|
aError.Throw(NS_ERROR_ALREADY_INITIALIZED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult rv = EnsureDatabase();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = mDatabase->BeginExplicitSnapshot(this);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
mInExplicitSnapshot = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::EndExplicitSnapshot(nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mInExplicitSnapshot) {
|
|
|
|
aError.Throw(NS_ERROR_NOT_INITIALIZED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult rv = EndExplicitSnapshotInternal();
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
aError.Throw(rv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-02 09:00:25 +03:00
|
|
|
bool LSObject::GetHasActiveSnapshot(nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
if (!CanUseStorage(aSubjectPrincipal)) {
|
|
|
|
aError.Throw(NS_ERROR_DOM_SECURITY_ERR);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mDatabase && mDatabase->HasActiveSnapshot()) {
|
|
|
|
MOZ_ASSERT(!mDatabase->IsAllowedToClose());
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:24 +03:00
|
|
|
NS_IMPL_ADDREF_INHERITED(LSObject, Storage)
|
|
|
|
NS_IMPL_RELEASE_INHERITED(LSObject, Storage)
|
|
|
|
|
|
|
|
NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(LSObject)
|
|
|
|
NS_INTERFACE_MAP_END_INHERITING(Storage)
|
|
|
|
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_CLASS(LSObject)
|
|
|
|
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN_INHERITED(LSObject, Storage)
|
|
|
|
tmp->AssertIsOnOwningThread();
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
|
|
|
|
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN_INHERITED(LSObject, Storage)
|
|
|
|
tmp->AssertIsOnOwningThread();
|
|
|
|
tmp->DropDatabase();
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_UNLINK_END
|
|
|
|
|
2018-11-29 23:47:45 +03:00
|
|
|
nsresult LSObject::DoRequestSynchronously(const LSRequestParams& aParams,
|
|
|
|
LSRequestResponse& aResponse) {
|
|
|
|
// We don't need this yet, but once the request successfully finishes, it's
|
|
|
|
// too late to initialize PBackground child on the owning thread, because
|
|
|
|
// it can fail and parent would keep an extra strong ref to the datastore or
|
|
|
|
// observer.
|
|
|
|
PBackgroundChild* backgroundActor =
|
|
|
|
BackgroundChild::GetOrCreateForCurrentThread();
|
|
|
|
if (NS_WARN_IF(!backgroundActor)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
RefPtr<RequestHelper> helper = new RequestHelper(this, aParams);
|
|
|
|
|
|
|
|
// This will start and finish the request on the DOM File thread.
|
|
|
|
// The owning thread is synchronously blocked while the request is
|
|
|
|
// asynchronously processed on the DOM File thread.
|
|
|
|
nsresult rv = helper->StartAndReturnResponse(aResponse);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aResponse.type() == LSRequestResponse::Tnsresult) {
|
2018-11-29 23:48:38 +03:00
|
|
|
nsresult errorCode = aResponse.get_nsresult();
|
|
|
|
|
|
|
|
if (errorCode == NS_ERROR_FILE_NO_DEVICE_SPACE) {
|
|
|
|
errorCode = NS_ERROR_DOM_QUOTA_EXCEEDED_ERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return errorCode;
|
2018-11-29 23:47:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult LSObject::EnsureDatabase() {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:47:24 +03:00
|
|
|
if (mDatabase && !mDatabase->IsAllowedToClose()) {
|
2018-11-29 23:47:20 +03:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:41 +03:00
|
|
|
mDatabase = LSDatabase::Get(mOrigin);
|
2018-11-29 23:47:24 +03:00
|
|
|
|
2018-11-29 23:48:41 +03:00
|
|
|
if (mDatabase) {
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(!mDatabase->IsAllowedToClose());
|
2018-11-29 23:48:41 +03:00
|
|
|
return NS_OK;
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:41 +03:00
|
|
|
// We don't need this yet, but once the request successfully finishes, it's
|
|
|
|
// too late to initialize PBackground child on the owning thread, because
|
|
|
|
// it can fail and parent would keep an extra strong ref to the datastore.
|
|
|
|
PBackgroundChild* backgroundActor =
|
|
|
|
BackgroundChild::GetOrCreateForCurrentThread();
|
|
|
|
if (NS_WARN_IF(!backgroundActor)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
2018-11-29 23:47:45 +03:00
|
|
|
}
|
|
|
|
|
2019-02-08 23:02:11 +03:00
|
|
|
LSRequestCommonParams commonParams;
|
|
|
|
commonParams.principalInfo() = *mPrincipalInfo;
|
2019-05-14 08:49:46 +03:00
|
|
|
commonParams.storagePrincipalInfo() = *mStoragePrincipalInfo;
|
2019-02-08 23:02:11 +03:00
|
|
|
commonParams.originKey() = mOriginKey;
|
|
|
|
|
2019-02-08 23:02:14 +03:00
|
|
|
LSRequestPrepareDatastoreParams params;
|
|
|
|
params.commonParams() = commonParams;
|
|
|
|
params.clientId() = mClientId;
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
LSRequestResponse response;
|
|
|
|
|
2018-11-29 23:47:45 +03:00
|
|
|
nsresult rv = DoRequestSynchronously(params, response);
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(response.type() ==
|
|
|
|
LSRequestResponse::TLSRequestPrepareDatastoreResponse);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
const LSRequestPrepareDatastoreResponse& prepareDatastoreResponse =
|
|
|
|
response.get_LSRequestPrepareDatastoreResponse();
|
|
|
|
|
2019-02-08 23:02:11 +03:00
|
|
|
uint64_t datastoreId = prepareDatastoreResponse.datastoreId();
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
// The datastore is now ready on the parent side (prepared by the asynchronous
|
|
|
|
// request on the DOM File thread).
|
|
|
|
// Let's create a direct connection to the datastore (through a database
|
|
|
|
// actor) from the owning thread.
|
|
|
|
// Note that we now can't error out, otherwise parent will keep an extra
|
|
|
|
// strong reference to the datastore.
|
2018-11-29 23:47:45 +03:00
|
|
|
|
2018-11-29 23:48:41 +03:00
|
|
|
RefPtr<LSDatabase> database = new LSDatabase(mOrigin);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
LSDatabaseChild* actor = new LSDatabaseChild(database);
|
|
|
|
|
2018-11-29 23:48:41 +03:00
|
|
|
MOZ_ALWAYS_TRUE(backgroundActor->SendPBackgroundLSDatabaseConstructor(
|
2019-05-14 08:49:46 +03:00
|
|
|
actor, *mStoragePrincipalInfo, mPrivateBrowsingId, datastoreId));
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
database->SetActor(actor);
|
|
|
|
|
|
|
|
mDatabase = std::move(database);
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:24 +03:00
|
|
|
void LSObject::DropDatabase() {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2018-11-29 23:48:54 +03:00
|
|
|
if (mInExplicitSnapshot) {
|
|
|
|
nsresult rv = EndExplicitSnapshotInternal();
|
|
|
|
Unused << NS_WARN_IF(NS_FAILED(rv));
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:41 +03:00
|
|
|
mDatabase = nullptr;
|
2018-11-29 23:47:24 +03:00
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:45 +03:00
|
|
|
nsresult LSObject::EnsureObserver() {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
if (mObserver) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
mObserver = LSObserver::Get(mOrigin);
|
|
|
|
|
|
|
|
if (mObserver) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
LSRequestPrepareObserverParams params;
|
|
|
|
params.principalInfo() = *mPrincipalInfo;
|
2019-05-14 08:49:46 +03:00
|
|
|
params.storagePrincipalInfo() = *mStoragePrincipalInfo;
|
2019-02-08 23:02:14 +03:00
|
|
|
params.clientId() = mClientId;
|
2018-11-29 23:47:45 +03:00
|
|
|
|
|
|
|
LSRequestResponse response;
|
|
|
|
|
|
|
|
nsresult rv = DoRequestSynchronously(params, response);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(response.type() ==
|
|
|
|
LSRequestResponse::TLSRequestPrepareObserverResponse);
|
2018-11-29 23:47:45 +03:00
|
|
|
|
|
|
|
const LSRequestPrepareObserverResponse& prepareObserverResponse =
|
|
|
|
response.get_LSRequestPrepareObserverResponse();
|
|
|
|
|
|
|
|
uint64_t observerId = prepareObserverResponse.observerId();
|
|
|
|
|
|
|
|
// The obsserver is now ready on the parent side (prepared by the asynchronous
|
|
|
|
// request on the DOM File thread).
|
|
|
|
// Let's create a direct connection to the observer (through an observer
|
|
|
|
// actor) from the owning thread.
|
|
|
|
// Note that we now can't error out, otherwise parent will keep an extra
|
|
|
|
// strong reference to the observer.
|
|
|
|
|
|
|
|
PBackgroundChild* backgroundActor = BackgroundChild::GetForCurrentThread();
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(backgroundActor);
|
2018-11-29 23:47:45 +03:00
|
|
|
|
|
|
|
RefPtr<LSObserver> observer = new LSObserver(mOrigin);
|
|
|
|
|
|
|
|
LSObserverChild* actor = new LSObserverChild(observer);
|
|
|
|
|
|
|
|
MOZ_ALWAYS_TRUE(
|
|
|
|
backgroundActor->SendPBackgroundLSObserverConstructor(actor, observerId));
|
|
|
|
|
|
|
|
observer->SetActor(actor);
|
|
|
|
|
|
|
|
mObserver = std::move(observer);
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::DropObserver() {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
if (mObserver) {
|
|
|
|
mObserver = nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void LSObject::OnChange(const nsAString& aKey, const nsAString& aOldValue,
|
|
|
|
const nsAString& aNewValue) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
2019-05-14 08:49:46 +03:00
|
|
|
NotifyChange(/* aStorage */ this, StoragePrincipal(), aKey, aOldValue,
|
|
|
|
aNewValue, /* aStorageType */ kLocalStorageType, mDocumentURI,
|
2018-11-29 23:47:45 +03:00
|
|
|
/* aIsPrivate */ !!mPrivateBrowsingId,
|
|
|
|
/* aImmediateDispatch */ false);
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:48:54 +03:00
|
|
|
nsresult LSObject::EndExplicitSnapshotInternal() {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
// Can be only called if the mInExplicitSnapshot flag is true.
|
|
|
|
// An explicit snapshot must have been created.
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mInExplicitSnapshot);
|
2018-11-29 23:48:54 +03:00
|
|
|
|
|
|
|
// If an explicit snapshot have been created then mDatabase must be not null.
|
|
|
|
// DropDatabase could be called in the meatime, but that would set
|
|
|
|
// mInExplicitSnapshot to false. EnsureDatabase could be called in the
|
|
|
|
// meantime too, but that can't set mDatabase to null or to a new value. See
|
|
|
|
// the comment below.
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mDatabase);
|
2018-11-29 23:48:54 +03:00
|
|
|
|
|
|
|
// Existence of a snapshot prevents the database from allowing to close. See
|
|
|
|
// LSDatabase::RequestAllowToClose and LSDatabase::NoteFinishedSnapshot.
|
|
|
|
// If the database is not allowed to close then mDatabase could not have been
|
|
|
|
// nulled out or set to a new value. See EnsureDatabase.
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(!mDatabase->IsAllowedToClose());
|
2018-11-29 23:48:54 +03:00
|
|
|
|
|
|
|
nsresult rv = mDatabase->EndExplicitSnapshot(this);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
mInExplicitSnapshot = false;
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:24 +03:00
|
|
|
void LSObject::LastRelease() {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
DropDatabase();
|
|
|
|
}
|
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
NS_IMPL_ISUPPORTS(NestedEventTargetWrapper, nsIEventTarget,
|
|
|
|
nsISerialEventTarget);
|
|
|
|
|
|
|
|
NS_IMETHODIMP_(bool)
|
|
|
|
NestedEventTargetWrapper::IsOnCurrentThreadInfallible() {
|
|
|
|
MOZ_CRASH(
|
|
|
|
"IsOnCurrentThreadInfallible should never be called on "
|
|
|
|
"NestedEventTargetWrapper");
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
NestedEventTargetWrapper::IsOnCurrentThread(bool* aResult) {
|
|
|
|
MOZ_CRASH(
|
|
|
|
"IsOnCurrentThread should never be called on "
|
|
|
|
"NestedEventTargetWrapper");
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
NestedEventTargetWrapper::Dispatch(already_AddRefed<nsIRunnable> aEvent,
|
|
|
|
uint32_t aFlags) {
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mNestedEventTarget);
|
2018-12-19 14:38:23 +03:00
|
|
|
|
|
|
|
if (mDisconnected) {
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(NS_DispatchToMainThread(std::move(aEvent), aFlags));
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIRunnable> event(aEvent);
|
|
|
|
|
|
|
|
nsresult rv = mNestedEventTarget->Dispatch(event, aFlags);
|
|
|
|
if (rv == NS_ERROR_UNEXPECTED) {
|
|
|
|
mDisconnected = true;
|
|
|
|
|
|
|
|
// Dispatch leaked the event object on the NS_ERROR_UNEXPECTED failure, so
|
|
|
|
// we explicitly release this object once for that.
|
|
|
|
event.get()->Release();
|
|
|
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(NS_DispatchToMainThread(event.forget(), aFlags));
|
|
|
|
} else if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
NestedEventTargetWrapper::DispatchFromScript(nsIRunnable* aEvent,
|
|
|
|
uint32_t aFlags) {
|
|
|
|
MOZ_CRASH(
|
|
|
|
"DispatchFromScript should never be called on "
|
|
|
|
"NestedEventTargetWrapper");
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
NestedEventTargetWrapper::DelayedDispatch(already_AddRefed<nsIRunnable> aEvent,
|
|
|
|
uint32_t aDelayMs) {
|
|
|
|
MOZ_CRASH(
|
|
|
|
"DelayedDispatch should never be called on "
|
|
|
|
"NestedEventTargetWrapper");
|
|
|
|
}
|
|
|
|
|
2018-11-29 23:47:20 +03:00
|
|
|
nsresult RequestHelper::StartAndReturnResponse(LSRequestResponse& aResponse) {
|
|
|
|
AssertIsOnOwningThread();
|
|
|
|
|
|
|
|
// Normally, we would use the standard way of blocking the thread using
|
|
|
|
// a monitor.
|
|
|
|
// The problem is that BackgroundChild::GetOrCreateForCurrentThread()
|
|
|
|
// called on the DOM File thread may dispatch a runnable to the main
|
|
|
|
// thread to finish initialization of PBackground. A monitor would block
|
|
|
|
// the main thread and the runnable would never get executed causing the
|
|
|
|
// helper to be stuck in a wait loop.
|
|
|
|
// However, BackgroundChild::GetOrCreateForCurrentThread() supports passing
|
|
|
|
// a custom main event target, so we can create a nested event target and
|
|
|
|
// spin the event loop. Nothing can dispatch to the nested event target
|
|
|
|
// except BackgroundChild::GetOrCreateForCurrentThread(), so spinning of the
|
|
|
|
// event loop can't fire any other events.
|
|
|
|
// This way the thread is synchronously blocked in a safe manner and the
|
|
|
|
// runnable gets executed.
|
|
|
|
{
|
|
|
|
auto thread = static_cast<nsThread*>(NS_GetCurrentThread());
|
|
|
|
|
2019-03-06 19:26:07 +03:00
|
|
|
const nsLocalExecutionGuard localExecution(thread->EnterLocalExecution());
|
|
|
|
mNestedEventTarget = localExecution.GetEventTarget();
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mNestedEventTarget);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
mNestedEventTargetWrapper =
|
|
|
|
new NestedEventTargetWrapper(mNestedEventTarget);
|
|
|
|
|
2019-03-11 17:35:04 +03:00
|
|
|
nsCOMPtr<nsIEventTarget> domFileThread =
|
|
|
|
XRE_IsParentProcess() ? IPCBlobInputStreamThread::GetOrCreate()
|
|
|
|
: IPCBlobInputStreamThread::Get();
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(!domFileThread)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
nsresult rv;
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
{
|
|
|
|
{
|
|
|
|
StaticMutexAutoLock lock(gRequestHelperMutex);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2019-08-21 23:24:00 +03:00
|
|
|
if (StaticPrefs::dom_storage_abort_on_sync_parent_to_child_messages() &&
|
|
|
|
NS_WARN_IF(gPendingSyncMessage)) {
|
2018-12-19 14:38:23 +03:00
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
gSyncLoopEventTarget = mNestedEventTargetWrapper;
|
|
|
|
}
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
auto autoClearSyncLoopEventTarget = mozilla::MakeScopeExit([&] {
|
|
|
|
StaticMutexAutoLock lock(gRequestHelperMutex);
|
|
|
|
gSyncLoopEventTarget = nullptr;
|
|
|
|
});
|
2018-11-29 23:47:20 +03:00
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
rv = domFileThread->Dispatch(this, NS_DISPATCH_NORMAL);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-03-19 14:23:16 +03:00
|
|
|
nsCOMPtr<nsITimer> timer = NS_NewTimer();
|
|
|
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(timer->SetTarget(mNestedEventTarget));
|
|
|
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(timer->InitWithNamedFuncCallback(
|
|
|
|
[](nsITimer* aTimer, void* aClosure) {
|
|
|
|
auto helper = static_cast<RequestHelper*>(aClosure);
|
|
|
|
|
|
|
|
helper->mCancelled = true;
|
|
|
|
},
|
|
|
|
this, FAILSAFE_CANCEL_SYNC_OP_MS, nsITimer::TYPE_ONE_SHOT,
|
|
|
|
"RequestHelper::StartAndReturnResponse::SpinEventLoopTimer"));
|
|
|
|
|
2019-02-08 23:01:31 +03:00
|
|
|
MOZ_ALWAYS_TRUE(SpinEventLoopUntil(
|
|
|
|
[&]() {
|
2019-03-19 14:23:16 +03:00
|
|
|
if (mCancelled) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-02-08 23:01:31 +03:00
|
|
|
if (!mWaiting) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
StaticMutexAutoLock lock(gRequestHelperMutex);
|
2019-08-21 23:24:00 +03:00
|
|
|
if (StaticPrefs::
|
|
|
|
dom_storage_abort_on_sync_parent_to_child_messages() &&
|
|
|
|
NS_WARN_IF(gPendingSyncMessage)) {
|
2019-02-08 23:01:31 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
},
|
|
|
|
thread));
|
2019-03-19 14:23:16 +03:00
|
|
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(timer->Cancel());
|
2018-12-19 14:38:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// If mWaiting is still set to true, it means that the event loop spinning
|
|
|
|
// was aborted and we need to cancel the request in the parent since we
|
|
|
|
// don't care about the result anymore.
|
|
|
|
// We can check mWaiting here because it's only ever touched on the main
|
|
|
|
// thread.
|
|
|
|
if (NS_WARN_IF(mWaiting)) {
|
|
|
|
// Don't touch mResponse, mResultCode or mState here! The DOM File Thread
|
|
|
|
// may be accessing them at the same moment.
|
|
|
|
|
|
|
|
RefPtr<RequestHelper> self = this;
|
|
|
|
|
|
|
|
RefPtr<Runnable> runnable =
|
|
|
|
NS_NewRunnableFunction("RequestHelper::SendCancelRunnable", [self]() {
|
|
|
|
LSRequestChild* actor = self->mActor;
|
|
|
|
|
|
|
|
// Start() could fail or it hasn't had a chance to run yet, so we
|
|
|
|
// need to check if actor is not null.
|
|
|
|
// The actor can also be in the final (finishing) state, in that
|
|
|
|
// case we are not allowed to send the cancel message and it
|
|
|
|
// wouldn't make sense because the request is about to be destroyed
|
|
|
|
// anyway.
|
|
|
|
if (actor && !actor->Finishing()) {
|
|
|
|
actor->SendCancel();
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
rv = domFileThread->Dispatch(runnable, NS_DISPATCH_NORMAL);
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
2019-03-06 19:26:07 +03:00
|
|
|
// localExecution will be destructed when we leave this scope. If the event
|
|
|
|
// loop spinning was aborted and other threads dispatched new runnables to
|
|
|
|
// the nested event queue, they will be moved to the main event queue here
|
|
|
|
// and later asynchronusly processed. So nothing will be lost.
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
if (NS_WARN_IF(NS_FAILED(mResultCode))) {
|
|
|
|
return mResultCode;
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
2018-12-19 14:38:23 +03:00
|
|
|
aResponse = std::move(mResponse);
|
2018-11-29 23:47:20 +03:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult RequestHelper::Start() {
|
|
|
|
AssertIsOnDOMFileThread();
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mState == State::Initial);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
mState = State::ResponsePending;
|
|
|
|
|
|
|
|
LSRequestChild* actor =
|
2018-12-19 14:38:23 +03:00
|
|
|
mObject->StartRequest(mNestedEventTargetWrapper, mParams, this);
|
2018-11-29 23:47:20 +03:00
|
|
|
if (NS_WARN_IF(!actor)) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
mActor = actor;
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
void RequestHelper::Finish() {
|
|
|
|
AssertIsOnOwningThread();
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mState == State::Finishing);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
mObject = nullptr;
|
|
|
|
|
|
|
|
mWaiting = false;
|
|
|
|
|
|
|
|
mState = State::Complete;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS_INHERITED0(RequestHelper, Runnable)
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
RequestHelper::Run() {
|
|
|
|
nsresult rv;
|
|
|
|
|
|
|
|
switch (mState) {
|
|
|
|
case State::Initial:
|
|
|
|
rv = Start();
|
|
|
|
break;
|
|
|
|
|
|
|
|
case State::Finishing:
|
|
|
|
Finish();
|
|
|
|
return NS_OK;
|
|
|
|
|
|
|
|
default:
|
|
|
|
MOZ_CRASH("Bad state!");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv)) && mState != State::Finishing) {
|
|
|
|
if (NS_SUCCEEDED(mResultCode)) {
|
|
|
|
mResultCode = rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
mState = State::Finishing;
|
|
|
|
|
|
|
|
if (IsOnOwningThread()) {
|
|
|
|
Finish();
|
|
|
|
} else {
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(
|
2018-12-19 14:38:23 +03:00
|
|
|
mNestedEventTargetWrapper->Dispatch(this, NS_DISPATCH_NORMAL));
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
void RequestHelper::OnResponse(const LSRequestResponse& aResponse) {
|
|
|
|
AssertIsOnDOMFileThread();
|
2019-04-04 04:45:08 +03:00
|
|
|
MOZ_ASSERT(mState == State::ResponsePending);
|
2018-11-29 23:47:20 +03:00
|
|
|
|
|
|
|
mActor = nullptr;
|
|
|
|
|
|
|
|
mResponse = aResponse;
|
|
|
|
|
|
|
|
mState = State::Finishing;
|
2018-12-19 14:38:23 +03:00
|
|
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(
|
|
|
|
mNestedEventTargetWrapper->Dispatch(this, NS_DISPATCH_NORMAL));
|
2018-11-29 23:47:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace dom
|
|
|
|
} // namespace mozilla
|