2014-07-09 12:37:58 +04:00
|
|
|
/* jshint moz: true, esnext: true */
|
2013-03-29 07:49:41 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
"use strict";
|
|
|
|
|
|
|
|
const Cc = Components.classes;
|
|
|
|
const Ci = Components.interfaces;
|
|
|
|
const Cu = Components.utils;
|
2013-03-29 07:49:41 +04:00
|
|
|
const Cr = Components.results;
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2016-03-05 02:48:09 +03:00
|
|
|
Cu.import("resource://gre/modules/AppConstants.jsm");
|
2013-04-15 23:45:37 +04:00
|
|
|
Cu.import("resource://gre/modules/Preferences.jsm");
|
2014-03-18 18:16:02 +04:00
|
|
|
Cu.import("resource://gre/modules/Promise.jsm");
|
2016-03-05 02:48:09 +03:00
|
|
|
Cu.import("resource://gre/modules/Services.jsm");
|
|
|
|
Cu.import("resource://gre/modules/Timer.jsm");
|
|
|
|
Cu.import("resource://gre/modules/XPCOMUtils.jsm");
|
2013-06-13 04:26:44 +04:00
|
|
|
|
2015-09-17 15:08:50 +03:00
|
|
|
const {PushCrypto} = Cu.import("resource://gre/modules/PushCrypto.jsm");
|
2016-03-05 02:48:09 +03:00
|
|
|
const {PushDB} = Cu.import("resource://gre/modules/PushDB.jsm");
|
2014-06-09 08:32:00 +04:00
|
|
|
|
2016-03-05 02:48:09 +03:00
|
|
|
const CONNECTION_PROTOCOLS = (function() {
|
|
|
|
if ('android' != AppConstants.MOZ_WIDGET_TOOLKIT) {
|
|
|
|
const {PushServiceWebSocket} = Cu.import("resource://gre/modules/PushServiceWebSocket.jsm");
|
|
|
|
const {PushServiceHttp2} = Cu.import("resource://gre/modules/PushServiceHttp2.jsm");
|
|
|
|
return [PushServiceWebSocket, PushServiceHttp2];
|
|
|
|
} else {
|
|
|
|
const {PushServiceAndroidGCM} = Cu.import("resource://gre/modules/PushServiceAndroidGCM.jsm");
|
|
|
|
return [PushServiceAndroidGCM];
|
|
|
|
}
|
|
|
|
})();
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2016-01-14 08:24:37 +03:00
|
|
|
XPCOMUtils.defineLazyServiceGetter(this, "gPushNotifier",
|
|
|
|
"@mozilla.org/push/Notifier;1",
|
|
|
|
"nsIPushNotifier");
|
|
|
|
|
2016-03-28 23:33:20 +03:00
|
|
|
XPCOMUtils.defineLazyGetter(this, "gDOMBundle", () =>
|
|
|
|
Services.strings.createBundle("chrome://global/locale/dom/dom.properties"));
|
|
|
|
|
2013-05-02 09:15:18 +04:00
|
|
|
this.EXPORTED_SYMBOLS = ["PushService"];
|
|
|
|
|
2015-11-10 00:58:32 +03:00
|
|
|
XPCOMUtils.defineLazyGetter(this, "console", () => {
|
|
|
|
let {ConsoleAPI} = Cu.import("resource://gre/modules/Console.jsm", {});
|
|
|
|
return new ConsoleAPI({
|
|
|
|
maxLogLevelPref: "dom.push.loglevel",
|
|
|
|
prefix: "PushService",
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2015-04-11 06:19:28 +03:00
|
|
|
const prefs = new Preferences("dom.push.");
|
2013-04-09 22:02:00 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
const PUSH_SERVICE_UNINIT = 0;
|
|
|
|
const PUSH_SERVICE_INIT = 1; // No serverURI
|
|
|
|
const PUSH_SERVICE_ACTIVATING = 2;//activating db
|
|
|
|
const PUSH_SERVICE_CONNECTION_DISABLE = 3;
|
|
|
|
const PUSH_SERVICE_ACTIVE_OFFLINE = 4;
|
|
|
|
const PUSH_SERVICE_RUNNING = 5;
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-09-16 20:28:17 +03:00
|
|
|
// Telemetry failure to send push notification to Service Worker reasons.
|
|
|
|
// Key not found in local database.
|
|
|
|
const kDROP_NOTIFICATION_REASON_KEY_NOT_FOUND = 0;
|
|
|
|
// User cleared history.
|
|
|
|
const kDROP_NOTIFICATION_REASON_NO_HISTORY = 1;
|
|
|
|
// Version of message received not newer than previous one.
|
|
|
|
const kDROP_NOTIFICATION_REASON_NO_VERSION_INCREMENT = 2;
|
|
|
|
// Subscription has expired.
|
|
|
|
const kDROP_NOTIFICATION_REASON_EXPIRED = 3;
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
/**
|
|
|
|
* State is change only in couple of functions:
|
|
|
|
* init - change state to PUSH_SERVICE_INIT if state was PUSH_SERVICE_UNINIT
|
|
|
|
* changeServerURL - change state to PUSH_SERVICE_ACTIVATING if serverURL
|
|
|
|
* present or PUSH_SERVICE_INIT if not present.
|
|
|
|
* changeStateConnectionEnabledEvent - it is call on pref change or during
|
|
|
|
* the service activation and it can
|
|
|
|
* change state to
|
|
|
|
* PUSH_SERVICE_CONNECTION_DISABLE
|
|
|
|
* changeStateOfflineEvent - it is called when offline state changes or during
|
|
|
|
* the service activation and it change state to
|
|
|
|
* PUSH_SERVICE_ACTIVE_OFFLINE or
|
|
|
|
* PUSH_SERVICE_RUNNING.
|
|
|
|
* uninit - change state to PUSH_SERVICE_UNINIT.
|
|
|
|
**/
|
|
|
|
|
|
|
|
// This is for starting and stopping service.
|
|
|
|
const STARTING_SERVICE_EVENT = 0;
|
|
|
|
const CHANGING_SERVICE_EVENT = 1;
|
|
|
|
const STOPPING_SERVICE_EVENT = 2;
|
|
|
|
const UNINIT_EVENT = 3;
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2016-03-16 12:53:13 +03:00
|
|
|
/**
|
|
|
|
* Annotates an error with an XPCOM result code. We use this helper
|
|
|
|
* instead of `Components.Exception` because the latter can assert in
|
|
|
|
* `nsXPCComponents_Exception::HasInstance` when inspected at shutdown.
|
|
|
|
*/
|
|
|
|
function errorWithResult(message, result = Cr.NS_ERROR_FAILURE) {
|
|
|
|
let error = new Error(message);
|
|
|
|
error.result = result;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2013-05-02 09:15:18 +04:00
|
|
|
/**
|
2015-06-03 15:05:00 +03:00
|
|
|
* The implementation of the push system. It uses WebSockets
|
|
|
|
* (PushServiceWebSocket) to communicate with the server and PushDB (IndexedDB)
|
|
|
|
* for persistence.
|
2013-05-02 09:15:18 +04:00
|
|
|
*/
|
|
|
|
this.PushService = {
|
2015-06-03 15:04:00 +03:00
|
|
|
_service: null,
|
2015-06-03 15:05:00 +03:00
|
|
|
_state: PUSH_SERVICE_UNINIT,
|
|
|
|
_db: null,
|
|
|
|
_options: null,
|
2015-11-17 08:33:11 +03:00
|
|
|
_visibleNotifications: new Map(),
|
|
|
|
|
|
|
|
// Callback that is called after attempting to
|
|
|
|
// reduce the quota for a record. Used for testing purposes.
|
|
|
|
_updateQuotaTestCallback: null,
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2016-03-16 20:03:02 +03:00
|
|
|
// Set of timeout ID of tasks to reduce quota.
|
|
|
|
_updateQuotaTimeouts: new Set(),
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
// When serverURI changes (this is used for testing), db is cleaned up and a
|
|
|
|
// a new db is started. This events must be sequential.
|
2015-10-20 02:33:00 +03:00
|
|
|
_stateChangeProcessQueue: null,
|
|
|
|
_stateChangeProcessEnqueue: function(op) {
|
|
|
|
if (!this._stateChangeProcessQueue) {
|
|
|
|
this._stateChangeProcessQueue = Promise.resolve();
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessQueue = this._stateChangeProcessQueue
|
2016-03-22 04:07:16 +03:00
|
|
|
.then(op)
|
|
|
|
.catch(error => {
|
|
|
|
console.error(
|
|
|
|
"stateChangeProcessEnqueue: Error transitioning state", error);
|
|
|
|
return this._shutdownService();
|
|
|
|
})
|
|
|
|
.catch(error => {
|
|
|
|
console.error(
|
|
|
|
"stateChangeProcessEnqueue: Error shutting down service", error);
|
|
|
|
});
|
2016-04-08 21:39:00 +03:00
|
|
|
return this._stateChangeProcessQueue;
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
// Pending request. If a worker try to register for the same scope again, do
|
|
|
|
// not send a new registration request. Therefore we need queue of pending
|
|
|
|
// register requests. This is the list of scopes which pending registration.
|
|
|
|
_pendingRegisterRequest: {},
|
|
|
|
_notifyActivated: null,
|
|
|
|
_activated: null,
|
|
|
|
_checkActivated: function() {
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVATING) {
|
2015-11-10 00:58:50 +03:00
|
|
|
return Promise.reject(new Error("Push service not active"));
|
2015-06-03 15:05:00 +03:00
|
|
|
} else if (this._state > PUSH_SERVICE_ACTIVATING) {
|
|
|
|
return Promise.resolve();
|
|
|
|
} else {
|
|
|
|
return (this._activated) ? this._activated :
|
|
|
|
this._activated = new Promise((res, rej) =>
|
|
|
|
this._notifyActivated = {resolve: res,
|
|
|
|
reject: rej});
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-06-24 23:34:54 +03:00
|
|
|
_makePendingKey: function(aPageRecord) {
|
|
|
|
return aPageRecord.scope + "|" + aPageRecord.originAttributes;
|
|
|
|
},
|
|
|
|
|
|
|
|
_lookupOrPutPendingRequest: function(aPageRecord) {
|
|
|
|
let key = this._makePendingKey(aPageRecord);
|
|
|
|
if (this._pendingRegisterRequest[key]) {
|
|
|
|
return this._pendingRegisterRequest[key];
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._pendingRegisterRequest[key] = this._registerWithServer(aPageRecord);
|
|
|
|
},
|
|
|
|
|
|
|
|
_deletePendingRequest: function(aPageRecord) {
|
|
|
|
let key = this._makePendingKey(aPageRecord);
|
|
|
|
if (this._pendingRegisterRequest[key]) {
|
|
|
|
delete this._pendingRegisterRequest[key];
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
_setState: function(aNewState) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("setState()", "new state", aNewState, "old state", this._state);
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state == aNewState) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this._state == PUSH_SERVICE_ACTIVATING) {
|
|
|
|
// It is not important what is the new state as soon as we leave
|
|
|
|
// PUSH_SERVICE_ACTIVATING
|
|
|
|
if (this._notifyActivated) {
|
|
|
|
if (aNewState < PUSH_SERVICE_ACTIVATING) {
|
2015-11-10 00:58:50 +03:00
|
|
|
this._notifyActivated.reject(new Error("Push service not active"));
|
2015-06-03 15:05:00 +03:00
|
|
|
} else {
|
|
|
|
this._notifyActivated.resolve();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
this._notifyActivated = null;
|
|
|
|
this._activated = null;
|
|
|
|
}
|
|
|
|
this._state = aNewState;
|
|
|
|
},
|
|
|
|
|
|
|
|
_changeStateOfflineEvent: function(offline, calledFromConnEnabledEvent) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("changeStateOfflineEvent()", offline);
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVE_OFFLINE &&
|
|
|
|
this._state != PUSH_SERVICE_ACTIVATING &&
|
|
|
|
!calledFromConnEnabledEvent) {
|
2016-03-22 04:07:16 +03:00
|
|
|
return Promise.resolve();
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (offline) {
|
|
|
|
if (this._state == PUSH_SERVICE_RUNNING) {
|
|
|
|
this._service.disconnect();
|
|
|
|
}
|
|
|
|
this._setState(PUSH_SERVICE_ACTIVE_OFFLINE);
|
2016-03-22 04:07:16 +03:00
|
|
|
return Promise.resolve();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this._state == PUSH_SERVICE_RUNNING) {
|
|
|
|
// PushService was not in the offline state, but got notification to
|
|
|
|
// go online (a offline notification has not been sent).
|
|
|
|
// Disconnect first.
|
|
|
|
this._service.disconnect();
|
2016-04-07 15:22:33 +03:00
|
|
|
}
|
2016-03-22 04:07:16 +03:00
|
|
|
return this.getAllUnexpired().then(records => {
|
|
|
|
this._setState(PUSH_SERVICE_RUNNING);
|
|
|
|
if (records.length > 0) {
|
|
|
|
// if there are request waiting
|
|
|
|
this._service.connect(records);
|
|
|
|
}
|
|
|
|
});
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
_changeStateConnectionEnabledEvent: function(enabled) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("changeStateConnectionEnabledEvent()", enabled);
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_CONNECTION_DISABLE &&
|
|
|
|
this._state != PUSH_SERVICE_ACTIVATING) {
|
2016-03-22 04:07:16 +03:00
|
|
|
return Promise.resolve();
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (enabled) {
|
2016-03-22 04:07:16 +03:00
|
|
|
return this._changeStateOfflineEvent(Services.io.offline, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this._state == PUSH_SERVICE_RUNNING) {
|
|
|
|
this._service.disconnect();
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
2016-03-22 04:07:16 +03:00
|
|
|
this._setState(PUSH_SERVICE_CONNECTION_DISABLE);
|
|
|
|
return Promise.resolve();
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
2015-06-03 15:04:00 +03:00
|
|
|
|
2016-03-18 03:11:22 +03:00
|
|
|
// Used for testing.
|
|
|
|
changeTestServer(url, options = {}) {
|
|
|
|
console.debug("changeTestServer()");
|
|
|
|
|
2016-04-08 21:39:00 +03:00
|
|
|
return this._stateChangeProcessEnqueue(_ => {
|
2016-03-18 03:11:22 +03:00
|
|
|
if (this._state < PUSH_SERVICE_ACTIVATING) {
|
|
|
|
console.debug("changeTestServer: PushService not activated?");
|
|
|
|
return Promise.resolve();
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._changeServerURL(url, CHANGING_SERVICE_EVENT, options);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
observe: function observe(aSubject, aTopic, aData) {
|
|
|
|
switch (aTopic) {
|
2013-06-13 04:26:44 +04:00
|
|
|
/*
|
2015-06-03 15:05:00 +03:00
|
|
|
* We need to call uninit() on shutdown to clean up things that modules
|
|
|
|
* aren't very good at automatically cleaning up, so we don't get shutdown
|
|
|
|
* leaks on browser shutdown.
|
2013-06-13 04:26:44 +04:00
|
|
|
*/
|
2016-03-16 20:03:02 +03:00
|
|
|
case "quit-application":
|
2013-06-13 04:26:44 +04:00
|
|
|
this.uninit();
|
2015-04-21 21:10:50 +03:00
|
|
|
break;
|
2013-06-13 01:47:42 +04:00
|
|
|
case "network-active-changed": /* On B2G. */
|
|
|
|
case "network:offline-status-changed": /* On desktop. */
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeStateOfflineEvent(aData === "offline", false)
|
|
|
|
);
|
2013-03-29 07:49:41 +04:00
|
|
|
break;
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
case "nsPref:changed":
|
2015-04-11 06:19:28 +03:00
|
|
|
if (aData == "dom.push.serverURL") {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("observe: dom.push.serverURL changed for websocket",
|
2013-04-09 22:02:00 +04:00
|
|
|
prefs.get("serverURL"));
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
2015-06-03 15:05:00 +03:00
|
|
|
this._changeServerURL(prefs.get("serverURL"),
|
|
|
|
CHANGING_SERVICE_EVENT)
|
|
|
|
);
|
|
|
|
|
2015-04-11 06:19:28 +03:00
|
|
|
} else if (aData == "dom.push.connection.enabled") {
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled"))
|
|
|
|
);
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
break;
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
case "idle-daily":
|
2016-04-07 01:46:41 +03:00
|
|
|
this._dropExpiredRegistrations().catch(error => {
|
|
|
|
console.error("Failed to drop expired registrations on idle", error);
|
|
|
|
});
|
2015-06-26 00:52:57 +03:00
|
|
|
break;
|
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
case "perm-changed":
|
|
|
|
this._onPermissionChange(aSubject, aData).catch(error => {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.error("onPermissionChange: Error updating registrations:",
|
2015-10-06 18:14:25 +03:00
|
|
|
error);
|
|
|
|
})
|
|
|
|
break;
|
|
|
|
|
2015-11-14 02:18:10 +03:00
|
|
|
case "clear-origin-data":
|
2015-11-26 18:52:54 +03:00
|
|
|
this._clearOriginData(aData).catch(error => {
|
2015-11-14 02:18:10 +03:00
|
|
|
console.error("clearOriginData: Error clearing origin data:", error);
|
|
|
|
});
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
},
|
2013-07-24 17:03:25 +04:00
|
|
|
|
2015-11-14 02:18:10 +03:00
|
|
|
_clearOriginData: function(data) {
|
|
|
|
console.log("clearOriginData()");
|
2013-04-05 00:42:35 +04:00
|
|
|
|
2015-11-14 02:18:10 +03:00
|
|
|
if (!data) {
|
|
|
|
return Promise.resolve();
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
2015-11-14 02:18:10 +03:00
|
|
|
|
|
|
|
let pattern = JSON.parse(data);
|
|
|
|
return this._db.clearIf(record => {
|
|
|
|
if (!record.matchesOriginAttributes(pattern)) {
|
|
|
|
return false;
|
|
|
|
}
|
2016-03-28 22:29:25 +03:00
|
|
|
this._backgroundUnregister(record,
|
|
|
|
Ci.nsIPushErrorReporter.UNSUBSCRIBE_MANUAL);
|
2015-11-14 02:18:10 +03:00
|
|
|
return true;
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-11-11 01:27:47 +03:00
|
|
|
/**
|
|
|
|
* Sends an unregister request to the server in the background. If the
|
|
|
|
* service is not connected, this function is a no-op.
|
|
|
|
*
|
|
|
|
* @param {PushRecord} record The record to unregister.
|
2016-03-28 22:29:25 +03:00
|
|
|
* @param {Number} reason An `nsIPushErrorReporter` unsubscribe reason,
|
|
|
|
* indicating why this record was removed.
|
2015-11-11 01:27:47 +03:00
|
|
|
*/
|
2016-03-28 22:29:25 +03:00
|
|
|
_backgroundUnregister(record, reason) {
|
2015-11-11 01:27:47 +03:00
|
|
|
console.debug("backgroundUnregister()");
|
|
|
|
|
|
|
|
if (!this._service.isConnected() || !record) {
|
|
|
|
return;
|
2015-10-06 18:14:25 +03:00
|
|
|
}
|
2015-11-11 01:27:47 +03:00
|
|
|
|
|
|
|
console.debug("backgroundUnregister: Notifying server", record);
|
2016-04-21 22:04:15 +03:00
|
|
|
this._sendUnregister(record, reason).then(() => {
|
2016-05-02 18:20:14 +03:00
|
|
|
gPushNotifier.notifySubscriptionModified(record.scope, record.principal);
|
2016-04-21 22:04:15 +03:00
|
|
|
}).catch(e => {
|
2015-11-11 01:27:47 +03:00
|
|
|
console.error("backgroundUnregister: Error notifying server", e);
|
|
|
|
});
|
2015-10-06 18:14:25 +03:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
// utility function used to add/remove observers in startObservers() and
|
|
|
|
// stopObservers()
|
2015-06-03 15:04:00 +03:00
|
|
|
getNetworkStateChangeEventName: function() {
|
|
|
|
try {
|
2016-04-13 20:16:29 +03:00
|
|
|
let networkManager = Cc["@mozilla.org/network/manager;1"];
|
|
|
|
if (networkManager) {
|
|
|
|
networkManager.getService(Ci.nsINetworkManager);
|
|
|
|
return "network-active-changed";
|
|
|
|
}
|
|
|
|
} catch (e) {}
|
|
|
|
return "network:offline-status-changed";
|
2013-09-25 17:20:06 +04:00
|
|
|
},
|
|
|
|
|
2015-11-10 21:50:46 +03:00
|
|
|
_findService: function(serverURL) {
|
|
|
|
console.debug("findService()");
|
|
|
|
|
|
|
|
let uri;
|
|
|
|
let service;
|
|
|
|
|
|
|
|
if (!serverURL) {
|
|
|
|
console.warn("findService: No dom.push.serverURL found");
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
uri = Services.io.newURI(serverURL, null, null);
|
|
|
|
} catch (e) {
|
|
|
|
console.warn("findService: Error creating valid URI from",
|
|
|
|
"dom.push.serverURL", serverURL);
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
for (let connProtocol of CONNECTION_PROTOCOLS) {
|
|
|
|
if (connProtocol.validServerURI(uri)) {
|
|
|
|
service = connProtocol;
|
|
|
|
break;
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return [service, uri];
|
|
|
|
},
|
|
|
|
|
2016-03-18 03:11:22 +03:00
|
|
|
_changeServerURL: function(serverURI, event, options = {}) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("changeServerURL()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
switch(event) {
|
|
|
|
case UNINIT_EVENT:
|
|
|
|
return this._stopService(event);
|
|
|
|
|
|
|
|
case STARTING_SERVICE_EVENT:
|
|
|
|
{
|
|
|
|
let [service, uri] = this._findService(serverURI);
|
|
|
|
if (!service) {
|
|
|
|
this._setState(PUSH_SERVICE_INIT);
|
|
|
|
return Promise.resolve();
|
|
|
|
}
|
2016-03-22 04:07:16 +03:00
|
|
|
return this._startService(service, uri, options)
|
2016-04-08 21:39:00 +03:00
|
|
|
.then(_ => this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled"))
|
2015-06-03 15:05:00 +03:00
|
|
|
);
|
|
|
|
}
|
|
|
|
case CHANGING_SERVICE_EVENT:
|
|
|
|
let [service, uri] = this._findService(serverURI);
|
|
|
|
if (service) {
|
|
|
|
if (this._state == PUSH_SERVICE_INIT) {
|
|
|
|
this._setState(PUSH_SERVICE_ACTIVATING);
|
|
|
|
// The service has not been running - start it.
|
2016-03-18 03:11:22 +03:00
|
|
|
return this._startService(service, uri, options)
|
2016-04-08 21:39:00 +03:00
|
|
|
.then(_ => this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled"))
|
2015-06-03 15:05:00 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
this._setState(PUSH_SERVICE_ACTIVATING);
|
|
|
|
// If we already had running service - stop service, start the new
|
|
|
|
// one and check connection.enabled and offline state(offline state
|
|
|
|
// check is called in changeStateConnectionEnabledEvent function)
|
|
|
|
return this._stopService(CHANGING_SERVICE_EVENT)
|
|
|
|
.then(_ =>
|
2016-03-18 03:11:22 +03:00
|
|
|
this._startService(service, uri, options)
|
2015-06-03 15:05:00 +03:00
|
|
|
)
|
2016-04-08 21:39:00 +03:00
|
|
|
.then(_ => this._changeStateConnectionEnabledEvent(prefs.get("connection.enabled"))
|
2015-06-03 15:05:00 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (this._state == PUSH_SERVICE_INIT) {
|
|
|
|
return Promise.resolve();
|
|
|
|
|
|
|
|
} else {
|
|
|
|
// The new serverUri is empty or misconfigured - stop service.
|
|
|
|
this._setState(PUSH_SERVICE_INIT);
|
|
|
|
return this._stopService(STOPPING_SERVICE_EVENT);
|
|
|
|
}
|
|
|
|
}
|
2016-04-07 01:46:41 +03:00
|
|
|
default:
|
|
|
|
console.error("Unexpected event in _changeServerURL", event);
|
|
|
|
return Promise.reject(new Error(`Unexpected event ${event}`));
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* PushService initialization is divided into 4 parts:
|
2016-03-16 20:03:02 +03:00
|
|
|
* init() - start listening for quit-application and serverURL changes.
|
2015-06-03 15:05:00 +03:00
|
|
|
* state is change to PUSH_SERVICE_INIT
|
|
|
|
* startService() - if serverURL is present this function is called. It starts
|
|
|
|
* listening for broadcasted messages, starts db and
|
|
|
|
* PushService connection (WebSocket).
|
|
|
|
* state is change to PUSH_SERVICE_ACTIVATING.
|
|
|
|
* startObservers() - start other observers.
|
|
|
|
* changeStateConnectionEnabledEvent - checks prefs and offline state.
|
|
|
|
* It changes state to:
|
|
|
|
* PUSH_SERVICE_RUNNING,
|
|
|
|
* PUSH_SERVICE_ACTIVE_OFFLINE or
|
|
|
|
* PUSH_SERVICE_CONNECTION_DISABLE.
|
|
|
|
*/
|
2015-04-21 21:10:50 +03:00
|
|
|
init: function(options = {}) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("init()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state > PUSH_SERVICE_UNINIT) {
|
2015-04-21 21:10:50 +03:00
|
|
|
return;
|
|
|
|
}
|
2015-04-19 13:06:21 +03:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this._setState(PUSH_SERVICE_ACTIVATING);
|
|
|
|
|
2016-03-16 20:03:02 +03:00
|
|
|
Services.obs.addObserver(this, "quit-application", false);
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (options.serverURI) {
|
|
|
|
// this is use for xpcshell test.
|
|
|
|
|
2016-03-22 04:07:16 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
|
|
|
this._changeServerURL(options.serverURI, STARTING_SERVICE_EVENT, options));
|
2015-04-11 06:19:28 +03:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
} else {
|
|
|
|
// This is only used for testing. Different tests require connecting to
|
|
|
|
// slightly different URLs.
|
|
|
|
prefs.observe("serverURL", this);
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-10-20 02:33:00 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ =>
|
2015-06-03 15:05:00 +03:00
|
|
|
this._changeServerURL(prefs.get("serverURL"), STARTING_SERVICE_EVENT));
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_startObservers: function() {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("startObservers()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state != PUSH_SERVICE_ACTIVATING) {
|
|
|
|
return;
|
|
|
|
}
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-11-14 02:18:10 +03:00
|
|
|
Services.obs.addObserver(this, "clear-origin-data", false);
|
2013-06-13 04:26:44 +04:00
|
|
|
|
|
|
|
// On B2G the NetworkManager interface fires a network-active-changed
|
|
|
|
// event.
|
|
|
|
//
|
|
|
|
// The "active network" is based on priority - i.e. Wi-Fi has higher
|
|
|
|
// priority than data. The PushService should just use the preferred
|
|
|
|
// network, and not care about all interface changes.
|
|
|
|
// network-active-changed is not fired when the network goes offline, but
|
|
|
|
// socket connections time out. The check for Services.io.offline in
|
2015-06-03 15:05:00 +03:00
|
|
|
// PushServiceWebSocket._beginWSSetup() prevents unnecessary retries. When
|
|
|
|
// the network comes back online, network-active-changed is fired.
|
2013-06-13 04:26:44 +04:00
|
|
|
//
|
|
|
|
// On non-B2G platforms, the offline-status-changed event is used to know
|
|
|
|
// when to (dis)connect. It may not fire if the underlying OS changes
|
|
|
|
// networks; in such a case we rely on timeout.
|
|
|
|
//
|
|
|
|
// On B2G both events fire, one after the other, when the network goes
|
|
|
|
// online, so we explicitly check for the presence of NetworkManager and
|
|
|
|
// don't add an observer for offline-status-changed on B2G.
|
2015-06-03 15:04:00 +03:00
|
|
|
this._networkStateChangeEventName = this.getNetworkStateChangeEventName();
|
2015-04-21 21:10:50 +03:00
|
|
|
Services.obs.addObserver(this, this._networkStateChangeEventName, false);
|
2013-06-13 04:26:44 +04:00
|
|
|
|
2013-06-17 22:36:58 +04:00
|
|
|
// Used to monitor if the user wishes to disable Push.
|
|
|
|
prefs.observe("connection.enabled", this);
|
2015-06-26 00:52:57 +03:00
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
// Prunes expired registrations and notifies dormant service workers.
|
2015-06-26 00:52:57 +03:00
|
|
|
Services.obs.addObserver(this, "idle-daily", false);
|
2015-10-06 18:14:25 +03:00
|
|
|
|
|
|
|
// Prunes registrations for sites for which the user revokes push
|
|
|
|
// permissions.
|
|
|
|
Services.obs.addObserver(this, "perm-changed", false);
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
2016-03-22 04:07:16 +03:00
|
|
|
_startService(service, serverURI, options) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("startService()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state != PUSH_SERVICE_ACTIVATING) {
|
2015-11-19 02:55:13 +03:00
|
|
|
return Promise.reject();
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
this._service = service;
|
|
|
|
|
2015-06-03 15:04:00 +03:00
|
|
|
this._db = options.db;
|
|
|
|
if (!this._db) {
|
2015-06-03 15:05:00 +03:00
|
|
|
this._db = this._service.newPushDB();
|
2015-06-03 15:04:00 +03:00
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2015-11-19 02:55:13 +03:00
|
|
|
return this._service.init(options, this, serverURI)
|
|
|
|
.then(() => {
|
|
|
|
this._startObservers();
|
|
|
|
return this._dropExpiredRegistrations();
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
/**
|
|
|
|
* PushService uninitialization is divided into 3 parts:
|
|
|
|
* stopObservers() - stot observers started in startObservers.
|
|
|
|
* stopService() - It stops listening for broadcasted messages, stops db and
|
|
|
|
* PushService connection (WebSocket).
|
|
|
|
* state is changed to PUSH_SERVICE_INIT.
|
2016-03-16 20:03:02 +03:00
|
|
|
* uninit() - stop listening for quit-application and serverURL changes.
|
2015-06-03 15:05:00 +03:00
|
|
|
* state is change to PUSH_SERVICE_UNINIT
|
|
|
|
*/
|
|
|
|
_stopService: function(event) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("stopService()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVATING) {
|
2016-04-07 01:46:41 +03:00
|
|
|
return Promise.resolve();
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
2013-06-13 04:26:44 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this._stopObservers();
|
2013-05-02 09:15:18 +04:00
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
this._service.disconnect();
|
|
|
|
this._service.uninit();
|
2015-06-03 15:06:00 +03:00
|
|
|
this._service = null;
|
2013-05-02 09:15:18 +04:00
|
|
|
|
2016-03-16 20:03:02 +03:00
|
|
|
this._updateQuotaTimeouts.forEach((timeoutID) => clearTimeout(timeoutID));
|
|
|
|
this._updateQuotaTimeouts.clear();
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
if (!this._db) {
|
|
|
|
return Promise.resolve();
|
|
|
|
}
|
|
|
|
if (event == UNINIT_EVENT) {
|
|
|
|
// If it is uninitialized just close db.
|
2015-06-03 15:04:00 +03:00
|
|
|
this._db.close();
|
|
|
|
this._db = null;
|
2015-06-03 15:05:00 +03:00
|
|
|
return Promise.resolve();
|
2013-06-13 04:26:44 +04:00
|
|
|
}
|
2013-05-02 09:15:18 +04:00
|
|
|
|
2015-11-11 01:27:47 +03:00
|
|
|
return this.dropUnexpiredRegistrations()
|
2015-06-03 15:05:00 +03:00
|
|
|
.then(_ => {
|
|
|
|
this._db.close();
|
|
|
|
this._db = null;
|
|
|
|
}, err => {
|
|
|
|
this._db.close();
|
|
|
|
this._db = null;
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
_stopObservers: function() {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("stopObservers()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state < PUSH_SERVICE_ACTIVATING) {
|
2013-03-29 07:49:41 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
prefs.ignore("connection.enabled", this);
|
|
|
|
|
|
|
|
Services.obs.removeObserver(this, this._networkStateChangeEventName);
|
2015-11-14 02:18:10 +03:00
|
|
|
Services.obs.removeObserver(this, "clear-origin-data");
|
2015-06-26 00:52:57 +03:00
|
|
|
Services.obs.removeObserver(this, "idle-daily");
|
2015-10-06 18:14:25 +03:00
|
|
|
Services.obs.removeObserver(this, "perm-changed");
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
2016-03-22 04:07:16 +03:00
|
|
|
_shutdownService() {
|
|
|
|
let promiseChangeURL = this._changeServerURL("", UNINIT_EVENT);
|
|
|
|
this._setState(PUSH_SERVICE_UNINIT);
|
|
|
|
console.debug("shutdownService: shutdown complete!");
|
|
|
|
return promiseChangeURL;
|
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
uninit: function() {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("uninit()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
if (this._state == PUSH_SERVICE_UNINIT) {
|
2013-03-29 07:49:41 +04:00
|
|
|
return;
|
|
|
|
}
|
2015-06-03 15:05:00 +03:00
|
|
|
|
|
|
|
prefs.ignore("serverURL", this);
|
2016-03-16 20:03:02 +03:00
|
|
|
Services.obs.removeObserver(this, "quit-application");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2016-03-22 04:07:16 +03:00
|
|
|
this._stateChangeProcessEnqueue(_ => this._shutdownService());
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-11-11 01:27:47 +03:00
|
|
|
/**
|
|
|
|
* Drops all active registrations and notifies the associated service
|
|
|
|
* workers. This function is called when the user switches Push servers,
|
|
|
|
* or when the server invalidates all existing registrations.
|
|
|
|
*
|
|
|
|
* We ignore expired registrations because they're already handled in other
|
|
|
|
* code paths. Registrations that expired after exceeding their quotas are
|
|
|
|
* evicted at startup, or on the next `idle-daily` event. Registrations that
|
|
|
|
* expired because the user revoked the notification permission are evicted
|
|
|
|
* once the permission is reinstated.
|
|
|
|
*/
|
|
|
|
dropUnexpiredRegistrations: function() {
|
|
|
|
let subscriptionChanges = [];
|
|
|
|
return this._db.clearIf(record => {
|
|
|
|
if (record.isExpired()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
subscriptionChanges.push(record);
|
|
|
|
return true;
|
|
|
|
}).then(() => {
|
|
|
|
this.notifySubscriptionChanges(subscriptionChanges);
|
|
|
|
});
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
_notifySubscriptionChangeObservers: function(record) {
|
2015-11-11 01:27:47 +03:00
|
|
|
if (!record) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-09-16 20:28:17 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_NOTIFY_REGISTRATION_LOST").add();
|
2016-01-14 08:24:37 +03:00
|
|
|
gPushNotifier.notifySubscriptionChange(record.scope, record.principal);
|
2015-06-26 00:52:57 +03:00
|
|
|
},
|
|
|
|
|
2015-11-11 01:27:47 +03:00
|
|
|
/**
|
|
|
|
* Drops a registration and notifies the associated service worker. If the
|
|
|
|
* registration does not exist, this function is a no-op.
|
|
|
|
*
|
|
|
|
* @param {String} keyID The registration ID to remove.
|
|
|
|
* @returns {Promise} Resolves once the worker has been notified.
|
|
|
|
*/
|
|
|
|
dropRegistrationAndNotifyApp: function(aKeyID) {
|
|
|
|
return this._db.delete(aKeyID)
|
|
|
|
.then(record => this._notifySubscriptionChangeObservers(record));
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Replaces an existing registration and notifies the associated service
|
|
|
|
* worker.
|
|
|
|
*
|
|
|
|
* @param {String} aOldKey The registration ID to replace.
|
|
|
|
* @param {PushRecord} aNewRecord The new record.
|
|
|
|
* @returns {Promise} Resolves once the worker has been notified.
|
|
|
|
*/
|
|
|
|
updateRegistrationAndNotifyApp: function(aOldKey, aNewRecord) {
|
|
|
|
return this.updateRecordAndNotifyApp(aOldKey, _ => aNewRecord);
|
|
|
|
},
|
|
|
|
/**
|
|
|
|
* Updates a registration and notifies the associated service worker.
|
|
|
|
*
|
|
|
|
* @param {String} keyID The registration ID to update.
|
|
|
|
* @param {Function} updateFunc Returns the updated record.
|
|
|
|
* @returns {Promise} Resolves with the updated record once the worker
|
|
|
|
* has been notified.
|
|
|
|
*/
|
|
|
|
updateRecordAndNotifyApp: function(aKeyID, aUpdateFunc) {
|
|
|
|
return this._db.update(aKeyID, aUpdateFunc)
|
|
|
|
.then(record => {
|
2015-09-17 15:08:50 +03:00
|
|
|
this._notifySubscriptionChangeObservers(record);
|
2015-11-11 01:27:47 +03:00
|
|
|
return record;
|
2015-09-17 15:08:50 +03:00
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-11-11 01:27:47 +03:00
|
|
|
notifySubscriptionChanges: function(records) {
|
|
|
|
records.forEach(record => {
|
2015-06-26 00:52:57 +03:00
|
|
|
this._notifySubscriptionChangeObservers(record);
|
|
|
|
});
|
2015-06-03 15:06:00 +03:00
|
|
|
},
|
|
|
|
|
2015-12-08 23:26:42 +03:00
|
|
|
ensureCrypto: function(record) {
|
2016-03-23 05:20:36 +03:00
|
|
|
if (record.hasAuthenticationSecret() &&
|
2015-12-08 23:26:42 +03:00
|
|
|
record.p256dhPublicKey &&
|
|
|
|
record.p256dhPrivateKey) {
|
2015-09-17 15:08:50 +03:00
|
|
|
return Promise.resolve(record);
|
|
|
|
}
|
2015-12-08 23:26:42 +03:00
|
|
|
|
|
|
|
let keygen = Promise.resolve([]);
|
|
|
|
if (!record.p256dhPublicKey || !record.p256dhPrivateKey) {
|
|
|
|
keygen = PushCrypto.generateKeys();
|
|
|
|
}
|
2015-09-17 15:08:50 +03:00
|
|
|
// We do not have a encryption key. so we need to generate it. This
|
|
|
|
// is only going to happen on db upgrade from version 4 to higher.
|
2015-12-08 23:26:42 +03:00
|
|
|
return keygen
|
|
|
|
.then(([pubKey, privKey]) => {
|
2015-09-17 15:08:50 +03:00
|
|
|
return this.updateRecordAndNotifyApp(record.keyID, record => {
|
2015-12-08 23:26:42 +03:00
|
|
|
if (!record.p256dhPublicKey || !record.p256dhPrivateKey) {
|
|
|
|
record.p256dhPublicKey = pubKey;
|
|
|
|
record.p256dhPrivateKey = privKey;
|
|
|
|
}
|
2016-03-23 05:20:36 +03:00
|
|
|
if (!record.hasAuthenticationSecret()) {
|
2015-12-08 23:26:42 +03:00
|
|
|
record.authenticationSecret = PushCrypto.generateAuthenticationSecret();
|
|
|
|
}
|
2015-09-17 15:08:50 +03:00
|
|
|
return record;
|
|
|
|
});
|
|
|
|
}, error => {
|
|
|
|
return this.dropRegistrationAndNotifyApp(record.keyID).then(
|
|
|
|
() => Promise.reject(error));
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2015-09-16 20:28:17 +03:00
|
|
|
_recordDidNotNotify: function(reason) {
|
|
|
|
Services.telemetry.
|
|
|
|
getHistogramById("PUSH_API_NOTIFICATION_RECEIVED_BUT_DID_NOT_NOTIFY").
|
|
|
|
add(reason);
|
|
|
|
},
|
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
/**
|
|
|
|
* Dispatches an incoming message to a service worker, recalculating the
|
|
|
|
* quota for the associated push registration. If the quota is exceeded,
|
|
|
|
* the registration and message will be dropped, and the worker will not
|
|
|
|
* be notified.
|
|
|
|
*
|
|
|
|
* @param {String} keyID The push registration ID.
|
2016-03-28 22:29:25 +03:00
|
|
|
* @param {String} messageID The message ID, used to report service worker
|
|
|
|
* delivery failures. For Web Push messages, this is the version. If empty,
|
|
|
|
* failures will not be reported.
|
|
|
|
* @param {ArrayBuffer|Uint8Array} data The encrypted message data.
|
2015-09-17 15:08:50 +03:00
|
|
|
* @param {Object} cryptoParams The message encryption settings.
|
2015-06-26 00:52:57 +03:00
|
|
|
* @param {Function} updateFunc A function that receives the existing
|
|
|
|
* registration record as its argument, and returns a new record. If the
|
|
|
|
* function returns `null` or `undefined`, the record will not be updated.
|
|
|
|
* `PushServiceWebSocket` uses this to drop incoming updates with older
|
|
|
|
* versions.
|
2016-03-28 22:29:25 +03:00
|
|
|
* @returns {Promise} Resolves with an `nsIPushErrorReporter` ack status
|
|
|
|
* code, indicating whether the message was delivered successfully.
|
2015-06-26 00:52:57 +03:00
|
|
|
*/
|
2016-03-28 22:29:25 +03:00
|
|
|
receivedPushMessage(keyID, messageID, data, cryptoParams, updateFunc) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("receivedPushMessage()");
|
2015-09-16 20:28:17 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_NOTIFICATION_RECEIVED").add();
|
2015-06-26 00:52:57 +03:00
|
|
|
|
2016-03-28 22:29:25 +03:00
|
|
|
return this._updateRecordAfterPush(keyID, updateFunc).then(record => {
|
|
|
|
if (!record) {
|
|
|
|
throw new Error("Ignoring update for key ID " + keyID);
|
|
|
|
}
|
|
|
|
// Update quota after the delay, at which point
|
|
|
|
// we check for visible notifications.
|
|
|
|
let timeoutID = setTimeout(_ =>
|
|
|
|
{
|
|
|
|
this._updateQuota(keyID);
|
|
|
|
if (!this._updateQuotaTimeouts.delete(timeoutID)) {
|
|
|
|
console.debug("receivedPushMessage: quota update timeout missing?");
|
|
|
|
}
|
|
|
|
}, prefs.get("quotaUpdateDelay"));
|
|
|
|
this._updateQuotaTimeouts.add(timeoutID);
|
|
|
|
return this._decryptAndNotifyApp(record, messageID, data, cryptoParams);
|
|
|
|
}).catch(error => {
|
|
|
|
console.error("receivedPushMessage: Error notifying app", error);
|
|
|
|
return Ci.nsIPushErrorReporter.ACK_NOT_DELIVERED;
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Updates a registration record after receiving a push message.
|
|
|
|
*
|
|
|
|
* @param {String} keyID The push registration ID.
|
|
|
|
* @param {Function} updateFunc The function passed to `receivedPushMessage`.
|
|
|
|
* @returns {Promise} Resolves with the updated record, or `null` if the
|
|
|
|
* record was not updated.
|
|
|
|
*/
|
|
|
|
_updateRecordAfterPush(keyID, updateFunc) {
|
2015-09-11 17:51:32 +03:00
|
|
|
return this.getByKeyID(keyID).then(record => {
|
2015-06-26 00:52:57 +03:00
|
|
|
if (!record) {
|
2015-09-16 20:28:17 +03:00
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_KEY_NOT_FOUND);
|
2015-06-26 00:52:57 +03:00
|
|
|
throw new Error("No record for key ID " + keyID);
|
|
|
|
}
|
2016-03-28 22:29:25 +03:00
|
|
|
return record.getLastVisit().then(lastVisit => {
|
|
|
|
// As a special case, don't notify the service worker if the user
|
|
|
|
// cleared their history.
|
|
|
|
if (!isFinite(lastVisit)) {
|
2015-09-16 20:28:17 +03:00
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_NO_HISTORY);
|
2016-03-28 22:29:25 +03:00
|
|
|
throw new Error("Ignoring message sent to unvisited origin");
|
2015-09-17 15:08:50 +03:00
|
|
|
}
|
2016-03-28 22:29:25 +03:00
|
|
|
return lastVisit;
|
|
|
|
}).then(lastVisit => {
|
|
|
|
// Update the record, resetting the quota if the user has visited the
|
|
|
|
// site since the last push.
|
|
|
|
return this._db.update(keyID, record => {
|
|
|
|
let newRecord = updateFunc(record);
|
|
|
|
if (!newRecord) {
|
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_NO_VERSION_INCREMENT);
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
// Because `unregister` is advisory only, we can still receive messages
|
|
|
|
// for stale Simple Push registrations from the server. To work around
|
|
|
|
// this, we check if the record has expired before *and* after updating
|
|
|
|
// the quota.
|
|
|
|
if (newRecord.isExpired()) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
newRecord.receivedPush(lastVisit);
|
|
|
|
return newRecord;
|
|
|
|
});
|
2015-09-17 15:08:50 +03:00
|
|
|
});
|
2016-05-02 18:20:14 +03:00
|
|
|
}).then(record => {
|
|
|
|
gPushNotifier.notifySubscriptionModified(record.scope, record.principal);
|
|
|
|
return record;
|
2016-03-28 22:29:25 +03:00
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypts an incoming message and notifies the associated service worker.
|
|
|
|
*
|
|
|
|
* @param {PushRecord} record The receiving registration.
|
|
|
|
* @param {String} messageID The message ID.
|
|
|
|
* @param {ArrayBuffer|Uint8Array} data The encrypted message data.
|
|
|
|
* @param {Object} cryptoParams The message encryption settings.
|
|
|
|
* @returns {Promise} Resolves with an ack status code.
|
|
|
|
*/
|
|
|
|
_decryptAndNotifyApp(record, messageID, data, cryptoParams) {
|
|
|
|
if (!cryptoParams) {
|
|
|
|
return this._notifyApp(record, messageID, null);
|
|
|
|
}
|
|
|
|
return PushCrypto.decodeMsg(
|
|
|
|
data,
|
|
|
|
record.p256dhPrivateKey,
|
|
|
|
record.p256dhPublicKey,
|
|
|
|
cryptoParams.dh,
|
|
|
|
cryptoParams.salt,
|
|
|
|
cryptoParams.rs,
|
2016-03-23 05:20:36 +03:00
|
|
|
record.authenticationSecret,
|
2016-03-28 22:29:25 +03:00
|
|
|
cryptoParams.padSize
|
|
|
|
).then(message => this._notifyApp(record, messageID, message), error => {
|
2016-03-28 23:33:20 +03:00
|
|
|
let message = gDOMBundle.formatStringFromName(
|
|
|
|
"PushMessageDecryptionFailure", [record.scope, String(error)], 2);
|
|
|
|
gPushNotifier.notifyError(record.scope, record.principal, message,
|
|
|
|
Ci.nsIScriptError.errorFlag);
|
2016-03-28 22:29:25 +03:00
|
|
|
return Ci.nsIPushErrorReporter.ACK_DECRYPTION_ERROR;
|
2015-06-26 00:52:57 +03:00
|
|
|
});
|
2015-06-03 15:05:00 +03:00
|
|
|
},
|
|
|
|
|
2015-11-17 08:33:11 +03:00
|
|
|
_updateQuota: function(keyID) {
|
|
|
|
console.debug("updateQuota()");
|
|
|
|
|
|
|
|
this._db.update(keyID, record => {
|
|
|
|
// Record may have expired from an earlier quota update.
|
|
|
|
if (record.isExpired()) {
|
|
|
|
console.debug(
|
|
|
|
"updateQuota: Trying to update quota for expired record", record);
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
// If there are visible notifications, don't apply the quota penalty
|
|
|
|
// for the message.
|
2015-12-16 20:21:22 +03:00
|
|
|
if (record.uri && !this._visibleNotifications.has(record.uri.prePath)) {
|
2015-11-17 08:33:11 +03:00
|
|
|
record.reduceQuota();
|
|
|
|
}
|
|
|
|
return record;
|
|
|
|
}).then(record => {
|
2016-05-02 18:20:14 +03:00
|
|
|
if (record) {
|
|
|
|
if (record.isExpired()) {
|
|
|
|
this._recordDidNotNotify(kDROP_NOTIFICATION_REASON_EXPIRED);
|
|
|
|
// Drop the registration in the background. If the user returns to the
|
|
|
|
// site, the service worker will be notified on the next `idle-daily`
|
|
|
|
// event.
|
|
|
|
this._backgroundUnregister(record,
|
|
|
|
Ci.nsIPushErrorReporter.UNSUBSCRIBE_QUOTA_EXCEEDED);
|
|
|
|
} else {
|
|
|
|
gPushNotifier.notifySubscriptionModified(record.scope,
|
|
|
|
record.principal);
|
|
|
|
}
|
2015-11-17 08:33:11 +03:00
|
|
|
}
|
|
|
|
if (this._updateQuotaTestCallback) {
|
|
|
|
// Callback so that test may be notified when the quota update is complete.
|
|
|
|
this._updateQuotaTestCallback();
|
|
|
|
}
|
|
|
|
}).catch(error => {
|
|
|
|
console.debug("updateQuota: Error while trying to update quota", error);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2015-12-08 23:41:41 +03:00
|
|
|
notificationForOriginShown(origin) {
|
2015-11-17 08:33:11 +03:00
|
|
|
console.debug("notificationForOriginShown()", origin);
|
|
|
|
let count;
|
|
|
|
if (this._visibleNotifications.has(origin)) {
|
|
|
|
count = this._visibleNotifications.get(origin);
|
|
|
|
} else {
|
|
|
|
count = 0;
|
|
|
|
}
|
|
|
|
this._visibleNotifications.set(origin, count + 1);
|
|
|
|
},
|
|
|
|
|
2015-12-08 23:41:41 +03:00
|
|
|
notificationForOriginClosed(origin) {
|
2015-11-17 08:33:11 +03:00
|
|
|
console.debug("notificationForOriginClosed()", origin);
|
|
|
|
let count;
|
|
|
|
if (this._visibleNotifications.has(origin)) {
|
|
|
|
count = this._visibleNotifications.get(origin);
|
|
|
|
} else {
|
|
|
|
console.debug("notificationForOriginClosed: closing notification that has not been shown?");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (count > 1) {
|
|
|
|
this._visibleNotifications.set(origin, count - 1);
|
|
|
|
} else {
|
|
|
|
this._visibleNotifications.delete(origin);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2016-03-28 22:29:25 +03:00
|
|
|
reportDeliveryError(messageID, reason) {
|
|
|
|
console.debug("reportDeliveryError()", messageID, reason);
|
|
|
|
if (this._state == PUSH_SERVICE_RUNNING &&
|
|
|
|
this._service.isConnected()) {
|
|
|
|
|
|
|
|
// Only report errors if we're initialized and connected.
|
|
|
|
this._service.reportDeliveryError(messageID, reason);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_notifyApp(aPushRecord, messageID, message) {
|
2015-06-24 23:34:54 +03:00
|
|
|
if (!aPushRecord || !aPushRecord.scope ||
|
|
|
|
aPushRecord.originAttributes === undefined) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.error("notifyApp: Invalid record", aPushRecord);
|
2016-03-28 22:29:25 +03:00
|
|
|
return Ci.nsIPushErrorReporter.ACK_NOT_DELIVERED;
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
|
|
|
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("notifyApp()", aPushRecord.scope);
|
2015-04-11 06:19:28 +03:00
|
|
|
|
|
|
|
// If permission has been revoked, trash the message.
|
2015-08-20 02:03:15 +03:00
|
|
|
if (!aPushRecord.hasPermission()) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.warn("notifyApp: Missing push permission", aPushRecord);
|
2016-03-28 22:29:25 +03:00
|
|
|
return Ci.nsIPushErrorReporter.ACK_NOT_DELIVERED;
|
2015-04-11 06:19:28 +03:00
|
|
|
}
|
|
|
|
|
2016-01-14 08:24:37 +03:00
|
|
|
let payload = ArrayBuffer.isView(message) ?
|
|
|
|
new Uint8Array(message.buffer) : message;
|
|
|
|
|
|
|
|
if (aPushRecord.quotaApplies()) {
|
|
|
|
// Don't record telemetry for chrome push messages.
|
|
|
|
Services.telemetry.getHistogramById("PUSH_API_NOTIFY").add();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (payload) {
|
|
|
|
gPushNotifier.notifyPushWithData(aPushRecord.scope,
|
|
|
|
aPushRecord.principal,
|
2016-03-28 22:29:25 +03:00
|
|
|
messageID, payload.length, payload);
|
2016-01-14 08:24:37 +03:00
|
|
|
} else {
|
2016-03-28 22:29:25 +03:00
|
|
|
gPushNotifier.notifyPush(aPushRecord.scope, aPushRecord.principal,
|
|
|
|
messageID);
|
2016-01-14 08:24:37 +03:00
|
|
|
}
|
2015-04-11 06:19:28 +03:00
|
|
|
|
2016-03-28 22:29:25 +03:00
|
|
|
return Ci.nsIPushErrorReporter.ACK_DELIVERED;
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:06:00 +03:00
|
|
|
getByKeyID: function(aKeyID) {
|
|
|
|
return this._db.getByKeyID(aKeyID);
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
getAllUnexpired: function() {
|
|
|
|
return this._db.getAllUnexpired();
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2016-03-28 22:29:25 +03:00
|
|
|
_sendRequest(action, ...params) {
|
2015-06-03 15:05:00 +03:00
|
|
|
if (this._state == PUSH_SERVICE_CONNECTION_DISABLE) {
|
2015-11-10 00:58:50 +03:00
|
|
|
return Promise.reject(new Error("Push service disabled"));
|
2015-06-03 15:05:00 +03:00
|
|
|
} else if (this._state == PUSH_SERVICE_ACTIVE_OFFLINE) {
|
2015-10-27 11:13:00 +03:00
|
|
|
if (this._service.serviceType() == "WebSocket" && action == "unregister") {
|
|
|
|
return Promise.resolve();
|
|
|
|
}
|
2015-11-10 00:58:50 +03:00
|
|
|
return Promise.reject(new Error("Push service offline"));
|
2015-06-03 15:05:00 +03:00
|
|
|
}
|
2016-04-08 21:39:00 +03:00
|
|
|
// Ensure the backend is ready. `getByPageRecord` already checks this, but
|
|
|
|
// we need to check again here in case the service was restarted in the
|
|
|
|
// meantime.
|
|
|
|
return this._checkActivated().then(_ => {
|
|
|
|
switch (action) {
|
|
|
|
case "register":
|
|
|
|
return this._service.register(...params);
|
|
|
|
case "unregister":
|
|
|
|
return this._service.unregister(...params);
|
|
|
|
}
|
|
|
|
return Promise.reject(new Error("Unknown request type: " + action));
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2015-06-03 15:05:00 +03:00
|
|
|
/**
|
2013-03-29 07:49:41 +04:00
|
|
|
* Called on message from the child process. aPageRecord is an object sent by
|
|
|
|
* navigator.push, identifying the sending page and other fields.
|
|
|
|
*/
|
2015-06-03 15:05:00 +03:00
|
|
|
_registerWithServer: function(aPageRecord) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("registerWithServer()", aPageRecord);
|
2015-04-19 13:06:11 +03:00
|
|
|
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_ATTEMPT").add();
|
2015-06-03 15:05:00 +03:00
|
|
|
return this._sendRequest("register", aPageRecord)
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => this._onRegisterSuccess(record),
|
2015-06-03 15:05:00 +03:00
|
|
|
err => this._onRegisterError(err))
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => {
|
2015-06-24 23:34:54 +03:00
|
|
|
this._deletePendingRequest(aPageRecord);
|
2016-05-02 18:20:14 +03:00
|
|
|
gPushNotifier.notifySubscriptionModified(record.scope,
|
|
|
|
record.principal);
|
2015-11-11 01:27:47 +03:00
|
|
|
return record.toSubscription();
|
2015-06-03 15:05:00 +03:00
|
|
|
}, err => {
|
2015-06-24 23:34:54 +03:00
|
|
|
this._deletePendingRequest(aPageRecord);
|
2015-06-03 15:05:00 +03:00
|
|
|
throw err;
|
|
|
|
});
|
2015-04-21 21:10:50 +03:00
|
|
|
},
|
2015-04-19 13:06:11 +03:00
|
|
|
|
2016-03-28 22:29:25 +03:00
|
|
|
_sendUnregister(aRecord, aReason) {
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_UNSUBSCRIBE_ATTEMPT").add();
|
2016-03-28 22:29:25 +03:00
|
|
|
return this._sendRequest("unregister", aRecord, aReason).then(function(v) {
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_UNSUBSCRIBE_SUCCEEDED").add();
|
|
|
|
return v;
|
|
|
|
}).catch(function(e) {
|
|
|
|
Services.telemetry.getHistogramById("PUSH_API_UNSUBSCRIBE_FAILED").add();
|
|
|
|
return Promise.reject(e);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
/**
|
|
|
|
* Exceptions thrown in _onRegisterSuccess are caught by the promise obtained
|
2015-06-03 15:05:00 +03:00
|
|
|
* from _service.request, causing the promise to be rejected instead.
|
2013-03-29 07:49:41 +04:00
|
|
|
*/
|
2015-06-03 15:05:00 +03:00
|
|
|
_onRegisterSuccess: function(aRecord) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("_onRegisterSuccess()");
|
2013-03-29 07:49:41 +04:00
|
|
|
|
2015-06-03 15:06:00 +03:00
|
|
|
return this._db.put(aRecord)
|
2015-08-06 03:03:49 +03:00
|
|
|
.then(record => {
|
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_SUCCEEDED").add();
|
|
|
|
return record;
|
|
|
|
})
|
2015-06-26 00:52:57 +03:00
|
|
|
.catch(error => {
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_FAILED").add()
|
2015-06-07 08:17:04 +03:00
|
|
|
// Unable to save. Destroy the subscription in the background.
|
2016-03-28 22:29:25 +03:00
|
|
|
this._backgroundUnregister(aRecord,
|
|
|
|
Ci.nsIPushErrorReporter.UNSUBSCRIBE_MANUAL);
|
2015-06-03 15:05:00 +03:00
|
|
|
throw error;
|
|
|
|
});
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Exceptions thrown in _onRegisterError are caught by the promise obtained
|
2015-06-03 15:05:00 +03:00
|
|
|
* from _service.request, causing the promise to be rejected instead.
|
2013-03-29 07:49:41 +04:00
|
|
|
*/
|
2015-04-21 21:10:50 +03:00
|
|
|
_onRegisterError: function(reply) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("_onRegisterError()");
|
2015-08-06 03:03:49 +03:00
|
|
|
Services.telemetry.getHistogramById("PUSH_API_SUBSCRIBE_FAILED").add()
|
2013-09-17 21:10:36 +04:00
|
|
|
if (!reply.error) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.warn("onRegisterError: Called without valid error message!",
|
2016-04-12 00:51:33 +03:00
|
|
|
reply);
|
2015-11-10 00:58:32 +03:00
|
|
|
throw new Error("Registration error");
|
2013-03-29 07:49:41 +04:00
|
|
|
}
|
2015-04-21 21:10:50 +03:00
|
|
|
throw reply.error;
|
2013-03-29 07:49:41 +04:00
|
|
|
},
|
|
|
|
|
2016-01-14 08:24:37 +03:00
|
|
|
notificationsCleared() {
|
2015-12-08 23:41:41 +03:00
|
|
|
this._visibleNotifications.clear();
|
|
|
|
},
|
2015-06-24 23:34:54 +03:00
|
|
|
|
2015-12-08 23:41:41 +03:00
|
|
|
_getByPageRecord(pageRecord) {
|
|
|
|
return this._checkActivated().then(_ =>
|
|
|
|
this._db.getByIdentifiers(pageRecord)
|
|
|
|
);
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
|
|
|
|
2015-11-10 00:58:50 +03:00
|
|
|
register: function(aPageRecord) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("register()", aPageRecord);
|
2015-06-03 15:04:00 +03:00
|
|
|
|
2016-03-16 12:53:13 +03:00
|
|
|
let keyPromise;
|
|
|
|
if (aPageRecord.appServerKey) {
|
|
|
|
let keyView = new Uint8Array(aPageRecord.appServerKey);
|
|
|
|
keyPromise = PushCrypto.validateAppServerKey(keyView)
|
|
|
|
.catch(error => {
|
|
|
|
// Normalize Web Crypto exceptions. `nsIPushService` will forward the
|
|
|
|
// error result to the DOM API implementation in `PushManager.cpp` or
|
|
|
|
// `Push.js`, which will convert it to the correct `DOMException`.
|
|
|
|
throw errorWithResult("Invalid app server key",
|
|
|
|
Cr.NS_ERROR_DOM_PUSH_INVALID_KEY_ERR);
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
keyPromise = Promise.resolve(null);
|
|
|
|
}
|
|
|
|
|
|
|
|
return Promise.all([
|
|
|
|
keyPromise,
|
|
|
|
this._getByPageRecord(aPageRecord),
|
|
|
|
]).then(([appServerKey, record]) => {
|
|
|
|
aPageRecord.appServerKey = appServerKey;
|
|
|
|
if (!record) {
|
|
|
|
return this._lookupOrPutPendingRequest(aPageRecord);
|
|
|
|
}
|
|
|
|
if (!record.matchesAppServerKey(appServerKey)) {
|
|
|
|
throw errorWithResult("Mismatched app server key",
|
|
|
|
Cr.NS_ERROR_DOM_PUSH_MISMATCHED_KEY_ERR);
|
|
|
|
}
|
|
|
|
if (record.isExpired()) {
|
|
|
|
return record.quotaChanged().then(isChanged => {
|
|
|
|
if (isChanged) {
|
|
|
|
// If the user revisited the site, drop the expired push
|
|
|
|
// registration and re-register.
|
|
|
|
return this.dropRegistrationAndNotifyApp(record.keyID);
|
|
|
|
}
|
|
|
|
throw new Error("Push subscription expired");
|
|
|
|
}).then(_ => this._lookupOrPutPendingRequest(aPageRecord));
|
|
|
|
}
|
|
|
|
return record.toSubscription();
|
|
|
|
});
|
2015-06-03 15:04:00 +03:00
|
|
|
},
|
|
|
|
|
2013-03-29 07:49:41 +04:00
|
|
|
/**
|
|
|
|
* Called on message from the child process.
|
|
|
|
*
|
|
|
|
* Why is the record being deleted from the local database before the server
|
|
|
|
* is told?
|
|
|
|
*
|
|
|
|
* Unregistration is for the benefit of the app and the AppServer
|
|
|
|
* so that the AppServer does not keep pinging a channel the UserAgent isn't
|
|
|
|
* watching The important part of the transaction in this case is left to the
|
|
|
|
* app, to tell its server of the unregistration. Even if the request to the
|
|
|
|
* PushServer were to fail, it would not affect correctness of the protocol,
|
2015-06-03 15:06:00 +03:00
|
|
|
* and the server GC would just clean up the channelID/subscription
|
|
|
|
* eventually. Since the appserver doesn't ping it, no data is lost.
|
2013-03-29 07:49:41 +04:00
|
|
|
*
|
|
|
|
* If rather we were to unregister at the server and update the database only
|
|
|
|
* on success: If the server receives the unregister, and deletes the
|
2015-06-03 15:06:00 +03:00
|
|
|
* channelID/subscription, but the response is lost because of network
|
|
|
|
* failure, the application is never informed. In addition the application may
|
|
|
|
* retry the unregister when it fails due to timeout (websocket) or any other
|
|
|
|
* reason at which point the server will say it does not know of this
|
|
|
|
* unregistration. We'll have to make the registration/unregistration phases
|
|
|
|
* have retries and attempts to resend messages from the server, and have the
|
|
|
|
* client acknowledge. On a server, data is cheap, reliable notification is
|
|
|
|
* not.
|
2013-03-29 07:49:41 +04:00
|
|
|
*/
|
2015-11-10 00:58:50 +03:00
|
|
|
unregister: function(aPageRecord) {
|
|
|
|
console.debug("unregister()", aPageRecord);
|
|
|
|
|
2015-12-08 23:41:41 +03:00
|
|
|
return this._getByPageRecord(aPageRecord)
|
2015-05-12 19:08:00 +03:00
|
|
|
.then(record => {
|
|
|
|
if (record === undefined) {
|
2015-07-15 01:01:41 +03:00
|
|
|
return false;
|
2015-05-12 19:08:00 +03:00
|
|
|
}
|
2015-04-21 21:10:50 +03:00
|
|
|
|
2016-04-21 22:04:15 +03:00
|
|
|
let reason = Ci.nsIPushErrorReporter.UNSUBSCRIBE_MANUAL;
|
2015-06-03 15:06:00 +03:00
|
|
|
return Promise.all([
|
2016-04-21 22:04:15 +03:00
|
|
|
this._sendUnregister(record, reason),
|
2015-06-26 00:52:57 +03:00
|
|
|
this._db.delete(record.keyID),
|
2016-04-21 22:04:15 +03:00
|
|
|
]).then(() => {
|
2016-05-02 18:20:14 +03:00
|
|
|
gPushNotifier.notifySubscriptionModified(record.scope,
|
|
|
|
record.principal);
|
2016-04-21 22:04:15 +03:00
|
|
|
return true;
|
|
|
|
});
|
2015-05-12 19:08:00 +03:00
|
|
|
});
|
2015-04-21 21:10:50 +03:00
|
|
|
},
|
|
|
|
|
2015-12-08 23:41:48 +03:00
|
|
|
clear: function(info) {
|
|
|
|
if (info.domain == "*") {
|
|
|
|
return this._clearAll();
|
|
|
|
}
|
|
|
|
return this._clearForDomain(info.domain);
|
|
|
|
},
|
|
|
|
|
2015-04-21 21:10:51 +03:00
|
|
|
_clearAll: function _clearAll() {
|
2015-06-03 15:05:00 +03:00
|
|
|
return this._checkActivated()
|
2015-11-10 00:58:32 +03:00
|
|
|
.then(_ => this._db.drop())
|
2015-07-29 21:33:48 +03:00
|
|
|
.catch(_ => Promise.resolve());
|
|
|
|
},
|
|
|
|
|
|
|
|
_clearForDomain: function(domain) {
|
|
|
|
/**
|
|
|
|
* Copied from ForgetAboutSite.jsm.
|
|
|
|
*
|
|
|
|
* Returns true if the string passed in is part of the root domain of the
|
|
|
|
* current string. For example, if this is "www.mozilla.org", and we pass in
|
|
|
|
* "mozilla.org", this will return true. It would return false the other way
|
|
|
|
* around.
|
|
|
|
*/
|
|
|
|
function hasRootDomain(str, aDomain)
|
|
|
|
{
|
|
|
|
let index = str.indexOf(aDomain);
|
|
|
|
// If aDomain is not found, we know we do not have it as a root domain.
|
|
|
|
if (index == -1)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// If the strings are the same, we obviously have a match.
|
|
|
|
if (str == aDomain)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
// Otherwise, we have aDomain as our root domain iff the index of aDomain is
|
|
|
|
// aDomain.length subtracted from our length and (since we do not have an
|
|
|
|
// exact match) the character before the index is a dot or slash.
|
|
|
|
let prevChar = str[index - 1];
|
|
|
|
return (index == (str.length - aDomain.length)) &&
|
|
|
|
(prevChar == "." || prevChar == "/");
|
|
|
|
}
|
|
|
|
|
|
|
|
let clear = (db, domain) => {
|
|
|
|
db.clearIf(record => {
|
2015-12-16 20:21:22 +03:00
|
|
|
return record.uri && hasRootDomain(record.uri.prePath, domain);
|
2015-07-29 21:33:48 +03:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._checkActivated()
|
|
|
|
.then(_ => clear(this._db, domain))
|
|
|
|
.catch(e => {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.warn("clearForDomain: Error forgetting about domain", e);
|
2015-06-03 15:05:00 +03:00
|
|
|
return Promise.resolve();
|
|
|
|
});
|
2015-04-21 21:10:51 +03:00
|
|
|
},
|
2015-05-12 19:08:00 +03:00
|
|
|
|
2015-11-10 00:58:50 +03:00
|
|
|
registration: function(aPageRecord) {
|
|
|
|
console.debug("registration()");
|
2015-06-03 15:05:00 +03:00
|
|
|
|
2015-12-08 23:41:41 +03:00
|
|
|
return this._getByPageRecord(aPageRecord)
|
2015-06-26 00:52:57 +03:00
|
|
|
.then(record => {
|
|
|
|
if (!record) {
|
2015-06-03 15:05:00 +03:00
|
|
|
return null;
|
|
|
|
}
|
2015-06-26 00:52:57 +03:00
|
|
|
if (record.isExpired()) {
|
2015-10-06 18:14:25 +03:00
|
|
|
return record.quotaChanged().then(isChanged => {
|
|
|
|
if (isChanged) {
|
2015-11-11 01:27:47 +03:00
|
|
|
return this.dropRegistrationAndNotifyApp(record.keyID).then(_ => null);
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
2015-10-30 19:37:22 +03:00
|
|
|
return null;
|
|
|
|
});
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
2015-11-11 01:27:47 +03:00
|
|
|
return record.toSubscription();
|
2015-06-03 15:05:00 +03:00
|
|
|
});
|
2015-04-19 17:20:24 +03:00
|
|
|
},
|
|
|
|
|
2015-06-26 00:52:57 +03:00
|
|
|
_dropExpiredRegistrations: function() {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("dropExpiredRegistrations()");
|
2015-06-26 00:52:57 +03:00
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
return this._db.getAllExpired().then(records => {
|
|
|
|
return Promise.all(records.map(record =>
|
|
|
|
record.quotaChanged().then(isChanged => {
|
|
|
|
if (isChanged) {
|
2015-06-26 00:52:57 +03:00
|
|
|
// If the user revisited the site, drop the expired push
|
|
|
|
// registration and notify the associated service worker.
|
2015-11-11 01:27:47 +03:00
|
|
|
return this.dropRegistrationAndNotifyApp(record.keyID);
|
2015-06-26 00:52:57 +03:00
|
|
|
}
|
|
|
|
}).catch(error => {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.error("dropExpiredRegistrations: Error dropping registration",
|
|
|
|
record.keyID, error);
|
2015-10-06 18:14:25 +03:00
|
|
|
})
|
|
|
|
));
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
_onPermissionChange: function(subject, data) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("onPermissionChange()");
|
2015-10-06 18:14:25 +03:00
|
|
|
|
|
|
|
if (data == "cleared") {
|
2016-05-02 18:20:14 +03:00
|
|
|
return this._clearPermissions();
|
2015-10-06 18:14:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
let permission = subject.QueryInterface(Ci.nsIPermission);
|
2015-10-31 04:16:19 +03:00
|
|
|
if (permission.type != "desktop-notification") {
|
2015-10-06 18:14:25 +03:00
|
|
|
return Promise.resolve();
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._updatePermission(permission, data);
|
|
|
|
},
|
|
|
|
|
2016-05-02 18:20:14 +03:00
|
|
|
_clearPermissions() {
|
|
|
|
console.debug("clearPermissions()");
|
|
|
|
|
|
|
|
let subscriptionModifications = [];
|
|
|
|
return this._db.clearIf(record => {
|
|
|
|
if (!record.quotaApplies()) {
|
|
|
|
// Only drop registrations that are subject to quota.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (record.isExpired()) {
|
|
|
|
// Fire subscription modified notifications for expired
|
|
|
|
// records after the IndexedDB transaction has committed.
|
|
|
|
subscriptionModifications.push(record);
|
|
|
|
} else {
|
|
|
|
// Drop unexpired registrations in the background.
|
|
|
|
this._backgroundUnregister(record,
|
|
|
|
Ci.nsIPushErrorReporter.UNSUBSCRIBE_PERMISSION_REVOKED);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}).then(() => {
|
|
|
|
subscriptionModifications.forEach(record =>
|
|
|
|
gPushNotifier.notifySubscriptionModified(record.scope, record.principal)
|
|
|
|
);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2015-10-06 18:14:25 +03:00
|
|
|
_updatePermission: function(permission, type) {
|
2015-11-10 00:58:32 +03:00
|
|
|
console.debug("updatePermission()");
|
2015-10-06 18:14:25 +03:00
|
|
|
|
|
|
|
let isAllow = permission.capability ==
|
|
|
|
Ci.nsIPermissionManager.ALLOW_ACTION;
|
|
|
|
let isChange = type == "added" || type == "changed";
|
|
|
|
|
|
|
|
if (isAllow && isChange) {
|
|
|
|
// Permission set to "allow". Drop all expired registrations for this
|
|
|
|
// site, notify the associated service workers, and reset the quota
|
|
|
|
// for active registrations.
|
2015-11-11 01:27:47 +03:00
|
|
|
return this._reduceByPrincipal(
|
2015-10-31 04:15:48 +03:00
|
|
|
permission.principal,
|
2015-11-11 01:27:47 +03:00
|
|
|
(subscriptionChanges, record, cursor) => {
|
|
|
|
this._permissionAllowed(subscriptionChanges, record, cursor);
|
|
|
|
return subscriptionChanges;
|
|
|
|
},
|
|
|
|
[]
|
|
|
|
).then(subscriptionChanges => {
|
|
|
|
this.notifySubscriptionChanges(subscriptionChanges);
|
|
|
|
});
|
2015-10-06 18:14:25 +03:00
|
|
|
} else if (isChange || (isAllow && type == "deleted")) {
|
|
|
|
// Permission set to "block" or "always ask," or "allow" permission
|
|
|
|
// removed. Expire all registrations for this site.
|
2015-11-11 01:27:47 +03:00
|
|
|
return this._reduceByPrincipal(
|
2015-10-31 04:15:48 +03:00
|
|
|
permission.principal,
|
2015-11-11 01:27:47 +03:00
|
|
|
(memo, record, cursor) => this._permissionDenied(record, cursor)
|
2015-10-31 04:15:48 +03:00
|
|
|
);
|
2015-10-06 18:14:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return Promise.resolve();
|
|
|
|
},
|
|
|
|
|
2015-11-11 01:27:47 +03:00
|
|
|
_reduceByPrincipal: function(principal, callback, initialValue) {
|
|
|
|
return this._db.reduceByOrigin(
|
2015-10-06 18:14:25 +03:00
|
|
|
principal.URI.prePath,
|
2015-10-31 04:15:48 +03:00
|
|
|
ChromeUtils.originAttributesToSuffix(principal.originAttributes),
|
2015-11-11 01:27:47 +03:00
|
|
|
callback,
|
|
|
|
initialValue
|
2015-10-06 18:14:25 +03:00
|
|
|
);
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
2015-11-11 01:27:47 +03:00
|
|
|
* The update function called for each registration record if the push
|
|
|
|
* permission is revoked. We only expire the record so we can notify the
|
|
|
|
* service worker as soon as the permission is reinstated. If we just
|
|
|
|
* deleted the record, the worker wouldn't be notified until the next visit
|
|
|
|
* to the site.
|
2015-10-06 18:14:25 +03:00
|
|
|
*
|
2015-11-11 01:27:47 +03:00
|
|
|
* @param {PushRecord} record The record to expire.
|
|
|
|
* @param {IDBCursor} cursor The IndexedDB cursor.
|
2015-10-06 18:14:25 +03:00
|
|
|
*/
|
2015-11-11 01:27:47 +03:00
|
|
|
_permissionDenied: function(record, cursor) {
|
|
|
|
console.debug("permissionDenied()");
|
|
|
|
|
2015-10-31 04:15:48 +03:00
|
|
|
if (!record.quotaApplies() || record.isExpired()) {
|
2015-10-06 18:14:25 +03:00
|
|
|
// Ignore already-expired records.
|
2015-11-11 01:27:47 +03:00
|
|
|
return;
|
2015-10-31 04:15:48 +03:00
|
|
|
}
|
|
|
|
// Drop the registration in the background.
|
2016-03-28 22:29:25 +03:00
|
|
|
this._backgroundUnregister(record,
|
|
|
|
Ci.nsIPushErrorReporter.UNSUBSCRIBE_PERMISSION_REVOKED);
|
2015-10-31 04:15:48 +03:00
|
|
|
record.setQuota(0);
|
2015-11-11 01:27:47 +03:00
|
|
|
cursor.update(record);
|
2015-10-06 18:14:25 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
2015-11-11 01:27:47 +03:00
|
|
|
* The update function called for each registration record if the push
|
|
|
|
* permission is granted. If the record has expired, it will be dropped;
|
|
|
|
* otherwise, its quota will be reset to the default value.
|
2015-10-06 18:14:25 +03:00
|
|
|
*
|
2015-11-11 01:27:47 +03:00
|
|
|
* @param {Array} subscriptionChanges A list of records whose associated
|
|
|
|
* service workers should be notified once the transaction has committed.
|
|
|
|
* @param {PushRecord} record The record to update.
|
|
|
|
* @param {IDBCursor} cursor The IndexedDB cursor.
|
2015-10-06 18:14:25 +03:00
|
|
|
*/
|
2015-11-11 01:27:47 +03:00
|
|
|
_permissionAllowed: function(subscriptionChanges, record, cursor) {
|
|
|
|
console.debug("permissionAllowed()");
|
|
|
|
|
2015-10-31 04:15:48 +03:00
|
|
|
if (!record.quotaApplies()) {
|
2015-11-11 01:27:47 +03:00
|
|
|
return;
|
2015-10-31 04:15:48 +03:00
|
|
|
}
|
|
|
|
if (record.isExpired()) {
|
|
|
|
// If the registration has expired, drop and notify the worker
|
|
|
|
// unconditionally.
|
2015-11-11 01:27:47 +03:00
|
|
|
subscriptionChanges.push(record);
|
|
|
|
cursor.delete();
|
|
|
|
return;
|
2015-10-31 04:15:48 +03:00
|
|
|
}
|
|
|
|
record.resetQuota();
|
2015-11-11 01:27:47 +03:00
|
|
|
cursor.update(record);
|
2015-06-26 00:52:57 +03:00
|
|
|
},
|
2015-04-21 21:10:50 +03:00
|
|
|
};
|