/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef mozilla_dom_workers_WorkerLoadInfo_h #define mozilla_dom_workers_WorkerLoadInfo_h #include "mozilla/StorageAccess.h" #include "mozilla/dom/ChannelInfo.h" #include "mozilla/dom/ServiceWorkerRegistrationDescriptor.h" #include "mozilla/dom/WorkerCommon.h" #include "nsIInterfaceRequestor.h" #include "nsILoadContext.h" #include "nsIRequest.h" #include "nsISupportsImpl.h" #include "nsIWeakReferenceUtils.h" class nsIChannel; class nsIContentSecurityPolicy; class nsICookieSettings; class nsILoadGroup; class nsIPrincipal; class nsIRunnable; class nsIScriptContext; class nsIBrowserChild; class nsIURI; class nsPIDOMWindowInner; namespace mozilla { namespace ipc { class PrincipalInfo; class CSPInfo; } // namespace ipc namespace dom { class WorkerPrivate; struct WorkerLoadInfoData { // All of these should be released in // WorkerPrivateParent::ForgetMainThreadObjects. nsCOMPtr mBaseURI; nsCOMPtr mResolvedScriptURI; // This is the principal of the global (parent worker or a window) loading // the worker. It can be null if we are executing a ServiceWorker, otherwise, // except for data: URL, it must subsumes the worker principal. // If we load a data: URL, mPrincipal will be a null principal. nsCOMPtr mLoadingPrincipal; nsCOMPtr mPrincipal; nsCOMPtr mStoragePrincipal; // Taken from the parent context. nsCOMPtr mCookieSettings; nsCOMPtr mScriptContext; nsCOMPtr mWindow; nsCOMPtr mCSP; // Thread boundaries require us to not only store a CSP object, but also a // serialized version of the CSP. Reason being: Serializing a CSP to a CSPInfo // needs to happen on the main thread, but storing the CSPInfo needs to happen // on the worker thread. We move the CSPInfo into the Client within // ScriptLoader::PreRun(). nsAutoPtr mCSPInfo; nsCOMPtr mChannel; nsCOMPtr mLoadGroup; class InterfaceRequestor final : public nsIInterfaceRequestor { NS_DECL_ISUPPORTS public: InterfaceRequestor(nsIPrincipal* aPrincipal, nsILoadGroup* aLoadGroup); void MaybeAddBrowserChild(nsILoadGroup* aLoadGroup); NS_IMETHOD GetInterface(const nsIID& aIID, void** aSink) override; void SetOuterRequestor(nsIInterfaceRequestor* aOuterRequestor) { MOZ_ASSERT(!mOuterRequestor); MOZ_ASSERT(aOuterRequestor); mOuterRequestor = aOuterRequestor; } private: ~InterfaceRequestor() {} already_AddRefed GetAnyLiveBrowserChild(); nsCOMPtr mLoadContext; nsCOMPtr mOuterRequestor; // Array of weak references to nsIBrowserChild. We do not want to keep // BrowserChild actors alive for long after their ActorDestroy() methods are // called. nsTArray mBrowserChildList; }; // Only set if we have a custom overriden load group RefPtr mInterfaceRequestor; nsAutoPtr mPrincipalInfo; nsAutoPtr mStoragePrincipalInfo; nsCString mDomain; nsString mOrigin; // Derived from mPrincipal; can be used on worker thread. nsString mServiceWorkerCacheName; Maybe mServiceWorkerDescriptor; Maybe mServiceWorkerRegistrationDescriptor; Maybe mParentController; ChannelInfo mChannelInfo; nsLoadFlags mLoadFlags; uint64_t mWindowID; nsCOMPtr mReferrerInfo; bool mFromWindow; bool mEvalAllowed; bool mReportCSPViolations; bool mXHRParamsAllowed; bool mPrincipalIsSystem; bool mWatchedByDevtools; StorageAccess mStorageAccess; bool mFirstPartyStorageAccessGranted; bool mServiceWorkersTestingInWindow; OriginAttributes mOriginAttributes; enum { eNotSet, eInsecureContext, eSecureContext, } mSecureContext; WorkerLoadInfoData(); WorkerLoadInfoData(WorkerLoadInfoData&& aOther) = default; WorkerLoadInfoData& operator=(WorkerLoadInfoData&& aOther) = default; }; struct WorkerLoadInfo : WorkerLoadInfoData { WorkerLoadInfo(); WorkerLoadInfo(WorkerLoadInfo&& aOther) noexcept; ~WorkerLoadInfo(); WorkerLoadInfo& operator=(WorkerLoadInfo&& aOther) = default; nsresult SetPrincipalsAndCSPOnMainThread(nsIPrincipal* aPrincipal, nsIPrincipal* aStoragePrincipal, nsILoadGroup* aLoadGroup, nsIContentSecurityPolicy* aCSP); nsresult GetPrincipalsAndLoadGroupFromChannel( nsIChannel* aChannel, nsIPrincipal** aPrincipalOut, nsIPrincipal** aStoragePrincipalOut, nsILoadGroup** aLoadGroupOut); nsresult SetPrincipalsAndCSPFromChannel(nsIChannel* aChannel); bool FinalChannelPrincipalIsValid(nsIChannel* aChannel); #ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED bool PrincipalIsValid() const; bool PrincipalURIMatchesScriptURL(); #endif bool ProxyReleaseMainThreadObjects(WorkerPrivate* aWorkerPrivate); bool ProxyReleaseMainThreadObjects( WorkerPrivate* aWorkerPrivate, nsCOMPtr& aLoadGroupToCancel); }; } // namespace dom } // namespace mozilla #endif // mozilla_dom_workers_WorkerLoadInfo_h