зеркало из https://github.com/mozilla/gecko-dev.git
197 строки
6.2 KiB
C++
197 строки
6.2 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef mozilla_dom_workers_WorkerLoadInfo_h
|
|
#define mozilla_dom_workers_WorkerLoadInfo_h
|
|
|
|
#include "mozilla/OriginAttributes.h"
|
|
#include "mozilla/StorageAccess.h"
|
|
#include "mozilla/UniquePtr.h"
|
|
#include "mozilla/dom/ChannelInfo.h"
|
|
#include "mozilla/dom/ServiceWorkerRegistrationDescriptor.h"
|
|
#include "mozilla/dom/WorkerCommon.h"
|
|
|
|
#include "nsIInterfaceRequestor.h"
|
|
#include "nsILoadContext.h"
|
|
#include "nsIRequest.h"
|
|
#include "nsISupportsImpl.h"
|
|
#include "nsIWeakReferenceUtils.h"
|
|
#include "nsTArray.h"
|
|
|
|
class nsIChannel;
|
|
class nsIContentSecurityPolicy;
|
|
class nsICookieJarSettings;
|
|
class nsILoadGroup;
|
|
class nsIPrincipal;
|
|
class nsIReferrerInfo;
|
|
class nsIRunnable;
|
|
class nsIScriptContext;
|
|
class nsIBrowserChild;
|
|
class nsIURI;
|
|
class nsPIDOMWindowInner;
|
|
|
|
namespace mozilla {
|
|
|
|
namespace ipc {
|
|
class PrincipalInfo;
|
|
class CSPInfo;
|
|
} // namespace ipc
|
|
|
|
namespace dom {
|
|
|
|
class WorkerPrivate;
|
|
|
|
struct WorkerLoadInfoData {
|
|
// All of these should be released in
|
|
// WorkerPrivateParent::ForgetMainThreadObjects.
|
|
nsCOMPtr<nsIURI> mBaseURI;
|
|
nsCOMPtr<nsIURI> mResolvedScriptURI;
|
|
|
|
// This is the principal of the global (parent worker or a window) loading
|
|
// the worker. It can be null if we are executing a ServiceWorker, otherwise,
|
|
// except for data: URL, it must subsumes the worker principal.
|
|
// If we load a data: URL, mPrincipal will be a null principal.
|
|
nsCOMPtr<nsIPrincipal> mLoadingPrincipal;
|
|
nsCOMPtr<nsIPrincipal> mPrincipal;
|
|
nsCOMPtr<nsIPrincipal> mPartitionedPrincipal;
|
|
|
|
// Taken from the parent context.
|
|
nsCOMPtr<nsICookieJarSettings> mCookieJarSettings;
|
|
|
|
nsCOMPtr<nsIScriptContext> mScriptContext;
|
|
nsCOMPtr<nsPIDOMWindowInner> mWindow;
|
|
nsCOMPtr<nsIContentSecurityPolicy> mCSP;
|
|
// Thread boundaries require us to not only store a CSP object, but also a
|
|
// serialized version of the CSP. Reason being: Serializing a CSP to a CSPInfo
|
|
// needs to happen on the main thread, but storing the CSPInfo needs to happen
|
|
// on the worker thread. We move the CSPInfo into the Client within
|
|
// ScriptLoader::PreRun().
|
|
UniquePtr<mozilla::ipc::CSPInfo> mCSPInfo;
|
|
|
|
nsCOMPtr<nsIChannel> mChannel;
|
|
nsCOMPtr<nsILoadGroup> mLoadGroup;
|
|
|
|
class InterfaceRequestor final : public nsIInterfaceRequestor {
|
|
NS_DECL_ISUPPORTS
|
|
|
|
public:
|
|
InterfaceRequestor(nsIPrincipal* aPrincipal, nsILoadGroup* aLoadGroup);
|
|
void MaybeAddBrowserChild(nsILoadGroup* aLoadGroup);
|
|
NS_IMETHOD GetInterface(const nsIID& aIID, void** aSink) override;
|
|
|
|
void SetOuterRequestor(nsIInterfaceRequestor* aOuterRequestor) {
|
|
MOZ_ASSERT(!mOuterRequestor);
|
|
MOZ_ASSERT(aOuterRequestor);
|
|
mOuterRequestor = aOuterRequestor;
|
|
}
|
|
|
|
private:
|
|
~InterfaceRequestor() = default;
|
|
|
|
already_AddRefed<nsIBrowserChild> GetAnyLiveBrowserChild();
|
|
|
|
nsCOMPtr<nsILoadContext> mLoadContext;
|
|
nsCOMPtr<nsIInterfaceRequestor> mOuterRequestor;
|
|
|
|
// Array of weak references to nsIBrowserChild. We do not want to keep
|
|
// BrowserChild actors alive for long after their ActorDestroy() methods are
|
|
// called.
|
|
nsTArray<nsWeakPtr> mBrowserChildList;
|
|
};
|
|
|
|
// Only set if we have a custom overriden load group
|
|
RefPtr<InterfaceRequestor> mInterfaceRequestor;
|
|
|
|
UniquePtr<mozilla::ipc::PrincipalInfo> mPrincipalInfo;
|
|
UniquePtr<mozilla::ipc::PrincipalInfo> mPartitionedPrincipalInfo;
|
|
nsCString mDomain;
|
|
nsString mOriginNoSuffix; // Derived from mPrincipal; can be used on worker
|
|
// thread.
|
|
nsCString mOrigin; // Derived from mPrincipal; can be used on worker thread.
|
|
nsCString mPartitionedOrigin; // Derived from mPartitionedPrincipal; can be
|
|
// used on worker thread.
|
|
|
|
nsString mServiceWorkerCacheName;
|
|
Maybe<ServiceWorkerDescriptor> mServiceWorkerDescriptor;
|
|
Maybe<ServiceWorkerRegistrationDescriptor>
|
|
mServiceWorkerRegistrationDescriptor;
|
|
|
|
Maybe<ServiceWorkerDescriptor> mParentController;
|
|
|
|
nsID mAgentClusterId;
|
|
|
|
ChannelInfo mChannelInfo;
|
|
nsLoadFlags mLoadFlags;
|
|
|
|
uint64_t mWindowID;
|
|
|
|
nsCOMPtr<nsIReferrerInfo> mReferrerInfo;
|
|
uint32_t mPrincipalHashValue;
|
|
bool mFromWindow;
|
|
bool mEvalAllowed;
|
|
bool mReportCSPViolations;
|
|
bool mXHRParamsAllowed;
|
|
bool mPrincipalIsSystem;
|
|
bool mPrincipalIsAddonOrExpandedAddon;
|
|
bool mWatchedByDevTools;
|
|
StorageAccess mStorageAccess;
|
|
bool mUseRegularPrincipal;
|
|
bool mHasStorageAccessPermissionGranted;
|
|
bool mServiceWorkersTestingInWindow;
|
|
bool mShouldResistFingerprinting;
|
|
OriginAttributes mOriginAttributes;
|
|
bool mIsThirdPartyContextToTopWindow;
|
|
|
|
enum {
|
|
eNotSet,
|
|
eInsecureContext,
|
|
eSecureContext,
|
|
} mSecureContext;
|
|
|
|
WorkerLoadInfoData();
|
|
WorkerLoadInfoData(WorkerLoadInfoData&& aOther) = default;
|
|
|
|
WorkerLoadInfoData& operator=(WorkerLoadInfoData&& aOther) = default;
|
|
};
|
|
|
|
struct WorkerLoadInfo : WorkerLoadInfoData {
|
|
WorkerLoadInfo();
|
|
WorkerLoadInfo(WorkerLoadInfo&& aOther) noexcept;
|
|
~WorkerLoadInfo();
|
|
|
|
WorkerLoadInfo& operator=(WorkerLoadInfo&& aOther) = default;
|
|
|
|
nsresult SetPrincipalsAndCSPOnMainThread(nsIPrincipal* aPrincipal,
|
|
nsIPrincipal* aPartitionedPrincipal,
|
|
nsILoadGroup* aLoadGroup,
|
|
nsIContentSecurityPolicy* aCSP);
|
|
|
|
nsresult GetPrincipalsAndLoadGroupFromChannel(
|
|
nsIChannel* aChannel, nsIPrincipal** aPrincipalOut,
|
|
nsIPrincipal** aPartitionedPrincipalOut, nsILoadGroup** aLoadGroupOut);
|
|
|
|
nsresult SetPrincipalsAndCSPFromChannel(nsIChannel* aChannel);
|
|
|
|
bool FinalChannelPrincipalIsValid(nsIChannel* aChannel);
|
|
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
|
bool PrincipalIsValid() const;
|
|
|
|
bool PrincipalURIMatchesScriptURL();
|
|
#endif
|
|
|
|
bool ProxyReleaseMainThreadObjects(WorkerPrivate* aWorkerPrivate);
|
|
|
|
bool ProxyReleaseMainThreadObjects(
|
|
WorkerPrivate* aWorkerPrivate,
|
|
nsCOMPtr<nsILoadGroup>&& aLoadGroupToCancel);
|
|
};
|
|
|
|
} // namespace dom
|
|
} // namespace mozilla
|
|
|
|
#endif // mozilla_dom_workers_WorkerLoadInfo_h
|