fune/dom/workers/WorkerLoadInfo.h
Sandor Molnar 09e7cbd0b7 Backed out 6 changesets (bug 1876575, bug 1876574) for causing build bustages @ toolkit/components/resistfingerprinting/nsRFPService.cpp CLOSED TREE
Backed out changeset 455ce831c73c (bug 1876575)
Backed out changeset 4fa3fbf3a3ae (bug 1876575)
Backed out changeset ac4c41cb3b67 (bug 1876575)
Backed out changeset 15e06d10788e (bug 1876575)
Backed out changeset dcd6bbea816a (bug 1876575)
Backed out changeset cc547125fda9 (bug 1876574)
2024-03-29 16:29:47 +02:00

200 lines
6.2 KiB
C++

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
* You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_dom_workers_WorkerLoadInfo_h
#define mozilla_dom_workers_WorkerLoadInfo_h
#include "mozilla/OriginAttributes.h"
#include "mozilla/StorageAccess.h"
#include "mozilla/OriginTrials.h"
#include "mozilla/UniquePtr.h"
#include "mozilla/dom/ChannelInfo.h"
#include "mozilla/net/NeckoChannelParams.h"
#include "mozilla/dom/ServiceWorkerRegistrationDescriptor.h"
#include "mozilla/dom/WorkerCommon.h"
#include "nsIInterfaceRequestor.h"
#include "nsILoadContext.h"
#include "nsIRequest.h"
#include "nsISupportsImpl.h"
#include "nsIWeakReferenceUtils.h"
#include "nsRFPService.h"
#include "nsTArray.h"
class nsIChannel;
class nsIContentSecurityPolicy;
class nsICookieJarSettings;
class nsILoadGroup;
class nsIPrincipal;
class nsIReferrerInfo;
class nsIRunnable;
class nsIScriptContext;
class nsIBrowserChild;
class nsIURI;
class nsPIDOMWindowInner;
namespace mozilla {
namespace ipc {
class PrincipalInfo;
class CSPInfo;
} // namespace ipc
namespace dom {
class WorkerPrivate;
struct WorkerLoadInfoData {
// All of these should be released in
// WorkerPrivateParent::ForgetMainThreadObjects.
nsCOMPtr<nsIURI> mBaseURI;
nsCOMPtr<nsIURI> mResolvedScriptURI;
// This is the principal of the global (parent worker or a window) loading
// the worker. It can be null if we are executing a ServiceWorker, otherwise,
// except for data: URL, it must subsumes the worker principal.
// If we load a data: URL, mPrincipal will be a null principal.
nsCOMPtr<nsIPrincipal> mLoadingPrincipal;
nsCOMPtr<nsIPrincipal> mPrincipal;
nsCOMPtr<nsIPrincipal> mPartitionedPrincipal;
// Taken from the parent context.
nsCOMPtr<nsICookieJarSettings> mCookieJarSettings;
// The CookieJarSettingsArgs of mCookieJarSettings.
// This is specific for accessing on worker thread.
net::CookieJarSettingsArgs mCookieJarSettingsArgs;
nsCOMPtr<nsIScriptContext> mScriptContext;
nsCOMPtr<nsPIDOMWindowInner> mWindow;
nsCOMPtr<nsIContentSecurityPolicy> mCSP;
// Thread boundaries require us to not only store a CSP object, but also a
// serialized version of the CSP. Reason being: Serializing a CSP to a CSPInfo
// needs to happen on the main thread, but storing the CSPInfo needs to happen
// on the worker thread. We move the CSPInfo into the Client within
// ScriptLoader::PreRun().
UniquePtr<mozilla::ipc::CSPInfo> mCSPInfo;
nsCOMPtr<nsIChannel> mChannel;
nsCOMPtr<nsILoadGroup> mLoadGroup;
class InterfaceRequestor final : public nsIInterfaceRequestor {
NS_DECL_ISUPPORTS
public:
InterfaceRequestor(nsIPrincipal* aPrincipal, nsILoadGroup* aLoadGroup);
void MaybeAddBrowserChild(nsILoadGroup* aLoadGroup);
NS_IMETHOD GetInterface(const nsIID& aIID, void** aSink) override;
void SetOuterRequestor(nsIInterfaceRequestor* aOuterRequestor) {
MOZ_ASSERT(!mOuterRequestor);
MOZ_ASSERT(aOuterRequestor);
mOuterRequestor = aOuterRequestor;
}
private:
~InterfaceRequestor() = default;
already_AddRefed<nsIBrowserChild> GetAnyLiveBrowserChild();
nsCOMPtr<nsILoadContext> mLoadContext;
nsCOMPtr<nsIInterfaceRequestor> mOuterRequestor;
// Array of weak references to nsIBrowserChild. We do not want to keep
// BrowserChild actors alive for long after their ActorDestroy() methods are
// called.
nsTArray<nsWeakPtr> mBrowserChildList;
};
// Only set if we have a custom overriden load group
RefPtr<InterfaceRequestor> mInterfaceRequestor;
UniquePtr<mozilla::ipc::PrincipalInfo> mPrincipalInfo;
UniquePtr<mozilla::ipc::PrincipalInfo> mPartitionedPrincipalInfo;
nsCString mDomain;
nsString mServiceWorkerCacheName;
Maybe<ServiceWorkerDescriptor> mServiceWorkerDescriptor;
Maybe<ServiceWorkerRegistrationDescriptor>
mServiceWorkerRegistrationDescriptor;
Maybe<ServiceWorkerDescriptor> mParentController;
nsID mAgentClusterId;
ChannelInfo mChannelInfo;
nsLoadFlags mLoadFlags;
uint64_t mWindowID;
uint64_t mAssociatedBrowsingContextID;
nsCOMPtr<nsIReferrerInfo> mReferrerInfo;
OriginTrials mTrials;
bool mFromWindow;
bool mEvalAllowed;
bool mReportEvalCSPViolations;
bool mWasmEvalAllowed;
bool mReportWasmEvalCSPViolations;
bool mXHRParamsAllowed;
bool mWatchedByDevTools;
StorageAccess mStorageAccess;
bool mUseRegularPrincipal;
bool mUsingStorageAccess;
bool mServiceWorkersTestingInWindow;
bool mShouldResistFingerprinting;
Maybe<RFPTarget> mOverriddenFingerprintingSettings;
OriginAttributes mOriginAttributes;
bool mIsThirdPartyContextToTopWindow;
enum {
eNotSet,
eInsecureContext,
eSecureContext,
} mSecureContext;
WorkerLoadInfoData();
WorkerLoadInfoData(WorkerLoadInfoData&& aOther) = default;
WorkerLoadInfoData& operator=(WorkerLoadInfoData&& aOther) = default;
};
struct WorkerLoadInfo : WorkerLoadInfoData {
WorkerLoadInfo();
WorkerLoadInfo(WorkerLoadInfo&& aOther) noexcept;
~WorkerLoadInfo();
WorkerLoadInfo& operator=(WorkerLoadInfo&& aOther) = default;
nsresult SetPrincipalsAndCSPOnMainThread(nsIPrincipal* aPrincipal,
nsIPrincipal* aPartitionedPrincipal,
nsILoadGroup* aLoadGroup,
nsIContentSecurityPolicy* aCSP);
nsresult GetPrincipalsAndLoadGroupFromChannel(
nsIChannel* aChannel, nsIPrincipal** aPrincipalOut,
nsIPrincipal** aPartitionedPrincipalOut, nsILoadGroup** aLoadGroupOut);
nsresult SetPrincipalsAndCSPFromChannel(nsIChannel* aChannel);
bool FinalChannelPrincipalIsValid(nsIChannel* aChannel);
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
bool PrincipalIsValid() const;
bool PrincipalURIMatchesScriptURL();
#endif
bool ProxyReleaseMainThreadObjects(WorkerPrivate* aWorkerPrivate);
bool ProxyReleaseMainThreadObjects(
WorkerPrivate* aWorkerPrivate,
nsCOMPtr<nsILoadGroup>&& aLoadGroupToCancel);
};
} // namespace dom
} // namespace mozilla
#endif // mozilla_dom_workers_WorkerLoadInfo_h