fune/dom/filesystem/FileSystemRequestParent.cpp
Jean-Yves Avenard 87438519f0 Bug 1637500 - P2. Rename methods as they are not always dealing with "threads". r=froydnj
Before P1, GetCurrentThreadSerialEventTarget would have always returned the same data as NS_GetCurrentThread, making the comment incorrect Now it will properly return the running TaskQueue if any.

This change of name more clearly exposes what they are doing, as we aren't always dealing with threads directly; but a nsISerialEventTarget

Differential Revision: https://phabricator.services.mozilla.com/D80354
2020-06-23 05:05:36 +00:00

181 lines
5.1 KiB
C++

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "mozilla/dom/FileSystemRequestParent.h"
#include "mozilla/dom/PFileSystemParams.h"
#include "GetDirectoryListingTask.h"
#include "GetFileOrDirectoryTask.h"
#include "mozilla/dom/ContentParent.h"
#include "mozilla/dom/FileSystemBase.h"
#include "mozilla/dom/FileSystemSecurity.h"
#include "mozilla/ipc/BackgroundParent.h"
#include "mozilla/Unused.h"
#include "nsProxyRelease.h"
using namespace mozilla::ipc;
namespace mozilla {
namespace dom {
FileSystemRequestParent::FileSystemRequestParent() : mDestroyed(false) {
AssertIsOnBackgroundThread();
}
FileSystemRequestParent::~FileSystemRequestParent() {
AssertIsOnBackgroundThread();
}
#define FILESYSTEM_REQUEST_PARENT_DISPATCH_ENTRY(name) \
case FileSystemParams::TFileSystem##name##Params: { \
const FileSystem##name##Params& p = aParams; \
mFileSystem = new OSFileSystemParent(p.filesystem()); \
MOZ_ASSERT(mFileSystem); \
mTask = name##TaskParent::Create(mFileSystem, p, this, rv); \
if (NS_WARN_IF(rv.Failed())) { \
rv.SuppressException(); \
return false; \
} \
break; \
}
bool FileSystemRequestParent::Initialize(const FileSystemParams& aParams) {
AssertIsOnBackgroundThread();
ErrorResult rv;
switch (aParams.type()) {
FILESYSTEM_REQUEST_PARENT_DISPATCH_ENTRY(GetDirectoryListing)
FILESYSTEM_REQUEST_PARENT_DISPATCH_ENTRY(GetFileOrDirectory)
FILESYSTEM_REQUEST_PARENT_DISPATCH_ENTRY(GetFiles)
default: {
MOZ_CRASH("not reached");
break;
}
}
if (NS_WARN_IF(!mTask || !mFileSystem)) {
// Should never reach here.
return false;
}
return true;
}
namespace {
class CheckPermissionRunnable final : public Runnable {
public:
CheckPermissionRunnable(already_AddRefed<ContentParent> aParent,
FileSystemRequestParent* aActor,
FileSystemTaskParentBase* aTask,
const nsAString& aPath)
: Runnable("dom::CheckPermissionRunnable"),
mContentParent(aParent),
mActor(aActor),
mTask(aTask),
mPath(aPath),
mBackgroundEventTarget(GetCurrentEventTarget()) {
AssertIsInMainProcess();
AssertIsOnBackgroundThread();
MOZ_ASSERT(mContentParent);
MOZ_ASSERT(mActor);
MOZ_ASSERT(mTask);
MOZ_ASSERT(mBackgroundEventTarget);
}
NS_IMETHOD
Run() override {
if (NS_IsMainThread()) {
auto raii = mozilla::MakeScopeExit([&] { mContentParent = nullptr; });
if (!mozilla::Preferences::GetBool("dom.filesystem.pathcheck.disabled",
false)) {
RefPtr<FileSystemSecurity> fss = FileSystemSecurity::Get();
if (NS_WARN_IF(!fss || !fss->ContentProcessHasAccessTo(
mContentParent->ChildID(), mPath))) {
mContentParent->KillHard("This path is not allowed.");
return NS_OK;
}
}
return mBackgroundEventTarget->Dispatch(this, NS_DISPATCH_NORMAL);
}
AssertIsOnBackgroundThread();
// It can happen that this actor has been destroyed in the meantime we were
// on the main-thread.
if (!mActor->Destroyed()) {
mTask->Start();
}
return NS_OK;
}
private:
~CheckPermissionRunnable() {
NS_ProxyRelease("CheckPermissionRunnable::mActor", mBackgroundEventTarget,
mActor.forget());
}
RefPtr<ContentParent> mContentParent;
RefPtr<FileSystemRequestParent> mActor;
RefPtr<FileSystemTaskParentBase> mTask;
const nsString mPath;
nsCOMPtr<nsIEventTarget> mBackgroundEventTarget;
};
} // namespace
void FileSystemRequestParent::Start() {
AssertIsInMainProcess();
AssertIsOnBackgroundThread();
MOZ_ASSERT(!mDestroyed);
MOZ_ASSERT(mFileSystem);
MOZ_ASSERT(mTask);
nsAutoString path;
if (NS_WARN_IF(NS_FAILED(mTask->GetTargetPath(path)))) {
Unused << Send__delete__(
this, FileSystemErrorResponse(NS_ERROR_DOM_SECURITY_ERR));
return;
}
RefPtr<ContentParent> parent = BackgroundParent::GetContentParent(Manager());
// If the ContentParent is null we are dealing with a same-process actor.
if (!parent) {
mTask->Start();
return;
}
RefPtr<Runnable> runnable =
new CheckPermissionRunnable(parent.forget(), this, mTask, path);
NS_DispatchToMainThread(runnable);
}
void FileSystemRequestParent::ActorDestroy(ActorDestroyReason aWhy) {
AssertIsOnBackgroundThread();
MOZ_ASSERT(!mDestroyed);
if (!mFileSystem) {
return;
}
mFileSystem->Shutdown();
mFileSystem = nullptr;
mTask = nullptr;
mDestroyed = true;
}
} // namespace dom
} // namespace mozilla