477 lines
16 KiB
C++
477 lines
16 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "mozJSSubScriptLoader.h"
|
|
#include "js/experimental/JSStencil.h"
|
|
#include "mozJSModuleLoader.h"
|
|
#include "mozJSLoaderUtils.h"
|
|
|
|
#include "nsIURI.h"
|
|
#include "nsIIOService.h"
|
|
#include "nsIChannel.h"
|
|
#include "nsIInputStream.h"
|
|
#include "nsNetCID.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
#include "jsapi.h"
|
|
#include "jsfriendapi.h"
|
|
#include "xpcprivate.h" // xpc::OptionsBase
|
|
#include "js/CompilationAndEvaluation.h" // JS::Compile
|
|
#include "js/CompileOptions.h" // JS::ReadOnlyCompileOptions, JS::DecodeOptions
|
|
#include "js/EnvironmentChain.h" // JS::EnvironmentChain
|
|
#include "js/friend/JSMEnvironment.h" // JS::ExecuteInJSMEnvironment, JS::IsJSMEnvironment
|
|
#include "js/SourceText.h" // JS::Source{Ownership,Text}
|
|
#include "js/Wrapper.h"
|
|
|
|
#include "mozilla/ContentPrincipal.h"
|
|
#include "mozilla/dom/ScriptLoader.h"
|
|
#include "mozilla/ProfilerLabels.h"
|
|
#include "mozilla/ProfilerMarkers.h"
|
|
#include "mozilla/ScriptPreloader.h"
|
|
#include "mozilla/SystemPrincipal.h"
|
|
#include "mozilla/scache/StartupCache.h"
|
|
#include "mozilla/scache/StartupCacheUtils.h"
|
|
#include "mozilla/Unused.h"
|
|
#include "mozilla/Utf8.h" // mozilla::Utf8Unit
|
|
#include "nsContentUtils.h"
|
|
#include "nsString.h"
|
|
|
|
using namespace mozilla::scache;
|
|
using namespace JS;
|
|
using namespace xpc;
|
|
using namespace mozilla;
|
|
using namespace mozilla::dom;
|
|
|
|
class MOZ_STACK_CLASS LoadSubScriptOptions : public OptionsBase {
|
|
public:
|
|
explicit LoadSubScriptOptions(JSContext* cx = xpc_GetSafeJSContext(),
|
|
JSObject* options = nullptr)
|
|
: OptionsBase(cx, options),
|
|
target(cx),
|
|
ignoreCache(false),
|
|
wantReturnValue(false) {}
|
|
|
|
virtual bool Parse() override {
|
|
return ParseObject("target", &target) &&
|
|
ParseBoolean("ignoreCache", &ignoreCache) &&
|
|
ParseBoolean("wantReturnValue", &wantReturnValue);
|
|
}
|
|
|
|
RootedObject target;
|
|
bool ignoreCache;
|
|
bool wantReturnValue;
|
|
};
|
|
|
|
/* load() error msgs, XXX localize? */
|
|
#define LOAD_ERROR_NOSERVICE "Error creating IO Service."
|
|
#define LOAD_ERROR_NOURI "Error creating URI (invalid URL scheme?)"
|
|
#define LOAD_ERROR_NOSCHEME "Failed to get URI scheme. This is bad."
|
|
#define LOAD_ERROR_URI_NOT_LOCAL "Trying to load a non-local URI."
|
|
#define LOAD_ERROR_NOSTREAM "Error opening input stream (invalid filename?)"
|
|
#define LOAD_ERROR_NOCONTENT "ContentLength not available (not a local URL?)"
|
|
#define LOAD_ERROR_BADCHARSET "Error converting to specified charset"
|
|
#define LOAD_ERROR_NOSPEC "Failed to get URI spec. This is bad."
|
|
#define LOAD_ERROR_CONTENTTOOBIG "ContentLength is too large"
|
|
|
|
mozJSSubScriptLoader::mozJSSubScriptLoader() = default;
|
|
|
|
mozJSSubScriptLoader::~mozJSSubScriptLoader() = default;
|
|
|
|
NS_IMPL_ISUPPORTS(mozJSSubScriptLoader, mozIJSSubScriptLoader)
|
|
|
|
#define JSSUB_CACHE_PREFIX(aScopeType, aCompilationTarget) \
|
|
"jssubloader/" aScopeType "/" aCompilationTarget
|
|
|
|
static void SubscriptCachePath(JSContext* cx, nsIURI* uri,
|
|
JS::HandleObject targetObj,
|
|
nsACString& cachePath) {
|
|
// StartupCache must distinguish between non-syntactic vs global when
|
|
// computing the cache key.
|
|
if (!JS_IsGlobalObject(targetObj)) {
|
|
PathifyURI(JSSUB_CACHE_PREFIX("non-syntactic", "script"), uri, cachePath);
|
|
} else {
|
|
PathifyURI(JSSUB_CACHE_PREFIX("global", "script"), uri, cachePath);
|
|
}
|
|
}
|
|
|
|
static void ReportError(JSContext* cx, const nsACString& msg) {
|
|
NS_ConvertUTF8toUTF16 ucMsg(msg);
|
|
|
|
RootedValue exn(cx);
|
|
if (xpc::NonVoidStringToJsval(cx, ucMsg, &exn)) {
|
|
JS_SetPendingException(cx, exn);
|
|
}
|
|
}
|
|
|
|
static void ReportError(JSContext* cx, const char* origMsg, nsIURI* uri) {
|
|
if (!uri) {
|
|
ReportError(cx, nsDependentCString(origMsg));
|
|
return;
|
|
}
|
|
|
|
nsAutoCString spec;
|
|
nsresult rv = uri->GetSpec(spec);
|
|
if (NS_FAILED(rv)) {
|
|
spec.AssignLiteral("(unknown)");
|
|
}
|
|
|
|
nsAutoCString msg(origMsg);
|
|
msg.AppendLiteral(": ");
|
|
msg.Append(spec);
|
|
ReportError(cx, msg);
|
|
}
|
|
|
|
static bool EvalStencil(JSContext* cx, HandleObject targetObj,
|
|
HandleObject loadScope, MutableHandleValue retval,
|
|
nsIURI* uri, bool storeIntoStartupCache,
|
|
bool storeIntoPreloadCache, JS::Stencil* stencil) {
|
|
MOZ_ASSERT(!js::IsWrapper(targetObj));
|
|
|
|
JS::InstantiateOptions options;
|
|
JS::RootedScript script(cx,
|
|
JS::InstantiateGlobalStencil(cx, options, stencil));
|
|
if (!script) {
|
|
return false;
|
|
}
|
|
|
|
if (JS_IsGlobalObject(targetObj)) {
|
|
if (!JS_ExecuteScript(cx, script, retval)) {
|
|
return false;
|
|
}
|
|
} else if (JS::IsJSMEnvironment(targetObj)) {
|
|
if (!JS::ExecuteInJSMEnvironment(cx, script, targetObj)) {
|
|
return false;
|
|
}
|
|
retval.setUndefined();
|
|
} else {
|
|
JS::EnvironmentChain envChain(cx, JS::SupportUnscopables::No);
|
|
if (!envChain.append(targetObj)) {
|
|
return false;
|
|
}
|
|
if (!loadScope) {
|
|
// A null loadScope means we are cross-realm. In this case, we should
|
|
// check the target isn't in the JSM loader shared-global or we will
|
|
// contaminate all JSMs in the realm.
|
|
//
|
|
// NOTE: If loadScope is already a shared-global JSM, we can't
|
|
// determine which JSM the target belongs to and have to assume it
|
|
// is in our JSM.
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
|
JSObject* targetGlobal = JS::GetNonCCWObjectGlobal(targetObj);
|
|
MOZ_DIAGNOSTIC_ASSERT(
|
|
!mozJSModuleLoader::Get()->IsLoaderGlobal(targetGlobal),
|
|
"Don't load subscript into target in a shared-global JSM");
|
|
#endif
|
|
if (!JS_ExecuteScript(cx, envChain, script, retval)) {
|
|
return false;
|
|
}
|
|
} else if (JS_IsGlobalObject(loadScope)) {
|
|
if (!JS_ExecuteScript(cx, envChain, script, retval)) {
|
|
return false;
|
|
}
|
|
} else {
|
|
MOZ_ASSERT(JS::IsJSMEnvironment(loadScope));
|
|
if (!JS::ExecuteInJSMEnvironment(cx, script, loadScope, envChain)) {
|
|
return false;
|
|
}
|
|
retval.setUndefined();
|
|
}
|
|
}
|
|
|
|
JSAutoRealm rar(cx, targetObj);
|
|
if (!JS_WrapValue(cx, retval)) {
|
|
return false;
|
|
}
|
|
|
|
if (script && (storeIntoStartupCache || storeIntoPreloadCache)) {
|
|
nsAutoCString cachePath;
|
|
SubscriptCachePath(cx, uri, targetObj, cachePath);
|
|
|
|
nsCString uriStr;
|
|
if (storeIntoPreloadCache && NS_SUCCEEDED(uri->GetSpec(uriStr))) {
|
|
ScriptPreloader::GetSingleton().NoteStencil(uriStr, cachePath, stencil);
|
|
}
|
|
|
|
if (storeIntoStartupCache) {
|
|
JSAutoRealm ar(cx, script);
|
|
WriteCachedStencil(StartupCache::GetSingleton(), cachePath, cx, stencil);
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool mozJSSubScriptLoader::ReadStencil(
|
|
JS::Stencil** stencilOut, nsIURI* uri, JSContext* cx,
|
|
const JS::ReadOnlyCompileOptions& options, nsIIOService* serv,
|
|
bool useCompilationScope) {
|
|
// We create a channel and call SetContentType, to avoid expensive MIME type
|
|
// lookups (bug 632490).
|
|
nsCOMPtr<nsIChannel> chan;
|
|
nsCOMPtr<nsIInputStream> instream;
|
|
nsresult rv;
|
|
rv = NS_NewChannel(getter_AddRefs(chan), uri,
|
|
nsContentUtils::GetSystemPrincipal(),
|
|
nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL,
|
|
nsIContentPolicy::TYPE_OTHER,
|
|
nullptr, // nsICookieJarSettings
|
|
nullptr, // PerformanceStorage
|
|
nullptr, // aLoadGroup
|
|
nullptr, // aCallbacks
|
|
nsIRequest::LOAD_NORMAL, serv);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
chan->SetContentType("application/javascript"_ns);
|
|
rv = chan->Open(getter_AddRefs(instream));
|
|
}
|
|
|
|
if (NS_FAILED(rv)) {
|
|
ReportError(cx, LOAD_ERROR_NOSTREAM, uri);
|
|
return false;
|
|
}
|
|
|
|
int64_t len = -1;
|
|
|
|
rv = chan->GetContentLength(&len);
|
|
if (NS_FAILED(rv)) {
|
|
ReportError(cx, LOAD_ERROR_NOCONTENT, uri);
|
|
return false;
|
|
}
|
|
|
|
if (len > INT32_MAX) {
|
|
ReportError(cx, LOAD_ERROR_CONTENTTOOBIG, uri);
|
|
return false;
|
|
}
|
|
|
|
nsCString buf;
|
|
rv = NS_ReadInputStreamToString(instream, buf, len);
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
if (len < 0) {
|
|
len = buf.Length();
|
|
}
|
|
|
|
Maybe<JSAutoRealm> ar;
|
|
|
|
// Note that when using the ScriptPreloader cache with loadSubScript, there
|
|
// will be a side-effect of keeping the global that the script was compiled
|
|
// for alive. See note above in EvalScript().
|
|
//
|
|
// This will compile the script in XPConnect compilation scope. When the
|
|
// script is evaluated, it will be cloned into the target scope to be
|
|
// executed, avoiding leaks on the first session when we don't have a
|
|
// startup cache.
|
|
if (useCompilationScope) {
|
|
ar.emplace(cx, xpc::CompilationScope());
|
|
}
|
|
|
|
JS::SourceText<Utf8Unit> srcBuf;
|
|
if (!srcBuf.init(cx, buf.get(), len, JS::SourceOwnership::Borrowed)) {
|
|
return false;
|
|
}
|
|
|
|
RefPtr<JS::Stencil> stencil =
|
|
JS::CompileGlobalScriptToStencil(cx, options, srcBuf);
|
|
stencil.forget(stencilOut);
|
|
return *stencilOut;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
mozJSSubScriptLoader::LoadSubScript(const nsAString& url, HandleValue target,
|
|
JSContext* cx, MutableHandleValue retval) {
|
|
/*
|
|
* Loads a local url, referring to UTF-8-encoded data, and evals it into the
|
|
* current cx. Synchronous. ChromeUtils.compileScript() should be used for
|
|
* async loads.
|
|
* url: The url to load. Must be local so that it can be loaded
|
|
* synchronously.
|
|
* targetObj: Optional object to eval the script onto (defaults to context
|
|
* global)
|
|
* returns: Whatever jsval the script pointed to by the url returns.
|
|
* Should ONLY (O N L Y !) be called from JavaScript code.
|
|
*/
|
|
LoadSubScriptOptions options(cx);
|
|
options.target = target.isObject() ? &target.toObject() : nullptr;
|
|
return DoLoadSubScriptWithOptions(url, options, cx, retval);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
mozJSSubScriptLoader::LoadSubScriptWithOptions(const nsAString& url,
|
|
HandleValue optionsVal,
|
|
JSContext* cx,
|
|
MutableHandleValue retval) {
|
|
if (!optionsVal.isObject()) {
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
|
|
LoadSubScriptOptions options(cx, &optionsVal.toObject());
|
|
if (!options.Parse()) {
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
|
|
return DoLoadSubScriptWithOptions(url, options, cx, retval);
|
|
}
|
|
|
|
nsresult mozJSSubScriptLoader::DoLoadSubScriptWithOptions(
|
|
const nsAString& url, LoadSubScriptOptions& options, JSContext* cx,
|
|
MutableHandleValue retval) {
|
|
nsresult rv = NS_OK;
|
|
RootedObject targetObj(cx);
|
|
RootedObject loadScope(cx);
|
|
mozJSModuleLoader* loader = mozJSModuleLoader::Get();
|
|
loader->FindTargetObject(cx, &loadScope);
|
|
|
|
if (options.target) {
|
|
targetObj = options.target;
|
|
} else {
|
|
targetObj = loadScope;
|
|
}
|
|
|
|
targetObj = JS_FindCompilationScope(cx, targetObj);
|
|
if (!targetObj || !loadScope) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
MOZ_ASSERT(!js::IsWrapper(targetObj), "JS_FindCompilationScope must unwrap");
|
|
|
|
if (js::GetNonCCWObjectRealm(loadScope) !=
|
|
js::GetNonCCWObjectRealm(targetObj)) {
|
|
loadScope = nullptr;
|
|
}
|
|
|
|
/* load up the url. From here on, failures are reflected as ``custom''
|
|
* js exceptions */
|
|
nsCOMPtr<nsIURI> uri;
|
|
nsAutoCString uriStr;
|
|
nsAutoCString scheme;
|
|
|
|
// Figure out who's calling us
|
|
JS::AutoFilename filename;
|
|
if (!JS::DescribeScriptedCaller(&filename, cx)) {
|
|
// No scripted frame means we don't know who's calling, bail.
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
JSAutoRealm ar(cx, targetObj);
|
|
|
|
nsCOMPtr<nsIIOService> serv = do_GetService(NS_IOSERVICE_CONTRACTID);
|
|
if (!serv) {
|
|
ReportError(cx, nsLiteralCString(LOAD_ERROR_NOSERVICE));
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_LossyConvertUTF16toASCII asciiUrl(url);
|
|
const nsDependentCSubstring profilerUrl =
|
|
Substring(asciiUrl, 0, std::min(size_t(128), asciiUrl.Length()));
|
|
AUTO_PROFILER_LABEL_DYNAMIC_NSCSTRING_NONSENSITIVE(
|
|
"mozJSSubScriptLoader::DoLoadSubScriptWithOptions", OTHER, profilerUrl);
|
|
AUTO_PROFILER_MARKER_TEXT("SubScript", JS,
|
|
MarkerOptions(MarkerStack::Capture(),
|
|
MarkerInnerWindowIdFromJSContext(cx)),
|
|
profilerUrl);
|
|
|
|
// Make sure to explicitly create the URI, since we'll need the
|
|
// canonicalized spec.
|
|
rv = NS_NewURI(getter_AddRefs(uri), asciiUrl);
|
|
if (NS_FAILED(rv)) {
|
|
ReportError(cx, nsLiteralCString(LOAD_ERROR_NOURI));
|
|
return NS_OK;
|
|
}
|
|
|
|
rv = uri->GetSpec(uriStr);
|
|
if (NS_FAILED(rv)) {
|
|
ReportError(cx, nsLiteralCString(LOAD_ERROR_NOSPEC));
|
|
return NS_OK;
|
|
}
|
|
|
|
rv = uri->GetScheme(scheme);
|
|
if (NS_FAILED(rv)) {
|
|
ReportError(cx, LOAD_ERROR_NOSCHEME, uri);
|
|
return NS_OK;
|
|
}
|
|
|
|
// Suppress caching if we're compiling as content or if we're loading a
|
|
// blob: URI.
|
|
bool useCompilationScope = false;
|
|
auto* principal = BasePrincipal::Cast(GetObjectPrincipal(targetObj));
|
|
bool isSystem = principal->Is<SystemPrincipal>();
|
|
if (!isSystem && principal->Is<ContentPrincipal>()) {
|
|
nsAutoCString scheme;
|
|
principal->GetScheme(scheme);
|
|
|
|
// We want to enable caching for scripts with Activity Stream's
|
|
// codebase URLs.
|
|
if (scheme.EqualsLiteral("about")) {
|
|
nsAutoCString filePath;
|
|
principal->GetFilePath(filePath);
|
|
|
|
useCompilationScope = filePath.EqualsLiteral("home") ||
|
|
filePath.EqualsLiteral("newtab") ||
|
|
filePath.EqualsLiteral("welcome");
|
|
isSystem = true;
|
|
}
|
|
}
|
|
bool ignoreCache =
|
|
options.ignoreCache || !isSystem || scheme.EqualsLiteral("blob");
|
|
|
|
StartupCache* cache = ignoreCache ? nullptr : StartupCache::GetSingleton();
|
|
|
|
nsAutoCString cachePath;
|
|
SubscriptCachePath(cx, uri, targetObj, cachePath);
|
|
|
|
JS::DecodeOptions decodeOptions;
|
|
ScriptPreloader::FillDecodeOptionsForCachedStencil(decodeOptions);
|
|
|
|
RefPtr<JS::Stencil> stencil;
|
|
if (!options.ignoreCache) {
|
|
if (!options.wantReturnValue) {
|
|
// NOTE: If we need the return value, we cannot use ScriptPreloader.
|
|
stencil = ScriptPreloader::GetSingleton().GetCachedStencil(
|
|
cx, decodeOptions, cachePath);
|
|
}
|
|
if (!stencil && cache) {
|
|
rv = ReadCachedStencil(cache, cachePath, cx, decodeOptions,
|
|
getter_AddRefs(stencil));
|
|
if (NS_FAILED(rv) || !stencil) {
|
|
JS_ClearPendingException(cx);
|
|
}
|
|
}
|
|
}
|
|
|
|
bool storeIntoStartupCache = false;
|
|
if (!stencil) {
|
|
// Store into startup cache only when the script isn't come from any cache.
|
|
storeIntoStartupCache = cache;
|
|
|
|
JS::CompileOptions compileOptions(cx);
|
|
ScriptPreloader::FillCompileOptionsForCachedStencil(compileOptions);
|
|
compileOptions.setFileAndLine(uriStr.get(), 1);
|
|
compileOptions.setNonSyntacticScope(!JS_IsGlobalObject(targetObj));
|
|
|
|
if (options.wantReturnValue) {
|
|
compileOptions.setNoScriptRval(false);
|
|
}
|
|
|
|
if (!ReadStencil(getter_AddRefs(stencil), uri, cx, compileOptions, serv,
|
|
useCompilationScope)) {
|
|
return NS_OK;
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
// The above shouldn't touch any options for instantiation.
|
|
JS::InstantiateOptions instantiateOptions(compileOptions);
|
|
instantiateOptions.assertDefault();
|
|
#endif
|
|
}
|
|
|
|
// As a policy choice, we don't store scripts that want return values
|
|
// into the preload cache.
|
|
bool storeIntoPreloadCache = !ignoreCache && !options.wantReturnValue;
|
|
|
|
Unused << EvalStencil(cx, targetObj, loadScope, retval, uri,
|
|
storeIntoStartupCache, storeIntoPreloadCache, stencil);
|
|
return NS_OK;
|
|
}
|