summaryrefslogtreecommitdiffstats
path: root/dom/workers/ScriptLoader.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'dom/workers/ScriptLoader.cpp')
-rw-r--r--dom/workers/ScriptLoader.cpp2496
1 files changed, 2496 insertions, 0 deletions
diff --git a/dom/workers/ScriptLoader.cpp b/dom/workers/ScriptLoader.cpp
new file mode 100644
index 0000000000..70c1c3b585
--- /dev/null
+++ b/dom/workers/ScriptLoader.cpp
@@ -0,0 +1,2496 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "ScriptLoader.h"
+
+#include <algorithm>
+#include <type_traits>
+
+#include "nsIChannel.h"
+#include "nsIContentPolicy.h"
+#include "nsIContentSecurityPolicy.h"
+#include "nsICookieJarSettings.h"
+#include "nsIDocShell.h"
+#include "nsIHttpChannel.h"
+#include "nsIHttpChannelInternal.h"
+#include "nsIInputStreamPump.h"
+#include "nsIIOService.h"
+#include "nsIOService.h"
+#include "nsIPrincipal.h"
+#include "nsIProtocolHandler.h"
+#include "nsIScriptError.h"
+#include "nsIScriptSecurityManager.h"
+#include "nsIStreamLoader.h"
+#include "nsIStreamListenerTee.h"
+#include "nsIThreadRetargetableRequest.h"
+#include "nsIURI.h"
+#include "nsIXPConnect.h"
+
+#include "jsapi.h"
+#include "jsfriendapi.h"
+#include "js/CompilationAndEvaluation.h"
+#include "js/Exception.h"
+#include "js/SourceText.h"
+#include "nsError.h"
+#include "nsComponentManagerUtils.h"
+#include "nsContentPolicyUtils.h"
+#include "nsContentUtils.h"
+#include "nsDocShellCID.h"
+#include "nsJSEnvironment.h"
+#include "nsNetUtil.h"
+#include "nsIPipe.h"
+#include "nsIOutputStream.h"
+#include "nsPrintfCString.h"
+#include "nsString.h"
+#include "nsStreamUtils.h"
+#include "nsTArray.h"
+#include "nsThreadUtils.h"
+#include "nsXPCOM.h"
+#include "xpcpublic.h"
+
+#include "mozilla/ArrayAlgorithm.h"
+#include "mozilla/Assertions.h"
+#include "mozilla/LoadContext.h"
+#include "mozilla/Maybe.h"
+#include "mozilla/ipc/BackgroundUtils.h"
+#include "mozilla/dom/BlobURLProtocolHandler.h"
+#include "mozilla/dom/CacheBinding.h"
+#include "mozilla/dom/cache/CacheTypes.h"
+#include "mozilla/dom/cache/Cache.h"
+#include "mozilla/dom/cache/CacheStorage.h"
+#include "mozilla/dom/ChannelInfo.h"
+#include "mozilla/dom/ClientChannelHelper.h"
+#include "mozilla/dom/ClientInfo.h"
+#include "mozilla/dom/Exceptions.h"
+#include "mozilla/dom/InternalResponse.h"
+#include "mozilla/dom/nsCSPService.h"
+#include "mozilla/dom/nsCSPUtils.h"
+#include "mozilla/dom/PerformanceStorage.h"
+#include "mozilla/dom/Promise.h"
+#include "mozilla/dom/PromiseNativeHandler.h"
+#include "mozilla/dom/Response.h"
+#include "mozilla/dom/ScriptLoader.h"
+#include "mozilla/dom/ScriptSettings.h"
+#include "mozilla/dom/SerializedStackHolder.h"
+#include "mozilla/dom/SRILogHelper.h"
+#include "mozilla/dom/SerializedStackHolder.h"
+#include "mozilla/dom/ServiceWorkerBinding.h"
+#include "mozilla/dom/ServiceWorkerManager.h"
+#include "mozilla/Result.h"
+#include "mozilla/ResultExtensions.h"
+#include "mozilla/StaticPrefs_browser.h"
+#include "mozilla/StaticPrefs_dom.h"
+#include "mozilla/StaticPrefs_security.h"
+#include "mozilla/UniquePtr.h"
+#include "Principal.h"
+#include "WorkerPrivate.h"
+#include "WorkerRunnable.h"
+#include "WorkerScope.h"
+
+#define MAX_CONCURRENT_SCRIPTS 1000
+
+using mozilla::dom::cache::Cache;
+using mozilla::dom::cache::CacheStorage;
+using mozilla::ipc::PrincipalInfo;
+
+namespace mozilla {
+namespace dom {
+
+namespace {
+
+nsIURI* GetBaseURI(bool aIsMainScript, WorkerPrivate* aWorkerPrivate) {
+ MOZ_ASSERT(aWorkerPrivate);
+ nsIURI* baseURI;
+ WorkerPrivate* parentWorker = aWorkerPrivate->GetParent();
+ if (aIsMainScript) {
+ if (parentWorker) {
+ baseURI = parentWorker->GetBaseURI();
+ NS_ASSERTION(baseURI, "Should have been set already!");
+ } else {
+ // May be null.
+ baseURI = aWorkerPrivate->GetBaseURI();
+ }
+ } else {
+ baseURI = aWorkerPrivate->GetBaseURI();
+ NS_ASSERTION(baseURI, "Should have been set already!");
+ }
+
+ return baseURI;
+}
+
+nsresult ConstructURI(const nsAString& aScriptURL, nsIURI* baseURI,
+ Document* parentDoc, bool aDefaultURIEncoding,
+ nsIURI** aResult) {
+ nsresult rv;
+ if (aDefaultURIEncoding) {
+ rv = NS_NewURI(aResult, aScriptURL, nullptr, baseURI);
+ } else {
+ rv = nsContentUtils::NewURIWithDocumentCharset(aResult, aScriptURL,
+ parentDoc, baseURI);
+ }
+
+ if (NS_FAILED(rv)) {
+ return NS_ERROR_DOM_SYNTAX_ERR;
+ }
+ return NS_OK;
+}
+
+nsresult ChannelFromScriptURL(
+ nsIPrincipal* principal, Document* parentDoc, WorkerPrivate* aWorkerPrivate,
+ nsILoadGroup* loadGroup, nsIIOService* ios,
+ nsIScriptSecurityManager* secMan, nsIURI* aScriptURL,
+ const Maybe<ClientInfo>& aClientInfo,
+ const Maybe<ServiceWorkerDescriptor>& aController, bool aIsMainScript,
+ WorkerScriptType aWorkerScriptType,
+ nsContentPolicyType aMainScriptContentPolicyType, nsLoadFlags aLoadFlags,
+ nsICookieJarSettings* aCookieJarSettings, nsIReferrerInfo* aReferrerInfo,
+ nsIChannel** aChannel) {
+ AssertIsOnMainThread();
+
+ nsresult rv;
+ nsCOMPtr<nsIURI> uri = aScriptURL;
+
+ // If we have the document, use it. Unfortunately, for dedicated workers
+ // 'parentDoc' ends up being the parent document, which is not the document
+ // that we want to use. So make sure to avoid using 'parentDoc' in that
+ // situation.
+ if (parentDoc && parentDoc->NodePrincipal() != principal) {
+ parentDoc = nullptr;
+ }
+
+ uint32_t secFlags =
+ aIsMainScript ? nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_IS_BLOCKED
+ : nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT;
+
+ bool inheritAttrs = nsContentUtils::ChannelShouldInheritPrincipal(
+ principal, uri, true /* aInheritForAboutBlank */,
+ false /* aForceInherit */);
+
+ bool isData = uri->SchemeIs("data");
+ if (inheritAttrs && !isData) {
+ secFlags |= nsILoadInfo::SEC_FORCE_INHERIT_PRINCIPAL;
+ }
+
+ if (aWorkerScriptType == DebuggerScript) {
+ // A DebuggerScript needs to be a local resource like chrome: or resource:
+ bool isUIResource = false;
+ rv = NS_URIChainHasFlags(uri, nsIProtocolHandler::URI_IS_UI_RESOURCE,
+ &isUIResource);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ if (!isUIResource) {
+ return NS_ERROR_DOM_SECURITY_ERR;
+ }
+
+ secFlags |= nsILoadInfo::SEC_ALLOW_CHROME;
+ }
+
+ // Note: this is for backwards compatibility and goes against spec.
+ // We should find a better solution.
+ if (aIsMainScript && isData) {
+ secFlags = nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL;
+ }
+
+ nsContentPolicyType contentPolicyType =
+ aIsMainScript ? aMainScriptContentPolicyType
+ : nsIContentPolicy::TYPE_INTERNAL_WORKER_IMPORT_SCRIPTS;
+
+ // The main service worker script should never be loaded over the network
+ // in this path. It should always be offlined by ServiceWorkerScriptCache.
+ // We assert here since this error should also be caught by the runtime
+ // check in CacheScriptLoader.
+ //
+ // Note, if we ever allow service worker scripts to be loaded from network
+ // here we need to configure the channel properly. For example, it must
+ // not allow redirects.
+ MOZ_DIAGNOSTIC_ASSERT(contentPolicyType !=
+ nsIContentPolicy::TYPE_INTERNAL_SERVICE_WORKER);
+
+ nsCOMPtr<nsIChannel> channel;
+ if (parentDoc) {
+ rv = NS_NewChannel(getter_AddRefs(channel), uri, parentDoc, secFlags,
+ contentPolicyType,
+ nullptr, // aPerformanceStorage
+ loadGroup,
+ nullptr, // aCallbacks
+ aLoadFlags, ios);
+ NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_SECURITY_ERR);
+ } else {
+ // We must have a loadGroup with a load context for the principal to
+ // traverse the channel correctly.
+ MOZ_ASSERT(loadGroup);
+ MOZ_ASSERT(NS_LoadGroupMatchesPrincipal(loadGroup, principal));
+
+ RefPtr<PerformanceStorage> performanceStorage;
+ nsCOMPtr<nsICSPEventListener> cspEventListener;
+ if (aWorkerPrivate && !aIsMainScript) {
+ performanceStorage = aWorkerPrivate->GetPerformanceStorage();
+ cspEventListener = aWorkerPrivate->CSPEventListener();
+ }
+
+ if (aClientInfo.isSome()) {
+ rv = NS_NewChannel(getter_AddRefs(channel), uri, principal,
+ aClientInfo.ref(), aController, secFlags,
+ contentPolicyType, aCookieJarSettings,
+ performanceStorage, loadGroup, nullptr, // aCallbacks
+ aLoadFlags, ios);
+ } else {
+ rv = NS_NewChannel(getter_AddRefs(channel), uri, principal, secFlags,
+ contentPolicyType, aCookieJarSettings,
+ performanceStorage, loadGroup, nullptr, // aCallbacks
+ aLoadFlags, ios);
+ }
+
+ NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_SECURITY_ERR);
+
+ if (cspEventListener) {
+ nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
+ rv = loadInfo->SetCspEventListener(cspEventListener);
+ NS_ENSURE_SUCCESS(rv, rv);
+ }
+ }
+
+ if (aReferrerInfo) {
+ nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(channel);
+ if (httpChannel) {
+ rv = httpChannel->SetReferrerInfo(aReferrerInfo);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+ }
+ }
+
+ channel.forget(aChannel);
+ return rv;
+}
+
+struct ScriptLoadInfo {
+ ScriptLoadInfo() {
+ MOZ_ASSERT(mScriptIsUTF8 == false, "set by member initializer");
+ MOZ_ASSERT(mScriptLength == 0, "set by member initializer");
+ mScript.mUTF16 = nullptr;
+ }
+
+ ~ScriptLoadInfo() {
+ if (void* data = mScriptIsUTF8 ? static_cast<void*>(mScript.mUTF8)
+ : static_cast<void*>(mScript.mUTF16)) {
+ js_free(data);
+ }
+ }
+
+ nsString mURL;
+
+ // This full URL string is populated only if this object is used in a
+ // ServiceWorker.
+ nsString mFullURL;
+
+ // This promise is set only when the script is for a ServiceWorker but
+ // it's not in the cache yet. The promise is resolved when the full body is
+ // stored into the cache. mCachePromise will be set to nullptr after
+ // resolution.
+ RefPtr<Promise> mCachePromise;
+
+ // The reader stream the cache entry should be filled from, for those cases
+ // when we're going to have an mCachePromise.
+ nsCOMPtr<nsIInputStream> mCacheReadStream;
+
+ nsCOMPtr<nsIChannel> mChannel;
+ Maybe<ClientInfo> mReservedClientInfo;
+ nsresult mLoadResult = NS_ERROR_NOT_INITIALIZED;
+
+ // If |mScriptIsUTF8|, then |mUTF8| is active, otherwise |mUTF16| is active.
+ union {
+ char16_t* mUTF16;
+ Utf8Unit* mUTF8;
+ } mScript;
+ size_t mScriptLength = 0; // in code units
+ bool mScriptIsUTF8 = false;
+
+ bool ScriptTextIsNull() const {
+ return mScriptIsUTF8 ? mScript.mUTF8 == nullptr : mScript.mUTF16 == nullptr;
+ }
+
+ void InitUTF8Script() {
+ MOZ_ASSERT(ScriptTextIsNull());
+ MOZ_ASSERT(mScriptLength == 0);
+
+ mScriptIsUTF8 = true;
+ mScript.mUTF8 = nullptr;
+ mScriptLength = 0;
+ }
+
+ void InitUTF16Script() {
+ MOZ_ASSERT(ScriptTextIsNull());
+ MOZ_ASSERT(mScriptLength == 0);
+
+ mScriptIsUTF8 = false;
+ mScript.mUTF16 = nullptr;
+ mScriptLength = 0;
+ }
+
+ bool mLoadingFinished = false;
+ bool mExecutionScheduled = false;
+ bool mExecutionResult = false;
+
+ Maybe<nsString> mSourceMapURL;
+
+ enum CacheStatus {
+ // By default a normal script is just loaded from the network. But for
+ // ServiceWorkers, we have to check if the cache contains the script and
+ // load it from the cache.
+ Uncached,
+
+ WritingToCache,
+
+ ReadingFromCache,
+
+ // This script has been loaded from the ServiceWorker cache.
+ Cached,
+
+ // This script must be stored in the ServiceWorker cache.
+ ToBeCached,
+
+ // Something went wrong or the worker went away.
+ Cancel
+ };
+
+ CacheStatus mCacheStatus = Uncached;
+
+ nsLoadFlags mLoadFlags = nsIRequest::LOAD_NORMAL;
+
+ Maybe<bool> mMutedErrorFlag;
+
+ bool Finished() const {
+ return mLoadingFinished && !mCachePromise && !mChannel;
+ }
+};
+
+class ScriptLoaderRunnable;
+
+class ScriptExecutorRunnable final : public MainThreadWorkerSyncRunnable {
+ ScriptLoaderRunnable& mScriptLoader;
+ const bool mIsWorkerScript;
+ const Span<ScriptLoadInfo> mLoadInfosAlreadyExecuted, mLoadInfosToExecute;
+
+ public:
+ ScriptExecutorRunnable(ScriptLoaderRunnable& aScriptLoader,
+ nsIEventTarget* aSyncLoopTarget, bool aIsWorkerScript,
+ Span<ScriptLoadInfo> aLoadInfosAlreadyExecuted,
+ Span<ScriptLoadInfo> aLoadInfosToExecute);
+
+ private:
+ ~ScriptExecutorRunnable() = default;
+
+ virtual bool IsDebuggerRunnable() const override;
+
+ virtual bool PreRun(WorkerPrivate* aWorkerPrivate) override;
+
+ virtual bool WorkerRun(JSContext* aCx,
+ WorkerPrivate* aWorkerPrivate) override;
+
+ virtual void PostRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
+ bool aRunResult) override;
+
+ nsresult Cancel() override;
+
+ void ShutdownScriptLoader(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
+ bool aResult, bool aMutedError);
+
+ void LogExceptionToConsole(JSContext* aCx, WorkerPrivate* WorkerPrivate);
+
+ bool AllScriptsExecutable() const;
+};
+
+class CacheScriptLoader;
+
+class CacheCreator final : public PromiseNativeHandler {
+ public:
+ NS_DECL_ISUPPORTS
+
+ explicit CacheCreator(WorkerPrivate* aWorkerPrivate)
+ : mCacheName(aWorkerPrivate->ServiceWorkerCacheName()),
+ mOriginAttributes(aWorkerPrivate->GetOriginAttributes()) {
+ MOZ_ASSERT(aWorkerPrivate->IsServiceWorker());
+ AssertIsOnMainThread();
+ }
+
+ void AddLoader(MovingNotNull<RefPtr<CacheScriptLoader>> aLoader) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(!mCacheStorage);
+ mLoaders.AppendElement(std::move(aLoader));
+ }
+
+ virtual void ResolvedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) override;
+
+ virtual void RejectedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) override;
+
+ // Try to load from cache with aPrincipal used for cache access.
+ nsresult Load(nsIPrincipal* aPrincipal);
+
+ Cache* Cache_() const {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(mCache);
+ return mCache;
+ }
+
+ nsIGlobalObject* Global() const {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(mSandboxGlobalObject);
+ return mSandboxGlobalObject;
+ }
+
+ void DeleteCache();
+
+ private:
+ ~CacheCreator() = default;
+
+ nsresult CreateCacheStorage(nsIPrincipal* aPrincipal);
+
+ void FailLoaders(nsresult aRv);
+
+ RefPtr<Cache> mCache;
+ RefPtr<CacheStorage> mCacheStorage;
+ nsCOMPtr<nsIGlobalObject> mSandboxGlobalObject;
+ nsTArray<NotNull<RefPtr<CacheScriptLoader>>> mLoaders;
+
+ nsString mCacheName;
+ OriginAttributes mOriginAttributes;
+};
+
+NS_IMPL_ISUPPORTS0(CacheCreator)
+
+class CacheScriptLoader final : public PromiseNativeHandler,
+ public nsIStreamLoaderObserver {
+ public:
+ NS_DECL_ISUPPORTS
+ NS_DECL_NSISTREAMLOADEROBSERVER
+
+ CacheScriptLoader(WorkerPrivate* aWorkerPrivate, ScriptLoadInfo& aLoadInfo,
+ bool aIsWorkerScript, ScriptLoaderRunnable* aRunnable)
+ : mLoadInfo(aLoadInfo),
+ mRunnable(aRunnable),
+ mIsWorkerScript(aIsWorkerScript),
+ mFailed(false),
+ mState(aWorkerPrivate->GetServiceWorkerDescriptor().State()) {
+ MOZ_ASSERT(aWorkerPrivate);
+ MOZ_ASSERT(aWorkerPrivate->IsServiceWorker());
+ mMainThreadEventTarget = aWorkerPrivate->MainThreadEventTarget();
+ MOZ_ASSERT(mMainThreadEventTarget);
+ mBaseURI = GetBaseURI(mIsWorkerScript, aWorkerPrivate);
+ AssertIsOnMainThread();
+ }
+
+ void Fail(nsresult aRv);
+
+ void Load(Cache* aCache);
+
+ virtual void ResolvedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) override;
+
+ virtual void RejectedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) override;
+
+ private:
+ ~CacheScriptLoader() { AssertIsOnMainThread(); }
+
+ ScriptLoadInfo& mLoadInfo;
+ const RefPtr<ScriptLoaderRunnable> mRunnable;
+ const bool mIsWorkerScript;
+ bool mFailed;
+ const ServiceWorkerState mState;
+ nsCOMPtr<nsIInputStreamPump> mPump;
+ nsCOMPtr<nsIURI> mBaseURI;
+ mozilla::dom::ChannelInfo mChannelInfo;
+ UniquePtr<PrincipalInfo> mPrincipalInfo;
+ nsCString mCSPHeaderValue;
+ nsCString mCSPReportOnlyHeaderValue;
+ nsCString mReferrerPolicyHeaderValue;
+ nsCOMPtr<nsIEventTarget> mMainThreadEventTarget;
+};
+
+NS_IMPL_ISUPPORTS(CacheScriptLoader, nsIStreamLoaderObserver)
+
+class CachePromiseHandler final : public PromiseNativeHandler {
+ public:
+ NS_DECL_ISUPPORTS
+
+ CachePromiseHandler(ScriptLoaderRunnable* aRunnable,
+ ScriptLoadInfo& aLoadInfo)
+ : mRunnable(aRunnable), mLoadInfo(aLoadInfo) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(mRunnable);
+ }
+
+ virtual void ResolvedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) override;
+
+ virtual void RejectedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) override;
+
+ private:
+ ~CachePromiseHandler() { AssertIsOnMainThread(); }
+
+ RefPtr<ScriptLoaderRunnable> mRunnable;
+ ScriptLoadInfo& mLoadInfo;
+};
+
+NS_IMPL_ISUPPORTS0(CachePromiseHandler)
+
+class LoaderListener final : public nsIStreamLoaderObserver,
+ public nsIRequestObserver {
+ public:
+ NS_DECL_ISUPPORTS
+
+ LoaderListener(ScriptLoaderRunnable* aRunnable, ScriptLoadInfo& aLoadInfo)
+ : mRunnable(aRunnable), mLoadInfo(aLoadInfo) {
+ MOZ_ASSERT(mRunnable);
+ }
+
+ NS_IMETHOD
+ OnStreamComplete(nsIStreamLoader* aLoader, nsISupports* aContext,
+ nsresult aStatus, uint32_t aStringLen,
+ const uint8_t* aString) override;
+
+ NS_IMETHOD
+ OnStartRequest(nsIRequest* aRequest) override;
+
+ NS_IMETHOD
+ OnStopRequest(nsIRequest* aRequest, nsresult aStatusCode) override {
+ // Nothing to do here!
+ return NS_OK;
+ }
+
+ private:
+ ~LoaderListener() = default;
+
+ RefPtr<ScriptLoaderRunnable> mRunnable;
+ ScriptLoadInfo& mLoadInfo;
+};
+
+NS_IMPL_ISUPPORTS(LoaderListener, nsIStreamLoaderObserver, nsIRequestObserver)
+
+class ScriptResponseHeaderProcessor final : public nsIRequestObserver {
+ public:
+ NS_DECL_ISUPPORTS
+
+ ScriptResponseHeaderProcessor(WorkerPrivate* aWorkerPrivate,
+ bool aIsMainScript)
+ : mWorkerPrivate(aWorkerPrivate), mIsMainScript(aIsMainScript) {
+ AssertIsOnMainThread();
+ }
+
+ NS_IMETHOD OnStartRequest(nsIRequest* aRequest) override {
+ if (!StaticPrefs::browser_tabs_remote_useCrossOriginEmbedderPolicy()) {
+ return NS_OK;
+ }
+
+ nsresult rv = ProcessCrossOriginEmbedderPolicyHeader(aRequest);
+
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ aRequest->Cancel(rv);
+ }
+
+ return rv;
+ }
+
+ NS_IMETHOD OnStopRequest(nsIRequest* aRequest,
+ nsresult aStatusCode) override {
+ return NS_OK;
+ }
+
+ static nsresult ProcessCrossOriginEmbedderPolicyHeader(
+ WorkerPrivate* aWorkerPrivate,
+ nsILoadInfo::CrossOriginEmbedderPolicy aPolicy, bool aIsMainScript) {
+ MOZ_ASSERT(aWorkerPrivate);
+
+ if (aIsMainScript) {
+ MOZ_TRY(aWorkerPrivate->SetEmbedderPolicy(aPolicy));
+ } else {
+ // NOTE: Spec doesn't mention non-main scripts must match COEP header with
+ // the main script, but it must pass CORP checking.
+ // see: wpt window-simple-success.https.html, the worker import script
+ // test-incrementer.js without coep header.
+ Unused << NS_WARN_IF(!aWorkerPrivate->MatchEmbedderPolicy(aPolicy));
+ }
+
+ return NS_OK;
+ }
+
+ private:
+ ~ScriptResponseHeaderProcessor() = default;
+
+ nsresult ProcessCrossOriginEmbedderPolicyHeader(nsIRequest* aRequest) {
+ nsCOMPtr<nsIHttpChannelInternal> httpChannel = do_QueryInterface(aRequest);
+
+ // NOTE: the spec doesn't say what to do with non-HTTP workers.
+ // See: https://github.com/whatwg/html/issues/4916
+ if (!httpChannel) {
+ if (mIsMainScript) {
+ mWorkerPrivate->InheritOwnerEmbedderPolicyOrNull(aRequest);
+ }
+
+ return NS_OK;
+ }
+
+ nsILoadInfo::CrossOriginEmbedderPolicy coep;
+ MOZ_TRY(httpChannel->GetResponseEmbedderPolicy(&coep));
+
+ return ProcessCrossOriginEmbedderPolicyHeader(mWorkerPrivate, coep,
+ mIsMainScript);
+ }
+
+ WorkerPrivate* const mWorkerPrivate;
+ const bool mIsMainScript;
+};
+
+NS_IMPL_ISUPPORTS(ScriptResponseHeaderProcessor, nsIRequestObserver);
+
+class ScriptLoaderRunnable final : public nsIRunnable, public nsINamed {
+ friend class ScriptExecutorRunnable;
+ friend class CachePromiseHandler;
+ friend class CacheScriptLoader;
+ friend class LoaderListener;
+
+ WorkerPrivate* const mWorkerPrivate;
+ UniquePtr<SerializedStackHolder> mOriginStack;
+ nsString mOriginStackJSON;
+ nsCOMPtr<nsIEventTarget> mSyncLoopTarget;
+ nsTArrayView<ScriptLoadInfo> mLoadInfos;
+ RefPtr<CacheCreator> mCacheCreator;
+ Maybe<ClientInfo> mClientInfo;
+ Maybe<ServiceWorkerDescriptor> mController;
+ const bool mIsMainScript;
+ WorkerScriptType mWorkerScriptType;
+ bool mCanceledMainThread;
+ ErrorResult& mRv;
+
+ public:
+ NS_DECL_THREADSAFE_ISUPPORTS
+
+ ScriptLoaderRunnable(WorkerPrivate* aWorkerPrivate,
+ UniquePtr<SerializedStackHolder> aOriginStack,
+ nsIEventTarget* aSyncLoopTarget,
+ nsTArray<ScriptLoadInfo> aLoadInfos,
+ const Maybe<ClientInfo>& aClientInfo,
+ const Maybe<ServiceWorkerDescriptor>& aController,
+ bool aIsMainScript, WorkerScriptType aWorkerScriptType,
+ ErrorResult& aRv)
+ : mWorkerPrivate(aWorkerPrivate),
+ mOriginStack(std::move(aOriginStack)),
+ mSyncLoopTarget(aSyncLoopTarget),
+ mLoadInfos(std::move(aLoadInfos)),
+ mClientInfo(aClientInfo),
+ mController(aController),
+ mIsMainScript(aIsMainScript),
+ mWorkerScriptType(aWorkerScriptType),
+ mCanceledMainThread(false),
+ mRv(aRv) {
+ aWorkerPrivate->AssertIsOnWorkerThread();
+ MOZ_ASSERT(aSyncLoopTarget);
+ MOZ_ASSERT_IF(aIsMainScript, mLoadInfos.Length() == 1);
+ }
+
+ void CancelMainThreadWithBindingAborted() {
+ CancelMainThread(NS_BINDING_ABORTED);
+ }
+
+ private:
+ ~ScriptLoaderRunnable() = default;
+
+ NS_IMETHOD
+ Run() override {
+ AssertIsOnMainThread();
+
+ nsresult rv = RunInternal();
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ CancelMainThread(rv);
+ }
+
+ return NS_OK;
+ }
+
+ NS_IMETHOD
+ GetName(nsACString& aName) override {
+ aName.AssignLiteral("ScriptLoaderRunnable");
+ return NS_OK;
+ }
+
+ void LoadingFinished(ScriptLoadInfo& aLoadInfo, nsresult aRv) {
+ AssertIsOnMainThread();
+
+ aLoadInfo.mLoadResult = aRv;
+
+ MOZ_ASSERT(!aLoadInfo.mLoadingFinished);
+ aLoadInfo.mLoadingFinished = true;
+
+ if (IsMainWorkerScript() && NS_SUCCEEDED(aRv)) {
+ MOZ_DIAGNOSTIC_ASSERT(mWorkerPrivate->PrincipalURIMatchesScriptURL());
+ }
+
+ MaybeExecuteFinishedScripts(aLoadInfo);
+ }
+
+ void MaybeExecuteFinishedScripts(const ScriptLoadInfo& aLoadInfo) {
+ AssertIsOnMainThread();
+
+ // We execute the last step if we don't have a pending operation with the
+ // cache and the loading is completed.
+ if (aLoadInfo.Finished()) {
+ ExecuteFinishedScripts();
+ }
+ }
+
+ nsresult OnStreamComplete(nsIStreamLoader* aLoader, ScriptLoadInfo& aLoadInfo,
+ nsresult aStatus, uint32_t aStringLen,
+ const uint8_t* aString) {
+ AssertIsOnMainThread();
+
+ nsresult rv = OnStreamCompleteInternal(aLoader, aStatus, aStringLen,
+ aString, aLoadInfo);
+ LoadingFinished(aLoadInfo, rv);
+ return NS_OK;
+ }
+
+ nsresult OnStartRequest(nsIRequest* aRequest, ScriptLoadInfo& aLoadInfo) {
+ nsresult rv = OnStartRequestInternal(aRequest, aLoadInfo);
+
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ aRequest->Cancel(rv);
+ }
+
+ return rv;
+ }
+
+ nsresult OnStartRequestInternal(nsIRequest* aRequest,
+ ScriptLoadInfo& aLoadInfo) {
+ AssertIsOnMainThread();
+
+ // If one load info cancels or hits an error, it can race with the start
+ // callback coming from another load info.
+ if (mCanceledMainThread || !mCacheCreator) {
+ return NS_ERROR_FAILURE;
+ }
+
+ nsCOMPtr<nsIChannel> channel = do_QueryInterface(aRequest);
+
+ // Checking the MIME type is only required for ServiceWorkers'
+ // importScripts, per step 10 of
+ // https://w3c.github.io/ServiceWorker/#importscripts
+ //
+ // "Extract a MIME type from the response’s header list. If this MIME type
+ // (ignoring parameters) is not a JavaScript MIME type, return a network
+ // error."
+ if (mWorkerPrivate->IsServiceWorker()) {
+ nsAutoCString mimeType;
+ channel->GetContentType(mimeType);
+
+ if (!nsContentUtils::IsJavascriptMIMEType(
+ NS_ConvertUTF8toUTF16(mimeType))) {
+ const nsCString& scope =
+ mWorkerPrivate->GetServiceWorkerRegistrationDescriptor().Scope();
+
+ ServiceWorkerManager::LocalizeAndReportToAllClients(
+ scope, "ServiceWorkerRegisterMimeTypeError2",
+ nsTArray<nsString>{NS_ConvertUTF8toUTF16(scope),
+ NS_ConvertUTF8toUTF16(mimeType),
+ aLoadInfo.mURL});
+
+ return NS_ERROR_DOM_NETWORK_ERR;
+ }
+ }
+
+ // Note that importScripts() can redirect. In theory the main
+ // script could also encounter an internal redirect, but currently
+ // the assert does not allow that.
+ MOZ_ASSERT_IF(mIsMainScript, channel == aLoadInfo.mChannel);
+ aLoadInfo.mChannel = channel;
+
+ // We synthesize the result code, but its never exposed to content.
+ RefPtr<mozilla::dom::InternalResponse> ir =
+ new mozilla::dom::InternalResponse(200, "OK"_ns);
+ ir->SetBody(aLoadInfo.mCacheReadStream,
+ InternalResponse::UNKNOWN_BODY_SIZE);
+
+ // Drop our reference to the stream now that we've passed it along, so it
+ // doesn't hang around once the cache is done with it and keep data alive.
+ aLoadInfo.mCacheReadStream = nullptr;
+
+ // Set the channel info of the channel on the response so that it's
+ // saved in the cache.
+ ir->InitChannelInfo(channel);
+
+ // Save the principal of the channel since its URI encodes the script URI
+ // rather than the ServiceWorkerRegistrationInfo URI.
+ nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager();
+ NS_ASSERTION(ssm, "Should never be null!");
+
+ nsCOMPtr<nsIPrincipal> channelPrincipal;
+ MOZ_TRY(ssm->GetChannelResultPrincipal(channel,
+ getter_AddRefs(channelPrincipal)));
+
+ UniquePtr<PrincipalInfo> principalInfo(new PrincipalInfo());
+ MOZ_TRY(PrincipalToPrincipalInfo(channelPrincipal, principalInfo.get()));
+
+ ir->SetPrincipalInfo(std::move(principalInfo));
+ ir->Headers()->FillResponseHeaders(aLoadInfo.mChannel);
+
+ RefPtr<mozilla::dom::Response> response =
+ new mozilla::dom::Response(mCacheCreator->Global(), ir, nullptr);
+
+ mozilla::dom::RequestOrUSVString request;
+
+ MOZ_ASSERT(!aLoadInfo.mFullURL.IsEmpty());
+ request.SetAsUSVString().ShareOrDependUpon(aLoadInfo.mFullURL);
+
+ // This JSContext will not end up executing JS code because here there are
+ // no ReadableStreams involved.
+ AutoJSAPI jsapi;
+ jsapi.Init();
+
+ ErrorResult error;
+ RefPtr<Promise> cachePromise =
+ mCacheCreator->Cache_()->Put(jsapi.cx(), request, *response, error);
+ error.WouldReportJSException();
+ if (NS_WARN_IF(error.Failed())) {
+ return error.StealNSResult();
+ }
+
+ RefPtr<CachePromiseHandler> promiseHandler =
+ new CachePromiseHandler(this, aLoadInfo);
+ cachePromise->AppendNativeHandler(promiseHandler);
+
+ aLoadInfo.mCachePromise.swap(cachePromise);
+ aLoadInfo.mCacheStatus = ScriptLoadInfo::WritingToCache;
+
+ return NS_OK;
+ }
+
+ bool IsMainWorkerScript() const {
+ return mIsMainScript && mWorkerScriptType == WorkerScript;
+ }
+
+ bool IsDebuggerScript() const { return mWorkerScriptType == DebuggerScript; }
+
+ void CancelMainThread(nsresult aCancelResult) {
+ AssertIsOnMainThread();
+
+ if (mCanceledMainThread) {
+ return;
+ }
+
+ mCanceledMainThread = true;
+
+ if (mCacheCreator) {
+ MOZ_ASSERT(mWorkerPrivate->IsServiceWorker());
+ DeleteCache();
+ }
+
+ // Cancel all the channels that were already opened.
+ for (ScriptLoadInfo& loadInfo : mLoadInfos) {
+ // If promise or channel is non-null, their failures will lead to
+ // LoadingFinished being called.
+ bool callLoadingFinished = true;
+
+ if (loadInfo.mCachePromise) {
+ MOZ_ASSERT(mWorkerPrivate->IsServiceWorker());
+ loadInfo.mCachePromise->MaybeReject(aCancelResult);
+ loadInfo.mCachePromise = nullptr;
+ callLoadingFinished = false;
+ }
+
+ if (loadInfo.mChannel) {
+ if (NS_SUCCEEDED(loadInfo.mChannel->Cancel(aCancelResult))) {
+ callLoadingFinished = false;
+ } else {
+ NS_WARNING("Failed to cancel channel!");
+ }
+ }
+
+ if (callLoadingFinished && !loadInfo.Finished()) {
+ LoadingFinished(loadInfo, aCancelResult);
+ }
+ }
+
+ ExecuteFinishedScripts();
+ }
+
+ void DeleteCache() {
+ AssertIsOnMainThread();
+
+ if (!mCacheCreator) {
+ return;
+ }
+
+ mCacheCreator->DeleteCache();
+ mCacheCreator = nullptr;
+ }
+
+ nsresult RunInternal() {
+ AssertIsOnMainThread();
+
+ if (IsMainWorkerScript()) {
+ mWorkerPrivate->SetLoadingWorkerScript(true);
+ }
+
+ // Convert the origin stack to JSON (which must be done on the main
+ // thread) explicitly, so that we can use the stack to notify the net
+ // monitor about every script we load.
+ if (mOriginStack) {
+ ConvertSerializedStackToJSON(std::move(mOriginStack), mOriginStackJSON);
+ }
+
+ if (!mWorkerPrivate->IsServiceWorker() || IsDebuggerScript()) {
+ for (ScriptLoadInfo& loadInfo : mLoadInfos) {
+ nsresult rv = LoadScript(loadInfo);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ LoadingFinished(loadInfo, rv);
+ return rv;
+ }
+ }
+
+ return NS_OK;
+ }
+
+ MOZ_ASSERT(!mCacheCreator);
+ mCacheCreator = new CacheCreator(mWorkerPrivate);
+
+ for (ScriptLoadInfo& loadInfo : mLoadInfos) {
+ mCacheCreator->AddLoader(MakeNotNull<RefPtr<CacheScriptLoader>>(
+ mWorkerPrivate, loadInfo, IsMainWorkerScript(), this));
+ }
+
+ // The worker may have a null principal on first load, but in that case its
+ // parent definitely will have one.
+ nsIPrincipal* principal = mWorkerPrivate->GetPrincipal();
+ if (!principal) {
+ WorkerPrivate* parentWorker = mWorkerPrivate->GetParent();
+ MOZ_ASSERT(parentWorker, "Must have a parent!");
+ principal = parentWorker->GetPrincipal();
+ }
+
+ nsresult rv = mCacheCreator->Load(principal);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ return NS_OK;
+ }
+
+ nsresult LoadScript(ScriptLoadInfo& aLoadInfo) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT_IF(IsMainWorkerScript(), mWorkerScriptType != DebuggerScript);
+
+ WorkerPrivate* parentWorker = mWorkerPrivate->GetParent();
+
+ // For JavaScript debugging, the devtools server must run on the same
+ // thread as the debuggee, indicating the worker uses content principal.
+ // However, in Bug 863246, web content will no longer be able to load
+ // resource:// URIs by default, so we need system principal to load
+ // debugger scripts.
+ nsIPrincipal* principal = (mWorkerScriptType == DebuggerScript)
+ ? nsContentUtils::GetSystemPrincipal()
+ : mWorkerPrivate->GetPrincipal();
+
+ nsCOMPtr<nsILoadGroup> loadGroup = mWorkerPrivate->GetLoadGroup();
+ MOZ_DIAGNOSTIC_ASSERT(principal);
+
+ NS_ENSURE_TRUE(NS_LoadGroupMatchesPrincipal(loadGroup, principal),
+ NS_ERROR_FAILURE);
+
+ // Figure out our base URI.
+ nsCOMPtr<nsIURI> baseURI = GetBaseURI(mIsMainScript, mWorkerPrivate);
+
+ // May be null.
+ nsCOMPtr<Document> parentDoc = mWorkerPrivate->GetDocument();
+
+ nsCOMPtr<nsIChannel> channel;
+ if (IsMainWorkerScript()) {
+ // May be null.
+ channel = mWorkerPrivate->ForgetWorkerChannel();
+ }
+
+ nsCOMPtr<nsIIOService> ios(do_GetIOService());
+
+ nsIScriptSecurityManager* secMan = nsContentUtils::GetSecurityManager();
+ NS_ASSERTION(secMan, "This should never be null!");
+
+ nsresult& rv = aLoadInfo.mLoadResult;
+
+ nsLoadFlags loadFlags = aLoadInfo.mLoadFlags;
+
+ // Get the top-level worker.
+ WorkerPrivate* topWorkerPrivate = mWorkerPrivate;
+ WorkerPrivate* parent = topWorkerPrivate->GetParent();
+ while (parent) {
+ topWorkerPrivate = parent;
+ parent = topWorkerPrivate->GetParent();
+ }
+
+ // If the top-level worker is a dedicated worker and has a window, and the
+ // window has a docshell, the caching behavior of this worker should match
+ // that of that docshell.
+ if (topWorkerPrivate->IsDedicatedWorker()) {
+ nsCOMPtr<nsPIDOMWindowInner> window = topWorkerPrivate->GetWindow();
+ if (window) {
+ nsCOMPtr<nsIDocShell> docShell = window->GetDocShell();
+ if (docShell) {
+ nsresult rv = docShell->GetDefaultLoadFlags(&loadFlags);
+ NS_ENSURE_SUCCESS(rv, rv);
+ }
+ }
+ }
+
+ if (!channel) {
+ // Only top level workers' main script use the document charset for the
+ // script uri encoding. Otherwise, default encoding (UTF-8) is applied.
+ bool useDefaultEncoding = !(!parentWorker && IsMainWorkerScript());
+ nsCOMPtr<nsIURI> url;
+ rv = ConstructURI(aLoadInfo.mURL, baseURI, parentDoc, useDefaultEncoding,
+ getter_AddRefs(url));
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+
+ nsCOMPtr<nsIReferrerInfo> referrerInfo =
+ ReferrerInfo::CreateForFetch(principal, nullptr);
+ if (parentWorker && !IsMainWorkerScript()) {
+ referrerInfo =
+ static_cast<ReferrerInfo*>(referrerInfo.get())
+ ->CloneWithNewPolicy(parentWorker->GetReferrerPolicy());
+ }
+
+ rv = ChannelFromScriptURL(principal, parentDoc, mWorkerPrivate, loadGroup,
+ ios, secMan, url, mClientInfo, mController,
+ IsMainWorkerScript(), mWorkerScriptType,
+ mWorkerPrivate->ContentPolicyType(), loadFlags,
+ mWorkerPrivate->CookieJarSettings(),
+ referrerInfo, getter_AddRefs(channel));
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+ }
+
+ // Associate any originating stack with the channel.
+ if (!mOriginStackJSON.IsEmpty()) {
+ NotifyNetworkMonitorAlternateStack(channel, mOriginStackJSON);
+ }
+
+ // We need to know which index we're on in OnStreamComplete so we know
+ // where to put the result.
+ RefPtr<LoaderListener> listener = new LoaderListener(this, aLoadInfo);
+
+ RefPtr<ScriptResponseHeaderProcessor> headerProcessor = nullptr;
+
+ // For each debugger script, a non-debugger script load of the same script
+ // should have occured prior that processed the headers.
+ if (!IsDebuggerScript()) {
+ headerProcessor = MakeRefPtr<ScriptResponseHeaderProcessor>(
+ mWorkerPrivate, mIsMainScript);
+ }
+
+ nsCOMPtr<nsIStreamLoader> loader;
+ rv = NS_NewStreamLoader(getter_AddRefs(loader), listener, headerProcessor);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ if (IsMainWorkerScript()) {
+ MOZ_DIAGNOSTIC_ASSERT(aLoadInfo.mReservedClientInfo.isSome());
+ rv = AddClientChannelHelper(
+ channel, std::move(aLoadInfo.mReservedClientInfo),
+ Maybe<ClientInfo>(), mWorkerPrivate->HybridEventTarget());
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+ }
+
+ if (StaticPrefs::browser_tabs_remote_useCrossOriginEmbedderPolicy()) {
+ nsILoadInfo::CrossOriginEmbedderPolicy respectedCOEP =
+ mWorkerPrivate->GetEmbedderPolicy();
+ if (mWorkerPrivate->IsDedicatedWorker() &&
+ respectedCOEP == nsILoadInfo::EMBEDDER_POLICY_NULL) {
+ respectedCOEP = mWorkerPrivate->GetOwnerEmbedderPolicy();
+ }
+
+ nsCOMPtr<nsILoadInfo> channelLoadInfo = channel->LoadInfo();
+ channelLoadInfo->SetLoadingEmbedderPolicy(respectedCOEP);
+ }
+
+ if (aLoadInfo.mCacheStatus != ScriptLoadInfo::ToBeCached) {
+ rv = channel->AsyncOpen(loader);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+ } else {
+ nsCOMPtr<nsIOutputStream> writer;
+
+ // In case we return early.
+ aLoadInfo.mCacheStatus = ScriptLoadInfo::Cancel;
+
+ rv = NS_NewPipe(
+ getter_AddRefs(aLoadInfo.mCacheReadStream), getter_AddRefs(writer), 0,
+ UINT32_MAX, // unlimited size to avoid writer WOULD_BLOCK case
+ true, false); // non-blocking reader, blocking writer
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ nsCOMPtr<nsIStreamListenerTee> tee =
+ do_CreateInstance(NS_STREAMLISTENERTEE_CONTRACTID);
+ rv = tee->Init(loader, writer, listener);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ nsresult rv = channel->AsyncOpen(tee);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+ }
+
+ aLoadInfo.mChannel.swap(channel);
+
+ return NS_OK;
+ }
+
+ nsresult OnStreamCompleteInternal(nsIStreamLoader* aLoader, nsresult aStatus,
+ uint32_t aStringLen, const uint8_t* aString,
+ ScriptLoadInfo& aLoadInfo) {
+ AssertIsOnMainThread();
+
+ if (!aLoadInfo.mChannel) {
+ return NS_BINDING_ABORTED;
+ }
+
+ aLoadInfo.mChannel = nullptr;
+
+ if (NS_FAILED(aStatus)) {
+ return aStatus;
+ }
+
+ NS_ASSERTION(aString, "This should never be null!");
+
+ nsCOMPtr<nsIRequest> request;
+ nsresult rv = aLoader->GetRequest(getter_AddRefs(request));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ nsCOMPtr<nsIChannel> channel = do_QueryInterface(request);
+ MOZ_ASSERT(channel);
+
+ nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager();
+ NS_ASSERTION(ssm, "Should never be null!");
+
+ nsCOMPtr<nsIPrincipal> channelPrincipal;
+ rv = ssm->GetChannelResultPrincipal(channel,
+ getter_AddRefs(channelPrincipal));
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ nsIPrincipal* principal = mWorkerPrivate->GetPrincipal();
+ if (!principal) {
+ WorkerPrivate* parentWorker = mWorkerPrivate->GetParent();
+ MOZ_ASSERT(parentWorker, "Must have a parent!");
+ principal = parentWorker->GetPrincipal();
+ }
+
+#ifdef DEBUG
+ if (IsMainWorkerScript()) {
+ nsCOMPtr<nsIPrincipal> loadingPrincipal =
+ mWorkerPrivate->GetLoadingPrincipal();
+ // if we are not in a ServiceWorker, and the principal is not null, then
+ // the loading principal must subsume the worker principal if it is not a
+ // nullPrincipal (sandbox).
+ MOZ_ASSERT(!loadingPrincipal || loadingPrincipal->GetIsNullPrincipal() ||
+ principal->GetIsNullPrincipal() ||
+ loadingPrincipal->Subsumes(principal));
+ }
+#endif
+
+ // We don't mute the main worker script becase we've already done
+ // same-origin checks on them so we should be able to see their errors.
+ // Note that for data: url, where we allow it through the same-origin check
+ // but then give it a different origin.
+ aLoadInfo.mMutedErrorFlag.emplace(!IsMainWorkerScript() &&
+ !principal->Subsumes(channelPrincipal));
+
+ // Make sure we're not seeing the result of a 404 or something by checking
+ // the 'requestSucceeded' attribute on the http channel.
+ nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(request);
+ nsAutoCString tCspHeaderValue, tCspROHeaderValue, tRPHeaderCValue;
+
+ if (httpChannel) {
+ bool requestSucceeded;
+ rv = httpChannel->GetRequestSucceeded(&requestSucceeded);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ if (!requestSucceeded) {
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ Unused << httpChannel->GetResponseHeader("content-security-policy"_ns,
+ tCspHeaderValue);
+
+ Unused << httpChannel->GetResponseHeader(
+ "content-security-policy-report-only"_ns, tCspROHeaderValue);
+
+ Unused << httpChannel->GetResponseHeader("referrer-policy"_ns,
+ tRPHeaderCValue);
+
+ nsAutoCString sourceMapURL;
+ if (nsContentUtils::GetSourceMapURL(httpChannel, sourceMapURL)) {
+ aLoadInfo.mSourceMapURL = Some(NS_ConvertUTF8toUTF16(sourceMapURL));
+ }
+ }
+
+ // May be null.
+ Document* parentDoc = mWorkerPrivate->GetDocument();
+
+ // Use the regular ScriptLoader for this grunt work! Should be just fine
+ // because we're running on the main thread.
+ // Worker scripts are always decoded as UTF-8 per spec. Passing null for a
+ // channel and UTF-8 for the hint will always interpret |aString| as UTF-8.
+ if (StaticPrefs::dom_worker_script_loader_utf8_parsing_enabled()) {
+ aLoadInfo.InitUTF8Script();
+ rv = ScriptLoader::ConvertToUTF8(
+ nullptr, aString, aStringLen, u"UTF-8"_ns, parentDoc,
+ aLoadInfo.mScript.mUTF8, aLoadInfo.mScriptLength);
+ } else {
+ aLoadInfo.InitUTF16Script();
+ rv = ScriptLoader::ConvertToUTF16(
+ nullptr, aString, aStringLen, u"UTF-8"_ns, parentDoc,
+ aLoadInfo.mScript.mUTF16, aLoadInfo.mScriptLength);
+ }
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+
+ if (aLoadInfo.ScriptTextIsNull()) {
+ if (aLoadInfo.mScriptLength != 0) {
+ return NS_ERROR_FAILURE;
+ }
+
+ nsContentUtils::ReportToConsole(
+ nsIScriptError::warningFlag, "DOM"_ns, parentDoc,
+ nsContentUtils::eDOM_PROPERTIES, "EmptyWorkerSourceWarning");
+ }
+
+ // Figure out what we actually loaded.
+ nsCOMPtr<nsIURI> finalURI;
+ rv = NS_GetFinalChannelURI(channel, getter_AddRefs(finalURI));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ bool isSameOrigin = false;
+ rv = principal->IsSameOrigin(finalURI, false, &isSameOrigin);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ if (isSameOrigin) {
+ nsCString filename;
+ rv = finalURI->GetSpec(filename);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ if (!filename.IsEmpty()) {
+ // This will help callers figure out what their script url resolved to
+ // in case of errors.
+ aLoadInfo.mURL.Assign(NS_ConvertUTF8toUTF16(filename));
+ }
+ }
+
+ // Update the principal of the worker and its base URI if we just loaded the
+ // worker's primary script.
+ if (IsMainWorkerScript()) {
+ // Take care of the base URI first.
+ mWorkerPrivate->SetBaseURI(finalURI);
+
+ // Store the channel info if needed.
+ mWorkerPrivate->InitChannelInfo(channel);
+
+ // Our final channel principal should match the loading principal
+ // in terms of the origin. This used to be an assert, but it seems
+ // there are some rare cases where this check can fail in practice.
+ // Perhaps some browser script setting nsIChannel.owner, etc.
+ NS_ENSURE_TRUE(mWorkerPrivate->FinalChannelPrincipalIsValid(channel),
+ NS_ERROR_FAILURE);
+
+ // However, we must still override the principal since the nsIPrincipal
+ // URL may be different due to same-origin redirects. Unfortunately this
+ // URL must exactly match the final worker script URL in order to
+ // properly set the referrer header on fetch/xhr requests. If bug 1340694
+ // is ever fixed this can be removed.
+ rv = mWorkerPrivate->SetPrincipalsAndCSPFromChannel(channel);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ nsCOMPtr<nsIContentSecurityPolicy> csp = mWorkerPrivate->GetCSP();
+ // We did inherit CSP in bug 1223647. If we do not already have a CSP, we
+ // should get it from the HTTP headers on the worker script.
+ if (StaticPrefs::security_csp_enable()) {
+ if (!csp) {
+ rv = mWorkerPrivate->SetCSPFromHeaderValues(tCspHeaderValue,
+ tCspROHeaderValue);
+ NS_ENSURE_SUCCESS(rv, rv);
+ } else {
+ csp->EnsureEventTarget(mWorkerPrivate->MainThreadEventTarget());
+ }
+ }
+
+ mWorkerPrivate->UpdateReferrerInfoFromHeader(tRPHeaderCValue);
+
+ WorkerPrivate* parent = mWorkerPrivate->GetParent();
+ if (parent) {
+ // XHR Params Allowed
+ mWorkerPrivate->SetXHRParamsAllowed(parent->XHRParamsAllowed());
+ }
+
+ nsCOMPtr<nsILoadInfo> chanLoadInfo = channel->LoadInfo();
+ if (chanLoadInfo) {
+ mController = chanLoadInfo->GetController();
+ }
+
+ // If we are loading a blob URL we must inherit the controller
+ // from the parent. This is a bit odd as the blob URL may have
+ // been created in a different context with a different controller.
+ // For now, though, this is what the spec says. See:
+ //
+ // https://github.com/w3c/ServiceWorker/issues/1261
+ //
+ if (IsBlobURI(mWorkerPrivate->GetBaseURI())) {
+ MOZ_DIAGNOSTIC_ASSERT(mController.isNothing());
+ mController = mWorkerPrivate->GetParentController();
+ }
+ }
+
+ return NS_OK;
+ }
+
+ void DataReceivedFromCache(ScriptLoadInfo& aLoadInfo, const uint8_t* aString,
+ uint32_t aStringLen,
+ const mozilla::dom::ChannelInfo& aChannelInfo,
+ UniquePtr<PrincipalInfo> aPrincipalInfo,
+ const nsACString& aCSPHeaderValue,
+ const nsACString& aCSPReportOnlyHeaderValue,
+ const nsACString& aReferrerPolicyHeaderValue) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(aLoadInfo.mCacheStatus == ScriptLoadInfo::Cached);
+
+ auto responsePrincipalOrErr = PrincipalInfoToPrincipal(*aPrincipalInfo);
+ MOZ_DIAGNOSTIC_ASSERT(responsePrincipalOrErr.isOk());
+
+ nsIPrincipal* principal = mWorkerPrivate->GetPrincipal();
+ if (!principal) {
+ WorkerPrivate* parentWorker = mWorkerPrivate->GetParent();
+ MOZ_ASSERT(parentWorker, "Must have a parent!");
+ principal = parentWorker->GetPrincipal();
+ }
+
+ nsCOMPtr<nsIPrincipal> responsePrincipal = responsePrincipalOrErr.unwrap();
+
+ aLoadInfo.mMutedErrorFlag.emplace(!principal->Subsumes(responsePrincipal));
+
+ // May be null.
+ Document* parentDoc = mWorkerPrivate->GetDocument();
+
+ MOZ_ASSERT(aLoadInfo.ScriptTextIsNull());
+
+ nsresult rv;
+ if (StaticPrefs::dom_worker_script_loader_utf8_parsing_enabled()) {
+ aLoadInfo.InitUTF8Script();
+ rv = ScriptLoader::ConvertToUTF8(
+ nullptr, aString, aStringLen, u"UTF-8"_ns, parentDoc,
+ aLoadInfo.mScript.mUTF8, aLoadInfo.mScriptLength);
+ } else {
+ aLoadInfo.InitUTF16Script();
+ rv = ScriptLoader::ConvertToUTF16(
+ nullptr, aString, aStringLen, u"UTF-8"_ns, parentDoc,
+ aLoadInfo.mScript.mUTF16, aLoadInfo.mScriptLength);
+ }
+ if (NS_SUCCEEDED(rv) && IsMainWorkerScript()) {
+ nsCOMPtr<nsIURI> finalURI;
+ rv = NS_NewURI(getter_AddRefs(finalURI), aLoadInfo.mFullURL);
+ if (NS_SUCCEEDED(rv)) {
+ mWorkerPrivate->SetBaseURI(finalURI);
+ }
+
+#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
+ nsIPrincipal* principal = mWorkerPrivate->GetPrincipal();
+ MOZ_DIAGNOSTIC_ASSERT(principal);
+
+ bool equal = false;
+ MOZ_ALWAYS_SUCCEEDS(responsePrincipal->Equals(principal, &equal));
+ MOZ_DIAGNOSTIC_ASSERT(equal);
+
+ nsCOMPtr<nsIContentSecurityPolicy> csp;
+ if (parentDoc) {
+ csp = parentDoc->GetCsp();
+ }
+ MOZ_DIAGNOSTIC_ASSERT(!csp);
+#endif
+
+ mWorkerPrivate->InitChannelInfo(aChannelInfo);
+
+ nsILoadGroup* loadGroup = mWorkerPrivate->GetLoadGroup();
+ MOZ_DIAGNOSTIC_ASSERT(loadGroup);
+
+ // Override the principal on the WorkerPrivate. This is only necessary
+ // in order to get a principal with exactly the correct URL. The fetch
+ // referrer logic depends on the WorkerPrivate principal having a URL
+ // that matches the worker script URL. If bug 1340694 is ever fixed
+ // this can be removed.
+ // XXX: force the partitionedPrincipal to be equal to the response one.
+ // This is OK for now because we don't want to expose partitionedPrincipal
+ // functionality in ServiceWorkers yet.
+ rv = mWorkerPrivate->SetPrincipalsAndCSPOnMainThread(
+ responsePrincipal, responsePrincipal, loadGroup, nullptr);
+ MOZ_DIAGNOSTIC_ASSERT(NS_SUCCEEDED(rv));
+
+ rv = mWorkerPrivate->SetCSPFromHeaderValues(aCSPHeaderValue,
+ aCSPReportOnlyHeaderValue);
+ MOZ_DIAGNOSTIC_ASSERT(NS_SUCCEEDED(rv));
+
+ mWorkerPrivate->UpdateReferrerInfoFromHeader(aReferrerPolicyHeaderValue);
+ }
+
+ if (NS_SUCCEEDED(rv)) {
+ DataReceived();
+ }
+
+ LoadingFinished(aLoadInfo, rv);
+ }
+
+ void DataReceived() {
+ if (IsMainWorkerScript()) {
+ WorkerPrivate* parent = mWorkerPrivate->GetParent();
+
+ if (parent) {
+ // XHR Params Allowed
+ mWorkerPrivate->SetXHRParamsAllowed(parent->XHRParamsAllowed());
+
+ // Set Eval and ContentSecurityPolicy
+ mWorkerPrivate->SetCSP(parent->GetCSP());
+ mWorkerPrivate->SetEvalAllowed(parent->IsEvalAllowed());
+ }
+ }
+ }
+
+ void ExecuteFinishedScripts() {
+ AssertIsOnMainThread();
+
+ if (IsMainWorkerScript()) {
+ mWorkerPrivate->WorkerScriptLoaded();
+ }
+
+ const auto begin = mLoadInfos.begin();
+ const auto end = mLoadInfos.end();
+ using Iterator = decltype(begin);
+ const auto maybeRangeToExecute =
+ [begin, end]() -> Maybe<std::pair<Iterator, Iterator>> {
+ // firstItToExecute is the first loadInfo where mExecutionScheduled is
+ // unset.
+ auto firstItToExecute =
+ std::find_if(begin, end, [](const ScriptLoadInfo& loadInfo) {
+ return !loadInfo.mExecutionScheduled;
+ });
+
+ if (firstItToExecute == end) {
+ return Nothing();
+ }
+
+ // firstItUnexecutable is the first loadInfo that is not yet finished.
+ // Update mExecutionScheduled on the ones we're about to schedule for
+ // execution.
+ const auto firstItUnexecutable =
+ std::find_if(firstItToExecute, end, [](ScriptLoadInfo& loadInfo) {
+ if (!loadInfo.Finished()) {
+ return true;
+ }
+
+ // We can execute this one.
+ loadInfo.mExecutionScheduled = true;
+
+ return false;
+ });
+
+ return firstItUnexecutable == firstItToExecute
+ ? Nothing()
+ : Some(std::pair(firstItToExecute, firstItUnexecutable));
+ }();
+
+ // If there are no unexecutable load infos, we can unuse things before the
+ // execution of the scripts and the stopping of the sync loop.
+ if (maybeRangeToExecute) {
+ if (maybeRangeToExecute->second == end) {
+ mCacheCreator = nullptr;
+ }
+
+ RefPtr<ScriptExecutorRunnable> runnable = new ScriptExecutorRunnable(
+ *this, mSyncLoopTarget, IsMainWorkerScript(),
+ Span{begin, maybeRangeToExecute->first},
+ Span{maybeRangeToExecute->first, maybeRangeToExecute->second});
+ if (!runnable->Dispatch()) {
+ MOZ_ASSERT(false, "This should never fail!");
+ }
+ }
+ }
+};
+
+NS_IMPL_ISUPPORTS(ScriptLoaderRunnable, nsIRunnable, nsINamed)
+
+NS_IMETHODIMP
+LoaderListener::OnStreamComplete(nsIStreamLoader* aLoader,
+ nsISupports* aContext, nsresult aStatus,
+ uint32_t aStringLen, const uint8_t* aString) {
+ return mRunnable->OnStreamComplete(aLoader, mLoadInfo, aStatus, aStringLen,
+ aString);
+}
+
+NS_IMETHODIMP
+LoaderListener::OnStartRequest(nsIRequest* aRequest) {
+ return mRunnable->OnStartRequest(aRequest, mLoadInfo);
+}
+
+void CachePromiseHandler::ResolvedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) {
+ AssertIsOnMainThread();
+ // May already have been canceled by CacheScriptLoader::Fail from
+ // CancelMainThread.
+ MOZ_ASSERT(mLoadInfo.mCacheStatus == ScriptLoadInfo::WritingToCache ||
+ mLoadInfo.mCacheStatus == ScriptLoadInfo::Cancel);
+ MOZ_ASSERT_IF(mLoadInfo.mCacheStatus == ScriptLoadInfo::Cancel,
+ !mLoadInfo.mCachePromise);
+
+ if (mLoadInfo.mCachePromise) {
+ mLoadInfo.mCacheStatus = ScriptLoadInfo::Cached;
+ mLoadInfo.mCachePromise = nullptr;
+ mRunnable->MaybeExecuteFinishedScripts(mLoadInfo);
+ }
+}
+
+void CachePromiseHandler::RejectedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) {
+ AssertIsOnMainThread();
+ // May already have been canceled by CacheScriptLoader::Fail from
+ // CancelMainThread.
+ MOZ_ASSERT(mLoadInfo.mCacheStatus == ScriptLoadInfo::WritingToCache ||
+ mLoadInfo.mCacheStatus == ScriptLoadInfo::Cancel);
+ mLoadInfo.mCacheStatus = ScriptLoadInfo::Cancel;
+
+ mLoadInfo.mCachePromise = nullptr;
+
+ // This will delete the cache object and will call LoadingFinished() with an
+ // error for each ongoing operation.
+ mRunnable->DeleteCache();
+}
+
+nsresult CacheCreator::CreateCacheStorage(nsIPrincipal* aPrincipal) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(!mCacheStorage);
+ MOZ_ASSERT(aPrincipal);
+
+ nsIXPConnect* xpc = nsContentUtils::XPConnect();
+ MOZ_ASSERT(xpc, "This should never be null!");
+
+ AutoJSAPI jsapi;
+ jsapi.Init();
+ JSContext* cx = jsapi.cx();
+ JS::Rooted<JSObject*> sandbox(cx);
+ nsresult rv = xpc->CreateSandbox(cx, aPrincipal, sandbox.address());
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ // The JSContext is not in a realm, so CreateSandbox returned an unwrapped
+ // global.
+ MOZ_ASSERT(JS_IsGlobalObject(sandbox));
+
+ mSandboxGlobalObject = xpc::NativeGlobal(sandbox);
+ if (NS_WARN_IF(!mSandboxGlobalObject)) {
+ return NS_ERROR_FAILURE;
+ }
+
+ // If we're in private browsing mode, don't even try to create the
+ // CacheStorage. Instead, just fail immediately to terminate the
+ // ServiceWorker load.
+ if (NS_WARN_IF(mOriginAttributes.mPrivateBrowsingId > 0)) {
+ return NS_ERROR_DOM_SECURITY_ERR;
+ }
+
+ // Create a CacheStorage bypassing its trusted origin checks. The
+ // ServiceWorker has already performed its own checks before getting
+ // to this point.
+ ErrorResult error;
+ mCacheStorage = CacheStorage::CreateOnMainThread(
+ mozilla::dom::cache::CHROME_ONLY_NAMESPACE, mSandboxGlobalObject,
+ aPrincipal, true /* force trusted origin */, error);
+ if (NS_WARN_IF(error.Failed())) {
+ return error.StealNSResult();
+ }
+
+ return NS_OK;
+}
+
+nsresult CacheCreator::Load(nsIPrincipal* aPrincipal) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(!mLoaders.IsEmpty());
+
+ nsresult rv = CreateCacheStorage(aPrincipal);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ ErrorResult error;
+ MOZ_ASSERT(!mCacheName.IsEmpty());
+ RefPtr<Promise> promise = mCacheStorage->Open(mCacheName, error);
+ if (NS_WARN_IF(error.Failed())) {
+ return error.StealNSResult();
+ }
+
+ promise->AppendNativeHandler(this);
+ return NS_OK;
+}
+
+void CacheCreator::FailLoaders(nsresult aRv) {
+ AssertIsOnMainThread();
+
+ // Fail() can call LoadingFinished() which may call ExecuteFinishedScripts()
+ // which sets mCacheCreator to null, so hold a ref.
+ RefPtr<CacheCreator> kungfuDeathGrip = this;
+
+ for (uint32_t i = 0, len = mLoaders.Length(); i < len; ++i) {
+ mLoaders[i]->Fail(aRv);
+ }
+
+ mLoaders.Clear();
+}
+
+void CacheCreator::RejectedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) {
+ AssertIsOnMainThread();
+ FailLoaders(NS_ERROR_FAILURE);
+}
+
+void CacheCreator::ResolvedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) {
+ AssertIsOnMainThread();
+
+ if (!aValue.isObject()) {
+ FailLoaders(NS_ERROR_FAILURE);
+ return;
+ }
+
+ JS::Rooted<JSObject*> obj(aCx, &aValue.toObject());
+ Cache* cache = nullptr;
+ nsresult rv = UNWRAP_OBJECT(Cache, &obj, cache);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ FailLoaders(NS_ERROR_FAILURE);
+ return;
+ }
+
+ mCache = cache;
+ MOZ_DIAGNOSTIC_ASSERT(mCache);
+
+ // If the worker is canceled, CancelMainThread() will have cleared the
+ // loaders via DeleteCache().
+ for (uint32_t i = 0, len = mLoaders.Length(); i < len; ++i) {
+ mLoaders[i]->Load(cache);
+ }
+}
+
+void CacheCreator::DeleteCache() {
+ AssertIsOnMainThread();
+
+ // This is called when the load is canceled which can occur before
+ // mCacheStorage is initialized.
+ if (mCacheStorage) {
+ // It's safe to do this while Cache::Match() and Cache::Put() calls are
+ // running.
+ RefPtr<Promise> promise = mCacheStorage->Delete(mCacheName, IgnoreErrors());
+
+ // We don't care to know the result of the promise object.
+ }
+
+ // Always call this here to ensure the loaders array is cleared.
+ FailLoaders(NS_ERROR_FAILURE);
+}
+
+void CacheScriptLoader::Fail(nsresult aRv) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(NS_FAILED(aRv));
+
+ if (mFailed) {
+ return;
+ }
+
+ mFailed = true;
+
+ if (mPump) {
+ MOZ_ASSERT(mLoadInfo.mCacheStatus == ScriptLoadInfo::ReadingFromCache);
+ mPump->Cancel(aRv);
+ mPump = nullptr;
+ }
+
+ mLoadInfo.mCacheStatus = ScriptLoadInfo::Cancel;
+
+ // Stop if the load was aborted on the main thread.
+ // Can't use Finished() because mCachePromise may still be true.
+ if (mLoadInfo.mLoadingFinished) {
+ MOZ_ASSERT(!mLoadInfo.mChannel);
+ MOZ_ASSERT_IF(mLoadInfo.mCachePromise,
+ mLoadInfo.mCacheStatus == ScriptLoadInfo::WritingToCache ||
+ mLoadInfo.mCacheStatus == ScriptLoadInfo::Cancel);
+ return;
+ }
+
+ mRunnable->LoadingFinished(mLoadInfo, aRv);
+}
+
+void CacheScriptLoader::Load(Cache* aCache) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(aCache);
+
+ nsCOMPtr<nsIURI> uri;
+ nsresult rv =
+ NS_NewURI(getter_AddRefs(uri), mLoadInfo.mURL, nullptr, mBaseURI);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ Fail(rv);
+ return;
+ }
+
+ nsAutoCString spec;
+ rv = uri->GetSpec(spec);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ Fail(rv);
+ return;
+ }
+
+ MOZ_ASSERT(mLoadInfo.mFullURL.IsEmpty());
+ CopyUTF8toUTF16(spec, mLoadInfo.mFullURL);
+
+ mozilla::dom::RequestOrUSVString request;
+ request.SetAsUSVString().ShareOrDependUpon(mLoadInfo.mFullURL);
+
+ mozilla::dom::CacheQueryOptions params;
+
+ // This JSContext will not end up executing JS code because here there are
+ // no ReadableStreams involved.
+ AutoJSAPI jsapi;
+ jsapi.Init();
+
+ ErrorResult error;
+ RefPtr<Promise> promise = aCache->Match(jsapi.cx(), request, params, error);
+ if (NS_WARN_IF(error.Failed())) {
+ Fail(error.StealNSResult());
+ return;
+ }
+
+ promise->AppendNativeHandler(this);
+}
+
+void CacheScriptLoader::RejectedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) {
+ AssertIsOnMainThread();
+ MOZ_ASSERT(mLoadInfo.mCacheStatus == ScriptLoadInfo::Uncached);
+ Fail(NS_ERROR_FAILURE);
+}
+
+void CacheScriptLoader::ResolvedCallback(JSContext* aCx,
+ JS::Handle<JS::Value> aValue) {
+ AssertIsOnMainThread();
+ // If we have already called 'Fail', we should not proceed.
+ if (mFailed) {
+ return;
+ }
+
+ MOZ_ASSERT(mLoadInfo.mCacheStatus == ScriptLoadInfo::Uncached);
+
+ nsresult rv;
+
+ // The ServiceWorkerScriptCache will store data for any scripts it
+ // it knows about. This is always at least the top level script.
+ // Depending on if a previous version of the service worker has
+ // been installed or not it may also know about importScripts(). We
+ // must handle loading and offlining new importScripts() here, however.
+ if (aValue.isUndefined()) {
+ // If this is the main script or we're not loading a new service worker
+ // then this is an error. This can happen for internal reasons, like
+ // storage was probably wiped without removing the service worker
+ // registration. It can also happen for exposed reasons like the
+ // service worker script calling importScripts() after install.
+ if (NS_WARN_IF(mIsWorkerScript ||
+ (mState != ServiceWorkerState::Parsed &&
+ mState != ServiceWorkerState::Installing))) {
+ Fail(NS_ERROR_DOM_INVALID_STATE_ERR);
+ return;
+ }
+
+ mLoadInfo.mCacheStatus = ScriptLoadInfo::ToBeCached;
+ rv = mRunnable->LoadScript(mLoadInfo);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ Fail(rv);
+ }
+ return;
+ }
+
+ MOZ_ASSERT(aValue.isObject());
+
+ JS::Rooted<JSObject*> obj(aCx, &aValue.toObject());
+ mozilla::dom::Response* response = nullptr;
+ rv = UNWRAP_OBJECT(Response, &obj, response);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ Fail(rv);
+ return;
+ }
+
+ InternalHeaders* headers = response->GetInternalHeaders();
+
+ headers->Get("content-security-policy"_ns, mCSPHeaderValue, IgnoreErrors());
+ headers->Get("content-security-policy-report-only"_ns,
+ mCSPReportOnlyHeaderValue, IgnoreErrors());
+ headers->Get("referrer-policy"_ns, mReferrerPolicyHeaderValue,
+ IgnoreErrors());
+
+ nsAutoCString coepHeader;
+ headers->Get("cross-origin-embedder-policy"_ns, coepHeader, IgnoreErrors());
+
+ nsILoadInfo::CrossOriginEmbedderPolicy coep =
+ NS_GetCrossOriginEmbedderPolicyFromHeader(coepHeader);
+
+ rv = ScriptResponseHeaderProcessor::ProcessCrossOriginEmbedderPolicyHeader(
+ mRunnable->mWorkerPrivate, coep, mRunnable->mIsMainScript);
+
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ Fail(rv);
+ return;
+ }
+
+ nsCOMPtr<nsIInputStream> inputStream;
+ response->GetBody(getter_AddRefs(inputStream));
+ mChannelInfo = response->GetChannelInfo();
+ const UniquePtr<PrincipalInfo>& pInfo = response->GetPrincipalInfo();
+ if (pInfo) {
+ mPrincipalInfo = mozilla::MakeUnique<PrincipalInfo>(*pInfo);
+ }
+
+ if (!inputStream) {
+ mLoadInfo.mCacheStatus = ScriptLoadInfo::Cached;
+ mRunnable->DataReceivedFromCache(
+ mLoadInfo, (uint8_t*)"", 0, mChannelInfo, std::move(mPrincipalInfo),
+ mCSPHeaderValue, mCSPReportOnlyHeaderValue, mReferrerPolicyHeaderValue);
+ return;
+ }
+
+ MOZ_ASSERT(!mPump);
+ rv = NS_NewInputStreamPump(getter_AddRefs(mPump), inputStream.forget(),
+ 0, /* default segsize */
+ 0, /* default segcount */
+ false, /* default closeWhenDone */
+ mMainThreadEventTarget);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ Fail(rv);
+ return;
+ }
+
+ nsCOMPtr<nsIStreamLoader> loader;
+ rv = NS_NewStreamLoader(getter_AddRefs(loader), this);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ Fail(rv);
+ return;
+ }
+
+ rv = mPump->AsyncRead(loader);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ mPump = nullptr;
+ Fail(rv);
+ return;
+ }
+
+ nsCOMPtr<nsIThreadRetargetableRequest> rr = do_QueryInterface(mPump);
+ if (rr) {
+ nsCOMPtr<nsIEventTarget> sts =
+ do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID);
+ rv = rr->RetargetDeliveryTo(sts);
+ if (NS_FAILED(rv)) {
+ NS_WARNING("Failed to dispatch the nsIInputStreamPump to a IO thread.");
+ }
+ }
+
+ mLoadInfo.mCacheStatus = ScriptLoadInfo::ReadingFromCache;
+}
+
+NS_IMETHODIMP
+CacheScriptLoader::OnStreamComplete(nsIStreamLoader* aLoader,
+ nsISupports* aContext, nsresult aStatus,
+ uint32_t aStringLen,
+ const uint8_t* aString) {
+ AssertIsOnMainThread();
+
+ mPump = nullptr;
+
+ if (NS_FAILED(aStatus)) {
+ MOZ_ASSERT(mLoadInfo.mCacheStatus == ScriptLoadInfo::ReadingFromCache ||
+ mLoadInfo.mCacheStatus == ScriptLoadInfo::Cancel);
+ Fail(aStatus);
+ return NS_OK;
+ }
+
+ MOZ_ASSERT(mLoadInfo.mCacheStatus == ScriptLoadInfo::ReadingFromCache);
+ mLoadInfo.mCacheStatus = ScriptLoadInfo::Cached;
+
+ MOZ_ASSERT(mPrincipalInfo);
+ mRunnable->DataReceivedFromCache(
+ mLoadInfo, aString, aStringLen, mChannelInfo, std::move(mPrincipalInfo),
+ mCSPHeaderValue, mCSPReportOnlyHeaderValue, mReferrerPolicyHeaderValue);
+ return NS_OK;
+}
+
+class ChannelGetterRunnable final : public WorkerMainThreadRunnable {
+ const nsAString& mScriptURL;
+ const ClientInfo mClientInfo;
+ WorkerLoadInfo& mLoadInfo;
+ nsresult mResult;
+
+ public:
+ ChannelGetterRunnable(WorkerPrivate* aParentWorker,
+ const nsAString& aScriptURL, WorkerLoadInfo& aLoadInfo)
+ : WorkerMainThreadRunnable(aParentWorker,
+ "ScriptLoader :: ChannelGetter"_ns),
+ mScriptURL(aScriptURL)
+ // ClientInfo should always be present since this should not be called
+ // if parent's status is greater than Running.
+ ,
+ mClientInfo(aParentWorker->GlobalScope()->GetClientInfo().ref()),
+ mLoadInfo(aLoadInfo),
+ mResult(NS_ERROR_FAILURE) {
+ MOZ_ASSERT(aParentWorker);
+ aParentWorker->AssertIsOnWorkerThread();
+ }
+
+ virtual bool MainThreadRun() override {
+ AssertIsOnMainThread();
+
+ // Initialize the WorkerLoadInfo principal to our triggering principal
+ // before doing anything else. Normally we do this in the WorkerPrivate
+ // Constructor, but we can't do so off the main thread when creating
+ // a nested worker. So do it here instead.
+ mLoadInfo.mLoadingPrincipal = mWorkerPrivate->GetPrincipal();
+ MOZ_DIAGNOSTIC_ASSERT(mLoadInfo.mLoadingPrincipal);
+
+ mLoadInfo.mPrincipal = mLoadInfo.mLoadingPrincipal;
+
+ // Figure out our base URI.
+ nsCOMPtr<nsIURI> baseURI = mWorkerPrivate->GetBaseURI();
+ MOZ_ASSERT(baseURI);
+
+ // May be null.
+ nsCOMPtr<Document> parentDoc = mWorkerPrivate->GetDocument();
+
+ mLoadInfo.mLoadGroup = mWorkerPrivate->GetLoadGroup();
+ mLoadInfo.mCookieJarSettings = mWorkerPrivate->CookieJarSettings();
+
+ // Nested workers use default uri encoding.
+ nsCOMPtr<nsIURI> url;
+ mResult =
+ ConstructURI(mScriptURL, baseURI, parentDoc, true, getter_AddRefs(url));
+ NS_ENSURE_SUCCESS(mResult, true);
+
+ Maybe<ClientInfo> clientInfo;
+ clientInfo.emplace(mClientInfo);
+
+ nsCOMPtr<nsIChannel> channel;
+ nsCOMPtr<nsIReferrerInfo> referrerInfo =
+ ReferrerInfo::CreateForFetch(mLoadInfo.mLoadingPrincipal, nullptr);
+ mLoadInfo.mReferrerInfo =
+ static_cast<ReferrerInfo*>(referrerInfo.get())
+ ->CloneWithNewPolicy(mWorkerPrivate->GetReferrerPolicy());
+
+ mResult = workerinternals::ChannelFromScriptURLMainThread(
+ mLoadInfo.mLoadingPrincipal, parentDoc, mLoadInfo.mLoadGroup, url,
+ clientInfo,
+ // Nested workers are always dedicated.
+ nsIContentPolicy::TYPE_INTERNAL_WORKER, mLoadInfo.mCookieJarSettings,
+ mLoadInfo.mReferrerInfo, getter_AddRefs(channel));
+ NS_ENSURE_SUCCESS(mResult, true);
+
+ mResult = mLoadInfo.SetPrincipalsAndCSPFromChannel(channel);
+ NS_ENSURE_SUCCESS(mResult, true);
+
+ mLoadInfo.mChannel = std::move(channel);
+ return true;
+ }
+
+ nsresult GetResult() const { return mResult; }
+
+ private:
+ virtual ~ChannelGetterRunnable() = default;
+};
+
+ScriptExecutorRunnable::ScriptExecutorRunnable(
+ ScriptLoaderRunnable& aScriptLoader, nsIEventTarget* aSyncLoopTarget,
+ bool aIsWorkerScript, Span<ScriptLoadInfo> aLoadInfosAlreadyExecuted,
+ Span<ScriptLoadInfo> aLoadInfosToExecute)
+ : MainThreadWorkerSyncRunnable(aScriptLoader.mWorkerPrivate,
+ aSyncLoopTarget),
+ mScriptLoader(aScriptLoader),
+ mIsWorkerScript(aIsWorkerScript),
+ mLoadInfosAlreadyExecuted(aLoadInfosAlreadyExecuted),
+ mLoadInfosToExecute(aLoadInfosToExecute) {
+ // If there are load infos for scripts that have already been executed, the
+ // load infos for the scripts to execute must immediate follow them.
+ MOZ_ASSERT_IF(mLoadInfosAlreadyExecuted.Length(),
+ mLoadInfosAlreadyExecuted.Elements() +
+ mLoadInfosAlreadyExecuted.Length() ==
+ mLoadInfosToExecute.Elements());
+}
+
+bool ScriptExecutorRunnable::IsDebuggerRunnable() const {
+ // ScriptExecutorRunnable is used to execute both worker and debugger scripts.
+ // In the latter case, the runnable needs to be dispatched to the debugger
+ // queue.
+ return mScriptLoader.mWorkerScriptType == DebuggerScript;
+}
+
+bool ScriptExecutorRunnable::PreRun(WorkerPrivate* aWorkerPrivate) {
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ if (!mIsWorkerScript) {
+ return true;
+ }
+
+ if (!aWorkerPrivate->GetJSContext()) {
+ return false;
+ }
+
+ MOZ_ASSERT(mLoadInfosAlreadyExecuted.Length() == 0);
+ MOZ_ASSERT(!mScriptLoader.mRv.Failed());
+
+ // Move the CSP from the workerLoadInfo in the corresponding Client
+ // where the CSP code expects it!
+ aWorkerPrivate->StoreCSPOnClient();
+
+ return true;
+}
+
+template <typename Unit>
+static bool EvaluateScriptData(JSContext* aCx,
+ const JS::CompileOptions& aOptions,
+ Unit*& aScriptData, size_t aScriptLength) {
+ static_assert(std::is_same<Unit, char16_t>::value ||
+ std::is_same<Unit, Utf8Unit>::value,
+ "inferred units must be UTF-8 or UTF-16");
+
+ // Transfer script data to a local variable.
+ Unit* script = nullptr;
+ std::swap(script, aScriptData);
+
+ // Transfer the local to appropriate |SourceText|.
+ JS::SourceText<Unit> srcBuf;
+ if (!srcBuf.init(aCx, script, aScriptLength,
+ JS::SourceOwnership::TakeOwnership)) {
+ return false;
+ }
+
+ JS::Rooted<JS::Value> unused(aCx);
+ return Evaluate(aCx, aOptions, srcBuf, &unused);
+}
+
+bool ScriptExecutorRunnable::WorkerRun(JSContext* aCx,
+ WorkerPrivate* aWorkerPrivate) {
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ // Don't run if something else has already failed.
+ if (std::any_of(
+ mLoadInfosAlreadyExecuted.cbegin(), mLoadInfosAlreadyExecuted.cend(),
+ [](const ScriptLoadInfo& loadInfo) {
+ NS_ASSERTION(!loadInfo.mChannel,
+ "Should no longer have a channel!");
+ NS_ASSERTION(loadInfo.mExecutionScheduled, "Should be scheduled!");
+
+ return !loadInfo.mExecutionResult;
+ })) {
+ return true;
+ }
+
+ // If nothing else has failed, our ErrorResult better not be a failure either.
+ MOZ_ASSERT(!mScriptLoader.mRv.Failed(), "Who failed it and why?");
+
+ // Slightly icky action at a distance, but there's no better place to stash
+ // this value, really.
+ JS::Rooted<JSObject*> global(aCx, JS::CurrentGlobalOrNull(aCx));
+ MOZ_ASSERT(global);
+
+ for (ScriptLoadInfo& loadInfo : mLoadInfosToExecute) {
+ NS_ASSERTION(!loadInfo.mChannel, "Should no longer have a channel!");
+ NS_ASSERTION(loadInfo.mExecutionScheduled, "Should be scheduled!");
+ NS_ASSERTION(!loadInfo.mExecutionResult, "Should not have executed yet!");
+
+ MOZ_ASSERT(!mScriptLoader.mRv.Failed(), "Who failed it and why?");
+ mScriptLoader.mRv.MightThrowJSException();
+ if (NS_FAILED(loadInfo.mLoadResult)) {
+ workerinternals::ReportLoadError(mScriptLoader.mRv, loadInfo.mLoadResult,
+ loadInfo.mURL);
+ return true;
+ }
+
+ // If this is a top level script that succeeded, then mark the
+ // Client execution ready and possible controlled by a service worker.
+ if (mIsWorkerScript) {
+ if (mScriptLoader.mController.isSome()) {
+ MOZ_ASSERT(mScriptLoader.mWorkerScriptType == WorkerScript,
+ "Debugger clients can't be controlled.");
+ aWorkerPrivate->GlobalScope()->Control(mScriptLoader.mController.ref());
+ }
+ aWorkerPrivate->ExecutionReady();
+ }
+
+ NS_ConvertUTF16toUTF8 filename(loadInfo.mURL);
+
+ JS::CompileOptions options(aCx);
+ options.setFileAndLine(filename.get(), 1).setNoScriptRval(true);
+
+ MOZ_ASSERT(loadInfo.mMutedErrorFlag.isSome());
+ options.setMutedErrors(loadInfo.mMutedErrorFlag.valueOr(true));
+
+ if (loadInfo.mSourceMapURL) {
+ options.setSourceMapURL(loadInfo.mSourceMapURL->get());
+ }
+
+ // Our ErrorResult still shouldn't be a failure.
+ MOZ_ASSERT(!mScriptLoader.mRv.Failed(), "Who failed it and why?");
+
+ // Transfer script length to a local variable, encoding-agnostically.
+ size_t scriptLength = 0;
+ std::swap(scriptLength, loadInfo.mScriptLength);
+
+ // This transfers script data out of the active arm of |loadInfo.mScript|.
+ bool successfullyEvaluated =
+ loadInfo.mScriptIsUTF8
+ ? EvaluateScriptData(aCx, options, loadInfo.mScript.mUTF8,
+ scriptLength)
+ : EvaluateScriptData(aCx, options, loadInfo.mScript.mUTF16,
+ scriptLength);
+ MOZ_ASSERT(loadInfo.ScriptTextIsNull());
+ if (!successfullyEvaluated) {
+ mScriptLoader.mRv.StealExceptionFromJSContext(aCx);
+ return true;
+ }
+
+ loadInfo.mExecutionResult = true;
+ }
+
+ return true;
+}
+
+void ScriptExecutorRunnable::PostRun(JSContext* aCx,
+ WorkerPrivate* aWorkerPrivate,
+ bool aRunResult) {
+ aWorkerPrivate->AssertIsOnWorkerThread();
+ MOZ_ASSERT(!JS_IsExceptionPending(aCx), "Who left an exception on there?");
+
+ if (AllScriptsExecutable()) {
+ // All done. If anything failed then return false.
+ bool result = true;
+ bool mutedError = false;
+ for (const auto& loadInfo : mScriptLoader.mLoadInfos) {
+ if (!loadInfo.mExecutionResult) {
+ mutedError = loadInfo.mMutedErrorFlag.valueOr(true);
+ result = false;
+ break;
+ }
+ }
+
+ // The only way we can get here with "result" false but without
+ // mScriptLoader.mRv being a failure is if we're loading the main worker
+ // script and GetOrCreateGlobalScope() fails. In that case we would have
+ // returned false from WorkerRun, so assert that.
+ MOZ_ASSERT_IF(!result && !mScriptLoader.mRv.Failed(), !aRunResult);
+ ShutdownScriptLoader(aCx, aWorkerPrivate, result, mutedError);
+ }
+}
+
+nsresult ScriptExecutorRunnable::Cancel() {
+ if (AllScriptsExecutable()) {
+ ShutdownScriptLoader(mWorkerPrivate->GetJSContext(), mWorkerPrivate, false,
+ false);
+ }
+ return MainThreadWorkerSyncRunnable::Cancel();
+}
+
+void ScriptExecutorRunnable::ShutdownScriptLoader(JSContext* aCx,
+ WorkerPrivate* aWorkerPrivate,
+ bool aResult,
+ bool aMutedError) {
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ MOZ_ASSERT(AllScriptsExecutable());
+
+ if (mIsWorkerScript) {
+ aWorkerPrivate->SetLoadingWorkerScript(false);
+ }
+
+ if (!aResult) {
+ // At this point there are two possibilities:
+ //
+ // 1) mScriptLoader.mRv.Failed(). In that case we just want to leave it
+ // as-is, except if it has a JS exception and we need to mute JS
+ // exceptions. In that case, we log the exception without firing any
+ // events and then replace it on the ErrorResult with a NetworkError,
+ // per spec.
+ //
+ // 2) mScriptLoader.mRv succeeded. As far as I can tell, this can only
+ // happen when loading the main worker script and
+ // GetOrCreateGlobalScope() fails or if ScriptExecutorRunnable::Cancel
+ // got called. Does it matter what we throw in this case? I'm not
+ // sure...
+ if (mScriptLoader.mRv.Failed()) {
+ if (aMutedError && mScriptLoader.mRv.IsJSException()) {
+ LogExceptionToConsole(aCx, aWorkerPrivate);
+ mScriptLoader.mRv.Throw(NS_ERROR_DOM_NETWORK_ERR);
+ }
+ } else {
+ mScriptLoader.mRv.Throw(NS_ERROR_DOM_INVALID_STATE_ERR);
+ }
+ }
+
+ aWorkerPrivate->StopSyncLoop(mSyncLoopTarget, aResult);
+}
+
+void ScriptExecutorRunnable::LogExceptionToConsole(
+ JSContext* aCx, WorkerPrivate* aWorkerPrivate) {
+ aWorkerPrivate->AssertIsOnWorkerThread();
+
+ MOZ_ASSERT(mScriptLoader.mRv.IsJSException());
+
+ JS::Rooted<JS::Value> exn(aCx);
+ if (!ToJSValue(aCx, std::move(mScriptLoader.mRv), &exn)) {
+ return;
+ }
+
+ // Now the exception state should all be in exn.
+ MOZ_ASSERT(!JS_IsExceptionPending(aCx));
+ MOZ_ASSERT(!mScriptLoader.mRv.Failed());
+
+ JS::ExceptionStack exnStack(aCx, exn, nullptr);
+ JS::ErrorReportBuilder report(aCx);
+ if (!report.init(aCx, exnStack, JS::ErrorReportBuilder::WithSideEffects)) {
+ JS_ClearPendingException(aCx);
+ return;
+ }
+
+ RefPtr<xpc::ErrorReport> xpcReport = new xpc::ErrorReport();
+ xpcReport->Init(report.report(), report.toStringResult().c_str(),
+ aWorkerPrivate->IsChromeWorker(), aWorkerPrivate->WindowID());
+
+ RefPtr<AsyncErrorReporter> r = new AsyncErrorReporter(xpcReport);
+ NS_DispatchToMainThread(r);
+}
+
+bool ScriptExecutorRunnable::AllScriptsExecutable() const {
+ return mScriptLoader.mLoadInfos.Length() ==
+ mLoadInfosAlreadyExecuted.Length() + mLoadInfosToExecute.Length();
+}
+
+void LoadAllScripts(WorkerPrivate* aWorkerPrivate,
+ UniquePtr<SerializedStackHolder> aOriginStack,
+ nsTArray<ScriptLoadInfo> aLoadInfos, bool aIsMainScript,
+ WorkerScriptType aWorkerScriptType, ErrorResult& aRv) {
+ aWorkerPrivate->AssertIsOnWorkerThread();
+ NS_ASSERTION(!aLoadInfos.IsEmpty(), "Bad arguments!");
+
+ AutoSyncLoopHolder syncLoop(aWorkerPrivate, Canceling);
+ nsCOMPtr<nsIEventTarget> syncLoopTarget = syncLoop.GetEventTarget();
+ if (!syncLoopTarget) {
+ aRv.Throw(NS_ERROR_DOM_INVALID_STATE_ERR);
+ return;
+ }
+
+ Maybe<ClientInfo> clientInfo;
+ Maybe<ServiceWorkerDescriptor> controller;
+ if (!aIsMainScript) {
+ nsIGlobalObject* global =
+ aWorkerScriptType == WorkerScript
+ ? static_cast<nsIGlobalObject*>(aWorkerPrivate->GlobalScope())
+ : aWorkerPrivate->DebuggerGlobalScope();
+
+ clientInfo = global->GetClientInfo();
+ controller = global->GetController();
+ }
+
+ RefPtr<ScriptLoaderRunnable> loader = new ScriptLoaderRunnable(
+ aWorkerPrivate, std::move(aOriginStack), syncLoopTarget,
+ std::move(aLoadInfos), clientInfo, controller, aIsMainScript,
+ aWorkerScriptType, aRv);
+
+ NS_ASSERTION(aLoadInfos.IsEmpty(), "Should have swapped!");
+
+ RefPtr<StrongWorkerRef> workerRef =
+ StrongWorkerRef::Create(aWorkerPrivate, "ScriptLoader", [loader]() {
+ NS_DispatchToMainThread(NewRunnableMethod(
+ "ScriptLoader::CancelMainThreadWithBindingAborted", loader,
+ &ScriptLoaderRunnable::CancelMainThreadWithBindingAborted));
+ });
+
+ if (NS_WARN_IF(!workerRef)) {
+ aRv.Throw(NS_ERROR_FAILURE);
+ return;
+ }
+
+ if (NS_FAILED(NS_DispatchToMainThread(loader))) {
+ NS_ERROR("Failed to dispatch!");
+ aRv.Throw(NS_ERROR_FAILURE);
+ return;
+ }
+
+ syncLoop.Run();
+}
+
+} /* anonymous namespace */
+
+namespace workerinternals {
+
+nsresult ChannelFromScriptURLMainThread(
+ nsIPrincipal* aPrincipal, Document* aParentDoc, nsILoadGroup* aLoadGroup,
+ nsIURI* aScriptURL, const Maybe<ClientInfo>& aClientInfo,
+ nsContentPolicyType aMainScriptContentPolicyType,
+ nsICookieJarSettings* aCookieJarSettings, nsIReferrerInfo* aReferrerInfo,
+ nsIChannel** aChannel) {
+ AssertIsOnMainThread();
+
+ nsCOMPtr<nsIIOService> ios(do_GetIOService());
+
+ nsIScriptSecurityManager* secMan = nsContentUtils::GetSecurityManager();
+ NS_ASSERTION(secMan, "This should never be null!");
+
+ return ChannelFromScriptURL(
+ aPrincipal, aParentDoc, nullptr, aLoadGroup, ios, secMan, aScriptURL,
+ aClientInfo, Maybe<ServiceWorkerDescriptor>(), true, WorkerScript,
+ aMainScriptContentPolicyType, nsIRequest::LOAD_NORMAL, aCookieJarSettings,
+ aReferrerInfo, aChannel);
+}
+
+nsresult ChannelFromScriptURLWorkerThread(JSContext* aCx,
+ WorkerPrivate* aParent,
+ const nsAString& aScriptURL,
+ WorkerLoadInfo& aLoadInfo) {
+ aParent->AssertIsOnWorkerThread();
+
+ RefPtr<ChannelGetterRunnable> getter =
+ new ChannelGetterRunnable(aParent, aScriptURL, aLoadInfo);
+
+ ErrorResult rv;
+ getter->Dispatch(Canceling, rv);
+ if (rv.Failed()) {
+ NS_ERROR("Failed to dispatch!");
+ return rv.StealNSResult();
+ }
+
+ return getter->GetResult();
+}
+
+void ReportLoadError(ErrorResult& aRv, nsresult aLoadResult,
+ const nsAString& aScriptURL) {
+ MOZ_ASSERT(!aRv.Failed());
+
+ nsPrintfCString err("Failed to load worker script at \"%s\"",
+ NS_ConvertUTF16toUTF8(aScriptURL).get());
+
+ switch (aLoadResult) {
+ case NS_ERROR_FILE_NOT_FOUND:
+ case NS_ERROR_NOT_AVAILABLE:
+ aRv.ThrowNetworkError(err);
+ break;
+
+ case NS_ERROR_MALFORMED_URI:
+ case NS_ERROR_DOM_SYNTAX_ERR:
+ aRv.ThrowSyntaxError(err);
+ break;
+
+ case NS_BINDING_ABORTED:
+ // Note: we used to pretend like we didn't set an exception for
+ // NS_BINDING_ABORTED, but then ShutdownScriptLoader did it anyway. The
+ // other callsite, in WorkerPrivate::Constructor, never passed in
+ // NS_BINDING_ABORTED. So just throw it directly here. Consumers will
+ // deal as needed. But note that we do NOT want to use one of the
+ // Throw*Error() methods on ErrorResult for this case, because that will
+ // make it impossible for consumers to realize that our error was
+ // NS_BINDING_ABORTED.
+ aRv.Throw(aLoadResult);
+ return;
+
+ case NS_ERROR_DOM_BAD_URI:
+ // This is actually a security error.
+ case NS_ERROR_DOM_SECURITY_ERR:
+ aRv.ThrowSecurityError(err);
+ break;
+
+ default:
+ // For lack of anything better, go ahead and throw a NetworkError here.
+ // We don't want to throw a JS exception, because for toplevel script
+ // loads that would get squelched.
+ aRv.ThrowNetworkError(nsPrintfCString(
+ "Failed to load worker script at %s (nsresult = 0x%" PRIx32 ")",
+ NS_ConvertUTF16toUTF8(aScriptURL).get(),
+ static_cast<uint32_t>(aLoadResult)));
+ return;
+ }
+}
+
+void LoadMainScript(WorkerPrivate* aWorkerPrivate,
+ UniquePtr<SerializedStackHolder> aOriginStack,
+ const nsAString& aScriptURL,
+ WorkerScriptType aWorkerScriptType, ErrorResult& aRv) {
+ nsTArray<ScriptLoadInfo> loadInfos;
+
+ ScriptLoadInfo* info = loadInfos.AppendElement();
+ info->mURL = aScriptURL;
+ info->mLoadFlags = aWorkerPrivate->GetLoadFlags();
+
+ // We are loading the main script, so the worker's Client must be
+ // reserved.
+ if (aWorkerScriptType == WorkerScript) {
+ info->mReservedClientInfo = aWorkerPrivate->GlobalScope()->GetClientInfo();
+ } else {
+ info->mReservedClientInfo =
+ aWorkerPrivate->DebuggerGlobalScope()->GetClientInfo();
+ }
+
+ LoadAllScripts(aWorkerPrivate, std::move(aOriginStack), std::move(loadInfos),
+ true, aWorkerScriptType, aRv);
+}
+
+void Load(WorkerPrivate* aWorkerPrivate,
+ UniquePtr<SerializedStackHolder> aOriginStack,
+ const nsTArray<nsString>& aScriptURLs,
+ WorkerScriptType aWorkerScriptType, ErrorResult& aRv) {
+ const uint32_t urlCount = aScriptURLs.Length();
+
+ if (!urlCount) {
+ return;
+ }
+
+ if (urlCount > MAX_CONCURRENT_SCRIPTS) {
+ aRv.Throw(NS_ERROR_OUT_OF_MEMORY);
+ return;
+ }
+
+ nsTArray<ScriptLoadInfo> loadInfos = TransformIntoNewArray(
+ aScriptURLs,
+ [loadFlags = aWorkerPrivate->GetLoadFlags()](const auto& scriptURL) {
+ ScriptLoadInfo res;
+ res.mURL = scriptURL;
+ res.mLoadFlags = loadFlags;
+ return res;
+ });
+
+ LoadAllScripts(aWorkerPrivate, std::move(aOriginStack), std::move(loadInfos),
+ false, aWorkerScriptType, aRv);
+}
+
+} // namespace workerinternals
+
+} // namespace dom
+} // namespace mozilla