/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "ServiceWorkerPrivate.h" #include #include "ServiceWorkerCloneData.h" #include "ServiceWorkerManager.h" #include "ServiceWorkerPrivateImpl.h" #include "ServiceWorkerUtils.h" #include "nsContentUtils.h" #include "nsICacheInfoChannel.h" #include "nsIHttpChannel.h" #include "nsIHttpChannelInternal.h" #include "nsIHttpHeaderVisitor.h" #include "nsINamed.h" #include "nsINetworkInterceptController.h" #include "nsIPushErrorReporter.h" #include "nsISupportsImpl.h" #include "nsIUploadChannel2.h" #include "nsNetUtil.h" #include "nsProxyRelease.h" #include "nsQueryObject.h" #include "nsStreamUtils.h" #include "nsStringStream.h" #include "mozilla/Assertions.h" #include "mozilla/CycleCollectedJSContext.h" // for MicroTaskRunnable #include "mozilla/JSObjectHolder.h" #include "mozilla/Preferences.h" #include "mozilla/dom/Client.h" #include "mozilla/dom/ClientIPCTypes.h" #include "mozilla/dom/FetchUtil.h" #include "mozilla/dom/IndexedDatabaseManager.h" #include "mozilla/dom/InternalHeaders.h" #include "mozilla/dom/NotificationEvent.h" #include "mozilla/dom/PromiseNativeHandler.h" #include "mozilla/dom/PushEventBinding.h" #include "mozilla/dom/RequestBinding.h" #include "mozilla/dom/WorkerDebugger.h" #include "mozilla/dom/WorkerRef.h" #include "mozilla/dom/WorkerRunnable.h" #include "mozilla/dom/WorkerScope.h" #include "mozilla/dom/ipc/StructuredCloneData.h" #include "mozilla/ipc/BackgroundUtils.h" #include "mozilla/net/CookieJarSettings.h" #include "mozilla/net/NeckoChannelParams.h" #include "mozilla/Services.h" #include "mozilla/Telemetry.h" #include "mozilla/DebugOnly.h" #include "mozilla/StaticPrefs_dom.h" #include "mozilla/Unused.h" #include "nsIReferrerInfo.h" using namespace mozilla; using namespace mozilla::dom; namespace mozilla { namespace dom { using mozilla::ipc::PrincipalInfo; NS_IMPL_CYCLE_COLLECTING_NATIVE_ADDREF(ServiceWorkerPrivate) NS_IMPL_CYCLE_COLLECTING_NATIVE_RELEASE(ServiceWorkerPrivate) NS_IMPL_CYCLE_COLLECTION(ServiceWorkerPrivate, mSupportsArray) NS_IMPL_CYCLE_COLLECTION_ROOT_NATIVE(ServiceWorkerPrivate, AddRef) NS_IMPL_CYCLE_COLLECTION_UNROOT_NATIVE(ServiceWorkerPrivate, Release) // Tracks the "dom.serviceWorkers.disable_open_click_delay" preference. Modified // on main thread, read on worker threads. // It is updated every time a "notificationclick" event is dispatched. While // this is done without synchronization, at the worst, the thread will just get // an older value within which a popup is allowed to be displayed, which will // still be a valid value since it was set prior to dispatching the runnable. Atomic gDOMDisableOpenClickDelay(0); KeepAliveToken::KeepAliveToken(ServiceWorkerPrivate* aPrivate) : mPrivate(aPrivate) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aPrivate); mPrivate->AddToken(); } KeepAliveToken::~KeepAliveToken() { MOZ_ASSERT(NS_IsMainThread()); mPrivate->ReleaseToken(); } NS_IMPL_ISUPPORTS0(KeepAliveToken) ServiceWorkerPrivate::ServiceWorkerPrivate(ServiceWorkerInfo* aInfo) : mInfo(aInfo), mDebuggerCount(0), mTokenCount(0) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aInfo); mIdleWorkerTimer = NS_NewTimer(); MOZ_ASSERT(mIdleWorkerTimer); if (ServiceWorkerParentInterceptEnabled()) { RefPtr inner = new ServiceWorkerPrivateImpl(this); // Assert in all debug builds as well as non-debug Nightly and Dev Edition. #ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED MOZ_DIAGNOSTIC_ASSERT(NS_SUCCEEDED(inner->Initialize())); #else MOZ_ALWAYS_SUCCEEDS(inner->Initialize()); #endif mInner = std::move(inner); } } ServiceWorkerPrivate::~ServiceWorkerPrivate() { MOZ_ASSERT(!mWorkerPrivate); MOZ_ASSERT(!mTokenCount); MOZ_ASSERT(!mInner); MOZ_ASSERT(!mInfo); MOZ_ASSERT(mSupportsArray.IsEmpty()); MOZ_ASSERT(mIdlePromiseHolder.IsEmpty()); mIdleWorkerTimer->Cancel(); } namespace { class CheckScriptEvaluationWithCallback final : public WorkerDebuggeeRunnable { nsMainThreadPtrHandle mServiceWorkerPrivate; nsMainThreadPtrHandle mKeepAliveToken; // The script evaluation result must be reported even if the runnable // is cancelled. RefPtr mScriptEvaluationCallback; #ifdef DEBUG bool mDone; #endif public: CheckScriptEvaluationWithCallback( WorkerPrivate* aWorkerPrivate, ServiceWorkerPrivate* aServiceWorkerPrivate, KeepAliveToken* aKeepAliveToken, LifeCycleEventCallback* aScriptEvaluationCallback) : WorkerDebuggeeRunnable(aWorkerPrivate, WorkerThreadModifyBusyCount), mServiceWorkerPrivate(new nsMainThreadPtrHolder( "CheckScriptEvaluationWithCallback::mServiceWorkerPrivate", aServiceWorkerPrivate)), mKeepAliveToken(new nsMainThreadPtrHolder( "CheckScriptEvaluationWithCallback::mKeepAliveToken", aKeepAliveToken)), mScriptEvaluationCallback(aScriptEvaluationCallback) #ifdef DEBUG , mDone(false) #endif { MOZ_ASSERT(NS_IsMainThread()); } ~CheckScriptEvaluationWithCallback() { MOZ_ASSERT(mDone); } bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { aWorkerPrivate->AssertIsOnWorkerThread(); bool fetchHandlerWasAdded = aWorkerPrivate->FetchHandlerWasAdded(); nsCOMPtr runnable = NewRunnableMethod( "dom::CheckScriptEvaluationWithCallback::ReportFetchFlag", this, &CheckScriptEvaluationWithCallback::ReportFetchFlag, fetchHandlerWasAdded); aWorkerPrivate->DispatchToMainThread(runnable.forget()); ReportScriptEvaluationResult( aWorkerPrivate->WorkerScriptExecutedSuccessfully()); return true; } void ReportFetchFlag(bool aFetchHandlerWasAdded) { MOZ_ASSERT(NS_IsMainThread()); mServiceWorkerPrivate->SetHandlesFetch(aFetchHandlerWasAdded); } nsresult Cancel() override { ReportScriptEvaluationResult(false); return WorkerRunnable::Cancel(); } private: void ReportScriptEvaluationResult(bool aScriptEvaluationResult) { #ifdef DEBUG mDone = true; #endif mScriptEvaluationCallback->SetResult(aScriptEvaluationResult); MOZ_ALWAYS_SUCCEEDS( mWorkerPrivate->DispatchToMainThread(mScriptEvaluationCallback)); } }; } // anonymous namespace nsresult ServiceWorkerPrivate::CheckScriptEvaluation( LifeCycleEventCallback* aScriptEvaluationCallback) { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { return mInner->CheckScriptEvaluation(aScriptEvaluationCallback); } nsresult rv = SpawnWorkerIfNeeded(LifeCycleEvent); NS_ENSURE_SUCCESS(rv, rv); RefPtr token = CreateEventKeepAliveToken(); RefPtr r = new CheckScriptEvaluationWithCallback( mWorkerPrivate, this, token, aScriptEvaluationCallback); if (NS_WARN_IF(!r->Dispatch())) { return NS_ERROR_FAILURE; } return NS_OK; } namespace { class KeepAliveHandler final : public ExtendableEvent::ExtensionsHandler, public PromiseNativeHandler { // This class manages lifetime extensions added by calling WaitUntil() // or RespondWith(). We allow new extensions as long as we still hold // |mKeepAliveToken|. Once the last promise was settled, we queue a microtask // which releases the token and prevents further extensions. By doing this, // we give other pending microtasks a chance to continue adding extensions. RefPtr mWorkerRef; nsMainThreadPtrHandle mKeepAliveToken; // We start holding a self reference when the first extension promise is // added. As far as I can tell, the only case where this is useful is when // we're waiting indefinitely on a promise that's no longer reachable // and will never be settled. // The cycle is broken when the last promise was settled or when the // worker is shutting down. RefPtr mSelfRef; // Called when the last promise was settled. RefPtr mCallback; uint32_t mPendingPromisesCount; // We don't actually care what values the promises resolve to, only whether // any of them were rejected. bool mRejected; public: NS_DECL_ISUPPORTS explicit KeepAliveHandler( const nsMainThreadPtrHandle& aKeepAliveToken, ExtendableEventCallback* aCallback) : mKeepAliveToken(aKeepAliveToken), mCallback(aCallback), mPendingPromisesCount(0), mRejected(false) { MOZ_ASSERT(mKeepAliveToken); } bool Init() { MOZ_ASSERT(IsCurrentThreadRunningWorker()); RefPtr self = this; mWorkerRef = StrongWorkerRef::Create(GetCurrentThreadWorkerPrivate(), "KeepAliveHandler", [self]() { self->MaybeCleanup(); }); if (NS_WARN_IF(!mWorkerRef)) { return false; } return true; } bool WaitOnPromise(Promise& aPromise) override { if (!mKeepAliveToken) { MOZ_ASSERT(!GetDispatchFlag()); MOZ_ASSERT(!mSelfRef, "We shouldn't be holding a self reference!"); return false; } if (!mSelfRef) { MOZ_ASSERT(!mPendingPromisesCount); mSelfRef = this; } ++mPendingPromisesCount; aPromise.AppendNativeHandler(this); return true; } void ResolvedCallback(JSContext* aCx, JS::Handle aValue) override { RemovePromise(Resolved); } void RejectedCallback(JSContext* aCx, JS::Handle aValue) override { RemovePromise(Rejected); } void MaybeDone() { MOZ_ASSERT(IsCurrentThreadRunningWorker()); MOZ_ASSERT(!GetDispatchFlag()); if (mPendingPromisesCount || !mKeepAliveToken) { return; } if (mCallback) { mCallback->FinishedWithResult(mRejected ? Rejected : Resolved); } MaybeCleanup(); } private: ~KeepAliveHandler() { MaybeCleanup(); } void MaybeCleanup() { MOZ_ASSERT(IsCurrentThreadRunningWorker()); if (!mKeepAliveToken) { return; } mWorkerRef = nullptr; mKeepAliveToken = nullptr; mSelfRef = nullptr; } class MaybeDoneRunner : public MicroTaskRunnable { public: explicit MaybeDoneRunner(KeepAliveHandler* aHandler) : mHandler(aHandler) {} virtual void Run(AutoSlowOperation& aAso) override { mHandler->MaybeDone(); } RefPtr mHandler; }; void RemovePromise(ExtendableEventResult aResult) { MOZ_ASSERT(IsCurrentThreadRunningWorker()); MOZ_DIAGNOSTIC_ASSERT(mPendingPromisesCount > 0); // Note: mSelfRef and mKeepAliveToken can be nullptr here // if MaybeCleanup() was called just before a promise // settled. This can happen, for example, if the // worker thread is being terminated for running too // long, browser shutdown, etc. mRejected |= (aResult == Rejected); --mPendingPromisesCount; if (mPendingPromisesCount || GetDispatchFlag()) { return; } CycleCollectedJSContext* cx = CycleCollectedJSContext::Get(); MOZ_ASSERT(cx); RefPtr r = new MaybeDoneRunner(this); cx->DispatchToMicroTask(r.forget()); } }; NS_IMPL_ISUPPORTS0(KeepAliveHandler) class RegistrationUpdateRunnable : public Runnable { nsMainThreadPtrHandle mRegistration; const bool mNeedTimeCheck; public: RegistrationUpdateRunnable( nsMainThreadPtrHandle& aRegistration, bool aNeedTimeCheck) : Runnable("dom::RegistrationUpdateRunnable"), mRegistration(aRegistration), mNeedTimeCheck(aNeedTimeCheck) { MOZ_DIAGNOSTIC_ASSERT(mRegistration); } NS_IMETHOD Run() override { if (mNeedTimeCheck) { mRegistration->MaybeScheduleTimeCheckAndUpdate(); } else { mRegistration->MaybeScheduleUpdate(); } return NS_OK; } }; class ExtendableEventWorkerRunnable : public WorkerRunnable { protected: nsMainThreadPtrHandle mKeepAliveToken; public: ExtendableEventWorkerRunnable(WorkerPrivate* aWorkerPrivate, KeepAliveToken* aKeepAliveToken) : WorkerRunnable(aWorkerPrivate) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aWorkerPrivate); MOZ_ASSERT(aKeepAliveToken); mKeepAliveToken = new nsMainThreadPtrHolder( "ExtendableEventWorkerRunnable::mKeepAliveToken", aKeepAliveToken); } nsresult DispatchExtendableEventOnWorkerScope( JSContext* aCx, WorkerGlobalScope* aWorkerScope, ExtendableEvent* aEvent, ExtendableEventCallback* aCallback) { MOZ_ASSERT(aWorkerScope); MOZ_ASSERT(aEvent); nsCOMPtr sgo = aWorkerScope; WidgetEvent* internalEvent = aEvent->WidgetEventPtr(); RefPtr keepAliveHandler = new KeepAliveHandler(mKeepAliveToken, aCallback); if (NS_WARN_IF(!keepAliveHandler->Init())) { return NS_ERROR_FAILURE; } // This must always be set *before* dispatching the event, otherwise // waitUntil calls will fail. aEvent->SetKeepAliveHandler(keepAliveHandler); ErrorResult result; aWorkerScope->DispatchEvent(*aEvent, result); if (NS_WARN_IF(result.Failed())) { result.SuppressException(); return NS_ERROR_FAILURE; } // [[ If e’s extend lifetime promises is empty, unset e’s extensions allowed // flag and abort these steps. ]] keepAliveHandler->MaybeDone(); // We don't block the event when getting an exception but still report the // error message. // Report exception message. Note: This will not stop the event. if (internalEvent->mFlags.mExceptionWasRaised) { result.SuppressException(); return NS_ERROR_XPC_JS_THREW_EXCEPTION; } return NS_OK; } }; class SendMessageEventRunnable final : public ExtendableEventWorkerRunnable { const ClientInfoAndState mClientInfoAndState; RefPtr mData; public: SendMessageEventRunnable(WorkerPrivate* aWorkerPrivate, KeepAliveToken* aKeepAliveToken, const ClientInfoAndState& aClientInfoAndState, RefPtr&& aData) : ExtendableEventWorkerRunnable(aWorkerPrivate, aKeepAliveToken), mClientInfoAndState(aClientInfoAndState), mData(std::move(aData)) { MOZ_ASSERT(NS_IsMainThread()); MOZ_DIAGNOSTIC_ASSERT(mData); } bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { JS::Rooted messageData(aCx); nsCOMPtr sgo = aWorkerPrivate->GlobalScope(); ErrorResult rv; mData->Read(aCx, &messageData, rv); // If deserialization fails, we will fire a messageerror event bool deserializationFailed = rv.Failed(); if (!deserializationFailed && NS_WARN_IF(rv.Failed())) { rv.SuppressException(); return true; } Sequence> ports; if (!mData->TakeTransferredPortsAsSequence(ports)) { return true; } RootedDictionary init(aCx); init.mBubbles = false; init.mCancelable = false; // On a messageerror event, we disregard ports: // https://w3c.github.io/ServiceWorker/#service-worker-postmessage if (!deserializationFailed) { init.mData = messageData; init.mPorts = std::move(ports); } init.mSource.SetValue().SetAsClient() = new Client(sgo, mClientInfoAndState); rv.SuppressException(); RefPtr target = aWorkerPrivate->GlobalScope(); RefPtr extendableEvent = ExtendableMessageEvent::Constructor( target, deserializationFailed ? u"messageerror"_ns : u"message"_ns, init); extendableEvent->SetTrusted(true); return NS_SUCCEEDED(DispatchExtendableEventOnWorkerScope( aCx, aWorkerPrivate->GlobalScope(), extendableEvent, nullptr)); } }; } // anonymous namespace nsresult ServiceWorkerPrivate::SendMessageEvent( RefPtr&& aData, const ClientInfoAndState& aClientInfoAndState) { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { return mInner->SendMessageEvent(std::move(aData), aClientInfoAndState); } nsresult rv = SpawnWorkerIfNeeded(MessageEvent); NS_ENSURE_SUCCESS(rv, rv); RefPtr token = CreateEventKeepAliveToken(); RefPtr runnable = new SendMessageEventRunnable( mWorkerPrivate, token, aClientInfoAndState, std::move(aData)); if (!runnable->Dispatch()) { return NS_ERROR_FAILURE; } return NS_OK; } namespace { // Handle functional event // 9.9.7 If the time difference in seconds calculated by the current time minus // registration's last update check time is greater than 86400, invoke Soft // Update algorithm. class ExtendableFunctionalEventWorkerRunnable : public ExtendableEventWorkerRunnable { protected: nsMainThreadPtrHandle mRegistration; public: ExtendableFunctionalEventWorkerRunnable( WorkerPrivate* aWorkerPrivate, KeepAliveToken* aKeepAliveToken, nsMainThreadPtrHandle& aRegistration) : ExtendableEventWorkerRunnable(aWorkerPrivate, aKeepAliveToken), mRegistration(aRegistration) { MOZ_DIAGNOSTIC_ASSERT(aRegistration); } void PostRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate, bool aRunResult) override { // Sub-class PreRun() or WorkerRun() methods could clear our mRegistration. if (mRegistration) { nsCOMPtr runnable = new RegistrationUpdateRunnable(mRegistration, true /* time check */); aWorkerPrivate->DispatchToMainThread(runnable.forget()); } ExtendableEventWorkerRunnable::PostRun(aCx, aWorkerPrivate, aRunResult); } }; /* * Fires 'install' event on the ServiceWorkerGlobalScope. Modifies busy count * since it fires the event. This is ok since there can't be nested * ServiceWorkers, so the parent thread -> worker thread requirement for * runnables is satisfied. */ class LifecycleEventWorkerRunnable : public ExtendableEventWorkerRunnable { nsString mEventName; RefPtr mCallback; public: LifecycleEventWorkerRunnable(WorkerPrivate* aWorkerPrivate, KeepAliveToken* aToken, const nsAString& aEventName, LifeCycleEventCallback* aCallback) : ExtendableEventWorkerRunnable(aWorkerPrivate, aToken), mEventName(aEventName), mCallback(aCallback) { MOZ_ASSERT(NS_IsMainThread()); } bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { MOZ_ASSERT(aWorkerPrivate); return DispatchLifecycleEvent(aCx, aWorkerPrivate); } nsresult Cancel() override { mCallback->SetResult(false); MOZ_ALWAYS_SUCCEEDS(mWorkerPrivate->DispatchToMainThread(mCallback)); return WorkerRunnable::Cancel(); } private: bool DispatchLifecycleEvent(JSContext* aCx, WorkerPrivate* aWorkerPrivate); }; /* * Used to handle ExtendableEvent::waitUntil() and catch abnormal worker * termination during the execution of life cycle events. It is responsible * with advancing the job queue for install/activate tasks. */ class LifeCycleEventWatcher final : public ExtendableEventCallback { RefPtr mWorkerRef; RefPtr mCallback; ~LifeCycleEventWatcher() { // XXXcatalinb: If all the promises passed to waitUntil go out of scope, // the resulting Promise.all will be cycle collected and it will drop its // native handlers (including this object). Instead of waiting for a timeout // we report the failure now. ReportResult(false); } public: NS_INLINE_DECL_REFCOUNTING(LifeCycleEventWatcher, override) explicit LifeCycleEventWatcher(LifeCycleEventCallback* aCallback) : mCallback(aCallback) { MOZ_ASSERT(IsCurrentThreadRunningWorker()); } bool Init() { WorkerPrivate* workerPrivate = GetCurrentThreadWorkerPrivate(); MOZ_ASSERT(workerPrivate); // We need to listen for worker termination in case the event handler // never completes or never resolves the waitUntil promise. There are // two possible scenarios: // 1. The keepAlive token expires and the worker is terminated, in which // case the registration/update promise will be rejected // 2. A new service worker is registered which will terminate the current // installing worker. RefPtr self = this; mWorkerRef = StrongWorkerRef::Create(workerPrivate, "LifeCycleEventWatcher", [self]() { self->ReportResult(false); }); if (NS_WARN_IF(!mWorkerRef)) { mCallback->SetResult(false); // Using DispatchToMainThreadForMessaging so that state update on // the main thread doesn't happen too soon. nsresult rv = workerPrivate->DispatchToMainThreadForMessaging(mCallback); Unused << NS_WARN_IF(NS_FAILED(rv)); return false; } return true; } void ReportResult(bool aResult) { MOZ_ASSERT(IsCurrentThreadRunningWorker()); if (!mWorkerRef) { return; } mCallback->SetResult(aResult); // Using DispatchToMainThreadForMessaging so that state update on // the main thread doesn't happen too soon. nsresult rv = mWorkerRef->Private()->DispatchToMainThreadForMessaging(mCallback); if (NS_WARN_IF(NS_FAILED(rv))) { MOZ_CRASH("Failed to dispatch life cycle event handler."); } mWorkerRef = nullptr; } void FinishedWithResult(ExtendableEventResult aResult) override { MOZ_ASSERT(IsCurrentThreadRunningWorker()); ReportResult(aResult == Resolved); // Note, all WaitUntil() rejections are reported to client consoles // by the WaitUntilHandler in ServiceWorkerEvents. This ensures that // errors in non-lifecycle events like FetchEvent and PushEvent are // reported properly. } }; bool LifecycleEventWorkerRunnable::DispatchLifecycleEvent( JSContext* aCx, WorkerPrivate* aWorkerPrivate) { aWorkerPrivate->AssertIsOnWorkerThread(); MOZ_ASSERT(aWorkerPrivate->IsServiceWorker()); RefPtr event; RefPtr target = aWorkerPrivate->GlobalScope(); if (mEventName.EqualsASCII("install") || mEventName.EqualsASCII("activate")) { ExtendableEventInit init; init.mBubbles = false; init.mCancelable = false; event = ExtendableEvent::Constructor(target, mEventName, init); } else { MOZ_CRASH("Unexpected lifecycle event"); } event->SetTrusted(true); // It is important to initialize the watcher before actually dispatching // the event in order to catch worker termination while the event handler // is still executing. This can happen with infinite loops, for example. RefPtr watcher = new LifeCycleEventWatcher(mCallback); if (!watcher->Init()) { return true; } nsresult rv = DispatchExtendableEventOnWorkerScope( aCx, aWorkerPrivate->GlobalScope(), event, watcher); // Do not fail event processing when an exception is thrown. if (NS_FAILED(rv) && rv != NS_ERROR_XPC_JS_THREW_EXCEPTION) { watcher->ReportResult(false); } return true; } } // anonymous namespace nsresult ServiceWorkerPrivate::SendLifeCycleEvent( const nsAString& aEventType, LifeCycleEventCallback* aCallback) { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { return mInner->SendLifeCycleEvent(aEventType, aCallback); } nsresult rv = SpawnWorkerIfNeeded(LifeCycleEvent); NS_ENSURE_SUCCESS(rv, rv); RefPtr token = CreateEventKeepAliveToken(); RefPtr r = new LifecycleEventWorkerRunnable( mWorkerPrivate, token, aEventType, aCallback); if (NS_WARN_IF(!r->Dispatch())) { return NS_ERROR_FAILURE; } return NS_OK; } namespace { class PushErrorReporter final : public ExtendableEventCallback { WorkerPrivate* mWorkerPrivate; nsString mMessageId; ~PushErrorReporter() = default; public: NS_INLINE_DECL_THREADSAFE_REFCOUNTING(PushErrorReporter, override) PushErrorReporter(WorkerPrivate* aWorkerPrivate, const nsAString& aMessageId) : mWorkerPrivate(aWorkerPrivate), mMessageId(aMessageId) { mWorkerPrivate->AssertIsOnWorkerThread(); } void FinishedWithResult(ExtendableEventResult aResult) override { if (aResult == Rejected) { Report(nsIPushErrorReporter::DELIVERY_UNHANDLED_REJECTION); } } void Report( uint16_t aReason = nsIPushErrorReporter::DELIVERY_INTERNAL_ERROR) { WorkerPrivate* workerPrivate = mWorkerPrivate; mWorkerPrivate->AssertIsOnWorkerThread(); if (NS_WARN_IF(aReason > nsIPushErrorReporter::DELIVERY_INTERNAL_ERROR) || mMessageId.IsEmpty()) { return; } nsCOMPtr runnable = NewRunnableMethod( "dom::PushErrorReporter::ReportOnMainThread", this, &PushErrorReporter::ReportOnMainThread, aReason); MOZ_ALWAYS_TRUE( NS_SUCCEEDED(workerPrivate->DispatchToMainThread(runnable.forget()))); } void ReportOnMainThread(uint16_t aReason) { MOZ_ASSERT(NS_IsMainThread()); nsCOMPtr reporter = do_GetService("@mozilla.org/push/Service;1"); if (reporter) { nsresult rv = reporter->ReportDeliveryError(mMessageId, aReason); Unused << NS_WARN_IF(NS_FAILED(rv)); } } }; class SendPushEventRunnable final : public ExtendableFunctionalEventWorkerRunnable { nsString mMessageId; Maybe> mData; public: SendPushEventRunnable( WorkerPrivate* aWorkerPrivate, KeepAliveToken* aKeepAliveToken, const nsAString& aMessageId, const Maybe>& aData, nsMainThreadPtrHandle aRegistration) : ExtendableFunctionalEventWorkerRunnable(aWorkerPrivate, aKeepAliveToken, aRegistration), mMessageId(aMessageId), mData(aData ? Some(aData->Clone()) : Nothing()) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aWorkerPrivate); MOZ_ASSERT(aWorkerPrivate->IsServiceWorker()); } bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { MOZ_ASSERT(aWorkerPrivate); GlobalObject globalObj(aCx, aWorkerPrivate->GlobalScope()->GetWrapper()); RefPtr errorReporter = new PushErrorReporter(aWorkerPrivate, mMessageId); PushEventInit pei; if (mData) { const nsTArray& bytes = mData.ref(); JSObject* data = Uint8Array::Create(aCx, bytes.Length(), bytes.Elements()); if (!data) { errorReporter->Report(); return false; } pei.mData.Construct().SetAsArrayBufferView().Init(data); } pei.mBubbles = false; pei.mCancelable = false; ErrorResult result; RefPtr event = PushEvent::Constructor(globalObj, u"push"_ns, pei, result); if (NS_WARN_IF(result.Failed())) { result.SuppressException(); errorReporter->Report(); return false; } event->SetTrusted(true); nsresult rv = DispatchExtendableEventOnWorkerScope( aCx, aWorkerPrivate->GlobalScope(), event, errorReporter); if (NS_FAILED(rv)) { // We don't cancel WorkerPrivate when catching an excetpion. errorReporter->Report(nsIPushErrorReporter::DELIVERY_UNCAUGHT_EXCEPTION); } return true; } }; class SendPushSubscriptionChangeEventRunnable final : public ExtendableEventWorkerRunnable { public: explicit SendPushSubscriptionChangeEventRunnable( WorkerPrivate* aWorkerPrivate, KeepAliveToken* aKeepAliveToken) : ExtendableEventWorkerRunnable(aWorkerPrivate, aKeepAliveToken) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aWorkerPrivate); MOZ_ASSERT(aWorkerPrivate->IsServiceWorker()); } bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { MOZ_ASSERT(aWorkerPrivate); RefPtr target = aWorkerPrivate->GlobalScope(); ExtendableEventInit init; init.mBubbles = false; init.mCancelable = false; RefPtr event = ExtendableEvent::Constructor( target, u"pushsubscriptionchange"_ns, init); event->SetTrusted(true); DispatchExtendableEventOnWorkerScope(aCx, aWorkerPrivate->GlobalScope(), event, nullptr); return true; } }; } // anonymous namespace nsresult ServiceWorkerPrivate::SendPushEvent( const nsAString& aMessageId, const Maybe>& aData, ServiceWorkerRegistrationInfo* aRegistration) { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { return mInner->SendPushEvent(aRegistration, aMessageId, aData); } nsresult rv = SpawnWorkerIfNeeded(PushEvent); NS_ENSURE_SUCCESS(rv, rv); RefPtr token = CreateEventKeepAliveToken(); nsMainThreadPtrHandle regInfo( new nsMainThreadPtrHolder( "ServiceWorkerRegistrationInfoProxy", aRegistration, false)); RefPtr r = new SendPushEventRunnable( mWorkerPrivate, token, aMessageId, aData, regInfo); if (mInfo->State() == ServiceWorkerState::Activating) { mPendingFunctionalEvents.AppendElement(r.forget()); return NS_OK; } MOZ_ASSERT(mInfo->State() == ServiceWorkerState::Activated); if (NS_WARN_IF(!r->Dispatch())) { return NS_ERROR_FAILURE; } return NS_OK; } nsresult ServiceWorkerPrivate::SendPushSubscriptionChangeEvent() { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { return mInner->SendPushSubscriptionChangeEvent(); } nsresult rv = SpawnWorkerIfNeeded(PushSubscriptionChangeEvent); NS_ENSURE_SUCCESS(rv, rv); RefPtr token = CreateEventKeepAliveToken(); RefPtr r = new SendPushSubscriptionChangeEventRunnable(mWorkerPrivate, token); if (NS_WARN_IF(!r->Dispatch())) { return NS_ERROR_FAILURE; } return NS_OK; } namespace { class AllowWindowInteractionHandler final : public ExtendableEventCallback, public nsITimerCallback, public nsINamed { nsCOMPtr mTimer; RefPtr mWorkerRef; ~AllowWindowInteractionHandler() { // We must either fail to initialize or call ClearWindowAllowed. MOZ_DIAGNOSTIC_ASSERT(!mTimer); MOZ_DIAGNOSTIC_ASSERT(!mWorkerRef); } void ClearWindowAllowed(WorkerPrivate* aWorkerPrivate) { MOZ_ASSERT(aWorkerPrivate); aWorkerPrivate->AssertIsOnWorkerThread(); if (!mTimer) { return; } // XXXcatalinb: This *might* be executed after the global was unrooted, in // which case GlobalScope() will return null. Making the check here just // to be safe. WorkerGlobalScope* globalScope = aWorkerPrivate->GlobalScope(); if (!globalScope) { return; } globalScope->ConsumeWindowInteraction(); mTimer->Cancel(); mTimer = nullptr; mWorkerRef = nullptr; } void StartClearWindowTimer(WorkerPrivate* aWorkerPrivate) { MOZ_ASSERT(aWorkerPrivate); aWorkerPrivate->AssertIsOnWorkerThread(); MOZ_ASSERT(!mTimer); nsresult rv; nsCOMPtr timer = NS_NewTimer(aWorkerPrivate->ControlEventTarget()); if (NS_WARN_IF(!timer)) { return; } MOZ_ASSERT(!mWorkerRef); RefPtr self = this; mWorkerRef = StrongWorkerRef::Create( aWorkerPrivate, "AllowWindowInteractionHandler", [self]() { // We could try to hold the worker alive until the timer fires, but // other APIs are not likely to work in this partially shutdown state. // We might as well let the worker thread exit. self->ClearWindowAllowed(self->mWorkerRef->Private()); }); if (!mWorkerRef) { return; } aWorkerPrivate->GlobalScope()->AllowWindowInteraction(); timer.swap(mTimer); // We swap first and then initialize the timer so that even if initializing // fails, we still clean the busy count and interaction count correctly. // The timer can't be initialized before modifying the busy count since the // timer thread could run and call the timeout but the worker may // already be terminating and modifying the busy count could fail. rv = mTimer->InitWithCallback(this, gDOMDisableOpenClickDelay, nsITimer::TYPE_ONE_SHOT); if (NS_WARN_IF(NS_FAILED(rv))) { ClearWindowAllowed(aWorkerPrivate); return; } } // nsITimerCallback virtual methods NS_IMETHOD Notify(nsITimer* aTimer) override { MOZ_DIAGNOSTIC_ASSERT(mTimer == aTimer); WorkerPrivate* workerPrivate = GetCurrentThreadWorkerPrivate(); ClearWindowAllowed(workerPrivate); return NS_OK; } // nsINamed virtual methods NS_IMETHOD GetName(nsACString& aName) override { aName.AssignLiteral("AllowWindowInteractionHandler"); return NS_OK; } public: NS_DECL_THREADSAFE_ISUPPORTS explicit AllowWindowInteractionHandler(WorkerPrivate* aWorkerPrivate) { StartClearWindowTimer(aWorkerPrivate); } void FinishedWithResult(ExtendableEventResult /* aResult */) override { WorkerPrivate* workerPrivate = GetCurrentThreadWorkerPrivate(); ClearWindowAllowed(workerPrivate); } }; NS_IMPL_ISUPPORTS(AllowWindowInteractionHandler, nsITimerCallback, nsINamed) class SendNotificationEventRunnable final : public ExtendableEventWorkerRunnable { const nsString mEventName; const nsString mID; const nsString mTitle; const nsString mDir; const nsString mLang; const nsString mBody; const nsString mTag; const nsString mIcon; const nsString mData; const nsString mBehavior; const nsString mScope; public: SendNotificationEventRunnable(WorkerPrivate* aWorkerPrivate, KeepAliveToken* aKeepAliveToken, const nsAString& aEventName, const nsAString& aID, const nsAString& aTitle, const nsAString& aDir, const nsAString& aLang, const nsAString& aBody, const nsAString& aTag, const nsAString& aIcon, const nsAString& aData, const nsAString& aBehavior, const nsAString& aScope) : ExtendableEventWorkerRunnable(aWorkerPrivate, aKeepAliveToken), mEventName(aEventName), mID(aID), mTitle(aTitle), mDir(aDir), mLang(aLang), mBody(aBody), mTag(aTag), mIcon(aIcon), mData(aData), mBehavior(aBehavior), mScope(aScope) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aWorkerPrivate); MOZ_ASSERT(aWorkerPrivate->IsServiceWorker()); } bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { MOZ_ASSERT(aWorkerPrivate); RefPtr target = do_QueryObject(aWorkerPrivate->GlobalScope()); ErrorResult result; RefPtr notification = Notification::ConstructFromFields( aWorkerPrivate->GlobalScope(), mID, mTitle, mDir, mLang, mBody, mTag, mIcon, mData, mScope, result); if (NS_WARN_IF(result.Failed())) { return false; } NotificationEventInit nei; nei.mNotification = notification; nei.mBubbles = false; nei.mCancelable = false; RefPtr event = NotificationEvent::Constructor(target, mEventName, nei); event->SetTrusted(true); RefPtr allowWindowInteraction; if (mEventName.EqualsLiteral(NOTIFICATION_CLICK_EVENT_NAME)) { allowWindowInteraction = new AllowWindowInteractionHandler(aWorkerPrivate); } nsresult rv = DispatchExtendableEventOnWorkerScope( aCx, aWorkerPrivate->GlobalScope(), event, allowWindowInteraction); // Don't reject when catching an exception if (NS_FAILED(rv) && rv != NS_ERROR_XPC_JS_THREW_EXCEPTION && allowWindowInteraction) { allowWindowInteraction->FinishedWithResult(Rejected); } return true; } }; } // namespace nsresult ServiceWorkerPrivate::SendNotificationEvent( const nsAString& aEventName, const nsAString& aID, const nsAString& aTitle, const nsAString& aDir, const nsAString& aLang, const nsAString& aBody, const nsAString& aTag, const nsAString& aIcon, const nsAString& aData, const nsAString& aBehavior, const nsAString& aScope) { MOZ_ASSERT(NS_IsMainThread()); WakeUpReason why; if (aEventName.EqualsLiteral(NOTIFICATION_CLICK_EVENT_NAME)) { why = NotificationClickEvent; gDOMDisableOpenClickDelay = Preferences::GetInt("dom.serviceWorkers.disable_open_click_delay"); } else if (aEventName.EqualsLiteral(NOTIFICATION_CLOSE_EVENT_NAME)) { why = NotificationCloseEvent; } else { MOZ_ASSERT_UNREACHABLE("Invalid notification event name"); return NS_ERROR_FAILURE; } if (mInner) { return mInner->SendNotificationEvent(aEventName, aID, aTitle, aDir, aLang, aBody, aTag, aIcon, aData, aBehavior, aScope, gDOMDisableOpenClickDelay); } nsresult rv = SpawnWorkerIfNeeded(why); NS_ENSURE_SUCCESS(rv, rv); RefPtr token = CreateEventKeepAliveToken(); RefPtr r = new SendNotificationEventRunnable( mWorkerPrivate, token, aEventName, aID, aTitle, aDir, aLang, aBody, aTag, aIcon, aData, aBehavior, aScope); if (NS_WARN_IF(!r->Dispatch())) { return NS_ERROR_FAILURE; } return NS_OK; } namespace { // Inheriting ExtendableEventWorkerRunnable so that the worker is not terminated // while handling the fetch event, though that's very unlikely. class FetchEventRunnable : public ExtendableFunctionalEventWorkerRunnable, public nsIHttpHeaderVisitor { nsMainThreadPtrHandle mInterceptedChannel; const nsCString mScriptSpec; nsTArray mHeaderNames; nsTArray mHeaderValues; nsCString mSpec; nsCString mFragment; nsCString mMethod; nsString mClientId; nsString mResultingClientId; bool mMarkLaunchServiceWorkerEnd; RequestCache mCacheMode; RequestMode mRequestMode; RequestRedirect mRequestRedirect; RequestCredentials mRequestCredentials; nsContentPolicyType mContentPolicyType; nsCOMPtr mUploadStream; int64_t mUploadStreamContentLength; nsString mReferrer; ReferrerPolicy mReferrerPolicy; nsString mIntegrity; const bool mIsNonSubresourceRequest; public: FetchEventRunnable( WorkerPrivate* aWorkerPrivate, KeepAliveToken* aKeepAliveToken, nsMainThreadPtrHandle& aChannel, // CSP checks might require the worker script spec // later on. const nsACString& aScriptSpec, nsMainThreadPtrHandle& aRegistration, const nsAString& aClientId, const nsAString& aResultingClientId, bool aMarkLaunchServiceWorkerEnd, bool aIsNonSubresourceRequest) : ExtendableFunctionalEventWorkerRunnable(aWorkerPrivate, aKeepAliveToken, aRegistration), mInterceptedChannel(aChannel), mScriptSpec(aScriptSpec), mClientId(aClientId), mResultingClientId(aResultingClientId), mMarkLaunchServiceWorkerEnd(aMarkLaunchServiceWorkerEnd), mCacheMode(RequestCache::Default), mRequestMode(RequestMode::No_cors), mRequestRedirect(RequestRedirect::Follow) // By default we set it to same-origin since normal HTTP fetches always // send credentials to same-origin websites unless explicitly forbidden. , mRequestCredentials(RequestCredentials::Same_origin), mContentPolicyType(nsIContentPolicy::TYPE_INVALID), mUploadStreamContentLength(-1), mReferrer(NS_LITERAL_STRING_FROM_CSTRING(kFETCH_CLIENT_REFERRER_STR)), mReferrerPolicy(ReferrerPolicy::_empty), mIsNonSubresourceRequest(aIsNonSubresourceRequest) { MOZ_ASSERT(aWorkerPrivate); } NS_DECL_ISUPPORTS_INHERITED NS_IMETHOD VisitHeader(const nsACString& aHeader, const nsACString& aValue) override { mHeaderNames.AppendElement(aHeader); mHeaderValues.AppendElement(aValue); return NS_OK; } nsresult Init() { MOZ_ASSERT(NS_IsMainThread()); nsCOMPtr channel; nsresult rv = mInterceptedChannel->GetChannel(getter_AddRefs(channel)); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr uri; rv = mInterceptedChannel->GetSecureUpgradedChannelURI(getter_AddRefs(uri)); NS_ENSURE_SUCCESS(rv, rv); // Normally we rely on the Request constructor to strip the fragment, but // when creating the FetchEvent we bypass the constructor. So strip the // fragment manually here instead. We can't do it later when we create // the Request because that code executes off the main thread. nsCOMPtr uriNoFragment; rv = NS_GetURIWithoutRef(uri, getter_AddRefs(uriNoFragment)); NS_ENSURE_SUCCESS(rv, rv); rv = uriNoFragment->GetSpec(mSpec); NS_ENSURE_SUCCESS(rv, rv); rv = uri->GetRef(mFragment); NS_ENSURE_SUCCESS(rv, rv); uint32_t loadFlags; rv = channel->GetLoadFlags(&loadFlags); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr loadInfo = channel->LoadInfo(); mContentPolicyType = loadInfo->InternalContentPolicyType(); nsCOMPtr httpChannel = do_QueryInterface(channel); MOZ_ASSERT(httpChannel, "How come we don't have an HTTP channel?"); mReferrerPolicy = ReferrerPolicy::_empty; mReferrer.Truncate(); nsCOMPtr referrerInfo = httpChannel->GetReferrerInfo(); if (referrerInfo) { mReferrerPolicy = referrerInfo->ReferrerPolicy(); Unused << referrerInfo->GetComputedReferrerSpec(mReferrer); } rv = httpChannel->GetRequestMethod(mMethod); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr internalChannel = do_QueryInterface(httpChannel); NS_ENSURE_TRUE(internalChannel, NS_ERROR_NOT_AVAILABLE); mRequestMode = InternalRequest::MapChannelToRequestMode(channel); // This is safe due to static_asserts in ServiceWorkerManager.cpp. uint32_t redirectMode; rv = internalChannel->GetRedirectMode(&redirectMode); MOZ_ASSERT(NS_SUCCEEDED(rv)); mRequestRedirect = static_cast(redirectMode); // This is safe due to static_asserts in ServiceWorkerManager.cpp. uint32_t cacheMode; rv = internalChannel->GetFetchCacheMode(&cacheMode); MOZ_ASSERT(NS_SUCCEEDED(rv)); mCacheMode = static_cast(cacheMode); rv = internalChannel->GetIntegrityMetadata(mIntegrity); MOZ_ASSERT(NS_SUCCEEDED(rv)); mRequestCredentials = InternalRequest::MapChannelToRequestCredentials(channel); rv = httpChannel->VisitNonDefaultRequestHeaders(this); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr uploadChannel = do_QueryInterface(httpChannel); if (uploadChannel) { MOZ_ASSERT(!mUploadStream); nsCOMPtr uploadStream; rv = uploadChannel->CloneUploadStream(&mUploadStreamContentLength, getter_AddRefs(uploadStream)); NS_ENSURE_SUCCESS(rv, rv); mUploadStream = uploadStream; } return NS_OK; } bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { MOZ_ASSERT(aWorkerPrivate); if (mMarkLaunchServiceWorkerEnd) { mInterceptedChannel->SetLaunchServiceWorkerEnd(TimeStamp::Now()); // A probe to measure sw launch time for telemetry. TimeStamp launchStartTime = TimeStamp(); mInterceptedChannel->GetLaunchServiceWorkerStart(&launchStartTime); TimeStamp launchEndTime = TimeStamp(); mInterceptedChannel->GetLaunchServiceWorkerEnd(&launchEndTime); Telemetry::AccumulateTimeDelta(Telemetry::SERVICE_WORKER_LAUNCH_TIME, launchStartTime, launchEndTime); } mInterceptedChannel->SetDispatchFetchEventEnd(TimeStamp::Now()); return DispatchFetchEvent(aCx, aWorkerPrivate); } nsresult Cancel() override { nsCOMPtr runnable = new ResumeRequest(mInterceptedChannel); if (NS_FAILED(mWorkerPrivate->DispatchToMainThread(runnable))) { NS_WARNING("Failed to resume channel on FetchEventRunnable::Cancel()!\n"); } WorkerRunnable::Cancel(); return NS_OK; } private: ~FetchEventRunnable() = default; class ResumeRequest final : public Runnable { nsMainThreadPtrHandle mChannel; public: explicit ResumeRequest( nsMainThreadPtrHandle& aChannel) : Runnable("dom::FetchEventRunnable::ResumeRequest"), mChannel(aChannel) { mChannel->SetFinishResponseStart(TimeStamp::Now()); } NS_IMETHOD Run() override { MOZ_ASSERT(NS_IsMainThread()); TimeStamp timeStamp = TimeStamp::Now(); mChannel->SetHandleFetchEventEnd(timeStamp); mChannel->SetChannelResetEnd(timeStamp); mChannel->SaveTimeStamps(); nsresult rv = mChannel->ResetInterception(); if (NS_FAILED(rv)) { NS_WARNING("Failed to resume intercepted network request"); mChannel->CancelInterception(rv); } return rv; } }; bool DispatchFetchEvent(JSContext* aCx, WorkerPrivate* aWorkerPrivate) { MOZ_ASSERT(aCx); MOZ_ASSERT(aWorkerPrivate); MOZ_ASSERT(aWorkerPrivate->IsServiceWorker()); GlobalObject globalObj(aCx, aWorkerPrivate->GlobalScope()->GetWrapper()); RefPtr internalHeaders = new InternalHeaders(HeadersGuardEnum::Request); MOZ_ASSERT(mHeaderNames.Length() == mHeaderValues.Length()); for (uint32_t i = 0; i < mHeaderNames.Length(); i++) { ErrorResult result; internalHeaders->Set(mHeaderNames[i], mHeaderValues[i], result); if (NS_WARN_IF(result.Failed())) { result.SuppressException(); return false; } } ErrorResult result; internalHeaders->SetGuard(HeadersGuardEnum::Immutable, result); if (NS_WARN_IF(result.Failed())) { result.SuppressException(); return false; } auto internalReq = MakeSafeRefPtr( mSpec, mFragment, mMethod, internalHeaders.forget(), mCacheMode, mRequestMode, mRequestRedirect, mRequestCredentials, mReferrer, mReferrerPolicy, mContentPolicyType, mIntegrity); internalReq->SetBody(mUploadStream, mUploadStreamContentLength); nsCOMPtr channel; nsresult rv = mInterceptedChannel->GetChannel(getter_AddRefs(channel)); NS_ENSURE_SUCCESS(rv, false); nsCOMPtr cic = do_QueryInterface(channel); if (cic && !cic->PreferredAlternativeDataTypes().IsEmpty()) { // TODO: the internal request probably needs all the preferred types. nsAutoCString alternativeDataType; alternativeDataType.Assign( cic->PreferredAlternativeDataTypes()[0].type()); internalReq->SetPreferredAlternativeDataType(alternativeDataType); } nsCOMPtr global = do_QueryInterface(globalObj.GetAsSupports()); if (NS_WARN_IF(!global)) { return false; } // TODO This request object should be created with a AbortSignal object // which should be aborted if the loading is aborted. See bug 1394102. RefPtr request = new Request(global, internalReq.clonePtr(), nullptr); MOZ_ASSERT_IF(internalReq->IsNavigationRequest(), request->Redirect() == RequestRedirect::Manual); RootedDictionary init(aCx); init.mRequest = request; init.mBubbles = false; init.mCancelable = true; // Only expose the FetchEvent.clientId on subresource requests for now. // Once we implement .targetClientId we can then start exposing .clientId // on non-subresource requests as well. See bug 1487534. if (!mClientId.IsEmpty() && !internalReq->IsNavigationRequest()) { init.mClientId = mClientId; } /* * https://w3c.github.io/ServiceWorker/#on-fetch-request-algorithm * * "If request is a non-subresource request and request’s * destination is not "report", initialize e’s resultingClientId attribute * to reservedClient’s [resultingClient's] id, and to the empty string * otherwise." (Step 18.8) */ if (!mResultingClientId.IsEmpty() && mIsNonSubresourceRequest && internalReq->Destination() != RequestDestination::Report) { init.mResultingClientId = mResultingClientId; } RefPtr event = FetchEvent::Constructor(globalObj, u"fetch"_ns, init); event->PostInit(mInterceptedChannel, mRegistration, mScriptSpec); event->SetTrusted(true); mInterceptedChannel->SetHandleFetchEventStart(TimeStamp::Now()); nsresult rv2 = DispatchExtendableEventOnWorkerScope( aCx, aWorkerPrivate->GlobalScope(), event, nullptr); if ((NS_WARN_IF(NS_FAILED(rv2)) && rv2 != NS_ERROR_XPC_JS_THREW_EXCEPTION) || !event->WaitToRespond()) { nsCOMPtr runnable; MOZ_ASSERT(!aWorkerPrivate->UsesSystemPrincipal(), "We don't support system-principal serviceworkers"); if (event->DefaultPrevented(CallerType::NonSystem)) { runnable = new CancelChannelRunnable(mInterceptedChannel, mRegistration, NS_ERROR_INTERCEPTION_FAILED); } else { runnable = new ResumeRequest(mInterceptedChannel); } MOZ_ALWAYS_SUCCEEDS( mWorkerPrivate->DispatchToMainThread(runnable.forget())); } return true; } }; NS_IMPL_ISUPPORTS_INHERITED(FetchEventRunnable, WorkerRunnable, nsIHttpHeaderVisitor) } // anonymous namespace nsresult ServiceWorkerPrivate::SendFetchEvent( nsIInterceptedChannel* aChannel, nsILoadGroup* aLoadGroup, const nsAString& aClientId, const nsAString& aResultingClientId) { MOZ_ASSERT(NS_IsMainThread()); RefPtr swm = ServiceWorkerManager::GetInstance(); if (NS_WARN_IF(!mInfo || !swm)) { return NS_ERROR_FAILURE; } nsCOMPtr channel; nsresult rv = aChannel->GetChannel(getter_AddRefs(channel)); NS_ENSURE_SUCCESS(rv, rv); bool isNonSubresourceRequest = nsContentUtils::IsNonSubresourceRequest(channel); RefPtr registration; if (isNonSubresourceRequest) { registration = swm->GetRegistration(mInfo->Principal(), mInfo->Scope()); } else { nsCOMPtr loadInfo = channel->LoadInfo(); // We'll check for a null registration below rather than an error code here. Unused << swm->GetClientRegistration(loadInfo->GetClientInfo().ref(), getter_AddRefs(registration)); } // Its possible the registration is removed between starting the interception // and actually dispatching the fetch event. In these cases we simply // want to restart the original network request. Since this is a normal // condition we handle the reset here instead of returning an error which // would in turn trigger a console report. if (!registration) { nsresult rv = aChannel->ResetInterception(); if (NS_FAILED(rv)) { NS_WARNING("Failed to resume intercepted network request"); aChannel->CancelInterception(rv); } return NS_OK; } // Handle Fetch algorithm - step 16. If the service worker didn't register // any fetch event handlers, then abort the interception and maybe trigger // the soft update algorithm. if (!mInfo->HandlesFetch()) { nsresult rv = aChannel->ResetInterception(); if (NS_FAILED(rv)) { NS_WARNING("Failed to resume intercepted network request"); aChannel->CancelInterception(rv); } // Trigger soft updates if necessary. registration->MaybeScheduleTimeCheckAndUpdate(); return NS_OK; } if (mInner) { return mInner->SendFetchEvent(std::move(registration), aChannel, aClientId, aResultingClientId); } aChannel->SetLaunchServiceWorkerStart(TimeStamp::Now()); aChannel->SetDispatchFetchEventStart(TimeStamp::Now()); bool newWorkerCreated = false; rv = SpawnWorkerIfNeeded(FetchEvent, &newWorkerCreated, aLoadGroup); NS_ENSURE_SUCCESS(rv, rv); if (!newWorkerCreated) { aChannel->SetLaunchServiceWorkerEnd(TimeStamp::Now()); } nsMainThreadPtrHandle handle( new nsMainThreadPtrHolder("nsIInterceptedChannel", aChannel, false)); nsMainThreadPtrHandle regInfo( new nsMainThreadPtrHolder( "ServiceWorkerRegistrationInfoProxy", registration, false)); RefPtr token = CreateEventKeepAliveToken(); RefPtr r = new FetchEventRunnable( mWorkerPrivate, token, handle, mInfo->ScriptSpec(), regInfo, aClientId, aResultingClientId, newWorkerCreated, isNonSubresourceRequest); rv = r->Init(); if (NS_WARN_IF(NS_FAILED(rv))) { return rv; } if (mInfo->State() == ServiceWorkerState::Activating) { mPendingFunctionalEvents.AppendElement(r.forget()); return NS_OK; } MOZ_ASSERT(mInfo->State() == ServiceWorkerState::Activated); if (NS_WARN_IF(!r->Dispatch())) { return NS_ERROR_FAILURE; } return NS_OK; } nsresult ServiceWorkerPrivate::SpawnWorkerIfNeeded(WakeUpReason aWhy, bool* aNewWorkerCreated, nsILoadGroup* aLoadGroup) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(!mInner); // Defaults to no new worker created, but if there is one, we'll set the value // to true at the end of this function. if (aNewWorkerCreated) { *aNewWorkerCreated = false; } // If the worker started shutting down on itself we may have a stale // reference here. Invoke our termination code to clean it out. if (mWorkerPrivate && mWorkerPrivate->ParentStatusProtected() > Running) { TerminateWorker(); MOZ_DIAGNOSTIC_ASSERT(!mWorkerPrivate); } if (mWorkerPrivate) { // If we have a load group here then use it to update the service worker // load group. This was added when we needed the load group's tab child // to pass some security checks. Those security checks are gone, though, // and we could possibly remove this now. For now we just do it // opportunistically. When the service worker is running in a separate // process from the client that initiated the intercepted channel, then // the load group will be nullptr. UpdateOverrideLoadGroup ignores nullptr // load groups. mWorkerPrivate->UpdateOverridenLoadGroup(aLoadGroup); RenewKeepAliveToken(aWhy); return NS_OK; } // Sanity check: mSupportsArray should be empty if we're about to // spin up a new worker. MOZ_ASSERT(mSupportsArray.IsEmpty()); if (NS_WARN_IF(!mInfo)) { NS_WARNING("Trying to wake up a dead service worker."); return NS_ERROR_FAILURE; } RefPtr swm = ServiceWorkerManager::GetInstance(); NS_ENSURE_TRUE(swm, NS_ERROR_FAILURE); RefPtr reg = swm->GetRegistration(mInfo->Principal(), mInfo->Scope()); NS_ENSURE_TRUE(reg, NS_ERROR_FAILURE); // TODO(catalinb): Bug 1192138 - Add telemetry for service worker wake-ups. // Ensure that the IndexedDatabaseManager is initialized Unused << NS_WARN_IF(!IndexedDatabaseManager::GetOrCreate()); WorkerLoadInfo info; nsresult rv = NS_NewURI(getter_AddRefs(info.mBaseURI), mInfo->ScriptSpec()); if (NS_WARN_IF(NS_FAILED(rv))) { return rv; } info.mResolvedScriptURI = info.mBaseURI; MOZ_ASSERT(!mInfo->CacheName().IsEmpty()); info.mServiceWorkerCacheName = mInfo->CacheName(); info.mServiceWorkerDescriptor.emplace(mInfo->Descriptor()); info.mServiceWorkerRegistrationDescriptor.emplace(reg->Descriptor()); info.mLoadGroup = aLoadGroup; // If we are loading a script for a ServiceWorker then we must not // try to intercept it. If the interception matches the current // ServiceWorker's scope then we could deadlock the load. info.mLoadFlags = mInfo->GetImportsLoadFlags() | nsIChannel::LOAD_BYPASS_SERVICE_WORKER; rv = info.mBaseURI->GetHost(info.mDomain); if (NS_WARN_IF(NS_FAILED(rv))) { return rv; } info.mPrincipal = mInfo->Principal(); info.mLoadingPrincipal = info.mPrincipal; // PartitionedPrincipal for ServiceWorkers is equal to mPrincipal because, at // the moment, ServiceWorkers are not exposed in partitioned contexts. info.mPartitionedPrincipal = info.mPrincipal; info.mCookieJarSettings = mozilla::net::CookieJarSettings::Create(); MOZ_ASSERT(info.mCookieJarSettings); net::CookieJarSettings::Cast(info.mCookieJarSettings) ->SetPartitionKey(info.mResolvedScriptURI); info.mStorageAccess = StorageAllowedForServiceWorker(info.mPrincipal, info.mCookieJarSettings); info.mOriginAttributes = mInfo->GetOriginAttributes(); // Verify that we don't have any CSP on pristine client. #ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED nsCOMPtr csp; if (info.mChannel) { nsCOMPtr loadinfo = info.mChannel->LoadInfo(); csp = loadinfo->GetCsp(); } MOZ_DIAGNOSTIC_ASSERT(!csp); #endif // Default CSP permissions for now. These will be overrided if necessary // based on the script CSP headers during load in ScriptLoader. info.mEvalAllowed = true; info.mReportCSPViolations = false; WorkerPrivate::OverrideLoadInfoLoadGroup(info, info.mPrincipal); rv = info.SetPrincipalsAndCSPOnMainThread( info.mPrincipal, info.mPartitionedPrincipal, info.mLoadGroup, nullptr); if (NS_WARN_IF(NS_FAILED(rv))) { return rv; } info.mAgentClusterId = reg->AgentClusterId(); AutoJSAPI jsapi; jsapi.Init(); ErrorResult error; NS_ConvertUTF8toUTF16 scriptSpec(mInfo->ScriptSpec()); mWorkerPrivate = WorkerPrivate::Constructor(jsapi.cx(), scriptSpec, false, WorkerTypeService, VoidString(), ""_ns, &info, error); if (NS_WARN_IF(error.Failed())) { return error.StealNSResult(); } RenewKeepAliveToken(aWhy); if (aNewWorkerCreated) { *aNewWorkerCreated = true; } return NS_OK; } bool ServiceWorkerPrivate::MaybeStoreISupports(nsISupports* aSupports) { MOZ_ASSERT(NS_IsMainThread()); if (!mWorkerPrivate) { MOZ_DIAGNOSTIC_ASSERT(mSupportsArray.IsEmpty()); return false; } MOZ_ASSERT(!mSupportsArray.Contains(aSupports)); mSupportsArray.AppendElement(aSupports); return true; } void ServiceWorkerPrivate::RemoveISupports(nsISupports* aSupports) { MOZ_ASSERT(NS_IsMainThread()); mSupportsArray.RemoveElement(aSupports); } void ServiceWorkerPrivate::TerminateWorker() { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { return mInner->TerminateWorker(); } mIdleWorkerTimer->Cancel(); mIdleKeepAliveToken = nullptr; if (mWorkerPrivate) { if (StaticPrefs::dom_serviceWorkers_testing_enabled()) { nsCOMPtr os = services::GetObserverService(); if (os) { os->NotifyObservers(nullptr, "service-worker-shutdown", nullptr); } } Unused << NS_WARN_IF(!mWorkerPrivate->Cancel()); RefPtr workerPrivate = std::move(mWorkerPrivate); mozilla::Unused << workerPrivate; mSupportsArray.Clear(); // Any pending events are never going to fire on this worker. Cancel // them so that intercepted channels can be reset and other resources // cleaned up. nsTArray> pendingEvents = std::move(mPendingFunctionalEvents); for (uint32_t i = 0; i < pendingEvents.Length(); ++i) { pendingEvents[i]->Cancel(); } } } void ServiceWorkerPrivate::NoteDeadServiceWorkerInfo() { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { mInner->NoteDeadOuter(); mInner = nullptr; } else { TerminateWorker(); } mInfo = nullptr; } namespace { class UpdateStateControlRunnable final : public MainThreadWorkerControlRunnable { const ServiceWorkerState mState; bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) override { MOZ_DIAGNOSTIC_ASSERT(aWorkerPrivate); aWorkerPrivate->UpdateServiceWorkerState(mState); return true; } public: UpdateStateControlRunnable(WorkerPrivate* aWorkerPrivate, ServiceWorkerState aState) : MainThreadWorkerControlRunnable(aWorkerPrivate), mState(aState) {} }; } // anonymous namespace void ServiceWorkerPrivate::UpdateState(ServiceWorkerState aState) { MOZ_ASSERT(NS_IsMainThread()); if (mInner) { return mInner->UpdateState(aState); } if (!mWorkerPrivate) { MOZ_DIAGNOSTIC_ASSERT(mPendingFunctionalEvents.IsEmpty()); return; } RefPtr r = new UpdateStateControlRunnable(mWorkerPrivate, aState); Unused << r->Dispatch(); if (aState != ServiceWorkerState::Activated) { return; } nsTArray> pendingEvents = std::move(mPendingFunctionalEvents); for (uint32_t i = 0; i < pendingEvents.Length(); ++i) { RefPtr r = std::move(pendingEvents[i]); if (NS_WARN_IF(!r->Dispatch())) { NS_WARNING("Failed to dispatch pending functional event!"); } } } nsresult ServiceWorkerPrivate::GetDebugger(nsIWorkerDebugger** aResult) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aResult); if (mInner) { *aResult = nullptr; return NS_ERROR_NOT_IMPLEMENTED; } if (!mDebuggerCount) { return NS_OK; } MOZ_ASSERT(mWorkerPrivate); nsCOMPtr debugger = mWorkerPrivate->Debugger(); debugger.forget(aResult); return NS_OK; } nsresult ServiceWorkerPrivate::AttachDebugger() { MOZ_ASSERT(NS_IsMainThread()); // When the first debugger attaches to a worker, we spawn a worker if needed, // and cancel the idle timeout. The idle timeout should not be reset until // the last debugger detached from the worker. if (!mDebuggerCount) { nsresult rv = mInner ? mInner->SpawnWorkerIfNeeded() : SpawnWorkerIfNeeded(AttachEvent); NS_ENSURE_SUCCESS(rv, rv); /** * Under parent-intercept mode (i.e. non-null `mInner`), renewing the idle * KeepAliveToken for spawning workers happens asynchronously, rather than * synchronously without parent-intercept (see * `ServiceWorkerPrivate::SpawnWorkerIfNeeded`). The asynchronous renewal is * because the actual spawning of workers under parent-intercept occurs in a * content process, so we will only renew once notified that the worker has * been successfully created * (see `ServiceWorkerPrivateImpl::CreationSucceeded`). * * This means that the DevTools way of starting up a worker by calling * `AttachDebugger` immediately followed by `DetachDebugger` will spawn and * immediately terminate a worker (because `mTokenCount` is possibly 0 * due to the idle KeepAliveToken being created asynchronously). So, just * renew the KeepAliveToken right now. */ if (mInner) { RenewKeepAliveToken(AttachEvent); } mIdleWorkerTimer->Cancel(); } ++mDebuggerCount; return NS_OK; } nsresult ServiceWorkerPrivate::DetachDebugger() { MOZ_ASSERT(NS_IsMainThread()); if (!mDebuggerCount) { return NS_ERROR_UNEXPECTED; } --mDebuggerCount; // When the last debugger detaches from a worker, we either reset the idle // timeout, or terminate the worker if there are no more active tokens. if (!mDebuggerCount) { if (mTokenCount) { ResetIdleTimeout(); } else { TerminateWorker(); } } return NS_OK; } bool ServiceWorkerPrivate::IsIdle() const { MOZ_ASSERT(NS_IsMainThread()); return mTokenCount == 0 || (mTokenCount == 1 && mIdleKeepAliveToken); } RefPtr ServiceWorkerPrivate::GetIdlePromise() { #ifdef DEBUG MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(!IsIdle()); MOZ_ASSERT(!mIdlePromiseObtained, "Idle promise may only be obtained once!"); mIdlePromiseObtained = true; #endif return mIdlePromiseHolder.Ensure(__func__); } namespace { class ServiceWorkerPrivateTimerCallback final : public nsITimerCallback, public nsINamed { public: typedef void (ServiceWorkerPrivate::*Method)(nsITimer*); ServiceWorkerPrivateTimerCallback(ServiceWorkerPrivate* aServiceWorkerPrivate, Method aMethod) : mServiceWorkerPrivate(aServiceWorkerPrivate), mMethod(aMethod) {} NS_IMETHOD Notify(nsITimer* aTimer) override { (mServiceWorkerPrivate->*mMethod)(aTimer); mServiceWorkerPrivate = nullptr; return NS_OK; } NS_IMETHOD GetName(nsACString& aName) override { aName.AssignLiteral("ServiceWorkerPrivateTimerCallback"); return NS_OK; } private: ~ServiceWorkerPrivateTimerCallback() = default; RefPtr mServiceWorkerPrivate; Method mMethod; NS_DECL_THREADSAFE_ISUPPORTS }; NS_IMPL_ISUPPORTS(ServiceWorkerPrivateTimerCallback, nsITimerCallback, nsINamed); } // anonymous namespace void ServiceWorkerPrivate::NoteIdleWorkerCallback(nsITimer* aTimer) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aTimer == mIdleWorkerTimer, "Invalid timer!"); // Release ServiceWorkerPrivate's token, since the grace period has ended. mIdleKeepAliveToken = nullptr; if (mWorkerPrivate || (mInner && !mInner->WorkerIsDead())) { // There sould only be EITHER mWorkerPrivate or mInner (but not both). MOZ_ASSERT(!(mWorkerPrivate && mInner)); // If we still have a living worker at this point it means that either there // are pending waitUntil promises or the worker is doing some long-running // computation. Wait a bit more until we forcibly terminate the worker. uint32_t timeout = Preferences::GetInt("dom.serviceWorkers.idle_extended_timeout"); nsCOMPtr cb = new ServiceWorkerPrivateTimerCallback( this, &ServiceWorkerPrivate::TerminateWorkerCallback); DebugOnly rv = mIdleWorkerTimer->InitWithCallback( cb, timeout, nsITimer::TYPE_ONE_SHOT); MOZ_ASSERT(NS_SUCCEEDED(rv)); } } void ServiceWorkerPrivate::TerminateWorkerCallback(nsITimer* aTimer) { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(aTimer == this->mIdleWorkerTimer, "Invalid timer!"); // mInfo must be non-null at this point because NoteDeadServiceWorkerInfo // which zeroes it calls TerminateWorker which cancels our timer which will // ensure we don't get invoked even if the nsTimerEvent is in the event queue. ServiceWorkerManager::LocalizeAndReportToAllClients( mInfo->Scope(), "ServiceWorkerGraceTimeoutTermination", nsTArray{NS_ConvertUTF8toUTF16(mInfo->Scope())}); TerminateWorker(); } void ServiceWorkerPrivate::RenewKeepAliveToken(WakeUpReason aWhy) { // We should have an active worker if we're renewing the keep alive token. MOZ_ASSERT(mWorkerPrivate || (mInner && !mInner->WorkerIsDead())); // If there is at least one debugger attached to the worker, the idle worker // timeout was canceled when the first debugger attached to the worker. It // should not be reset until the last debugger detaches from the worker. if (!mDebuggerCount) { ResetIdleTimeout(); } if (!mIdleKeepAliveToken) { mIdleKeepAliveToken = new KeepAliveToken(this); } } void ServiceWorkerPrivate::ResetIdleTimeout() { uint32_t timeout = Preferences::GetInt("dom.serviceWorkers.idle_timeout"); nsCOMPtr cb = new ServiceWorkerPrivateTimerCallback( this, &ServiceWorkerPrivate::NoteIdleWorkerCallback); DebugOnly rv = mIdleWorkerTimer->InitWithCallback(cb, timeout, nsITimer::TYPE_ONE_SHOT); MOZ_ASSERT(NS_SUCCEEDED(rv)); } void ServiceWorkerPrivate::AddToken() { MOZ_ASSERT(NS_IsMainThread()); ++mTokenCount; } void ServiceWorkerPrivate::ReleaseToken() { MOZ_ASSERT(NS_IsMainThread()); MOZ_ASSERT(mTokenCount > 0); --mTokenCount; if (IsIdle()) { mIdlePromiseHolder.ResolveIfExists(true, __func__); if (!mTokenCount) { TerminateWorker(); } // mInfo can be nullptr here if NoteDeadServiceWorkerInfo() is called while // the KeepAliveToken is being proxy released as a runnable. else if (mInfo) { RefPtr swm = ServiceWorkerManager::GetInstance(); if (swm) { swm->WorkerIsIdle(mInfo); } } } } already_AddRefed ServiceWorkerPrivate::CreateEventKeepAliveToken() { MOZ_ASSERT(NS_IsMainThread()); // When the WorkerPrivate is in a separate process, we first hold a normal // KeepAliveToken. Then, after we're notified that the worker is alive, we // create the idle KeepAliveToken. MOZ_ASSERT(mWorkerPrivate || (mInner && !mInner->WorkerIsDead())); MOZ_ASSERT(mIdleKeepAliveToken || (mInner && !mInner->WorkerIsDead())); RefPtr ref = new KeepAliveToken(this); return ref.forget(); } void ServiceWorkerPrivate::SetHandlesFetch(bool aValue) { MOZ_ASSERT(NS_IsMainThread()); if (NS_WARN_IF(!mInfo)) { return; } mInfo->SetHandlesFetch(aValue); } } // namespace dom } // namespace mozilla