diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 01:47:29 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 01:47:29 +0000 |
commit | 0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d (patch) | |
tree | a31f07c9bcca9d56ce61e9a1ffd30ef350d513aa /dom/indexedDB/IDBFactory.cpp | |
parent | Initial commit. (diff) | |
download | firefox-esr-37a0381f8351b370577b65028ba1f6563ae23fdf.tar.xz firefox-esr-37a0381f8351b370577b65028ba1f6563ae23fdf.zip |
Adding upstream version 115.8.0esr.upstream/115.8.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/indexedDB/IDBFactory.cpp')
-rw-r--r-- | dom/indexedDB/IDBFactory.cpp | 780 |
1 files changed, 780 insertions, 0 deletions
diff --git a/dom/indexedDB/IDBFactory.cpp b/dom/indexedDB/IDBFactory.cpp new file mode 100644 index 0000000000..9bc3864c30 --- /dev/null +++ b/dom/indexedDB/IDBFactory.cpp @@ -0,0 +1,780 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "IDBFactory.h" + +#include "BackgroundChildImpl.h" +#include "IDBRequest.h" +#include "IndexedDatabaseManager.h" +#include "mozilla/BasePrincipal.h" +#include "mozilla/ErrorResult.h" +#include "mozilla/Preferences.h" +#include "mozilla/dom/BindingDeclarations.h" +#include "mozilla/dom/Document.h" +#include "mozilla/dom/IDBFactoryBinding.h" +#include "mozilla/dom/quota/PersistenceType.h" +#include "mozilla/dom/quota/QuotaManager.h" +#include "mozilla/dom/BrowserChild.h" +#include "mozilla/dom/WorkerPrivate.h" +#include "mozilla/ipc/BackgroundChild.h" +#include "mozilla/ipc/BackgroundUtils.h" +#include "mozilla/ipc/PBackground.h" +#include "mozilla/ipc/PBackgroundChild.h" +#include "mozilla/StaticPrefs_dom.h" +#include "mozilla/StorageAccess.h" +#include "mozilla/Telemetry.h" +#include "nsAboutProtocolUtils.h" +#include "nsContentUtils.h" +#include "nsGlobalWindow.h" +#include "nsIAboutModule.h" +#include "nsILoadContext.h" +#include "nsIURI.h" +#include "nsIUUIDGenerator.h" +#include "nsIWebNavigation.h" +#include "nsNetUtil.h" +#include "nsSandboxFlags.h" +#include "nsServiceManagerUtils.h" +#include "ProfilerHelpers.h" +#include "ReportInternalError.h" +#include "ThreadLocal.h" + +// Include this last to avoid path problems on Windows. +#include "ActorsChild.h" + +namespace mozilla::dom { + +using namespace mozilla::dom::indexedDB; +using namespace mozilla::dom::quota; +using namespace mozilla::ipc; + +namespace { + +Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT IdentifyPrincipalType( + const mozilla::ipc::PrincipalInfo& aPrincipalInfo) { + switch (aPrincipalInfo.type()) { + case PrincipalInfo::TSystemPrincipalInfo: + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT::system; + case PrincipalInfo::TContentPrincipalInfo: { + const ContentPrincipalInfo& info = + aPrincipalInfo.get_ContentPrincipalInfo(); + + nsCOMPtr<nsIURI> uri; + + if (NS_WARN_IF(NS_FAILED(NS_NewURI(getter_AddRefs(uri), info.spec())))) { + // This could be discriminated as an extra error value, but this is + // extremely unlikely to fail, so we just misuse ContentOther + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT:: + content_other; + } + + // TODO Are there constants defined for the schemes somewhere? + if (uri->SchemeIs("file")) { + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT:: + content_file; + } + if (uri->SchemeIs("http") || uri->SchemeIs("https")) { + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT:: + content_http_https; + } + if (uri->SchemeIs("moz-extension")) { + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT:: + content_moz_ext; + } + if (uri->SchemeIs("about")) { + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT:: + content_about; + } + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT:: + content_other; + } + case PrincipalInfo::TExpandedPrincipalInfo: + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT::expanded; + default: + return Telemetry::LABELS_IDB_CUSTOM_OPEN_WITH_OPTIONS_COUNT::other; + } +} + +} // namespace + +struct IDBFactory::PendingRequestInfo { + RefPtr<IDBOpenDBRequest> mRequest; + FactoryRequestParams mParams; + + PendingRequestInfo(IDBOpenDBRequest* aRequest, + const FactoryRequestParams& aParams) + : mRequest(aRequest), mParams(aParams) { + MOZ_ASSERT(aRequest); + MOZ_ASSERT(aParams.type() != FactoryRequestParams::T__None); + } +}; + +IDBFactory::IDBFactory(const IDBFactoryGuard&) + : mBackgroundActor(nullptr), + mInnerWindowID(0), + mActiveTransactionCount(0), + mActiveDatabaseCount(0), + mBackgroundActorFailed(false), + mPrivateBrowsingMode(false) { + AssertIsOnOwningThread(); +} + +IDBFactory::~IDBFactory() { + MOZ_ASSERT_IF(mBackgroundActorFailed, !mBackgroundActor); + + if (mBackgroundActor) { + mBackgroundActor->SendDeleteMeInternal(); + MOZ_ASSERT(!mBackgroundActor, "SendDeleteMeInternal should have cleared!"); + } +} + +// static +Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForWindow( + nsPIDOMWindowInner* aWindow) { + MOZ_ASSERT(NS_IsMainThread()); + MOZ_ASSERT(aWindow); + + nsCOMPtr<nsIPrincipal> principal; + nsresult rv = AllowedForWindowInternal(aWindow, &principal); + + if (rv == NS_ERROR_DOM_NOT_SUPPORTED_ERR) { + NS_WARNING("IndexedDB is not permitted in a third-party window."); + return RefPtr<IDBFactory>{}; + } + + if (NS_WARN_IF(NS_FAILED(rv))) { + if (rv == NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR) { + IDB_REPORT_INTERNAL_ERR(); + } + return Err(rv); + } + + MOZ_ASSERT(principal); + + auto principalInfo = MakeUnique<PrincipalInfo>(); + rv = PrincipalToPrincipalInfo(principal, principalInfo.get()); + if (NS_WARN_IF(NS_FAILED(rv))) { + IDB_REPORT_INTERNAL_ERR(); + return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + } + + MOZ_ASSERT(principalInfo->type() == PrincipalInfo::TContentPrincipalInfo || + principalInfo->type() == PrincipalInfo::TSystemPrincipalInfo); + + if (NS_WARN_IF(!QuotaManager::IsPrincipalInfoValid(*principalInfo))) { + IDB_REPORT_INTERNAL_ERR(); + return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + } + + nsCOMPtr<nsIWebNavigation> webNav = do_GetInterface(aWindow); + nsCOMPtr<nsILoadContext> loadContext = do_QueryInterface(webNav); + + auto factory = MakeRefPtr<IDBFactory>(IDBFactoryGuard{}); + factory->mPrincipalInfo = std::move(principalInfo); + + factory->mGlobal = do_QueryInterface(aWindow); + MOZ_ASSERT(factory->mGlobal); + + factory->mBrowserChild = BrowserChild::GetFrom(aWindow); + factory->mEventTarget = + nsGlobalWindowInner::Cast(aWindow)->EventTargetFor(TaskCategory::Other); + factory->mInnerWindowID = aWindow->WindowID(); + factory->mPrivateBrowsingMode = + loadContext && loadContext->UsePrivateBrowsing(); + + return factory; +} + +// static +Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForMainThreadJS( + nsIGlobalObject* aGlobal) { + MOZ_ASSERT(NS_IsMainThread()); + MOZ_ASSERT(aGlobal); + + nsCOMPtr<nsIScriptObjectPrincipal> sop = do_QueryInterface(aGlobal); + if (NS_WARN_IF(!sop)) { + return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + } + + auto principalInfo = MakeUnique<PrincipalInfo>(); + nsIPrincipal* principal = sop->GetEffectiveStoragePrincipal(); + MOZ_ASSERT(principal); + bool isSystem; + if (!AllowedForPrincipal(principal, &isSystem)) { + return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + } + + nsresult rv = PrincipalToPrincipalInfo(principal, principalInfo.get()); + if (NS_WARN_IF(NS_FAILED(rv))) { + return Err(rv); + } + + if (NS_WARN_IF(!QuotaManager::IsPrincipalInfoValid(*principalInfo))) { + return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + } + + return CreateForMainThreadJSInternal(aGlobal, std::move(principalInfo)); +} + +// static +Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForWorker( + nsIGlobalObject* aGlobal, const PrincipalInfo& aPrincipalInfo, + uint64_t aInnerWindowID) { + MOZ_ASSERT(!NS_IsMainThread()); + MOZ_ASSERT(aGlobal); + MOZ_ASSERT(aPrincipalInfo.type() != PrincipalInfo::T__None); + + return CreateInternal(aGlobal, MakeUnique<PrincipalInfo>(aPrincipalInfo), + aInnerWindowID); +} + +// static +Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForMainThreadJSInternal( + nsIGlobalObject* aGlobal, UniquePtr<PrincipalInfo> aPrincipalInfo) { + MOZ_ASSERT(NS_IsMainThread()); + MOZ_ASSERT(aGlobal); + MOZ_ASSERT(aPrincipalInfo); + + IndexedDatabaseManager* mgr = IndexedDatabaseManager::GetOrCreate(); + if (NS_WARN_IF(!mgr)) { + IDB_REPORT_INTERNAL_ERR(); + return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + } + + return CreateInternal(aGlobal, std::move(aPrincipalInfo), + /* aInnerWindowID */ 0); +} + +// static +Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateInternal( + nsIGlobalObject* aGlobal, UniquePtr<PrincipalInfo> aPrincipalInfo, + uint64_t aInnerWindowID) { + MOZ_ASSERT(aGlobal); + MOZ_ASSERT(aPrincipalInfo); + MOZ_ASSERT(aPrincipalInfo->type() != PrincipalInfo::T__None); + + if (aPrincipalInfo->type() != PrincipalInfo::TContentPrincipalInfo && + aPrincipalInfo->type() != PrincipalInfo::TSystemPrincipalInfo) { + NS_WARNING("IndexedDB not allowed for this principal!"); + return RefPtr<IDBFactory>{}; + } + + auto factory = MakeRefPtr<IDBFactory>(IDBFactoryGuard{}); + factory->mPrincipalInfo = std::move(aPrincipalInfo); + factory->mGlobal = aGlobal; + factory->mEventTarget = GetCurrentSerialEventTarget(); + factory->mInnerWindowID = aInnerWindowID; + + return factory; +} + +// static +bool IDBFactory::AllowedForWindow(nsPIDOMWindowInner* aWindow) { + MOZ_ASSERT(NS_IsMainThread()); + MOZ_ASSERT(aWindow); + + return !NS_WARN_IF(NS_FAILED(AllowedForWindowInternal(aWindow, nullptr))); +} + +// static +nsresult IDBFactory::AllowedForWindowInternal( + nsPIDOMWindowInner* aWindow, nsCOMPtr<nsIPrincipal>* aPrincipal) { + MOZ_ASSERT(NS_IsMainThread()); + MOZ_ASSERT(aWindow); + + if (NS_WARN_IF(!IndexedDatabaseManager::GetOrCreate())) { + return NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR; + } + + StorageAccess access = StorageAllowedForWindow(aWindow); + + // the factory callsite records whether the browser is in private browsing. + // and thus we don't have to respect that setting here. IndexedDB has no + // concept of session-local storage, and thus ignores it. + if (access == StorageAccess::eDeny) { + return NS_ERROR_DOM_SECURITY_ERR; + } + + if (ShouldPartitionStorage(access) && + !StoragePartitioningEnabled( + access, aWindow->GetExtantDoc()->CookieJarSettings())) { + return NS_ERROR_DOM_SECURITY_ERR; + } + + nsCOMPtr<nsIScriptObjectPrincipal> sop = do_QueryInterface(aWindow); + MOZ_ASSERT(sop); + + nsCOMPtr<nsIPrincipal> principal = sop->GetEffectiveStoragePrincipal(); + if (NS_WARN_IF(!principal)) { + return NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR; + } + + if (principal->IsSystemPrincipal()) { + *aPrincipal = std::move(principal); + return NS_OK; + } + + // About URIs shouldn't be able to access IndexedDB unless they have the + // nsIAboutModule::ENABLE_INDEXED_DB flag set on them. + + if (principal->SchemeIs("about")) { + uint32_t flags; + if (NS_SUCCEEDED(principal->GetAboutModuleFlags(&flags))) { + if (!(flags & nsIAboutModule::ENABLE_INDEXED_DB)) { + return NS_ERROR_DOM_NOT_SUPPORTED_ERR; + } + } else { + return NS_ERROR_DOM_NOT_SUPPORTED_ERR; + } + } + + if (aPrincipal) { + *aPrincipal = std::move(principal); + } + return NS_OK; +} + +// static +bool IDBFactory::AllowedForPrincipal(nsIPrincipal* aPrincipal, + bool* aIsSystemPrincipal) { + MOZ_ASSERT(NS_IsMainThread()); + MOZ_ASSERT(aPrincipal); + + if (NS_WARN_IF(!IndexedDatabaseManager::GetOrCreate())) { + return false; + } + + if (aPrincipal->IsSystemPrincipal()) { + if (aIsSystemPrincipal) { + *aIsSystemPrincipal = true; + } + return true; + } + + if (aIsSystemPrincipal) { + *aIsSystemPrincipal = false; + } + + return !aPrincipal->GetIsNullPrincipal(); +} + +void IDBFactory::UpdateActiveTransactionCount(int32_t aDelta) { + AssertIsOnOwningThread(); + MOZ_DIAGNOSTIC_ASSERT(aDelta > 0 || (mActiveTransactionCount + aDelta) < + mActiveTransactionCount); + mActiveTransactionCount += aDelta; +} + +void IDBFactory::UpdateActiveDatabaseCount(int32_t aDelta) { + AssertIsOnOwningThread(); + MOZ_DIAGNOSTIC_ASSERT(aDelta > 0 || + (mActiveDatabaseCount + aDelta) < mActiveDatabaseCount); + mActiveDatabaseCount += aDelta; + + nsCOMPtr<nsPIDOMWindowInner> window = do_QueryInterface(mGlobal); + if (window) { + window->UpdateActiveIndexedDBDatabaseCount(aDelta); + } +} + +bool IDBFactory::IsChrome() const { + AssertIsOnOwningThread(); + MOZ_ASSERT(mPrincipalInfo); + + return mPrincipalInfo->type() == PrincipalInfo::TSystemPrincipalInfo; +} + +RefPtr<IDBOpenDBRequest> IDBFactory::Open(JSContext* aCx, + const nsAString& aName, + uint64_t aVersion, + CallerType aCallerType, + ErrorResult& aRv) { + return OpenInternal(aCx, + /* aPrincipal */ nullptr, aName, + Optional<uint64_t>(aVersion), + /* aDeleting */ false, aCallerType, aRv); +} + +RefPtr<IDBOpenDBRequest> IDBFactory::Open(JSContext* aCx, + const nsAString& aName, + const IDBOpenDBOptions& aOptions, + CallerType aCallerType, + ErrorResult& aRv) { + // This overload is nonstandard, see bug 1275496. + // Ignore calls with empty options for telemetry of usage count. + // Unfortunately, we cannot distinguish between the use of the method with + // only a single argument (which actually is a standard overload we don't want + // to count) an empty dictionary passed explicitly (which is the custom + // overload we would like to count). However, we assume that the latter is so + // rare that it can be neglected. + if (aOptions.IsAnyMemberPresent()) { + Telemetry::AccumulateCategorical(IdentifyPrincipalType(*mPrincipalInfo)); + } + + return OpenInternal(aCx, + /* aPrincipal */ nullptr, aName, aOptions.mVersion, + /* aDeleting */ false, aCallerType, aRv); +} + +RefPtr<IDBOpenDBRequest> IDBFactory::DeleteDatabase( + JSContext* aCx, const nsAString& aName, const IDBOpenDBOptions& aOptions, + CallerType aCallerType, ErrorResult& aRv) { + return OpenInternal(aCx, + /* aPrincipal */ nullptr, aName, Optional<uint64_t>(), + /* aDeleting */ true, aCallerType, aRv); +} + +int16_t IDBFactory::Cmp(JSContext* aCx, JS::Handle<JS::Value> aFirst, + JS::Handle<JS::Value> aSecond, ErrorResult& aRv) { + Key first, second; + auto result = first.SetFromJSVal(aCx, aFirst); + if (result.isErr()) { + aRv = result.unwrapErr().ExtractErrorResult( + InvalidMapsTo<NS_ERROR_DOM_INDEXEDDB_DATA_ERR>); + return 0; + } + + result = second.SetFromJSVal(aCx, aSecond); + if (result.isErr()) { + aRv = result.unwrapErr().ExtractErrorResult( + InvalidMapsTo<NS_ERROR_DOM_INDEXEDDB_DATA_ERR>); + return 0; + } + + if (first.IsUnset() || second.IsUnset()) { + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_DATA_ERR); + return 0; + } + + return Key::CompareKeys(first, second); +} + +RefPtr<IDBOpenDBRequest> IDBFactory::OpenForPrincipal( + JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName, + uint64_t aVersion, SystemCallerGuarantee aGuarantee, ErrorResult& aRv) { + MOZ_ASSERT(aPrincipal); + if (!NS_IsMainThread()) { + MOZ_CRASH( + "Figure out security checks for workers! What's this aPrincipal " + "we have on a worker thread?"); + } + + return OpenInternal(aCx, aPrincipal, aName, Optional<uint64_t>(aVersion), + /* aDeleting */ false, aGuarantee, aRv); +} + +RefPtr<IDBOpenDBRequest> IDBFactory::OpenForPrincipal( + JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName, + const IDBOpenDBOptions& aOptions, SystemCallerGuarantee aGuarantee, + ErrorResult& aRv) { + MOZ_ASSERT(aPrincipal); + if (!NS_IsMainThread()) { + MOZ_CRASH( + "Figure out security checks for workers! What's this aPrincipal " + "we have on a worker thread?"); + } + + return OpenInternal(aCx, aPrincipal, aName, aOptions.mVersion, + /* aDeleting */ false, aGuarantee, aRv); +} + +RefPtr<IDBOpenDBRequest> IDBFactory::DeleteForPrincipal( + JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName, + const IDBOpenDBOptions& aOptions, SystemCallerGuarantee aGuarantee, + ErrorResult& aRv) { + MOZ_ASSERT(aPrincipal); + if (!NS_IsMainThread()) { + MOZ_CRASH( + "Figure out security checks for workers! What's this aPrincipal " + "we have on a worker thread?"); + } + + return OpenInternal(aCx, aPrincipal, aName, Optional<uint64_t>(), + /* aDeleting */ true, aGuarantee, aRv); +} + +RefPtr<IDBOpenDBRequest> IDBFactory::OpenInternal( + JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName, + const Optional<uint64_t>& aVersion, bool aDeleting, CallerType aCallerType, + ErrorResult& aRv) { + if (NS_WARN_IF(!mGlobal)) { + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + + CommonFactoryRequestParams commonParams; + + PrincipalInfo& principalInfo = commonParams.principalInfo(); + + if (aPrincipal) { + if (!NS_IsMainThread()) { + MOZ_CRASH( + "Figure out security checks for workers! What's this " + "aPrincipal we have on a worker thread?"); + } + MOZ_ASSERT(aCallerType == CallerType::System); + MOZ_DIAGNOSTIC_ASSERT(mPrivateBrowsingMode == + (aPrincipal->GetPrivateBrowsingId() > 0)); + + if (NS_WARN_IF( + NS_FAILED(PrincipalToPrincipalInfo(aPrincipal, &principalInfo)))) { + IDB_REPORT_INTERNAL_ERR(); + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + + if (principalInfo.type() != PrincipalInfo::TContentPrincipalInfo && + principalInfo.type() != PrincipalInfo::TSystemPrincipalInfo) { + IDB_REPORT_INTERNAL_ERR(); + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + + if (NS_WARN_IF(!QuotaManager::IsPrincipalInfoValid(principalInfo))) { + IDB_REPORT_INTERNAL_ERR(); + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + } else { + if (mGlobal->GetStorageAccess() == StorageAccess::ePrivateBrowsing) { + if (NS_IsMainThread()) { + SetUseCounter( + mGlobal->GetGlobalJSObject(), + aDeleting + ? eUseCounter_custom_PrivateBrowsingIDBFactoryOpen + : eUseCounter_custom_PrivateBrowsingIDBFactoryDeleteDatabase); + } else { + SetUseCounter( + aDeleting ? UseCounterWorker::Custom_PrivateBrowsingIDBFactoryOpen + : UseCounterWorker:: + Custom_PrivateBrowsingIDBFactoryDeleteDatabase); + } + } + principalInfo = *mPrincipalInfo; + } + + uint64_t version = 0; + if (!aDeleting && aVersion.WasPassed()) { + if (aVersion.Value() < 1) { + aRv.ThrowTypeError("0 (Zero) is not a valid database version."); + return nullptr; + } + version = aVersion.Value(); + } + + // Nothing can be done here if we have previously failed to create a + // background actor. + if (mBackgroundActorFailed) { + IDB_REPORT_INTERNAL_ERR(); + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + + PersistenceType persistenceType; + + bool isInternal = principalInfo.type() == PrincipalInfo::TSystemPrincipalInfo; + if (!isInternal && + principalInfo.type() == PrincipalInfo::TContentPrincipalInfo) { + nsCString origin = + principalInfo.get_ContentPrincipalInfo().originNoSuffix(); + isInternal = QuotaManager::IsOriginInternal(origin); + } + + const bool isPrivate = + principalInfo.type() == PrincipalInfo::TContentPrincipalInfo && + principalInfo.get_ContentPrincipalInfo().attrs().mPrivateBrowsingId > 0; + + if (isInternal) { + // Chrome privilege and internal origins always get persistent storage. + persistenceType = PERSISTENCE_TYPE_PERSISTENT; + } else if (isPrivate) { + persistenceType = PERSISTENCE_TYPE_PRIVATE; + } else { + persistenceType = PERSISTENCE_TYPE_DEFAULT; + } + + DatabaseMetadata& metadata = commonParams.metadata(); + metadata.name() = aName; + metadata.persistenceType() = persistenceType; + + FactoryRequestParams params; + if (aDeleting) { + metadata.version() = 0; + params = DeleteDatabaseRequestParams(commonParams); + } else { + metadata.version() = version; + params = OpenDatabaseRequestParams(commonParams); + } + + if (!mBackgroundActor) { + BackgroundChildImpl::ThreadLocal* threadLocal = + BackgroundChildImpl::GetThreadLocalForCurrentThread(); + + UniquePtr<ThreadLocal> newIDBThreadLocal; + ThreadLocal* idbThreadLocal; + + if (threadLocal && threadLocal->mIndexedDBThreadLocal) { + idbThreadLocal = threadLocal->mIndexedDBThreadLocal.get(); + } else { + nsCOMPtr<nsIUUIDGenerator> uuidGen = + do_GetService("@mozilla.org/uuid-generator;1"); + MOZ_ASSERT(uuidGen); + + nsID id; + MOZ_ALWAYS_SUCCEEDS(uuidGen->GenerateUUIDInPlace(&id)); + + newIDBThreadLocal = WrapUnique(new ThreadLocal(id)); + idbThreadLocal = newIDBThreadLocal.get(); + } + + PBackgroundChild* backgroundActor = + BackgroundChild::GetOrCreateForCurrentThread(); + if (NS_WARN_IF(!backgroundActor)) { + IDB_REPORT_INTERNAL_ERR(); + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + + { + BackgroundFactoryChild* actor = new BackgroundFactoryChild(*this); + + mBackgroundActor = static_cast<BackgroundFactoryChild*>( + backgroundActor->SendPBackgroundIDBFactoryConstructor( + actor, idbThreadLocal->GetLoggingInfo())); + + if (NS_WARN_IF(!mBackgroundActor)) { + mBackgroundActorFailed = true; + IDB_REPORT_INTERNAL_ERR(); + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + } + + if (newIDBThreadLocal) { + if (!threadLocal) { + threadLocal = BackgroundChildImpl::GetThreadLocalForCurrentThread(); + } + MOZ_ASSERT(threadLocal); + MOZ_ASSERT(!threadLocal->mIndexedDBThreadLocal); + + threadLocal->mIndexedDBThreadLocal = std::move(newIDBThreadLocal); + } + } + + RefPtr<IDBOpenDBRequest> request = IDBOpenDBRequest::Create( + aCx, SafeRefPtr{this, AcquireStrongRefFromRawPtr{}}, mGlobal); + if (!request) { + MOZ_ASSERT(!NS_IsMainThread()); + aRv.ThrowUncatchableException(); + return nullptr; + } + + MOZ_ASSERT(request); + + if (aDeleting) { + IDB_LOG_MARK_CHILD_REQUEST( + "indexedDB.deleteDatabase(\"%s\")", "IDBFactory.deleteDatabase(%.0s)", + request->LoggingSerialNumber(), NS_ConvertUTF16toUTF8(aName).get()); + } else { + IDB_LOG_MARK_CHILD_REQUEST( + "indexedDB.open(\"%s\", %s)", "IDBFactory.open(%.0s%.0s)", + request->LoggingSerialNumber(), NS_ConvertUTF16toUTF8(aName).get(), + IDB_LOG_STRINGIFY(aVersion)); + } + + nsresult rv = InitiateRequest(WrapNotNull(request), params); + if (NS_WARN_IF(NS_FAILED(rv))) { + IDB_REPORT_INTERNAL_ERR(); + aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return nullptr; + } + + return request; +} + +nsresult IDBFactory::InitiateRequest( + const NotNull<RefPtr<IDBOpenDBRequest>>& aRequest, + const FactoryRequestParams& aParams) { + MOZ_ASSERT(mBackgroundActor); + MOZ_ASSERT(!mBackgroundActorFailed); + + bool deleting; + uint64_t requestedVersion; + + switch (aParams.type()) { + case FactoryRequestParams::TDeleteDatabaseRequestParams: { + const DatabaseMetadata& metadata = + aParams.get_DeleteDatabaseRequestParams().commonParams().metadata(); + deleting = true; + requestedVersion = metadata.version(); + break; + } + + case FactoryRequestParams::TOpenDatabaseRequestParams: { + const DatabaseMetadata& metadata = + aParams.get_OpenDatabaseRequestParams().commonParams().metadata(); + deleting = false; + requestedVersion = metadata.version(); + break; + } + + default: + MOZ_CRASH("Should never get here!"); + } + + auto actor = new BackgroundFactoryRequestChild( + SafeRefPtr{this, AcquireStrongRefFromRawPtr{}}, aRequest, deleting, + requestedVersion); + + if (!mBackgroundActor->SendPBackgroundIDBFactoryRequestConstructor(actor, + aParams)) { + aRequest->DispatchNonTransactionError(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR); + return NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR; + } + + return NS_OK; +} + +void IDBFactory::DisconnectFromGlobal(nsIGlobalObject* aOldGlobal) { + MOZ_DIAGNOSTIC_ASSERT(aOldGlobal); + // If CC unlinks us first, then mGlobal might be nullptr + MOZ_DIAGNOSTIC_ASSERT(!mGlobal || mGlobal == aOldGlobal); + + mGlobal = nullptr; +} + +NS_IMPL_CYCLE_COLLECTING_ADDREF(IDBFactory) +NS_IMPL_CYCLE_COLLECTING_RELEASE(IDBFactory) + +NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(IDBFactory) + NS_WRAPPERCACHE_INTERFACE_MAP_ENTRY + NS_INTERFACE_MAP_ENTRY(nsISupports) +NS_INTERFACE_MAP_END + +NS_IMPL_CYCLE_COLLECTION_CLASS(IDBFactory) + +NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN(IDBFactory) + NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mGlobal) + NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mBrowserChild) + NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mEventTarget) +NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END + +NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN(IDBFactory) + NS_IMPL_CYCLE_COLLECTION_UNLINK_PRESERVED_WRAPPER + NS_IMPL_CYCLE_COLLECTION_UNLINK(mGlobal) + NS_IMPL_CYCLE_COLLECTION_UNLINK(mBrowserChild) + NS_IMPL_CYCLE_COLLECTION_UNLINK(mEventTarget) +NS_IMPL_CYCLE_COLLECTION_UNLINK_END + +NS_IMPL_CYCLE_COLLECTION_TRACE_BEGIN(IDBFactory) + NS_IMPL_CYCLE_COLLECTION_TRACE_PRESERVED_WRAPPER +NS_IMPL_CYCLE_COLLECTION_TRACE_END + +JSObject* IDBFactory::WrapObject(JSContext* aCx, + JS::Handle<JSObject*> aGivenProto) { + return IDBFactory_Binding::Wrap(aCx, this, aGivenProto); +} + +} // namespace mozilla::dom |