summaryrefslogtreecommitdiffstats
path: root/dom/workers/WorkerLoadInfo.h
diff options
context:
space:
mode:
Diffstat (limited to 'dom/workers/WorkerLoadInfo.h')
-rw-r--r--dom/workers/WorkerLoadInfo.h200
1 files changed, 200 insertions, 0 deletions
diff --git a/dom/workers/WorkerLoadInfo.h b/dom/workers/WorkerLoadInfo.h
new file mode 100644
index 0000000000..722e71d6f3
--- /dev/null
+++ b/dom/workers/WorkerLoadInfo.h
@@ -0,0 +1,200 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this file,
+ * You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef mozilla_dom_workers_WorkerLoadInfo_h
+#define mozilla_dom_workers_WorkerLoadInfo_h
+
+#include "mozilla/OriginAttributes.h"
+#include "mozilla/StorageAccess.h"
+#include "mozilla/OriginTrials.h"
+#include "mozilla/UniquePtr.h"
+#include "mozilla/dom/ChannelInfo.h"
+#include "mozilla/net/NeckoChannelParams.h"
+#include "mozilla/dom/ServiceWorkerRegistrationDescriptor.h"
+#include "mozilla/dom/WorkerCommon.h"
+
+#include "nsIInterfaceRequestor.h"
+#include "nsILoadContext.h"
+#include "nsIRequest.h"
+#include "nsISupportsImpl.h"
+#include "nsIWeakReferenceUtils.h"
+#include "nsRFPService.h"
+#include "nsTArray.h"
+
+class nsIChannel;
+class nsIContentSecurityPolicy;
+class nsICookieJarSettings;
+class nsILoadGroup;
+class nsIPrincipal;
+class nsIReferrerInfo;
+class nsIRunnable;
+class nsIScriptContext;
+class nsIBrowserChild;
+class nsIURI;
+class nsPIDOMWindowInner;
+
+namespace mozilla {
+
+namespace ipc {
+class PrincipalInfo;
+class CSPInfo;
+} // namespace ipc
+
+namespace dom {
+
+class WorkerPrivate;
+
+struct WorkerLoadInfoData {
+ // All of these should be released in
+ // WorkerPrivateParent::ForgetMainThreadObjects.
+ nsCOMPtr<nsIURI> mBaseURI;
+ nsCOMPtr<nsIURI> mResolvedScriptURI;
+
+ // This is the principal of the global (parent worker or a window) loading
+ // the worker. It can be null if we are executing a ServiceWorker, otherwise,
+ // except for data: URL, it must subsumes the worker principal.
+ // If we load a data: URL, mPrincipal will be a null principal.
+ nsCOMPtr<nsIPrincipal> mLoadingPrincipal;
+ nsCOMPtr<nsIPrincipal> mPrincipal;
+ nsCOMPtr<nsIPrincipal> mPartitionedPrincipal;
+
+ // Taken from the parent context.
+ nsCOMPtr<nsICookieJarSettings> mCookieJarSettings;
+
+ // The CookieJarSettingsArgs of mCookieJarSettings.
+ // This is specific for accessing on worker thread.
+ net::CookieJarSettingsArgs mCookieJarSettingsArgs;
+
+ nsCOMPtr<nsIScriptContext> mScriptContext;
+ nsCOMPtr<nsPIDOMWindowInner> mWindow;
+ nsCOMPtr<nsIContentSecurityPolicy> mCSP;
+ // Thread boundaries require us to not only store a CSP object, but also a
+ // serialized version of the CSP. Reason being: Serializing a CSP to a CSPInfo
+ // needs to happen on the main thread, but storing the CSPInfo needs to happen
+ // on the worker thread. We move the CSPInfo into the Client within
+ // ScriptLoader::PreRun().
+ UniquePtr<mozilla::ipc::CSPInfo> mCSPInfo;
+
+ nsCOMPtr<nsIChannel> mChannel;
+ nsCOMPtr<nsILoadGroup> mLoadGroup;
+
+ class InterfaceRequestor final : public nsIInterfaceRequestor {
+ NS_DECL_ISUPPORTS
+
+ public:
+ InterfaceRequestor(nsIPrincipal* aPrincipal, nsILoadGroup* aLoadGroup);
+ void MaybeAddBrowserChild(nsILoadGroup* aLoadGroup);
+ NS_IMETHOD GetInterface(const nsIID& aIID, void** aSink) override;
+
+ void SetOuterRequestor(nsIInterfaceRequestor* aOuterRequestor) {
+ MOZ_ASSERT(!mOuterRequestor);
+ MOZ_ASSERT(aOuterRequestor);
+ mOuterRequestor = aOuterRequestor;
+ }
+
+ private:
+ ~InterfaceRequestor() = default;
+
+ already_AddRefed<nsIBrowserChild> GetAnyLiveBrowserChild();
+
+ nsCOMPtr<nsILoadContext> mLoadContext;
+ nsCOMPtr<nsIInterfaceRequestor> mOuterRequestor;
+
+ // Array of weak references to nsIBrowserChild. We do not want to keep
+ // BrowserChild actors alive for long after their ActorDestroy() methods are
+ // called.
+ nsTArray<nsWeakPtr> mBrowserChildList;
+ };
+
+ // Only set if we have a custom overriden load group
+ RefPtr<InterfaceRequestor> mInterfaceRequestor;
+
+ UniquePtr<mozilla::ipc::PrincipalInfo> mPrincipalInfo;
+ UniquePtr<mozilla::ipc::PrincipalInfo> mPartitionedPrincipalInfo;
+ nsCString mDomain;
+
+ nsString mServiceWorkerCacheName;
+ Maybe<ServiceWorkerDescriptor> mServiceWorkerDescriptor;
+ Maybe<ServiceWorkerRegistrationDescriptor>
+ mServiceWorkerRegistrationDescriptor;
+
+ Maybe<ServiceWorkerDescriptor> mParentController;
+
+ nsID mAgentClusterId;
+
+ ChannelInfo mChannelInfo;
+ nsLoadFlags mLoadFlags;
+
+ uint64_t mWindowID;
+ uint64_t mAssociatedBrowsingContextID;
+
+ nsCOMPtr<nsIReferrerInfo> mReferrerInfo;
+ OriginTrials mTrials;
+ bool mFromWindow;
+ bool mEvalAllowed;
+ bool mReportEvalCSPViolations;
+ bool mWasmEvalAllowed;
+ bool mReportWasmEvalCSPViolations;
+ bool mXHRParamsAllowed;
+ bool mWatchedByDevTools;
+ StorageAccess mStorageAccess;
+ bool mUseRegularPrincipal;
+ bool mUsingStorageAccess;
+ bool mServiceWorkersTestingInWindow;
+ bool mShouldResistFingerprinting;
+ Maybe<RFPTarget> mOverriddenFingerprintingSettings;
+ OriginAttributes mOriginAttributes;
+ bool mIsThirdPartyContextToTopWindow;
+
+ enum {
+ eNotSet,
+ eInsecureContext,
+ eSecureContext,
+ } mSecureContext;
+
+ WorkerLoadInfoData();
+ WorkerLoadInfoData(WorkerLoadInfoData&& aOther) = default;
+
+ WorkerLoadInfoData& operator=(WorkerLoadInfoData&& aOther) = default;
+};
+
+struct WorkerLoadInfo : WorkerLoadInfoData {
+ WorkerLoadInfo();
+ WorkerLoadInfo(WorkerLoadInfo&& aOther) noexcept;
+ ~WorkerLoadInfo();
+
+ WorkerLoadInfo& operator=(WorkerLoadInfo&& aOther) = default;
+
+ nsresult SetPrincipalsAndCSPOnMainThread(nsIPrincipal* aPrincipal,
+ nsIPrincipal* aPartitionedPrincipal,
+ nsILoadGroup* aLoadGroup,
+ nsIContentSecurityPolicy* aCSP);
+
+ nsresult GetPrincipalsAndLoadGroupFromChannel(
+ nsIChannel* aChannel, nsIPrincipal** aPrincipalOut,
+ nsIPrincipal** aPartitionedPrincipalOut, nsILoadGroup** aLoadGroupOut);
+
+ nsresult SetPrincipalsAndCSPFromChannel(nsIChannel* aChannel);
+
+ bool FinalChannelPrincipalIsValid(nsIChannel* aChannel);
+
+#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
+ bool PrincipalIsValid() const;
+
+ bool PrincipalURIMatchesScriptURL();
+#endif
+
+ bool ProxyReleaseMainThreadObjects(WorkerPrivate* aWorkerPrivate);
+
+ bool ProxyReleaseMainThreadObjects(
+ WorkerPrivate* aWorkerPrivate,
+ nsCOMPtr<nsILoadGroup>&& aLoadGroupToCancel);
+};
+
+} // namespace dom
+} // namespace mozilla
+
+#endif // mozilla_dom_workers_WorkerLoadInfo_h