summaryrefslogtreecommitdiffstats
path: root/toolkit/components/backgroundtasks/BackgroundTasksUtils.sys.mjs
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
commit36d22d82aa202bb199967e9512281e9a53db42c9 (patch)
tree105e8c98ddea1c1e4784a60a5a6410fa416be2de /toolkit/components/backgroundtasks/BackgroundTasksUtils.sys.mjs
parentInitial commit. (diff)
downloadfirefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz
firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'toolkit/components/backgroundtasks/BackgroundTasksUtils.sys.mjs')
-rw-r--r--toolkit/components/backgroundtasks/BackgroundTasksUtils.sys.mjs407
1 files changed, 407 insertions, 0 deletions
diff --git a/toolkit/components/backgroundtasks/BackgroundTasksUtils.sys.mjs b/toolkit/components/backgroundtasks/BackgroundTasksUtils.sys.mjs
new file mode 100644
index 0000000000..d2a65569f4
--- /dev/null
+++ b/toolkit/components/backgroundtasks/BackgroundTasksUtils.sys.mjs
@@ -0,0 +1,407 @@
+/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+import { XPCOMUtils } from "resource://gre/modules/XPCOMUtils.sys.mjs";
+
+const lazy = {};
+
+XPCOMUtils.defineLazyGetter(lazy, "log", () => {
+ let { ConsoleAPI } = ChromeUtils.importESModule(
+ "resource://gre/modules/Console.sys.mjs"
+ );
+ let consoleOptions = {
+ // tip: set maxLogLevel to "debug" and use log.debug() to create detailed
+ // messages during development. See LOG_LEVELS in Console.sys.mjs for details.
+ maxLogLevel: "error",
+ maxLogLevelPref: "toolkit.backgroundtasks.loglevel",
+ prefix: "BackgroundTasksUtils",
+ };
+ return new ConsoleAPI(consoleOptions);
+});
+
+XPCOMUtils.defineLazyServiceGetter(
+ lazy,
+ "ProfileService",
+ "@mozilla.org/toolkit/profile-service;1",
+ "nsIToolkitProfileService"
+);
+
+ChromeUtils.defineESModuleGetters(lazy, {
+ ExperimentManager: "resource://nimbus/lib/ExperimentManager.sys.mjs",
+
+ RemoteSettingsExperimentLoader:
+ "resource://nimbus/lib/RemoteSettingsExperimentLoader.sys.mjs",
+});
+
+XPCOMUtils.defineLazyModuleGetters(lazy, {
+ ASRouter: "resource://activity-stream/lib/ASRouter.jsm",
+
+ ASRouterDefaultConfig:
+ "resource://activity-stream/lib/ASRouterDefaultConfig.jsm",
+});
+
+class CannotLockProfileError extends Error {
+ constructor(message) {
+ super(message);
+ this.name = "CannotLockProfileError";
+ }
+}
+
+export var BackgroundTasksUtils = {
+ // Manage our own default profile that can be overridden for testing. It's
+ // easier to do this here rather than using the profile service itself.
+ _defaultProfileInitialized: false,
+ _defaultProfile: null,
+
+ getDefaultProfile() {
+ if (!this._defaultProfileInitialized) {
+ this._defaultProfileInitialized = true;
+ // This is all test-only.
+ let defaultProfilePath = Services.env.get(
+ "MOZ_BACKGROUNDTASKS_DEFAULT_PROFILE_PATH"
+ );
+ let noDefaultProfile = Services.env.get(
+ "MOZ_BACKGROUNDTASKS_NO_DEFAULT_PROFILE"
+ );
+ if (defaultProfilePath) {
+ lazy.log.info(
+ `getDefaultProfile: using default profile path ${defaultProfilePath}`
+ );
+ var tmpd = Cc["@mozilla.org/file/local;1"].createInstance(Ci.nsIFile);
+ tmpd.initWithPath(defaultProfilePath);
+ // Sadly this writes to `profiles.ini`, but there's little to be done.
+ this._defaultProfile = lazy.ProfileService.createProfile(
+ tmpd,
+ `MOZ_BACKGROUNDTASKS_DEFAULT_PROFILE_PATH-${Date.now()}`
+ );
+ } else if (noDefaultProfile) {
+ lazy.log.info(`getDefaultProfile: setting default profile to null`);
+ this._defaultProfile = null;
+ } else {
+ try {
+ lazy.log.info(
+ `getDefaultProfile: using ProfileService.defaultProfile`
+ );
+ this._defaultProfile = lazy.ProfileService.defaultProfile;
+ } catch (e) {}
+ }
+ }
+ return this._defaultProfile;
+ },
+
+ hasDefaultProfile() {
+ return this.getDefaultProfile() != null;
+ },
+
+ currentProfileIsDefaultProfile() {
+ let defaultProfile = this.getDefaultProfile();
+ let currentProfile = lazy.ProfileService.currentProfile;
+ // This comparison needs to accommodate null on both sides.
+ let isDefaultProfile = defaultProfile && currentProfile == defaultProfile;
+ return isDefaultProfile;
+ },
+
+ _throwIfNotLocked(lock) {
+ if (!(lock instanceof Ci.nsIProfileLock)) {
+ throw new Error("Passed lock was not an instance of nsIProfileLock");
+ }
+
+ try {
+ // In release builds, `.directory` throws NS_ERROR_NOT_INITIALIZED when
+ // unlocked. In debug builds, `.directory` when the profile is not locked
+ // will crash via `NS_ERROR`.
+ if (lock.directory) {
+ return;
+ }
+ } catch (e) {
+ if (
+ !(
+ e instanceof Ci.nsIException &&
+ e.result == Cr.NS_ERROR_NOT_INITIALIZED
+ )
+ ) {
+ throw e;
+ }
+ }
+ throw new Error("Profile is not locked");
+ },
+
+ /**
+ * Locks the given profile and provides the path to it to the callback.
+ * The callback should return a promise and once settled the profile is
+ * unlocked and then the promise returned back to the caller of this function.
+ *
+ * @template T
+ * @param {(lock: nsIProfileLock) => Promise<T>} callback
+ * @param {nsIToolkitProfile} [profile] defaults to default profile
+ * @return {Promise<T>}
+ */
+ async withProfileLock(callback, profile = this.getDefaultProfile()) {
+ if (!profile) {
+ throw new Error("No default profile exists");
+ }
+
+ let lock;
+ try {
+ lock = profile.lock({});
+ lazy.log.info(
+ `withProfileLock: locked profile at ${lock.directory.path}`
+ );
+ } catch (e) {
+ throw new CannotLockProfileError(`Cannot lock profile: ${e}`);
+ }
+
+ try {
+ // We must await to ensure any logging is displayed after the callback resolves.
+ return await callback(lock);
+ } finally {
+ try {
+ lazy.log.info(
+ `withProfileLock: unlocking profile at ${lock.directory.path}`
+ );
+ lock.unlock();
+ lazy.log.info(`withProfileLock: unlocked profile`);
+ } catch (e) {
+ lazy.log.warn(`withProfileLock: error unlocking profile`, e);
+ }
+ }
+ },
+
+ /**
+ * Reads the preferences from "prefs.js" out of a profile, optionally
+ * returning only names satisfying a given predicate.
+ *
+ * If no `lock` is given, the default profile is locked and the preferences
+ * read from it. If `lock` is given, read from the given lock's directory.
+ *
+ * @param {(name: string) => boolean} [predicate] a predicate to filter
+ * preferences by; if not given, all preferences are accepted.
+ * @param {nsIProfileLock} [lock] optional lock to use
+ * @returns {object} with keys that are string preference names and values
+ * that are string|number|boolean preference values.
+ */
+ async readPreferences(predicate = null, lock = null) {
+ if (!lock) {
+ return this.withProfileLock(profileLock =>
+ this.readPreferences(predicate, profileLock)
+ );
+ }
+
+ this._throwIfNotLocked(lock);
+ lazy.log.info(`readPreferences: profile is locked`);
+
+ let prefs = {};
+ let addPref = (kind, name, value, sticky, locked) => {
+ if (predicate && !predicate(name)) {
+ return;
+ }
+ prefs[name] = value;
+ };
+
+ // We ignore any "user.js" file, since usage is low and doing otherwise
+ // requires implementing a bit more of `nsIPrefsService` than feels safe.
+ let prefsFile = lock.directory.clone();
+ prefsFile.append("prefs.js");
+ lazy.log.info(`readPreferences: will parse prefs ${prefsFile.path}`);
+
+ let data = await IOUtils.read(prefsFile.path);
+ lazy.log.debug(
+ `readPreferences: parsing prefs from buffer of length ${data.length}`
+ );
+
+ Services.prefs.parsePrefsFromBuffer(
+ data,
+ {
+ onStringPref: addPref,
+ onIntPref: addPref,
+ onBoolPref: addPref,
+ onError(message) {
+ // Firefox itself manages "prefs.js", so errors should be infrequent.
+ lazy.log.error(message);
+ },
+ },
+ prefsFile.path
+ );
+
+ lazy.log.debug(`readPreferences: parsed prefs from buffer`, prefs);
+ return prefs;
+ },
+
+ /**
+ * Reads the snapshotted Firefox Messaging System targeting out of a profile.
+ *
+ * If no `lock` is given, the default profile is locked and the preferences
+ * read from it. If `lock` is given, read from the given lock's directory.
+ *
+ * @param {nsIProfileLock} [lock] optional lock to use
+ * @returns {object}
+ */
+ async readFirefoxMessagingSystemTargetingSnapshot(lock = null) {
+ if (!lock) {
+ return this.withProfileLock(profileLock =>
+ this.readFirefoxMessagingSystemTargetingSnapshot(profileLock)
+ );
+ }
+
+ this._throwIfNotLocked(lock);
+
+ let snapshotFile = lock.directory.clone();
+ snapshotFile.append("targeting.snapshot.json");
+
+ lazy.log.info(
+ `readFirefoxMessagingSystemTargetingSnapshot: will read Firefox Messaging ` +
+ `System targeting snapshot from ${snapshotFile.path}`
+ );
+
+ return IOUtils.readJSON(snapshotFile.path);
+ },
+
+ /**
+ * Reads the Telemetry Client ID out of a profile.
+ *
+ * If no `lock` is given, the default profile is locked and the preferences
+ * read from it. If `lock` is given, read from the given lock's directory.
+ *
+ * @param {nsIProfileLock} [lock] optional lock to use
+ * @returns {string}
+ */
+ async readTelemetryClientID(lock = null) {
+ if (!lock) {
+ return this.withProfileLock(profileLock =>
+ this.readTelemetryClientID(profileLock)
+ );
+ }
+
+ this._throwIfNotLocked(lock);
+
+ let stateFile = lock.directory.clone();
+ stateFile.append("datareporting");
+ stateFile.append("state.json");
+
+ lazy.log.info(
+ `readPreferences: will read Telemetry client ID from ${stateFile.path}`
+ );
+
+ let state = await IOUtils.readJSON(stateFile.path);
+
+ return state.clientID;
+ },
+
+ /**
+ * Enable the Nimbus experimentation framework.
+ *
+ * @param {nsICommandLine} commandLine if given, accept command line parameters
+ * like `--url about:studies?...` or
+ * `--url file:path/to.json` to explicitly
+ * opt-on to experiment branches.
+ * @param {object} defaultProfile snapshot of Firefox Messaging System
+ * targeting from default browsing profile.
+ */
+ async enableNimbus(commandLine, defaultProfile = {}) {
+ try {
+ await lazy.ExperimentManager.onStartup({ defaultProfile });
+ } catch (err) {
+ lazy.log.error("Failed to initialize ExperimentManager:", err);
+ throw err;
+ }
+
+ try {
+ await lazy.RemoteSettingsExperimentLoader.init({ forceSync: true });
+ } catch (err) {
+ lazy.log.error(
+ "Failed to initialize RemoteSettingsExperimentLoader:",
+ err
+ );
+ throw err;
+ }
+
+ // Allow manual explicit opt-in to experiment branches to facilitate testing.
+ //
+ // Process command line arguments, like
+ // `--url about:studies?optin_slug=nalexander-ms-test1&optin_branch=treatment-a&optin_collection=nimbus-preview`
+ // or
+ // `--url file:///Users/nalexander/Mozilla/gecko/experiment.json?optin_branch=treatment-a`.
+ let ar;
+ while ((ar = commandLine?.handleFlagWithParam("url", false))) {
+ let uri = commandLine.resolveURI(ar);
+ const params = new URLSearchParams(uri.query);
+
+ if (uri.schemeIs("about") && uri.filePath == "studies") {
+ // Allow explicit opt-in. In the future, we might take this pref from
+ // the default browsing profile.
+ Services.prefs.setBoolPref("nimbus.debug", true);
+
+ const data = {
+ slug: params.get("optin_slug"),
+ branch: params.get("optin_branch"),
+ collection: params.get("optin_collection"),
+ };
+ await lazy.RemoteSettingsExperimentLoader.optInToExperiment(data);
+ lazy.log.info(`Opted in to experiment: ${JSON.stringify(data)}`);
+ }
+
+ if (uri.schemeIs("file")) {
+ let branchSlug = params.get("optin_branch");
+ let path = decodeURIComponent(uri.filePath);
+ let response = await fetch(uri.spec);
+ let recipe = await response.json();
+ if (recipe.permissions) {
+ // Saved directly from Experimenter, there's a top-level `data`. Hand
+ // written, that's not the norm.
+ recipe = recipe.data;
+ }
+ let branch = recipe.branches.find(b => b.slug == branchSlug);
+
+ lazy.ExperimentManager.forceEnroll(recipe, branch);
+ lazy.log.info(`Forced enrollment into: ${path}, branch: ${branchSlug}`);
+ }
+ }
+ },
+
+ /**
+ * Enable the Firefox Messaging System and, when successfully initialized,
+ * trigger a message with trigger id `backgroundTask`.
+ *
+ * @param {object} defaultProfile - snapshot of Firefox Messaging System
+ * targeting from default browsing profile.
+ */
+ async enableFirefoxMessagingSystem(defaultProfile = {}) {
+ function logArgs(tag, ...args) {
+ lazy.log.debug(`FxMS invoked ${tag}: ${JSON.stringify(args)}`);
+ }
+
+ let { messageHandler, router, createStorage } =
+ lazy.ASRouterDefaultConfig();
+
+ if (!router.initialized) {
+ const storage = await createStorage();
+ await router.init({
+ storage,
+ // Background tasks never send legacy telemetry.
+ sendTelemetry: logArgs.bind(null, "sendTelemetry"),
+ dispatchCFRAction: messageHandler.handleCFRAction.bind(messageHandler),
+ // There's no child process involved in background tasks, so swallow all
+ // of these messages.
+ clearChildMessages: logArgs.bind(null, "clearChildMessages"),
+ clearChildProviders: logArgs.bind(null, "clearChildProviders"),
+ updateAdminState: () => {},
+ });
+ }
+
+ await lazy.ASRouter.waitForInitialized;
+
+ const triggerId = "backgroundTask";
+ await lazy.ASRouter.sendTriggerMessage({
+ browser: null,
+ id: triggerId,
+ context: {
+ defaultProfile,
+ },
+ });
+ lazy.log.info(
+ "Triggered Firefox Messaging System with trigger id 'backgroundTask'"
+ );
+ },
+};