summaryrefslogtreecommitdiffstats
path: root/dom/cache/CacheOpParent.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
commit36d22d82aa202bb199967e9512281e9a53db42c9 (patch)
tree105e8c98ddea1c1e4784a60a5a6410fa416be2de /dom/cache/CacheOpParent.cpp
parentInitial commit. (diff)
downloadfirefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz
firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip
Adding upstream version 115.7.0esr.upstream/115.7.0esrupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/cache/CacheOpParent.cpp')
-rw-r--r--dom/cache/CacheOpParent.cpp323
1 files changed, 323 insertions, 0 deletions
diff --git a/dom/cache/CacheOpParent.cpp b/dom/cache/CacheOpParent.cpp
new file mode 100644
index 0000000000..288eb5618b
--- /dev/null
+++ b/dom/cache/CacheOpParent.cpp
@@ -0,0 +1,323 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "mozilla/dom/cache/CacheOpParent.h"
+
+#include "mozilla/StaticPrefs_browser.h"
+#include "mozilla/Unused.h"
+#include "mozilla/dom/cache/AutoUtils.h"
+#include "mozilla/dom/cache/ManagerId.h"
+#include "mozilla/dom/cache/ReadStream.h"
+#include "mozilla/dom/cache/SavedTypes.h"
+#include "mozilla/ipc/InputStreamUtils.h"
+#include "mozilla/ipc/IPCStreamUtils.h"
+
+namespace mozilla::dom::cache {
+
+using mozilla::ipc::PBackgroundParent;
+
+CacheOpParent::CacheOpParent(PBackgroundParent* aIpcManager, CacheId aCacheId,
+ const CacheOpArgs& aOpArgs)
+ : mIpcManager(aIpcManager),
+ mCacheId(aCacheId),
+ mNamespace(INVALID_NAMESPACE),
+ mOpArgs(aOpArgs) {
+ MOZ_DIAGNOSTIC_ASSERT(mIpcManager);
+}
+
+CacheOpParent::CacheOpParent(PBackgroundParent* aIpcManager,
+ Namespace aNamespace, const CacheOpArgs& aOpArgs)
+ : mIpcManager(aIpcManager),
+ mCacheId(INVALID_CACHE_ID),
+ mNamespace(aNamespace),
+ mOpArgs(aOpArgs) {
+ MOZ_DIAGNOSTIC_ASSERT(mIpcManager);
+}
+
+CacheOpParent::~CacheOpParent() { NS_ASSERT_OWNINGTHREAD(CacheOpParent); }
+
+void CacheOpParent::Execute(const SafeRefPtr<ManagerId>& aManagerId) {
+ NS_ASSERT_OWNINGTHREAD(CacheOpParent);
+ MOZ_DIAGNOSTIC_ASSERT(!mManager);
+ MOZ_DIAGNOSTIC_ASSERT(!mVerifier);
+
+ auto managerOrErr = cache::Manager::AcquireCreateIfNonExistent(aManagerId);
+ if (NS_WARN_IF(managerOrErr.isErr())) {
+ ErrorResult result(managerOrErr.unwrapErr());
+ Unused << Send__delete__(this, std::move(result), void_t());
+ return;
+ }
+
+ Execute(managerOrErr.unwrap());
+}
+
+void CacheOpParent::Execute(SafeRefPtr<cache::Manager> aManager) {
+ NS_ASSERT_OWNINGTHREAD(CacheOpParent);
+ MOZ_DIAGNOSTIC_ASSERT(!mManager);
+ MOZ_DIAGNOSTIC_ASSERT(!mVerifier);
+
+ mManager = std::move(aManager);
+
+ // Handle put op
+ if (mOpArgs.type() == CacheOpArgs::TCachePutAllArgs) {
+ MOZ_DIAGNOSTIC_ASSERT(mCacheId != INVALID_CACHE_ID);
+
+ const CachePutAllArgs& args = mOpArgs.get_CachePutAllArgs();
+ const nsTArray<CacheRequestResponse>& list = args.requestResponseList();
+
+ AutoTArray<nsCOMPtr<nsIInputStream>, 256> requestStreamList;
+ AutoTArray<nsCOMPtr<nsIInputStream>, 256> responseStreamList;
+
+ for (uint32_t i = 0; i < list.Length(); ++i) {
+ requestStreamList.AppendElement(
+ DeserializeCacheStream(list[i].request().body()));
+ responseStreamList.AppendElement(
+ DeserializeCacheStream(list[i].response().body()));
+ }
+
+ mManager->ExecutePutAll(this, mCacheId, args.requestResponseList(),
+ requestStreamList, responseStreamList);
+ return;
+ }
+
+ // Handle all other cache ops
+ if (mCacheId != INVALID_CACHE_ID) {
+ MOZ_DIAGNOSTIC_ASSERT(mNamespace == INVALID_NAMESPACE);
+ mManager->ExecuteCacheOp(this, mCacheId, mOpArgs);
+ return;
+ }
+
+ // Handle all storage ops
+ MOZ_DIAGNOSTIC_ASSERT(mNamespace != INVALID_NAMESPACE);
+ mManager->ExecuteStorageOp(this, mNamespace, mOpArgs);
+}
+
+void CacheOpParent::WaitForVerification(PrincipalVerifier* aVerifier) {
+ NS_ASSERT_OWNINGTHREAD(CacheOpParent);
+ MOZ_DIAGNOSTIC_ASSERT(!mManager);
+ MOZ_DIAGNOSTIC_ASSERT(!mVerifier);
+
+ mVerifier = aVerifier;
+ mVerifier->AddListener(*this);
+}
+
+void CacheOpParent::ActorDestroy(ActorDestroyReason aReason) {
+ NS_ASSERT_OWNINGTHREAD(CacheOpParent);
+
+ if (mVerifier) {
+ mVerifier->RemoveListener(*this);
+ mVerifier = nullptr;
+ }
+
+ if (mManager) {
+ mManager->RemoveListener(this);
+ mManager = nullptr;
+ }
+
+ mIpcManager = nullptr;
+}
+
+void CacheOpParent::OnPrincipalVerified(
+ nsresult aRv, const SafeRefPtr<ManagerId>& aManagerId) {
+ NS_ASSERT_OWNINGTHREAD(CacheOpParent);
+
+ mVerifier->RemoveListener(*this);
+ mVerifier = nullptr;
+
+ if (NS_WARN_IF(NS_FAILED(aRv))) {
+ ErrorResult result(aRv);
+ Unused << Send__delete__(this, std::move(result), void_t());
+ return;
+ }
+
+ Execute(aManagerId);
+}
+
+void CacheOpParent::OnOpComplete(ErrorResult&& aRv,
+ const CacheOpResult& aResult,
+ CacheId aOpenedCacheId,
+ const Maybe<StreamInfo>& aStreamInfo) {
+ NS_ASSERT_OWNINGTHREAD(CacheOpParent);
+ MOZ_DIAGNOSTIC_ASSERT(mIpcManager);
+ MOZ_DIAGNOSTIC_ASSERT(mManager);
+
+ // Never send an op-specific result if we have an error. Instead, send
+ // void_t() to ensure that we don't leak actors on the child side.
+ if (NS_WARN_IF(aRv.Failed())) {
+ Unused << Send__delete__(this, std::move(aRv), void_t());
+ return;
+ }
+
+ if (aStreamInfo.isSome()) {
+ ProcessCrossOriginResourcePolicyHeader(aRv,
+ aStreamInfo->mSavedResponseList);
+ if (NS_WARN_IF(aRv.Failed())) {
+ Unused << Send__delete__(this, std::move(aRv), void_t());
+ return;
+ }
+ }
+
+ uint32_t entryCount =
+ std::max(1lu, aStreamInfo ? static_cast<unsigned long>(std::max(
+ aStreamInfo->mSavedResponseList.Length(),
+ aStreamInfo->mSavedRequestList.Length()))
+ : 0lu);
+
+ // The result must contain the appropriate type at this point. It may
+ // or may not contain the additional result data yet. For types that
+ // do not need special processing, it should already be set. If the
+ // result requires actor-specific operations, then we do that below.
+ // If the type and data types don't match, then we will trigger an
+ // assertion in AutoParentOpResult::Add().
+ AutoParentOpResult result(mIpcManager, aResult, entryCount);
+
+ if (aOpenedCacheId != INVALID_CACHE_ID) {
+ result.Add(aOpenedCacheId, mManager.clonePtr());
+ }
+
+ if (aStreamInfo) {
+ const auto& streamInfo = *aStreamInfo;
+
+ for (const auto& savedResponse : streamInfo.mSavedResponseList) {
+ result.Add(savedResponse, streamInfo.mStreamList);
+ }
+
+ for (const auto& savedRequest : streamInfo.mSavedRequestList) {
+ result.Add(savedRequest, streamInfo.mStreamList);
+ }
+ }
+
+ Unused << Send__delete__(this, std::move(aRv), result.SendAsOpResult());
+}
+
+already_AddRefed<nsIInputStream> CacheOpParent::DeserializeCacheStream(
+ const Maybe<CacheReadStream>& aMaybeStream) {
+ if (aMaybeStream.isNothing()) {
+ return nullptr;
+ }
+
+ nsCOMPtr<nsIInputStream> stream;
+ const CacheReadStream& readStream = aMaybeStream.ref();
+
+ // Option 1: One of our own ReadStreams was passed back to us with a stream
+ // control actor.
+ stream = ReadStream::Create(readStream);
+ if (stream) {
+ return stream.forget();
+ }
+
+ // Option 2: A stream was serialized using normal methods or passed
+ // as a DataPipe. Use the standard method for extracting the
+ // resulting stream.
+ return DeserializeIPCStream(readStream.stream());
+}
+
+void CacheOpParent::ProcessCrossOriginResourcePolicyHeader(
+ ErrorResult& aRv, const nsTArray<SavedResponse>& aResponses) {
+ if (!StaticPrefs::browser_tabs_remote_useCrossOriginEmbedderPolicy()) {
+ return;
+ }
+ // Only checking for match/matchAll.
+ nsILoadInfo::CrossOriginEmbedderPolicy loadingCOEP =
+ nsILoadInfo::EMBEDDER_POLICY_NULL;
+ Maybe<mozilla::ipc::PrincipalInfo> principalInfo;
+ switch (mOpArgs.type()) {
+ case CacheOpArgs::TCacheMatchArgs: {
+ const auto& request = mOpArgs.get_CacheMatchArgs().request();
+ loadingCOEP = request.loadingEmbedderPolicy();
+ principalInfo = request.principalInfo();
+ break;
+ }
+ case CacheOpArgs::TCacheMatchAllArgs: {
+ if (mOpArgs.get_CacheMatchAllArgs().maybeRequest().isSome()) {
+ const auto& request =
+ mOpArgs.get_CacheMatchAllArgs().maybeRequest().ref();
+ loadingCOEP = request.loadingEmbedderPolicy();
+ principalInfo = request.principalInfo();
+ }
+ break;
+ }
+ default: {
+ return;
+ }
+ }
+
+ // skip checking if the request has no principal for same-origin/same-site
+ // checking.
+ if (principalInfo.isNothing() ||
+ principalInfo.ref().type() !=
+ mozilla::ipc::PrincipalInfo::TContentPrincipalInfo) {
+ return;
+ }
+ const mozilla::ipc::ContentPrincipalInfo& contentPrincipalInfo =
+ principalInfo.ref().get_ContentPrincipalInfo();
+
+ for (auto it = aResponses.cbegin(); it != aResponses.cend(); ++it) {
+ if (it->mValue.type() != ResponseType::Opaque &&
+ it->mValue.type() != ResponseType::Opaqueredirect) {
+ continue;
+ }
+
+ const auto& headers = it->mValue.headers();
+ const RequestCredentials credentials = it->mValue.credentials();
+ const auto corpHeaderIt =
+ std::find_if(headers.cbegin(), headers.cend(), [](const auto& header) {
+ return header.name().EqualsLiteral("Cross-Origin-Resource-Policy");
+ });
+
+ // According to https://github.com/w3c/ServiceWorker/issues/1490, the cache
+ // response is expected with CORP header, otherwise, throw the type error.
+ // Note that this is different with the CORP checking for fetch metioned in
+ // https://wicg.github.io/cross-origin-embedder-policy/#corp-check.
+ // For fetch, if the response has no CORP header, "same-origin" checking
+ // will be performed.
+ if (corpHeaderIt == headers.cend() &&
+ loadingCOEP == nsILoadInfo::EMBEDDER_POLICY_REQUIRE_CORP) {
+ aRv.ThrowTypeError("Response is expected with CORP header.");
+ return;
+ }
+
+ // Skip the case if the response has no principal for same-origin/same-site
+ // checking.
+ if (it->mValue.principalInfo().isNothing() ||
+ it->mValue.principalInfo().ref().type() !=
+ mozilla::ipc::PrincipalInfo::TContentPrincipalInfo) {
+ continue;
+ }
+
+ const mozilla::ipc::ContentPrincipalInfo& responseContentPrincipalInfo =
+ it->mValue.principalInfo().ref().get_ContentPrincipalInfo();
+
+ nsCString corp =
+ corpHeaderIt == headers.cend() ? EmptyCString() : corpHeaderIt->value();
+
+ if (corp.IsEmpty()) {
+ if (loadingCOEP == nsILoadInfo::EMBEDDER_POLICY_CREDENTIALLESS) {
+ // This means the request of this request doesn't have
+ // credentials, so it's safe for us to return.
+ if (credentials == RequestCredentials::Omit) {
+ return;
+ }
+ corp = "same-origin";
+ }
+ }
+
+ if (corp.EqualsLiteral("same-origin")) {
+ if (responseContentPrincipalInfo != contentPrincipalInfo) {
+ aRv.ThrowTypeError("Response is expected from same origin.");
+ return;
+ }
+ } else if (corp.EqualsLiteral("same-site")) {
+ if (!responseContentPrincipalInfo.baseDomain().Equals(
+ contentPrincipalInfo.baseDomain())) {
+ aRv.ThrowTypeError("Response is expected from same site.");
+ return;
+ }
+ }
+ }
+}
+
+} // namespace mozilla::dom::cache