/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef mozilla_dom_workers_WorkerLoadInfo_h #define mozilla_dom_workers_WorkerLoadInfo_h #include "mozilla/OriginAttributes.h" #include "mozilla/StorageAccess.h" #include "mozilla/OriginTrials.h" #include "mozilla/UniquePtr.h" #include "mozilla/dom/ChannelInfo.h" #include "mozilla/net/NeckoChannelParams.h" #include "mozilla/dom/ServiceWorkerRegistrationDescriptor.h" #include "mozilla/dom/WorkerCommon.h" #include "nsIInterfaceRequestor.h" #include "nsILoadContext.h" #include "nsIRequest.h" #include "nsISupportsImpl.h" #include "nsIWeakReferenceUtils.h" #include "nsTArray.h" class nsIChannel; class nsIContentSecurityPolicy; class nsICookieJarSettings; class nsILoadGroup; class nsIPrincipal; class nsIReferrerInfo; class nsIRunnable; class nsIScriptContext; class nsIBrowserChild; class nsIURI; class nsPIDOMWindowInner; namespace mozilla { namespace ipc { class PrincipalInfo; class CSPInfo; } // namespace ipc namespace dom { class WorkerPrivate; struct WorkerLoadInfoData { // All of these should be released in // WorkerPrivateParent::ForgetMainThreadObjects. nsCOMPtr mBaseURI; nsCOMPtr mResolvedScriptURI; // This is the principal of the global (parent worker or a window) loading // the worker. It can be null if we are executing a ServiceWorker, otherwise, // except for data: URL, it must subsumes the worker principal. // If we load a data: URL, mPrincipal will be a null principal. nsCOMPtr mLoadingPrincipal; nsCOMPtr mPrincipal; nsCOMPtr mPartitionedPrincipal; // Taken from the parent context. nsCOMPtr mCookieJarSettings; // The CookieJarSettingsArgs of mCookieJarSettings. // This is specific for accessing on worker thread. net::CookieJarSettingsArgs mCookieJarSettingsArgs; nsCOMPtr mScriptContext; nsCOMPtr mWindow; nsCOMPtr mCSP; // Thread boundaries require us to not only store a CSP object, but also a // serialized version of the CSP. Reason being: Serializing a CSP to a CSPInfo // needs to happen on the main thread, but storing the CSPInfo needs to happen // on the worker thread. We move the CSPInfo into the Client within // ScriptLoader::PreRun(). UniquePtr mCSPInfo; nsCOMPtr mChannel; nsCOMPtr mLoadGroup; class InterfaceRequestor final : public nsIInterfaceRequestor { NS_DECL_ISUPPORTS public: InterfaceRequestor(nsIPrincipal* aPrincipal, nsILoadGroup* aLoadGroup); void MaybeAddBrowserChild(nsILoadGroup* aLoadGroup); NS_IMETHOD GetInterface(const nsIID& aIID, void** aSink) override; void SetOuterRequestor(nsIInterfaceRequestor* aOuterRequestor) { MOZ_ASSERT(!mOuterRequestor); MOZ_ASSERT(aOuterRequestor); mOuterRequestor = aOuterRequestor; } private: ~InterfaceRequestor() = default; already_AddRefed GetAnyLiveBrowserChild(); nsCOMPtr mLoadContext; nsCOMPtr mOuterRequestor; // Array of weak references to nsIBrowserChild. We do not want to keep // BrowserChild actors alive for long after their ActorDestroy() methods are // called. nsTArray mBrowserChildList; }; // Only set if we have a custom overriden load group RefPtr mInterfaceRequestor; UniquePtr mPrincipalInfo; UniquePtr mPartitionedPrincipalInfo; nsCString mDomain; nsString mServiceWorkerCacheName; Maybe mServiceWorkerDescriptor; Maybe mServiceWorkerRegistrationDescriptor; Maybe mParentController; nsID mAgentClusterId; ChannelInfo mChannelInfo; nsLoadFlags mLoadFlags; uint64_t mWindowID; uint64_t mAssociatedBrowsingContextID; nsCOMPtr mReferrerInfo; OriginTrials mTrials; bool mFromWindow; bool mEvalAllowed; bool mReportEvalCSPViolations; bool mWasmEvalAllowed; bool mReportWasmEvalCSPViolations; bool mXHRParamsAllowed; bool mWatchedByDevTools; StorageAccess mStorageAccess; bool mUseRegularPrincipal; bool mHasStorageAccessPermissionGranted; bool mServiceWorkersTestingInWindow; bool mShouldResistFingerprinting; OriginAttributes mOriginAttributes; bool mIsThirdPartyContextToTopWindow; enum { eNotSet, eInsecureContext, eSecureContext, } mSecureContext; WorkerLoadInfoData(); WorkerLoadInfoData(WorkerLoadInfoData&& aOther) = default; WorkerLoadInfoData& operator=(WorkerLoadInfoData&& aOther) = default; }; struct WorkerLoadInfo : WorkerLoadInfoData { WorkerLoadInfo(); WorkerLoadInfo(WorkerLoadInfo&& aOther) noexcept; ~WorkerLoadInfo(); WorkerLoadInfo& operator=(WorkerLoadInfo&& aOther) = default; nsresult SetPrincipalsAndCSPOnMainThread(nsIPrincipal* aPrincipal, nsIPrincipal* aPartitionedPrincipal, nsILoadGroup* aLoadGroup, nsIContentSecurityPolicy* aCSP); nsresult GetPrincipalsAndLoadGroupFromChannel( nsIChannel* aChannel, nsIPrincipal** aPrincipalOut, nsIPrincipal** aPartitionedPrincipalOut, nsILoadGroup** aLoadGroupOut); nsresult SetPrincipalsAndCSPFromChannel(nsIChannel* aChannel); bool FinalChannelPrincipalIsValid(nsIChannel* aChannel); #ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED bool PrincipalIsValid() const; bool PrincipalURIMatchesScriptURL(); #endif bool ProxyReleaseMainThreadObjects(WorkerPrivate* aWorkerPrivate); bool ProxyReleaseMainThreadObjects( WorkerPrivate* aWorkerPrivate, nsCOMPtr&& aLoadGroupToCancel); }; } // namespace dom } // namespace mozilla #endif // mozilla_dom_workers_WorkerLoadInfo_h