/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ import { XPCOMUtils } from "resource://gre/modules/XPCOMUtils.sys.mjs"; const lazy = {}; ChromeUtils.defineESModuleGetters(lazy, { accessibility: "chrome://remote/content/marionette/accessibility.sys.mjs", allowAllCerts: "chrome://remote/content/marionette/cert.sys.mjs", Capabilities: "chrome://remote/content/shared/webdriver/Capabilities.sys.mjs", error: "chrome://remote/content/shared/webdriver/Errors.sys.mjs", Log: "chrome://remote/content/shared/Log.sys.mjs", registerProcessDataActor: "chrome://remote/content/shared/webdriver/process-actors/WebDriverProcessDataParent.sys.mjs", RootMessageHandler: "chrome://remote/content/shared/messagehandler/RootMessageHandler.sys.mjs", RootMessageHandlerRegistry: "chrome://remote/content/shared/messagehandler/RootMessageHandlerRegistry.sys.mjs", unregisterProcessDataActor: "chrome://remote/content/shared/webdriver/process-actors/WebDriverProcessDataParent.sys.mjs", WebDriverBiDiConnection: "chrome://remote/content/webdriver-bidi/WebDriverBiDiConnection.sys.mjs", WebSocketHandshake: "chrome://remote/content/server/WebSocketHandshake.sys.mjs", }); XPCOMUtils.defineLazyGetter(lazy, "logger", () => lazy.Log.get()); /** * Representation of WebDriver session. */ export class WebDriverSession { /** * Construct a new WebDriver session. * * It is expected that the caller performs the necessary checks on * the requested capabilities to be WebDriver conforming. The WebDriver * service offered by Marionette does not match or negotiate capabilities * beyond type- and bounds checks. * *

Capabilities

* *
*
acceptInsecureCerts (boolean) *
Indicates whether untrusted and self-signed TLS certificates * are implicitly trusted on navigation for the duration of the session. * *
pageLoadStrategy (string) *
The page load strategy to use for the current session. Must be * one of "none", "eager", and "normal". * *
proxy (Proxy object) *
Defines the proxy configuration. * *
setWindowRect (boolean) *
Indicates whether the remote end supports all of the resizing * and repositioning commands. * *
timeouts (Timeouts object) *
Describes the timeouts imposed on certian session operations. * *
strictFileInteractability (boolean) *
Defines the current session’s strict file interactability. * *
unhandledPromptBehavior (string) *
Describes the current session’s user prompt handler. Must be one of * "accept", "accept and notify", "dismiss", * "dismiss and notify", and "ignore". Defaults to the * "dismiss and notify" state. * *
moz:accessibilityChecks (boolean) *
Run a11y checks when clicking elements. * *
moz:debuggerAddress (boolean) *
Indicate that the Chrome DevTools Protocol (CDP) has to be enabled. * *
moz:useNonSpecCompliantPointerOrigin (boolean) *
Use the not WebDriver conforming calculation of the pointer origin * when the origin is an element, and the element center point is used. * *
moz:webdriverClick (boolean) *
Use a WebDriver conforming WebDriver::ElementClick. *
* *

Timeouts object

* *
*
script (number) *
Determines when to interrupt a script that is being evaluates. * *
pageLoad (number) *
Provides the timeout limit used to interrupt navigation of the * browsing context. * *
implicit (number) *
Gives the timeout of when to abort when locating an element. *
* *

Proxy object

* *
*
proxyType (string) *
Indicates the type of proxy configuration. Must be one * of "pac", "direct", "autodetect", * "system", or "manual". * *
proxyAutoconfigUrl (string) *
Defines the URL for a proxy auto-config file if * proxyType is equal to "pac". * *
httpProxy (string) *
Defines the proxy host for HTTP traffic when the * proxyType is "manual". * *
noProxy (string) *
Lists the adress for which the proxy should be bypassed when * the proxyType is "manual". Must be a JSON * List containing any number of any of domains, IPv4 addresses, or IPv6 * addresses. * *
sslProxy (string) *
Defines the proxy host for encrypted TLS traffic when the * proxyType is "manual". * *
socksProxy (string) *
Defines the proxy host for a SOCKS proxy traffic when the * proxyType is "manual". * *
socksVersion (string) *
Defines the SOCKS proxy version when the proxyType is * "manual". It must be any integer between 0 and 255 * inclusive. *
* *

Example

* * Input: * *

   *     {"capabilities": {"acceptInsecureCerts": true}}
   * 
* * @param {Object.=} capabilities * JSON Object containing any of the recognised capabilities listed * above. * * @param {WebDriverBiDiConnection=} connection * An optional existing WebDriver BiDi connection to associate with the * new session. * * @throws {SessionNotCreatedError} * If, for whatever reason, a session could not be created. */ constructor(capabilities, connection) { // WebSocket connections that use this session. This also accounts for // possible disconnects due to network outages, which require clients // to reconnect. this._connections = new Set(); this.id = Services.uuid .generateUUID() .toString() .slice(1, -1); // Define the HTTP path to query this session via WebDriver BiDi this.path = `/session/${this.id}`; try { this.capabilities = lazy.Capabilities.fromJSON(capabilities, this.path); } catch (e) { throw new lazy.error.SessionNotCreatedError(e); } if (this.capabilities.get("acceptInsecureCerts")) { lazy.logger.warn( "TLS certificate errors will be ignored for this session" ); lazy.allowAllCerts.enable(); } if (this.proxy.init()) { lazy.logger.info( `Proxy settings initialised: ${JSON.stringify(this.proxy)}` ); } // If we are testing accessibility with marionette, start a11y service in // chrome first. This will ensure that we do not have any content-only // services hanging around. if (this.a11yChecks && lazy.accessibility.service) { lazy.logger.info("Preemptively starting accessibility service in Chrome"); } // If a connection without an associated session has been specified // immediately register the newly created session for it. if (connection) { connection.registerSession(this); this._connections.add(connection); } lazy.registerProcessDataActor(); } destroy() { lazy.allowAllCerts.disable(); // Close all open connections which unregister themselves. this._connections.forEach(connection => connection.close()); if (this._connections.size > 0) { lazy.logger.warn( `Failed to close ${this._connections.size} WebSocket connections` ); } // Destroy the dedicated MessageHandler instance if we created one. if (this._messageHandler) { this._messageHandler.off( "message-handler-protocol-event", this._onMessageHandlerProtocolEvent ); this._messageHandler.destroy(); } lazy.unregisterProcessDataActor(); } async execute(module, command, params) { // XXX: At the moment, commands do not describe consistently their destination, // so we will need a translation step based on a specific command and its params // in order to extract a destination that can be understood by the MessageHandler. // // For now, an option is to send all commands to ROOT, and all BiDi MessageHandler // modules will therefore need to implement this translation step in the root // implementation of their module. const destination = { type: lazy.RootMessageHandler.type, }; if (!this.messageHandler.supportsCommand(module, command, destination)) { throw new lazy.error.UnknownCommandError(`${module}.${command}`); } return this.messageHandler.handleCommand({ moduleName: module, commandName: command, params, destination, }); } get a11yChecks() { return this.capabilities.get("moz:accessibilityChecks"); } get messageHandler() { if (!this._messageHandler) { this._messageHandler = lazy.RootMessageHandlerRegistry.getOrCreateMessageHandler( this.id ); this._onMessageHandlerProtocolEvent = this._onMessageHandlerProtocolEvent.bind( this ); this._messageHandler.on( "message-handler-protocol-event", this._onMessageHandlerProtocolEvent ); } return this._messageHandler; } get pageLoadStrategy() { return this.capabilities.get("pageLoadStrategy"); } get proxy() { return this.capabilities.get("proxy"); } get strictFileInteractability() { return this.capabilities.get("strictFileInteractability"); } get timeouts() { return this.capabilities.get("timeouts"); } set timeouts(timeouts) { this.capabilities.set("timeouts", timeouts); } get unhandledPromptBehavior() { return this.capabilities.get("unhandledPromptBehavior"); } /** * Remove the specified WebDriver BiDi connection. * * @param {WebDriverBiDiConnection} connection */ removeConnection(connection) { if (this._connections.has(connection)) { this._connections.delete(connection); } else { lazy.logger.warn("Trying to remove a connection that doesn't exist."); } } toString() { return `[object ${this.constructor.name} ${this.id}]`; } // nsIHttpRequestHandler /** * Handle new WebSocket connection requests. * * WebSocket clients will attempt to connect to this session at * `/session/:id`. Hereby a WebSocket upgrade will automatically * be performed. * * @param {Request} request * HTTP request (httpd.js) * @param {Response} response * Response to an HTTP request (httpd.js) */ async handle(request, response) { const webSocket = await lazy.WebSocketHandshake.upgrade(request, response); const conn = new lazy.WebDriverBiDiConnection( webSocket, response._connection ); conn.registerSession(this); this._connections.add(conn); } _onMessageHandlerProtocolEvent(eventName, messageHandlerEvent) { const { name, data } = messageHandlerEvent; this._connections.forEach(connection => connection.sendEvent(name, data)); } // XPCOM get QueryInterface() { return ChromeUtils.generateQI(["nsIHttpRequestHandler"]); } }