Source code

Revision control

Copy as Markdown

Other Tools

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "IDBFactory.h"
#include "BackgroundChildImpl.h"
#include "IDBRequest.h"
#include "IndexedDatabaseManager.h"
#include "mozilla/BasePrincipal.h"
#include "mozilla/ErrorResult.h"
#include "mozilla/Preferences.h"
#include "mozilla/dom/BindingDeclarations.h"
#include "mozilla/dom/Document.h"
#include "mozilla/dom/IDBFactoryBinding.h"
#include "mozilla/dom/Promise.h"
#include "mozilla/dom/quota/PrincipalUtils.h"
#include "mozilla/dom/quota/QuotaManager.h"
#include "mozilla/dom/quota/ResultExtensions.h"
#include "mozilla/dom/BrowserChild.h"
#include "mozilla/dom/WorkerPrivate.h"
#include "mozilla/ipc/BackgroundChild.h"
#include "mozilla/ipc/BackgroundUtils.h"
#include "mozilla/ipc/PBackground.h"
#include "mozilla/ipc/PBackgroundChild.h"
#include "mozilla/StaticPrefs_dom.h"
#include "mozilla/StorageAccess.h"
#include "mozilla/Telemetry.h"
#include "nsAboutProtocolUtils.h"
#include "nsContentUtils.h"
#include "nsGlobalWindowInner.h"
#include "nsIAboutModule.h"
#include "nsILoadContext.h"
#include "nsIURI.h"
#include "nsIUUIDGenerator.h"
#include "nsIWebNavigation.h"
#include "nsLiteralString.h"
#include "nsStringFwd.h"
#include "nsNetUtil.h"
#include "nsSandboxFlags.h"
#include "nsServiceManagerUtils.h"
#include "ProfilerHelpers.h"
#include "ReportInternalError.h"
#include "ThreadLocal.h"
// Include this last to avoid path problems on Windows.
#include "ActorsChild.h"
namespace mozilla::dom {
using namespace mozilla::dom::indexedDB;
using namespace mozilla::dom::quota;
using namespace mozilla::ipc;
namespace {
constexpr nsLiteralCString kAccessError("The operation is insecure");
} // namespace
struct IDBFactory::PendingRequestInfo {
RefPtr<IDBOpenDBRequest> mRequest;
FactoryRequestParams mParams;
PendingRequestInfo(IDBOpenDBRequest* aRequest,
const FactoryRequestParams& aParams)
: mRequest(aRequest), mParams(aParams) {
MOZ_ASSERT(aRequest);
MOZ_ASSERT(aParams.type() != FactoryRequestParams::T__None);
}
};
IDBFactory::IDBFactory(const IDBFactoryGuard&, bool aAllowed)
: mBackgroundActor(nullptr),
mInnerWindowID(0),
mActiveTransactionCount(0),
mActiveDatabaseCount(0),
mAllowed(aAllowed),
mBackgroundActorFailed(false),
mPrivateBrowsingMode(false) {
AssertIsOnOwningThread();
}
IDBFactory::~IDBFactory() {
MOZ_ASSERT_IF(mBackgroundActorFailed, !mBackgroundActor);
if (mBackgroundActor) {
mBackgroundActor->SendDeleteMeInternal();
MOZ_ASSERT(!mBackgroundActor, "SendDeleteMeInternal should have cleared!");
}
}
// static
Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForWindow(
nsPIDOMWindowInner* aWindow) {
MOZ_ASSERT(NS_IsMainThread());
MOZ_ASSERT(aWindow);
nsCOMPtr<nsIPrincipal> principal;
nsresult rv = AllowedForWindowInternal(aWindow, &principal);
if (NS_WARN_IF(NS_FAILED(rv))) {
if (rv == NS_ERROR_DOM_NOT_SUPPORTED_ERR) {
NS_WARNING("IndexedDB is not permitted in a third-party window.");
}
if (rv == NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR) {
IDB_REPORT_INTERNAL_ERR();
}
auto factory =
MakeRefPtr<IDBFactory>(IDBFactoryGuard{}, /* aAllowed */ false);
factory->BindToOwner(aWindow->AsGlobal());
factory->mInnerWindowID = aWindow->WindowID();
return factory;
}
MOZ_ASSERT(principal);
auto principalInfo = MakeUnique<PrincipalInfo>();
rv = PrincipalToPrincipalInfo(principal, principalInfo.get());
if (NS_WARN_IF(NS_FAILED(rv))) {
IDB_REPORT_INTERNAL_ERR();
return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
}
MOZ_ASSERT(principalInfo->type() == PrincipalInfo::TContentPrincipalInfo ||
principalInfo->type() == PrincipalInfo::TSystemPrincipalInfo);
if (NS_WARN_IF(!quota::IsPrincipalInfoValid(*principalInfo))) {
IDB_REPORT_INTERNAL_ERR();
return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
}
nsCOMPtr<nsIWebNavigation> webNav = do_GetInterface(aWindow);
nsCOMPtr<nsILoadContext> loadContext = do_QueryInterface(webNav);
auto factory = MakeRefPtr<IDBFactory>(IDBFactoryGuard{}, /* aAllowed */ true);
factory->mPrincipalInfo = std::move(principalInfo);
factory->BindToOwner(aWindow->AsGlobal());
factory->mBrowserChild = BrowserChild::GetFrom(aWindow);
factory->mEventTarget =
nsGlobalWindowInner::Cast(aWindow)->SerialEventTarget();
factory->mInnerWindowID = aWindow->WindowID();
factory->mPrivateBrowsingMode =
loadContext && loadContext->UsePrivateBrowsing();
return factory;
}
// static
Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForMainThreadJS(
nsIGlobalObject* aGlobal) {
MOZ_ASSERT(NS_IsMainThread());
MOZ_ASSERT(aGlobal);
nsCOMPtr<nsIScriptObjectPrincipal> sop = do_QueryInterface(aGlobal);
if (NS_WARN_IF(!sop)) {
return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
}
auto principalInfo = MakeUnique<PrincipalInfo>();
nsIPrincipal* principal = sop->GetEffectiveStoragePrincipal();
MOZ_ASSERT(principal);
bool isSystem;
if (!AllowedForPrincipal(principal, &isSystem)) {
auto factory =
MakeRefPtr<IDBFactory>(IDBFactoryGuard{}, /* aAllowed */ false);
factory->BindToOwner(aGlobal);
return factory;
}
nsresult rv = PrincipalToPrincipalInfo(principal, principalInfo.get());
if (NS_WARN_IF(NS_FAILED(rv))) {
return Err(rv);
}
if (NS_WARN_IF(!quota::IsPrincipalInfoValid(*principalInfo))) {
return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
}
return CreateForMainThreadJSInternal(aGlobal, std::move(principalInfo));
}
// static
Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForWorker(
nsIGlobalObject* aGlobal, UniquePtr<PrincipalInfo>&& aPrincipalInfo,
uint64_t aInnerWindowID) {
MOZ_ASSERT(!NS_IsMainThread());
MOZ_ASSERT(aGlobal);
if (!aPrincipalInfo) {
auto factory =
MakeRefPtr<IDBFactory>(IDBFactoryGuard{}, /* aAllowed */ false);
factory->BindToOwner(aGlobal);
factory->mInnerWindowID = aInnerWindowID;
return factory;
}
MOZ_ASSERT(aPrincipalInfo->type() != PrincipalInfo::T__None);
return CreateInternal(aGlobal, std::move(aPrincipalInfo), aInnerWindowID);
}
// static
Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateForMainThreadJSInternal(
nsIGlobalObject* aGlobal, UniquePtr<PrincipalInfo> aPrincipalInfo) {
MOZ_ASSERT(NS_IsMainThread());
MOZ_ASSERT(aGlobal);
MOZ_ASSERT(aPrincipalInfo);
IndexedDatabaseManager* mgr = IndexedDatabaseManager::GetOrCreate();
if (NS_WARN_IF(!mgr)) {
IDB_REPORT_INTERNAL_ERR();
return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
}
nsresult rv = mgr->EnsureLocale();
if (NS_WARN_IF(NS_FAILED(rv))) {
IDB_REPORT_INTERNAL_ERR();
return Err(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
};
return CreateInternal(aGlobal, std::move(aPrincipalInfo),
/* aInnerWindowID */ 0);
}
// static
Result<RefPtr<IDBFactory>, nsresult> IDBFactory::CreateInternal(
nsIGlobalObject* aGlobal, UniquePtr<PrincipalInfo> aPrincipalInfo,
uint64_t aInnerWindowID) {
MOZ_ASSERT(aGlobal);
MOZ_ASSERT(aPrincipalInfo);
MOZ_ASSERT(aPrincipalInfo->type() != PrincipalInfo::T__None);
if (aPrincipalInfo->type() != PrincipalInfo::TContentPrincipalInfo &&
aPrincipalInfo->type() != PrincipalInfo::TSystemPrincipalInfo) {
NS_WARNING("IndexedDB not allowed for this principal!");
auto factory =
MakeRefPtr<IDBFactory>(IDBFactoryGuard{}, /* aAllowed */ false);
factory->BindToOwner(aGlobal);
factory->mInnerWindowID = aInnerWindowID;
return factory;
}
auto factory = MakeRefPtr<IDBFactory>(IDBFactoryGuard{}, /* aAllowed */ true);
factory->mPrincipalInfo = std::move(aPrincipalInfo);
factory->BindToOwner(aGlobal);
factory->mEventTarget = GetCurrentSerialEventTarget();
factory->mInnerWindowID = aInnerWindowID;
return factory;
}
// static
bool IDBFactory::AllowedForWindow(nsPIDOMWindowInner* aWindow) {
MOZ_ASSERT(NS_IsMainThread());
MOZ_ASSERT(aWindow);
return !NS_WARN_IF(NS_FAILED(AllowedForWindowInternal(aWindow, nullptr)));
}
// static
nsresult IDBFactory::AllowedForWindowInternal(
nsPIDOMWindowInner* aWindow, nsCOMPtr<nsIPrincipal>* aPrincipal) {
MOZ_ASSERT(NS_IsMainThread());
MOZ_ASSERT(aWindow);
IndexedDatabaseManager* mgr = IndexedDatabaseManager::GetOrCreate();
if (NS_WARN_IF(!mgr)) {
return NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR;
}
nsresult rv = mgr->EnsureLocale();
if (NS_WARN_IF(NS_FAILED(rv))) {
IDB_REPORT_INTERNAL_ERR();
return NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR;
};
StorageAccess access = StorageAllowedForWindow(aWindow);
// the factory callsite records whether the browser is in private browsing.
// and thus we don't have to respect that setting here. IndexedDB has no
// concept of session-local storage, and thus ignores it.
if (access == StorageAccess::eDeny) {
return NS_ERROR_DOM_SECURITY_ERR;
}
if (ShouldPartitionStorage(access) &&
!StoragePartitioningEnabled(
access, aWindow->GetExtantDoc()->CookieJarSettings())) {
return NS_ERROR_DOM_SECURITY_ERR;
}
nsCOMPtr<nsIScriptObjectPrincipal> sop = do_QueryInterface(aWindow);
MOZ_ASSERT(sop);
nsCOMPtr<nsIPrincipal> principal = sop->GetEffectiveStoragePrincipal();
if (NS_WARN_IF(!principal)) {
return NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR;
}
if (principal->IsSystemPrincipal()) {
*aPrincipal = std::move(principal);
return NS_OK;
}
// About URIs shouldn't be able to access IndexedDB unless they have the
// nsIAboutModule::ENABLE_INDEXED_DB flag set on them.
if (principal->SchemeIs("about")) {
uint32_t flags;
if (NS_SUCCEEDED(principal->GetAboutModuleFlags(&flags))) {
if (!(flags & nsIAboutModule::ENABLE_INDEXED_DB)) {
return NS_ERROR_DOM_NOT_SUPPORTED_ERR;
}
} else {
return NS_ERROR_DOM_NOT_SUPPORTED_ERR;
}
}
if (aPrincipal) {
*aPrincipal = std::move(principal);
}
return NS_OK;
}
// static
bool IDBFactory::AllowedForPrincipal(nsIPrincipal* aPrincipal,
bool* aIsSystemPrincipal) {
MOZ_ASSERT(NS_IsMainThread());
MOZ_ASSERT(aPrincipal);
IndexedDatabaseManager* mgr = IndexedDatabaseManager::GetOrCreate();
if (NS_WARN_IF(!mgr)) {
return false;
}
nsresult rv = mgr->EnsureLocale();
if (NS_WARN_IF(NS_FAILED(rv))) {
return false;
};
if (aPrincipal->IsSystemPrincipal()) {
if (aIsSystemPrincipal) {
*aIsSystemPrincipal = true;
}
return true;
}
if (aIsSystemPrincipal) {
*aIsSystemPrincipal = false;
}
return !aPrincipal->GetIsNullPrincipal();
}
// static
PersistenceType IDBFactory::GetPersistenceType(
const PrincipalInfo& aPrincipalInfo) {
if (aPrincipalInfo.type() == PrincipalInfo::TSystemPrincipalInfo) {
// Chrome privilege always gets persistent storage.
return PERSISTENCE_TYPE_PERSISTENT;
}
if (aPrincipalInfo.type() == PrincipalInfo::TContentPrincipalInfo) {
nsCString origin =
aPrincipalInfo.get_ContentPrincipalInfo().originNoSuffix();
if (QuotaManager::IsOriginInternal(origin)) {
// Internal origins always get persistent storage.
return PERSISTENCE_TYPE_PERSISTENT;
}
if (aPrincipalInfo.get_ContentPrincipalInfo().attrs().IsPrivateBrowsing()) {
return PERSISTENCE_TYPE_PRIVATE;
}
}
return PERSISTENCE_TYPE_DEFAULT;
}
void IDBFactory::UpdateActiveTransactionCount(int32_t aDelta) {
AssertIsOnOwningThread();
MOZ_ASSERT(mAllowed);
MOZ_DIAGNOSTIC_ASSERT(aDelta > 0 || (mActiveTransactionCount + aDelta) <
mActiveTransactionCount);
mActiveTransactionCount += aDelta;
}
void IDBFactory::UpdateActiveDatabaseCount(int32_t aDelta) {
AssertIsOnOwningThread();
MOZ_ASSERT(mAllowed);
MOZ_DIAGNOSTIC_ASSERT(aDelta > 0 ||
(mActiveDatabaseCount + aDelta) < mActiveDatabaseCount);
mActiveDatabaseCount += aDelta;
if (nsGlobalWindowInner* win = GetOwnerWindow()) {
win->UpdateActiveIndexedDBDatabaseCount(aDelta);
}
}
bool IDBFactory::IsChrome() const {
if (!mAllowed) {
return false; // Minimal privileges
}
AssertIsOnOwningThread();
MOZ_ASSERT(mPrincipalInfo);
return mPrincipalInfo->type() == PrincipalInfo::TSystemPrincipalInfo;
}
RefPtr<IDBOpenDBRequest> IDBFactory::Open(JSContext* aCx,
const nsAString& aName,
const Optional<uint64_t>& aVersion,
CallerType aCallerType,
ErrorResult& aRv) {
if (!mAllowed) {
aRv.ThrowSecurityError(kAccessError);
return nullptr;
}
return OpenInternal(aCx,
/* aPrincipal */ nullptr, aName, aVersion,
/* aDeleting */ false, aCallerType, aRv);
}
RefPtr<IDBOpenDBRequest> IDBFactory::DeleteDatabase(JSContext* aCx,
const nsAString& aName,
CallerType aCallerType,
ErrorResult& aRv) {
if (!mAllowed) {
aRv.ThrowSecurityError(kAccessError);
return nullptr;
}
return OpenInternal(aCx,
/* aPrincipal */ nullptr, aName, Optional<uint64_t>(),
/* aDeleting */ true, aCallerType, aRv);
}
already_AddRefed<Promise> IDBFactory::Databases(JSContext* const aCx,
ErrorResult& aRv) {
if (NS_WARN_IF(!GetOwnerGlobal())) {
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
RefPtr<Promise> promise = Promise::CreateInfallible(GetOwnerGlobal());
if (!mAllowed) {
promise->MaybeRejectWithSecurityError(kAccessError);
return promise.forget();
}
// Nothing can be done here if we have previously failed to create a
// background actor.
if (mBackgroundActorFailed) {
promise->MaybeReject(NS_ERROR_FAILURE);
return promise.forget();
}
PersistenceType persistenceType = GetPersistenceType(*mPrincipalInfo);
QM_TRY(MOZ_TO_RESULT(EnsureBackgroundActor()), [&promise](const nsresult rv) {
promise->MaybeReject(rv);
return promise.forget();
});
mBackgroundActor->SendGetDatabases(persistenceType, *mPrincipalInfo)
->Then(
GetCurrentSerialEventTarget(), __func__,
[promise](const PBackgroundIDBFactoryChild::GetDatabasesPromise::
ResolveOrRejectValue& aValue) {
if (aValue.IsReject()) {
promise->MaybeReject(NS_ERROR_FAILURE);
return;
}
const GetDatabasesResponse& response = aValue.ResolveValue();
switch (response.type()) {
case GetDatabasesResponse::Tnsresult:
promise->MaybeReject(response.get_nsresult());
break;
case GetDatabasesResponse::TArrayOfDatabaseMetadata: {
const auto& array = response.get_ArrayOfDatabaseMetadata();
Sequence<IDBDatabaseInfo> databaseInfos;
for (const auto& databaseMetadata : array) {
IDBDatabaseInfo databaseInfo;
databaseInfo.mName.Construct(databaseMetadata.name());
databaseInfo.mVersion.Construct(databaseMetadata.version());
if (!databaseInfos.AppendElement(std::move(databaseInfo),
fallible)) {
promise->MaybeRejectWithTypeError("Out of memory");
return;
}
}
promise->MaybeResolve(databaseInfos);
break;
}
default:
MOZ_CRASH("Unknown response type!");
}
});
return promise.forget();
}
int16_t IDBFactory::Cmp(JSContext* aCx, JS::Handle<JS::Value> aFirst,
JS::Handle<JS::Value> aSecond, ErrorResult& aRv) {
Key first, second;
auto result = first.SetFromJSVal(aCx, aFirst);
if (result.isErr()) {
aRv = result.unwrapErr().ExtractErrorResult(
InvalidMapsTo<NS_ERROR_DOM_INDEXEDDB_DATA_ERR>);
return 0;
}
result = second.SetFromJSVal(aCx, aSecond);
if (result.isErr()) {
aRv = result.unwrapErr().ExtractErrorResult(
InvalidMapsTo<NS_ERROR_DOM_INDEXEDDB_DATA_ERR>);
return 0;
}
if (first.IsUnset() || second.IsUnset()) {
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_DATA_ERR);
return 0;
}
return Key::CompareKeys(first, second);
}
RefPtr<IDBOpenDBRequest> IDBFactory::OpenForPrincipal(
JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName,
uint64_t aVersion, SystemCallerGuarantee aGuarantee, ErrorResult& aRv) {
if (!mAllowed) {
aRv.ThrowSecurityError(kAccessError);
return nullptr;
}
MOZ_ASSERT(aPrincipal);
if (!NS_IsMainThread()) {
MOZ_CRASH(
"Figure out security checks for workers! What's this aPrincipal "
"we have on a worker thread?");
}
return OpenInternal(aCx, aPrincipal, aName, Optional<uint64_t>(aVersion),
/* aDeleting */ false, aGuarantee, aRv);
}
RefPtr<IDBOpenDBRequest> IDBFactory::OpenForPrincipal(
JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName,
const IDBOpenDBOptions& aOptions, SystemCallerGuarantee aGuarantee,
ErrorResult& aRv) {
if (!mAllowed) {
aRv.ThrowSecurityError(kAccessError);
return nullptr;
}
MOZ_ASSERT(aPrincipal);
if (!NS_IsMainThread()) {
MOZ_CRASH(
"Figure out security checks for workers! What's this aPrincipal "
"we have on a worker thread?");
}
return OpenInternal(aCx, aPrincipal, aName, aOptions.mVersion,
/* aDeleting */ false, aGuarantee, aRv);
}
RefPtr<IDBOpenDBRequest> IDBFactory::DeleteForPrincipal(
JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName,
const IDBOpenDBOptions& aOptions, SystemCallerGuarantee aGuarantee,
ErrorResult& aRv) {
if (!mAllowed) {
aRv.ThrowSecurityError(kAccessError);
return nullptr;
}
MOZ_ASSERT(aPrincipal);
if (!NS_IsMainThread()) {
MOZ_CRASH(
"Figure out security checks for workers! What's this aPrincipal "
"we have on a worker thread?");
}
return OpenInternal(aCx, aPrincipal, aName, Optional<uint64_t>(),
/* aDeleting */ true, aGuarantee, aRv);
}
nsresult IDBFactory::EnsureBackgroundActor() {
MOZ_ASSERT(mAllowed);
if (mBackgroundActor) {
return NS_OK;
}
BackgroundChildImpl::ThreadLocal* threadLocal =
BackgroundChildImpl::GetThreadLocalForCurrentThread();
UniquePtr<ThreadLocal> newIDBThreadLocal;
ThreadLocal* idbThreadLocal;
if (threadLocal && threadLocal->mIndexedDBThreadLocal) {
idbThreadLocal = threadLocal->mIndexedDBThreadLocal.get();
} else {
nsCOMPtr<nsIUUIDGenerator> uuidGen =
do_GetService("@mozilla.org/uuid-generator;1");
MOZ_ASSERT(uuidGen);
nsID id{};
MOZ_ALWAYS_SUCCEEDS(uuidGen->GenerateUUIDInPlace(&id));
newIDBThreadLocal = WrapUnique(new ThreadLocal(id));
idbThreadLocal = newIDBThreadLocal.get();
}
PBackgroundChild* backgroundActor =
BackgroundChild::GetOrCreateForCurrentThread();
if (NS_WARN_IF(!backgroundActor)) {
return NS_ERROR_FAILURE;
}
{
BackgroundFactoryChild* actor = new BackgroundFactoryChild(*this);
mBackgroundActor = static_cast<BackgroundFactoryChild*>(
backgroundActor->SendPBackgroundIDBFactoryConstructor(
actor, idbThreadLocal->GetLoggingInfo(),
IndexedDatabaseManager::GetLocale()));
if (NS_WARN_IF(!mBackgroundActor)) {
return NS_ERROR_FAILURE;
}
}
if (newIDBThreadLocal) {
if (!threadLocal) {
threadLocal = BackgroundChildImpl::GetThreadLocalForCurrentThread();
}
MOZ_ASSERT(threadLocal);
MOZ_ASSERT(!threadLocal->mIndexedDBThreadLocal);
threadLocal->mIndexedDBThreadLocal = std::move(newIDBThreadLocal);
}
return NS_OK;
}
RefPtr<IDBOpenDBRequest> IDBFactory::OpenInternal(
JSContext* aCx, nsIPrincipal* aPrincipal, const nsAString& aName,
const Optional<uint64_t>& aVersion, bool aDeleting, CallerType aCallerType,
ErrorResult& aRv) {
MOZ_ASSERT(mAllowed);
if (NS_WARN_IF(!GetOwnerGlobal())) {
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
CommonFactoryRequestParams commonParams;
PrincipalInfo& principalInfo = commonParams.principalInfo();
if (aPrincipal) {
if (!NS_IsMainThread()) {
MOZ_CRASH(
"Figure out security checks for workers! What's this "
"aPrincipal we have on a worker thread?");
}
MOZ_ASSERT(aCallerType == CallerType::System);
MOZ_DIAGNOSTIC_ASSERT(mPrivateBrowsingMode ==
aPrincipal->GetIsInPrivateBrowsing());
if (NS_WARN_IF(
NS_FAILED(PrincipalToPrincipalInfo(aPrincipal, &principalInfo)))) {
IDB_REPORT_INTERNAL_ERR();
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
if (principalInfo.type() != PrincipalInfo::TContentPrincipalInfo &&
principalInfo.type() != PrincipalInfo::TSystemPrincipalInfo) {
IDB_REPORT_INTERNAL_ERR();
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
if (NS_WARN_IF(!quota::IsPrincipalInfoValid(principalInfo))) {
IDB_REPORT_INTERNAL_ERR();
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
} else {
if (GetOwnerGlobal()->GetStorageAccess() ==
StorageAccess::ePrivateBrowsing) {
if (NS_IsMainThread()) {
SetUseCounter(
GetOwnerGlobal()->GetGlobalJSObject(),
aDeleting
? eUseCounter_custom_PrivateBrowsingIDBFactoryOpen
: eUseCounter_custom_PrivateBrowsingIDBFactoryDeleteDatabase);
} else {
SetUseCounter(
aDeleting ? UseCounterWorker::Custom_PrivateBrowsingIDBFactoryOpen
: UseCounterWorker::
Custom_PrivateBrowsingIDBFactoryDeleteDatabase);
}
}
principalInfo = *mPrincipalInfo;
}
uint64_t version = 0;
if (!aDeleting && aVersion.WasPassed()) {
if (aVersion.Value() < 1) {
aRv.ThrowTypeError("0 (Zero) is not a valid database version.");
return nullptr;
}
version = aVersion.Value();
}
// Nothing can be done here if we have previously failed to create a
// background actor.
if (mBackgroundActorFailed) {
IDB_REPORT_INTERNAL_ERR();
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
PersistenceType persistenceType = GetPersistenceType(principalInfo);
DatabaseMetadata& metadata = commonParams.metadata();
metadata.name() = aName;
metadata.persistenceType() = persistenceType;
FactoryRequestParams params;
if (aDeleting) {
metadata.version() = 0;
params = DeleteDatabaseRequestParams(commonParams);
} else {
metadata.version() = version;
params = OpenDatabaseRequestParams(commonParams);
}
nsresult rv = EnsureBackgroundActor();
if (NS_WARN_IF(NS_FAILED(rv))) {
IDB_REPORT_INTERNAL_ERR();
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
RefPtr<IDBOpenDBRequest> request = IDBOpenDBRequest::Create(
aCx, SafeRefPtr{this, AcquireStrongRefFromRawPtr{}}, GetOwnerGlobal());
if (!request) {
MOZ_ASSERT(!NS_IsMainThread());
aRv.ThrowUncatchableException();
return nullptr;
}
MOZ_ASSERT(request);
if (aDeleting) {
IDB_LOG_MARK_CHILD_REQUEST(
"indexedDB.deleteDatabase(\"%s\")", "IDBFactory.deleteDatabase(%.0s)",
request->LoggingSerialNumber(), NS_ConvertUTF16toUTF8(aName).get());
} else {
IDB_LOG_MARK_CHILD_REQUEST(
"indexedDB.open(\"%s\", %s)", "IDBFactory.open(%.0s%.0s)",
request->LoggingSerialNumber(), NS_ConvertUTF16toUTF8(aName).get(),
IDB_LOG_STRINGIFY(aVersion));
}
rv = InitiateRequest(WrapNotNull(request), params);
if (NS_WARN_IF(NS_FAILED(rv))) {
IDB_REPORT_INTERNAL_ERR();
aRv.Throw(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return nullptr;
}
return request;
}
nsresult IDBFactory::InitiateRequest(
const NotNull<RefPtr<IDBOpenDBRequest>>& aRequest,
const FactoryRequestParams& aParams) {
MOZ_ASSERT(mAllowed);
MOZ_ASSERT(mBackgroundActor);
MOZ_ASSERT(!mBackgroundActorFailed);
bool deleting;
uint64_t requestedVersion;
switch (aParams.type()) {
case FactoryRequestParams::TDeleteDatabaseRequestParams: {
const DatabaseMetadata& metadata =
aParams.get_DeleteDatabaseRequestParams().commonParams().metadata();
deleting = true;
requestedVersion = metadata.version();
break;
}
case FactoryRequestParams::TOpenDatabaseRequestParams: {
const DatabaseMetadata& metadata =
aParams.get_OpenDatabaseRequestParams().commonParams().metadata();
deleting = false;
requestedVersion = metadata.version();
break;
}
default:
MOZ_CRASH("Should never get here!");
}
auto actor = new BackgroundFactoryRequestChild(
SafeRefPtr{this, AcquireStrongRefFromRawPtr{}}, aRequest, deleting,
requestedVersion);
if (!mBackgroundActor->SendPBackgroundIDBFactoryRequestConstructor(actor,
aParams)) {
aRequest->DispatchNonTransactionError(NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR);
return NS_ERROR_DOM_INDEXEDDB_UNKNOWN_ERR;
}
return NS_OK;
}
NS_IMPL_CYCLE_COLLECTING_ADDREF(IDBFactory)
NS_IMPL_CYCLE_COLLECTING_RELEASE(IDBFactory)
NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(IDBFactory)
NS_WRAPPERCACHE_INTERFACE_MAP_ENTRY
NS_INTERFACE_MAP_ENTRY(nsISupports)
NS_INTERFACE_MAP_END
NS_IMPL_CYCLE_COLLECTION_CLASS(IDBFactory)
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN(IDBFactory)
NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mBrowserChild)
NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mEventTarget)
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN(IDBFactory)
NS_IMPL_CYCLE_COLLECTION_UNLINK_PRESERVED_WRAPPER
NS_IMPL_CYCLE_COLLECTION_UNLINK(mBrowserChild)
NS_IMPL_CYCLE_COLLECTION_UNLINK(mEventTarget)
NS_IMPL_CYCLE_COLLECTION_UNLINK_END
NS_IMPL_CYCLE_COLLECTION_TRACE_BEGIN(IDBFactory)
NS_IMPL_CYCLE_COLLECTION_TRACE_PRESERVED_WRAPPER
NS_IMPL_CYCLE_COLLECTION_TRACE_END
JSObject* IDBFactory::WrapObject(JSContext* aCx,
JS::Handle<JSObject*> aGivenProto) {
return IDBFactory_Binding::Wrap(aCx, this, aGivenProto);
}
} // namespace mozilla::dom