void ServiceWorkerManagerService::ProcessUpdaterActor( ServiceWorkerUpdaterParent* aActor, const OriginAttributes& aOriginAttributes, const nsACString& aScope, uint64_t aParentId) { AssertIsOnBackgroundThread(); MOZ_DIAGNOSTIC_ASSERT(!ServiceWorkerParentInterceptEnabled()); nsAutoCString suffix; aOriginAttributes.CreateSuffix(suffix); nsCString scope(aScope); scope.Append(suffix); for (uint32_t i = 0; i < mPendingUpdaterActors.Length(); ++i) { // We already have an actor doing this update on another process. if (mPendingUpdaterActors[i].mScope.Equals(scope) && mPendingUpdaterActors[i].mParentId != aParentId) { Unused << aActor->SendProceed(false); return; } } if (aActor->Proceed(this)) { PendingUpdaterActor* pua = mPendingUpdaterActors.AppendElement(); pua->mActor = aActor; pua->mScope = scope; pua->mParentId = aParentId; } }
static nsCString GetNodeId(const nsAString& aOrigin, const nsAString& aTopLevelOrigin, bool aInPBMode) { RefPtr<GeckoMediaPluginServiceParent> service = GeckoMediaPluginServiceParent::GetSingleton(); EXPECT_TRUE(service); nsCString nodeId; nsresult result; UniquePtr<GetNodeIdCallback> callback( new TestGetNodeIdCallback(nodeId, result)); OriginAttributes attrs; attrs.mPrivateBrowsingId = aInPBMode ? 1 : 0; nsAutoCString suffix; attrs.CreateSuffix(suffix); nsAutoString origin; origin.Assign(aOrigin); origin.Append(NS_ConvertUTF8toUTF16(suffix)); nsAutoString topLevelOrigin; topLevelOrigin.Assign(aTopLevelOrigin); topLevelOrigin.Append(NS_ConvertUTF8toUTF16(suffix)); // We rely on the fact that the GetNodeId implementation for // GeckoMediaPluginServiceParent is synchronous. nsresult rv = service->GetNodeId(origin, topLevelOrigin, NS_LITERAL_STRING("gmp-fake"), std::move(callback)); EXPECT_TRUE(NS_SUCCEEDED(rv) && NS_SUCCEEDED(result)); return nodeId; }
void OriginAttributes::CreateAnonymizedSuffix(nsACString& aStr) const { OriginAttributes attrs = *this; if (!attrs.mFirstPartyDomain.IsEmpty()) { attrs.mFirstPartyDomain.AssignLiteral("_anonymizedFirstPartyDomain_"); } attrs.CreateSuffix(aStr); }
static bool WriteSuffixAndSpec(JSStructuredCloneWriter* aWriter, const OriginAttributes& aAttrs, const nsCString& aSpec) { nsAutoCString suffix; aAttrs.CreateSuffix(suffix); return JS_WriteUint32Pair(aWriter, suffix.Length(), aSpec.Length()) && JS_WriteBytes(aWriter, suffix.get(), suffix.Length()) && JS_WriteBytes(aWriter, aSpec.get(), aSpec.Length()); }
// This is only a compatibility code for schema version 0. Returns the 'scope' // key in the schema version 0 format for the scope column. nsCString Scheme0Scope(const nsACString& aOriginSuffix, const nsACString& aOriginNoSuffix) { nsCString result; OriginAttributes oa; if (!aOriginSuffix.IsEmpty()) { DebugOnly<bool> success = oa.PopulateFromSuffix(aOriginSuffix); MOZ_ASSERT(success); } if (oa.mAppId != nsIScriptSecurityManager::NO_APP_ID || oa.mInIsolatedMozBrowser) { result.AppendInt(oa.mAppId); result.Append(':'); result.Append(oa.mInIsolatedMozBrowser ? 't' : 'f'); result.Append(':'); } // If there is more than just appid and/or inbrowser stored in origin // attributes, put it to the schema 0 scope as well. We must do that // to keep the scope column unique (same resolution as schema 1 has // with originAttributes and originKey columns) so that switch between // schema 1 and 0 always works in both ways. nsAutoCString remaining; oa.mAppId = 0; oa.mInIsolatedMozBrowser = false; oa.CreateSuffix(remaining); if (!remaining.IsEmpty()) { MOZ_ASSERT(!aOriginSuffix.IsEmpty()); if (result.IsEmpty()) { // Must contain the old prefix, otherwise we won't search for the whole // origin attributes suffix. result.AppendLiteral("0:f:"); } // Append the whole origin attributes suffix despite we have already stored // appid and inbrowser. We are only looking for it when the scope string // starts with "$appid:$inbrowser:" (with whatever valid values). // // The OriginAttributes suffix is a string in a form like: // "^addonId=101&userContextId=5" and it's ensured it always starts with '^' // and never contains ':'. See OriginAttributes::CreateSuffix. result.Append(aOriginSuffix); result.Append(':'); } result.Append(aOriginNoSuffix); return result; }
static NodeId GetNodeId(const nsAString& aOrigin, const nsAString& aTopLevelOrigin, const nsAString& aGmpName, bool aInPBMode) { OriginAttributes attrs; attrs.mPrivateBrowsingId = aInPBMode ? 1 : 0; nsAutoCString suffix; attrs.CreateSuffix(suffix); nsAutoString origin; origin.Assign(aOrigin); origin.Append(NS_ConvertUTF8toUTF16(suffix)); nsAutoString topLevelOrigin; topLevelOrigin.Assign(aTopLevelOrigin); topLevelOrigin.Append(NS_ConvertUTF8toUTF16(suffix)); return NodeId(origin, topLevelOrigin, aGmpName); }