| /* |
| * Copyright (C) 2008 Apple Inc. All Rights Reserved. |
| * Copyright (C) 2009, 2011 Google Inc. All Rights Reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY |
| * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR |
| * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
| * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
| * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY |
| * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| * |
| */ |
| |
| #include "third_party/blink/renderer/core/workers/worker_global_scope.h" |
| |
| #include "base/memory/scoped_refptr.h" |
| #include "third_party/blink/public/platform/platform.h" |
| #include "third_party/blink/public/platform/web_url_request.h" |
| #include "third_party/blink/renderer/bindings/core/v8/script_source_code.h" |
| #include "third_party/blink/renderer/bindings/core/v8/source_location.h" |
| #include "third_party/blink/renderer/bindings/core/v8/v8_void_function.h" |
| #include "third_party/blink/renderer/bindings/core/v8/worker_or_worklet_script_controller.h" |
| #include "third_party/blink/renderer/core/css/font_face_set_worker.h" |
| #include "third_party/blink/renderer/core/css/offscreen_font_selector.h" |
| #include "third_party/blink/renderer/core/dom/context_lifecycle_notifier.h" |
| #include "third_party/blink/renderer/core/dom/events/event.h" |
| #include "third_party/blink/renderer/core/dom/pausable_object.h" |
| #include "third_party/blink/renderer/core/events/error_event.h" |
| #include "third_party/blink/renderer/core/events/message_event.h" |
| #include "third_party/blink/renderer/core/frame/dom_timer_coordinator.h" |
| #include "third_party/blink/renderer/core/frame/user_activation.h" |
| #include "third_party/blink/renderer/core/inspector/console_message.h" |
| #include "third_party/blink/renderer/core/inspector/console_message_storage.h" |
| #include "third_party/blink/renderer/core/inspector/worker_inspector_controller.h" |
| #include "third_party/blink/renderer/core/inspector/worker_thread_debugger.h" |
| #include "third_party/blink/renderer/core/loader/threadable_loader.h" |
| #include "third_party/blink/renderer/core/messaging/message_port.h" |
| #include "third_party/blink/renderer/core/origin_trials/origin_trial_context.h" |
| #include "third_party/blink/renderer/core/probe/core_probes.h" |
| #include "third_party/blink/renderer/core/workers/global_scope_creation_params.h" |
| #include "third_party/blink/renderer/core/workers/installed_scripts_manager.h" |
| #include "third_party/blink/renderer/core/workers/worker_classic_script_loader.h" |
| #include "third_party/blink/renderer/core/workers/worker_location.h" |
| #include "third_party/blink/renderer/core/workers/worker_navigator.h" |
| #include "third_party/blink/renderer/core/workers/worker_reporting_proxy.h" |
| #include "third_party/blink/renderer/core/workers/worker_thread.h" |
| #include "third_party/blink/renderer/platform/bindings/exception_state.h" |
| #include "third_party/blink/renderer/platform/bindings/microtask.h" |
| #include "third_party/blink/renderer/platform/cross_thread_functional.h" |
| #include "third_party/blink/renderer/platform/instance_counters.h" |
| #include "third_party/blink/renderer/platform/loader/fetch/fetch_client_settings_object_snapshot.h" |
| #include "third_party/blink/renderer/platform/loader/fetch/memory_cache.h" |
| #include "third_party/blink/renderer/platform/network/content_security_policy_parsers.h" |
| #include "third_party/blink/renderer/platform/runtime_enabled_features.h" |
| #include "third_party/blink/renderer/platform/scheduler/public/thread_scheduler.h" |
| #include "third_party/blink/renderer/platform/weborigin/kurl.h" |
| #include "third_party/blink/renderer/platform/weborigin/security_origin.h" |
| #include "third_party/blink/renderer/platform/weborigin/security_policy.h" |
| #include "third_party/blink/renderer/platform/wtf/assertions.h" |
| |
| namespace blink { |
| namespace { |
| |
| void RemoveURLFromMemoryCacheInternal(const KURL& url) { |
| GetMemoryCache()->RemoveURLFromCache(url); |
| } |
| |
| } // namespace |
| |
| FontFaceSet* WorkerGlobalScope::fonts() { |
| return FontFaceSetWorker::From(*this); |
| } |
| |
| WorkerGlobalScope::~WorkerGlobalScope() { |
| DCHECK(!ScriptController()); |
| InstanceCounters::DecrementCounter( |
| InstanceCounters::kWorkerGlobalScopeCounter); |
| } |
| |
| KURL WorkerGlobalScope::CompleteURL(const String& url) const { |
| // Always return a null URL when passed a null string. |
| // FIXME: Should we change the KURL constructor to have this behavior? |
| if (url.IsNull()) |
| return KURL(); |
| // Always use UTF-8 in Workers. |
| return KURL(BaseURL(), url); |
| } |
| |
| void WorkerGlobalScope::Dispose() { |
| DCHECK(IsContextThread()); |
| closing_ = true; |
| paused_calls_.clear(); |
| WorkerOrWorkletGlobalScope::Dispose(); |
| } |
| |
| void WorkerGlobalScope::ExceptionUnhandled(int exception_id) { |
| ErrorEvent* event = pending_error_events_.Take(exception_id); |
| DCHECK(event); |
| if (WorkerThreadDebugger* debugger = |
| WorkerThreadDebugger::From(GetThread()->GetIsolate())) |
| debugger->ExceptionThrown(thread_, event); |
| } |
| |
| WorkerLocation* WorkerGlobalScope::location() const { |
| if (!location_) |
| location_ = WorkerLocation::Create(url_); |
| return location_.Get(); |
| } |
| |
| WorkerNavigator* WorkerGlobalScope::navigator() const { |
| if (!navigator_) |
| navigator_ = WorkerNavigator::Create(user_agent_); |
| return navigator_.Get(); |
| } |
| |
| void WorkerGlobalScope::close() { |
| // Let current script run to completion, but tell the worker micro task |
| // runner to tear down the thread after this task. |
| closing_ = true; |
| } |
| |
| String WorkerGlobalScope::origin() const { |
| return GetSecurityOrigin()->ToString(); |
| } |
| |
| // Implementation of the "importScripts()" algorithm: |
| // https://html.spec.whatwg.org/multipage/workers.html#dom-workerglobalscope-importscripts |
| void WorkerGlobalScope::importScripts(const Vector<String>& urls, |
| ExceptionState& exception_state) { |
| DCHECK(GetContentSecurityPolicy()); |
| DCHECK(GetExecutionContext()); |
| |
| // Step 1: "If worker global scope's type is "module", throw a TypeError |
| // exception." |
| if (script_type_ == mojom::ScriptType::kModule) { |
| exception_state.ThrowTypeError( |
| "Module scripts don't support importScripts()."); |
| return; |
| } |
| |
| ExecutionContext& execution_context = *this->GetExecutionContext(); |
| Vector<KURL> completed_urls; |
| for (const String& url_string : urls) { |
| const KURL& url = execution_context.CompleteURL(url_string); |
| if (!url.IsValid()) { |
| exception_state.ThrowDOMException( |
| DOMExceptionCode::kSyntaxError, |
| "The URL '" + url_string + "' is invalid."); |
| return; |
| } |
| if (!GetContentSecurityPolicy()->AllowScriptFromSource( |
| url, AtomicString(), IntegrityMetadataSet(), kNotParserInserted)) { |
| exception_state.ThrowDOMException( |
| DOMExceptionCode::kNetworkError, |
| "The script at '" + url.ElidedString() + "' failed to load."); |
| return; |
| } |
| completed_urls.push_back(url); |
| } |
| |
| for (const KURL& complete_url : completed_urls) { |
| KURL response_url; |
| String source_code; |
| std::unique_ptr<Vector<char>> cached_meta_data; |
| LoadResult result = LoadResult::kNotHandled; |
| result = LoadScriptFromInstalledScriptsManager( |
| complete_url, &response_url, &source_code, &cached_meta_data); |
| |
| // If the script wasn't provided by the InstalledScriptsManager, load from |
| // ResourceLoader. |
| if (result == LoadResult::kNotHandled) { |
| result = LoadScriptFromClassicScriptLoader( |
| complete_url, &response_url, &source_code, &cached_meta_data); |
| } |
| |
| if (result != LoadResult::kSuccess) { |
| // TODO(vogelheim): In case of certain types of failure - e.g. 'nosniff' |
| // block - this ought to be a DOMExceptionCode::kSecurityError, but that |
| // information presently gets lost on the way. |
| exception_state.ThrowDOMException(DOMExceptionCode::kNetworkError, |
| "The script at '" + |
| complete_url.ElidedString() + |
| "' failed to load."); |
| return; |
| } |
| |
| // importScripts always uses "no-cors", so simply checking the origin is |
| // enough. |
| // TODO(yhirano): Remove this ad-hoc logic and use the response type. |
| const SanitizeScriptErrors sanitize_script_errors = |
| execution_context.GetSecurityOrigin()->CanReadContent(response_url) |
| ? SanitizeScriptErrors::kDoNotSanitize |
| : SanitizeScriptErrors::kSanitize; |
| |
| ErrorEvent* error_event = nullptr; |
| SingleCachedMetadataHandler* handler( |
| CreateWorkerScriptCachedMetadataHandler(complete_url, |
| cached_meta_data.get())); |
| ReportingProxy().WillEvaluateImportedClassicScript( |
| source_code.length(), cached_meta_data ? cached_meta_data->size() : 0); |
| ScriptController()->Evaluate( |
| ScriptSourceCode(source_code, ScriptSourceLocationType::kUnknown, |
| handler, response_url), |
| sanitize_script_errors, &error_event, v8_cache_options_); |
| if (error_event) { |
| ScriptController()->RethrowExceptionFromImportedScript(error_event, |
| exception_state); |
| return; |
| } |
| } |
| } |
| |
| WorkerGlobalScope::LoadResult |
| WorkerGlobalScope::LoadScriptFromInstalledScriptsManager( |
| const KURL& script_url, |
| KURL* out_response_url, |
| String* out_source_code, |
| std::unique_ptr<Vector<char>>* out_cached_meta_data) { |
| if (!GetThread()->GetInstalledScriptsManager() || |
| !GetThread()->GetInstalledScriptsManager()->IsScriptInstalled( |
| script_url)) { |
| return LoadResult::kNotHandled; |
| } |
| std::unique_ptr<InstalledScriptsManager::ScriptData> script_data = |
| GetThread()->GetInstalledScriptsManager()->GetScriptData(script_url); |
| if (!script_data) |
| return LoadResult::kFailed; |
| *out_response_url = script_url; |
| *out_source_code = script_data->TakeSourceText(); |
| *out_cached_meta_data = script_data->TakeMetaData(); |
| // TODO(shimazu): Add appropriate probes for inspector. |
| return LoadResult::kSuccess; |
| } |
| |
| WorkerGlobalScope::LoadResult |
| WorkerGlobalScope::LoadScriptFromClassicScriptLoader( |
| const KURL& script_url, |
| KURL* out_response_url, |
| String* out_source_code, |
| std::unique_ptr<Vector<char>>* out_cached_meta_data) { |
| ExecutionContext* execution_context = GetExecutionContext(); |
| WorkerClassicScriptLoader* classic_script_loader = |
| MakeGarbageCollected<WorkerClassicScriptLoader>(); |
| classic_script_loader->LoadSynchronously( |
| *execution_context, script_url, mojom::RequestContextType::SCRIPT, |
| execution_context->GetSecurityContext().AddressSpace()); |
| |
| // If the fetching attempt failed, throw a NetworkError exception and |
| // abort all these steps. |
| if (classic_script_loader->Failed()) |
| return LoadResult::kFailed; |
| |
| *out_response_url = classic_script_loader->ResponseURL(); |
| *out_source_code = classic_script_loader->SourceText(); |
| *out_cached_meta_data = classic_script_loader->ReleaseCachedMetadata(); |
| probe::scriptImported(execution_context, classic_script_loader->Identifier(), |
| classic_script_loader->SourceText()); |
| return LoadResult::kSuccess; |
| } |
| |
| bool WorkerGlobalScope::IsContextThread() const { |
| return GetThread()->IsCurrentThread(); |
| } |
| |
| void WorkerGlobalScope::AddConsoleMessage(ConsoleMessage* console_message) { |
| DCHECK(IsContextThread()); |
| ReportingProxy().ReportConsoleMessage( |
| console_message->Source(), console_message->Level(), |
| console_message->Message(), console_message->Location()); |
| GetThread()->GetConsoleMessageStorage()->AddConsoleMessage(this, |
| console_message); |
| } |
| |
| CoreProbeSink* WorkerGlobalScope::GetProbeSink() { |
| if (IsClosing()) |
| return nullptr; |
| if (WorkerInspectorController* controller = |
| GetThread()->GetWorkerInspectorController()) |
| return controller->GetProbeSink(); |
| return nullptr; |
| } |
| |
| bool WorkerGlobalScope::IsSecureContext(String& error_message) const { |
| // Until there are APIs that are available in workers and that |
| // require a privileged context test that checks ancestors, just do |
| // a simple check here. Once we have a need for a real |
| // |isSecureContext| check here, we can check the responsible |
| // document for a privileged context at worker creation time, pass |
| // it in via WorkerThreadStartupData, and check it here. |
| if (GetSecurityOrigin()->IsPotentiallyTrustworthy()) |
| return true; |
| error_message = GetSecurityOrigin()->IsPotentiallyTrustworthyErrorMessage(); |
| return false; |
| } |
| |
| service_manager::InterfaceProvider* WorkerGlobalScope::GetInterfaceProvider() { |
| return &interface_provider_; |
| } |
| |
| ExecutionContext* WorkerGlobalScope::GetExecutionContext() const { |
| return const_cast<WorkerGlobalScope*>(this); |
| } |
| |
| void WorkerGlobalScope::TasksWereUnpaused() { |
| WorkerOrWorkletGlobalScope::TasksWereUnpaused(); |
| Vector<base::OnceClosure> calls; |
| paused_calls_.swap(calls); |
| for (auto& call : calls) |
| std::move(call).Run(); |
| } |
| |
| void WorkerGlobalScope::EvaluateClassicScriptPausable( |
| const KURL& script_url, |
| String source_code, |
| std::unique_ptr<Vector<char>> cached_meta_data, |
| const v8_inspector::V8StackTraceId& stack_id) { |
| if (IsContextPaused()) { |
| AddPausedCall(WTF::Bind(&WorkerGlobalScope::EvaluateClassicScriptPausable, |
| WrapWeakPersistent(this), script_url, source_code, |
| WTF::Passed(std::move(cached_meta_data)), |
| stack_id)); |
| return; |
| } |
| ThreadDebugger* debugger = ThreadDebugger::From(GetThread()->GetIsolate()); |
| if (debugger) |
| debugger->ExternalAsyncTaskStarted(stack_id); |
| EvaluateClassicScript(script_url, source_code, std::move(cached_meta_data)); |
| if (debugger) |
| debugger->ExternalAsyncTaskFinished(stack_id); |
| } |
| |
| // https://html.spec.whatwg.org/multipage/workers.html#worker-processing-model |
| void WorkerGlobalScope::ImportClassicScriptPausable( |
| const KURL& script_url, |
| FetchClientSettingsObjectSnapshot* outside_settings_object, |
| const v8_inspector::V8StackTraceId& stack_id) { |
| DCHECK(RuntimeEnabledFeatures::OffMainThreadWorkerScriptFetchEnabled()); |
| if (IsContextPaused()) { |
| AddPausedCall(WTF::Bind(&WorkerGlobalScope::ImportClassicScriptPausable, |
| WrapWeakPersistent(this), script_url, |
| WrapPersistent(outside_settings_object), stack_id)); |
| return; |
| } |
| |
| // Step 12. "Fetch a classic worker script given url, outside settings, |
| // destination, and inside settings." |
| // TODO(nhiroki): Load a main script using |outside_settings_object|. |
| // (https://crbug.com/835717, https://crbug.com/880027) |
| |
| // Step 12.1. "Set request's reserved client to inside settings." |
| // The browesr process takes care of this. |
| |
| // Step 12.2. "Fetch request, and asynchronously wait to run the remaining |
| // steps as part of fetch's process response for the response response." |
| ExecutionContext* execution_context = GetExecutionContext(); |
| WorkerClassicScriptLoader* classic_script_loader = |
| MakeGarbageCollected<WorkerClassicScriptLoader>(); |
| classic_script_loader->LoadTopLevelScriptAsynchronously( |
| *execution_context, script_url, mojom::RequestContextType::WORKER, |
| network::mojom::FetchRequestMode::kSameOrigin, |
| network::mojom::FetchCredentialsMode::kSameOrigin, |
| GetSecurityContext().AddressSpace(), IsNestedWorker(), |
| WTF::Bind(&WorkerGlobalScope::DidReceiveResponseForClassicScript, |
| WrapWeakPersistent(this), |
| WrapPersistent(classic_script_loader)), |
| WTF::Bind(&WorkerGlobalScope::DidImportClassicScript, |
| WrapWeakPersistent(this), WrapPersistent(classic_script_loader), |
| stack_id)); |
| } |
| |
| void WorkerGlobalScope::DidReceiveResponseForClassicScript( |
| WorkerClassicScriptLoader* classic_script_loader) { |
| DCHECK(IsContextThread()); |
| DCHECK(RuntimeEnabledFeatures::OffMainThreadWorkerScriptFetchEnabled()); |
| probe::didReceiveScriptResponse(this, classic_script_loader->Identifier()); |
| } |
| |
| // https://html.spec.whatwg.org/multipage/workers.html#worker-processing-model |
| void WorkerGlobalScope::DidImportClassicScript( |
| WorkerClassicScriptLoader* classic_script_loader, |
| const v8_inspector::V8StackTraceId& stack_id) { |
| DCHECK(IsContextThread()); |
| DCHECK(RuntimeEnabledFeatures::OffMainThreadWorkerScriptFetchEnabled()); |
| |
| // Step 12. "If the algorithm asynchronously completes with null, then:" |
| if (classic_script_loader->Failed()) { |
| // Step 12.1. "Queue a task to fire an event named error at worker." |
| // Step 12.2. "Run the environment discarding steps for inside settings." |
| // Step 12.3. "Return." |
| ExceptionThrown(ErrorEvent::Create( |
| "Failed to load a worker script: " + url_.GetString(), |
| SourceLocation::Capture(), nullptr /* world */)); |
| return; |
| } |
| |
| // Step 12.3. "Set worker global scope's url to response's url." |
| // Step 12.4. "Set worker global scope's HTTPS state to response's HTTPS |
| // state." |
| // These are done in the constructor of WorkerGlobalScope. |
| |
| // Step 12.5. "Set worker global scope's referrer policy to the result of |
| // parsing the `Referrer-Policy` header of response." |
| ReferrerPolicy referrer_policy = kReferrerPolicyDefault; |
| if (!classic_script_loader->GetReferrerPolicy().IsNull()) { |
| SecurityPolicy::ReferrerPolicyFromHeaderValue( |
| classic_script_loader->GetReferrerPolicy(), |
| kDoNotSupportReferrerPolicyLegacyKeywords, &referrer_policy); |
| SetReferrerPolicy(referrer_policy); |
| } |
| |
| // Step 13.6. "Execute the Initialize a global object's CSP list algorithm |
| // on worker global scope and response. [CSP]" |
| // This is done in the constructor of WorkerGlobalScope. |
| |
| // Step 13.7. "Asynchronously complete the perform the fetch steps with |
| // response." |
| |
| EvaluateClassicScriptPausable( |
| classic_script_loader->ResponseURL(), classic_script_loader->SourceText(), |
| classic_script_loader->ReleaseCachedMetadata(), stack_id); |
| } |
| |
| void WorkerGlobalScope::ImportModuleScriptPausable( |
| const KURL& module_url_record, |
| FetchClientSettingsObjectSnapshot* outside_settings_object, |
| network::mojom::FetchCredentialsMode mode) { |
| if (IsContextPaused()) { |
| AddPausedCall(WTF::Bind(&WorkerGlobalScope::ImportModuleScriptPausable, |
| WrapWeakPersistent(this), module_url_record, |
| WrapPersistent(outside_settings_object), mode)); |
| return; |
| } |
| ImportModuleScript(module_url_record, outside_settings_object, mode); |
| } |
| |
| void WorkerGlobalScope::ReceiveMessagePausable( |
| BlinkTransferableMessage message) { |
| if (IsContextPaused()) { |
| AddPausedCall(WTF::Bind(&WorkerGlobalScope::ReceiveMessagePausable, |
| WrapWeakPersistent(this), std::move(message))); |
| return; |
| } |
| |
| MessagePortArray* ports = |
| MessagePort::EntanglePorts(*this, std::move(message.ports)); |
| ThreadDebugger* debugger = ThreadDebugger::From(GetThread()->GetIsolate()); |
| if (debugger) |
| debugger->ExternalAsyncTaskStarted(message.sender_stack_trace_id); |
| UserActivation* user_activation = nullptr; |
| if (message.user_activation) { |
| user_activation = |
| new UserActivation(message.user_activation->has_been_active, |
| message.user_activation->was_active); |
| } |
| DispatchEvent(*MessageEvent::Create(ports, std::move(message.message), |
| user_activation)); |
| if (debugger) |
| debugger->ExternalAsyncTaskFinished(message.sender_stack_trace_id); |
| } |
| |
| void WorkerGlobalScope::EvaluateClassicScript( |
| const KURL& script_url, |
| String source_code, |
| std::unique_ptr<Vector<char>> cached_meta_data) { |
| DCHECK(IsContextThread()); |
| SingleCachedMetadataHandler* handler = |
| CreateWorkerScriptCachedMetadataHandler(script_url, |
| cached_meta_data.get()); |
| DCHECK(!source_code.IsNull()); |
| ReportingProxy().WillEvaluateClassicScript( |
| source_code.length(), |
| cached_meta_data.get() ? cached_meta_data->size() : 0); |
| // Cross-origin workers are disallowed, so use |
| // SanitizeScriptErrors::kDoNotSanitize. |
| bool success = ScriptController()->Evaluate( |
| ScriptSourceCode(source_code, handler, script_url), |
| SanitizeScriptErrors::kDoNotSanitize, nullptr /* error_event */, |
| v8_cache_options_); |
| ReportingProxy().DidEvaluateClassicScript(success); |
| } |
| |
| void WorkerGlobalScope::AddPausedCall(base::OnceClosure closure) { |
| paused_calls_.push_back(std::move(closure)); |
| } |
| |
| WorkerGlobalScope::WorkerGlobalScope( |
| std::unique_ptr<GlobalScopeCreationParams> creation_params, |
| WorkerThread* thread, |
| base::TimeTicks time_origin) |
| : WorkerOrWorkletGlobalScope( |
| thread->GetIsolate(), |
| creation_params->worker_clients, |
| std::move(creation_params->web_worker_fetch_context), |
| thread->GetWorkerReportingProxy()), |
| url_(creation_params->script_url), |
| script_type_(creation_params->script_type), |
| user_agent_(creation_params->user_agent), |
| parent_devtools_token_(creation_params->parent_devtools_token), |
| v8_cache_options_(creation_params->v8_cache_options), |
| thread_(thread), |
| timers_(GetTaskRunner(TaskType::kJavascriptTimer)), |
| time_origin_(time_origin), |
| font_selector_(OffscreenFontSelector::Create(this)), |
| animation_frame_provider_(WorkerAnimationFrameProvider::Create( |
| this, |
| creation_params->begin_frame_provider_params)), |
| agent_cluster_id_(creation_params->agent_cluster_id.is_empty() |
| ? base::UnguessableToken::Create() |
| : creation_params->agent_cluster_id) { |
| InstanceCounters::IncrementCounter( |
| InstanceCounters::kWorkerGlobalScopeCounter); |
| scoped_refptr<SecurityOrigin> security_origin = SecurityOrigin::Create(url_); |
| if (creation_params->starter_origin) { |
| security_origin->TransferPrivilegesFrom( |
| creation_params->starter_origin->CreatePrivilegeData()); |
| } |
| SetSecurityOrigin(std::move(security_origin)); |
| |
| // https://html.spec.whatwg.org/#run-a-worker |
| // 4. Set worker global scope's HTTPS state to response's HTTPS state. [spec |
| // text] |
| https_state_ = CalculateHttpsState(GetSecurityOrigin(), |
| creation_params->starter_https_state); |
| |
| InitContentSecurityPolicyFromVector( |
| creation_params->content_security_policy_parsed_headers); |
| BindContentSecurityPolicyToExecutionContext(); |
| SetWorkerSettings(std::move(creation_params->worker_settings)); |
| |
| // Set the referrer policy here for workers whose script is fetched on the |
| // main thread. For off-the-main-thread fetches, it is instead set after the |
| // script is fetched. |
| if (IsScriptFetchedOnMainThread()) |
| SetReferrerPolicy(creation_params->referrer_policy); |
| |
| SetAddressSpace(creation_params->address_space); |
| OriginTrialContext::AddTokens(this, |
| creation_params->origin_trial_tokens.get()); |
| // TODO(sammc): Require a valid |creation_params->interface_provider| once all |
| // worker types provide a valid |creation_params->interface_provider|. |
| if (creation_params->interface_provider.is_valid()) { |
| interface_provider_.Bind( |
| mojo::MakeProxy(service_manager::mojom::InterfaceProviderPtrInfo( |
| creation_params->interface_provider.PassHandle(), |
| service_manager::mojom::InterfaceProvider::Version_))); |
| } |
| |
| // A FeaturePolicy is created by FeaturePolicy::CreateFromParentPolicy, even |
| // if the parent policy is null. |
| DCHECK(creation_params->worker_feature_policy); |
| SetFeaturePolicy(std::move(creation_params->worker_feature_policy)); |
| } |
| |
| void WorkerGlobalScope::ApplyContentSecurityPolicyFromHeaders( |
| const ContentSecurityPolicyResponseHeaders& headers) { |
| if (!GetContentSecurityPolicy()) { |
| ContentSecurityPolicy* csp = ContentSecurityPolicy::Create(); |
| SetContentSecurityPolicy(csp); |
| } |
| GetContentSecurityPolicy()->DidReceiveHeaders(headers); |
| GetContentSecurityPolicy()->BindToExecutionContext(GetExecutionContext()); |
| } |
| |
| void WorkerGlobalScope::ExceptionThrown(ErrorEvent* event) { |
| int next_id = ++last_pending_error_event_id_; |
| pending_error_events_.Set(next_id, event); |
| ReportingProxy().ReportException(event->MessageForConsole(), |
| event->Location()->Clone(), next_id); |
| } |
| |
| void WorkerGlobalScope::RemoveURLFromMemoryCache(const KURL& url) { |
| PostCrossThreadTask(*thread_->GetParentExecutionContextTaskRunners()->Get( |
| TaskType::kNetworking), |
| FROM_HERE, |
| CrossThreadBind(&RemoveURLFromMemoryCacheInternal, url)); |
| } |
| |
| void WorkerGlobalScope::queueMicrotask(V8VoidFunction* callback) { |
| Microtask::EnqueueMicrotask(WTF::Bind( |
| &V8PersistentCallbackFunction<V8VoidFunction>::InvokeAndReportException, |
| WrapPersistent(ToV8PersistentCallbackFunction(callback)), nullptr)); |
| } |
| |
| int WorkerGlobalScope::requestAnimationFrame(V8FrameRequestCallback* callback, |
| ExceptionState& exception_state) { |
| FrameRequestCallbackCollection::V8FrameCallback* frame_callback = |
| FrameRequestCallbackCollection::V8FrameCallback::Create(callback); |
| frame_callback->SetUseLegacyTimeBase(true); |
| |
| int ret = animation_frame_provider_->RegisterCallback(frame_callback); |
| |
| if (ret == WorkerAnimationFrameProvider::kInvalidCallbackId) { |
| exception_state.ThrowDOMException( |
| DOMExceptionCode::kNotSupportedError, |
| "requestAnimationFrame not supported in this Worker."); |
| } |
| |
| return ret; |
| } |
| |
| void WorkerGlobalScope::cancelAnimationFrame(int id) { |
| animation_frame_provider_->CancelCallback(id); |
| } |
| |
| void WorkerGlobalScope::SetWorkerSettings( |
| std::unique_ptr<WorkerSettings> worker_settings) { |
| worker_settings_ = std::move(worker_settings); |
| worker_settings_->MakeGenericFontFamilySettingsAtomic(); |
| font_selector_->UpdateGenericFontFamilySettings( |
| worker_settings_->GetGenericFontFamilySettings()); |
| } |
| |
| bool WorkerGlobalScope::IsScriptFetchedOnMainThread() { |
| if (script_type_ == mojom::ScriptType::kModule) |
| return false; |
| // It's now supported only for dedicated workers to load top-level classic |
| // worker script off the main thread. |
| // TODO(nhiroki): Support loading top-level classic worker script off the main |
| // thread for shared workers and service workers. |
| if (IsDedicatedWorkerGlobalScope() && |
| RuntimeEnabledFeatures::OffMainThreadWorkerScriptFetchEnabled()) { |
| return false; |
| } |
| return true; |
| } |
| |
| void WorkerGlobalScope::Trace(blink::Visitor* visitor) { |
| visitor->Trace(location_); |
| visitor->Trace(navigator_); |
| visitor->Trace(timers_); |
| visitor->Trace(pending_error_events_); |
| visitor->Trace(font_selector_); |
| visitor->Trace(animation_frame_provider_); |
| WorkerOrWorkletGlobalScope::Trace(visitor); |
| Supplementable<WorkerGlobalScope>::Trace(visitor); |
| } |
| |
| } // namespace blink |