| /* |
| * Copyright (C) 2009-2017 Apple Inc. All Rights Reserved. |
| * Copyright (C) 2009, 2011 Google Inc. All Rights Reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY |
| * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR |
| * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
| * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
| * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY |
| * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "config.h" |
| #include "WorkerScriptLoader.h" |
| |
| #include "ContentSecurityPolicy.h" |
| #include "Document.h" |
| #include "Exception.h" |
| #include "FetchIdioms.h" |
| #include "MIMETypeRegistry.h" |
| #include "ResourceResponse.h" |
| #include "ScriptExecutionContext.h" |
| #include "ServiceWorker.h" |
| #include "ServiceWorkerContextData.h" |
| #include "ServiceWorkerGlobalScope.h" |
| #include "ServiceWorkerProvider.h" |
| #include "TextResourceDecoder.h" |
| #include "WorkerFetchResult.h" |
| #include "WorkerGlobalScope.h" |
| #include "WorkerScriptLoaderClient.h" |
| #include "WorkerThreadableLoader.h" |
| #include <wtf/Ref.h> |
| |
| namespace WebCore { |
| |
| static HashMap<ScriptExecutionContextIdentifier, WorkerScriptLoader*>& scriptExecutionContextIdentifierToWorkerScriptLoaderMap() |
| { |
| static MainThreadNeverDestroyed<HashMap<ScriptExecutionContextIdentifier, WorkerScriptLoader*>> map; |
| return map.get(); |
| } |
| |
| WorkerScriptLoader::WorkerScriptLoader() |
| : m_script(ScriptBuffer::empty()) |
| { |
| } |
| |
| WorkerScriptLoader::~WorkerScriptLoader() |
| { |
| if (!m_clientIdentifier) |
| return; |
| |
| scriptExecutionContextIdentifierToWorkerScriptLoaderMap().remove(m_clientIdentifier); |
| #if ENABLE(SERVICE_WORKER) |
| if (m_activeServiceWorkerData) |
| ServiceWorkerProvider::singleton().serviceWorkerConnection().unregisterServiceWorkerClient(m_clientIdentifier); |
| #endif |
| } |
| |
| std::optional<Exception> WorkerScriptLoader::loadSynchronously(ScriptExecutionContext* scriptExecutionContext, const URL& url, Source source, FetchOptions::Mode mode, FetchOptions::Cache cachePolicy, ContentSecurityPolicyEnforcement contentSecurityPolicyEnforcement, const String& initiatorIdentifier) |
| { |
| ASSERT(scriptExecutionContext); |
| auto& workerGlobalScope = downcast<WorkerGlobalScope>(*scriptExecutionContext); |
| |
| m_url = url; |
| m_lastRequestURL = url; |
| m_source = source; |
| m_destination = FetchOptions::Destination::Script; |
| m_isCOEPEnabled = scriptExecutionContext->settingsValues().crossOriginEmbedderPolicyEnabled; |
| |
| #if ENABLE(SERVICE_WORKER) |
| auto* serviceWorkerGlobalScope = dynamicDowncast<ServiceWorkerGlobalScope>(workerGlobalScope); |
| if (serviceWorkerGlobalScope) { |
| if (auto* scriptResource = serviceWorkerGlobalScope->scriptResource(url)) { |
| m_script = scriptResource->script; |
| m_responseURL = scriptResource->responseURL; |
| m_responseMIMEType = scriptResource->mimeType; |
| return std::nullopt; |
| } |
| auto state = serviceWorkerGlobalScope->serviceWorker().state(); |
| if (state != ServiceWorkerState::Parsed && state != ServiceWorkerState::Installing) |
| return Exception { NetworkError, "Importing a script from a service worker that is past installing state"_s }; |
| } |
| #endif |
| |
| std::unique_ptr<ResourceRequest> request(createResourceRequest(initiatorIdentifier)); |
| if (!request) |
| return std::nullopt; |
| |
| ASSERT_WITH_SECURITY_IMPLICATION(is<WorkerGlobalScope>(scriptExecutionContext)); |
| |
| // Only used for importScripts that prescribes NoCors mode. |
| ASSERT(mode == FetchOptions::Mode::NoCors); |
| request->setRequester(ResourceRequest::Requester::ImportScripts); |
| |
| ThreadableLoaderOptions options; |
| options.credentials = FetchOptions::Credentials::Include; |
| options.mode = mode; |
| options.cache = cachePolicy; |
| options.sendLoadCallbacks = SendCallbackPolicy::SendCallbacks; |
| options.contentSecurityPolicyEnforcement = contentSecurityPolicyEnforcement; |
| options.destination = m_destination; |
| |
| WorkerThreadableLoader::loadResourceSynchronously(workerGlobalScope, WTFMove(*request), *this, options); |
| |
| // If the fetching attempt failed, throw a NetworkError exception and abort all these steps. |
| if (failed()) |
| return Exception { NetworkError, m_error.sanitizedDescription() }; |
| |
| #if ENABLE(SERVICE_WORKER) |
| if (serviceWorkerGlobalScope) { |
| if (!MIMETypeRegistry::isSupportedJavaScriptMIMEType(responseMIMEType())) |
| return Exception { NetworkError, "mime type is not a supported JavaScript mime type"_s }; |
| |
| serviceWorkerGlobalScope->setScriptResource(url, ServiceWorkerContextData::ImportedScript { script(), m_responseURL, m_responseMIMEType }); |
| } |
| #endif |
| return std::nullopt; |
| } |
| |
| void WorkerScriptLoader::loadAsynchronously(ScriptExecutionContext& scriptExecutionContext, ResourceRequest&& scriptRequest, Source source, FetchOptions&& fetchOptions, ContentSecurityPolicyEnforcement contentSecurityPolicyEnforcement, ServiceWorkersMode serviceWorkerMode, WorkerScriptLoaderClient& client, String&& taskMode, ScriptExecutionContextIdentifier clientIdentifier) |
| { |
| m_client = &client; |
| m_url = scriptRequest.url(); |
| m_lastRequestURL = scriptRequest.url(); |
| m_source = source; |
| m_destination = fetchOptions.destination; |
| m_isCOEPEnabled = scriptExecutionContext.settingsValues().crossOriginEmbedderPolicyEnabled; |
| |
| ASSERT(scriptRequest.httpMethod() == "GET"_s); |
| |
| auto request = makeUnique<ResourceRequest>(WTFMove(scriptRequest)); |
| if (!request) |
| return; |
| |
| ThreadableLoaderOptions options { WTFMove(fetchOptions) }; |
| options.sendLoadCallbacks = SendCallbackPolicy::SendCallbacks; |
| options.contentSecurityPolicyEnforcement = contentSecurityPolicyEnforcement; |
| if (fetchOptions.destination == FetchOptions::Destination::Serviceworker) |
| options.certificateInfoPolicy = CertificateInfoPolicy::IncludeCertificateInfo; |
| |
| // FIXME: We should drop the sameOriginDataURLFlag flag and implement the latest Fetch specification. |
| options.sameOriginDataURLFlag = SameOriginDataURLFlag::Set; |
| |
| // A service worker job can be executed from a worker context or a document context. |
| options.serviceWorkersMode = serviceWorkerMode; |
| #if ENABLE(SERVICE_WORKER) |
| if ((m_destination == FetchOptions::Destination::Worker || m_destination == FetchOptions::Destination::Sharedworker) && is<Document>(scriptExecutionContext)) { |
| ASSERT(clientIdentifier); |
| options.clientIdentifier = m_clientIdentifier = clientIdentifier; |
| // In case of blob URLs, we reuse the document controlling service worker. |
| if (request->url().protocolIsBlob() && scriptExecutionContext.activeServiceWorker()) |
| setControllingServiceWorker(ServiceWorkerData { scriptExecutionContext.activeServiceWorker()->data() }); |
| else |
| scriptExecutionContextIdentifierToWorkerScriptLoaderMap().add(m_clientIdentifier, this); |
| } else if (auto* activeServiceWorker = scriptExecutionContext.activeServiceWorker()) |
| options.serviceWorkerRegistrationIdentifier = activeServiceWorker->registrationIdentifier(); |
| #endif |
| if (m_destination == FetchOptions::Destination::Sharedworker) |
| m_userAgentForSharedWorker = scriptExecutionContext.userAgent(scriptRequest.url()); |
| |
| // During create, callbacks may happen which remove the last reference to this object. |
| Ref<WorkerScriptLoader> protectedThis(*this); |
| m_threadableLoader = ThreadableLoader::create(scriptExecutionContext, *this, WTFMove(*request), options, { }, WTFMove(taskMode)); |
| } |
| |
| const URL& WorkerScriptLoader::responseURL() const |
| { |
| ASSERT(!failed()); |
| return m_responseURL; |
| } |
| |
| std::unique_ptr<ResourceRequest> WorkerScriptLoader::createResourceRequest(const String& initiatorIdentifier) |
| { |
| auto request = makeUnique<ResourceRequest>(m_url); |
| request->setHTTPMethod("GET"_s); |
| request->setInitiatorIdentifier(initiatorIdentifier); |
| return request; |
| } |
| |
| static ResourceError constructJavaScriptMIMETypeError(const ResourceResponse& response) |
| { |
| auto message = makeString("Refused to execute ", response.url().stringCenterEllipsizedToLength(), " as script because ", response.mimeType(), " is not a script MIME type."); |
| return { errorDomainWebKitInternal, 0, response.url(), WTFMove(message), ResourceError::Type::AccessControl }; |
| } |
| |
| ResourceError WorkerScriptLoader::validateWorkerResponse(const ResourceResponse& response, Source source, FetchOptions::Destination destination) |
| { |
| if (response.httpStatusCode() / 100 != 2 && response.httpStatusCode()) |
| return { errorDomainWebKitInternal, 0, response.url(), "Response is not 2xx"_s, ResourceError::Type::General }; |
| |
| if (!isScriptAllowedByNosniff(response)) { |
| auto message = makeString("Refused to execute ", response.url().stringCenterEllipsizedToLength(), " as script because \"X-Content-Type-Options: nosniff\" was given and its Content-Type is not a script MIME type."); |
| return { errorDomainWebKitInternal, 0, response.url(), WTFMove(message), ResourceError::Type::General }; |
| } |
| |
| switch (source) { |
| case Source::ClassicWorkerScript: |
| // https://html.spec.whatwg.org/multipage/webappapis.html#fetch-a-classic-worker-script (Step 5) |
| // This is the result a dedicated / shared / service worker script fetch. |
| if (response.url().protocolIsInHTTPFamily() && !MIMETypeRegistry::isSupportedJavaScriptMIMEType(response.mimeType())) |
| return constructJavaScriptMIMETypeError(response); |
| break; |
| case Source::ClassicWorkerImport: |
| // https://html.spec.whatwg.org/multipage/webappapis.html#fetch-a-classic-worker-imported-script (Step 5). |
| // This is the result of an importScripts() call. |
| if (!MIMETypeRegistry::isSupportedJavaScriptMIMEType(response.mimeType())) |
| return constructJavaScriptMIMETypeError(response); |
| break; |
| case Source::ModuleScript: |
| if (shouldBlockResponseDueToMIMEType(response, destination)) |
| return constructJavaScriptMIMETypeError(response); |
| break; |
| } |
| |
| return { }; |
| } |
| |
| void WorkerScriptLoader::redirectReceived(const URL& redirectURL) |
| { |
| m_lastRequestURL = redirectURL; |
| } |
| |
| void WorkerScriptLoader::didReceiveResponse(ResourceLoaderIdentifier identifier, const ResourceResponse& response) |
| { |
| m_error = validateWorkerResponse(response, m_source, m_destination); |
| if (!m_error.isNull()) { |
| m_failed = true; |
| return; |
| } |
| |
| m_responseURL = response.url(); |
| m_certificateInfo = response.certificateInfo() ? *response.certificateInfo() : CertificateInfo(); |
| m_responseMIMEType = response.mimeType(); |
| m_responseSource = response.source(); |
| m_isRedirected = response.isRedirected(); |
| m_contentSecurityPolicy = ContentSecurityPolicyResponseHeaders { response }; |
| if (m_isCOEPEnabled) |
| m_crossOriginEmbedderPolicy = obtainCrossOriginEmbedderPolicy(response, nullptr); |
| m_referrerPolicy = response.httpHeaderField(HTTPHeaderName::ReferrerPolicy); |
| if (m_client) |
| m_client->didReceiveResponse(identifier, response); |
| } |
| |
| void WorkerScriptLoader::didReceiveData(const SharedBuffer& buffer) |
| { |
| if (m_failed) |
| return; |
| |
| #if ENABLE(WEBASSEMBLY) |
| if (MIMETypeRegistry::isSupportedWebAssemblyMIMEType(m_responseMIMEType)) { |
| m_script.append(buffer); |
| return; |
| } |
| #endif |
| |
| if (!m_decoder) |
| m_decoder = TextResourceDecoder::create("text/javascript"_s, "UTF-8"); |
| |
| if (buffer.isEmpty()) |
| return; |
| |
| m_script.append(m_decoder->decode(buffer.data(), buffer.size())); |
| } |
| |
| void WorkerScriptLoader::didFinishLoading(ResourceLoaderIdentifier identifier, const NetworkLoadMetrics&) |
| { |
| if (m_failed) { |
| notifyError(); |
| return; |
| } |
| |
| if (m_decoder) |
| m_script.append(m_decoder->flush()); |
| |
| m_identifier = identifier; |
| notifyFinished(); |
| } |
| |
| void WorkerScriptLoader::didFail(const ResourceError& error) |
| { |
| m_error = error; |
| notifyError(); |
| } |
| |
| void WorkerScriptLoader::notifyError() |
| { |
| m_failed = true; |
| if (m_error.isNull()) |
| m_error = { errorDomainWebKitInternal, 0, url(), "Failed to load script"_s, ResourceError::Type::General }; |
| notifyFinished(); |
| } |
| |
| void WorkerScriptLoader::notifyFinished() |
| { |
| m_threadableLoader = nullptr; |
| if (!m_client || m_finishing) |
| return; |
| |
| m_finishing = true; |
| m_client->notifyFinished(); |
| } |
| |
| void WorkerScriptLoader::cancel() |
| { |
| if (!m_threadableLoader) |
| return; |
| |
| m_client = nullptr; |
| m_threadableLoader->cancel(); |
| m_threadableLoader = nullptr; |
| } |
| |
| WorkerFetchResult WorkerScriptLoader::fetchResult() const |
| { |
| if (m_failed) |
| return workerFetchError(error()); |
| return { script(), lastRequestURL(), certificateInfo(), contentSecurityPolicy(), crossOriginEmbedderPolicy(), referrerPolicy(), { } }; |
| } |
| |
| WorkerScriptLoader* WorkerScriptLoader::fromScriptExecutionContextIdentifier(ScriptExecutionContextIdentifier identifier) |
| { |
| return scriptExecutionContextIdentifierToWorkerScriptLoaderMap().get(identifier); |
| } |
| |
| #if ENABLE(SERVICE_WORKER) |
| bool WorkerScriptLoader::setControllingServiceWorker(ServiceWorkerData&& activeServiceWorkerData) |
| { |
| if (!m_client) |
| return false; |
| |
| m_activeServiceWorkerData = WTFMove(activeServiceWorkerData); |
| return true; |
| } |
| #endif |
| |
| } // namespace WebCore |