blob: f00ba06f138b365dc9eacdf6ae7bcf2efd7354af [file] [log] [blame]
/*
* Copyright (C) 2013, 2015, 2016 Apple Inc. All Rights Reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#pragma once
#if ENABLE(REMOTE_INSPECTOR)
#include "RemoteControllableTarget.h"
#include <utility>
#include <wtf/Forward.h>
#include <wtf/HashMap.h>
#include <wtf/Lock.h>
#include <wtf/ProcessID.h>
#include <wtf/text/WTFString.h>
#if PLATFORM(COCOA)
#include "RemoteInspectorXPCConnection.h"
#include <wtf/RetainPtr.h>
OBJC_CLASS NSDictionary;
OBJC_CLASS NSString;
typedef RetainPtr<NSDictionary> TargetListing;
#endif
#if USE(GLIB)
#include <wtf/glib/GRefPtr.h>
#include <wtf/glib/SocketConnection.h>
typedef GRefPtr<GVariant> TargetListing;
typedef struct _GCancellable GCancellable;
#endif
#if USE(INSPECTOR_SOCKET_SERVER)
#include "RemoteConnectionToTarget.h"
#include "RemoteInspectorConnectionClient.h"
#include <wtf/JSONValues.h>
#include <wtf/RefPtr.h>
namespace Inspector {
using TargetListing = RefPtr<JSON::Object>;
}
#endif
namespace Inspector {
class RemoteAutomationTarget;
class RemoteConnectionToTarget;
class RemoteControllableTarget;
class RemoteInspectionTarget;
class RemoteInspectorClient;
class JS_EXPORT_PRIVATE RemoteInspector final
#if PLATFORM(COCOA)
: public RemoteInspectorXPCConnection::Client
#elif USE(INSPECTOR_SOCKET_SERVER)
: public RemoteInspectorConnectionClient
#endif
{
public:
class JS_EXPORT_PRIVATE Client {
public:
struct Capabilities {
bool remoteAutomationAllowed : 1;
String browserName;
String browserVersion;
};
struct SessionCapabilities {
bool acceptInsecureCertificates { false };
#if USE(GLIB) || USE(INSPECTOR_SOCKET_SERVER)
Vector<std::pair<String, String>> certificates;
struct Proxy {
String type;
std::optional<String> ftpURL;
std::optional<String> httpURL;
std::optional<String> httpsURL;
std::optional<String> socksURL;
Vector<String> ignoreAddressList;
};
std::optional<Proxy> proxy;
#endif
#if PLATFORM(COCOA)
std::optional<bool> allowInsecureMediaCapture;
std::optional<bool> suppressICECandidateFiltering;
#endif
};
virtual ~Client();
virtual bool remoteAutomationAllowed() const = 0;
virtual String browserName() const { return { }; }
virtual String browserVersion() const { return { }; }
virtual void requestAutomationSession(const String& sessionIdentifier, const SessionCapabilities&) = 0;
virtual void requestedDebuggablesToWakeUp() { };
#if USE(INSPECTOR_SOCKET_SERVER)
virtual void closeAutomationSession() = 0;
#endif
};
#if PLATFORM(COCOA)
static void setNeedMachSandboxExtension(bool needExtension) { needMachSandboxExtension = needExtension; }
#endif
#if USE(GLIB)
static void setInspectorServerAddress(CString&& address) { s_inspectorServerAddress = WTFMove(address); }
static const CString& inspectorServerAddress() { return s_inspectorServerAddress; }
#endif
static void startDisabled();
static RemoteInspector& singleton();
friend class LazyNeverDestroyed<RemoteInspector>;
void registerTarget(RemoteControllableTarget*);
void unregisterTarget(RemoteControllableTarget*);
void updateTarget(RemoteControllableTarget*);
void sendMessageToRemote(TargetID, const String& message);
RemoteInspector::Client* client() const { return m_client; }
void setClient(RemoteInspector::Client*);
void clientCapabilitiesDidChange();
std::optional<RemoteInspector::Client::Capabilities> clientCapabilities() const { return m_clientCapabilities; }
void setupFailed(TargetID);
void setupCompleted(TargetID);
bool waitingForAutomaticInspection(TargetID);
void updateAutomaticInspectionCandidate(RemoteInspectionTarget*);
bool enabled() const { return m_enabled; }
bool hasActiveDebugSession() const { return m_hasActiveDebugSession; }
void start();
void stop();
#if PLATFORM(COCOA)
bool hasParentProcessInformation() const { return m_parentProcessIdentifier != 0; }
ProcessID parentProcessIdentifier() const { return m_parentProcessIdentifier; }
RetainPtr<CFDataRef> parentProcessAuditData() const { return m_parentProcessAuditData; }
void setParentProcessInformation(ProcessID, RetainPtr<CFDataRef> auditData);
void setParentProcessInfomationIsDelayed();
#endif
void updateTargetListing(TargetID);
#if USE(GLIB)
void requestAutomationSession(const char* sessionID, const Client::SessionCapabilities&);
#endif
#if USE(GLIB) || USE(INSPECTOR_SOCKET_SERVER)
void setup(TargetID);
void sendMessageToTarget(TargetID, const char* message);
#endif
#if USE(INSPECTOR_SOCKET_SERVER)
void requestAutomationSession(String&& sessionID, const Client::SessionCapabilities&);
bool isConnected() const { return !!m_clientConnection; }
void connect(ConnectionID);
void setBackendCommandsPath(const String& backendCommandsPath) { m_backendCommandsPath = backendCommandsPath; }
#endif
private:
RemoteInspector();
TargetID nextAvailableTargetIdentifier();
enum class StopSource { API, XPCMessage };
void stopInternal(StopSource);
#if PLATFORM(COCOA)
void setupXPCConnectionIfNeeded();
#endif
#if USE(GLIB)
void setupConnection(Ref<SocketConnection>&&);
static const SocketConnection::MessageHandlers& messageHandlers();
void receivedGetTargetListMessage();
void receivedSetupMessage(TargetID);
void receivedDataMessage(TargetID, const char* message);
void receivedCloseMessage(TargetID);
void receivedAutomationSessionRequestMessage(const char* sessionID);
#endif
TargetListing listingForTarget(const RemoteControllableTarget&) const;
TargetListing listingForInspectionTarget(const RemoteInspectionTarget&) const;
TargetListing listingForAutomationTarget(const RemoteAutomationTarget&) const;
bool updateTargetMap(RemoteControllableTarget*);
void pushListingsNow();
void pushListingsSoon();
void updateTargetListing(const RemoteControllableTarget&);
void updateHasActiveDebugSession();
void updateClientCapabilities();
void sendAutomaticInspectionCandidateMessage();
#if PLATFORM(COCOA)
void xpcConnectionReceivedMessage(RemoteInspectorXPCConnection*, NSString *messageName, NSDictionary *userInfo) final;
void xpcConnectionFailed(RemoteInspectorXPCConnection*) final;
void xpcConnectionUnhandledMessage(RemoteInspectorXPCConnection*, xpc_object_t) final;
void receivedSetupMessage(NSDictionary *userInfo);
void receivedDataMessage(NSDictionary *userInfo);
void receivedDidCloseMessage(NSDictionary *userInfo);
void receivedGetListingMessage(NSDictionary *userInfo);
void receivedWakeUpDebuggables(NSDictionary *userInfo);
void receivedIndicateMessage(NSDictionary *userInfo);
void receivedProxyApplicationSetupMessage(NSDictionary *userInfo);
void receivedConnectionDiedMessage(NSDictionary *userInfo);
void receivedAutomaticInspectionConfigurationMessage(NSDictionary *userInfo);
void receivedAutomaticInspectionRejectMessage(NSDictionary *userInfo);
void receivedAutomationSessionRequestMessage(NSDictionary *userInfo);
#endif
#if USE(INSPECTOR_SOCKET_SERVER)
HashMap<String, CallHandler>& dispatchMap() final;
void didClose(RemoteInspectorSocketEndpoint&, ConnectionID) final;
void sendWebInspectorEvent(const String&);
void setupInspectorClient(const Event&);
void setupTarget(const Event&);
void frontendDidClose(const Event&);
void sendMessageToBackend(const Event&);
void startAutomationSession(const Event&);
void receivedAutomationSessionRequestMessage(const Event&);
String backendCommands() const;
#endif
static bool startEnabled;
#if PLATFORM(COCOA)
static std::atomic<bool> needMachSandboxExtension;
#endif
#if USE(GLIB)
static CString s_inspectorServerAddress;
#endif
// Targets can be registered from any thread at any time.
// Any target can send messages over the XPC connection.
// So lock access to all maps and state as they can change
// from any thread.
Lock m_mutex;
HashMap<TargetID, RemoteControllableTarget*> m_targetMap;
HashMap<TargetID, RefPtr<RemoteConnectionToTarget>> m_targetConnectionMap;
HashMap<TargetID, TargetListing> m_targetListingMap;
#if PLATFORM(COCOA)
RefPtr<RemoteInspectorXPCConnection> m_relayConnection;
bool m_shouldReconnectToRelayOnFailure { false };
#endif
#if USE(GLIB)
RefPtr<SocketConnection> m_socketConnection;
GRefPtr<GCancellable> m_cancellable;
#endif
#if USE(INSPECTOR_SOCKET_SERVER)
// Connection from RemoteInspectorClient or WebDriver.
std::optional<ConnectionID> m_clientConnection;
bool m_readyToPushListings { false };
String m_backendCommandsPath;
#endif
RemoteInspector::Client* m_client { nullptr };
std::optional<RemoteInspector::Client::Capabilities> m_clientCapabilities;
#if PLATFORM(COCOA)
dispatch_queue_t m_xpcQueue;
#endif
TargetID m_nextAvailableTargetIdentifier { 1 };
int m_notifyToken { 0 };
bool m_enabled { false };
bool m_hasActiveDebugSession { false };
bool m_pushScheduled { false };
ProcessID m_parentProcessIdentifier { 0 };
#if PLATFORM(COCOA)
RetainPtr<CFDataRef> m_parentProcessAuditData;
bool m_messageDataTypeChunkSupported { false };
#endif
bool m_shouldSendParentProcessInformation { false };
bool m_automaticInspectionEnabled { false };
bool m_automaticInspectionPaused { false };
TargetID m_automaticInspectionCandidateTargetIdentifier { 0 };
};
} // namespace Inspector
#endif // ENABLE(REMOTE_INSPECTOR)