blob: 8220b44b43454403ba6ee46bba05cb0295bc8fe4 [file] [log] [blame]
// Copyright (C) 2019 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
import m from 'mithril';
import {Time} from '../base/time';
import {Actions, PostedScrollToRange, PostedTrace} from '../common/actions';
import {showModal} from '../widgets/modal';
import {initCssConstants} from './css_constants';
import {globals} from './globals';
import {toggleHelp} from './help_modal';
import {focusHorizontalRange} from './scroll_helper';
const TRUSTED_ORIGINS_KEY = 'trustedOrigins';
interface PostedTraceWrapped {
perfetto: PostedTrace;
}
interface PostedScrollToRangeWrapped {
perfetto: PostedScrollToRange;
}
// Returns whether incoming traces should be opened automatically or should
// instead require a user interaction.
export function isTrustedOrigin(origin: string): boolean {
const TRUSTED_ORIGINS = [
'https://chrometto.googleplex.com',
'https://uma.googleplex.com',
'https://android-build.googleplex.com',
];
if (origin === window.origin) return true;
if (TRUSTED_ORIGINS.includes(origin)) return true;
if (isUserTrustedOrigin(origin)) return true;
const hostname = new URL(origin).hostname;
if (hostname.endsWith('.corp.google.com')) return true;
if (hostname.endsWith('.c.googlers.com')) return true;
if (
hostname === 'localhost' ||
hostname === '127.0.0.1' ||
hostname === '[::1]'
) {
return true;
}
return false;
}
// Returns whether the user saved this as an always-trusted origin.
function isUserTrustedOrigin(hostname: string): boolean {
const trustedOrigins = window.localStorage.getItem(TRUSTED_ORIGINS_KEY);
if (trustedOrigins === null) return false;
try {
return JSON.parse(trustedOrigins).includes(hostname);
} catch {
return false;
}
}
// Saves the given hostname as a trusted origin.
// This is used for user convenience: if it fails for any reason, it's not a
// big deal.
function saveUserTrustedOrigin(hostname: string) {
const s = window.localStorage.getItem(TRUSTED_ORIGINS_KEY);
let origins: string[];
try {
origins = JSON.parse(s || '[]');
if (origins.includes(hostname)) return;
origins.push(hostname);
window.localStorage.setItem(TRUSTED_ORIGINS_KEY, JSON.stringify(origins));
} catch (e) {
console.warn('unable to save trusted origins to localStorage', e);
}
}
// Returns whether we should ignore a given message based on the value of
// the 'perfettoIgnore' field in the event data.
function shouldGracefullyIgnoreMessage(messageEvent: MessageEvent) {
return messageEvent.data.perfettoIgnore === true;
}
// The message handler supports loading traces from an ArrayBuffer.
// There is no other requirement than sending the ArrayBuffer as the |data|
// property. However, since this will happen across different origins, it is not
// possible for the source website to inspect whether the message handler is
// ready, so the message handler always replies to a 'PING' message with 'PONG',
// which indicates it is ready to receive a trace.
export function postMessageHandler(messageEvent: MessageEvent) {
if (shouldGracefullyIgnoreMessage(messageEvent)) {
// This message should not be handled in this handler,
// because it will be handled elsewhere.
return;
}
if (messageEvent.origin === 'https://tagassistant.google.com') {
// The GA debugger, does a window.open() and sends messages to the GA
// script. Ignore them.
return;
}
if (document.readyState !== 'complete') {
console.error('Ignoring message - document not ready yet.');
return;
}
const fromOpener = messageEvent.source === window.opener;
const fromIframeHost = messageEvent.source === window.parent;
// This adds support for the folowing flow:
// * A (page that whats to open a trace in perfetto) opens B
// * B (does something to get the traceBuffer)
// * A is navigated to Perfetto UI
// * B sends the traceBuffer to A
// * closes itself
const fromOpenee = (messageEvent.source as WindowProxy).opener === window;
if (
messageEvent.source === null ||
!(fromOpener || fromIframeHost || fromOpenee)
) {
// This can happen if an extension tries to postMessage.
return;
}
if (!('data' in messageEvent)) {
throw new Error('Incoming message has no data property');
}
if (messageEvent.data === 'PING') {
// Cross-origin messaging means we can't read |messageEvent.source|, but
// it still needs to be of the correct type to be able to invoke the
// correct version of postMessage(...).
const windowSource = messageEvent.source as Window;
windowSource.postMessage('PONG', messageEvent.origin);
return;
}
if (messageEvent.data === 'SHOW-HELP') {
toggleHelp();
return;
}
if (messageEvent.data === 'RELOAD-CSS-CONSTANTS') {
initCssConstants();
return;
}
let postedScrollToRange: PostedScrollToRange;
if (isPostedScrollToRange(messageEvent.data)) {
postedScrollToRange = messageEvent.data.perfetto;
scrollToTimeRange(postedScrollToRange);
return;
}
let postedTrace: PostedTrace;
let keepApiOpen = false;
if (isPostedTraceWrapped(messageEvent.data)) {
postedTrace = sanitizePostedTrace(messageEvent.data.perfetto);
if (postedTrace.keepApiOpen) {
keepApiOpen = true;
}
} else if (messageEvent.data instanceof ArrayBuffer) {
postedTrace = {title: 'External trace', buffer: messageEvent.data};
} else {
console.warn(
'Unknown postMessage() event received. If you are trying to open a ' +
'trace via postMessage(), this is a bug in your code. If not, this ' +
'could be due to some Chrome extension.',
);
console.log('origin:', messageEvent.origin, 'data:', messageEvent.data);
return;
}
if (postedTrace.buffer.byteLength === 0) {
throw new Error('Incoming message trace buffer is empty');
}
if (!keepApiOpen) {
/* Removing this event listener to avoid callers posting the trace multiple
* times. If the callers add an event listener which upon receiving 'PONG'
* posts the trace to ui.perfetto.dev, the callers can receive multiple
* 'PONG' messages and accidentally post the trace multiple times. This was
* part of the cause of b/182502595.
*/
window.removeEventListener('message', postMessageHandler);
}
const openTrace = () => {
// For external traces, we need to disable other features such as
// downloading and sharing a trace.
postedTrace.localOnly = true;
globals.dispatch(Actions.openTraceFromBuffer(postedTrace));
};
const trustAndOpenTrace = () => {
saveUserTrustedOrigin(messageEvent.origin);
openTrace();
};
// If the origin is trusted open the trace directly.
if (isTrustedOrigin(messageEvent.origin)) {
openTrace();
return;
}
// If not ask the user if they expect this and trust the origin.
showModal({
title: 'Open trace?',
content: m(
'div',
m('div', `${messageEvent.origin} is trying to open a trace file.`),
m('div', 'Do you trust the origin and want to proceed?'),
),
buttons: [
{text: 'No', primary: true},
{text: 'Yes', primary: false, action: openTrace},
{text: 'Always trust', primary: false, action: trustAndOpenTrace},
],
});
}
function sanitizePostedTrace(postedTrace: PostedTrace): PostedTrace {
const result: PostedTrace = {
title: sanitizeString(postedTrace.title),
buffer: postedTrace.buffer,
keepApiOpen: postedTrace.keepApiOpen,
};
if (postedTrace.url !== undefined) {
result.url = sanitizeString(postedTrace.url);
}
return result;
}
function sanitizeString(str: string): string {
return str.replace(/[^A-Za-z0-9.\-_#:/?=&;%+$ ]/g, ' ');
}
function isTraceViewerReady(): boolean {
return !!globals.getCurrentEngine()?.ready;
}
const _maxScrollToRangeAttempts = 20;
async function scrollToTimeRange(
postedScrollToRange: PostedScrollToRange,
maxAttempts?: number,
) {
const ready = isTraceViewerReady();
if (!ready) {
if (maxAttempts === undefined) {
maxAttempts = 0;
}
if (maxAttempts > _maxScrollToRangeAttempts) {
console.warn('Could not scroll to time range. Trace viewer not ready.');
return;
}
setTimeout(scrollToTimeRange, 200, postedScrollToRange, maxAttempts + 1);
} else {
const start = Time.fromSeconds(postedScrollToRange.timeStart);
const end = Time.fromSeconds(postedScrollToRange.timeEnd);
focusHorizontalRange(start, end, postedScrollToRange.viewPercentage);
}
}
function isPostedScrollToRange(
obj: unknown,
): obj is PostedScrollToRangeWrapped {
const wrapped = obj as PostedScrollToRangeWrapped;
if (wrapped.perfetto === undefined) {
return false;
}
return (
wrapped.perfetto.timeStart !== undefined ||
wrapped.perfetto.timeEnd !== undefined
);
}
// eslint-disable-next-line @typescript-eslint/no-explicit-any
function isPostedTraceWrapped(obj: any): obj is PostedTraceWrapped {
const wrapped = obj as PostedTraceWrapped;
if (wrapped.perfetto === undefined) {
return false;
}
return (
wrapped.perfetto.buffer !== undefined &&
wrapped.perfetto.title !== undefined
);
}