2009-08-18 23:05:15 +04:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set sw=2 ts=8 et tw=80 : */
|
|
|
|
|
2012-05-21 15:12:37 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2009-08-18 23:05:15 +04:00
|
|
|
|
2013-11-12 02:52:33 +04:00
|
|
|
#include "necko-config.h"
|
Bug 530952: Electrolysis HTTP Channel implementation. author=jduell, r=bsmedberg, sr=bz
- Supports only primitive xpcshell HTTP requests which don't set/get HTTP
headers, don't do redirects, observers, load groups, or anything else other
than basic things like looking at the reply body, Content-type, Content-length, etc.
- Tested with network/test/unit_ipc/test_simple_wrap.js (patch @ bug 521922)
- Only used if "NECKO_E10S_HTTP" set in environment.
- Force http.h to get #included before any IPDL files, to centralize #define
handling of LOG and to make sure FORCE_PR_LOGGING is set if needed (bug
545995)
2009-09-22 22:55:33 +04:00
|
|
|
#include "nsHttp.h"
|
2009-08-18 23:05:15 +04:00
|
|
|
#include "mozilla/net/NeckoParent.h"
|
|
|
|
#include "mozilla/net/HttpChannelParent.h"
|
2010-03-26 02:02:28 +03:00
|
|
|
#include "mozilla/net/CookieServiceParent.h"
|
2010-10-11 15:35:10 +04:00
|
|
|
#include "mozilla/net/WyciwygChannelParent.h"
|
2010-08-10 22:47:00 +04:00
|
|
|
#include "mozilla/net/FTPChannelParent.h"
|
2011-05-04 17:36:23 +04:00
|
|
|
#include "mozilla/net/WebSocketChannelParent.h"
|
2015-10-28 22:10:20 +03:00
|
|
|
#include "mozilla/net/WebSocketEventListenerParent.h"
|
2015-03-27 23:12:37 +03:00
|
|
|
#include "mozilla/net/DataChannelParent.h"
|
2013-11-12 02:52:33 +04:00
|
|
|
#ifdef NECKO_PROTOCOL_rtsp
|
2013-09-23 14:12:11 +04:00
|
|
|
#include "mozilla/net/RtspControllerParent.h"
|
2014-04-03 15:08:34 +04:00
|
|
|
#include "mozilla/net/RtspChannelParent.h"
|
2013-09-23 14:12:11 +04:00
|
|
|
#endif
|
2013-12-11 23:03:51 +04:00
|
|
|
#include "mozilla/net/DNSRequestParent.h"
|
2012-12-22 17:56:21 +04:00
|
|
|
#include "mozilla/net/RemoteOpenFileParent.h"
|
2014-03-11 02:04:28 +04:00
|
|
|
#include "mozilla/net/ChannelDiverterParent.h"
|
2016-06-07 12:46:03 +03:00
|
|
|
#include "mozilla/net/IPCTransportProvider.h"
|
2013-08-21 10:49:41 +04:00
|
|
|
#include "mozilla/dom/ContentParent.h"
|
2014-12-09 19:34:00 +03:00
|
|
|
#include "mozilla/dom/TabContext.h"
|
2011-05-04 17:36:23 +04:00
|
|
|
#include "mozilla/dom/TabParent.h"
|
2012-09-24 22:53:49 +04:00
|
|
|
#include "mozilla/dom/network/TCPSocketParent.h"
|
2013-07-29 21:36:43 +04:00
|
|
|
#include "mozilla/dom/network/TCPServerSocketParent.h"
|
2013-05-10 16:00:28 +04:00
|
|
|
#include "mozilla/dom/network/UDPSocketParent.h"
|
2012-12-22 17:56:21 +04:00
|
|
|
#include "mozilla/ipc/URIUtils.h"
|
2012-12-29 13:02:16 +04:00
|
|
|
#include "mozilla/LoadContext.h"
|
2013-02-26 22:57:39 +04:00
|
|
|
#include "mozilla/AppProcessChecker.h"
|
2012-12-29 13:02:16 +04:00
|
|
|
#include "nsPrintfCString.h"
|
2010-07-26 22:49:09 +04:00
|
|
|
#include "nsHTMLDNSPrefetch.h"
|
2012-12-22 17:56:21 +04:00
|
|
|
#include "nsIAppsService.h"
|
|
|
|
#include "nsEscape.h"
|
2013-02-07 17:06:58 +04:00
|
|
|
#include "RemoteOpenFileParent.h"
|
2013-10-19 00:57:55 +04:00
|
|
|
#include "SerializedLoadContext.h"
|
2014-06-11 09:44:36 +04:00
|
|
|
#include "nsAuthInformationHolder.h"
|
|
|
|
#include "nsIAuthPromptCallback.h"
|
2014-08-29 04:20:27 +04:00
|
|
|
#include "nsPrincipal.h"
|
2014-08-23 07:05:56 +04:00
|
|
|
#include "nsIOService.h"
|
2015-06-18 12:23:00 +03:00
|
|
|
#include "nsINetworkPredictor.h"
|
2016-01-09 04:20:50 +03:00
|
|
|
#include "nsINetworkPredictorVerifier.h"
|
2014-08-23 07:05:56 +04:00
|
|
|
#include "mozilla/net/OfflineObserver.h"
|
2015-02-21 01:01:36 +03:00
|
|
|
#include "nsISpeculativeConnect.h"
|
2010-07-26 22:49:09 +04:00
|
|
|
|
2015-11-03 04:50:54 +03:00
|
|
|
using mozilla::DocShellOriginAttributes;
|
|
|
|
using mozilla::NeckoOriginAttributes;
|
2013-08-21 10:49:41 +04:00
|
|
|
using mozilla::dom::ContentParent;
|
2014-12-09 19:34:00 +03:00
|
|
|
using mozilla::dom::TabContext;
|
2011-05-04 17:36:23 +04:00
|
|
|
using mozilla::dom::TabParent;
|
2012-09-24 22:53:49 +04:00
|
|
|
using mozilla::net::PTCPSocketParent;
|
|
|
|
using mozilla::dom::TCPSocketParent;
|
2013-07-29 21:36:43 +04:00
|
|
|
using mozilla::net::PTCPServerSocketParent;
|
|
|
|
using mozilla::dom::TCPServerSocketParent;
|
2013-05-10 16:00:28 +04:00
|
|
|
using mozilla::net::PUDPSocketParent;
|
|
|
|
using mozilla::dom::UDPSocketParent;
|
2012-12-29 13:02:16 +04:00
|
|
|
using IPC::SerializedLoadContext;
|
2011-05-04 17:36:23 +04:00
|
|
|
|
2009-08-18 23:05:15 +04:00
|
|
|
namespace mozilla {
|
|
|
|
namespace net {
|
|
|
|
|
2015-06-18 12:23:00 +03:00
|
|
|
PNeckoParent *gNeckoParent = nullptr;
|
|
|
|
|
2009-08-18 23:05:15 +04:00
|
|
|
// C++ file contents
|
|
|
|
NeckoParent::NeckoParent()
|
|
|
|
{
|
2013-06-22 20:09:19 +04:00
|
|
|
// Init HTTP protocol handler now since we need atomTable up and running very
|
|
|
|
// early (IPDL argument handling for PHttpChannel constructor needs it) so
|
|
|
|
// normal init (during 1st Http channel request) isn't early enough.
|
|
|
|
nsCOMPtr<nsIProtocolHandler> proto =
|
|
|
|
do_GetService("@mozilla.org/network/protocol;1?name=http");
|
|
|
|
|
2014-08-23 07:05:56 +04:00
|
|
|
mObserver = new OfflineObserver(this);
|
2015-06-18 12:23:00 +03:00
|
|
|
gNeckoParent = this;
|
2016-08-19 04:55:00 +03:00
|
|
|
|
|
|
|
// only register once--we will have multiple NeckoParents if there are
|
|
|
|
// multiple child processes.
|
|
|
|
static bool registeredBool = false;
|
|
|
|
if (!registeredBool) {
|
|
|
|
Preferences::AddBoolVarCache(&NeckoCommonInternal::gSecurityDisabled,
|
|
|
|
"network.disable.ipc.security");
|
|
|
|
registeredBool = true;
|
|
|
|
}
|
2009-08-18 23:05:15 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
NeckoParent::~NeckoParent()
|
|
|
|
{
|
2016-03-29 02:43:01 +03:00
|
|
|
gNeckoParent = nullptr;
|
2014-08-23 07:05:56 +04:00
|
|
|
if (mObserver) {
|
|
|
|
mObserver->RemoveObserver();
|
|
|
|
}
|
2009-08-18 23:05:15 +04:00
|
|
|
}
|
|
|
|
|
2012-12-29 13:02:16 +04:00
|
|
|
static PBOverrideStatus
|
|
|
|
PBOverrideStatusFromLoadContext(const SerializedLoadContext& aSerialized)
|
|
|
|
{
|
|
|
|
if (!aSerialized.IsNotNull() && aSerialized.IsPrivateBitValid()) {
|
|
|
|
return aSerialized.mUsePrivateBrowsing ?
|
|
|
|
kPBOverride_Private :
|
|
|
|
kPBOverride_NotPrivate;
|
|
|
|
}
|
|
|
|
return kPBOverride_Unset;
|
|
|
|
}
|
|
|
|
|
2013-08-21 10:49:41 +04:00
|
|
|
const char*
|
|
|
|
NeckoParent::GetValidatedAppInfo(const SerializedLoadContext& aSerialized,
|
|
|
|
PContentParent* aContent,
|
2015-11-03 04:50:54 +03:00
|
|
|
DocShellOriginAttributes& aAttrs)
|
2013-08-21 10:49:41 +04:00
|
|
|
{
|
2014-06-27 19:12:03 +04:00
|
|
|
if (UsingNeckoIPCSecurity()) {
|
|
|
|
if (!aSerialized.IsNotNull()) {
|
|
|
|
return "SerializedLoadContext from child is null";
|
2013-08-21 10:49:41 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-09 19:34:00 +03:00
|
|
|
nsTArray<TabContext> contextArray =
|
|
|
|
static_cast<ContentParent*>(aContent)->GetManagedTabContext();
|
|
|
|
for (uint32_t i = 0; i < contextArray.Length(); i++) {
|
|
|
|
TabContext tabContext = contextArray[i];
|
|
|
|
uint32_t appId = tabContext.OwnOrContainingAppId();
|
2015-09-23 11:10:21 +03:00
|
|
|
bool inBrowserElement = aSerialized.IsNotNull() ?
|
2016-02-05 04:42:44 +03:00
|
|
|
aSerialized.mOriginAttributes.mInIsolatedMozBrowser :
|
2016-02-18 07:35:45 +03:00
|
|
|
tabContext.IsIsolatedMozBrowserElement();
|
2012-12-29 13:02:16 +04:00
|
|
|
|
2013-08-21 10:49:44 +04:00
|
|
|
if (appId == NECKO_UNKNOWN_APP_ID) {
|
|
|
|
continue;
|
2012-12-29 13:02:16 +04:00
|
|
|
}
|
|
|
|
// We may get appID=NO_APP if child frame is neither a browser nor an app
|
2016-05-06 06:24:20 +03:00
|
|
|
if (appId == NECKO_NO_APP_ID && tabContext.HasOwnApp()) {
|
2016-02-19 01:37:00 +03:00
|
|
|
// NECKO_NO_APP_ID but also is an app? Weird, skip.
|
|
|
|
continue;
|
2012-12-29 13:02:16 +04:00
|
|
|
}
|
2016-01-20 02:28:00 +03:00
|
|
|
|
2015-10-28 19:52:40 +03:00
|
|
|
if (!aSerialized.mOriginAttributes.mSignedPkg.IsEmpty() &&
|
|
|
|
aSerialized.mOriginAttributes.mSignedPkg != tabContext.OriginAttributesRef().mSignedPkg) {
|
|
|
|
continue;
|
|
|
|
}
|
2016-01-20 02:28:00 +03:00
|
|
|
if (aSerialized.mOriginAttributes.mUserContextId != tabContext.OriginAttributesRef().mUserContextId) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
aAttrs = DocShellOriginAttributes();
|
|
|
|
aAttrs.mAppId = appId;
|
2016-02-05 04:42:44 +03:00
|
|
|
aAttrs.mInIsolatedMozBrowser = inBrowserElement;
|
2016-01-20 02:28:00 +03:00
|
|
|
aAttrs.mSignedPkg = aSerialized.mOriginAttributes.mSignedPkg;
|
|
|
|
aAttrs.mUserContextId = aSerialized.mOriginAttributes.mUserContextId;
|
2016-06-03 00:02:29 +03:00
|
|
|
aAttrs.mPrivateBrowsingId = aSerialized.mOriginAttributes.mPrivateBrowsingId;
|
2016-01-20 02:28:00 +03:00
|
|
|
|
2014-06-27 19:12:03 +04:00
|
|
|
return nullptr;
|
2013-08-21 10:49:44 +04:00
|
|
|
}
|
|
|
|
|
2014-12-09 19:34:00 +03:00
|
|
|
if (contextArray.Length() != 0) {
|
2013-08-21 10:49:44 +04:00
|
|
|
return "App does not have permission";
|
|
|
|
}
|
|
|
|
|
2014-06-27 19:12:03 +04:00
|
|
|
if (!UsingNeckoIPCSecurity()) {
|
|
|
|
// We are running xpcshell tests
|
|
|
|
if (aSerialized.IsNotNull()) {
|
2015-09-23 11:10:21 +03:00
|
|
|
aAttrs = aSerialized.mOriginAttributes;
|
2014-06-27 19:12:03 +04:00
|
|
|
} else {
|
2015-11-03 04:50:54 +03:00
|
|
|
aAttrs = DocShellOriginAttributes(NECKO_NO_APP_ID, false);
|
2014-06-27 19:12:03 +04:00
|
|
|
}
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2013-08-21 10:49:44 +04:00
|
|
|
return "ContentParent does not have any PBrowsers";
|
2012-12-29 13:02:16 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
2014-06-11 09:44:36 +04:00
|
|
|
NeckoParent::CreateChannelLoadContext(const PBrowserOrId& aBrowser,
|
2013-08-21 10:49:44 +04:00
|
|
|
PContentParent* aContent,
|
2012-12-29 13:02:16 +04:00
|
|
|
const SerializedLoadContext& aSerialized,
|
|
|
|
nsCOMPtr<nsILoadContext> &aResult)
|
|
|
|
{
|
2015-11-03 04:50:54 +03:00
|
|
|
DocShellOriginAttributes attrs;
|
2015-09-23 11:10:21 +03:00
|
|
|
const char* error = GetValidatedAppInfo(aSerialized, aContent, attrs);
|
2012-12-29 13:02:16 +04:00
|
|
|
if (error) {
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2013-01-24 23:22:00 +04:00
|
|
|
// if !UsingNeckoIPCSecurity(), we may not have a LoadContext to set. This is
|
2012-12-29 13:02:16 +04:00
|
|
|
// the common case for most xpcshell tests.
|
|
|
|
if (aSerialized.IsNotNull()) {
|
2016-06-03 00:02:29 +03:00
|
|
|
attrs.SyncAttributesWithPrivateBrowsing(aSerialized.mUsePrivateBrowsing);
|
2014-06-11 09:44:36 +04:00
|
|
|
switch (aBrowser.type()) {
|
|
|
|
case PBrowserOrId::TPBrowserParent:
|
|
|
|
{
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<TabParent> tabParent =
|
2015-02-06 00:47:32 +03:00
|
|
|
TabParent::GetFrom(aBrowser.get_PBrowserParent());
|
2014-06-11 09:44:36 +04:00
|
|
|
dom::Element* topFrameElement = nullptr;
|
|
|
|
if (tabParent) {
|
|
|
|
topFrameElement = tabParent->GetOwnerElement();
|
|
|
|
}
|
2015-09-23 11:10:21 +03:00
|
|
|
aResult = new LoadContext(aSerialized, topFrameElement, attrs);
|
2014-06-11 09:44:36 +04:00
|
|
|
break;
|
|
|
|
}
|
2014-10-24 04:29:00 +04:00
|
|
|
case PBrowserOrId::TTabId:
|
2014-06-11 09:44:36 +04:00
|
|
|
{
|
2015-09-23 11:10:21 +03:00
|
|
|
aResult = new LoadContext(aSerialized, aBrowser.get_TabId(), attrs);
|
2014-06-11 09:44:36 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
MOZ_CRASH();
|
|
|
|
}
|
2012-12-29 13:02:16 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2014-05-02 22:44:13 +04:00
|
|
|
void
|
|
|
|
NeckoParent::ActorDestroy(ActorDestroyReason aWhy)
|
|
|
|
{
|
2016-08-23 23:21:00 +03:00
|
|
|
// Nothing needed here. Called right before destructor since this is a
|
|
|
|
// non-refcounted class.
|
2014-05-02 22:44:13 +04:00
|
|
|
}
|
|
|
|
|
2012-10-10 03:46:24 +04:00
|
|
|
PHttpChannelParent*
|
2014-06-11 09:44:36 +04:00
|
|
|
NeckoParent::AllocPHttpChannelParent(const PBrowserOrId& aBrowser,
|
2013-07-08 19:48:39 +04:00
|
|
|
const SerializedLoadContext& aSerialized,
|
|
|
|
const HttpChannelCreationArgs& aOpenArgs)
|
2009-08-18 23:05:15 +04:00
|
|
|
{
|
2012-12-29 13:02:16 +04:00
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
2015-07-31 00:53:38 +03:00
|
|
|
const char *error = CreateChannelLoadContext(aBrowser, Manager(),
|
2013-08-21 10:49:44 +04:00
|
|
|
aSerialized, loadContext);
|
2012-12-29 13:02:16 +04:00
|
|
|
if (error) {
|
2013-07-08 19:48:39 +04:00
|
|
|
printf_stderr("NeckoParent::AllocPHttpChannelParent: "
|
2013-01-03 08:15:19 +04:00
|
|
|
"FATAL error: %s: KILLING CHILD PROCESS\n",
|
|
|
|
error);
|
2012-12-29 13:02:16 +04:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(aSerialized);
|
|
|
|
HttpChannelParent *p = new HttpChannelParent(aBrowser, loadContext, overrideStatus);
|
Bug 530952: Electrolysis HTTP Channel implementation. author=jduell, r=bsmedberg, sr=bz
- Supports only primitive xpcshell HTTP requests which don't set/get HTTP
headers, don't do redirects, observers, load groups, or anything else other
than basic things like looking at the reply body, Content-type, Content-length, etc.
- Tested with network/test/unit_ipc/test_simple_wrap.js (patch @ bug 521922)
- Only used if "NECKO_E10S_HTTP" set in environment.
- Force http.h to get #included before any IPDL files, to centralize #define
handling of LOG and to make sure FORCE_PR_LOGGING is set if needed (bug
545995)
2009-09-22 22:55:33 +04:00
|
|
|
p->AddRef();
|
|
|
|
return p;
|
2009-08-18 23:05:15 +04:00
|
|
|
}
|
|
|
|
|
2012-10-10 03:46:24 +04:00
|
|
|
bool
|
2013-07-08 19:48:39 +04:00
|
|
|
NeckoParent::DeallocPHttpChannelParent(PHttpChannelParent* channel)
|
2009-08-18 23:05:15 +04:00
|
|
|
{
|
Bug 530952: Electrolysis HTTP Channel implementation. author=jduell, r=bsmedberg, sr=bz
- Supports only primitive xpcshell HTTP requests which don't set/get HTTP
headers, don't do redirects, observers, load groups, or anything else other
than basic things like looking at the reply body, Content-type, Content-length, etc.
- Tested with network/test/unit_ipc/test_simple_wrap.js (patch @ bug 521922)
- Only used if "NECKO_E10S_HTTP" set in environment.
- Force http.h to get #included before any IPDL files, to centralize #define
handling of LOG and to make sure FORCE_PR_LOGGING is set if needed (bug
545995)
2009-09-22 22:55:33 +04:00
|
|
|
HttpChannelParent *p = static_cast<HttpChannelParent *>(channel);
|
|
|
|
p->Release();
|
2009-09-18 03:09:20 +04:00
|
|
|
return true;
|
2009-08-18 23:05:15 +04:00
|
|
|
}
|
|
|
|
|
2013-06-22 20:09:19 +04:00
|
|
|
bool
|
|
|
|
NeckoParent::RecvPHttpChannelConstructor(
|
|
|
|
PHttpChannelParent* aActor,
|
2014-06-11 09:44:36 +04:00
|
|
|
const PBrowserOrId& aBrowser,
|
2013-06-22 20:09:19 +04:00
|
|
|
const SerializedLoadContext& aSerialized,
|
|
|
|
const HttpChannelCreationArgs& aOpenArgs)
|
|
|
|
{
|
|
|
|
HttpChannelParent* p = static_cast<HttpChannelParent*>(aActor);
|
|
|
|
return p->Init(aOpenArgs);
|
|
|
|
}
|
|
|
|
|
2010-08-10 22:47:00 +04:00
|
|
|
PFTPChannelParent*
|
2014-06-11 09:44:36 +04:00
|
|
|
NeckoParent::AllocPFTPChannelParent(const PBrowserOrId& aBrowser,
|
2013-07-08 19:48:39 +04:00
|
|
|
const SerializedLoadContext& aSerialized,
|
|
|
|
const FTPChannelCreationArgs& aOpenArgs)
|
2010-08-10 22:47:00 +04:00
|
|
|
{
|
2012-12-29 13:02:16 +04:00
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
2015-07-31 00:53:38 +03:00
|
|
|
const char *error = CreateChannelLoadContext(aBrowser, Manager(),
|
2013-08-21 10:49:44 +04:00
|
|
|
aSerialized, loadContext);
|
2012-12-29 13:02:16 +04:00
|
|
|
if (error) {
|
2013-07-08 19:48:39 +04:00
|
|
|
printf_stderr("NeckoParent::AllocPFTPChannelParent: "
|
2013-01-03 08:15:19 +04:00
|
|
|
"FATAL error: %s: KILLING CHILD PROCESS\n",
|
|
|
|
error);
|
2012-12-29 13:02:16 +04:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(aSerialized);
|
2015-07-21 18:15:00 +03:00
|
|
|
FTPChannelParent *p = new FTPChannelParent(aBrowser, loadContext, overrideStatus);
|
2010-08-10 22:47:00 +04:00
|
|
|
p->AddRef();
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2013-07-08 19:48:39 +04:00
|
|
|
NeckoParent::DeallocPFTPChannelParent(PFTPChannelParent* channel)
|
2010-08-10 22:47:00 +04:00
|
|
|
{
|
|
|
|
FTPChannelParent *p = static_cast<FTPChannelParent *>(channel);
|
|
|
|
p->Release();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-06-22 20:09:19 +04:00
|
|
|
bool
|
|
|
|
NeckoParent::RecvPFTPChannelConstructor(
|
|
|
|
PFTPChannelParent* aActor,
|
2014-06-11 09:44:36 +04:00
|
|
|
const PBrowserOrId& aBrowser,
|
2013-06-22 20:09:19 +04:00
|
|
|
const SerializedLoadContext& aSerialized,
|
|
|
|
const FTPChannelCreationArgs& aOpenArgs)
|
|
|
|
{
|
|
|
|
FTPChannelParent* p = static_cast<FTPChannelParent*>(aActor);
|
|
|
|
return p->Init(aOpenArgs);
|
|
|
|
}
|
|
|
|
|
2013-07-08 19:48:39 +04:00
|
|
|
PCookieServiceParent*
|
|
|
|
NeckoParent::AllocPCookieServiceParent()
|
2010-03-26 02:02:28 +03:00
|
|
|
{
|
|
|
|
return new CookieServiceParent();
|
|
|
|
}
|
|
|
|
|
2015-10-28 19:52:40 +03:00
|
|
|
bool
|
2013-07-08 19:48:39 +04:00
|
|
|
NeckoParent::DeallocPCookieServiceParent(PCookieServiceParent* cs)
|
2010-03-26 02:02:28 +03:00
|
|
|
{
|
|
|
|
delete cs;
|
|
|
|
return true;
|
|
|
|
}
|
2009-08-18 23:05:15 +04:00
|
|
|
|
2010-10-11 15:35:10 +04:00
|
|
|
PWyciwygChannelParent*
|
2013-07-08 19:48:39 +04:00
|
|
|
NeckoParent::AllocPWyciwygChannelParent()
|
2010-10-11 15:35:10 +04:00
|
|
|
{
|
|
|
|
WyciwygChannelParent *p = new WyciwygChannelParent();
|
|
|
|
p->AddRef();
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2013-07-08 19:48:39 +04:00
|
|
|
NeckoParent::DeallocPWyciwygChannelParent(PWyciwygChannelParent* channel)
|
2010-10-11 15:35:10 +04:00
|
|
|
{
|
|
|
|
WyciwygChannelParent *p = static_cast<WyciwygChannelParent *>(channel);
|
|
|
|
p->Release();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-05-04 17:36:23 +04:00
|
|
|
PWebSocketParent*
|
2014-06-11 09:44:36 +04:00
|
|
|
NeckoParent::AllocPWebSocketParent(const PBrowserOrId& browser,
|
2015-10-28 22:10:42 +03:00
|
|
|
const SerializedLoadContext& serialized,
|
|
|
|
const uint32_t& aSerial)
|
2011-05-04 17:36:23 +04:00
|
|
|
{
|
2012-12-29 13:02:16 +04:00
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
2015-07-31 00:53:38 +03:00
|
|
|
const char *error = CreateChannelLoadContext(browser, Manager(),
|
2013-08-21 10:49:44 +04:00
|
|
|
serialized, loadContext);
|
2012-12-29 13:02:16 +04:00
|
|
|
if (error) {
|
2013-07-08 19:48:39 +04:00
|
|
|
printf_stderr("NeckoParent::AllocPWebSocketParent: "
|
2013-01-03 08:15:19 +04:00
|
|
|
"FATAL error: %s: KILLING CHILD PROCESS\n",
|
|
|
|
error);
|
2012-12-29 13:02:16 +04:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<TabParent> tabParent = TabParent::GetFrom(browser.get_PBrowserParent());
|
2012-12-29 13:02:16 +04:00
|
|
|
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(serialized);
|
|
|
|
WebSocketChannelParent* p = new WebSocketChannelParent(tabParent, loadContext,
|
2015-10-28 22:10:42 +03:00
|
|
|
overrideStatus,
|
|
|
|
aSerial);
|
2011-05-04 17:36:23 +04:00
|
|
|
p->AddRef();
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2013-07-08 19:48:39 +04:00
|
|
|
NeckoParent::DeallocPWebSocketParent(PWebSocketParent* actor)
|
2011-05-04 17:36:23 +04:00
|
|
|
{
|
|
|
|
WebSocketChannelParent* p = static_cast<WebSocketChannelParent*>(actor);
|
|
|
|
p->Release();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-10-28 22:10:20 +03:00
|
|
|
PWebSocketEventListenerParent*
|
|
|
|
NeckoParent::AllocPWebSocketEventListenerParent(const uint64_t& aInnerWindowID)
|
2015-10-26 18:31:00 +03:00
|
|
|
{
|
2015-10-28 22:10:20 +03:00
|
|
|
RefPtr<WebSocketEventListenerParent> c =
|
|
|
|
new WebSocketEventListenerParent(aInnerWindowID);
|
2015-10-26 18:31:00 +03:00
|
|
|
return c.forget().take();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2015-10-28 22:10:20 +03:00
|
|
|
NeckoParent::DeallocPWebSocketEventListenerParent(PWebSocketEventListenerParent* aActor)
|
2015-10-26 18:31:00 +03:00
|
|
|
{
|
2015-10-28 22:10:20 +03:00
|
|
|
RefPtr<WebSocketEventListenerParent> c =
|
|
|
|
dont_AddRef(static_cast<WebSocketEventListenerParent*>(aActor));
|
2015-10-26 18:31:00 +03:00
|
|
|
MOZ_ASSERT(c);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-03-27 23:12:37 +03:00
|
|
|
PDataChannelParent*
|
|
|
|
NeckoParent::AllocPDataChannelParent(const uint32_t &channelId)
|
|
|
|
{
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<DataChannelParent> p = new DataChannelParent();
|
2015-03-27 23:12:37 +03:00
|
|
|
return p.forget().take();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPDataChannelParent(PDataChannelParent* actor)
|
|
|
|
{
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<DataChannelParent> p = dont_AddRef(static_cast<DataChannelParent*>(actor));
|
2015-03-27 23:12:37 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPDataChannelConstructor(PDataChannelParent* actor,
|
|
|
|
const uint32_t& channelId)
|
|
|
|
{
|
|
|
|
DataChannelParent* p = static_cast<DataChannelParent*>(actor);
|
|
|
|
p->Init(channelId);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-09-23 14:12:11 +04:00
|
|
|
PRtspControllerParent*
|
|
|
|
NeckoParent::AllocPRtspControllerParent()
|
|
|
|
{
|
2013-11-12 02:52:33 +04:00
|
|
|
#ifdef NECKO_PROTOCOL_rtsp
|
2013-09-23 14:12:11 +04:00
|
|
|
RtspControllerParent* p = new RtspControllerParent();
|
|
|
|
p->AddRef();
|
|
|
|
return p;
|
|
|
|
#else
|
|
|
|
return nullptr;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPRtspControllerParent(PRtspControllerParent* actor)
|
|
|
|
{
|
2013-11-12 02:52:33 +04:00
|
|
|
#ifdef NECKO_PROTOCOL_rtsp
|
2013-09-23 14:12:11 +04:00
|
|
|
RtspControllerParent* p = static_cast<RtspControllerParent*>(actor);
|
|
|
|
p->Release();
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-04-03 15:08:34 +04:00
|
|
|
PRtspChannelParent*
|
|
|
|
NeckoParent::AllocPRtspChannelParent(const RtspChannelConnectArgs& aArgs)
|
|
|
|
{
|
|
|
|
#ifdef NECKO_PROTOCOL_rtsp
|
|
|
|
nsCOMPtr<nsIURI> uri = DeserializeURI(aArgs.uri());
|
|
|
|
RtspChannelParent *p = new RtspChannelParent(uri);
|
|
|
|
p->AddRef();
|
|
|
|
return p;
|
|
|
|
#else
|
|
|
|
return nullptr;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPRtspChannelConstructor(
|
|
|
|
PRtspChannelParent* aActor,
|
|
|
|
const RtspChannelConnectArgs& aConnectArgs)
|
|
|
|
{
|
|
|
|
#ifdef NECKO_PROTOCOL_rtsp
|
|
|
|
RtspChannelParent* p = static_cast<RtspChannelParent*>(aActor);
|
|
|
|
return p->Init(aConnectArgs);
|
|
|
|
#else
|
2014-06-06 23:31:30 +04:00
|
|
|
return false;
|
2014-04-03 15:08:34 +04:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPRtspChannelParent(PRtspChannelParent* actor)
|
|
|
|
{
|
|
|
|
#ifdef NECKO_PROTOCOL_rtsp
|
|
|
|
RtspChannelParent* p = static_cast<RtspChannelParent*>(actor);
|
|
|
|
p->Release();
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-09-24 22:53:49 +04:00
|
|
|
PTCPSocketParent*
|
2013-12-19 07:21:12 +04:00
|
|
|
NeckoParent::AllocPTCPSocketParent(const nsString& /* host */,
|
|
|
|
const uint16_t& /* port */)
|
2012-09-24 22:53:49 +04:00
|
|
|
{
|
2013-12-19 07:21:12 +04:00
|
|
|
// We actually don't need host/port to construct a TCPSocketParent since
|
|
|
|
// TCPSocketParent will maintain an internal nsIDOMTCPSocket instance which
|
2015-10-28 19:52:40 +03:00
|
|
|
// can be delegated to get the host/port.
|
2012-09-24 22:53:49 +04:00
|
|
|
TCPSocketParent* p = new TCPSocketParent();
|
2013-07-29 21:36:43 +04:00
|
|
|
p->AddIPDLReference();
|
2012-09-24 22:53:49 +04:00
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2013-07-29 21:36:43 +04:00
|
|
|
NeckoParent::DeallocPTCPSocketParent(PTCPSocketParent* actor)
|
2012-09-24 22:53:49 +04:00
|
|
|
{
|
2013-07-29 21:36:43 +04:00
|
|
|
TCPSocketParent* p = static_cast<TCPSocketParent*>(actor);
|
|
|
|
p->ReleaseIPDLReference();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
PTCPServerSocketParent*
|
|
|
|
NeckoParent::AllocPTCPServerSocketParent(const uint16_t& aLocalPort,
|
2015-03-25 17:36:56 +03:00
|
|
|
const uint16_t& aBacklog,
|
|
|
|
const bool& aUseArrayBuffers)
|
2013-07-29 21:36:43 +04:00
|
|
|
{
|
2015-03-25 17:36:56 +03:00
|
|
|
TCPServerSocketParent* p = new TCPServerSocketParent(this, aLocalPort, aBacklog, aUseArrayBuffers);
|
2013-07-29 21:36:43 +04:00
|
|
|
p->AddIPDLReference();
|
|
|
|
return p;
|
2012-09-24 22:53:49 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2013-07-29 21:36:43 +04:00
|
|
|
NeckoParent::RecvPTCPServerSocketConstructor(PTCPServerSocketParent* aActor,
|
|
|
|
const uint16_t& aLocalPort,
|
|
|
|
const uint16_t& aBacklog,
|
2015-03-25 17:36:56 +03:00
|
|
|
const bool& aUseArrayBuffers)
|
2012-09-24 22:53:49 +04:00
|
|
|
{
|
2015-03-25 17:36:56 +03:00
|
|
|
static_cast<TCPServerSocketParent*>(aActor)->Init();
|
|
|
|
return true;
|
2013-07-29 21:36:43 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPTCPServerSocketParent(PTCPServerSocketParent* actor)
|
|
|
|
{
|
|
|
|
TCPServerSocketParent* p = static_cast<TCPServerSocketParent*>(actor);
|
|
|
|
p->ReleaseIPDLReference();
|
2012-09-24 22:53:49 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-05-10 16:00:28 +04:00
|
|
|
PUDPSocketParent*
|
2015-04-08 22:35:00 +03:00
|
|
|
NeckoParent::AllocPUDPSocketParent(const Principal& /* unused */,
|
|
|
|
const nsCString& /* unused */)
|
2014-05-06 14:32:25 +04:00
|
|
|
{
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<UDPSocketParent> p = new UDPSocketParent(this);
|
2013-05-10 16:00:28 +04:00
|
|
|
|
2014-05-06 14:32:25 +04:00
|
|
|
return p.forget().take();
|
2013-05-10 16:00:28 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPUDPSocketConstructor(PUDPSocketParent* aActor,
|
2015-04-08 22:35:00 +03:00
|
|
|
const Principal& aPrincipal,
|
2013-11-29 20:13:44 +04:00
|
|
|
const nsCString& aFilter)
|
2013-05-10 16:00:28 +04:00
|
|
|
{
|
2015-04-08 22:35:00 +03:00
|
|
|
return static_cast<UDPSocketParent*>(aActor)->Init(aPrincipal, aFilter);
|
2013-05-10 16:00:28 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPUDPSocketParent(PUDPSocketParent* actor)
|
|
|
|
{
|
|
|
|
UDPSocketParent* p = static_cast<UDPSocketParent*>(actor);
|
|
|
|
p->Release();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-12-11 23:03:51 +04:00
|
|
|
PDNSRequestParent*
|
|
|
|
NeckoParent::AllocPDNSRequestParent(const nsCString& aHost,
|
2015-02-19 08:14:00 +03:00
|
|
|
const uint32_t& aFlags,
|
|
|
|
const nsCString& aNetworkInterface)
|
2013-12-11 23:03:51 +04:00
|
|
|
{
|
|
|
|
DNSRequestParent *p = new DNSRequestParent();
|
|
|
|
p->AddRef();
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPDNSRequestConstructor(PDNSRequestParent* aActor,
|
|
|
|
const nsCString& aHost,
|
2015-02-19 08:14:00 +03:00
|
|
|
const uint32_t& aFlags,
|
|
|
|
const nsCString& aNetworkInterface)
|
2013-12-11 23:03:51 +04:00
|
|
|
{
|
2015-02-19 08:14:00 +03:00
|
|
|
static_cast<DNSRequestParent*>(aActor)->DoAsyncResolve(aHost, aFlags,
|
|
|
|
aNetworkInterface);
|
2013-12-11 23:03:51 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPDNSRequestParent(PDNSRequestParent* aParent)
|
|
|
|
{
|
|
|
|
DNSRequestParent *p = static_cast<DNSRequestParent*>(aParent);
|
|
|
|
p->Release();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-12-22 17:56:21 +04:00
|
|
|
PRemoteOpenFileParent*
|
2014-05-30 23:50:51 +04:00
|
|
|
NeckoParent::AllocPRemoteOpenFileParent(const SerializedLoadContext& aSerialized,
|
|
|
|
const URIParams& aURI,
|
2013-09-19 03:55:56 +04:00
|
|
|
const OptionalURIParams& aAppURI)
|
2012-12-22 17:56:21 +04:00
|
|
|
{
|
|
|
|
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
|
|
|
|
nsCOMPtr<nsIFileURL> fileURL = do_QueryInterface(uri);
|
|
|
|
if (!fileURL) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
// security checks
|
2013-01-24 23:22:00 +04:00
|
|
|
if (UsingNeckoIPCSecurity()) {
|
2012-12-22 17:56:21 +04:00
|
|
|
nsCOMPtr<nsIAppsService> appsService =
|
|
|
|
do_GetService(APPS_SERVICE_CONTRACTID);
|
|
|
|
if (!appsService) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
2014-06-27 19:12:03 +04:00
|
|
|
bool haveValidBrowser = false;
|
2012-12-22 17:56:21 +04:00
|
|
|
bool hasManage = false;
|
2013-08-21 10:49:43 +04:00
|
|
|
nsCOMPtr<mozIApplication> mozApp;
|
2014-12-09 19:34:00 +03:00
|
|
|
nsTArray<TabContext> contextArray =
|
|
|
|
static_cast<ContentParent*>(Manager())->GetManagedTabContext();
|
|
|
|
for (uint32_t i = 0; i < contextArray.Length(); i++) {
|
|
|
|
TabContext tabContext = contextArray[i];
|
|
|
|
uint32_t appId = tabContext.OwnOrContainingAppId();
|
2014-06-27 19:12:03 +04:00
|
|
|
// Note: this enforces that SerializedLoadContext.appID is one of the apps
|
|
|
|
// in the child process, but there's currently no way to verify the
|
|
|
|
// request is not from a different app in that process.
|
2015-09-23 11:10:21 +03:00
|
|
|
if (appId == aSerialized.mOriginAttributes.mAppId) {
|
2014-06-27 19:12:03 +04:00
|
|
|
nsresult rv = appsService->GetAppByLocalId(appId, getter_AddRefs(mozApp));
|
|
|
|
if (NS_FAILED(rv) || !mozApp) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
rv = mozApp->HasPermission("webapps-manage", &hasManage);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
haveValidBrowser = true;
|
|
|
|
break;
|
|
|
|
}
|
2014-06-27 04:06:55 +04:00
|
|
|
}
|
2014-06-27 19:12:03 +04:00
|
|
|
|
2015-08-27 04:40:05 +03:00
|
|
|
nsCOMPtr<nsIURI> appUri = DeserializeURI(aAppURI);
|
|
|
|
|
2014-06-27 19:12:03 +04:00
|
|
|
if (!haveValidBrowser) {
|
2015-08-27 04:40:05 +03:00
|
|
|
// Extension loads come from chrome and have no valid browser, so we check
|
|
|
|
// for these early on.
|
|
|
|
bool fromExtension = false;
|
|
|
|
if (NS_SUCCEEDED(appsService->IsExtensionResource(appUri, &fromExtension)) &&
|
|
|
|
fromExtension) {
|
|
|
|
RemoteOpenFileParent* parent = new RemoteOpenFileParent(fileURL);
|
|
|
|
return parent;
|
|
|
|
}
|
2012-12-22 17:56:21 +04:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
RemoteOpenFileParent* parent = new RemoteOpenFileParent(fileURL);
|
|
|
|
return parent;
|
|
|
|
}
|
|
|
|
|
2013-02-07 17:06:58 +04:00
|
|
|
bool
|
2014-05-30 23:50:51 +04:00
|
|
|
NeckoParent::RecvPRemoteOpenFileConstructor(
|
|
|
|
PRemoteOpenFileParent* aActor,
|
|
|
|
const SerializedLoadContext& aSerialized,
|
|
|
|
const URIParams& aFileURI,
|
|
|
|
const OptionalURIParams& aAppURI)
|
2013-02-07 17:06:58 +04:00
|
|
|
{
|
|
|
|
return static_cast<RemoteOpenFileParent*>(aActor)->OpenSendCloseDelete();
|
|
|
|
}
|
|
|
|
|
2012-12-22 17:56:21 +04:00
|
|
|
bool
|
2013-07-08 19:48:39 +04:00
|
|
|
NeckoParent::DeallocPRemoteOpenFileParent(PRemoteOpenFileParent* actor)
|
2012-12-22 17:56:21 +04:00
|
|
|
{
|
|
|
|
delete actor;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-02-21 01:01:36 +03:00
|
|
|
bool
|
2015-05-06 04:15:36 +03:00
|
|
|
NeckoParent::RecvSpeculativeConnect(const URIParams& aURI, const bool& aAnonymous)
|
2015-02-21 01:01:36 +03:00
|
|
|
{
|
|
|
|
nsCOMPtr<nsISpeculativeConnect> speculator(gIOService);
|
|
|
|
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
|
|
|
|
if (uri && speculator) {
|
2015-05-06 04:15:36 +03:00
|
|
|
if (aAnonymous) {
|
|
|
|
speculator->SpeculativeAnonymousConnect(uri, nullptr);
|
|
|
|
} else {
|
|
|
|
speculator->SpeculativeConnect(uri, nullptr);
|
|
|
|
}
|
|
|
|
|
2015-02-21 01:01:36 +03:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-07-26 22:49:09 +04:00
|
|
|
bool
|
|
|
|
NeckoParent::RecvHTMLDNSPrefetch(const nsString& hostname,
|
2012-08-22 19:56:38 +04:00
|
|
|
const uint16_t& flags)
|
2010-07-26 22:49:09 +04:00
|
|
|
{
|
2012-01-21 03:14:46 +04:00
|
|
|
nsHTMLDNSPrefetch::Prefetch(hostname, flags);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvCancelHTMLDNSPrefetch(const nsString& hostname,
|
2012-08-22 19:56:38 +04:00
|
|
|
const uint16_t& flags,
|
2012-01-21 03:14:46 +04:00
|
|
|
const nsresult& reason)
|
|
|
|
{
|
|
|
|
nsHTMLDNSPrefetch::CancelPrefetch(hostname, flags, reason);
|
2010-07-26 22:49:09 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-03-11 02:04:28 +04:00
|
|
|
PChannelDiverterParent*
|
|
|
|
NeckoParent::AllocPChannelDiverterParent(const ChannelDiverterArgs& channel)
|
|
|
|
{
|
|
|
|
return new ChannelDiverterParent();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPChannelDiverterConstructor(PChannelDiverterParent* actor,
|
|
|
|
const ChannelDiverterArgs& channel)
|
|
|
|
{
|
|
|
|
auto parent = static_cast<ChannelDiverterParent*>(actor);
|
|
|
|
parent->Init(channel);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPChannelDiverterParent(PChannelDiverterParent* parent)
|
|
|
|
{
|
|
|
|
delete static_cast<ChannelDiverterParent*>(parent);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-06-07 12:46:03 +03:00
|
|
|
PTransportProviderParent*
|
|
|
|
NeckoParent::AllocPTransportProviderParent()
|
|
|
|
{
|
|
|
|
RefPtr<TransportProviderParent> res = new TransportProviderParent();
|
|
|
|
return res.forget().take();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::DeallocPTransportProviderParent(PTransportProviderParent* aActor)
|
|
|
|
{
|
|
|
|
RefPtr<TransportProviderParent> provider =
|
|
|
|
dont_AddRef(static_cast<TransportProviderParent*>(aActor));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-06-03 14:14:37 +04:00
|
|
|
void
|
|
|
|
NeckoParent::CloneManagees(ProtocolBase* aSource,
|
|
|
|
mozilla::ipc::ProtocolCloneContext* aCtx)
|
|
|
|
{
|
|
|
|
aCtx->SetNeckoParent(this); // For cloning protocols managed by this.
|
|
|
|
PNeckoParent::CloneManagees(aSource, aCtx);
|
|
|
|
}
|
|
|
|
|
|
|
|
mozilla::ipc::IProtocol*
|
|
|
|
NeckoParent::CloneProtocol(Channel* aChannel,
|
|
|
|
mozilla::ipc::ProtocolCloneContext* aCtx)
|
|
|
|
{
|
|
|
|
ContentParent* contentParent = aCtx->GetContentParent();
|
|
|
|
nsAutoPtr<PNeckoParent> actor(contentParent->AllocPNeckoParent());
|
|
|
|
if (!actor || !contentParent->RecvPNeckoConstructor(actor)) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
return actor.forget();
|
|
|
|
}
|
|
|
|
|
2014-06-11 09:44:36 +04:00
|
|
|
namespace {
|
|
|
|
std::map<uint64_t, nsCOMPtr<nsIAuthPromptCallback> >&
|
|
|
|
CallbackMap()
|
|
|
|
{
|
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
static std::map<uint64_t, nsCOMPtr<nsIAuthPromptCallback> > sCallbackMap;
|
|
|
|
return sCallbackMap;
|
|
|
|
}
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace
|
2014-06-11 09:44:36 +04:00
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(NeckoParent::NestedFrameAuthPrompt, nsIAuthPrompt2)
|
|
|
|
|
|
|
|
NeckoParent::NestedFrameAuthPrompt::NestedFrameAuthPrompt(PNeckoParent* aParent,
|
2014-10-24 04:29:00 +04:00
|
|
|
TabId aNestedFrameId)
|
2014-06-11 09:44:36 +04:00
|
|
|
: mNeckoParent(aParent)
|
|
|
|
, mNestedFrameId(aNestedFrameId)
|
|
|
|
{}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
NeckoParent::NestedFrameAuthPrompt::AsyncPromptAuth(
|
|
|
|
nsIChannel* aChannel, nsIAuthPromptCallback* callback,
|
|
|
|
nsISupports*, uint32_t,
|
|
|
|
nsIAuthInformation* aInfo, nsICancelable**)
|
|
|
|
{
|
|
|
|
static uint64_t callbackId = 0;
|
2015-07-04 04:29:00 +03:00
|
|
|
MOZ_ASSERT(XRE_IsParentProcess());
|
2014-06-11 09:44:36 +04:00
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
nsresult rv = aChannel->GetURI(getter_AddRefs(uri));
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
nsAutoCString spec;
|
|
|
|
if (uri) {
|
|
|
|
rv = uri->GetSpec(spec);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
}
|
|
|
|
nsString realm;
|
|
|
|
rv = aInfo->GetRealm(realm);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
callbackId++;
|
|
|
|
if (mNeckoParent->SendAsyncAuthPromptForNestedFrame(mNestedFrameId,
|
|
|
|
spec,
|
|
|
|
realm,
|
|
|
|
callbackId)) {
|
|
|
|
CallbackMap()[callbackId] = callback;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvOnAuthAvailable(const uint64_t& aCallbackId,
|
|
|
|
const nsString& aUser,
|
|
|
|
const nsString& aPassword,
|
|
|
|
const nsString& aDomain)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIAuthPromptCallback> callback = CallbackMap()[aCallbackId];
|
|
|
|
if (!callback) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
CallbackMap().erase(aCallbackId);
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<nsAuthInformationHolder> holder =
|
2014-06-11 09:44:36 +04:00
|
|
|
new nsAuthInformationHolder(0, EmptyString(), EmptyCString());
|
|
|
|
holder->SetUsername(aUser);
|
|
|
|
holder->SetPassword(aPassword);
|
|
|
|
holder->SetDomain(aDomain);
|
|
|
|
|
|
|
|
callback->OnAuthAvailable(nullptr, holder);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvOnAuthCancelled(const uint64_t& aCallbackId,
|
|
|
|
const bool& aUserCancel)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIAuthPromptCallback> callback = CallbackMap()[aCallbackId];
|
|
|
|
if (!callback) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
CallbackMap().erase(aCallbackId);
|
|
|
|
callback->OnAuthCancelled(nullptr, aUserCancel);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-06-18 12:23:00 +03:00
|
|
|
/* Predictor Messages */
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPredPredict(const ipc::OptionalURIParams& aTargetURI,
|
|
|
|
const ipc::OptionalURIParams& aSourceURI,
|
|
|
|
const uint32_t& aReason,
|
|
|
|
const SerializedLoadContext& aLoadContext,
|
|
|
|
const bool& hasVerifier)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIURI> targetURI = DeserializeURI(aTargetURI);
|
|
|
|
nsCOMPtr<nsIURI> sourceURI = DeserializeURI(aSourceURI);
|
|
|
|
|
|
|
|
// We only actually care about the loadContext.mPrivateBrowsing, so we'll just
|
2015-09-23 11:10:21 +03:00
|
|
|
// pass dummy params for nestFrameId, and originAttributes.
|
2015-06-18 12:23:00 +03:00
|
|
|
uint64_t nestedFrameId = 0;
|
2015-11-03 04:50:54 +03:00
|
|
|
DocShellOriginAttributes attrs(NECKO_UNKNOWN_APP_ID, false);
|
2015-06-18 12:23:00 +03:00
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
|
|
|
if (aLoadContext.IsNotNull()) {
|
2016-06-03 00:02:29 +03:00
|
|
|
attrs.SyncAttributesWithPrivateBrowsing(aLoadContext.mUsePrivateBrowsing);
|
2015-09-23 11:10:21 +03:00
|
|
|
loadContext = new LoadContext(aLoadContext, nestedFrameId, attrs);
|
2015-06-18 12:23:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Get the current predictor
|
|
|
|
nsresult rv = NS_OK;
|
|
|
|
nsCOMPtr<nsINetworkPredictor> predictor =
|
|
|
|
do_GetService("@mozilla.org/network/predictor;1", &rv);
|
|
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
|
|
|
|
nsCOMPtr<nsINetworkPredictorVerifier> verifier;
|
|
|
|
if (hasVerifier) {
|
|
|
|
verifier = do_QueryInterface(predictor);
|
|
|
|
}
|
|
|
|
predictor->Predict(targetURI, sourceURI, aReason, loadContext, verifier);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPredLearn(const ipc::URIParams& aTargetURI,
|
|
|
|
const ipc::OptionalURIParams& aSourceURI,
|
|
|
|
const uint32_t& aReason,
|
|
|
|
const SerializedLoadContext& aLoadContext)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIURI> targetURI = DeserializeURI(aTargetURI);
|
|
|
|
nsCOMPtr<nsIURI> sourceURI = DeserializeURI(aSourceURI);
|
|
|
|
|
|
|
|
// We only actually care about the loadContext.mPrivateBrowsing, so we'll just
|
2015-09-23 11:10:21 +03:00
|
|
|
// pass dummy params for nestFrameId, and originAttributes;
|
2015-06-18 12:23:00 +03:00
|
|
|
uint64_t nestedFrameId = 0;
|
2015-11-03 04:50:54 +03:00
|
|
|
DocShellOriginAttributes attrs(NECKO_UNKNOWN_APP_ID, false);
|
2015-06-18 12:23:00 +03:00
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
|
|
|
if (aLoadContext.IsNotNull()) {
|
2016-06-03 00:02:29 +03:00
|
|
|
attrs.SyncAttributesWithPrivateBrowsing(aLoadContext.mUsePrivateBrowsing);
|
2015-09-23 11:10:21 +03:00
|
|
|
loadContext = new LoadContext(aLoadContext, nestedFrameId, attrs);
|
2015-06-18 12:23:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Get the current predictor
|
|
|
|
nsresult rv = NS_OK;
|
|
|
|
nsCOMPtr<nsINetworkPredictor> predictor =
|
|
|
|
do_GetService("@mozilla.org/network/predictor;1", &rv);
|
|
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
|
|
|
|
predictor->Learn(targetURI, sourceURI, aReason, loadContext);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
NeckoParent::RecvPredReset()
|
|
|
|
{
|
|
|
|
// Get the current predictor
|
|
|
|
nsresult rv = NS_OK;
|
|
|
|
nsCOMPtr<nsINetworkPredictor> predictor =
|
|
|
|
do_GetService("@mozilla.org/network/predictor;1", &rv);
|
|
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
|
|
|
|
predictor->Reset();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-08-23 07:05:56 +04:00
|
|
|
nsresult
|
|
|
|
NeckoParent::OfflineNotification(nsISupports *aSubject)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIAppOfflineInfo> info(do_QueryInterface(aSubject));
|
|
|
|
if (!info) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t targetAppId = NECKO_UNKNOWN_APP_ID;
|
|
|
|
info->GetAppId(&targetAppId);
|
|
|
|
|
2014-12-09 19:34:00 +03:00
|
|
|
nsTArray<TabContext> contextArray =
|
|
|
|
static_cast<ContentParent*>(Manager())->GetManagedTabContext();
|
|
|
|
for (uint32_t i = 0; i < contextArray.Length(); ++i) {
|
|
|
|
TabContext tabContext = contextArray[i];
|
|
|
|
uint32_t appId = tabContext.OwnOrContainingAppId();
|
2014-08-23 07:05:56 +04:00
|
|
|
|
|
|
|
if (appId == targetAppId) {
|
|
|
|
if (gIOService) {
|
|
|
|
bool offline = false;
|
|
|
|
nsresult rv = gIOService->IsAppOffline(appId, &offline);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
printf_stderr("Unexpected - NeckoParent: "
|
|
|
|
"appId not found by isAppOffline(): %u\n", appId);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!SendAppOfflineStatus(appId, offline)) {
|
|
|
|
printf_stderr("NeckoParent: "
|
|
|
|
"SendAppOfflineStatus failed for appId: %u\n", appId);
|
|
|
|
}
|
|
|
|
// Once we found the targetAppId, we don't need to continue
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2014-09-01 18:29:28 +04:00
|
|
|
// XPCShells don't have any TabParents
|
|
|
|
// Just send the ipdl message to the child process.
|
|
|
|
if (!UsingNeckoIPCSecurity()) {
|
|
|
|
bool offline = false;
|
|
|
|
gIOService->IsAppOffline(targetAppId, &offline);
|
|
|
|
if (!SendAppOfflineStatus(targetAppId, offline)) {
|
|
|
|
printf_stderr("NeckoParent: "
|
|
|
|
"SendAppOfflineStatus failed for targetAppId: %u\n", targetAppId);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-23 07:05:56 +04:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-07-31 23:50:08 +03:00
|
|
|
bool
|
2016-04-21 17:59:17 +03:00
|
|
|
NeckoParent::RecvRemoveRequestContext(const nsCString& rcid)
|
2015-07-31 23:50:08 +03:00
|
|
|
{
|
2016-04-21 17:59:17 +03:00
|
|
|
nsCOMPtr<nsIRequestContextService> rcsvc =
|
|
|
|
do_GetService("@mozilla.org/network/request-context-service;1");
|
|
|
|
if (!rcsvc) {
|
2015-07-31 23:50:08 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsID id;
|
2016-04-21 17:59:17 +03:00
|
|
|
id.Parse(rcid.BeginReading());
|
|
|
|
rcsvc->RemoveRequestContext(id);
|
2015-07-31 23:50:08 +03:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace net
|
|
|
|
} // namespace mozilla
|