зеркало из https://github.com/mozilla/gecko-dev.git
Backed out changeset 05857d2111ba (bug 1842754) for causing build bustages on BackgroundUtils.cpp. CLOSED TREE
This commit is contained in:
Родитель
438c14da8e
Коммит
98f7137dd1
|
@ -4284,12 +4284,16 @@ mozilla::ipc::IPCResult ContentChild::RecvScriptError(
|
|||
}
|
||||
|
||||
mozilla::ipc::IPCResult ContentChild::RecvReportFrameTimingData(
|
||||
const LoadInfoArgs& loadInfoArgs, const nsString& entryName,
|
||||
const mozilla::Maybe<LoadInfoArgs>& loadInfoArgs, const nsString& entryName,
|
||||
const nsString& initiatorType, UniquePtr<PerformanceTimingData>&& aData) {
|
||||
if (!aData) {
|
||||
return IPC_FAIL(this, "aData should not be null");
|
||||
}
|
||||
|
||||
if (loadInfoArgs.isNothing()) {
|
||||
return IPC_FAIL(this, "loadInfoArgs should not be null");
|
||||
}
|
||||
|
||||
nsCOMPtr<nsILoadInfo> loadInfo;
|
||||
nsresult rv = mozilla::ipc::LoadInfoArgsToLoadInfo(
|
||||
loadInfoArgs, NOT_REMOTE_TYPE, getter_AddRefs(loadInfo));
|
||||
|
|
|
@ -729,8 +729,9 @@ class ContentChild final : public PContentChild,
|
|||
const uint64_t& aInnerWindowId, const bool& aFromChromeContext);
|
||||
|
||||
mozilla::ipc::IPCResult RecvReportFrameTimingData(
|
||||
const LoadInfoArgs& loadInfoArgs, const nsString& entryName,
|
||||
const nsString& initiatorType, UniquePtr<PerformanceTimingData>&& aData);
|
||||
const mozilla::Maybe<LoadInfoArgs>& loadInfoArgs,
|
||||
const nsString& entryName, const nsString& initiatorType,
|
||||
UniquePtr<PerformanceTimingData>&& aData);
|
||||
|
||||
mozilla::ipc::IPCResult RecvLoadURI(
|
||||
const MaybeDiscarded<BrowsingContext>& aContext,
|
||||
|
|
|
@ -4709,7 +4709,7 @@ mozilla::ipc::IPCResult ContentParent::RecvAddSecurityState(
|
|||
|
||||
already_AddRefed<PExternalHelperAppParent>
|
||||
ContentParent::AllocPExternalHelperAppParent(
|
||||
nsIURI* uri, const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
nsIURI* uri, const Maybe<mozilla::net::LoadInfoArgs>& aLoadInfoArgs,
|
||||
const nsACString& aMimeContentType, const nsACString& aContentDisposition,
|
||||
const uint32_t& aContentDispositionHint,
|
||||
const nsAString& aContentDispositionFilename, const bool& aForceSave,
|
||||
|
@ -4724,7 +4724,7 @@ ContentParent::AllocPExternalHelperAppParent(
|
|||
|
||||
mozilla::ipc::IPCResult ContentParent::RecvPExternalHelperAppConstructor(
|
||||
PExternalHelperAppParent* actor, nsIURI* uri,
|
||||
const LoadInfoArgs& loadInfoArgs, const nsACString& aMimeContentType,
|
||||
const Maybe<LoadInfoArgs>& loadInfoArgs, const nsACString& aMimeContentType,
|
||||
const nsACString& aContentDisposition,
|
||||
const uint32_t& aContentDispositionHint,
|
||||
const nsAString& aContentDispositionFilename, const bool& aForceSave,
|
||||
|
@ -5073,14 +5073,19 @@ mozilla::ipc::IPCResult ContentParent::RecvConsoleMessage(
|
|||
}
|
||||
|
||||
mozilla::ipc::IPCResult ContentParent::RecvReportFrameTimingData(
|
||||
const LoadInfoArgs& loadInfoArgs, const nsAString& entryName,
|
||||
const nsAString& initiatorType, UniquePtr<PerformanceTimingData>&& aData) {
|
||||
const mozilla::Maybe<LoadInfoArgs>& loadInfoArgs,
|
||||
const nsAString& entryName, const nsAString& initiatorType,
|
||||
UniquePtr<PerformanceTimingData>&& aData) {
|
||||
if (!aData) {
|
||||
return IPC_FAIL(this, "aData should not be null");
|
||||
}
|
||||
|
||||
if (loadInfoArgs.isNothing()) {
|
||||
return IPC_FAIL(this, "loadInfoArgs should not be null");
|
||||
}
|
||||
|
||||
RefPtr<WindowGlobalParent> parent =
|
||||
WindowGlobalParent::GetByInnerWindowId(loadInfoArgs.innerWindowID());
|
||||
WindowGlobalParent::GetByInnerWindowId(loadInfoArgs->innerWindowID());
|
||||
if (!parent || !parent->GetContentParent()) {
|
||||
return IPC_OK();
|
||||
}
|
||||
|
|
|
@ -938,7 +938,7 @@ class ContentParent final : public PContentParent,
|
|||
bool DeallocPScriptCacheParent(PScriptCacheParent* shell);
|
||||
|
||||
already_AddRefed<PExternalHelperAppParent> AllocPExternalHelperAppParent(
|
||||
nsIURI* aUri, const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
nsIURI* aUri, const Maybe<mozilla::net::LoadInfoArgs>& aLoadInfoArgs,
|
||||
const nsACString& aMimeContentType, const nsACString& aContentDisposition,
|
||||
const uint32_t& aContentDispositionHint,
|
||||
const nsAString& aContentDispositionFilename, const bool& aForceSave,
|
||||
|
@ -948,8 +948,8 @@ class ContentParent final : public PContentParent,
|
|||
|
||||
mozilla::ipc::IPCResult RecvPExternalHelperAppConstructor(
|
||||
PExternalHelperAppParent* actor, nsIURI* uri,
|
||||
const LoadInfoArgs& loadInfoArgs, const nsACString& aMimeContentType,
|
||||
const nsACString& aContentDisposition,
|
||||
const Maybe<LoadInfoArgs>& loadInfoArgs,
|
||||
const nsACString& aMimeContentType, const nsACString& aContentDisposition,
|
||||
const uint32_t& aContentDispositionHint,
|
||||
const nsAString& aContentDispositionFilename, const bool& aForceSave,
|
||||
const int64_t& aContentLength, const bool& aWasFileChannel,
|
||||
|
@ -1073,8 +1073,9 @@ class ContentParent final : public PContentParent,
|
|||
const uint64_t& aInnerWindowId, const bool& aIsFromChromeContext);
|
||||
|
||||
mozilla::ipc::IPCResult RecvReportFrameTimingData(
|
||||
const LoadInfoArgs& loadInfoArgs, const nsAString& entryName,
|
||||
const nsAString& initiatorType, UniquePtr<PerformanceTimingData>&& aData);
|
||||
const mozilla::Maybe<LoadInfoArgs>& loadInfoArgs,
|
||||
const nsAString& entryName, const nsAString& initiatorType,
|
||||
UniquePtr<PerformanceTimingData>&& aData);
|
||||
|
||||
mozilla::ipc::IPCResult RecvScriptErrorWithStack(
|
||||
const nsAString& aMessage, const nsAString& aSourceName,
|
||||
|
|
|
@ -1185,7 +1185,7 @@ parent:
|
|||
// Pass true for aShouldCloseWindow to specify that aContext was opened specifically
|
||||
// for this load, and should be closed once we've handled it.
|
||||
async PExternalHelperApp(nullable nsIURI uri,
|
||||
LoadInfoArgs loadInfoArgs,
|
||||
LoadInfoArgs? loadInfoArgs,
|
||||
nsCString aMimeContentType,
|
||||
nsCString aContentDisposition,
|
||||
uint32_t aContentDispositionHint,
|
||||
|
@ -1851,7 +1851,7 @@ both:
|
|||
* loadInfo is passed in order to enforce same-origin security checks
|
||||
* aData must be non-null.
|
||||
*/
|
||||
async ReportFrameTimingData(LoadInfoArgs loadInfo, nsString entryName,
|
||||
async ReportFrameTimingData(LoadInfoArgs? loadInfo, nsString entryName,
|
||||
nsString initiatorType,
|
||||
UniquePtr<PerformanceTimingData> aData);
|
||||
|
||||
|
|
|
@ -4623,11 +4623,11 @@ std::unique_ptr<NrSocketProxyConfig> PeerConnectionImpl::GetProxyConfig()
|
|||
new net::LoadInfo(doc->NodePrincipal(), doc->NodePrincipal(), doc, 0,
|
||||
nsIContentPolicy::TYPE_INVALID);
|
||||
|
||||
net::LoadInfoArgs loadInfoArgs;
|
||||
Maybe<net::LoadInfoArgs> loadInfoArgs;
|
||||
MOZ_ALWAYS_SUCCEEDS(
|
||||
mozilla::ipc::LoadInfoToLoadInfoArgs(loadInfo, &loadInfoArgs));
|
||||
return std::unique_ptr<NrSocketProxyConfig>(new NrSocketProxyConfig(
|
||||
net::WebrtcProxyConfig(id, alpn, loadInfoArgs, mForceProxy)));
|
||||
net::WebrtcProxyConfig(id, alpn, *loadInfoArgs, mForceProxy)));
|
||||
}
|
||||
|
||||
std::map<uint64_t, PeerConnectionAutoTimer>
|
||||
|
|
|
@ -399,6 +399,7 @@ nsresult WebrtcTCPSocket::OpenWithHttpProxy() {
|
|||
}
|
||||
|
||||
nsCOMPtr<nsILoadInfo> loadInfo;
|
||||
Maybe<net::LoadInfoArgs> loadInfoArgs = Some(mProxyConfig->loadInfoArgs());
|
||||
|
||||
// FIXME: We don't know the remote type of the process which provided these
|
||||
// LoadInfoArgs. Pass in `NOT_REMOTE_TYPE` as the origin process to blindly
|
||||
|
@ -406,8 +407,8 @@ nsresult WebrtcTCPSocket::OpenWithHttpProxy() {
|
|||
// using it for security checks here.
|
||||
// If this code ever starts checking the triggering remote type, this needs to
|
||||
// be changed.
|
||||
rv = ipc::LoadInfoArgsToLoadInfo(mProxyConfig->loadInfoArgs(),
|
||||
NOT_REMOTE_TYPE, getter_AddRefs(loadInfo));
|
||||
rv = ipc::LoadInfoArgsToLoadInfo(loadInfoArgs, NOT_REMOTE_TYPE,
|
||||
getter_AddRefs(loadInfo));
|
||||
if (NS_FAILED(rv)) {
|
||||
LOG(("WebrtcTCPSocket %p: could not init load info\n", this));
|
||||
return rv;
|
||||
|
|
|
@ -399,7 +399,7 @@ nsresult RHEntryToRHEntryInfo(nsIRedirectHistoryEntry* aRHEntry,
|
|||
}
|
||||
|
||||
nsresult LoadInfoToLoadInfoArgs(nsILoadInfo* aLoadInfo,
|
||||
LoadInfoArgs* outLoadInfoArgs) {
|
||||
Maybe<LoadInfoArgs>* aOptionalLoadInfoArgs) {
|
||||
nsresult rv = NS_OK;
|
||||
Maybe<PrincipalInfo> loadingPrincipalInfo;
|
||||
if (nsIPrincipal* loadingPrin = aLoadInfo->GetLoadingPrincipal()) {
|
||||
|
@ -541,7 +541,7 @@ nsresult LoadInfoToLoadInfoArgs(nsILoadInfo* aLoadInfo,
|
|||
redirectChain, interceptionInfo->FromThirdParty()));
|
||||
}
|
||||
|
||||
*aLoadInfoArgs = LoadInfoArgs(
|
||||
*aOptionalLoadInfoArgs = Some(LoadInfoArgs(
|
||||
loadingPrincipalInfo, triggeringPrincipalInfo, principalToInheritInfo,
|
||||
topLevelPrincipalInfo, optionalResultPrincipalURI, triggeringRemoteType,
|
||||
aLoadInfo->GetSandboxedNullPrincipalID(), aLoadInfo->GetSecurityFlags(),
|
||||
|
@ -584,23 +584,23 @@ nsresult LoadInfoToLoadInfoArgs(nsILoadInfo* aLoadInfo,
|
|||
aLoadInfo->GetStoragePermission(), aLoadInfo->GetIsMetaRefresh(),
|
||||
aLoadInfo->GetLoadingEmbedderPolicy(),
|
||||
aLoadInfo->GetIsOriginTrialCoepCredentiallessEnabledForTopLevel(),
|
||||
unstrippedURI, interceptionInfoArg);
|
||||
unstrippedURI, interceptionInfoArg));
|
||||
|
||||
return NS_OK;
|
||||
}
|
||||
|
||||
nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
nsILoadInfo** outLoadInfo) {
|
||||
return LoadInfoArgsToLoadInfo(aLoadInfoArgs, aOriginRemoteType, nullptr,
|
||||
outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsILoadInfo** outLoadInfo) {
|
||||
return LoadInfoArgsToLoadInfo(aOptionalLoadInfoArgs, aOriginRemoteType,
|
||||
nullptr, outLoadInfo);
|
||||
}
|
||||
nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
nsINode* aCspToInheritLoadingContext,
|
||||
nsILoadInfo** outLoadInfo) {
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsINode* aCspToInheritLoadingContext,
|
||||
nsILoadInfo** outLoadInfo) {
|
||||
RefPtr<LoadInfo> loadInfo;
|
||||
nsresult rv = LoadInfoArgsToLoadInfo(aLoadInfoArgs, aOriginRemoteType,
|
||||
nsresult rv = LoadInfoArgsToLoadInfo(aOptionalLoadInfoArgs, aOriginRemoteType,
|
||||
aCspToInheritLoadingContext,
|
||||
getter_AddRefs(loadInfo));
|
||||
NS_ENSURE_SUCCESS(rv, rv);
|
||||
|
@ -609,16 +609,23 @@ nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& aLoadInfoArgs,
|
|||
return NS_OK;
|
||||
}
|
||||
|
||||
nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
LoadInfo** outLoadInfo) {
|
||||
return LoadInfoArgsToLoadInfo(aLoadInfoArgs, aOriginRemoteType, nullptr,
|
||||
outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, LoadInfo** outLoadInfo) {
|
||||
return LoadInfoArgsToLoadInfo(aOptionalLoadInfoArgs, aOriginRemoteType,
|
||||
nullptr, outLoadInfo);
|
||||
}
|
||||
nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& loadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
nsINode* aCspToInheritLoadingContext,
|
||||
LoadInfo** outLoadInfo) {
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsINode* aCspToInheritLoadingContext,
|
||||
LoadInfo** outLoadInfo) {
|
||||
if (aOptionalLoadInfoArgs.isNothing()) {
|
||||
*outLoadInfo = nullptr;
|
||||
return NS_OK;
|
||||
}
|
||||
|
||||
const LoadInfoArgs& loadInfoArgs = aOptionalLoadInfoArgs.ref();
|
||||
|
||||
nsCOMPtr<nsIPrincipal> loadingPrincipal;
|
||||
if (loadInfoArgs.requestingPrincipalInfo().isSome()) {
|
||||
auto loadingPrincipalOrErr =
|
||||
|
|
|
@ -135,26 +135,27 @@ nsresult RHEntryToRHEntryInfo(
|
|||
/**
|
||||
* Convert a LoadInfo to LoadInfoArgs struct.
|
||||
*/
|
||||
nsresult LoadInfoToLoadInfoArgs(nsILoadInfo* aLoadInfo,
|
||||
mozilla::net::LoadInfoArgs* outLoadInfoArgs);
|
||||
nsresult LoadInfoToLoadInfoArgs(
|
||||
nsILoadInfo* aLoadInfo,
|
||||
Maybe<mozilla::net::LoadInfoArgs>* outOptionalLoadInfoArgs);
|
||||
|
||||
/**
|
||||
* Convert LoadInfoArgs to a LoadInfo.
|
||||
*/
|
||||
nsresult LoadInfoArgsToLoadInfo(const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
nsILoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
nsINode* aCspToInheritLoadingContext,
|
||||
nsILoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(const net::LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
mozilla::net::LoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(const net::LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
nsINode* aCspToInheritLoadingContext,
|
||||
mozilla::net::LoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<mozilla::net::LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsILoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<mozilla::net::LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsINode* aCspToInheritLoadingContext,
|
||||
nsILoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<net::LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, mozilla::net::LoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<net::LoadInfoArgs>& aOptionalLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsINode* aCspToInheritLoadingContext,
|
||||
mozilla::net::LoadInfo** outLoadInfo);
|
||||
|
||||
/**
|
||||
* Fills ParentLoadInfoForwarderArgs with properties we want to carry to child
|
||||
|
|
|
@ -43,10 +43,10 @@ class LoadInfo;
|
|||
|
||||
namespace ipc {
|
||||
// we have to forward declare that function so we can use it as a friend.
|
||||
nsresult LoadInfoArgsToLoadInfo(const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType,
|
||||
nsINode* aCspToInheritLoadingContext,
|
||||
net::LoadInfo** outLoadInfo);
|
||||
nsresult LoadInfoArgsToLoadInfo(
|
||||
const Maybe<mozilla::net::LoadInfoArgs>& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsINode* aCspToInheritLoadingContext,
|
||||
net::LoadInfo** outLoadInfo);
|
||||
} // namespace ipc
|
||||
|
||||
namespace net {
|
||||
|
@ -252,7 +252,7 @@ class LoadInfo final : public nsILoadInfo {
|
|||
const RedirectHistoryArray& aArra);
|
||||
|
||||
friend nsresult mozilla::ipc::LoadInfoArgsToLoadInfo(
|
||||
const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
const Maybe<mozilla::net::LoadInfoArgs>& aLoadInfoArgs,
|
||||
const nsACString& aOriginRemoteType, nsINode* aCspToInheritLoadingContext,
|
||||
net::LoadInfo** outLoadInfo);
|
||||
|
||||
|
|
|
@ -2135,6 +2135,13 @@ DocumentLoadListener::RedirectToRealChannel(
|
|||
args.timing() = std::move(mTiming);
|
||||
}
|
||||
|
||||
auto loadInfo = args.loadInfo();
|
||||
|
||||
if (loadInfo.isNothing()) {
|
||||
return PDocumentChannelParent::RedirectToRealChannelPromise::
|
||||
CreateAndReject(ipc::ResponseRejectReason::SendError, __func__);
|
||||
}
|
||||
|
||||
cp->TransmitBlobDataIfBlobURL(args.uri());
|
||||
|
||||
if (CanonicalBrowsingContext* bc = GetDocumentBrowsingContext()) {
|
||||
|
|
|
@ -328,7 +328,7 @@ struct HttpChannelOpenArgs
|
|||
nsCString contentTypeHint;
|
||||
nsString integrityMetadata;
|
||||
IPCStream? uploadStream;
|
||||
LoadInfoArgs loadInfo;
|
||||
LoadInfoArgs? loadInfo;
|
||||
uint32_t loadFlags;
|
||||
uint32_t thirdPartyFlags;
|
||||
uint32_t tlsFlags;
|
||||
|
@ -478,7 +478,7 @@ struct RedirectToRealChannelArgs {
|
|||
nullable nsIURI uri;
|
||||
uint32_t newLoadFlags;
|
||||
ReplacementChannelConfigInit? init;
|
||||
LoadInfoArgs loadInfo;
|
||||
LoadInfoArgs? loadInfo;
|
||||
uint64_t channelId;
|
||||
nullable nsIURI originalURI;
|
||||
uint32_t redirectMode;
|
||||
|
@ -585,7 +585,7 @@ struct GIOChannelOpenArgs
|
|||
uint64_t startPos;
|
||||
nsCString entityID;
|
||||
IPCStream? uploadStream;
|
||||
LoadInfoArgs loadInfo;
|
||||
LoadInfoArgs? loadInfo;
|
||||
uint32_t loadFlags;
|
||||
};
|
||||
|
||||
|
|
|
@ -93,9 +93,14 @@ static PBOverrideStatus PBOverrideStatusFromLoadContext(
|
|||
}
|
||||
|
||||
static already_AddRefed<nsIPrincipal> GetRequestingPrincipal(
|
||||
const LoadInfoArgs& aLoadInfoArgs) {
|
||||
const Maybe<LoadInfoArgs>& aOptionalLoadInfoArgs) {
|
||||
if (aOptionalLoadInfoArgs.isNothing()) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
const LoadInfoArgs& loadInfoArgs = aOptionalLoadInfoArgs.ref();
|
||||
const Maybe<PrincipalInfo>& optionalPrincipalInfo =
|
||||
aLoadInfoArgs.requestingPrincipalInfo();
|
||||
loadInfoArgs.requestingPrincipalInfo();
|
||||
|
||||
if (optionalPrincipalInfo.isNothing()) {
|
||||
return nullptr;
|
||||
|
@ -789,7 +794,7 @@ mozilla::ipc::IPCResult NeckoParent::RecvEnsureHSTSData(
|
|||
}
|
||||
|
||||
mozilla::ipc::IPCResult NeckoParent::RecvGetPageThumbStream(
|
||||
nsIURI* aURI, const LoadInfoArgs& aLoadInfoArgs,
|
||||
nsIURI* aURI, const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
GetPageThumbStreamResolver&& aResolver) {
|
||||
// Only the privileged about content process is allowed to access
|
||||
// things over the moz-page-thumb protocol. Any other content process
|
||||
|
@ -834,7 +839,7 @@ mozilla::ipc::IPCResult NeckoParent::RecvGetPageThumbStream(
|
|||
}
|
||||
|
||||
mozilla::ipc::IPCResult NeckoParent::RecvGetPageIconStream(
|
||||
nsIURI* aURI, const LoadInfoArgs& aLoadInfoArgs,
|
||||
nsIURI* aURI, const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
GetPageIconStreamResolver&& aResolver) {
|
||||
#ifdef MOZ_PLACES
|
||||
const nsACString& remoteType =
|
||||
|
@ -850,6 +855,10 @@ mozilla::ipc::IPCResult NeckoParent::RecvGetPageIconStream(
|
|||
return IPC_FAIL(this, "Wrong process type");
|
||||
}
|
||||
|
||||
if (aLoadInfoArgs.isNothing()) {
|
||||
return IPC_FAIL(this, "Page-icon request must include loadInfo");
|
||||
}
|
||||
|
||||
nsCOMPtr<nsILoadInfo> loadInfo;
|
||||
nsresult rv = mozilla::ipc::LoadInfoArgsToLoadInfo(aLoadInfoArgs, remoteType,
|
||||
getter_AddRefs(loadInfo));
|
||||
|
|
|
@ -195,12 +195,12 @@ class NeckoParent : public PNeckoParent {
|
|||
|
||||
/* Page thumbnails remote resource loading */
|
||||
mozilla::ipc::IPCResult RecvGetPageThumbStream(
|
||||
nsIURI* aURI, const LoadInfoArgs& aLoadInfoArgs,
|
||||
nsIURI* aURI, const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
GetPageThumbStreamResolver&& aResolve);
|
||||
|
||||
/* Page icon remote resource loading */
|
||||
mozilla::ipc::IPCResult RecvGetPageIconStream(
|
||||
nsIURI* aURI, const LoadInfoArgs& aLoadInfoArgs,
|
||||
nsIURI* aURI, const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
GetPageIconStreamResolver&& aResolve);
|
||||
|
||||
mozilla::ipc::IPCResult RecvInitSocketProcessBridge(
|
||||
|
|
|
@ -147,8 +147,8 @@ parent:
|
|||
/**
|
||||
* Page thumbnails remote resource loading
|
||||
*/
|
||||
async GetPageThumbStream(nullable nsIURI uri, LoadInfoArgs loadInfo) returns (RemoteStreamInfo? info);
|
||||
async GetPageIconStream(nullable nsIURI uri, LoadInfoArgs loadInfo) returns (RemoteStreamInfo? info);
|
||||
async GetPageThumbStream(nullable nsIURI uri, LoadInfoArgs? loadInfo) returns (RemoteStreamInfo? info);
|
||||
async GetPageIconStream(nullable nsIURI uri, LoadInfoArgs? loadInfo) returns (RemoteStreamInfo? info);
|
||||
|
||||
child:
|
||||
/* Predictor Methods */
|
||||
|
|
|
@ -76,7 +76,7 @@ bool GIOChannelParent::DoAsyncOpen(const URIParams& aURI,
|
|||
const uint64_t& aStartPos,
|
||||
const nsCString& aEntityID,
|
||||
const Maybe<IPCStream>& aUploadStream,
|
||||
const LoadInfoArgs& aLoadInfoArgs,
|
||||
const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
const uint32_t& aLoadFlags) {
|
||||
nsresult rv;
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ class GIOChannelParent final : public PGIOChannelParent,
|
|||
bool DoAsyncOpen(const URIParams& aURI, const uint64_t& aStartPos,
|
||||
const nsCString& aEntityID,
|
||||
const Maybe<mozilla::ipc::IPCStream>& aUploadStream,
|
||||
const LoadInfoArgs& aLoadInfoArgs,
|
||||
const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
const uint32_t& aLoadFlags);
|
||||
|
||||
// used to connect redirected-to channel in parent with just created
|
||||
|
|
|
@ -5639,7 +5639,7 @@ void HttpBaseChannel::MaybeReportTimingData() {
|
|||
return;
|
||||
}
|
||||
|
||||
LoadInfoArgs loadInfoArgs;
|
||||
Maybe<LoadInfoArgs> loadInfoArgs;
|
||||
mozilla::ipc::LoadInfoToLoadInfoArgs(mLoadInfo, &loadInfoArgs);
|
||||
child->SendReportFrameTimingData(loadInfoArgs, entryName, initiatorType,
|
||||
std::move(performanceTimingData));
|
||||
|
|
|
@ -390,7 +390,7 @@ bool HttpChannelParent::DoAsyncOpen(
|
|||
const uint64_t& startPos, const nsCString& entityID, const bool& allowSpdy,
|
||||
const bool& allowHttp3, const bool& allowAltSvc, const bool& beConservative,
|
||||
const bool& bypassProxy, const uint32_t& tlsFlags,
|
||||
const LoadInfoArgs& aLoadInfoArgs, const uint32_t& aCacheKey,
|
||||
const Maybe<LoadInfoArgs>& aLoadInfoArgs, const uint32_t& aCacheKey,
|
||||
const uint64_t& aRequestContextID,
|
||||
const Maybe<CorsPreflightArgs>& aCorsPreflightArgs,
|
||||
const uint32_t& aInitialRwin, const bool& aBlockAuthPrompt,
|
||||
|
|
|
@ -150,7 +150,7 @@ class HttpChannelParent final : public nsIInterfaceRequestor,
|
|||
const uint64_t& startPos, const nsCString& entityID,
|
||||
const bool& allowSpdy, const bool& allowHttp3, const bool& allowAltSvc,
|
||||
const bool& beConservative, const bool& bypassProxy,
|
||||
const uint32_t& tlsFlags, const LoadInfoArgs& aLoadInfoArgs,
|
||||
const uint32_t& tlsFlags, const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
const uint32_t& aCacheKey, const uint64_t& aRequestContextID,
|
||||
const Maybe<CorsPreflightArgs>& aCorsPreflightArgs,
|
||||
const uint32_t& aInitialRwin, const bool& aBlockAuthPrompt,
|
||||
|
|
|
@ -36,7 +36,7 @@ RequestOrReason RemoteStreamGetter::GetAsync(nsIStreamListener* aListener,
|
|||
nsCOMPtr<nsICancelable> cancelableRequest(this);
|
||||
|
||||
RefPtr<RemoteStreamGetter> self = this;
|
||||
LoadInfoArgs loadInfoArgs;
|
||||
Maybe<LoadInfoArgs> loadInfoArgs;
|
||||
nsresult rv = ipc::LoadInfoToLoadInfoArgs(mLoadInfo, &loadInfoArgs);
|
||||
if (NS_FAILED(rv)) {
|
||||
return Err(rv);
|
||||
|
|
|
@ -26,7 +26,7 @@ using RemoteStreamPromise =
|
|||
mozilla::MozPromise<RemoteStreamInfo, nsresult, false>;
|
||||
using Method = RefPtr<
|
||||
MozPromise<Maybe<RemoteStreamInfo>, ipc::ResponseRejectReason, true>> (
|
||||
PNeckoChild::*)(nsIURI*, const LoadInfoArgs&);
|
||||
PNeckoChild::*)(nsIURI*, const Maybe<LoadInfoArgs>&);
|
||||
|
||||
/**
|
||||
* Helper class used with SimpleChannel to asynchronously obtain an input
|
||||
|
|
|
@ -38,7 +38,7 @@ parent:
|
|||
bool aClientSetPingInterval,
|
||||
uint32_t aPingTimeout,
|
||||
bool aClientSetPingTimeout,
|
||||
LoadInfoArgs aLoadInfoArgs,
|
||||
LoadInfoArgs? aLoadInfoArgs,
|
||||
PTransportProvider? aProvider,
|
||||
nsCString aNegotiatedExtensions);
|
||||
async Close(uint16_t code, nsCString reason);
|
||||
|
|
|
@ -494,7 +494,7 @@ WebSocketChannelChild::AsyncOpenNative(
|
|||
AddIPDLReference();
|
||||
|
||||
nsCOMPtr<nsIURI> uri;
|
||||
LoadInfoArgs loadInfoArgs;
|
||||
Maybe<LoadInfoArgs> loadInfoArgs;
|
||||
Maybe<NotNull<PTransportProviderChild*>> transportProvider;
|
||||
|
||||
if (!mIsServerSide) {
|
||||
|
|
|
@ -56,7 +56,7 @@ mozilla::ipc::IPCResult WebSocketChannelParent::RecvAsyncOpen(
|
|||
const nsCString& aProtocol, const bool& aSecure,
|
||||
const uint32_t& aPingInterval, const bool& aClientSetPingInterval,
|
||||
const uint32_t& aPingTimeout, const bool& aClientSetPingTimeout,
|
||||
const LoadInfoArgs& aLoadInfoArgs,
|
||||
const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
const Maybe<PTransportProviderParent*>& aTransportProvider,
|
||||
const nsCString& aNegotiatedExtensions) {
|
||||
LOG(("WebSocketChannelParent::RecvAsyncOpen() %p\n", this));
|
||||
|
|
|
@ -44,7 +44,7 @@ class WebSocketChannelParent : public PWebSocketParent,
|
|||
const nsCString& aProtocol, const bool& aSecure,
|
||||
const uint32_t& aPingInterval, const bool& aClientSetPingInterval,
|
||||
const uint32_t& aPingTimeout, const bool& aClientSetPingTimeout,
|
||||
const LoadInfoArgs& aLoadInfoArgs,
|
||||
const Maybe<LoadInfoArgs>& aLoadInfoArgs,
|
||||
const Maybe<PTransportProviderParent*>& aTransportProvider,
|
||||
const nsCString& aNegotiatedExtensions);
|
||||
mozilla::ipc::IPCResult RecvClose(const uint16_t& code,
|
||||
|
|
|
@ -60,7 +60,7 @@ ExternalHelperAppParent::ExternalHelperAppParent(
|
|||
}
|
||||
|
||||
bool ExternalHelperAppParent::Init(
|
||||
const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
const Maybe<mozilla::net::LoadInfoArgs>& aLoadInfoArgs,
|
||||
const nsACString& aMimeContentType, const bool& aForceSave,
|
||||
nsIURI* aReferrer, BrowsingContext* aContext,
|
||||
const bool& aShouldCloseWindow) {
|
||||
|
|
|
@ -85,7 +85,7 @@ class ExternalHelperAppParent
|
|||
const nsACString& aContentDispositionHeader,
|
||||
const uint32_t& aContentDispositionHint,
|
||||
const nsAString& aContentDispositionFilename);
|
||||
bool Init(const mozilla::net::LoadInfoArgs& aLoadInfoArgs,
|
||||
bool Init(const Maybe<mozilla::net::LoadInfoArgs>& aLoadInfoArgs,
|
||||
const nsACString& aMimeContentType, const bool& aForceSave,
|
||||
nsIURI* aReferrer, BrowsingContext* aContext,
|
||||
const bool& aShouldCloseWindow);
|
||||
|
|
|
@ -676,7 +676,7 @@ nsresult nsExternalHelperAppService::DoContentContentProcessHelper(
|
|||
nsCOMPtr<nsIURI> referrer;
|
||||
NS_GetReferrerFromChannel(channel, getter_AddRefs(referrer));
|
||||
|
||||
mozilla::net::LoadInfoArgs loadInfoArgs;
|
||||
Maybe<mozilla::net::LoadInfoArgs> loadInfoArgs;
|
||||
MOZ_ALWAYS_SUCCEEDS(LoadInfoToLoadInfoArgs(loadInfo, &loadInfoArgs));
|
||||
|
||||
nsCOMPtr<nsIPropertyBag2> props(do_QueryInterface(aRequest));
|
||||
|
|
Загрузка…
Ссылка в новой задаче