/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set sw=2 ts=8 et tw=80 : */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef mozilla_net_ClassifierDummyChannel_h #define mozilla_net_ClassifierDummyChannel_h #include "nsIChannel.h" #include "nsIClassifiedChannel.h" #include "nsIHttpChannelInternal.h" #include #define CLASSIFIER_DUMMY_CHANNEL_IID \ { \ 0x70ceb97d, 0xbfa6, 0x4255, { \ 0xb7, 0x08, 0xe1, 0xb4, 0x4a, 0x1e, 0x0e, 0x9a \ } \ } namespace mozilla { namespace net { /** * In child intercept mode, the decision to intercept a channel is made in the * child process without consulting the parent process. The decision is based * on whether there is a ServiceWorker with a scope covering the URL in question * and whether storage is allowed for the origin/URL. When the * "network.cookie.cookieBehavior" preference is set to BEHAVIOR_REJECT_TRACKER, * annotated channels are denied storage which means that the ServiceWorker * should not intercept the channel. However, the decision for tracking * protection to annotate a channel only occurs in the parent process. The * dummy channel is a hack to allow the intercept decision process to ask the * parent process if the channel should be annotated. Because this round-trip * to the parent has overhead, the dummy channel is only created 1) if the * ServiceWorker initially determines that the channel should be intercepted and * 2) it's a navigation request. * * This hack can be removed once Bug 1231208's new "parent intercept" mechanism * fully lands, the pref is enabled by default it stays enabled for long enough * to be confident we will never need/want to turn it off. Then as part of bug * 1496997 we can remove this implementation. Bug 1498259 covers removing this * hack in particular. */ class ClassifierDummyChannel final : public nsIChannel, public nsIHttpChannelInternal, public nsIClassifiedChannel { public: NS_DECLARE_STATIC_IID_ACCESSOR(CLASSIFIER_DUMMY_CHANNEL_IID) NS_DECL_THREADSAFE_ISUPPORTS NS_DECL_NSIREQUEST NS_DECL_NSICHANNEL NS_DECL_NSIHTTPCHANNELINTERNAL NS_DECL_NSICLASSIFIEDCHANNEL enum StorageAllowedState { eStorageGranted, eStorageDenied, eAsyncNeeded, }; static StorageAllowedState StorageAllowed( nsIChannel* aChannel, const std::function& aCallback); ClassifierDummyChannel(nsIURI* aURI, nsIURI* aTopWindowURI, nsresult aTopWindowURIResult, nsILoadInfo* aLoadInfo); void AddClassificationFlags(uint32_t aClassificationFlags, bool aThirdParty); private: ~ClassifierDummyChannel(); nsCOMPtr mLoadInfo; nsCOMPtr mURI; nsCOMPtr mTopWindowURI; nsresult mTopWindowURIResult; uint32_t mFirstPartyClassificationFlags; uint32_t mThirdPartyClassificationFlags; }; NS_DEFINE_STATIC_IID_ACCESSOR(ClassifierDummyChannel, CLASSIFIER_DUMMY_CHANNEL_IID) } // namespace net } // namespace mozilla #endif // mozilla_net_ClassifierDummyChannel_h