зеркало из https://github.com/mozilla/gecko-dev.git
92 строки
3.4 KiB
C++
92 строки
3.4 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set sw=2 ts=8 et tw=80 : */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef mozilla_net_ClassifierDummyChannel_h
|
|
#define mozilla_net_ClassifierDummyChannel_h
|
|
|
|
#include "nsIChannel.h"
|
|
#include "nsIClassifiedChannel.h"
|
|
#include "nsIHttpChannelInternal.h"
|
|
#include <functional>
|
|
|
|
#define CLASSIFIER_DUMMY_CHANNEL_IID \
|
|
{ \
|
|
0x70ceb97d, 0xbfa6, 0x4255, { \
|
|
0xb7, 0x08, 0xe1, 0xb4, 0x4a, 0x1e, 0x0e, 0x9a \
|
|
} \
|
|
}
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
/**
|
|
* In child intercept mode, the decision to intercept a channel is made in the
|
|
* child process without consulting the parent process. The decision is based
|
|
* on whether there is a ServiceWorker with a scope covering the URL in question
|
|
* and whether storage is allowed for the origin/URL. When the
|
|
* "network.cookie.cookieBehavior" preference is set to BEHAVIOR_REJECT_TRACKER,
|
|
* annotated channels are denied storage which means that the ServiceWorker
|
|
* should not intercept the channel. However, the decision for tracking
|
|
* protection to annotate a channel only occurs in the parent process. The
|
|
* dummy channel is a hack to allow the intercept decision process to ask the
|
|
* parent process if the channel should be annotated. Because this round-trip
|
|
* to the parent has overhead, the dummy channel is only created 1) if the
|
|
* ServiceWorker initially determines that the channel should be intercepted and
|
|
* 2) it's a navigation request.
|
|
*
|
|
* This hack can be removed once Bug 1231208's new "parent intercept" mechanism
|
|
* fully lands, the pref is enabled by default it stays enabled for long enough
|
|
* to be confident we will never need/want to turn it off. Then as part of bug
|
|
* 1496997 we can remove this implementation. Bug 1498259 covers removing this
|
|
* hack in particular.
|
|
*/
|
|
class ClassifierDummyChannel final : public nsIChannel,
|
|
public nsIHttpChannelInternal,
|
|
public nsIClassifiedChannel {
|
|
public:
|
|
NS_DECLARE_STATIC_IID_ACCESSOR(CLASSIFIER_DUMMY_CHANNEL_IID)
|
|
|
|
NS_DECL_THREADSAFE_ISUPPORTS
|
|
NS_DECL_NSIREQUEST
|
|
NS_DECL_NSICHANNEL
|
|
NS_DECL_NSIHTTPCHANNELINTERNAL
|
|
NS_DECL_NSICLASSIFIEDCHANNEL
|
|
|
|
enum StorageAllowedState {
|
|
eStorageGranted,
|
|
eStorageDenied,
|
|
eAsyncNeeded,
|
|
};
|
|
|
|
static StorageAllowedState StorageAllowed(
|
|
nsIChannel* aChannel, const std::function<void(bool)>& aCallback);
|
|
|
|
ClassifierDummyChannel(nsIURI* aURI, nsIURI* aTopWindowURI,
|
|
nsresult aTopWindowURIResult, nsILoadInfo* aLoadInfo);
|
|
|
|
void AddClassificationFlags(uint32_t aClassificationFlags, bool aThirdParty);
|
|
|
|
private:
|
|
~ClassifierDummyChannel();
|
|
|
|
nsCOMPtr<nsILoadInfo> mLoadInfo;
|
|
nsCOMPtr<nsIURI> mURI;
|
|
nsCOMPtr<nsIURI> mTopWindowURI;
|
|
nsresult mTopWindowURIResult;
|
|
|
|
uint32_t mFirstPartyClassificationFlags;
|
|
uint32_t mThirdPartyClassificationFlags;
|
|
};
|
|
|
|
NS_DEFINE_STATIC_IID_ACCESSOR(ClassifierDummyChannel,
|
|
CLASSIFIER_DUMMY_CHANNEL_IID)
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|
|
|
|
#endif // mozilla_net_ClassifierDummyChannel_h
|