зеркало из https://github.com/mozilla/gecko-dev.git
501 строка
16 KiB
C++
501 строка
16 KiB
C++
|
|
/* vim: set sw=2 ts=8 et tw=80 : */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "necko-config.h"
|
|
#include "nsHttp.h"
|
|
#include "mozilla/net/NeckoChild.h"
|
|
#include "mozilla/dom/ContentChild.h"
|
|
#include "mozilla/dom/TabChild.h"
|
|
#include "mozilla/net/HttpChannelChild.h"
|
|
#include "mozilla/net/CookieServiceChild.h"
|
|
#include "mozilla/net/WyciwygChannelChild.h"
|
|
#include "mozilla/net/FTPChannelChild.h"
|
|
#include "mozilla/net/WebSocketChannelChild.h"
|
|
#include "mozilla/net/WebSocketEventListenerChild.h"
|
|
#include "mozilla/net/DNSRequestChild.h"
|
|
#include "mozilla/net/ChannelDiverterChild.h"
|
|
#include "mozilla/net/IPCTransportProvider.h"
|
|
#include "mozilla/dom/network/TCPSocketChild.h"
|
|
#include "mozilla/dom/network/TCPServerSocketChild.h"
|
|
#include "mozilla/dom/network/UDPSocketChild.h"
|
|
#include "mozilla/net/AltDataOutputStreamChild.h"
|
|
#include "mozilla/net/TrackingDummyChannelChild.h"
|
|
#ifdef MOZ_WEBRTC
|
|
#include "mozilla/net/StunAddrsRequestChild.h"
|
|
#include "mozilla/net/WebrtcProxyChannelChild.h"
|
|
#endif
|
|
|
|
#include "SerializedLoadContext.h"
|
|
#include "nsGlobalWindow.h"
|
|
#include "nsIOService.h"
|
|
#include "nsINetworkPredictor.h"
|
|
#include "nsINetworkPredictorVerifier.h"
|
|
#include "nsINetworkLinkService.h"
|
|
#include "nsIRedirectProcessChooser.h"
|
|
#include "nsQueryObject.h"
|
|
#include "mozilla/ipc/URIUtils.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
using mozilla::dom::TCPServerSocketChild;
|
|
using mozilla::dom::TCPSocketChild;
|
|
using mozilla::dom::UDPSocketChild;
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
PNeckoChild* gNeckoChild = nullptr;
|
|
|
|
// C++ file contents
|
|
|
|
NeckoChild::~NeckoChild() {
|
|
// Send__delete__(gNeckoChild);
|
|
gNeckoChild = nullptr;
|
|
}
|
|
|
|
void NeckoChild::InitNeckoChild() {
|
|
MOZ_ASSERT(IsNeckoChild(), "InitNeckoChild called by non-child!");
|
|
|
|
if (!gNeckoChild) {
|
|
mozilla::dom::ContentChild* cpc =
|
|
mozilla::dom::ContentChild::GetSingleton();
|
|
NS_ASSERTION(cpc, "Content Protocol is NULL!");
|
|
if (NS_WARN_IF(cpc->IsShuttingDown())) {
|
|
return;
|
|
}
|
|
gNeckoChild = cpc->SendPNeckoConstructor();
|
|
NS_ASSERTION(gNeckoChild, "PNecko Protocol init failed!");
|
|
}
|
|
}
|
|
|
|
PHttpChannelChild* NeckoChild::AllocPHttpChannelChild(
|
|
const PBrowserOrId& browser, const SerializedLoadContext& loadContext,
|
|
const HttpChannelCreationArgs& aOpenArgs) {
|
|
// We don't allocate here: instead we always use IPDL constructor that takes
|
|
// an existing HttpChildChannel
|
|
MOZ_ASSERT_UNREACHABLE(
|
|
"AllocPHttpChannelChild should not be called on "
|
|
"child");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPHttpChannelChild(PHttpChannelChild* channel) {
|
|
MOZ_ASSERT(IsNeckoChild(), "DeallocPHttpChannelChild called by non-child!");
|
|
|
|
HttpChannelChild* child = static_cast<HttpChannelChild*>(channel);
|
|
child->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PStunAddrsRequestChild* NeckoChild::AllocPStunAddrsRequestChild() {
|
|
// We don't allocate here: instead we always use IPDL constructor that takes
|
|
// an existing object
|
|
MOZ_ASSERT_UNREACHABLE(
|
|
"AllocPStunAddrsRequestChild should not be called "
|
|
"on child");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPStunAddrsRequestChild(PStunAddrsRequestChild* aActor) {
|
|
#ifdef MOZ_WEBRTC
|
|
StunAddrsRequestChild* p = static_cast<StunAddrsRequestChild*>(aActor);
|
|
p->ReleaseIPDLReference();
|
|
#endif
|
|
return true;
|
|
}
|
|
|
|
PWebrtcProxyChannelChild* NeckoChild::AllocPWebrtcProxyChannelChild(
|
|
const PBrowserOrId& browser) {
|
|
// We don't allocate here: instead we always use IPDL constructor that takes
|
|
// an existing object
|
|
MOZ_ASSERT_UNREACHABLE(
|
|
"AllocPWebrtcProxyChannelChild should not be called on"
|
|
" child");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPWebrtcProxyChannelChild(
|
|
PWebrtcProxyChannelChild* aActor) {
|
|
#ifdef MOZ_WEBRTC
|
|
WebrtcProxyChannelChild* child =
|
|
static_cast<WebrtcProxyChannelChild*>(aActor);
|
|
child->ReleaseIPDLReference();
|
|
#endif
|
|
return true;
|
|
}
|
|
|
|
PAltDataOutputStreamChild* NeckoChild::AllocPAltDataOutputStreamChild(
|
|
const nsCString& type, const int64_t& predictedSize,
|
|
PHttpChannelChild* channel) {
|
|
// We don't allocate here: see HttpChannelChild::OpenAlternativeOutputStream()
|
|
MOZ_ASSERT_UNREACHABLE("AllocPAltDataOutputStreamChild should not be called");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPAltDataOutputStreamChild(
|
|
PAltDataOutputStreamChild* aActor) {
|
|
AltDataOutputStreamChild* child =
|
|
static_cast<AltDataOutputStreamChild*>(aActor);
|
|
child->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PFTPChannelChild* NeckoChild::AllocPFTPChannelChild(
|
|
const PBrowserOrId& aBrowser, const SerializedLoadContext& aSerialized,
|
|
const FTPChannelCreationArgs& aOpenArgs) {
|
|
// We don't allocate here: see FTPChannelChild::AsyncOpen()
|
|
MOZ_CRASH("AllocPFTPChannelChild should not be called");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPFTPChannelChild(PFTPChannelChild* channel) {
|
|
MOZ_ASSERT(IsNeckoChild(), "DeallocPFTPChannelChild called by non-child!");
|
|
|
|
FTPChannelChild* child = static_cast<FTPChannelChild*>(channel);
|
|
child->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PCookieServiceChild* NeckoChild::AllocPCookieServiceChild() {
|
|
// We don't allocate here: see nsCookieService::GetSingleton()
|
|
MOZ_ASSERT_UNREACHABLE("AllocPCookieServiceChild should not be called");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPCookieServiceChild(PCookieServiceChild* cs) {
|
|
NS_ASSERTION(IsNeckoChild(),
|
|
"DeallocPCookieServiceChild called by non-child!");
|
|
|
|
CookieServiceChild* p = static_cast<CookieServiceChild*>(cs);
|
|
p->Release();
|
|
return true;
|
|
}
|
|
|
|
PWyciwygChannelChild* NeckoChild::AllocPWyciwygChannelChild() {
|
|
// We don't allocate here: see nsWyciwygProtocolHandler::NewChannel2()
|
|
MOZ_ASSERT_UNREACHABLE("AllocPWyciwygChannelChild should not be called");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPWyciwygChannelChild(PWyciwygChannelChild* channel) {
|
|
MOZ_ASSERT(IsNeckoChild(),
|
|
"DeallocPWyciwygChannelChild called by non-child!");
|
|
|
|
WyciwygChannelChild* p = static_cast<WyciwygChannelChild*>(channel);
|
|
p->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PWebSocketChild* NeckoChild::AllocPWebSocketChild(
|
|
const PBrowserOrId& browser, const SerializedLoadContext& aSerialized,
|
|
const uint32_t& aSerial) {
|
|
MOZ_ASSERT_UNREACHABLE("AllocPWebSocketChild should not be called");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPWebSocketChild(PWebSocketChild* child) {
|
|
WebSocketChannelChild* p = static_cast<WebSocketChannelChild*>(child);
|
|
p->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PWebSocketEventListenerChild* NeckoChild::AllocPWebSocketEventListenerChild(
|
|
const uint64_t& aInnerWindowID) {
|
|
nsCOMPtr<nsIEventTarget> target;
|
|
if (nsGlobalWindowInner* win =
|
|
nsGlobalWindowInner::GetInnerWindowWithId(aInnerWindowID)) {
|
|
target = win->EventTargetFor(TaskCategory::Other);
|
|
}
|
|
|
|
RefPtr<WebSocketEventListenerChild> c =
|
|
new WebSocketEventListenerChild(aInnerWindowID, target);
|
|
|
|
if (target) {
|
|
gNeckoChild->SetEventTargetForActor(c, target);
|
|
}
|
|
|
|
return c.forget().take();
|
|
}
|
|
|
|
bool NeckoChild::DeallocPWebSocketEventListenerChild(
|
|
PWebSocketEventListenerChild* aActor) {
|
|
RefPtr<WebSocketEventListenerChild> c =
|
|
dont_AddRef(static_cast<WebSocketEventListenerChild*>(aActor));
|
|
MOZ_ASSERT(c);
|
|
return true;
|
|
}
|
|
|
|
PDataChannelChild* NeckoChild::AllocPDataChannelChild(
|
|
const uint32_t& channelId) {
|
|
MOZ_ASSERT_UNREACHABLE("Should never get here");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPDataChannelChild(PDataChannelChild* child) {
|
|
// NB: See DataChannelChild::ActorDestroy.
|
|
return true;
|
|
}
|
|
|
|
PFileChannelChild* NeckoChild::AllocPFileChannelChild(
|
|
const uint32_t& channelId) {
|
|
MOZ_ASSERT_UNREACHABLE("Should never get here");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPFileChannelChild(PFileChannelChild* child) {
|
|
// NB: See FileChannelChild::ActorDestroy.
|
|
return true;
|
|
}
|
|
|
|
PSimpleChannelChild* NeckoChild::AllocPSimpleChannelChild(
|
|
const uint32_t& channelId) {
|
|
MOZ_ASSERT_UNREACHABLE("Should never get here");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPSimpleChannelChild(PSimpleChannelChild* child) {
|
|
// NB: See SimpleChannelChild::ActorDestroy.
|
|
return true;
|
|
}
|
|
|
|
PTCPSocketChild* NeckoChild::AllocPTCPSocketChild(const nsString& host,
|
|
const uint16_t& port) {
|
|
TCPSocketChild* p = new TCPSocketChild(host, port, nullptr);
|
|
p->AddIPDLReference();
|
|
return p;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPTCPSocketChild(PTCPSocketChild* child) {
|
|
TCPSocketChild* p = static_cast<TCPSocketChild*>(child);
|
|
p->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PTCPServerSocketChild* NeckoChild::AllocPTCPServerSocketChild(
|
|
const uint16_t& aLocalPort, const uint16_t& aBacklog,
|
|
const bool& aUseArrayBuffers) {
|
|
MOZ_ASSERT_UNREACHABLE("AllocPTCPServerSocket should not be called");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPTCPServerSocketChild(PTCPServerSocketChild* child) {
|
|
TCPServerSocketChild* p = static_cast<TCPServerSocketChild*>(child);
|
|
p->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PUDPSocketChild* NeckoChild::AllocPUDPSocketChild(const Principal& aPrincipal,
|
|
const nsCString& aFilter) {
|
|
MOZ_ASSERT_UNREACHABLE("AllocPUDPSocket should not be called");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPUDPSocketChild(PUDPSocketChild* child) {
|
|
UDPSocketChild* p = static_cast<UDPSocketChild*>(child);
|
|
p->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PDNSRequestChild* NeckoChild::AllocPDNSRequestChild(
|
|
const nsCString& aHost, const OriginAttributes& aOriginAttributes,
|
|
const uint32_t& aFlags) {
|
|
// We don't allocate here: instead we always use IPDL constructor that takes
|
|
// an existing object
|
|
MOZ_ASSERT_UNREACHABLE("AllocPDNSRequestChild should not be called on child");
|
|
return nullptr;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPDNSRequestChild(PDNSRequestChild* aChild) {
|
|
DNSRequestChild* p = static_cast<DNSRequestChild*>(aChild);
|
|
p->ReleaseIPDLReference();
|
|
return true;
|
|
}
|
|
|
|
PChannelDiverterChild* NeckoChild::AllocPChannelDiverterChild(
|
|
const ChannelDiverterArgs& channel) {
|
|
return new ChannelDiverterChild();
|
|
;
|
|
}
|
|
|
|
bool NeckoChild::DeallocPChannelDiverterChild(PChannelDiverterChild* child) {
|
|
delete static_cast<ChannelDiverterChild*>(child);
|
|
return true;
|
|
}
|
|
|
|
PTransportProviderChild* NeckoChild::AllocPTransportProviderChild() {
|
|
// This refcount is transferred to the receiver of the message that
|
|
// includes the PTransportProviderChild actor.
|
|
RefPtr<TransportProviderChild> res = new TransportProviderChild();
|
|
|
|
return res.forget().take();
|
|
}
|
|
|
|
bool NeckoChild::DeallocPTransportProviderChild(
|
|
PTransportProviderChild* aActor) {
|
|
return true;
|
|
}
|
|
|
|
mozilla::ipc::IPCResult NeckoChild::RecvCrossProcessRedirect(
|
|
const uint32_t& aRegistrarId, nsIURI* aURI, const uint32_t& aNewLoadFlags,
|
|
const OptionalLoadInfoArgs& aLoadInfo, const uint64_t& aChannelId,
|
|
nsIURI* aOriginalURI, const uint64_t& aIdentifier) {
|
|
nsCOMPtr<nsILoadInfo> loadInfo;
|
|
nsresult rv =
|
|
ipc::LoadInfoArgsToLoadInfo(aLoadInfo, getter_AddRefs(loadInfo));
|
|
if (NS_FAILED(rv)) {
|
|
MOZ_DIAGNOSTIC_ASSERT(false, "LoadInfoArgsToLoadInfo failed");
|
|
return IPC_OK();
|
|
}
|
|
|
|
nsCOMPtr<nsIChannel> newChannel;
|
|
rv = NS_NewChannelInternal(getter_AddRefs(newChannel), aURI, loadInfo,
|
|
nullptr, // PerformanceStorage
|
|
nullptr, // aLoadGroup
|
|
nullptr, // aCallbacks
|
|
aNewLoadFlags);
|
|
|
|
// We are sure this is a HttpChannelChild because the parent
|
|
// is always a HTTP channel.
|
|
RefPtr<HttpChannelChild> httpChild = do_QueryObject(newChannel);
|
|
if (NS_FAILED(rv) || !httpChild) {
|
|
MOZ_DIAGNOSTIC_ASSERT(false, "NS_NewChannelInternal failed");
|
|
return IPC_OK();
|
|
}
|
|
|
|
// This is used to report any errors back to the parent by calling
|
|
// CrossProcessRedirectFinished.
|
|
auto scopeExit =
|
|
MakeScopeExit([&]() { httpChild->CrossProcessRedirectFinished(rv); });
|
|
|
|
rv = httpChild->SetChannelId(aChannelId);
|
|
if (NS_FAILED(rv)) {
|
|
return IPC_OK();
|
|
}
|
|
|
|
rv = httpChild->SetOriginalURI(aOriginalURI);
|
|
if (NS_FAILED(rv)) {
|
|
return IPC_OK();
|
|
}
|
|
|
|
// connect parent.
|
|
rv = httpChild->ConnectParent(aRegistrarId); // creates parent channel
|
|
if (NS_FAILED(rv)) {
|
|
return IPC_OK();
|
|
}
|
|
|
|
nsCOMPtr<nsIChildProcessChannelListener> processListener =
|
|
do_GetClassObject("@mozilla.org/network/childProcessChannelListener");
|
|
// The listener will call completeRedirectSetup on the channel.
|
|
rv = processListener->OnChannelReady(httpChild, aIdentifier);
|
|
if (NS_FAILED(rv)) {
|
|
return IPC_OK();
|
|
}
|
|
|
|
// scopeExit will call CrossProcessRedirectFinished(rv) here
|
|
return IPC_OK();
|
|
}
|
|
|
|
mozilla::ipc::IPCResult NeckoChild::RecvAsyncAuthPromptForNestedFrame(
|
|
const TabId& aNestedFrameId, const nsCString& aUri, const nsString& aRealm,
|
|
const uint64_t& aCallbackId) {
|
|
RefPtr<dom::TabChild> tabChild = dom::TabChild::FindTabChild(aNestedFrameId);
|
|
if (!tabChild) {
|
|
MOZ_CRASH();
|
|
return IPC_FAIL_NO_REASON(this);
|
|
}
|
|
tabChild->SendAsyncAuthPrompt(aUri, aRealm, aCallbackId);
|
|
return IPC_OK();
|
|
}
|
|
|
|
/* Predictor Messages */
|
|
mozilla::ipc::IPCResult NeckoChild::RecvPredOnPredictPrefetch(
|
|
const URIParams& aURI, const uint32_t& aHttpStatus) {
|
|
MOZ_ASSERT(NS_IsMainThread(),
|
|
"PredictorChild::RecvOnPredictPrefetch "
|
|
"off main thread.");
|
|
|
|
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
|
|
|
|
// Get the current predictor
|
|
nsresult rv = NS_OK;
|
|
nsCOMPtr<nsINetworkPredictorVerifier> predictor =
|
|
do_GetService("@mozilla.org/network/predictor;1", &rv);
|
|
NS_ENSURE_SUCCESS(rv, IPC_FAIL_NO_REASON(this));
|
|
|
|
predictor->OnPredictPrefetch(uri, aHttpStatus);
|
|
return IPC_OK();
|
|
}
|
|
|
|
mozilla::ipc::IPCResult NeckoChild::RecvPredOnPredictPreconnect(
|
|
const URIParams& aURI) {
|
|
MOZ_ASSERT(NS_IsMainThread(),
|
|
"PredictorChild::RecvOnPredictPreconnect "
|
|
"off main thread.");
|
|
|
|
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
|
|
|
|
// Get the current predictor
|
|
nsresult rv = NS_OK;
|
|
nsCOMPtr<nsINetworkPredictorVerifier> predictor =
|
|
do_GetService("@mozilla.org/network/predictor;1", &rv);
|
|
NS_ENSURE_SUCCESS(rv, IPC_FAIL_NO_REASON(this));
|
|
|
|
predictor->OnPredictPreconnect(uri);
|
|
return IPC_OK();
|
|
}
|
|
|
|
mozilla::ipc::IPCResult NeckoChild::RecvPredOnPredictDNS(
|
|
const URIParams& aURI) {
|
|
MOZ_ASSERT(NS_IsMainThread(),
|
|
"PredictorChild::RecvOnPredictDNS off "
|
|
"main thread.");
|
|
|
|
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
|
|
|
|
// Get the current predictor
|
|
nsresult rv = NS_OK;
|
|
nsCOMPtr<nsINetworkPredictorVerifier> predictor =
|
|
do_GetService("@mozilla.org/network/predictor;1", &rv);
|
|
NS_ENSURE_SUCCESS(rv, IPC_FAIL_NO_REASON(this));
|
|
|
|
predictor->OnPredictDNS(uri);
|
|
return IPC_OK();
|
|
}
|
|
|
|
mozilla::ipc::IPCResult NeckoChild::RecvSpeculativeConnectRequest() {
|
|
nsCOMPtr<nsIObserverService> obsService = services::GetObserverService();
|
|
if (obsService) {
|
|
obsService->NotifyObservers(nullptr, "speculative-connect-request",
|
|
nullptr);
|
|
}
|
|
return IPC_OK();
|
|
}
|
|
|
|
mozilla::ipc::IPCResult NeckoChild::RecvNetworkChangeNotification(
|
|
nsCString const& type) {
|
|
nsCOMPtr<nsIObserverService> obsService = services::GetObserverService();
|
|
if (obsService) {
|
|
obsService->NotifyObservers(nullptr, NS_NETWORK_LINK_TOPIC,
|
|
NS_ConvertUTF8toUTF16(type).get());
|
|
}
|
|
return IPC_OK();
|
|
}
|
|
|
|
PTrackingDummyChannelChild* NeckoChild::AllocPTrackingDummyChannelChild(
|
|
nsIURI* aURI, nsIURI* aTopWindowURI, const nsresult& aTopWindowURIResult,
|
|
const OptionalLoadInfoArgs& aLoadInfo) {
|
|
return new TrackingDummyChannelChild();
|
|
}
|
|
|
|
bool NeckoChild::DeallocPTrackingDummyChannelChild(
|
|
PTrackingDummyChannelChild* aActor) {
|
|
delete static_cast<TrackingDummyChannelChild*>(aActor);
|
|
return true;
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|