mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-04-03 21:22:47 +00:00
Backout 3e4e600adc3b (bug 782542) for crashtest-ipc timeouts
This commit is contained in:
parent
fdac8eb518
commit
f41c087da9
@ -112,10 +112,6 @@ function setUp() {
|
|||||||
SpecialPowers.setBoolPref("dom.ipc.browser_frames.oop_by_default", true);
|
SpecialPowers.setBoolPref("dom.ipc.browser_frames.oop_by_default", true);
|
||||||
SpecialPowers.addPermission("browser", true, window.document);
|
SpecialPowers.addPermission("browser", true, window.document);
|
||||||
SpecialPowers.addPermission("embed-apps", true, window.document);
|
SpecialPowers.addPermission("embed-apps", true, window.document);
|
||||||
|
|
||||||
// TODO: remove in bug 820712
|
|
||||||
SpecialPowers.setBoolPref("network.disable.ipc.security", true);
|
|
||||||
|
|
||||||
runNextTest();
|
runNextTest();
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -140,10 +136,6 @@ function makeKillTest(isApp) function testKill() {
|
|||||||
function tearDown() {
|
function tearDown() {
|
||||||
SpecialPowers.clearUserPref("dom.mozBrowserFramesEnabled");
|
SpecialPowers.clearUserPref("dom.mozBrowserFramesEnabled");
|
||||||
SpecialPowers.clearUserPref("dom.ipc.browser_frames.oop_by_default");
|
SpecialPowers.clearUserPref("dom.ipc.browser_frames.oop_by_default");
|
||||||
|
|
||||||
// TODO: remove in bug 820712
|
|
||||||
SpecialPowers.clearUserPref("network.disable.ipc.security");
|
|
||||||
|
|
||||||
SimpleTest.finish();
|
SimpleTest.finish();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -8,12 +8,22 @@
|
|||||||
#include "nsIScriptSecurityManager.h"
|
#include "nsIScriptSecurityManager.h"
|
||||||
#include "nsServiceManagerUtils.h"
|
#include "nsServiceManagerUtils.h"
|
||||||
#include "nsContentUtils.h"
|
#include "nsContentUtils.h"
|
||||||
#include "mozIApplication.h"
|
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
|
|
||||||
NS_IMPL_ISUPPORTS1(LoadContext, nsILoadContext);
|
NS_IMPL_ISUPPORTS1(LoadContext, nsILoadContext);
|
||||||
|
|
||||||
|
LoadContext::LoadContext(const IPC::SerializedLoadContext& aToCopy,
|
||||||
|
nsIDOMElement* aTopFrameElemenet)
|
||||||
|
: mIsNotNull(aToCopy.mIsNotNull)
|
||||||
|
, mIsContent(aToCopy.mIsContent)
|
||||||
|
, mUsePrivateBrowsing(aToCopy.mUsePrivateBrowsing)
|
||||||
|
, mIsInBrowserElement(aToCopy.mIsInBrowserElement)
|
||||||
|
, mAppId(aToCopy.mAppId)
|
||||||
|
, mTopFrameElement(do_GetWeakReference(aTopFrameElemenet))
|
||||||
|
{}
|
||||||
|
|
||||||
|
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
// LoadContext::nsILoadContext
|
// LoadContext::nsILoadContext
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
|
@ -10,9 +10,6 @@
|
|||||||
#include "SerializedLoadContext.h"
|
#include "SerializedLoadContext.h"
|
||||||
#include "mozilla/Attributes.h"
|
#include "mozilla/Attributes.h"
|
||||||
#include "nsWeakReference.h"
|
#include "nsWeakReference.h"
|
||||||
#include "nsIDOMElement.h"
|
|
||||||
|
|
||||||
class mozIApplication;
|
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
|
|
||||||
@ -32,19 +29,17 @@ public:
|
|||||||
NS_DECL_ISUPPORTS
|
NS_DECL_ISUPPORTS
|
||||||
NS_DECL_NSILOADCONTEXT
|
NS_DECL_NSILOADCONTEXT
|
||||||
|
|
||||||
// AppId/inBrowser arguments override those in SerializedLoadContext provided
|
LoadContext(const IPC::SerializedLoadContext& aToCopy)
|
||||||
// by child process.
|
|
||||||
LoadContext(const IPC::SerializedLoadContext& aToCopy,
|
|
||||||
nsIDOMElement* aTopFrameElement,
|
|
||||||
uint32_t aAppId, bool aInBrowser)
|
|
||||||
: mIsNotNull(aToCopy.mIsNotNull)
|
: mIsNotNull(aToCopy.mIsNotNull)
|
||||||
, mIsContent(aToCopy.mIsContent)
|
, mIsContent(aToCopy.mIsContent)
|
||||||
, mUsePrivateBrowsing(aToCopy.mUsePrivateBrowsing)
|
, mUsePrivateBrowsing(aToCopy.mUsePrivateBrowsing)
|
||||||
, mIsInBrowserElement(aInBrowser)
|
, mIsInBrowserElement(aToCopy.mIsInBrowserElement)
|
||||||
, mAppId(aAppId)
|
, mAppId(aToCopy.mAppId)
|
||||||
, mTopFrameElement(do_GetWeakReference(aTopFrameElement))
|
|
||||||
{}
|
{}
|
||||||
|
|
||||||
|
LoadContext(const IPC::SerializedLoadContext& aToCopy,
|
||||||
|
nsIDOMElement* aTopFrameElemenet);
|
||||||
|
|
||||||
private:
|
private:
|
||||||
bool mIsNotNull;
|
bool mIsNotNull;
|
||||||
bool mIsContent;
|
bool mIsContent;
|
||||||
|
@ -65,14 +65,6 @@ const browserElementTestHelpers = {
|
|||||||
return this._setBoolPref("dom.ipc.browser_frames.oop_by_default", value);
|
return this._setBoolPref("dom.ipc.browser_frames.oop_by_default", value);
|
||||||
},
|
},
|
||||||
|
|
||||||
getIPCSecurityDisabledPref: function() {
|
|
||||||
return this._getBoolPref("network.disable.ipc.security");
|
|
||||||
},
|
|
||||||
|
|
||||||
setIPCSecurityDisabledPref: function(value) {
|
|
||||||
return this._setBoolPref("network.disable.ipc.security", value);
|
|
||||||
},
|
|
||||||
|
|
||||||
getPageThumbsEnabledPref: function() {
|
getPageThumbsEnabledPref: function() {
|
||||||
return this._getBoolPref('browser.pageThumbs.enabled');
|
return this._getBoolPref('browser.pageThumbs.enabled');
|
||||||
},
|
},
|
||||||
@ -102,7 +94,6 @@ const browserElementTestHelpers = {
|
|||||||
this.setOOPDisabledPref(this.origOOPDisabledPref);
|
this.setOOPDisabledPref(this.origOOPDisabledPref);
|
||||||
this.setOOPByDefaultPref(this.origOOPByDefaultPref);
|
this.setOOPByDefaultPref(this.origOOPByDefaultPref);
|
||||||
this.setPageThumbsEnabledPref(this.origPageThumbsEnabledPref);
|
this.setPageThumbsEnabledPref(this.origPageThumbsEnabledPref);
|
||||||
this.setIPCSecurityDisabledPref(this.origIPCSecurityPref);
|
|
||||||
this.removeAllTempPermissions();
|
this.removeAllTempPermissions();
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -110,7 +101,6 @@ const browserElementTestHelpers = {
|
|||||||
'origOOPDisabledPref': null,
|
'origOOPDisabledPref': null,
|
||||||
'origOOPByDefaultPref': null,
|
'origOOPByDefaultPref': null,
|
||||||
'origPageThumbsEnabledPref': null,
|
'origPageThumbsEnabledPref': null,
|
||||||
'origIPCSecurityPref': null,
|
|
||||||
'tempPermissions': [],
|
'tempPermissions': [],
|
||||||
|
|
||||||
// Some basically-empty pages from different domains you can load.
|
// Some basically-empty pages from different domains you can load.
|
||||||
@ -132,7 +122,6 @@ browserElementTestHelpers.origEnabledPref = browserElementTestHelpers.getEnabled
|
|||||||
browserElementTestHelpers.origOOPDisabledPref = browserElementTestHelpers.getOOPDisabledPref();
|
browserElementTestHelpers.origOOPDisabledPref = browserElementTestHelpers.getOOPDisabledPref();
|
||||||
browserElementTestHelpers.origOOPByDefaultPref = browserElementTestHelpers.getOOPByDefaultPref();
|
browserElementTestHelpers.origOOPByDefaultPref = browserElementTestHelpers.getOOPByDefaultPref();
|
||||||
browserElementTestHelpers.origPageThumbsEnabledPref = browserElementTestHelpers.getPageThumbsEnabledPref();
|
browserElementTestHelpers.origPageThumbsEnabledPref = browserElementTestHelpers.getPageThumbsEnabledPref();
|
||||||
browserElementTestHelpers.origIPCSecurityPref = browserElementTestHelpers.getIPCSecurityDisabledPref();
|
|
||||||
|
|
||||||
// Disable tab view; it seriously messes us up.
|
// Disable tab view; it seriously messes us up.
|
||||||
browserElementTestHelpers.setPageThumbsEnabledPref(false);
|
browserElementTestHelpers.setPageThumbsEnabledPref(false);
|
||||||
@ -144,10 +133,6 @@ var oop = location.pathname.indexOf('_inproc_') == -1;
|
|||||||
browserElementTestHelpers.setOOPByDefaultPref(oop);
|
browserElementTestHelpers.setOOPByDefaultPref(oop);
|
||||||
browserElementTestHelpers.setOOPDisabledPref(false);
|
browserElementTestHelpers.setOOPDisabledPref(false);
|
||||||
|
|
||||||
// Disable the networking security checks; our test harness just tests browser elements
|
|
||||||
// without sticking them in apps, and the security checks dislike that.
|
|
||||||
browserElementTestHelpers.setIPCSecurityDisabledPref(true);
|
|
||||||
|
|
||||||
addEventListener('unload', function() {
|
addEventListener('unload', function() {
|
||||||
browserElementTestHelpers.restoreOriginalPrefs();
|
browserElementTestHelpers.restoreOriginalPrefs();
|
||||||
});
|
});
|
||||||
|
@ -153,9 +153,6 @@
|
|||||||
["device.storage.testing", true],
|
["device.storage.testing", true],
|
||||||
["device.storage.prompt.testing", true],
|
["device.storage.prompt.testing", true],
|
||||||
|
|
||||||
// TODO: remove this as part of bug 820712
|
|
||||||
["network.disable.ipc.security", true],
|
|
||||||
|
|
||||||
["dom.ipc.browser_frames.oop_by_default", true],
|
["dom.ipc.browser_frames.oop_by_default", true],
|
||||||
["dom.mozBrowserFramesEnabled", true],
|
["dom.mozBrowserFramesEnabled", true],
|
||||||
["browser.pageThumbs.enabled", false]
|
["browser.pageThumbs.enabled", false]
|
||||||
|
@ -168,9 +168,6 @@
|
|||||||
SpecialPowers.addPermission("browser", true, document);
|
SpecialPowers.addPermission("browser", true, document);
|
||||||
SpecialPowers.pushPrefEnv({
|
SpecialPowers.pushPrefEnv({
|
||||||
"set": [
|
"set": [
|
||||||
// TODO: remove this as part of bug 820712
|
|
||||||
["network.disable.ipc.security", true],
|
|
||||||
|
|
||||||
["dom.ipc.browser_frames.oop_by_default", true],
|
["dom.ipc.browser_frames.oop_by_default", true],
|
||||||
["dom.mozBrowserFramesEnabled", true]
|
["dom.mozBrowserFramesEnabled", true]
|
||||||
]
|
]
|
||||||
|
@ -159,10 +159,5 @@ if (!SpecialPowers.isMainProcess()) {
|
|||||||
todo(false, "We should make this work on content process");
|
todo(false, "We should make this work on content process");
|
||||||
SimpleTest.finish();
|
SimpleTest.finish();
|
||||||
} else {
|
} else {
|
||||||
// TODO: remove unsetting network.disable.ipc.security as part of bug 820712
|
startTest();
|
||||||
SpecialPowers.pushPrefEnv({
|
|
||||||
"set": [
|
|
||||||
["network.disable.ipc.security", true],
|
|
||||||
]
|
|
||||||
}, startTest);
|
|
||||||
}
|
}
|
||||||
|
@ -214,6 +214,8 @@ parent:
|
|||||||
* URI of the manifest to fetch, the application cache group ID
|
* URI of the manifest to fetch, the application cache group ID
|
||||||
* @param documentURI
|
* @param documentURI
|
||||||
* URI of the document that referred the manifest
|
* URI of the document that referred the manifest
|
||||||
|
* @param clientID
|
||||||
|
* The group cache version identifier to use
|
||||||
* @param stickDocument
|
* @param stickDocument
|
||||||
* True if the update was initiated by a document load that referred
|
* True if the update was initiated by a document load that referred
|
||||||
* a manifest.
|
* a manifest.
|
||||||
@ -231,6 +233,7 @@ parent:
|
|||||||
* has already been cached (stickDocument=false).
|
* has already been cached (stickDocument=false).
|
||||||
*/
|
*/
|
||||||
POfflineCacheUpdate(URIParams manifestURI, URIParams documentURI,
|
POfflineCacheUpdate(URIParams manifestURI, URIParams documentURI,
|
||||||
|
bool isInBrowserElement, uint32_t appId,
|
||||||
bool stickDocument);
|
bool stickDocument);
|
||||||
|
|
||||||
sync PIndexedDB(nsCString asciiOrigin)
|
sync PIndexedDB(nsCString asciiOrigin)
|
||||||
|
@ -1577,6 +1577,8 @@ TabChild::RecvActivateFrameEvent(const nsString& aType, const bool& capture)
|
|||||||
POfflineCacheUpdateChild*
|
POfflineCacheUpdateChild*
|
||||||
TabChild::AllocPOfflineCacheUpdate(const URIParams& manifestURI,
|
TabChild::AllocPOfflineCacheUpdate(const URIParams& manifestURI,
|
||||||
const URIParams& documentURI,
|
const URIParams& documentURI,
|
||||||
|
const bool& isInBrowserElement,
|
||||||
|
const uint32_t& appId,
|
||||||
const bool& stickDocument)
|
const bool& stickDocument)
|
||||||
{
|
{
|
||||||
NS_RUNTIMEABORT("unused");
|
NS_RUNTIMEABORT("unused");
|
||||||
|
@ -277,6 +277,8 @@ public:
|
|||||||
virtual POfflineCacheUpdateChild* AllocPOfflineCacheUpdate(
|
virtual POfflineCacheUpdateChild* AllocPOfflineCacheUpdate(
|
||||||
const URIParams& manifestURI,
|
const URIParams& manifestURI,
|
||||||
const URIParams& documentURI,
|
const URIParams& documentURI,
|
||||||
|
const bool& isInBrowserElement,
|
||||||
|
const uint32_t& appId,
|
||||||
const bool& stickDocument);
|
const bool& stickDocument);
|
||||||
virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateChild* offlineCacheUpdate);
|
virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateChild* offlineCacheUpdate);
|
||||||
|
|
||||||
|
@ -1128,13 +1128,15 @@ TabParent::DeallocPRenderFrame(PRenderFrameParent* aFrame)
|
|||||||
mozilla::docshell::POfflineCacheUpdateParent*
|
mozilla::docshell::POfflineCacheUpdateParent*
|
||||||
TabParent::AllocPOfflineCacheUpdate(const URIParams& aManifestURI,
|
TabParent::AllocPOfflineCacheUpdate(const URIParams& aManifestURI,
|
||||||
const URIParams& aDocumentURI,
|
const URIParams& aDocumentURI,
|
||||||
|
const bool& isInBrowserElement,
|
||||||
|
const uint32_t& appId,
|
||||||
const bool& stickDocument)
|
const bool& stickDocument)
|
||||||
{
|
{
|
||||||
nsRefPtr<mozilla::docshell::OfflineCacheUpdateParent> update =
|
nsRefPtr<mozilla::docshell::OfflineCacheUpdateParent> update =
|
||||||
new mozilla::docshell::OfflineCacheUpdateParent(OwnOrContainingAppId(),
|
new mozilla::docshell::OfflineCacheUpdateParent();
|
||||||
IsBrowserElement());
|
|
||||||
|
|
||||||
nsresult rv = update->Schedule(aManifestURI, aDocumentURI, stickDocument);
|
nsresult rv = update->Schedule(aManifestURI, aDocumentURI,
|
||||||
|
isInBrowserElement, appId, stickDocument);
|
||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
return nullptr;
|
return nullptr;
|
||||||
|
|
||||||
|
@ -191,6 +191,8 @@ public:
|
|||||||
virtual POfflineCacheUpdateParent* AllocPOfflineCacheUpdate(
|
virtual POfflineCacheUpdateParent* AllocPOfflineCacheUpdate(
|
||||||
const URIParams& aManifestURI,
|
const URIParams& aManifestURI,
|
||||||
const URIParams& aDocumentURI,
|
const URIParams& aDocumentURI,
|
||||||
|
const bool& isInBrowserElement,
|
||||||
|
const uint32_t& appId,
|
||||||
const bool& stickDocument);
|
const bool& stickDocument);
|
||||||
virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateParent* actor);
|
virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateParent* actor);
|
||||||
|
|
||||||
|
@ -770,9 +770,6 @@ pref("security.fileuri.strict_origin_policy", true);
|
|||||||
// the results
|
// the results
|
||||||
pref("network.allow-experiments", true);
|
pref("network.allow-experiments", true);
|
||||||
|
|
||||||
// Turn off interprocess security checks. Needed to run xpcshell tests.
|
|
||||||
pref("network.disable.ipc.security", false);
|
|
||||||
|
|
||||||
// Default action for unlisted external protocol handlers
|
// Default action for unlisted external protocol handlers
|
||||||
pref("network.protocol-handler.external-default", true); // OK to load
|
pref("network.protocol-handler.external-default", true); // OK to load
|
||||||
pref("network.protocol-handler.warn-external-default", true); // warn before load
|
pref("network.protocol-handler.warn-external-default", true); // warn before load
|
||||||
|
@ -4,14 +4,12 @@
|
|||||||
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
#include "mozilla/net/CookieServiceChild.h"
|
#include "mozilla/net/CookieServiceChild.h"
|
||||||
#include "mozilla/dom/TabChild.h"
|
|
||||||
#include "mozilla/ipc/URIUtils.h"
|
#include "mozilla/ipc/URIUtils.h"
|
||||||
#include "mozilla/net/NeckoChild.h"
|
#include "mozilla/net/NeckoChild.h"
|
||||||
#include "nsIURI.h"
|
#include "nsIURI.h"
|
||||||
#include "nsIPrefService.h"
|
#include "nsIPrefService.h"
|
||||||
#include "nsIPrefBranch.h"
|
#include "nsIPrefBranch.h"
|
||||||
#include "nsITabChild.h"
|
|
||||||
#include "nsNetUtil.h"
|
|
||||||
|
|
||||||
using namespace mozilla::ipc;
|
using namespace mozilla::ipc;
|
||||||
|
|
||||||
@ -117,19 +115,10 @@ CookieServiceChild::GetCookieStringInternal(nsIURI *aHostURI,
|
|||||||
URIParams uriParams;
|
URIParams uriParams;
|
||||||
SerializeURI(aHostURI, uriParams);
|
SerializeURI(aHostURI, uriParams);
|
||||||
|
|
||||||
nsCOMPtr<nsITabChild> iTabChild;
|
|
||||||
mozilla::dom::TabChild* tabChild = nullptr;
|
|
||||||
if (aChannel) {
|
|
||||||
NS_QueryNotificationCallbacks(aChannel, iTabChild);
|
|
||||||
if (iTabChild) {
|
|
||||||
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Synchronously call the parent.
|
// Synchronously call the parent.
|
||||||
nsAutoCString result;
|
nsAutoCString result;
|
||||||
SendGetCookieString(uriParams, !!isForeign, aFromHttp,
|
SendGetCookieString(uriParams, !!isForeign, aFromHttp,
|
||||||
IPC::SerializedLoadContext(aChannel), tabChild, &result);
|
IPC::SerializedLoadContext(aChannel), &result);
|
||||||
if (!result.IsEmpty())
|
if (!result.IsEmpty())
|
||||||
*aCookieString = ToNewCString(result);
|
*aCookieString = ToNewCString(result);
|
||||||
|
|
||||||
@ -159,18 +148,9 @@ CookieServiceChild::SetCookieStringInternal(nsIURI *aHostURI,
|
|||||||
URIParams uriParams;
|
URIParams uriParams;
|
||||||
SerializeURI(aHostURI, uriParams);
|
SerializeURI(aHostURI, uriParams);
|
||||||
|
|
||||||
nsCOMPtr<nsITabChild> iTabChild;
|
|
||||||
mozilla::dom::TabChild* tabChild = nullptr;
|
|
||||||
if (aChannel) {
|
|
||||||
NS_QueryNotificationCallbacks(aChannel, iTabChild);
|
|
||||||
if (iTabChild) {
|
|
||||||
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Synchronously call the parent.
|
// Synchronously call the parent.
|
||||||
SendSetCookieString(uriParams, !!isForeign, cookieString, serverTime,
|
SendSetCookieString(uriParams, !!isForeign, cookieString, serverTime,
|
||||||
aFromHttp, IPC::SerializedLoadContext(aChannel), tabChild);
|
aFromHttp, IPC::SerializedLoadContext(aChannel));
|
||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -4,44 +4,32 @@
|
|||||||
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
#include "mozilla/net/CookieServiceParent.h"
|
#include "mozilla/net/CookieServiceParent.h"
|
||||||
#include "mozilla/dom/PBrowserParent.h"
|
|
||||||
#include "mozilla/net/NeckoParent.h"
|
|
||||||
|
|
||||||
#include "mozilla/ipc/URIUtils.h"
|
#include "mozilla/ipc/URIUtils.h"
|
||||||
#include "nsCookieService.h"
|
#include "nsCookieService.h"
|
||||||
#include "nsNetUtil.h"
|
#include "nsNetUtil.h"
|
||||||
#include "nsPrintfCString.h"
|
|
||||||
|
|
||||||
using namespace mozilla::ipc;
|
using namespace mozilla::ipc;
|
||||||
using mozilla::dom::PBrowserParent;
|
|
||||||
using mozilla::net::NeckoParent;
|
|
||||||
|
|
||||||
MOZ_WARN_UNUSED_RESULT
|
static void
|
||||||
static bool
|
GetAppInfoFromLoadContext(const IPC::SerializedLoadContext &aLoadContext,
|
||||||
GetAppInfoFromParams(const IPC::SerializedLoadContext &aLoadContext,
|
uint32_t& aAppId,
|
||||||
PBrowserParent* aBrowser,
|
bool& aIsInBrowserElement,
|
||||||
uint32_t& aAppId,
|
bool& aIsPrivate)
|
||||||
bool& aIsInBrowserElement,
|
|
||||||
bool& aIsPrivate)
|
|
||||||
{
|
{
|
||||||
|
// TODO: bug 782542: what to do when we get null loadContext? For now assume
|
||||||
|
// NECKO_NO_APP_ID.
|
||||||
aAppId = NECKO_NO_APP_ID;
|
aAppId = NECKO_NO_APP_ID;
|
||||||
aIsInBrowserElement = false;
|
aIsInBrowserElement = false;
|
||||||
aIsPrivate = false;
|
aIsPrivate = false;
|
||||||
|
|
||||||
const char* error = NeckoParent::GetValidatedAppInfo(aLoadContext, aBrowser,
|
if (aLoadContext.IsNotNull()) {
|
||||||
&aAppId,
|
aAppId = aLoadContext.mAppId;
|
||||||
&aIsInBrowserElement);
|
aIsInBrowserElement = aLoadContext.mIsInBrowserElement;
|
||||||
if (error) {
|
|
||||||
NS_WARNING(nsPrintfCString("CookieServiceParent: GetAppInfoFromParams: "
|
|
||||||
"FATAL error: %s: KILLING CHILD PROCESS\n",
|
|
||||||
error).get());
|
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (aLoadContext.IsPrivateBitValid())
|
if (aLoadContext.IsPrivateBitValid())
|
||||||
aIsPrivate = aLoadContext.mUsePrivateBrowsing;
|
aIsPrivate = aLoadContext.mUsePrivateBrowsing;
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
@ -69,7 +57,6 @@ CookieServiceParent::RecvGetCookieString(const URIParams& aHost,
|
|||||||
const bool& aFromHttp,
|
const bool& aFromHttp,
|
||||||
const IPC::SerializedLoadContext&
|
const IPC::SerializedLoadContext&
|
||||||
aLoadContext,
|
aLoadContext,
|
||||||
PBrowserParent* aBrowser,
|
|
||||||
nsCString* aResult)
|
nsCString* aResult)
|
||||||
{
|
{
|
||||||
if (!mCookieService)
|
if (!mCookieService)
|
||||||
@ -83,15 +70,10 @@ CookieServiceParent::RecvGetCookieString(const URIParams& aHost,
|
|||||||
|
|
||||||
uint32_t appId;
|
uint32_t appId;
|
||||||
bool isInBrowserElement, isPrivate;
|
bool isInBrowserElement, isPrivate;
|
||||||
bool valid = GetAppInfoFromParams(aLoadContext, aBrowser, appId,
|
GetAppInfoFromLoadContext(aLoadContext, appId, isInBrowserElement, isPrivate);
|
||||||
isInBrowserElement, isPrivate);
|
|
||||||
if (!valid) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
mCookieService->GetCookieStringInternal(hostURI, aIsForeign, aFromHttp, appId,
|
mCookieService->GetCookieStringInternal(hostURI, aIsForeign, aFromHttp, appId,
|
||||||
isInBrowserElement, isPrivate,
|
isInBrowserElement, isPrivate, *aResult);
|
||||||
*aResult);
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -102,8 +84,7 @@ CookieServiceParent::RecvSetCookieString(const URIParams& aHost,
|
|||||||
const nsCString& aServerTime,
|
const nsCString& aServerTime,
|
||||||
const bool& aFromHttp,
|
const bool& aFromHttp,
|
||||||
const IPC::SerializedLoadContext&
|
const IPC::SerializedLoadContext&
|
||||||
aLoadContext,
|
aLoadContext)
|
||||||
PBrowserParent* aBrowser)
|
|
||||||
{
|
{
|
||||||
if (!mCookieService)
|
if (!mCookieService)
|
||||||
return true;
|
return true;
|
||||||
@ -116,11 +97,7 @@ CookieServiceParent::RecvSetCookieString(const URIParams& aHost,
|
|||||||
|
|
||||||
uint32_t appId;
|
uint32_t appId;
|
||||||
bool isInBrowserElement, isPrivate;
|
bool isInBrowserElement, isPrivate;
|
||||||
bool valid = GetAppInfoFromParams(aLoadContext, aBrowser, appId,
|
GetAppInfoFromLoadContext(aLoadContext, appId, isInBrowserElement, isPrivate);
|
||||||
isInBrowserElement, isPrivate);
|
|
||||||
if (!valid) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
nsDependentCString cookieString(aCookieString, 0);
|
nsDependentCString cookieString(aCookieString, 0);
|
||||||
//TODO: bug 812475, pass a real channel object
|
//TODO: bug 812475, pass a real channel object
|
||||||
|
@ -13,9 +13,6 @@ class nsCookieService;
|
|||||||
class nsIIOService;
|
class nsIIOService;
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
namespace dom {
|
|
||||||
class PBrowserParent;
|
|
||||||
}
|
|
||||||
namespace net {
|
namespace net {
|
||||||
|
|
||||||
class CookieServiceParent : public PCookieServiceParent
|
class CookieServiceParent : public PCookieServiceParent
|
||||||
@ -30,7 +27,6 @@ protected:
|
|||||||
const bool& aFromHttp,
|
const bool& aFromHttp,
|
||||||
const IPC::SerializedLoadContext&
|
const IPC::SerializedLoadContext&
|
||||||
loadContext,
|
loadContext,
|
||||||
mozilla::dom::PBrowserParent* aBrowser,
|
|
||||||
nsCString* aResult);
|
nsCString* aResult);
|
||||||
|
|
||||||
virtual bool RecvSetCookieString(const URIParams& aHost,
|
virtual bool RecvSetCookieString(const URIParams& aHost,
|
||||||
@ -39,8 +35,7 @@ protected:
|
|||||||
const nsCString& aServerTime,
|
const nsCString& aServerTime,
|
||||||
const bool& aFromHttp,
|
const bool& aFromHttp,
|
||||||
const IPC::SerializedLoadContext&
|
const IPC::SerializedLoadContext&
|
||||||
loadContext,
|
loadContext);
|
||||||
mozilla::dom::PBrowserParent* aBrowser);
|
|
||||||
|
|
||||||
nsRefPtr<nsCookieService> mCookieService;
|
nsRefPtr<nsCookieService> mCookieService;
|
||||||
};
|
};
|
||||||
|
@ -6,7 +6,6 @@
|
|||||||
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
include protocol PNecko;
|
include protocol PNecko;
|
||||||
include protocol PBrowser;
|
|
||||||
include URIParams;
|
include URIParams;
|
||||||
|
|
||||||
include "SerializedLoadContext.h";
|
include "SerializedLoadContext.h";
|
||||||
@ -65,8 +64,7 @@ parent:
|
|||||||
sync GetCookieString(URIParams host,
|
sync GetCookieString(URIParams host,
|
||||||
bool isForeign,
|
bool isForeign,
|
||||||
bool fromHttp,
|
bool fromHttp,
|
||||||
SerializedLoadContext loadContext,
|
SerializedLoadContext loadContext)
|
||||||
nullable PBrowser browser)
|
|
||||||
returns (nsCString result);
|
returns (nsCString result);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -103,8 +101,7 @@ parent:
|
|||||||
nsCString cookieString,
|
nsCString cookieString,
|
||||||
nsCString serverTime,
|
nsCString serverTime,
|
||||||
bool fromHttp,
|
bool fromHttp,
|
||||||
SerializedLoadContext loadContext,
|
SerializedLoadContext loadContext);
|
||||||
nullable PBrowser browser);
|
|
||||||
|
|
||||||
__delete__();
|
__delete__();
|
||||||
};
|
};
|
||||||
|
@ -14,22 +14,17 @@
|
|||||||
#include "mozilla/net/FTPChannelChild.h"
|
#include "mozilla/net/FTPChannelChild.h"
|
||||||
#include "mozilla/net/WebSocketChannelChild.h"
|
#include "mozilla/net/WebSocketChannelChild.h"
|
||||||
#include "mozilla/dom/network/TCPSocketChild.h"
|
#include "mozilla/dom/network/TCPSocketChild.h"
|
||||||
#include "mozilla/Preferences.h"
|
|
||||||
|
|
||||||
using mozilla::dom::TCPSocketChild;
|
using mozilla::dom::TCPSocketChild;
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
namespace net {
|
namespace net {
|
||||||
|
|
||||||
static bool gDisableIPCSecurity = false;
|
|
||||||
static const char kPrefDisableIPCSecurity[] = "network.disable.ipc.security";
|
|
||||||
|
|
||||||
PNeckoChild *gNeckoChild = nullptr;
|
PNeckoChild *gNeckoChild = nullptr;
|
||||||
|
|
||||||
// C++ file contents
|
// C++ file contents
|
||||||
NeckoChild::NeckoChild()
|
NeckoChild::NeckoChild()
|
||||||
{
|
{
|
||||||
Preferences::AddBoolVarCache(&gDisableIPCSecurity, kPrefDisableIPCSecurity);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
NeckoChild::~NeckoChild()
|
NeckoChild::~NeckoChild()
|
||||||
@ -85,8 +80,7 @@ NeckoChild::DeallocPHttpChannel(PHttpChannelChild* channel)
|
|||||||
}
|
}
|
||||||
|
|
||||||
PFTPChannelChild*
|
PFTPChannelChild*
|
||||||
NeckoChild::AllocPFTPChannel(PBrowserChild* aBrowser,
|
NeckoChild::AllocPFTPChannel()
|
||||||
const SerializedLoadContext& aSerialized)
|
|
||||||
{
|
{
|
||||||
// We don't allocate here: see FTPChannelChild::AsyncOpen()
|
// We don't allocate here: see FTPChannelChild::AsyncOpen()
|
||||||
NS_RUNTIMEABORT("AllocPFTPChannel should not be called");
|
NS_RUNTIMEABORT("AllocPFTPChannel should not be called");
|
||||||
@ -140,8 +134,7 @@ NeckoChild::DeallocPWyciwygChannel(PWyciwygChannelChild* channel)
|
|||||||
}
|
}
|
||||||
|
|
||||||
PWebSocketChild*
|
PWebSocketChild*
|
||||||
NeckoChild::AllocPWebSocket(PBrowserChild* browser,
|
NeckoChild::AllocPWebSocket(PBrowserChild* browser)
|
||||||
const SerializedLoadContext& aSerialized)
|
|
||||||
{
|
{
|
||||||
NS_NOTREACHED("AllocPWebSocket should not be called");
|
NS_NOTREACHED("AllocPWebSocket should not be called");
|
||||||
return nullptr;
|
return nullptr;
|
||||||
|
@ -33,10 +33,9 @@ protected:
|
|||||||
virtual bool DeallocPCookieService(PCookieServiceChild*);
|
virtual bool DeallocPCookieService(PCookieServiceChild*);
|
||||||
virtual PWyciwygChannelChild* AllocPWyciwygChannel();
|
virtual PWyciwygChannelChild* AllocPWyciwygChannel();
|
||||||
virtual bool DeallocPWyciwygChannel(PWyciwygChannelChild*);
|
virtual bool DeallocPWyciwygChannel(PWyciwygChannelChild*);
|
||||||
virtual PFTPChannelChild* AllocPFTPChannel(PBrowserChild* aBrowser,
|
virtual PFTPChannelChild* AllocPFTPChannel();
|
||||||
const SerializedLoadContext& aSerialized);
|
|
||||||
virtual bool DeallocPFTPChannel(PFTPChannelChild*);
|
virtual bool DeallocPFTPChannel(PFTPChannelChild*);
|
||||||
virtual PWebSocketChild* AllocPWebSocket(PBrowserChild*, const SerializedLoadContext&);
|
virtual PWebSocketChild* AllocPWebSocket(PBrowserChild*);
|
||||||
virtual bool DeallocPWebSocket(PWebSocketChild*);
|
virtual bool DeallocPWebSocket(PWebSocketChild*);
|
||||||
virtual PTCPSocketChild* AllocPTCPSocket(const nsString& aHost,
|
virtual PTCPSocketChild* AllocPTCPSocket(const nsString& aHost,
|
||||||
const uint16_t& aPort,
|
const uint16_t& aPort,
|
||||||
|
@ -14,142 +14,30 @@
|
|||||||
#include "mozilla/net/WebSocketChannelParent.h"
|
#include "mozilla/net/WebSocketChannelParent.h"
|
||||||
#include "mozilla/dom/TabParent.h"
|
#include "mozilla/dom/TabParent.h"
|
||||||
#include "mozilla/dom/network/TCPSocketParent.h"
|
#include "mozilla/dom/network/TCPSocketParent.h"
|
||||||
#include "mozilla/Preferences.h"
|
|
||||||
#include "mozilla/LoadContext.h"
|
|
||||||
#include "nsPrintfCString.h"
|
|
||||||
#include "nsHTMLDNSPrefetch.h"
|
#include "nsHTMLDNSPrefetch.h"
|
||||||
|
|
||||||
using mozilla::dom::TabParent;
|
using mozilla::dom::TabParent;
|
||||||
using mozilla::net::PTCPSocketParent;
|
using mozilla::net::PTCPSocketParent;
|
||||||
using mozilla::dom::TCPSocketParent;
|
using mozilla::dom::TCPSocketParent;
|
||||||
using IPC::SerializedLoadContext;
|
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
namespace net {
|
namespace net {
|
||||||
|
|
||||||
static bool gDisableIPCSecurity = false;
|
|
||||||
static const char kPrefDisableIPCSecurity[] = "network.disable.ipc.security";
|
|
||||||
|
|
||||||
// C++ file contents
|
// C++ file contents
|
||||||
NeckoParent::NeckoParent()
|
NeckoParent::NeckoParent()
|
||||||
{
|
{
|
||||||
Preferences::AddBoolVarCache(&gDisableIPCSecurity, kPrefDisableIPCSecurity);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
NeckoParent::~NeckoParent()
|
NeckoParent::~NeckoParent()
|
||||||
{
|
{
|
||||||
}
|
}
|
||||||
|
|
||||||
static PBOverrideStatus
|
|
||||||
PBOverrideStatusFromLoadContext(const SerializedLoadContext& aSerialized)
|
|
||||||
{
|
|
||||||
if (!aSerialized.IsNotNull() && aSerialized.IsPrivateBitValid()) {
|
|
||||||
return aSerialized.mUsePrivateBrowsing ?
|
|
||||||
kPBOverride_Private :
|
|
||||||
kPBOverride_NotPrivate;
|
|
||||||
}
|
|
||||||
return kPBOverride_Unset;
|
|
||||||
}
|
|
||||||
|
|
||||||
const char*
|
|
||||||
NeckoParent::GetValidatedAppInfo(const SerializedLoadContext& aSerialized,
|
|
||||||
PBrowserParent* aBrowser,
|
|
||||||
uint32_t* aAppId,
|
|
||||||
bool* aInBrowserElement)
|
|
||||||
{
|
|
||||||
if (!gDisableIPCSecurity) {
|
|
||||||
if (!aBrowser) {
|
|
||||||
return "missing required PBrowser argument";
|
|
||||||
}
|
|
||||||
if (!aSerialized.IsNotNull()) {
|
|
||||||
return "SerializedLoadContext from child is null";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
*aAppId = NECKO_UNKNOWN_APP_ID;
|
|
||||||
*aInBrowserElement = false;
|
|
||||||
|
|
||||||
if (aBrowser) {
|
|
||||||
nsRefPtr<TabParent> tabParent = static_cast<TabParent*>(aBrowser);
|
|
||||||
|
|
||||||
*aAppId = tabParent->OwnOrContainingAppId();
|
|
||||||
*aInBrowserElement = tabParent->IsBrowserElement();
|
|
||||||
|
|
||||||
if (*aAppId == NECKO_UNKNOWN_APP_ID) {
|
|
||||||
return "TabParent reports appId=NECKO_UNKNOWN_APP_ID!";
|
|
||||||
}
|
|
||||||
// We may get appID=NO_APP if child frame is neither a browser nor an app
|
|
||||||
if (*aAppId == NECKO_NO_APP_ID) {
|
|
||||||
if (tabParent->HasOwnApp()) {
|
|
||||||
return "TabParent reports NECKO_NO_APP_ID but also is an app";
|
|
||||||
}
|
|
||||||
if (!gDisableIPCSecurity && tabParent->IsBrowserElement()) {
|
|
||||||
// <iframe mozbrowser> which doesn't have an <iframe mozapp> above it.
|
|
||||||
// This is not supported now, and we'll need to do a code audit to make
|
|
||||||
// sure we can handle it (i.e don't short-circuit using separate
|
|
||||||
// namespace if just appID==0)
|
|
||||||
return "TabParent reports appId=NECKO_NO_APP_ID but is a mozbrowser";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
// Only trust appId/inBrowser from child-side loadcontext if we're in
|
|
||||||
// testing mode: allows xpcshell tests to masquerade as apps
|
|
||||||
MOZ_ASSERT(gDisableIPCSecurity);
|
|
||||||
if (!gDisableIPCSecurity) {
|
|
||||||
return "internal error";
|
|
||||||
}
|
|
||||||
if (aSerialized.IsNotNull()) {
|
|
||||||
*aAppId = aSerialized.mAppId;
|
|
||||||
*aInBrowserElement = aSerialized.mIsInBrowserElement;
|
|
||||||
} else {
|
|
||||||
*aAppId = NECKO_NO_APP_ID;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nullptr;
|
|
||||||
}
|
|
||||||
|
|
||||||
const char *
|
|
||||||
NeckoParent::CreateChannelLoadContext(PBrowserParent* aBrowser,
|
|
||||||
const SerializedLoadContext& aSerialized,
|
|
||||||
nsCOMPtr<nsILoadContext> &aResult)
|
|
||||||
{
|
|
||||||
uint32_t appId = NECKO_UNKNOWN_APP_ID;
|
|
||||||
bool inBrowser = false;
|
|
||||||
nsIDOMElement* topFrameElement = nullptr;
|
|
||||||
const char* error = GetValidatedAppInfo(aSerialized, aBrowser, &appId, &inBrowser);
|
|
||||||
if (error) {
|
|
||||||
return error;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (aBrowser) {
|
|
||||||
nsRefPtr<TabParent> tabParent = static_cast<TabParent*>(aBrowser);
|
|
||||||
topFrameElement = tabParent->GetOwnerElement();
|
|
||||||
}
|
|
||||||
|
|
||||||
// if gDisableIPCSecurity, we may not have a LoadContext to set. This is
|
|
||||||
// the common case for most xpcshell tests.
|
|
||||||
if (aSerialized.IsNotNull()) {
|
|
||||||
aResult = new LoadContext(aSerialized, topFrameElement, appId, inBrowser);
|
|
||||||
}
|
|
||||||
|
|
||||||
return nullptr;
|
|
||||||
}
|
|
||||||
|
|
||||||
PHttpChannelParent*
|
PHttpChannelParent*
|
||||||
NeckoParent::AllocPHttpChannel(PBrowserParent* aBrowser,
|
NeckoParent::AllocPHttpChannel(PBrowserParent* browser,
|
||||||
const SerializedLoadContext& aSerialized)
|
const SerializedLoadContext& loadContext)
|
||||||
{
|
{
|
||||||
nsCOMPtr<nsILoadContext> loadContext;
|
HttpChannelParent *p = new HttpChannelParent(browser, loadContext);
|
||||||
const char *error = CreateChannelLoadContext(aBrowser, aSerialized,
|
|
||||||
loadContext);
|
|
||||||
if (error) {
|
|
||||||
NS_WARNING(nsPrintfCString("NeckoParent::AllocPHttpChannel: "
|
|
||||||
"FATAL error: %s: KILLING CHILD PROCESS\n",
|
|
||||||
error).get());
|
|
||||||
return nullptr;
|
|
||||||
}
|
|
||||||
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(aSerialized);
|
|
||||||
HttpChannelParent *p = new HttpChannelParent(aBrowser, loadContext, overrideStatus);
|
|
||||||
p->AddRef();
|
p->AddRef();
|
||||||
return p;
|
return p;
|
||||||
}
|
}
|
||||||
@ -163,20 +51,9 @@ NeckoParent::DeallocPHttpChannel(PHttpChannelParent* channel)
|
|||||||
}
|
}
|
||||||
|
|
||||||
PFTPChannelParent*
|
PFTPChannelParent*
|
||||||
NeckoParent::AllocPFTPChannel(PBrowserParent* aBrowser,
|
NeckoParent::AllocPFTPChannel()
|
||||||
const SerializedLoadContext& aSerialized)
|
|
||||||
{
|
{
|
||||||
nsCOMPtr<nsILoadContext> loadContext;
|
FTPChannelParent *p = new FTPChannelParent();
|
||||||
const char *error = CreateChannelLoadContext(aBrowser, aSerialized,
|
|
||||||
loadContext);
|
|
||||||
if (error) {
|
|
||||||
NS_WARNING(nsPrintfCString("NeckoParent::AllocPFTPChannel: "
|
|
||||||
"FATAL error: %s: KILLING CHILD PROCESS\n",
|
|
||||||
error).get());
|
|
||||||
return nullptr;
|
|
||||||
}
|
|
||||||
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(aSerialized);
|
|
||||||
FTPChannelParent *p = new FTPChannelParent(loadContext, overrideStatus);
|
|
||||||
p->AddRef();
|
p->AddRef();
|
||||||
return p;
|
return p;
|
||||||
}
|
}
|
||||||
@ -219,23 +96,10 @@ NeckoParent::DeallocPWyciwygChannel(PWyciwygChannelParent* channel)
|
|||||||
}
|
}
|
||||||
|
|
||||||
PWebSocketParent*
|
PWebSocketParent*
|
||||||
NeckoParent::AllocPWebSocket(PBrowserParent* browser,
|
NeckoParent::AllocPWebSocket(PBrowserParent* browser)
|
||||||
const SerializedLoadContext& serialized)
|
|
||||||
{
|
{
|
||||||
nsCOMPtr<nsILoadContext> loadContext;
|
|
||||||
const char *error = CreateChannelLoadContext(browser, serialized,
|
|
||||||
loadContext);
|
|
||||||
if (error) {
|
|
||||||
NS_WARNING(nsPrintfCString("NeckoParent::AllocPWebSocket: "
|
|
||||||
"FATAL error: %s: KILLING CHILD PROCESS\n",
|
|
||||||
error).get());
|
|
||||||
return nullptr;
|
|
||||||
}
|
|
||||||
|
|
||||||
TabParent* tabParent = static_cast<TabParent*>(browser);
|
TabParent* tabParent = static_cast<TabParent*>(browser);
|
||||||
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(serialized);
|
WebSocketChannelParent* p = new WebSocketChannelParent(tabParent);
|
||||||
WebSocketChannelParent* p = new WebSocketChannelParent(tabParent, loadContext,
|
|
||||||
overrideStatus);
|
|
||||||
p->AddRef();
|
p->AddRef();
|
||||||
return p;
|
return p;
|
||||||
}
|
}
|
||||||
|
@ -14,13 +14,6 @@
|
|||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
namespace net {
|
namespace net {
|
||||||
|
|
||||||
// Used to override channel Private Browsing status if needed.
|
|
||||||
enum PBOverrideStatus {
|
|
||||||
kPBOverride_Unset = 0,
|
|
||||||
kPBOverride_Private,
|
|
||||||
kPBOverride_NotPrivate
|
|
||||||
};
|
|
||||||
|
|
||||||
// Header file contents
|
// Header file contents
|
||||||
class NeckoParent :
|
class NeckoParent :
|
||||||
public PNeckoParent
|
public PNeckoParent
|
||||||
@ -29,27 +22,6 @@ public:
|
|||||||
NeckoParent();
|
NeckoParent();
|
||||||
virtual ~NeckoParent();
|
virtual ~NeckoParent();
|
||||||
|
|
||||||
MOZ_WARN_UNUSED_RESULT
|
|
||||||
static const char *
|
|
||||||
GetValidatedAppInfo(const SerializedLoadContext& aSerialized,
|
|
||||||
PBrowserParent* aBrowser,
|
|
||||||
uint32_t* aAppId,
|
|
||||||
bool* aInBrowserElement);
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Creates LoadContext for parent-side of an e10s channel.
|
|
||||||
*
|
|
||||||
* Values from PBrowserParent are more secure, and override those set in
|
|
||||||
* SerializedLoadContext.
|
|
||||||
*
|
|
||||||
* Returns null if successful, or an error string if failed.
|
|
||||||
*/
|
|
||||||
MOZ_WARN_UNUSED_RESULT
|
|
||||||
static const char*
|
|
||||||
CreateChannelLoadContext(PBrowserParent* aBrowser,
|
|
||||||
const SerializedLoadContext& aSerialized,
|
|
||||||
nsCOMPtr<nsILoadContext> &aResult);
|
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
virtual PHttpChannelParent* AllocPHttpChannel(PBrowserParent*,
|
virtual PHttpChannelParent* AllocPHttpChannel(PBrowserParent*,
|
||||||
const SerializedLoadContext&);
|
const SerializedLoadContext&);
|
||||||
@ -58,11 +30,9 @@ protected:
|
|||||||
virtual bool DeallocPCookieService(PCookieServiceParent*);
|
virtual bool DeallocPCookieService(PCookieServiceParent*);
|
||||||
virtual PWyciwygChannelParent* AllocPWyciwygChannel();
|
virtual PWyciwygChannelParent* AllocPWyciwygChannel();
|
||||||
virtual bool DeallocPWyciwygChannel(PWyciwygChannelParent*);
|
virtual bool DeallocPWyciwygChannel(PWyciwygChannelParent*);
|
||||||
virtual PFTPChannelParent* AllocPFTPChannel(PBrowserParent* aBrowser,
|
virtual PFTPChannelParent* AllocPFTPChannel();
|
||||||
const SerializedLoadContext& aSerialized);
|
|
||||||
virtual bool DeallocPFTPChannel(PFTPChannelParent*);
|
virtual bool DeallocPFTPChannel(PFTPChannelParent*);
|
||||||
virtual PWebSocketParent* AllocPWebSocket(PBrowserParent* browser,
|
virtual PWebSocketParent* AllocPWebSocket(PBrowserParent* browser);
|
||||||
const SerializedLoadContext& aSerialized);
|
|
||||||
virtual bool DeallocPWebSocket(PWebSocketParent*);
|
virtual bool DeallocPWebSocket(PWebSocketParent*);
|
||||||
virtual PTCPSocketParent* AllocPTCPSocket(const nsString& aHost,
|
virtual PTCPSocketParent* AllocPTCPSocket(const nsString& aHost,
|
||||||
const uint16_t& aPort,
|
const uint16_t& aPort,
|
||||||
@ -81,6 +51,7 @@ protected:
|
|||||||
virtual bool RecvCancelHTMLDNSPrefetch(const nsString& hostname,
|
virtual bool RecvCancelHTMLDNSPrefetch(const nsString& hostname,
|
||||||
const uint16_t& flags,
|
const uint16_t& flags,
|
||||||
const nsresult& reason);
|
const nsresult& reason);
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
} // namespace net
|
} // namespace net
|
||||||
|
@ -40,8 +40,8 @@ parent:
|
|||||||
PHttpChannel(nullable PBrowser browser,
|
PHttpChannel(nullable PBrowser browser,
|
||||||
SerializedLoadContext loadContext);
|
SerializedLoadContext loadContext);
|
||||||
PWyciwygChannel();
|
PWyciwygChannel();
|
||||||
PFTPChannel(PBrowser browser, SerializedLoadContext loadContext);
|
PFTPChannel();
|
||||||
PWebSocket(PBrowser browser, SerializedLoadContext loadContext);
|
PWebSocket(PBrowser browser);
|
||||||
PTCPSocket(nsString host, uint16_t port, bool useSSL, nsString binaryType,
|
PTCPSocket(nsString host, uint16_t port, bool useSSL, nsString binaryType,
|
||||||
nullable PBrowser browser);
|
nullable PBrowser browser);
|
||||||
|
|
||||||
|
@ -7,9 +7,8 @@
|
|||||||
|
|
||||||
#include "mozilla/net/NeckoChild.h"
|
#include "mozilla/net/NeckoChild.h"
|
||||||
#include "mozilla/net/FTPChannelChild.h"
|
#include "mozilla/net/FTPChannelChild.h"
|
||||||
#include "mozilla/dom/TabChild.h"
|
|
||||||
#include "nsFtpProtocolHandler.h"
|
#include "nsFtpProtocolHandler.h"
|
||||||
#include "nsITabChild.h"
|
|
||||||
#include "nsStringStream.h"
|
#include "nsStringStream.h"
|
||||||
#include "nsMimeTypes.h"
|
#include "nsMimeTypes.h"
|
||||||
#include "nsNetUtil.h"
|
#include "nsNetUtil.h"
|
||||||
@ -156,18 +155,8 @@ FTPChannelChild::AsyncOpen(::nsIStreamListener* listener, nsISupports* aContext)
|
|||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
return rv;
|
return rv;
|
||||||
|
|
||||||
mozilla::dom::TabChild* tabChild = nullptr;
|
|
||||||
nsCOMPtr<nsITabChild> iTabChild;
|
|
||||||
NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup,
|
|
||||||
NS_GET_IID(nsITabChild),
|
|
||||||
getter_AddRefs(iTabChild));
|
|
||||||
GetCallback(iTabChild);
|
|
||||||
if (iTabChild) {
|
|
||||||
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
|
|
||||||
}
|
|
||||||
|
|
||||||
// FIXME: like bug 558623, merge constructor+SendAsyncOpen into 1 IPC msg
|
// FIXME: like bug 558623, merge constructor+SendAsyncOpen into 1 IPC msg
|
||||||
gNeckoChild->SendPFTPChannelConstructor(this, tabChild, IPC::SerializedLoadContext(this));
|
gNeckoChild->SendPFTPChannelConstructor(this);
|
||||||
mListener = listener;
|
mListener = listener;
|
||||||
mListenerContext = aContext;
|
mListenerContext = aContext;
|
||||||
|
|
||||||
@ -181,7 +170,8 @@ FTPChannelChild::AsyncOpen(::nsIStreamListener* listener, nsISupports* aContext)
|
|||||||
OptionalInputStreamParams uploadStream;
|
OptionalInputStreamParams uploadStream;
|
||||||
SerializeInputStream(mUploadStream, uploadStream);
|
SerializeInputStream(mUploadStream, uploadStream);
|
||||||
|
|
||||||
SendAsyncOpen(uri, mStartPos, mEntityID, uploadStream);
|
SendAsyncOpen(uri, mStartPos, mEntityID, uploadStream,
|
||||||
|
IPC::SerializedLoadContext(this));
|
||||||
|
|
||||||
// The socket transport layer in the chrome process now has a logical ref to
|
// The socket transport layer in the chrome process now has a logical ref to
|
||||||
// us until OnStopRequest is called.
|
// us until OnStopRequest is called.
|
||||||
@ -519,22 +509,11 @@ FTPChannelChild::Resume()
|
|||||||
NS_IMETHODIMP
|
NS_IMETHODIMP
|
||||||
FTPChannelChild::ConnectParent(uint32_t id)
|
FTPChannelChild::ConnectParent(uint32_t id)
|
||||||
{
|
{
|
||||||
mozilla::dom::TabChild* tabChild = nullptr;
|
|
||||||
nsCOMPtr<nsITabChild> iTabChild;
|
|
||||||
NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup,
|
|
||||||
NS_GET_IID(nsITabChild),
|
|
||||||
getter_AddRefs(iTabChild));
|
|
||||||
GetCallback(iTabChild);
|
|
||||||
if (iTabChild) {
|
|
||||||
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
|
|
||||||
}
|
|
||||||
|
|
||||||
// The socket transport in the chrome process now holds a logical ref to us
|
// The socket transport in the chrome process now holds a logical ref to us
|
||||||
// until OnStopRequest, or we do a redirect, or we hit an IPDL error.
|
// until OnStopRequest, or we do a redirect, or we hit an IPDL error.
|
||||||
AddIPDLReference();
|
AddIPDLReference();
|
||||||
|
|
||||||
if (!gNeckoChild->SendPFTPChannelConstructor(this, tabChild,
|
if (!gNeckoChild->SendPFTPChannelConstructor(this))
|
||||||
IPC::SerializedLoadContext(this)))
|
|
||||||
return NS_ERROR_FAILURE;
|
return NS_ERROR_FAILURE;
|
||||||
|
|
||||||
if (!SendConnectChannel(id))
|
if (!SendConnectChannel(id))
|
||||||
|
@ -23,10 +23,8 @@ using namespace mozilla::ipc;
|
|||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
namespace net {
|
namespace net {
|
||||||
|
|
||||||
FTPChannelParent::FTPChannelParent(nsILoadContext* aLoadContext, PBOverrideStatus aOverrideStatus)
|
FTPChannelParent::FTPChannelParent()
|
||||||
: mIPCClosed(false)
|
: mIPCClosed(false)
|
||||||
, mLoadContext(aLoadContext)
|
|
||||||
, mPBOverride(aOverrideStatus)
|
|
||||||
{
|
{
|
||||||
nsIProtocolHandler* handler;
|
nsIProtocolHandler* handler;
|
||||||
CallGetService(NS_NETWORK_PROTOCOL_CONTRACTID_PREFIX "ftp", &handler);
|
CallGetService(NS_NETWORK_PROTOCOL_CONTRACTID_PREFIX "ftp", &handler);
|
||||||
@ -64,7 +62,8 @@ bool
|
|||||||
FTPChannelParent::RecvAsyncOpen(const URIParams& aURI,
|
FTPChannelParent::RecvAsyncOpen(const URIParams& aURI,
|
||||||
const uint64_t& aStartPos,
|
const uint64_t& aStartPos,
|
||||||
const nsCString& aEntityID,
|
const nsCString& aEntityID,
|
||||||
const OptionalInputStreamParams& aUploadStream)
|
const OptionalInputStreamParams& aUploadStream,
|
||||||
|
const IPC::SerializedLoadContext& loadContext)
|
||||||
{
|
{
|
||||||
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
|
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
|
||||||
if (!uri)
|
if (!uri)
|
||||||
@ -88,11 +87,7 @@ FTPChannelParent::RecvAsyncOpen(const URIParams& aURI,
|
|||||||
return SendFailedAsyncOpen(rv);
|
return SendFailedAsyncOpen(rv);
|
||||||
|
|
||||||
mChannel = static_cast<nsFtpChannel*>(chan.get());
|
mChannel = static_cast<nsFtpChannel*>(chan.get());
|
||||||
|
|
||||||
if (mPBOverride != kPBOverride_Unset) {
|
|
||||||
mChannel->SetPrivate(mPBOverride == kPBOverride_Private ? true : false);
|
|
||||||
}
|
|
||||||
|
|
||||||
nsCOMPtr<nsIInputStream> upload = DeserializeInputStream(aUploadStream);
|
nsCOMPtr<nsIInputStream> upload = DeserializeInputStream(aUploadStream);
|
||||||
if (upload) {
|
if (upload) {
|
||||||
// contentType and contentLength are ignored
|
// contentType and contentLength are ignored
|
||||||
@ -105,6 +100,14 @@ FTPChannelParent::RecvAsyncOpen(const URIParams& aURI,
|
|||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
return SendFailedAsyncOpen(rv);
|
return SendFailedAsyncOpen(rv);
|
||||||
|
|
||||||
|
if (loadContext.IsNotNull())
|
||||||
|
mLoadContext = new LoadContext(loadContext);
|
||||||
|
else if (loadContext.IsPrivateBitValid()) {
|
||||||
|
nsCOMPtr<nsIPrivateBrowsingChannel> pbChannel = do_QueryInterface(chan);
|
||||||
|
if (pbChannel)
|
||||||
|
pbChannel->SetPrivate(loadContext.mUsePrivateBrowsing);
|
||||||
|
}
|
||||||
|
|
||||||
rv = mChannel->AsyncOpen(this, nullptr);
|
rv = mChannel->AsyncOpen(this, nullptr);
|
||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
return SendFailedAsyncOpen(rv);
|
return SendFailedAsyncOpen(rv);
|
||||||
|
@ -10,7 +10,6 @@
|
|||||||
|
|
||||||
#include "mozilla/net/PFTPChannelParent.h"
|
#include "mozilla/net/PFTPChannelParent.h"
|
||||||
#include "mozilla/net/NeckoCommon.h"
|
#include "mozilla/net/NeckoCommon.h"
|
||||||
#include "mozilla/net/NeckoParent.h"
|
|
||||||
#include "nsIParentChannel.h"
|
#include "nsIParentChannel.h"
|
||||||
#include "nsIInterfaceRequestor.h"
|
#include "nsIInterfaceRequestor.h"
|
||||||
#include "nsILoadContext.h"
|
#include "nsILoadContext.h"
|
||||||
@ -31,14 +30,15 @@ public:
|
|||||||
NS_DECL_NSIPARENTCHANNEL
|
NS_DECL_NSIPARENTCHANNEL
|
||||||
NS_DECL_NSIINTERFACEREQUESTOR
|
NS_DECL_NSIINTERFACEREQUESTOR
|
||||||
|
|
||||||
FTPChannelParent(nsILoadContext* aLoadContext, PBOverrideStatus aOverrideStatus);
|
FTPChannelParent();
|
||||||
virtual ~FTPChannelParent();
|
virtual ~FTPChannelParent();
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
virtual bool RecvAsyncOpen(const URIParams& uri,
|
virtual bool RecvAsyncOpen(const URIParams& uri,
|
||||||
const uint64_t& startPos,
|
const uint64_t& startPos,
|
||||||
const nsCString& entityID,
|
const nsCString& entityID,
|
||||||
const OptionalInputStreamParams& uploadStream) MOZ_OVERRIDE;
|
const OptionalInputStreamParams& uploadStream,
|
||||||
|
const IPC::SerializedLoadContext& loadContext) MOZ_OVERRIDE;
|
||||||
virtual bool RecvConnectChannel(const uint32_t& channelId) MOZ_OVERRIDE;
|
virtual bool RecvConnectChannel(const uint32_t& channelId) MOZ_OVERRIDE;
|
||||||
virtual bool RecvCancel(const nsresult& status) MOZ_OVERRIDE;
|
virtual bool RecvCancel(const nsresult& status) MOZ_OVERRIDE;
|
||||||
virtual bool RecvSuspend() MOZ_OVERRIDE;
|
virtual bool RecvSuspend() MOZ_OVERRIDE;
|
||||||
@ -51,8 +51,6 @@ protected:
|
|||||||
bool mIPCClosed;
|
bool mIPCClosed;
|
||||||
|
|
||||||
nsCOMPtr<nsILoadContext> mLoadContext;
|
nsCOMPtr<nsILoadContext> mLoadContext;
|
||||||
|
|
||||||
PBOverrideStatus mPBOverride;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
} // namespace net
|
} // namespace net
|
||||||
|
@ -13,6 +13,7 @@ include protocol PBlob; //FIXME: bug #792908
|
|||||||
|
|
||||||
include "SerializedLoadContext.h";
|
include "SerializedLoadContext.h";
|
||||||
|
|
||||||
|
using IPC::SerializedLoadContext;
|
||||||
using PRTime;
|
using PRTime;
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
@ -28,7 +29,8 @@ parent:
|
|||||||
AsyncOpen(URIParams uri,
|
AsyncOpen(URIParams uri,
|
||||||
uint64_t startPos,
|
uint64_t startPos,
|
||||||
nsCString entityID,
|
nsCString entityID,
|
||||||
OptionalInputStreamParams uploadStream);
|
OptionalInputStreamParams uploadStream,
|
||||||
|
SerializedLoadContext loadContext);
|
||||||
|
|
||||||
ConnectChannel(uint32_t channelId);
|
ConnectChannel(uint32_t channelId);
|
||||||
Cancel(nsresult status);
|
Cancel(nsresult status);
|
||||||
|
@ -34,8 +34,7 @@ namespace mozilla {
|
|||||||
namespace net {
|
namespace net {
|
||||||
|
|
||||||
HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding,
|
HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding,
|
||||||
nsILoadContext* aLoadContext,
|
const IPC::SerializedLoadContext& loadContext)
|
||||||
PBOverrideStatus aOverrideStatus)
|
|
||||||
: mIPCClosed(false)
|
: mIPCClosed(false)
|
||||||
, mStoredStatus(NS_OK)
|
, mStoredStatus(NS_OK)
|
||||||
, mStoredProgress(0)
|
, mStoredProgress(0)
|
||||||
@ -43,8 +42,7 @@ HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding,
|
|||||||
, mSentRedirect1Begin(false)
|
, mSentRedirect1Begin(false)
|
||||||
, mSentRedirect1BeginFailed(false)
|
, mSentRedirect1BeginFailed(false)
|
||||||
, mReceivedRedirect2Verify(false)
|
, mReceivedRedirect2Verify(false)
|
||||||
, mPBOverride(aOverrideStatus)
|
, mPBOverride(kPBOverride_Unset)
|
||||||
, mLoadContext(aLoadContext)
|
|
||||||
{
|
{
|
||||||
// Ensure gHttpHandler is initialized: we need the atom table up and running.
|
// Ensure gHttpHandler is initialized: we need the atom table up and running.
|
||||||
nsIHttpProtocolHandler* handler;
|
nsIHttpProtocolHandler* handler;
|
||||||
@ -52,6 +50,18 @@ HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding,
|
|||||||
NS_ASSERTION(handler, "no http handler");
|
NS_ASSERTION(handler, "no http handler");
|
||||||
|
|
||||||
mTabParent = static_cast<mozilla::dom::TabParent*>(iframeEmbedding);
|
mTabParent = static_cast<mozilla::dom::TabParent*>(iframeEmbedding);
|
||||||
|
|
||||||
|
if (loadContext.IsNotNull()) {
|
||||||
|
if (mTabParent) {
|
||||||
|
mLoadContext = new LoadContext(loadContext, mTabParent->GetOwnerElement());
|
||||||
|
} else {
|
||||||
|
mLoadContext = new LoadContext(loadContext);
|
||||||
|
}
|
||||||
|
} else if (loadContext.IsPrivateBitValid()) {
|
||||||
|
// Don't have channel yet: override PB status after we create it.
|
||||||
|
mPBOverride = loadContext.mUsePrivateBrowsing ? kPBOverride_Private
|
||||||
|
: kPBOverride_NotPrivate;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
HttpChannelParent::~HttpChannelParent()
|
HttpChannelParent::~HttpChannelParent()
|
||||||
|
@ -12,7 +12,6 @@
|
|||||||
#include "mozilla/dom/PBrowserParent.h"
|
#include "mozilla/dom/PBrowserParent.h"
|
||||||
#include "mozilla/net/PHttpChannelParent.h"
|
#include "mozilla/net/PHttpChannelParent.h"
|
||||||
#include "mozilla/net/NeckoCommon.h"
|
#include "mozilla/net/NeckoCommon.h"
|
||||||
#include "mozilla/net/NeckoParent.h"
|
|
||||||
#include "nsIParentRedirectingChannel.h"
|
#include "nsIParentRedirectingChannel.h"
|
||||||
#include "nsIProgressEventSink.h"
|
#include "nsIProgressEventSink.h"
|
||||||
#include "nsHttpChannel.h"
|
#include "nsHttpChannel.h"
|
||||||
@ -45,8 +44,7 @@ public:
|
|||||||
NS_DECL_NSIINTERFACEREQUESTOR
|
NS_DECL_NSIINTERFACEREQUESTOR
|
||||||
|
|
||||||
HttpChannelParent(mozilla::dom::PBrowserParent* iframeEmbedding,
|
HttpChannelParent(mozilla::dom::PBrowserParent* iframeEmbedding,
|
||||||
nsILoadContext* aLoadContext,
|
const IPC::SerializedLoadContext& loadContext);
|
||||||
PBOverrideStatus aStatus);
|
|
||||||
virtual ~HttpChannelParent();
|
virtual ~HttpChannelParent();
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
@ -110,6 +108,12 @@ private:
|
|||||||
bool mSentRedirect1BeginFailed : 1;
|
bool mSentRedirect1BeginFailed : 1;
|
||||||
bool mReceivedRedirect2Verify : 1;
|
bool mReceivedRedirect2Verify : 1;
|
||||||
|
|
||||||
|
// Used to override channel Private Browsing status if needed.
|
||||||
|
enum PBOverrideStatus {
|
||||||
|
kPBOverride_Unset = 0,
|
||||||
|
kPBOverride_Private,
|
||||||
|
kPBOverride_NotPrivate
|
||||||
|
};
|
||||||
PBOverrideStatus mPBOverride;
|
PBOverrideStatus mPBOverride;
|
||||||
|
|
||||||
nsCOMPtr<nsILoadContext> mLoadContext;
|
nsCOMPtr<nsILoadContext> mLoadContext;
|
||||||
|
@ -27,7 +27,8 @@ parent:
|
|||||||
AsyncOpen(URIParams aURI,
|
AsyncOpen(URIParams aURI,
|
||||||
nsCString aOrigin,
|
nsCString aOrigin,
|
||||||
nsCString aProtocol,
|
nsCString aProtocol,
|
||||||
bool aSecure);
|
bool aSecure,
|
||||||
|
SerializedLoadContext loadContext);
|
||||||
Close(uint16_t code, nsCString reason);
|
Close(uint16_t code, nsCString reason);
|
||||||
SendMsg(nsCString aMsg);
|
SendMsg(nsCString aMsg);
|
||||||
SendBinaryMsg(nsCString aMsg);
|
SendBinaryMsg(nsCString aMsg);
|
||||||
|
@ -338,9 +338,9 @@ WebSocketChannelChild::AsyncOpen(nsIURI *aURI,
|
|||||||
// Corresponding release in DeallocPWebSocket
|
// Corresponding release in DeallocPWebSocket
|
||||||
AddIPDLReference();
|
AddIPDLReference();
|
||||||
|
|
||||||
gNeckoChild->SendPWebSocketConstructor(this, tabChild,
|
gNeckoChild->SendPWebSocketConstructor(this, tabChild);
|
||||||
IPC::SerializedLoadContext(this));
|
if (!SendAsyncOpen(uri, nsCString(aOrigin), mProtocol, mEncrypted,
|
||||||
if (!SendAsyncOpen(uri, nsCString(aOrigin), mProtocol, mEncrypted))
|
IPC::SerializedLoadContext(this)))
|
||||||
return NS_ERROR_UNEXPECTED;
|
return NS_ERROR_UNEXPECTED;
|
||||||
|
|
||||||
mOriginalURI = aURI;
|
mOriginalURI = aURI;
|
||||||
|
@ -7,6 +7,7 @@
|
|||||||
#include "WebSocketLog.h"
|
#include "WebSocketLog.h"
|
||||||
#include "WebSocketChannelParent.h"
|
#include "WebSocketChannelParent.h"
|
||||||
#include "nsIAuthPromptProvider.h"
|
#include "nsIAuthPromptProvider.h"
|
||||||
|
#include "mozilla/LoadContext.h"
|
||||||
#include "mozilla/ipc/InputStreamUtils.h"
|
#include "mozilla/ipc/InputStreamUtils.h"
|
||||||
#include "mozilla/ipc/URIUtils.h"
|
#include "mozilla/ipc/URIUtils.h"
|
||||||
|
|
||||||
@ -19,15 +20,10 @@ NS_IMPL_THREADSAFE_ISUPPORTS2(WebSocketChannelParent,
|
|||||||
nsIWebSocketListener,
|
nsIWebSocketListener,
|
||||||
nsIInterfaceRequestor)
|
nsIInterfaceRequestor)
|
||||||
|
|
||||||
WebSocketChannelParent::WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider,
|
WebSocketChannelParent::WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider)
|
||||||
nsILoadContext* aLoadContext,
|
|
||||||
PBOverrideStatus aOverrideStatus)
|
|
||||||
: mAuthProvider(aAuthProvider)
|
: mAuthProvider(aAuthProvider)
|
||||||
, mLoadContext(aLoadContext)
|
|
||||||
, mIPCOpen(true)
|
, mIPCOpen(true)
|
||||||
{
|
{
|
||||||
// Websocket channels can't have a private browsing override
|
|
||||||
MOZ_ASSERT_IF(!aLoadContext, aOverrideStatus == kPBOverride_Unset);
|
|
||||||
#if defined(PR_LOGGING)
|
#if defined(PR_LOGGING)
|
||||||
if (!webSocketLog)
|
if (!webSocketLog)
|
||||||
webSocketLog = PR_NewLogModule("nsWebSocket");
|
webSocketLog = PR_NewLogModule("nsWebSocket");
|
||||||
@ -51,7 +47,8 @@ bool
|
|||||||
WebSocketChannelParent::RecvAsyncOpen(const URIParams& aURI,
|
WebSocketChannelParent::RecvAsyncOpen(const URIParams& aURI,
|
||||||
const nsCString& aOrigin,
|
const nsCString& aOrigin,
|
||||||
const nsCString& aProtocol,
|
const nsCString& aProtocol,
|
||||||
const bool& aSecure)
|
const bool& aSecure,
|
||||||
|
const IPC::SerializedLoadContext& loadContext)
|
||||||
{
|
{
|
||||||
LOG(("WebSocketChannelParent::RecvAsyncOpen() %p\n", this));
|
LOG(("WebSocketChannelParent::RecvAsyncOpen() %p\n", this));
|
||||||
|
|
||||||
@ -68,6 +65,14 @@ WebSocketChannelParent::RecvAsyncOpen(const URIParams& aURI,
|
|||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
goto fail;
|
goto fail;
|
||||||
|
|
||||||
|
if (loadContext.IsNotNull())
|
||||||
|
mLoadContext = new LoadContext(loadContext);
|
||||||
|
#ifdef DEBUG
|
||||||
|
else
|
||||||
|
// websocket channels cannot have a private bit override
|
||||||
|
MOZ_ASSERT(!loadContext.IsPrivateBitValid());
|
||||||
|
#endif
|
||||||
|
|
||||||
rv = mChannel->SetNotificationCallbacks(this);
|
rv = mChannel->SetNotificationCallbacks(this);
|
||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
goto fail;
|
goto fail;
|
||||||
|
@ -8,7 +8,6 @@
|
|||||||
#define mozilla_net_WebSocketChannelParent_h
|
#define mozilla_net_WebSocketChannelParent_h
|
||||||
|
|
||||||
#include "mozilla/net/PWebSocketParent.h"
|
#include "mozilla/net/PWebSocketParent.h"
|
||||||
#include "mozilla/net/NeckoParent.h"
|
|
||||||
#include "nsIInterfaceRequestor.h"
|
#include "nsIInterfaceRequestor.h"
|
||||||
#include "nsIWebSocketListener.h"
|
#include "nsIWebSocketListener.h"
|
||||||
#include "nsIWebSocketChannel.h"
|
#include "nsIWebSocketChannel.h"
|
||||||
@ -30,15 +29,14 @@ class WebSocketChannelParent : public PWebSocketParent,
|
|||||||
NS_DECL_NSIWEBSOCKETLISTENER
|
NS_DECL_NSIWEBSOCKETLISTENER
|
||||||
NS_DECL_NSIINTERFACEREQUESTOR
|
NS_DECL_NSIINTERFACEREQUESTOR
|
||||||
|
|
||||||
WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider,
|
WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider);
|
||||||
nsILoadContext* aLoadContext,
|
|
||||||
PBOverrideStatus aOverrideStatus);
|
|
||||||
|
|
||||||
private:
|
private:
|
||||||
bool RecvAsyncOpen(const URIParams& aURI,
|
bool RecvAsyncOpen(const URIParams& aURI,
|
||||||
const nsCString& aOrigin,
|
const nsCString& aOrigin,
|
||||||
const nsCString& aProtocol,
|
const nsCString& aProtocol,
|
||||||
const bool& aSecure);
|
const bool& aSecure,
|
||||||
|
const IPC::SerializedLoadContext& loadContext);
|
||||||
bool RecvClose(const uint16_t & code, const nsCString & reason);
|
bool RecvClose(const uint16_t & code, const nsCString & reason);
|
||||||
bool RecvSendMsg(const nsCString& aMsg);
|
bool RecvSendMsg(const nsCString& aMsg);
|
||||||
bool RecvSendBinaryMsg(const nsCString& aMsg);
|
bool RecvSendBinaryMsg(const nsCString& aMsg);
|
||||||
|
@ -3,7 +3,6 @@
|
|||||||
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
include protocol PNecko;
|
include protocol PNecko;
|
||||||
include protocol PBrowser;
|
|
||||||
include URIParams;
|
include URIParams;
|
||||||
|
|
||||||
include "SerializedLoadContext.h";
|
include "SerializedLoadContext.h";
|
||||||
@ -24,8 +23,7 @@ parent:
|
|||||||
Init(URIParams uri);
|
Init(URIParams uri);
|
||||||
AsyncOpen(URIParams originalURI,
|
AsyncOpen(URIParams originalURI,
|
||||||
uint32_t loadFlags,
|
uint32_t loadFlags,
|
||||||
SerializedLoadContext loadContext,
|
SerializedLoadContext loadContext);
|
||||||
PBrowser browser);
|
|
||||||
|
|
||||||
// methods corresponding to those of nsIWyciwygChannel
|
// methods corresponding to those of nsIWyciwygChannel
|
||||||
WriteToCacheEntry(nsString data);
|
WriteToCacheEntry(nsString data);
|
||||||
|
@ -6,7 +6,6 @@
|
|||||||
|
|
||||||
#include "mozilla/net/NeckoChild.h"
|
#include "mozilla/net/NeckoChild.h"
|
||||||
#include "WyciwygChannelChild.h"
|
#include "WyciwygChannelChild.h"
|
||||||
#include "mozilla/dom/TabChild.h"
|
|
||||||
|
|
||||||
#include "nsCharsetSource.h"
|
#include "nsCharsetSource.h"
|
||||||
#include "nsStringStream.h"
|
#include "nsStringStream.h"
|
||||||
@ -593,16 +592,7 @@ WyciwygChannelChild::AsyncOpen(nsIStreamListener *aListener, nsISupports *aConte
|
|||||||
URIParams originalURI;
|
URIParams originalURI;
|
||||||
SerializeURI(mOriginalURI, originalURI);
|
SerializeURI(mOriginalURI, originalURI);
|
||||||
|
|
||||||
mozilla::dom::TabChild* tabChild = nullptr;
|
SendAsyncOpen(originalURI, mLoadFlags, IPC::SerializedLoadContext(this));
|
||||||
nsCOMPtr<nsITabChild> iTabChild;
|
|
||||||
NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup,
|
|
||||||
NS_GET_IID(nsITabChild),
|
|
||||||
getter_AddRefs(iTabChild));
|
|
||||||
if (iTabChild) {
|
|
||||||
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
|
|
||||||
}
|
|
||||||
|
|
||||||
SendAsyncOpen(originalURI, mLoadFlags, IPC::SerializedLoadContext(this), tabChild);
|
|
||||||
|
|
||||||
mState = WCC_OPENED;
|
mState = WCC_OPENED;
|
||||||
|
|
||||||
|
@ -11,8 +11,8 @@
|
|||||||
#include "nsCharsetSource.h"
|
#include "nsCharsetSource.h"
|
||||||
#include "nsISerializable.h"
|
#include "nsISerializable.h"
|
||||||
#include "nsSerializationHelper.h"
|
#include "nsSerializationHelper.h"
|
||||||
|
#include "mozilla/LoadContext.h"
|
||||||
#include "mozilla/ipc/URIUtils.h"
|
#include "mozilla/ipc/URIUtils.h"
|
||||||
#include "mozilla/net/NeckoParent.h"
|
|
||||||
|
|
||||||
using namespace mozilla::ipc;
|
using namespace mozilla::ipc;
|
||||||
|
|
||||||
@ -86,8 +86,7 @@ WyciwygChannelParent::RecvInit(const URIParams& aURI)
|
|||||||
bool
|
bool
|
||||||
WyciwygChannelParent::RecvAsyncOpen(const URIParams& aOriginal,
|
WyciwygChannelParent::RecvAsyncOpen(const URIParams& aOriginal,
|
||||||
const uint32_t& aLoadFlags,
|
const uint32_t& aLoadFlags,
|
||||||
const IPC::SerializedLoadContext& loadContext,
|
const IPC::SerializedLoadContext& loadContext)
|
||||||
PBrowserParent* aParent)
|
|
||||||
{
|
{
|
||||||
nsCOMPtr<nsIURI> original = DeserializeURI(aOriginal);
|
nsCOMPtr<nsIURI> original = DeserializeURI(aOriginal);
|
||||||
if (!original)
|
if (!original)
|
||||||
@ -108,15 +107,9 @@ WyciwygChannelParent::RecvAsyncOpen(const URIParams& aOriginal,
|
|||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
return SendCancelEarly(rv);
|
return SendCancelEarly(rv);
|
||||||
|
|
||||||
const char* error = NeckoParent::CreateChannelLoadContext(aParent, loadContext,
|
if (loadContext.IsNotNull())
|
||||||
mLoadContext);
|
mLoadContext = new LoadContext(loadContext);
|
||||||
if (error) {
|
else if (loadContext.IsPrivateBitValid()) {
|
||||||
NS_WARNING(nsPrintfCString("WyciwygChannelParent::RecvAsyncOpen: error: %s\n",
|
|
||||||
error).get());
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!mLoadContext && loadContext.IsPrivateBitValid()) {
|
|
||||||
nsCOMPtr<nsIPrivateBrowsingChannel> pbChannel = do_QueryInterface(mChannel);
|
nsCOMPtr<nsIPrivateBrowsingChannel> pbChannel = do_QueryInterface(mChannel);
|
||||||
if (pbChannel)
|
if (pbChannel)
|
||||||
pbChannel->SetPrivate(loadContext.mUsePrivateBrowsing);
|
pbChannel->SetPrivate(loadContext.mUsePrivateBrowsing);
|
||||||
|
@ -14,10 +14,6 @@
|
|||||||
#include "nsILoadContext.h"
|
#include "nsILoadContext.h"
|
||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
namespace dom {
|
|
||||||
class PBrowserParent;
|
|
||||||
}
|
|
||||||
|
|
||||||
namespace net {
|
namespace net {
|
||||||
|
|
||||||
class WyciwygChannelParent : public PWyciwygChannelParent
|
class WyciwygChannelParent : public PWyciwygChannelParent
|
||||||
@ -37,8 +33,7 @@ protected:
|
|||||||
virtual bool RecvInit(const URIParams& uri);
|
virtual bool RecvInit(const URIParams& uri);
|
||||||
virtual bool RecvAsyncOpen(const URIParams& original,
|
virtual bool RecvAsyncOpen(const URIParams& original,
|
||||||
const uint32_t& loadFlags,
|
const uint32_t& loadFlags,
|
||||||
const IPC::SerializedLoadContext& loadContext,
|
const IPC::SerializedLoadContext& loadContext);
|
||||||
PBrowserParent* parent);
|
|
||||||
virtual bool RecvWriteToCacheEntry(const nsString& data);
|
virtual bool RecvWriteToCacheEntry(const nsString& data);
|
||||||
virtual bool RecvCloseCacheEntry(const nsresult& reason);
|
virtual bool RecvCloseCacheEntry(const nsresult& reason);
|
||||||
virtual bool RecvSetCharsetAndSource(const int32_t& source,
|
virtual bool RecvSetCharsetAndSource(const int32_t& source,
|
||||||
|
@ -36,27 +36,16 @@ let (ios = Components.classes["@mozilla.org/network/io-service;1"]
|
|||||||
ios.offline = false;
|
ios.offline = false;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Determine if we're running on parent or child
|
// Disable IPv6 lookups for 'localhost' on windows.
|
||||||
let runningInParent = true;
|
|
||||||
try {
|
try {
|
||||||
runningInParent = Components.classes["@mozilla.org/xre/runtime;1"].
|
if ("@mozilla.org/windows-registry-key;1" in Components.classes) {
|
||||||
getService(Components.interfaces.nsIXULRuntime).processType
|
let processType = Components.classes["@mozilla.org/xre/runtime;1"].
|
||||||
== Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT;
|
getService(Components.interfaces.nsIXULRuntime).processType;
|
||||||
}
|
if (processType == Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT) {
|
||||||
catch (e) { }
|
let (prefs = Components.classes["@mozilla.org/preferences-service;1"]
|
||||||
|
.getService(Components.interfaces.nsIPrefBranch)) {
|
||||||
try {
|
prefs.setCharPref("network.dns.ipv4OnlyDomains", "localhost");
|
||||||
if (runningInParent) {
|
}
|
||||||
let prefs = Components.classes["@mozilla.org/preferences-service;1"]
|
|
||||||
.getService(Components.interfaces.nsIPrefBranch);
|
|
||||||
|
|
||||||
// disable necko IPC security checks for xpcshell, as they lack the
|
|
||||||
// docshells needed to pass them
|
|
||||||
prefs.setBoolPref("network.disable.ipc.security", true);
|
|
||||||
|
|
||||||
// Disable IPv6 lookups for 'localhost' on windows.
|
|
||||||
if ("@mozilla.org/windows-registry-key;1" in Components.classes) {
|
|
||||||
prefs.setCharPref("network.dns.ipv4OnlyDomains", "localhost");
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -68,7 +57,9 @@ catch (e) { }
|
|||||||
// Note that if we're in a child process, we don't want to init the
|
// Note that if we're in a child process, we don't want to init the
|
||||||
// crashreporter component.
|
// crashreporter component.
|
||||||
try { // nsIXULRuntime is not available in some configurations.
|
try { // nsIXULRuntime is not available in some configurations.
|
||||||
if (runningInParent &&
|
let processType = Components.classes["@mozilla.org/xre/runtime;1"].
|
||||||
|
getService(Components.interfaces.nsIXULRuntime).processType;
|
||||||
|
if (processType == Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT &&
|
||||||
"@mozilla.org/toolkit/crash-reporter;1" in Components.classes) {
|
"@mozilla.org/toolkit/crash-reporter;1" in Components.classes) {
|
||||||
// Remember to update </toolkit/crashreporter/test/unit/test_crashreporter.js>
|
// Remember to update </toolkit/crashreporter/test/unit/test_crashreporter.js>
|
||||||
// too if you change this initial setting.
|
// too if you change this initial setting.
|
||||||
@ -809,7 +800,11 @@ function do_get_profile() {
|
|||||||
function do_load_child_test_harness()
|
function do_load_child_test_harness()
|
||||||
{
|
{
|
||||||
// Make sure this isn't called from child process
|
// Make sure this isn't called from child process
|
||||||
if (!runningInParent) {
|
var runtime = Components.classes["@mozilla.org/xre/app-info;1"]
|
||||||
|
.getService(Components.interfaces.nsIXULRuntime);
|
||||||
|
if (runtime.processType !=
|
||||||
|
Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT)
|
||||||
|
{
|
||||||
do_throw("run_test_in_child cannot be called from child!");
|
do_throw("run_test_in_child cannot be called from child!");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -435,6 +435,7 @@ OfflineCacheUpdateChild::Schedule()
|
|||||||
// a reference to us. Will be released in RecvFinish() that identifies
|
// a reference to us. Will be released in RecvFinish() that identifies
|
||||||
// the work has been done.
|
// the work has been done.
|
||||||
child->SendPOfflineCacheUpdateConstructor(this, manifestURI, documentURI,
|
child->SendPOfflineCacheUpdateConstructor(this, manifestURI, documentURI,
|
||||||
|
mInBrowser, mAppID,
|
||||||
stickDocument);
|
stickDocument);
|
||||||
|
|
||||||
mIPCActivated = true;
|
mIPCActivated = true;
|
||||||
|
@ -5,14 +5,12 @@
|
|||||||
|
|
||||||
#include "OfflineCacheUpdateParent.h"
|
#include "OfflineCacheUpdateParent.h"
|
||||||
|
|
||||||
#include "mozilla/dom/TabParent.h"
|
|
||||||
#include "mozilla/ipc/URIUtils.h"
|
#include "mozilla/ipc/URIUtils.h"
|
||||||
#include "nsOfflineCacheUpdate.h"
|
#include "nsOfflineCacheUpdate.h"
|
||||||
#include "nsIApplicationCache.h"
|
#include "nsIApplicationCache.h"
|
||||||
#include "nsNetUtil.h"
|
#include "nsNetUtil.h"
|
||||||
|
|
||||||
using namespace mozilla::ipc;
|
using namespace mozilla::ipc;
|
||||||
using mozilla::dom::TabParent;
|
|
||||||
|
|
||||||
#if defined(PR_LOGGING)
|
#if defined(PR_LOGGING)
|
||||||
//
|
//
|
||||||
@ -45,11 +43,8 @@ NS_IMPL_ISUPPORTS2(OfflineCacheUpdateParent,
|
|||||||
// OfflineCacheUpdateParent <public>
|
// OfflineCacheUpdateParent <public>
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
|
|
||||||
OfflineCacheUpdateParent::OfflineCacheUpdateParent(uint32_t aAppId,
|
OfflineCacheUpdateParent::OfflineCacheUpdateParent()
|
||||||
bool aIsInBrowser)
|
|
||||||
: mIPCClosed(false)
|
: mIPCClosed(false)
|
||||||
, mIsInBrowserElement(aIsInBrowser)
|
|
||||||
, mAppId(aAppId)
|
|
||||||
{
|
{
|
||||||
// Make sure the service has been initialized
|
// Make sure the service has been initialized
|
||||||
nsOfflineCacheUpdateService* service =
|
nsOfflineCacheUpdateService* service =
|
||||||
@ -74,6 +69,8 @@ OfflineCacheUpdateParent::ActorDestroy(ActorDestroyReason why)
|
|||||||
nsresult
|
nsresult
|
||||||
OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI,
|
OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI,
|
||||||
const URIParams& aDocumentURI,
|
const URIParams& aDocumentURI,
|
||||||
|
const bool& isInBrowserElement,
|
||||||
|
const uint32_t& appId,
|
||||||
const bool& stickDocument)
|
const bool& stickDocument)
|
||||||
{
|
{
|
||||||
LOG(("OfflineCacheUpdateParent::RecvSchedule [%p]", this));
|
LOG(("OfflineCacheUpdateParent::RecvSchedule [%p]", this));
|
||||||
@ -103,7 +100,7 @@ OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI,
|
|||||||
if (!NS_SecurityCompareURIs(manifestURI, documentURI, false))
|
if (!NS_SecurityCompareURIs(manifestURI, documentURI, false))
|
||||||
return NS_ERROR_DOM_SECURITY_ERR;
|
return NS_ERROR_DOM_SECURITY_ERR;
|
||||||
|
|
||||||
service->FindUpdate(manifestURI, mAppId, mIsInBrowserElement,
|
service->FindUpdate(manifestURI, appId, isInBrowserElement,
|
||||||
getter_AddRefs(update));
|
getter_AddRefs(update));
|
||||||
if (!update) {
|
if (!update) {
|
||||||
update = new nsOfflineCacheUpdate();
|
update = new nsOfflineCacheUpdate();
|
||||||
@ -111,7 +108,7 @@ OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI,
|
|||||||
// Leave aDocument argument null. Only glues and children keep
|
// Leave aDocument argument null. Only glues and children keep
|
||||||
// document instances.
|
// document instances.
|
||||||
rv = update->Init(manifestURI, documentURI, nullptr, nullptr,
|
rv = update->Init(manifestURI, documentURI, nullptr, nullptr,
|
||||||
mAppId, mIsInBrowserElement);
|
appId, isInBrowserElement);
|
||||||
NS_ENSURE_SUCCESS(rv, rv);
|
NS_ENSURE_SUCCESS(rv, rv);
|
||||||
|
|
||||||
rv = update->Schedule();
|
rv = update->Schedule();
|
||||||
|
@ -14,10 +14,6 @@
|
|||||||
|
|
||||||
namespace mozilla {
|
namespace mozilla {
|
||||||
|
|
||||||
namespace dom {
|
|
||||||
class TabParent;
|
|
||||||
}
|
|
||||||
|
|
||||||
namespace ipc {
|
namespace ipc {
|
||||||
class URIParams;
|
class URIParams;
|
||||||
} // namespace ipc
|
} // namespace ipc
|
||||||
@ -38,9 +34,11 @@ public:
|
|||||||
nsresult
|
nsresult
|
||||||
Schedule(const URIParams& manifestURI,
|
Schedule(const URIParams& manifestURI,
|
||||||
const URIParams& documentURI,
|
const URIParams& documentURI,
|
||||||
|
const bool& isInBrowserElement,
|
||||||
|
const uint32_t& appId,
|
||||||
const bool& stickDocument);
|
const bool& stickDocument);
|
||||||
|
|
||||||
OfflineCacheUpdateParent(uint32_t aAppId, bool aIsInBrowser);
|
OfflineCacheUpdateParent();
|
||||||
~OfflineCacheUpdateParent();
|
~OfflineCacheUpdateParent();
|
||||||
|
|
||||||
virtual void ActorDestroy(ActorDestroyReason why);
|
virtual void ActorDestroy(ActorDestroyReason why);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user