Backout 3e4e600adc3b (bug 782542) for crashtest-ipc timeouts

This commit is contained in:
Ed Morley 2012-12-16 18:09:39 +00:00
parent fdac8eb518
commit f41c087da9
40 changed files with 167 additions and 445 deletions

View File

@ -112,10 +112,6 @@ function setUp() {
SpecialPowers.setBoolPref("dom.ipc.browser_frames.oop_by_default", true); SpecialPowers.setBoolPref("dom.ipc.browser_frames.oop_by_default", true);
SpecialPowers.addPermission("browser", true, window.document); SpecialPowers.addPermission("browser", true, window.document);
SpecialPowers.addPermission("embed-apps", true, window.document); SpecialPowers.addPermission("embed-apps", true, window.document);
// TODO: remove in bug 820712
SpecialPowers.setBoolPref("network.disable.ipc.security", true);
runNextTest(); runNextTest();
} }
@ -140,10 +136,6 @@ function makeKillTest(isApp) function testKill() {
function tearDown() { function tearDown() {
SpecialPowers.clearUserPref("dom.mozBrowserFramesEnabled"); SpecialPowers.clearUserPref("dom.mozBrowserFramesEnabled");
SpecialPowers.clearUserPref("dom.ipc.browser_frames.oop_by_default"); SpecialPowers.clearUserPref("dom.ipc.browser_frames.oop_by_default");
// TODO: remove in bug 820712
SpecialPowers.clearUserPref("network.disable.ipc.security");
SimpleTest.finish(); SimpleTest.finish();
} }

View File

@ -8,12 +8,22 @@
#include "nsIScriptSecurityManager.h" #include "nsIScriptSecurityManager.h"
#include "nsServiceManagerUtils.h" #include "nsServiceManagerUtils.h"
#include "nsContentUtils.h" #include "nsContentUtils.h"
#include "mozIApplication.h"
namespace mozilla { namespace mozilla {
NS_IMPL_ISUPPORTS1(LoadContext, nsILoadContext); NS_IMPL_ISUPPORTS1(LoadContext, nsILoadContext);
LoadContext::LoadContext(const IPC::SerializedLoadContext& aToCopy,
nsIDOMElement* aTopFrameElemenet)
: mIsNotNull(aToCopy.mIsNotNull)
, mIsContent(aToCopy.mIsContent)
, mUsePrivateBrowsing(aToCopy.mUsePrivateBrowsing)
, mIsInBrowserElement(aToCopy.mIsInBrowserElement)
, mAppId(aToCopy.mAppId)
, mTopFrameElement(do_GetWeakReference(aTopFrameElemenet))
{}
//----------------------------------------------------------------------------- //-----------------------------------------------------------------------------
// LoadContext::nsILoadContext // LoadContext::nsILoadContext
//----------------------------------------------------------------------------- //-----------------------------------------------------------------------------

View File

@ -10,9 +10,6 @@
#include "SerializedLoadContext.h" #include "SerializedLoadContext.h"
#include "mozilla/Attributes.h" #include "mozilla/Attributes.h"
#include "nsWeakReference.h" #include "nsWeakReference.h"
#include "nsIDOMElement.h"
class mozIApplication;
namespace mozilla { namespace mozilla {
@ -32,19 +29,17 @@ public:
NS_DECL_ISUPPORTS NS_DECL_ISUPPORTS
NS_DECL_NSILOADCONTEXT NS_DECL_NSILOADCONTEXT
// AppId/inBrowser arguments override those in SerializedLoadContext provided LoadContext(const IPC::SerializedLoadContext& aToCopy)
// by child process.
LoadContext(const IPC::SerializedLoadContext& aToCopy,
nsIDOMElement* aTopFrameElement,
uint32_t aAppId, bool aInBrowser)
: mIsNotNull(aToCopy.mIsNotNull) : mIsNotNull(aToCopy.mIsNotNull)
, mIsContent(aToCopy.mIsContent) , mIsContent(aToCopy.mIsContent)
, mUsePrivateBrowsing(aToCopy.mUsePrivateBrowsing) , mUsePrivateBrowsing(aToCopy.mUsePrivateBrowsing)
, mIsInBrowserElement(aInBrowser) , mIsInBrowserElement(aToCopy.mIsInBrowserElement)
, mAppId(aAppId) , mAppId(aToCopy.mAppId)
, mTopFrameElement(do_GetWeakReference(aTopFrameElement))
{} {}
LoadContext(const IPC::SerializedLoadContext& aToCopy,
nsIDOMElement* aTopFrameElemenet);
private: private:
bool mIsNotNull; bool mIsNotNull;
bool mIsContent; bool mIsContent;

View File

@ -65,14 +65,6 @@ const browserElementTestHelpers = {
return this._setBoolPref("dom.ipc.browser_frames.oop_by_default", value); return this._setBoolPref("dom.ipc.browser_frames.oop_by_default", value);
}, },
getIPCSecurityDisabledPref: function() {
return this._getBoolPref("network.disable.ipc.security");
},
setIPCSecurityDisabledPref: function(value) {
return this._setBoolPref("network.disable.ipc.security", value);
},
getPageThumbsEnabledPref: function() { getPageThumbsEnabledPref: function() {
return this._getBoolPref('browser.pageThumbs.enabled'); return this._getBoolPref('browser.pageThumbs.enabled');
}, },
@ -102,7 +94,6 @@ const browserElementTestHelpers = {
this.setOOPDisabledPref(this.origOOPDisabledPref); this.setOOPDisabledPref(this.origOOPDisabledPref);
this.setOOPByDefaultPref(this.origOOPByDefaultPref); this.setOOPByDefaultPref(this.origOOPByDefaultPref);
this.setPageThumbsEnabledPref(this.origPageThumbsEnabledPref); this.setPageThumbsEnabledPref(this.origPageThumbsEnabledPref);
this.setIPCSecurityDisabledPref(this.origIPCSecurityPref);
this.removeAllTempPermissions(); this.removeAllTempPermissions();
}, },
@ -110,7 +101,6 @@ const browserElementTestHelpers = {
'origOOPDisabledPref': null, 'origOOPDisabledPref': null,
'origOOPByDefaultPref': null, 'origOOPByDefaultPref': null,
'origPageThumbsEnabledPref': null, 'origPageThumbsEnabledPref': null,
'origIPCSecurityPref': null,
'tempPermissions': [], 'tempPermissions': [],
// Some basically-empty pages from different domains you can load. // Some basically-empty pages from different domains you can load.
@ -132,7 +122,6 @@ browserElementTestHelpers.origEnabledPref = browserElementTestHelpers.getEnabled
browserElementTestHelpers.origOOPDisabledPref = browserElementTestHelpers.getOOPDisabledPref(); browserElementTestHelpers.origOOPDisabledPref = browserElementTestHelpers.getOOPDisabledPref();
browserElementTestHelpers.origOOPByDefaultPref = browserElementTestHelpers.getOOPByDefaultPref(); browserElementTestHelpers.origOOPByDefaultPref = browserElementTestHelpers.getOOPByDefaultPref();
browserElementTestHelpers.origPageThumbsEnabledPref = browserElementTestHelpers.getPageThumbsEnabledPref(); browserElementTestHelpers.origPageThumbsEnabledPref = browserElementTestHelpers.getPageThumbsEnabledPref();
browserElementTestHelpers.origIPCSecurityPref = browserElementTestHelpers.getIPCSecurityDisabledPref();
// Disable tab view; it seriously messes us up. // Disable tab view; it seriously messes us up.
browserElementTestHelpers.setPageThumbsEnabledPref(false); browserElementTestHelpers.setPageThumbsEnabledPref(false);
@ -144,10 +133,6 @@ var oop = location.pathname.indexOf('_inproc_') == -1;
browserElementTestHelpers.setOOPByDefaultPref(oop); browserElementTestHelpers.setOOPByDefaultPref(oop);
browserElementTestHelpers.setOOPDisabledPref(false); browserElementTestHelpers.setOOPDisabledPref(false);
// Disable the networking security checks; our test harness just tests browser elements
// without sticking them in apps, and the security checks dislike that.
browserElementTestHelpers.setIPCSecurityDisabledPref(true);
addEventListener('unload', function() { addEventListener('unload', function() {
browserElementTestHelpers.restoreOriginalPrefs(); browserElementTestHelpers.restoreOriginalPrefs();
}); });

View File

@ -153,9 +153,6 @@
["device.storage.testing", true], ["device.storage.testing", true],
["device.storage.prompt.testing", true], ["device.storage.prompt.testing", true],
// TODO: remove this as part of bug 820712
["network.disable.ipc.security", true],
["dom.ipc.browser_frames.oop_by_default", true], ["dom.ipc.browser_frames.oop_by_default", true],
["dom.mozBrowserFramesEnabled", true], ["dom.mozBrowserFramesEnabled", true],
["browser.pageThumbs.enabled", false] ["browser.pageThumbs.enabled", false]

View File

@ -168,9 +168,6 @@
SpecialPowers.addPermission("browser", true, document); SpecialPowers.addPermission("browser", true, document);
SpecialPowers.pushPrefEnv({ SpecialPowers.pushPrefEnv({
"set": [ "set": [
// TODO: remove this as part of bug 820712
["network.disable.ipc.security", true],
["dom.ipc.browser_frames.oop_by_default", true], ["dom.ipc.browser_frames.oop_by_default", true],
["dom.mozBrowserFramesEnabled", true] ["dom.mozBrowserFramesEnabled", true]
] ]

View File

@ -159,10 +159,5 @@ if (!SpecialPowers.isMainProcess()) {
todo(false, "We should make this work on content process"); todo(false, "We should make this work on content process");
SimpleTest.finish(); SimpleTest.finish();
} else { } else {
// TODO: remove unsetting network.disable.ipc.security as part of bug 820712 startTest();
SpecialPowers.pushPrefEnv({
"set": [
["network.disable.ipc.security", true],
]
}, startTest);
} }

View File

@ -214,6 +214,8 @@ parent:
* URI of the manifest to fetch, the application cache group ID * URI of the manifest to fetch, the application cache group ID
* @param documentURI * @param documentURI
* URI of the document that referred the manifest * URI of the document that referred the manifest
* @param clientID
* The group cache version identifier to use
* @param stickDocument * @param stickDocument
* True if the update was initiated by a document load that referred * True if the update was initiated by a document load that referred
* a manifest. * a manifest.
@ -231,6 +233,7 @@ parent:
* has already been cached (stickDocument=false). * has already been cached (stickDocument=false).
*/ */
POfflineCacheUpdate(URIParams manifestURI, URIParams documentURI, POfflineCacheUpdate(URIParams manifestURI, URIParams documentURI,
bool isInBrowserElement, uint32_t appId,
bool stickDocument); bool stickDocument);
sync PIndexedDB(nsCString asciiOrigin) sync PIndexedDB(nsCString asciiOrigin)

View File

@ -1577,6 +1577,8 @@ TabChild::RecvActivateFrameEvent(const nsString& aType, const bool& capture)
POfflineCacheUpdateChild* POfflineCacheUpdateChild*
TabChild::AllocPOfflineCacheUpdate(const URIParams& manifestURI, TabChild::AllocPOfflineCacheUpdate(const URIParams& manifestURI,
const URIParams& documentURI, const URIParams& documentURI,
const bool& isInBrowserElement,
const uint32_t& appId,
const bool& stickDocument) const bool& stickDocument)
{ {
NS_RUNTIMEABORT("unused"); NS_RUNTIMEABORT("unused");

View File

@ -277,6 +277,8 @@ public:
virtual POfflineCacheUpdateChild* AllocPOfflineCacheUpdate( virtual POfflineCacheUpdateChild* AllocPOfflineCacheUpdate(
const URIParams& manifestURI, const URIParams& manifestURI,
const URIParams& documentURI, const URIParams& documentURI,
const bool& isInBrowserElement,
const uint32_t& appId,
const bool& stickDocument); const bool& stickDocument);
virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateChild* offlineCacheUpdate); virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateChild* offlineCacheUpdate);

View File

@ -1128,13 +1128,15 @@ TabParent::DeallocPRenderFrame(PRenderFrameParent* aFrame)
mozilla::docshell::POfflineCacheUpdateParent* mozilla::docshell::POfflineCacheUpdateParent*
TabParent::AllocPOfflineCacheUpdate(const URIParams& aManifestURI, TabParent::AllocPOfflineCacheUpdate(const URIParams& aManifestURI,
const URIParams& aDocumentURI, const URIParams& aDocumentURI,
const bool& isInBrowserElement,
const uint32_t& appId,
const bool& stickDocument) const bool& stickDocument)
{ {
nsRefPtr<mozilla::docshell::OfflineCacheUpdateParent> update = nsRefPtr<mozilla::docshell::OfflineCacheUpdateParent> update =
new mozilla::docshell::OfflineCacheUpdateParent(OwnOrContainingAppId(), new mozilla::docshell::OfflineCacheUpdateParent();
IsBrowserElement());
nsresult rv = update->Schedule(aManifestURI, aDocumentURI, stickDocument); nsresult rv = update->Schedule(aManifestURI, aDocumentURI,
isInBrowserElement, appId, stickDocument);
if (NS_FAILED(rv)) if (NS_FAILED(rv))
return nullptr; return nullptr;

View File

@ -191,6 +191,8 @@ public:
virtual POfflineCacheUpdateParent* AllocPOfflineCacheUpdate( virtual POfflineCacheUpdateParent* AllocPOfflineCacheUpdate(
const URIParams& aManifestURI, const URIParams& aManifestURI,
const URIParams& aDocumentURI, const URIParams& aDocumentURI,
const bool& isInBrowserElement,
const uint32_t& appId,
const bool& stickDocument); const bool& stickDocument);
virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateParent* actor); virtual bool DeallocPOfflineCacheUpdate(POfflineCacheUpdateParent* actor);

View File

@ -770,9 +770,6 @@ pref("security.fileuri.strict_origin_policy", true);
// the results // the results
pref("network.allow-experiments", true); pref("network.allow-experiments", true);
// Turn off interprocess security checks. Needed to run xpcshell tests.
pref("network.disable.ipc.security", false);
// Default action for unlisted external protocol handlers // Default action for unlisted external protocol handlers
pref("network.protocol-handler.external-default", true); // OK to load pref("network.protocol-handler.external-default", true); // OK to load
pref("network.protocol-handler.warn-external-default", true); // warn before load pref("network.protocol-handler.warn-external-default", true); // warn before load

View File

@ -4,14 +4,12 @@
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "mozilla/net/CookieServiceChild.h" #include "mozilla/net/CookieServiceChild.h"
#include "mozilla/dom/TabChild.h"
#include "mozilla/ipc/URIUtils.h" #include "mozilla/ipc/URIUtils.h"
#include "mozilla/net/NeckoChild.h" #include "mozilla/net/NeckoChild.h"
#include "nsIURI.h" #include "nsIURI.h"
#include "nsIPrefService.h" #include "nsIPrefService.h"
#include "nsIPrefBranch.h" #include "nsIPrefBranch.h"
#include "nsITabChild.h"
#include "nsNetUtil.h"
using namespace mozilla::ipc; using namespace mozilla::ipc;
@ -117,19 +115,10 @@ CookieServiceChild::GetCookieStringInternal(nsIURI *aHostURI,
URIParams uriParams; URIParams uriParams;
SerializeURI(aHostURI, uriParams); SerializeURI(aHostURI, uriParams);
nsCOMPtr<nsITabChild> iTabChild;
mozilla::dom::TabChild* tabChild = nullptr;
if (aChannel) {
NS_QueryNotificationCallbacks(aChannel, iTabChild);
if (iTabChild) {
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
}
}
// Synchronously call the parent. // Synchronously call the parent.
nsAutoCString result; nsAutoCString result;
SendGetCookieString(uriParams, !!isForeign, aFromHttp, SendGetCookieString(uriParams, !!isForeign, aFromHttp,
IPC::SerializedLoadContext(aChannel), tabChild, &result); IPC::SerializedLoadContext(aChannel), &result);
if (!result.IsEmpty()) if (!result.IsEmpty())
*aCookieString = ToNewCString(result); *aCookieString = ToNewCString(result);
@ -159,18 +148,9 @@ CookieServiceChild::SetCookieStringInternal(nsIURI *aHostURI,
URIParams uriParams; URIParams uriParams;
SerializeURI(aHostURI, uriParams); SerializeURI(aHostURI, uriParams);
nsCOMPtr<nsITabChild> iTabChild;
mozilla::dom::TabChild* tabChild = nullptr;
if (aChannel) {
NS_QueryNotificationCallbacks(aChannel, iTabChild);
if (iTabChild) {
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
}
}
// Synchronously call the parent. // Synchronously call the parent.
SendSetCookieString(uriParams, !!isForeign, cookieString, serverTime, SendSetCookieString(uriParams, !!isForeign, cookieString, serverTime,
aFromHttp, IPC::SerializedLoadContext(aChannel), tabChild); aFromHttp, IPC::SerializedLoadContext(aChannel));
return NS_OK; return NS_OK;
} }

View File

@ -4,44 +4,32 @@
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "mozilla/net/CookieServiceParent.h" #include "mozilla/net/CookieServiceParent.h"
#include "mozilla/dom/PBrowserParent.h"
#include "mozilla/net/NeckoParent.h"
#include "mozilla/ipc/URIUtils.h" #include "mozilla/ipc/URIUtils.h"
#include "nsCookieService.h" #include "nsCookieService.h"
#include "nsNetUtil.h" #include "nsNetUtil.h"
#include "nsPrintfCString.h"
using namespace mozilla::ipc; using namespace mozilla::ipc;
using mozilla::dom::PBrowserParent;
using mozilla::net::NeckoParent;
MOZ_WARN_UNUSED_RESULT static void
static bool GetAppInfoFromLoadContext(const IPC::SerializedLoadContext &aLoadContext,
GetAppInfoFromParams(const IPC::SerializedLoadContext &aLoadContext, uint32_t& aAppId,
PBrowserParent* aBrowser, bool& aIsInBrowserElement,
uint32_t& aAppId, bool& aIsPrivate)
bool& aIsInBrowserElement,
bool& aIsPrivate)
{ {
// TODO: bug 782542: what to do when we get null loadContext? For now assume
// NECKO_NO_APP_ID.
aAppId = NECKO_NO_APP_ID; aAppId = NECKO_NO_APP_ID;
aIsInBrowserElement = false; aIsInBrowserElement = false;
aIsPrivate = false; aIsPrivate = false;
const char* error = NeckoParent::GetValidatedAppInfo(aLoadContext, aBrowser, if (aLoadContext.IsNotNull()) {
&aAppId, aAppId = aLoadContext.mAppId;
&aIsInBrowserElement); aIsInBrowserElement = aLoadContext.mIsInBrowserElement;
if (error) {
NS_WARNING(nsPrintfCString("CookieServiceParent: GetAppInfoFromParams: "
"FATAL error: %s: KILLING CHILD PROCESS\n",
error).get());
return false;
} }
if (aLoadContext.IsPrivateBitValid()) if (aLoadContext.IsPrivateBitValid())
aIsPrivate = aLoadContext.mUsePrivateBrowsing; aIsPrivate = aLoadContext.mUsePrivateBrowsing;
return true;
} }
namespace mozilla { namespace mozilla {
@ -69,7 +57,6 @@ CookieServiceParent::RecvGetCookieString(const URIParams& aHost,
const bool& aFromHttp, const bool& aFromHttp,
const IPC::SerializedLoadContext& const IPC::SerializedLoadContext&
aLoadContext, aLoadContext,
PBrowserParent* aBrowser,
nsCString* aResult) nsCString* aResult)
{ {
if (!mCookieService) if (!mCookieService)
@ -83,15 +70,10 @@ CookieServiceParent::RecvGetCookieString(const URIParams& aHost,
uint32_t appId; uint32_t appId;
bool isInBrowserElement, isPrivate; bool isInBrowserElement, isPrivate;
bool valid = GetAppInfoFromParams(aLoadContext, aBrowser, appId, GetAppInfoFromLoadContext(aLoadContext, appId, isInBrowserElement, isPrivate);
isInBrowserElement, isPrivate);
if (!valid) {
return false;
}
mCookieService->GetCookieStringInternal(hostURI, aIsForeign, aFromHttp, appId, mCookieService->GetCookieStringInternal(hostURI, aIsForeign, aFromHttp, appId,
isInBrowserElement, isPrivate, isInBrowserElement, isPrivate, *aResult);
*aResult);
return true; return true;
} }
@ -102,8 +84,7 @@ CookieServiceParent::RecvSetCookieString(const URIParams& aHost,
const nsCString& aServerTime, const nsCString& aServerTime,
const bool& aFromHttp, const bool& aFromHttp,
const IPC::SerializedLoadContext& const IPC::SerializedLoadContext&
aLoadContext, aLoadContext)
PBrowserParent* aBrowser)
{ {
if (!mCookieService) if (!mCookieService)
return true; return true;
@ -116,11 +97,7 @@ CookieServiceParent::RecvSetCookieString(const URIParams& aHost,
uint32_t appId; uint32_t appId;
bool isInBrowserElement, isPrivate; bool isInBrowserElement, isPrivate;
bool valid = GetAppInfoFromParams(aLoadContext, aBrowser, appId, GetAppInfoFromLoadContext(aLoadContext, appId, isInBrowserElement, isPrivate);
isInBrowserElement, isPrivate);
if (!valid) {
return false;
}
nsDependentCString cookieString(aCookieString, 0); nsDependentCString cookieString(aCookieString, 0);
//TODO: bug 812475, pass a real channel object //TODO: bug 812475, pass a real channel object

View File

@ -13,9 +13,6 @@ class nsCookieService;
class nsIIOService; class nsIIOService;
namespace mozilla { namespace mozilla {
namespace dom {
class PBrowserParent;
}
namespace net { namespace net {
class CookieServiceParent : public PCookieServiceParent class CookieServiceParent : public PCookieServiceParent
@ -30,7 +27,6 @@ protected:
const bool& aFromHttp, const bool& aFromHttp,
const IPC::SerializedLoadContext& const IPC::SerializedLoadContext&
loadContext, loadContext,
mozilla::dom::PBrowserParent* aBrowser,
nsCString* aResult); nsCString* aResult);
virtual bool RecvSetCookieString(const URIParams& aHost, virtual bool RecvSetCookieString(const URIParams& aHost,
@ -39,8 +35,7 @@ protected:
const nsCString& aServerTime, const nsCString& aServerTime,
const bool& aFromHttp, const bool& aFromHttp,
const IPC::SerializedLoadContext& const IPC::SerializedLoadContext&
loadContext, loadContext);
mozilla::dom::PBrowserParent* aBrowser);
nsRefPtr<nsCookieService> mCookieService; nsRefPtr<nsCookieService> mCookieService;
}; };

View File

@ -6,7 +6,6 @@
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
include protocol PNecko; include protocol PNecko;
include protocol PBrowser;
include URIParams; include URIParams;
include "SerializedLoadContext.h"; include "SerializedLoadContext.h";
@ -65,8 +64,7 @@ parent:
sync GetCookieString(URIParams host, sync GetCookieString(URIParams host,
bool isForeign, bool isForeign,
bool fromHttp, bool fromHttp,
SerializedLoadContext loadContext, SerializedLoadContext loadContext)
nullable PBrowser browser)
returns (nsCString result); returns (nsCString result);
/* /*
@ -103,8 +101,7 @@ parent:
nsCString cookieString, nsCString cookieString,
nsCString serverTime, nsCString serverTime,
bool fromHttp, bool fromHttp,
SerializedLoadContext loadContext, SerializedLoadContext loadContext);
nullable PBrowser browser);
__delete__(); __delete__();
}; };

View File

@ -14,22 +14,17 @@
#include "mozilla/net/FTPChannelChild.h" #include "mozilla/net/FTPChannelChild.h"
#include "mozilla/net/WebSocketChannelChild.h" #include "mozilla/net/WebSocketChannelChild.h"
#include "mozilla/dom/network/TCPSocketChild.h" #include "mozilla/dom/network/TCPSocketChild.h"
#include "mozilla/Preferences.h"
using mozilla::dom::TCPSocketChild; using mozilla::dom::TCPSocketChild;
namespace mozilla { namespace mozilla {
namespace net { namespace net {
static bool gDisableIPCSecurity = false;
static const char kPrefDisableIPCSecurity[] = "network.disable.ipc.security";
PNeckoChild *gNeckoChild = nullptr; PNeckoChild *gNeckoChild = nullptr;
// C++ file contents // C++ file contents
NeckoChild::NeckoChild() NeckoChild::NeckoChild()
{ {
Preferences::AddBoolVarCache(&gDisableIPCSecurity, kPrefDisableIPCSecurity);
} }
NeckoChild::~NeckoChild() NeckoChild::~NeckoChild()
@ -85,8 +80,7 @@ NeckoChild::DeallocPHttpChannel(PHttpChannelChild* channel)
} }
PFTPChannelChild* PFTPChannelChild*
NeckoChild::AllocPFTPChannel(PBrowserChild* aBrowser, NeckoChild::AllocPFTPChannel()
const SerializedLoadContext& aSerialized)
{ {
// We don't allocate here: see FTPChannelChild::AsyncOpen() // We don't allocate here: see FTPChannelChild::AsyncOpen()
NS_RUNTIMEABORT("AllocPFTPChannel should not be called"); NS_RUNTIMEABORT("AllocPFTPChannel should not be called");
@ -140,8 +134,7 @@ NeckoChild::DeallocPWyciwygChannel(PWyciwygChannelChild* channel)
} }
PWebSocketChild* PWebSocketChild*
NeckoChild::AllocPWebSocket(PBrowserChild* browser, NeckoChild::AllocPWebSocket(PBrowserChild* browser)
const SerializedLoadContext& aSerialized)
{ {
NS_NOTREACHED("AllocPWebSocket should not be called"); NS_NOTREACHED("AllocPWebSocket should not be called");
return nullptr; return nullptr;

View File

@ -33,10 +33,9 @@ protected:
virtual bool DeallocPCookieService(PCookieServiceChild*); virtual bool DeallocPCookieService(PCookieServiceChild*);
virtual PWyciwygChannelChild* AllocPWyciwygChannel(); virtual PWyciwygChannelChild* AllocPWyciwygChannel();
virtual bool DeallocPWyciwygChannel(PWyciwygChannelChild*); virtual bool DeallocPWyciwygChannel(PWyciwygChannelChild*);
virtual PFTPChannelChild* AllocPFTPChannel(PBrowserChild* aBrowser, virtual PFTPChannelChild* AllocPFTPChannel();
const SerializedLoadContext& aSerialized);
virtual bool DeallocPFTPChannel(PFTPChannelChild*); virtual bool DeallocPFTPChannel(PFTPChannelChild*);
virtual PWebSocketChild* AllocPWebSocket(PBrowserChild*, const SerializedLoadContext&); virtual PWebSocketChild* AllocPWebSocket(PBrowserChild*);
virtual bool DeallocPWebSocket(PWebSocketChild*); virtual bool DeallocPWebSocket(PWebSocketChild*);
virtual PTCPSocketChild* AllocPTCPSocket(const nsString& aHost, virtual PTCPSocketChild* AllocPTCPSocket(const nsString& aHost,
const uint16_t& aPort, const uint16_t& aPort,

View File

@ -14,142 +14,30 @@
#include "mozilla/net/WebSocketChannelParent.h" #include "mozilla/net/WebSocketChannelParent.h"
#include "mozilla/dom/TabParent.h" #include "mozilla/dom/TabParent.h"
#include "mozilla/dom/network/TCPSocketParent.h" #include "mozilla/dom/network/TCPSocketParent.h"
#include "mozilla/Preferences.h"
#include "mozilla/LoadContext.h"
#include "nsPrintfCString.h"
#include "nsHTMLDNSPrefetch.h" #include "nsHTMLDNSPrefetch.h"
using mozilla::dom::TabParent; using mozilla::dom::TabParent;
using mozilla::net::PTCPSocketParent; using mozilla::net::PTCPSocketParent;
using mozilla::dom::TCPSocketParent; using mozilla::dom::TCPSocketParent;
using IPC::SerializedLoadContext;
namespace mozilla { namespace mozilla {
namespace net { namespace net {
static bool gDisableIPCSecurity = false;
static const char kPrefDisableIPCSecurity[] = "network.disable.ipc.security";
// C++ file contents // C++ file contents
NeckoParent::NeckoParent() NeckoParent::NeckoParent()
{ {
Preferences::AddBoolVarCache(&gDisableIPCSecurity, kPrefDisableIPCSecurity);
} }
NeckoParent::~NeckoParent() NeckoParent::~NeckoParent()
{ {
} }
static PBOverrideStatus
PBOverrideStatusFromLoadContext(const SerializedLoadContext& aSerialized)
{
if (!aSerialized.IsNotNull() && aSerialized.IsPrivateBitValid()) {
return aSerialized.mUsePrivateBrowsing ?
kPBOverride_Private :
kPBOverride_NotPrivate;
}
return kPBOverride_Unset;
}
const char*
NeckoParent::GetValidatedAppInfo(const SerializedLoadContext& aSerialized,
PBrowserParent* aBrowser,
uint32_t* aAppId,
bool* aInBrowserElement)
{
if (!gDisableIPCSecurity) {
if (!aBrowser) {
return "missing required PBrowser argument";
}
if (!aSerialized.IsNotNull()) {
return "SerializedLoadContext from child is null";
}
}
*aAppId = NECKO_UNKNOWN_APP_ID;
*aInBrowserElement = false;
if (aBrowser) {
nsRefPtr<TabParent> tabParent = static_cast<TabParent*>(aBrowser);
*aAppId = tabParent->OwnOrContainingAppId();
*aInBrowserElement = tabParent->IsBrowserElement();
if (*aAppId == NECKO_UNKNOWN_APP_ID) {
return "TabParent reports appId=NECKO_UNKNOWN_APP_ID!";
}
// We may get appID=NO_APP if child frame is neither a browser nor an app
if (*aAppId == NECKO_NO_APP_ID) {
if (tabParent->HasOwnApp()) {
return "TabParent reports NECKO_NO_APP_ID but also is an app";
}
if (!gDisableIPCSecurity && tabParent->IsBrowserElement()) {
// <iframe mozbrowser> which doesn't have an <iframe mozapp> above it.
// This is not supported now, and we'll need to do a code audit to make
// sure we can handle it (i.e don't short-circuit using separate
// namespace if just appID==0)
return "TabParent reports appId=NECKO_NO_APP_ID but is a mozbrowser";
}
}
} else {
// Only trust appId/inBrowser from child-side loadcontext if we're in
// testing mode: allows xpcshell tests to masquerade as apps
MOZ_ASSERT(gDisableIPCSecurity);
if (!gDisableIPCSecurity) {
return "internal error";
}
if (aSerialized.IsNotNull()) {
*aAppId = aSerialized.mAppId;
*aInBrowserElement = aSerialized.mIsInBrowserElement;
} else {
*aAppId = NECKO_NO_APP_ID;
}
}
return nullptr;
}
const char *
NeckoParent::CreateChannelLoadContext(PBrowserParent* aBrowser,
const SerializedLoadContext& aSerialized,
nsCOMPtr<nsILoadContext> &aResult)
{
uint32_t appId = NECKO_UNKNOWN_APP_ID;
bool inBrowser = false;
nsIDOMElement* topFrameElement = nullptr;
const char* error = GetValidatedAppInfo(aSerialized, aBrowser, &appId, &inBrowser);
if (error) {
return error;
}
if (aBrowser) {
nsRefPtr<TabParent> tabParent = static_cast<TabParent*>(aBrowser);
topFrameElement = tabParent->GetOwnerElement();
}
// if gDisableIPCSecurity, we may not have a LoadContext to set. This is
// the common case for most xpcshell tests.
if (aSerialized.IsNotNull()) {
aResult = new LoadContext(aSerialized, topFrameElement, appId, inBrowser);
}
return nullptr;
}
PHttpChannelParent* PHttpChannelParent*
NeckoParent::AllocPHttpChannel(PBrowserParent* aBrowser, NeckoParent::AllocPHttpChannel(PBrowserParent* browser,
const SerializedLoadContext& aSerialized) const SerializedLoadContext& loadContext)
{ {
nsCOMPtr<nsILoadContext> loadContext; HttpChannelParent *p = new HttpChannelParent(browser, loadContext);
const char *error = CreateChannelLoadContext(aBrowser, aSerialized,
loadContext);
if (error) {
NS_WARNING(nsPrintfCString("NeckoParent::AllocPHttpChannel: "
"FATAL error: %s: KILLING CHILD PROCESS\n",
error).get());
return nullptr;
}
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(aSerialized);
HttpChannelParent *p = new HttpChannelParent(aBrowser, loadContext, overrideStatus);
p->AddRef(); p->AddRef();
return p; return p;
} }
@ -163,20 +51,9 @@ NeckoParent::DeallocPHttpChannel(PHttpChannelParent* channel)
} }
PFTPChannelParent* PFTPChannelParent*
NeckoParent::AllocPFTPChannel(PBrowserParent* aBrowser, NeckoParent::AllocPFTPChannel()
const SerializedLoadContext& aSerialized)
{ {
nsCOMPtr<nsILoadContext> loadContext; FTPChannelParent *p = new FTPChannelParent();
const char *error = CreateChannelLoadContext(aBrowser, aSerialized,
loadContext);
if (error) {
NS_WARNING(nsPrintfCString("NeckoParent::AllocPFTPChannel: "
"FATAL error: %s: KILLING CHILD PROCESS\n",
error).get());
return nullptr;
}
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(aSerialized);
FTPChannelParent *p = new FTPChannelParent(loadContext, overrideStatus);
p->AddRef(); p->AddRef();
return p; return p;
} }
@ -219,23 +96,10 @@ NeckoParent::DeallocPWyciwygChannel(PWyciwygChannelParent* channel)
} }
PWebSocketParent* PWebSocketParent*
NeckoParent::AllocPWebSocket(PBrowserParent* browser, NeckoParent::AllocPWebSocket(PBrowserParent* browser)
const SerializedLoadContext& serialized)
{ {
nsCOMPtr<nsILoadContext> loadContext;
const char *error = CreateChannelLoadContext(browser, serialized,
loadContext);
if (error) {
NS_WARNING(nsPrintfCString("NeckoParent::AllocPWebSocket: "
"FATAL error: %s: KILLING CHILD PROCESS\n",
error).get());
return nullptr;
}
TabParent* tabParent = static_cast<TabParent*>(browser); TabParent* tabParent = static_cast<TabParent*>(browser);
PBOverrideStatus overrideStatus = PBOverrideStatusFromLoadContext(serialized); WebSocketChannelParent* p = new WebSocketChannelParent(tabParent);
WebSocketChannelParent* p = new WebSocketChannelParent(tabParent, loadContext,
overrideStatus);
p->AddRef(); p->AddRef();
return p; return p;
} }

View File

@ -14,13 +14,6 @@
namespace mozilla { namespace mozilla {
namespace net { namespace net {
// Used to override channel Private Browsing status if needed.
enum PBOverrideStatus {
kPBOverride_Unset = 0,
kPBOverride_Private,
kPBOverride_NotPrivate
};
// Header file contents // Header file contents
class NeckoParent : class NeckoParent :
public PNeckoParent public PNeckoParent
@ -29,27 +22,6 @@ public:
NeckoParent(); NeckoParent();
virtual ~NeckoParent(); virtual ~NeckoParent();
MOZ_WARN_UNUSED_RESULT
static const char *
GetValidatedAppInfo(const SerializedLoadContext& aSerialized,
PBrowserParent* aBrowser,
uint32_t* aAppId,
bool* aInBrowserElement);
/*
* Creates LoadContext for parent-side of an e10s channel.
*
* Values from PBrowserParent are more secure, and override those set in
* SerializedLoadContext.
*
* Returns null if successful, or an error string if failed.
*/
MOZ_WARN_UNUSED_RESULT
static const char*
CreateChannelLoadContext(PBrowserParent* aBrowser,
const SerializedLoadContext& aSerialized,
nsCOMPtr<nsILoadContext> &aResult);
protected: protected:
virtual PHttpChannelParent* AllocPHttpChannel(PBrowserParent*, virtual PHttpChannelParent* AllocPHttpChannel(PBrowserParent*,
const SerializedLoadContext&); const SerializedLoadContext&);
@ -58,11 +30,9 @@ protected:
virtual bool DeallocPCookieService(PCookieServiceParent*); virtual bool DeallocPCookieService(PCookieServiceParent*);
virtual PWyciwygChannelParent* AllocPWyciwygChannel(); virtual PWyciwygChannelParent* AllocPWyciwygChannel();
virtual bool DeallocPWyciwygChannel(PWyciwygChannelParent*); virtual bool DeallocPWyciwygChannel(PWyciwygChannelParent*);
virtual PFTPChannelParent* AllocPFTPChannel(PBrowserParent* aBrowser, virtual PFTPChannelParent* AllocPFTPChannel();
const SerializedLoadContext& aSerialized);
virtual bool DeallocPFTPChannel(PFTPChannelParent*); virtual bool DeallocPFTPChannel(PFTPChannelParent*);
virtual PWebSocketParent* AllocPWebSocket(PBrowserParent* browser, virtual PWebSocketParent* AllocPWebSocket(PBrowserParent* browser);
const SerializedLoadContext& aSerialized);
virtual bool DeallocPWebSocket(PWebSocketParent*); virtual bool DeallocPWebSocket(PWebSocketParent*);
virtual PTCPSocketParent* AllocPTCPSocket(const nsString& aHost, virtual PTCPSocketParent* AllocPTCPSocket(const nsString& aHost,
const uint16_t& aPort, const uint16_t& aPort,
@ -81,6 +51,7 @@ protected:
virtual bool RecvCancelHTMLDNSPrefetch(const nsString& hostname, virtual bool RecvCancelHTMLDNSPrefetch(const nsString& hostname,
const uint16_t& flags, const uint16_t& flags,
const nsresult& reason); const nsresult& reason);
}; };
} // namespace net } // namespace net

View File

@ -40,8 +40,8 @@ parent:
PHttpChannel(nullable PBrowser browser, PHttpChannel(nullable PBrowser browser,
SerializedLoadContext loadContext); SerializedLoadContext loadContext);
PWyciwygChannel(); PWyciwygChannel();
PFTPChannel(PBrowser browser, SerializedLoadContext loadContext); PFTPChannel();
PWebSocket(PBrowser browser, SerializedLoadContext loadContext); PWebSocket(PBrowser browser);
PTCPSocket(nsString host, uint16_t port, bool useSSL, nsString binaryType, PTCPSocket(nsString host, uint16_t port, bool useSSL, nsString binaryType,
nullable PBrowser browser); nullable PBrowser browser);

View File

@ -7,9 +7,8 @@
#include "mozilla/net/NeckoChild.h" #include "mozilla/net/NeckoChild.h"
#include "mozilla/net/FTPChannelChild.h" #include "mozilla/net/FTPChannelChild.h"
#include "mozilla/dom/TabChild.h"
#include "nsFtpProtocolHandler.h" #include "nsFtpProtocolHandler.h"
#include "nsITabChild.h"
#include "nsStringStream.h" #include "nsStringStream.h"
#include "nsMimeTypes.h" #include "nsMimeTypes.h"
#include "nsNetUtil.h" #include "nsNetUtil.h"
@ -156,18 +155,8 @@ FTPChannelChild::AsyncOpen(::nsIStreamListener* listener, nsISupports* aContext)
if (NS_FAILED(rv)) if (NS_FAILED(rv))
return rv; return rv;
mozilla::dom::TabChild* tabChild = nullptr;
nsCOMPtr<nsITabChild> iTabChild;
NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup,
NS_GET_IID(nsITabChild),
getter_AddRefs(iTabChild));
GetCallback(iTabChild);
if (iTabChild) {
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
}
// FIXME: like bug 558623, merge constructor+SendAsyncOpen into 1 IPC msg // FIXME: like bug 558623, merge constructor+SendAsyncOpen into 1 IPC msg
gNeckoChild->SendPFTPChannelConstructor(this, tabChild, IPC::SerializedLoadContext(this)); gNeckoChild->SendPFTPChannelConstructor(this);
mListener = listener; mListener = listener;
mListenerContext = aContext; mListenerContext = aContext;
@ -181,7 +170,8 @@ FTPChannelChild::AsyncOpen(::nsIStreamListener* listener, nsISupports* aContext)
OptionalInputStreamParams uploadStream; OptionalInputStreamParams uploadStream;
SerializeInputStream(mUploadStream, uploadStream); SerializeInputStream(mUploadStream, uploadStream);
SendAsyncOpen(uri, mStartPos, mEntityID, uploadStream); SendAsyncOpen(uri, mStartPos, mEntityID, uploadStream,
IPC::SerializedLoadContext(this));
// The socket transport layer in the chrome process now has a logical ref to // The socket transport layer in the chrome process now has a logical ref to
// us until OnStopRequest is called. // us until OnStopRequest is called.
@ -519,22 +509,11 @@ FTPChannelChild::Resume()
NS_IMETHODIMP NS_IMETHODIMP
FTPChannelChild::ConnectParent(uint32_t id) FTPChannelChild::ConnectParent(uint32_t id)
{ {
mozilla::dom::TabChild* tabChild = nullptr;
nsCOMPtr<nsITabChild> iTabChild;
NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup,
NS_GET_IID(nsITabChild),
getter_AddRefs(iTabChild));
GetCallback(iTabChild);
if (iTabChild) {
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
}
// The socket transport in the chrome process now holds a logical ref to us // The socket transport in the chrome process now holds a logical ref to us
// until OnStopRequest, or we do a redirect, or we hit an IPDL error. // until OnStopRequest, or we do a redirect, or we hit an IPDL error.
AddIPDLReference(); AddIPDLReference();
if (!gNeckoChild->SendPFTPChannelConstructor(this, tabChild, if (!gNeckoChild->SendPFTPChannelConstructor(this))
IPC::SerializedLoadContext(this)))
return NS_ERROR_FAILURE; return NS_ERROR_FAILURE;
if (!SendConnectChannel(id)) if (!SendConnectChannel(id))

View File

@ -23,10 +23,8 @@ using namespace mozilla::ipc;
namespace mozilla { namespace mozilla {
namespace net { namespace net {
FTPChannelParent::FTPChannelParent(nsILoadContext* aLoadContext, PBOverrideStatus aOverrideStatus) FTPChannelParent::FTPChannelParent()
: mIPCClosed(false) : mIPCClosed(false)
, mLoadContext(aLoadContext)
, mPBOverride(aOverrideStatus)
{ {
nsIProtocolHandler* handler; nsIProtocolHandler* handler;
CallGetService(NS_NETWORK_PROTOCOL_CONTRACTID_PREFIX "ftp", &handler); CallGetService(NS_NETWORK_PROTOCOL_CONTRACTID_PREFIX "ftp", &handler);
@ -64,7 +62,8 @@ bool
FTPChannelParent::RecvAsyncOpen(const URIParams& aURI, FTPChannelParent::RecvAsyncOpen(const URIParams& aURI,
const uint64_t& aStartPos, const uint64_t& aStartPos,
const nsCString& aEntityID, const nsCString& aEntityID,
const OptionalInputStreamParams& aUploadStream) const OptionalInputStreamParams& aUploadStream,
const IPC::SerializedLoadContext& loadContext)
{ {
nsCOMPtr<nsIURI> uri = DeserializeURI(aURI); nsCOMPtr<nsIURI> uri = DeserializeURI(aURI);
if (!uri) if (!uri)
@ -88,11 +87,7 @@ FTPChannelParent::RecvAsyncOpen(const URIParams& aURI,
return SendFailedAsyncOpen(rv); return SendFailedAsyncOpen(rv);
mChannel = static_cast<nsFtpChannel*>(chan.get()); mChannel = static_cast<nsFtpChannel*>(chan.get());
if (mPBOverride != kPBOverride_Unset) {
mChannel->SetPrivate(mPBOverride == kPBOverride_Private ? true : false);
}
nsCOMPtr<nsIInputStream> upload = DeserializeInputStream(aUploadStream); nsCOMPtr<nsIInputStream> upload = DeserializeInputStream(aUploadStream);
if (upload) { if (upload) {
// contentType and contentLength are ignored // contentType and contentLength are ignored
@ -105,6 +100,14 @@ FTPChannelParent::RecvAsyncOpen(const URIParams& aURI,
if (NS_FAILED(rv)) if (NS_FAILED(rv))
return SendFailedAsyncOpen(rv); return SendFailedAsyncOpen(rv);
if (loadContext.IsNotNull())
mLoadContext = new LoadContext(loadContext);
else if (loadContext.IsPrivateBitValid()) {
nsCOMPtr<nsIPrivateBrowsingChannel> pbChannel = do_QueryInterface(chan);
if (pbChannel)
pbChannel->SetPrivate(loadContext.mUsePrivateBrowsing);
}
rv = mChannel->AsyncOpen(this, nullptr); rv = mChannel->AsyncOpen(this, nullptr);
if (NS_FAILED(rv)) if (NS_FAILED(rv))
return SendFailedAsyncOpen(rv); return SendFailedAsyncOpen(rv);

View File

@ -10,7 +10,6 @@
#include "mozilla/net/PFTPChannelParent.h" #include "mozilla/net/PFTPChannelParent.h"
#include "mozilla/net/NeckoCommon.h" #include "mozilla/net/NeckoCommon.h"
#include "mozilla/net/NeckoParent.h"
#include "nsIParentChannel.h" #include "nsIParentChannel.h"
#include "nsIInterfaceRequestor.h" #include "nsIInterfaceRequestor.h"
#include "nsILoadContext.h" #include "nsILoadContext.h"
@ -31,14 +30,15 @@ public:
NS_DECL_NSIPARENTCHANNEL NS_DECL_NSIPARENTCHANNEL
NS_DECL_NSIINTERFACEREQUESTOR NS_DECL_NSIINTERFACEREQUESTOR
FTPChannelParent(nsILoadContext* aLoadContext, PBOverrideStatus aOverrideStatus); FTPChannelParent();
virtual ~FTPChannelParent(); virtual ~FTPChannelParent();
protected: protected:
virtual bool RecvAsyncOpen(const URIParams& uri, virtual bool RecvAsyncOpen(const URIParams& uri,
const uint64_t& startPos, const uint64_t& startPos,
const nsCString& entityID, const nsCString& entityID,
const OptionalInputStreamParams& uploadStream) MOZ_OVERRIDE; const OptionalInputStreamParams& uploadStream,
const IPC::SerializedLoadContext& loadContext) MOZ_OVERRIDE;
virtual bool RecvConnectChannel(const uint32_t& channelId) MOZ_OVERRIDE; virtual bool RecvConnectChannel(const uint32_t& channelId) MOZ_OVERRIDE;
virtual bool RecvCancel(const nsresult& status) MOZ_OVERRIDE; virtual bool RecvCancel(const nsresult& status) MOZ_OVERRIDE;
virtual bool RecvSuspend() MOZ_OVERRIDE; virtual bool RecvSuspend() MOZ_OVERRIDE;
@ -51,8 +51,6 @@ protected:
bool mIPCClosed; bool mIPCClosed;
nsCOMPtr<nsILoadContext> mLoadContext; nsCOMPtr<nsILoadContext> mLoadContext;
PBOverrideStatus mPBOverride;
}; };
} // namespace net } // namespace net

View File

@ -13,6 +13,7 @@ include protocol PBlob; //FIXME: bug #792908
include "SerializedLoadContext.h"; include "SerializedLoadContext.h";
using IPC::SerializedLoadContext;
using PRTime; using PRTime;
namespace mozilla { namespace mozilla {
@ -28,7 +29,8 @@ parent:
AsyncOpen(URIParams uri, AsyncOpen(URIParams uri,
uint64_t startPos, uint64_t startPos,
nsCString entityID, nsCString entityID,
OptionalInputStreamParams uploadStream); OptionalInputStreamParams uploadStream,
SerializedLoadContext loadContext);
ConnectChannel(uint32_t channelId); ConnectChannel(uint32_t channelId);
Cancel(nsresult status); Cancel(nsresult status);

View File

@ -34,8 +34,7 @@ namespace mozilla {
namespace net { namespace net {
HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding, HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding,
nsILoadContext* aLoadContext, const IPC::SerializedLoadContext& loadContext)
PBOverrideStatus aOverrideStatus)
: mIPCClosed(false) : mIPCClosed(false)
, mStoredStatus(NS_OK) , mStoredStatus(NS_OK)
, mStoredProgress(0) , mStoredProgress(0)
@ -43,8 +42,7 @@ HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding,
, mSentRedirect1Begin(false) , mSentRedirect1Begin(false)
, mSentRedirect1BeginFailed(false) , mSentRedirect1BeginFailed(false)
, mReceivedRedirect2Verify(false) , mReceivedRedirect2Verify(false)
, mPBOverride(aOverrideStatus) , mPBOverride(kPBOverride_Unset)
, mLoadContext(aLoadContext)
{ {
// Ensure gHttpHandler is initialized: we need the atom table up and running. // Ensure gHttpHandler is initialized: we need the atom table up and running.
nsIHttpProtocolHandler* handler; nsIHttpProtocolHandler* handler;
@ -52,6 +50,18 @@ HttpChannelParent::HttpChannelParent(PBrowserParent* iframeEmbedding,
NS_ASSERTION(handler, "no http handler"); NS_ASSERTION(handler, "no http handler");
mTabParent = static_cast<mozilla::dom::TabParent*>(iframeEmbedding); mTabParent = static_cast<mozilla::dom::TabParent*>(iframeEmbedding);
if (loadContext.IsNotNull()) {
if (mTabParent) {
mLoadContext = new LoadContext(loadContext, mTabParent->GetOwnerElement());
} else {
mLoadContext = new LoadContext(loadContext);
}
} else if (loadContext.IsPrivateBitValid()) {
// Don't have channel yet: override PB status after we create it.
mPBOverride = loadContext.mUsePrivateBrowsing ? kPBOverride_Private
: kPBOverride_NotPrivate;
}
} }
HttpChannelParent::~HttpChannelParent() HttpChannelParent::~HttpChannelParent()

View File

@ -12,7 +12,6 @@
#include "mozilla/dom/PBrowserParent.h" #include "mozilla/dom/PBrowserParent.h"
#include "mozilla/net/PHttpChannelParent.h" #include "mozilla/net/PHttpChannelParent.h"
#include "mozilla/net/NeckoCommon.h" #include "mozilla/net/NeckoCommon.h"
#include "mozilla/net/NeckoParent.h"
#include "nsIParentRedirectingChannel.h" #include "nsIParentRedirectingChannel.h"
#include "nsIProgressEventSink.h" #include "nsIProgressEventSink.h"
#include "nsHttpChannel.h" #include "nsHttpChannel.h"
@ -45,8 +44,7 @@ public:
NS_DECL_NSIINTERFACEREQUESTOR NS_DECL_NSIINTERFACEREQUESTOR
HttpChannelParent(mozilla::dom::PBrowserParent* iframeEmbedding, HttpChannelParent(mozilla::dom::PBrowserParent* iframeEmbedding,
nsILoadContext* aLoadContext, const IPC::SerializedLoadContext& loadContext);
PBOverrideStatus aStatus);
virtual ~HttpChannelParent(); virtual ~HttpChannelParent();
protected: protected:
@ -110,6 +108,12 @@ private:
bool mSentRedirect1BeginFailed : 1; bool mSentRedirect1BeginFailed : 1;
bool mReceivedRedirect2Verify : 1; bool mReceivedRedirect2Verify : 1;
// Used to override channel Private Browsing status if needed.
enum PBOverrideStatus {
kPBOverride_Unset = 0,
kPBOverride_Private,
kPBOverride_NotPrivate
};
PBOverrideStatus mPBOverride; PBOverrideStatus mPBOverride;
nsCOMPtr<nsILoadContext> mLoadContext; nsCOMPtr<nsILoadContext> mLoadContext;

View File

@ -27,7 +27,8 @@ parent:
AsyncOpen(URIParams aURI, AsyncOpen(URIParams aURI,
nsCString aOrigin, nsCString aOrigin,
nsCString aProtocol, nsCString aProtocol,
bool aSecure); bool aSecure,
SerializedLoadContext loadContext);
Close(uint16_t code, nsCString reason); Close(uint16_t code, nsCString reason);
SendMsg(nsCString aMsg); SendMsg(nsCString aMsg);
SendBinaryMsg(nsCString aMsg); SendBinaryMsg(nsCString aMsg);

View File

@ -338,9 +338,9 @@ WebSocketChannelChild::AsyncOpen(nsIURI *aURI,
// Corresponding release in DeallocPWebSocket // Corresponding release in DeallocPWebSocket
AddIPDLReference(); AddIPDLReference();
gNeckoChild->SendPWebSocketConstructor(this, tabChild, gNeckoChild->SendPWebSocketConstructor(this, tabChild);
IPC::SerializedLoadContext(this)); if (!SendAsyncOpen(uri, nsCString(aOrigin), mProtocol, mEncrypted,
if (!SendAsyncOpen(uri, nsCString(aOrigin), mProtocol, mEncrypted)) IPC::SerializedLoadContext(this)))
return NS_ERROR_UNEXPECTED; return NS_ERROR_UNEXPECTED;
mOriginalURI = aURI; mOriginalURI = aURI;

View File

@ -7,6 +7,7 @@
#include "WebSocketLog.h" #include "WebSocketLog.h"
#include "WebSocketChannelParent.h" #include "WebSocketChannelParent.h"
#include "nsIAuthPromptProvider.h" #include "nsIAuthPromptProvider.h"
#include "mozilla/LoadContext.h"
#include "mozilla/ipc/InputStreamUtils.h" #include "mozilla/ipc/InputStreamUtils.h"
#include "mozilla/ipc/URIUtils.h" #include "mozilla/ipc/URIUtils.h"
@ -19,15 +20,10 @@ NS_IMPL_THREADSAFE_ISUPPORTS2(WebSocketChannelParent,
nsIWebSocketListener, nsIWebSocketListener,
nsIInterfaceRequestor) nsIInterfaceRequestor)
WebSocketChannelParent::WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider, WebSocketChannelParent::WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider)
nsILoadContext* aLoadContext,
PBOverrideStatus aOverrideStatus)
: mAuthProvider(aAuthProvider) : mAuthProvider(aAuthProvider)
, mLoadContext(aLoadContext)
, mIPCOpen(true) , mIPCOpen(true)
{ {
// Websocket channels can't have a private browsing override
MOZ_ASSERT_IF(!aLoadContext, aOverrideStatus == kPBOverride_Unset);
#if defined(PR_LOGGING) #if defined(PR_LOGGING)
if (!webSocketLog) if (!webSocketLog)
webSocketLog = PR_NewLogModule("nsWebSocket"); webSocketLog = PR_NewLogModule("nsWebSocket");
@ -51,7 +47,8 @@ bool
WebSocketChannelParent::RecvAsyncOpen(const URIParams& aURI, WebSocketChannelParent::RecvAsyncOpen(const URIParams& aURI,
const nsCString& aOrigin, const nsCString& aOrigin,
const nsCString& aProtocol, const nsCString& aProtocol,
const bool& aSecure) const bool& aSecure,
const IPC::SerializedLoadContext& loadContext)
{ {
LOG(("WebSocketChannelParent::RecvAsyncOpen() %p\n", this)); LOG(("WebSocketChannelParent::RecvAsyncOpen() %p\n", this));
@ -68,6 +65,14 @@ WebSocketChannelParent::RecvAsyncOpen(const URIParams& aURI,
if (NS_FAILED(rv)) if (NS_FAILED(rv))
goto fail; goto fail;
if (loadContext.IsNotNull())
mLoadContext = new LoadContext(loadContext);
#ifdef DEBUG
else
// websocket channels cannot have a private bit override
MOZ_ASSERT(!loadContext.IsPrivateBitValid());
#endif
rv = mChannel->SetNotificationCallbacks(this); rv = mChannel->SetNotificationCallbacks(this);
if (NS_FAILED(rv)) if (NS_FAILED(rv))
goto fail; goto fail;

View File

@ -8,7 +8,6 @@
#define mozilla_net_WebSocketChannelParent_h #define mozilla_net_WebSocketChannelParent_h
#include "mozilla/net/PWebSocketParent.h" #include "mozilla/net/PWebSocketParent.h"
#include "mozilla/net/NeckoParent.h"
#include "nsIInterfaceRequestor.h" #include "nsIInterfaceRequestor.h"
#include "nsIWebSocketListener.h" #include "nsIWebSocketListener.h"
#include "nsIWebSocketChannel.h" #include "nsIWebSocketChannel.h"
@ -30,15 +29,14 @@ class WebSocketChannelParent : public PWebSocketParent,
NS_DECL_NSIWEBSOCKETLISTENER NS_DECL_NSIWEBSOCKETLISTENER
NS_DECL_NSIINTERFACEREQUESTOR NS_DECL_NSIINTERFACEREQUESTOR
WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider, WebSocketChannelParent(nsIAuthPromptProvider* aAuthProvider);
nsILoadContext* aLoadContext,
PBOverrideStatus aOverrideStatus);
private: private:
bool RecvAsyncOpen(const URIParams& aURI, bool RecvAsyncOpen(const URIParams& aURI,
const nsCString& aOrigin, const nsCString& aOrigin,
const nsCString& aProtocol, const nsCString& aProtocol,
const bool& aSecure); const bool& aSecure,
const IPC::SerializedLoadContext& loadContext);
bool RecvClose(const uint16_t & code, const nsCString & reason); bool RecvClose(const uint16_t & code, const nsCString & reason);
bool RecvSendMsg(const nsCString& aMsg); bool RecvSendMsg(const nsCString& aMsg);
bool RecvSendBinaryMsg(const nsCString& aMsg); bool RecvSendBinaryMsg(const nsCString& aMsg);

View File

@ -3,7 +3,6 @@
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
include protocol PNecko; include protocol PNecko;
include protocol PBrowser;
include URIParams; include URIParams;
include "SerializedLoadContext.h"; include "SerializedLoadContext.h";
@ -24,8 +23,7 @@ parent:
Init(URIParams uri); Init(URIParams uri);
AsyncOpen(URIParams originalURI, AsyncOpen(URIParams originalURI,
uint32_t loadFlags, uint32_t loadFlags,
SerializedLoadContext loadContext, SerializedLoadContext loadContext);
PBrowser browser);
// methods corresponding to those of nsIWyciwygChannel // methods corresponding to those of nsIWyciwygChannel
WriteToCacheEntry(nsString data); WriteToCacheEntry(nsString data);

View File

@ -6,7 +6,6 @@
#include "mozilla/net/NeckoChild.h" #include "mozilla/net/NeckoChild.h"
#include "WyciwygChannelChild.h" #include "WyciwygChannelChild.h"
#include "mozilla/dom/TabChild.h"
#include "nsCharsetSource.h" #include "nsCharsetSource.h"
#include "nsStringStream.h" #include "nsStringStream.h"
@ -593,16 +592,7 @@ WyciwygChannelChild::AsyncOpen(nsIStreamListener *aListener, nsISupports *aConte
URIParams originalURI; URIParams originalURI;
SerializeURI(mOriginalURI, originalURI); SerializeURI(mOriginalURI, originalURI);
mozilla::dom::TabChild* tabChild = nullptr; SendAsyncOpen(originalURI, mLoadFlags, IPC::SerializedLoadContext(this));
nsCOMPtr<nsITabChild> iTabChild;
NS_QueryNotificationCallbacks(mCallbacks, mLoadGroup,
NS_GET_IID(nsITabChild),
getter_AddRefs(iTabChild));
if (iTabChild) {
tabChild = static_cast<mozilla::dom::TabChild*>(iTabChild.get());
}
SendAsyncOpen(originalURI, mLoadFlags, IPC::SerializedLoadContext(this), tabChild);
mState = WCC_OPENED; mState = WCC_OPENED;

View File

@ -11,8 +11,8 @@
#include "nsCharsetSource.h" #include "nsCharsetSource.h"
#include "nsISerializable.h" #include "nsISerializable.h"
#include "nsSerializationHelper.h" #include "nsSerializationHelper.h"
#include "mozilla/LoadContext.h"
#include "mozilla/ipc/URIUtils.h" #include "mozilla/ipc/URIUtils.h"
#include "mozilla/net/NeckoParent.h"
using namespace mozilla::ipc; using namespace mozilla::ipc;
@ -86,8 +86,7 @@ WyciwygChannelParent::RecvInit(const URIParams& aURI)
bool bool
WyciwygChannelParent::RecvAsyncOpen(const URIParams& aOriginal, WyciwygChannelParent::RecvAsyncOpen(const URIParams& aOriginal,
const uint32_t& aLoadFlags, const uint32_t& aLoadFlags,
const IPC::SerializedLoadContext& loadContext, const IPC::SerializedLoadContext& loadContext)
PBrowserParent* aParent)
{ {
nsCOMPtr<nsIURI> original = DeserializeURI(aOriginal); nsCOMPtr<nsIURI> original = DeserializeURI(aOriginal);
if (!original) if (!original)
@ -108,15 +107,9 @@ WyciwygChannelParent::RecvAsyncOpen(const URIParams& aOriginal,
if (NS_FAILED(rv)) if (NS_FAILED(rv))
return SendCancelEarly(rv); return SendCancelEarly(rv);
const char* error = NeckoParent::CreateChannelLoadContext(aParent, loadContext, if (loadContext.IsNotNull())
mLoadContext); mLoadContext = new LoadContext(loadContext);
if (error) { else if (loadContext.IsPrivateBitValid()) {
NS_WARNING(nsPrintfCString("WyciwygChannelParent::RecvAsyncOpen: error: %s\n",
error).get());
return false;
}
if (!mLoadContext && loadContext.IsPrivateBitValid()) {
nsCOMPtr<nsIPrivateBrowsingChannel> pbChannel = do_QueryInterface(mChannel); nsCOMPtr<nsIPrivateBrowsingChannel> pbChannel = do_QueryInterface(mChannel);
if (pbChannel) if (pbChannel)
pbChannel->SetPrivate(loadContext.mUsePrivateBrowsing); pbChannel->SetPrivate(loadContext.mUsePrivateBrowsing);

View File

@ -14,10 +14,6 @@
#include "nsILoadContext.h" #include "nsILoadContext.h"
namespace mozilla { namespace mozilla {
namespace dom {
class PBrowserParent;
}
namespace net { namespace net {
class WyciwygChannelParent : public PWyciwygChannelParent class WyciwygChannelParent : public PWyciwygChannelParent
@ -37,8 +33,7 @@ protected:
virtual bool RecvInit(const URIParams& uri); virtual bool RecvInit(const URIParams& uri);
virtual bool RecvAsyncOpen(const URIParams& original, virtual bool RecvAsyncOpen(const URIParams& original,
const uint32_t& loadFlags, const uint32_t& loadFlags,
const IPC::SerializedLoadContext& loadContext, const IPC::SerializedLoadContext& loadContext);
PBrowserParent* parent);
virtual bool RecvWriteToCacheEntry(const nsString& data); virtual bool RecvWriteToCacheEntry(const nsString& data);
virtual bool RecvCloseCacheEntry(const nsresult& reason); virtual bool RecvCloseCacheEntry(const nsresult& reason);
virtual bool RecvSetCharsetAndSource(const int32_t& source, virtual bool RecvSetCharsetAndSource(const int32_t& source,

View File

@ -36,27 +36,16 @@ let (ios = Components.classes["@mozilla.org/network/io-service;1"]
ios.offline = false; ios.offline = false;
} }
// Determine if we're running on parent or child // Disable IPv6 lookups for 'localhost' on windows.
let runningInParent = true;
try { try {
runningInParent = Components.classes["@mozilla.org/xre/runtime;1"]. if ("@mozilla.org/windows-registry-key;1" in Components.classes) {
getService(Components.interfaces.nsIXULRuntime).processType let processType = Components.classes["@mozilla.org/xre/runtime;1"].
== Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT; getService(Components.interfaces.nsIXULRuntime).processType;
} if (processType == Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT) {
catch (e) { } let (prefs = Components.classes["@mozilla.org/preferences-service;1"]
.getService(Components.interfaces.nsIPrefBranch)) {
try { prefs.setCharPref("network.dns.ipv4OnlyDomains", "localhost");
if (runningInParent) { }
let prefs = Components.classes["@mozilla.org/preferences-service;1"]
.getService(Components.interfaces.nsIPrefBranch);
// disable necko IPC security checks for xpcshell, as they lack the
// docshells needed to pass them
prefs.setBoolPref("network.disable.ipc.security", true);
// Disable IPv6 lookups for 'localhost' on windows.
if ("@mozilla.org/windows-registry-key;1" in Components.classes) {
prefs.setCharPref("network.dns.ipv4OnlyDomains", "localhost");
} }
} }
} }
@ -68,7 +57,9 @@ catch (e) { }
// Note that if we're in a child process, we don't want to init the // Note that if we're in a child process, we don't want to init the
// crashreporter component. // crashreporter component.
try { // nsIXULRuntime is not available in some configurations. try { // nsIXULRuntime is not available in some configurations.
if (runningInParent && let processType = Components.classes["@mozilla.org/xre/runtime;1"].
getService(Components.interfaces.nsIXULRuntime).processType;
if (processType == Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT &&
"@mozilla.org/toolkit/crash-reporter;1" in Components.classes) { "@mozilla.org/toolkit/crash-reporter;1" in Components.classes) {
// Remember to update </toolkit/crashreporter/test/unit/test_crashreporter.js> // Remember to update </toolkit/crashreporter/test/unit/test_crashreporter.js>
// too if you change this initial setting. // too if you change this initial setting.
@ -809,7 +800,11 @@ function do_get_profile() {
function do_load_child_test_harness() function do_load_child_test_harness()
{ {
// Make sure this isn't called from child process // Make sure this isn't called from child process
if (!runningInParent) { var runtime = Components.classes["@mozilla.org/xre/app-info;1"]
.getService(Components.interfaces.nsIXULRuntime);
if (runtime.processType !=
Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT)
{
do_throw("run_test_in_child cannot be called from child!"); do_throw("run_test_in_child cannot be called from child!");
} }

View File

@ -435,6 +435,7 @@ OfflineCacheUpdateChild::Schedule()
// a reference to us. Will be released in RecvFinish() that identifies // a reference to us. Will be released in RecvFinish() that identifies
// the work has been done. // the work has been done.
child->SendPOfflineCacheUpdateConstructor(this, manifestURI, documentURI, child->SendPOfflineCacheUpdateConstructor(this, manifestURI, documentURI,
mInBrowser, mAppID,
stickDocument); stickDocument);
mIPCActivated = true; mIPCActivated = true;

View File

@ -5,14 +5,12 @@
#include "OfflineCacheUpdateParent.h" #include "OfflineCacheUpdateParent.h"
#include "mozilla/dom/TabParent.h"
#include "mozilla/ipc/URIUtils.h" #include "mozilla/ipc/URIUtils.h"
#include "nsOfflineCacheUpdate.h" #include "nsOfflineCacheUpdate.h"
#include "nsIApplicationCache.h" #include "nsIApplicationCache.h"
#include "nsNetUtil.h" #include "nsNetUtil.h"
using namespace mozilla::ipc; using namespace mozilla::ipc;
using mozilla::dom::TabParent;
#if defined(PR_LOGGING) #if defined(PR_LOGGING)
// //
@ -45,11 +43,8 @@ NS_IMPL_ISUPPORTS2(OfflineCacheUpdateParent,
// OfflineCacheUpdateParent <public> // OfflineCacheUpdateParent <public>
//----------------------------------------------------------------------------- //-----------------------------------------------------------------------------
OfflineCacheUpdateParent::OfflineCacheUpdateParent(uint32_t aAppId, OfflineCacheUpdateParent::OfflineCacheUpdateParent()
bool aIsInBrowser)
: mIPCClosed(false) : mIPCClosed(false)
, mIsInBrowserElement(aIsInBrowser)
, mAppId(aAppId)
{ {
// Make sure the service has been initialized // Make sure the service has been initialized
nsOfflineCacheUpdateService* service = nsOfflineCacheUpdateService* service =
@ -74,6 +69,8 @@ OfflineCacheUpdateParent::ActorDestroy(ActorDestroyReason why)
nsresult nsresult
OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI, OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI,
const URIParams& aDocumentURI, const URIParams& aDocumentURI,
const bool& isInBrowserElement,
const uint32_t& appId,
const bool& stickDocument) const bool& stickDocument)
{ {
LOG(("OfflineCacheUpdateParent::RecvSchedule [%p]", this)); LOG(("OfflineCacheUpdateParent::RecvSchedule [%p]", this));
@ -103,7 +100,7 @@ OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI,
if (!NS_SecurityCompareURIs(manifestURI, documentURI, false)) if (!NS_SecurityCompareURIs(manifestURI, documentURI, false))
return NS_ERROR_DOM_SECURITY_ERR; return NS_ERROR_DOM_SECURITY_ERR;
service->FindUpdate(manifestURI, mAppId, mIsInBrowserElement, service->FindUpdate(manifestURI, appId, isInBrowserElement,
getter_AddRefs(update)); getter_AddRefs(update));
if (!update) { if (!update) {
update = new nsOfflineCacheUpdate(); update = new nsOfflineCacheUpdate();
@ -111,7 +108,7 @@ OfflineCacheUpdateParent::Schedule(const URIParams& aManifestURI,
// Leave aDocument argument null. Only glues and children keep // Leave aDocument argument null. Only glues and children keep
// document instances. // document instances.
rv = update->Init(manifestURI, documentURI, nullptr, nullptr, rv = update->Init(manifestURI, documentURI, nullptr, nullptr,
mAppId, mIsInBrowserElement); appId, isInBrowserElement);
NS_ENSURE_SUCCESS(rv, rv); NS_ENSURE_SUCCESS(rv, rv);
rv = update->Schedule(); rv = update->Schedule();

View File

@ -14,10 +14,6 @@
namespace mozilla { namespace mozilla {
namespace dom {
class TabParent;
}
namespace ipc { namespace ipc {
class URIParams; class URIParams;
} // namespace ipc } // namespace ipc
@ -38,9 +34,11 @@ public:
nsresult nsresult
Schedule(const URIParams& manifestURI, Schedule(const URIParams& manifestURI,
const URIParams& documentURI, const URIParams& documentURI,
const bool& isInBrowserElement,
const uint32_t& appId,
const bool& stickDocument); const bool& stickDocument);
OfflineCacheUpdateParent(uint32_t aAppId, bool aIsInBrowser); OfflineCacheUpdateParent();
~OfflineCacheUpdateParent(); ~OfflineCacheUpdateParent();
virtual void ActorDestroy(ActorDestroyReason why); virtual void ActorDestroy(ActorDestroyReason why);