1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set sw=2 ts=8 et tw=80 ft=cpp : */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
include protocol PNecko;
include InputStreamParams;
include PBackgroundSharedTypes;
include NeckoChannelParams;
include IPCServiceWorkerDescriptor;
include IPCStream;
include HttpChannelParams;
include "mozilla/dom/ReferrerInfoUtils.h";
include "mozilla/net/NeckoMessageUtils.h";
include "mozilla/net/ClassOfService.h";
using mozilla::OriginAttributes from "mozilla/ipc/BackgroundUtils.h";
using mozilla::net::ClassOfService from "mozilla/net/ClassOfService.h";
[RefCounted] using class nsIURI from "mozilla/ipc/URIUtils.h";
namespace mozilla {
namespace net {
//-------------------------------------------------------------------
[ChildImpl=virtual, ParentImpl=virtual]
protocol PHttpChannel
{
manager PNecko;
parent:
// Note: channels are opened during construction, so no open method here:
// see PNecko.ipdl
async SetClassOfService(ClassOfService cos);
async Suspend();
async Resume();
async Cancel(nsresult status, uint32_t requestBlockingReason,
nsCString aReason, nsCString? logString);
// Reports approval/veto of redirect by child process redirect observers
async Redirect2Verify(nsresult result, RequestHeaderTuples changedHeaders,
uint32_t sourceRequestBlockingReason,
ChildLoadInfoForwarderArgs? targetLoadInfoForwarder,
uint32_t loadFlags,
nullable nsIReferrerInfo referrerInfo,
nullable nsIURI apiRedirectTo,
CorsPreflightArgs? corsPreflightArgs);
// For document loads we keep this protocol open after child's
// OnStopRequest, and send this msg (instead of __delete__) to allow
// partial cleanup on parent.
async DocumentChannelCleanup(bool clearCacheEntry);
// Child has detected a CORS check failure, so needs to tell the parent
// to remove any matching entry from the CORS preflight cache.
async RemoveCorsPreflightCacheEntry(nullable nsIURI uri,
PrincipalInfo requestingPrincipal,
OriginAttributes originAttributes);
// Send cookies to the parent for a given channel. Compared to PCookieService
// SetCookies this method allows the parent to determine which BrowsingContext
// the request was sent for.
async SetCookies(nsCString baseDomain,
OriginAttributes attrs,
nullable nsIURI host,
bool fromHttp,
bool isThirdParty,
CookieStruct[] cookies);
// After receiving this message, the parent calls SendDeleteSelf, and makes
// sure not to send any more messages after that.
async DeletingChannel();
// Called to get the input stream when altData was delivered.
async OpenOriginalCacheInputStream();
// Tell the parent the amount bytes read by child for the e10s back pressure
// flow control
async BytesRead(int32_t count);
async __delete__();
child:
// Used to cancel child channel if we hit errors during creating and
// AsyncOpen of nsHttpChannel on the parent.
async FailedAsyncOpen(nsresult status);
// OnStartRequest is sent over PHttpBackgroundChannel. However, sometime we
// need to wait for some PContent IPCs, e.g., permission, cookies. Those IPC
// are sent just before the background thread OnStartRequest, which is racy.
// Therefore, need one main thread IPC event for synchronizing the event
// sequence.
async OnStartRequestSent();
// Called to initiate content channel redirect, starts talking to sinks
// on the content process and reports result via Redirect2Verify above
async Redirect1Begin(uint32_t registrarId,
nullable nsIURI newOriginalUri,
uint32_t newLoadFlags,
uint32_t redirectFlags,
ParentLoadInfoForwarderArgs loadInfoForwarder,
nsHttpResponseHead responseHead,
nullable nsITransportSecurityInfo securityInfo,
uint64_t channelId,
NetAddr oldPeerAddr,
ResourceTimingStructArgs timing);
// Called if redirect successful so that child can complete setup.
async Redirect3Complete();
// Called if the redirect failed/was vetoed
async RedirectFailed(nsresult status);
// Report a security message to the console associated with this
// channel.
async ReportSecurityMessage(nsString messageTag, nsString messageCategory);
// Report Local Network Access information to console in content process
// where CallingScriptLocationString() can access JS context.
// topLevelSite must be passed from parent process because with Fission,
// cross-site content processes cannot access top-level document in another process.
async ReportLNAToConsole(NetAddr peerAddr, nsCString messageType, nsCString promptAction, nsCString topLevelSite);
// Tell child to delete channel (all IPDL deletes must be done from child to
// avoid races: see bug 591708).
async DeleteSelf();
// When CORS blocks the request in the parent process, it doesn't have the
// correct window ID, so send the message to the child for logging to the web
// console.
async LogBlockedCORSRequest(nsString message,
nsCString category,
bool isWarning);
async LogMimeTypeMismatch(nsCString messageName,
bool warning,
nsString url,
nsString contentType);
async OriginalCacheInputStreamAvailable(IPCStream? stream);
both:
async SetPriority(int16_t priority);
};
} // namespace net
} // namespace mozilla
|