summaryrefslogtreecommitdiffstats
path: root/dom/plugins/ipc/PluginProcessParent.h
diff options
context:
space:
mode:
Diffstat (limited to 'dom/plugins/ipc/PluginProcessParent.h')
-rw-r--r--dom/plugins/ipc/PluginProcessParent.h95
1 files changed, 95 insertions, 0 deletions
diff --git a/dom/plugins/ipc/PluginProcessParent.h b/dom/plugins/ipc/PluginProcessParent.h
new file mode 100644
index 0000000000..48ce24cc70
--- /dev/null
+++ b/dom/plugins/ipc/PluginProcessParent.h
@@ -0,0 +1,95 @@
+/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*-
+ * vim: sw=2 ts=4 et :
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef dom_plugins_PluginProcessParent_h
+#define dom_plugins_PluginProcessParent_h 1
+
+#include "mozilla/Attributes.h"
+#include "base/basictypes.h"
+
+#include "base/file_path.h"
+#include "base/task.h"
+#include "base/thread.h"
+#include "chrome/common/child_process_host.h"
+
+#include "mozilla/ipc/GeckoChildProcessHost.h"
+#include "mozilla/ipc/TaskFactory.h"
+#include "mozilla/UniquePtr.h"
+#include "nsCOMPtr.h"
+#include "nsTHashtable.h"
+#include "nsHashKeys.h"
+
+namespace mozilla {
+namespace plugins {
+
+class LaunchCompleteTask : public Runnable {
+ public:
+ LaunchCompleteTask()
+ : Runnable("plugins::LaunchCompleteTask"), mLaunchSucceeded(false) {}
+
+ void SetLaunchSucceeded() { mLaunchSucceeded = true; }
+
+ protected:
+ bool mLaunchSucceeded;
+};
+
+class PluginProcessParent final : public mozilla::ipc::GeckoChildProcessHost {
+ public:
+ explicit PluginProcessParent(const std::string& aPluginFilePath);
+
+ /**
+ * Launch the plugin process. If the process fails to launch,
+ * this method will return false.
+ *
+ * @param aLaunchCompleteTask Task that is executed on the main
+ * thread once the asynchonous launch has completed.
+ * @param aSandboxLevel Determines the strength of the sandbox.
+ * <= 0 means no sandbox.
+ * @param aIsSandboxLoggingEnabled Indicates if sandbox violation
+ * logging should be enabled for the plugin process.
+ */
+ bool Launch(UniquePtr<LaunchCompleteTask> aLaunchCompleteTask =
+ UniquePtr<LaunchCompleteTask>(),
+ int32_t aSandboxLevel = 0, bool aIsSandboxLoggingEnabled = false);
+
+ virtual bool CanShutdown() override { return true; }
+
+ const std::string& GetPluginFilePath() { return mPluginFilePath; }
+
+ using mozilla::ipc::GeckoChildProcessHost::GetChannel;
+
+ virtual bool WaitUntilConnected(int32_t aTimeoutMs = 0) override;
+
+ virtual void OnChannelConnected(int32_t peer_pid) override;
+ virtual void OnChannelError() override;
+
+ bool IsConnected();
+
+ static bool IsPluginProcessId(base::ProcessId procId);
+
+ private:
+ ~PluginProcessParent();
+
+ void RunLaunchCompleteTask();
+
+ std::string mPluginFilePath;
+ ipc::TaskFactory<PluginProcessParent> mTaskFactory;
+ UniquePtr<LaunchCompleteTask> mLaunchCompleteTask;
+ MessageLoop* mMainMsgLoop;
+#ifdef XP_WIN
+ typedef nsTHashtable<nsUint32HashKey> PidSet;
+ // Set of PIDs for all plugin child processes or NULL if empty.
+ static PidSet* sPidSet;
+ uint32_t mChildPid;
+#endif
+
+ DISALLOW_EVIL_CONSTRUCTORS(PluginProcessParent);
+};
+
+} // namespace plugins
+} // namespace mozilla
+
+#endif // ifndef dom_plugins_PluginProcessParent_h