summaryrefslogtreecommitdiffstats
path: root/netwerk/protocol/http/ClassifierDummyChannel.h
blob: ed97cddf0f56847c1edb4ae379947dfc3505e547 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set sw=2 ts=8 et tw=80 : */

/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#ifndef mozilla_net_ClassifierDummyChannel_h
#define mozilla_net_ClassifierDummyChannel_h

#include "nsIChannel.h"
#include "nsIClassifiedChannel.h"
#include "nsIHttpChannelInternal.h"
#include <functional>

#define CLASSIFIER_DUMMY_CHANNEL_IID                 \
  {                                                  \
    0x70ceb97d, 0xbfa6, 0x4255, {                    \
      0xb7, 0x08, 0xe1, 0xb4, 0x4a, 0x1e, 0x0e, 0x9a \
    }                                                \
  }

namespace mozilla {
namespace net {

/**
 * In child intercept mode, the decision to intercept a channel is made in the
 * child process without consulting the parent process.  The decision is based
 * on whether there is a ServiceWorker with a scope covering the URL in question
 * and whether storage is allowed for the origin/URL.  When the
 * "network.cookie.cookieBehavior" preference is set to BEHAVIOR_REJECT_TRACKER,
 * annotated channels are denied storage which means that the ServiceWorker
 * should not intercept the channel.  However, the decision for tracking
 * protection to annotate a channel only occurs in the parent process.  The
 * dummy channel is a hack to allow the intercept decision process to ask the
 * parent process if the channel should be annotated.  Because this round-trip
 * to the parent has overhead, the dummy channel is only created 1) if the
 * ServiceWorker initially determines that the channel should be intercepted and
 * 2) it's a navigation request.
 *
 * This hack can be removed once Bug 1231208's new "parent intercept" mechanism
 * fully lands, the pref is enabled by default it stays enabled for long enough
 * to be confident we will never need/want to turn it off.  Then as part of bug
 * 1496997 we can remove this implementation.  Bug 1498259 covers removing this
 * hack in particular.
 */
class ClassifierDummyChannel final : public nsIChannel,
                                     public nsIHttpChannelInternal,
                                     public nsIClassifiedChannel {
 public:
  NS_DECLARE_STATIC_IID_ACCESSOR(CLASSIFIER_DUMMY_CHANNEL_IID)

  NS_DECL_THREADSAFE_ISUPPORTS
  NS_DECL_NSIREQUEST
  NS_DECL_NSICHANNEL
  NS_DECL_NSIHTTPCHANNELINTERNAL
  NS_DECL_NSICLASSIFIEDCHANNEL

  enum StorageAllowedState {
    eStorageGranted,
    eStorageDenied,
    eAsyncNeeded,
  };

  static StorageAllowedState StorageAllowed(
      nsIChannel* aChannel, const std::function<void(bool)>& aCallback);

  ClassifierDummyChannel(nsIURI* aURI, nsIURI* aTopWindowURI,
                         nsresult aTopWindowURIResult, nsILoadInfo* aLoadInfo);

  void AddClassificationFlags(uint32_t aClassificationFlags, bool aThirdParty);

 private:
  ~ClassifierDummyChannel();

  nsCOMPtr<nsILoadInfo> mLoadInfo;
  nsCOMPtr<nsIURI> mURI;
  nsCOMPtr<nsIURI> mTopWindowURI;
  nsresult mTopWindowURIResult;

  uint32_t mFirstPartyClassificationFlags;
  uint32_t mThirdPartyClassificationFlags;
};

NS_DEFINE_STATIC_IID_ACCESSOR(ClassifierDummyChannel,
                              CLASSIFIER_DUMMY_CHANNEL_IID)

}  // namespace net
}  // namespace mozilla

#endif  // mozilla_net_ClassifierDummyChannel_h