/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ /* vim: set sw=4 ts=8 et tw=80 : */ /* ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is Mozilla Content App. * * The Initial Developer of the Original Code is * The Mozilla Foundation. * Portions created by the Initial Developer are Copyright (C) 2009 * the Initial Developer. All Rights Reserved. * * Contributor(s): * Frederic Plourde * * Alternatively, the contents of this file may be used under the terms of * either the GNU General Public License Version 2 or later (the "GPL"), or * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the MPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ #include "ContentParent.h" #include "TabParent.h" #include "CrashReporterParent.h" #include "History.h" #include "mozilla/ipc/TestShellParent.h" #include "mozilla/net/NeckoParent.h" #include "mozilla/Preferences.h" #include "nsHashPropertyBag.h" #include "nsIFilePicker.h" #include "nsIWindowWatcher.h" #include "nsIDOMWindow.h" #include "nsIObserverService.h" #include "nsContentUtils.h" #include "nsAutoPtr.h" #include "nsCOMPtr.h" #include "nsServiceManagerUtils.h" #include "nsThreadUtils.h" #include "nsChromeRegistryChrome.h" #include "nsExternalHelperAppService.h" #include "nsCExternalHandlerService.h" #include "nsFrameMessageManager.h" #include "nsIPresShell.h" #include "nsIAlertsService.h" #include "nsToolkitCompsCID.h" #include "nsIDOMGeoGeolocation.h" #include "nsIConsoleService.h" #include "nsIScriptError.h" #include "nsConsoleMessage.h" #include "nsAppDirectoryServiceDefs.h" #include "nsAppRunner.h" #include "IDBFactory.h" #if defined(MOZ_SYDNEYAUDIO) #include "AudioParent.h" #endif #include "SandboxHal.h" #if defined(ANDROID) || defined(LINUX) #include #include #include "nsSystemInfo.h" #endif #ifdef MOZ_PERMISSIONS #include "nsPermissionManager.h" #endif #ifdef MOZ_CRASHREPORTER #include "nsICrashReporter.h" #include "nsExceptionHandler.h" #endif #include "mozilla/dom/ExternalHelperAppParent.h" #include "mozilla/dom/StorageParent.h" #include "mozilla/hal_sandbox/PHalParent.h" #include "mozilla/Services.h" #include "mozilla/unused.h" #include "mozilla/Util.h" #include "nsIMemoryReporter.h" #include "nsMemoryReporterManager.h" #include "mozilla/dom/PMemoryReportRequestParent.h" #ifdef ANDROID #include "gfxAndroidPlatform.h" #endif #ifdef MOZ_WIDGET_ANDROID #include "AndroidBridge.h" #endif #include "nsIClipboard.h" #include "nsWidgetsCID.h" #include "nsISupportsPrimitives.h" #include "mozilla/dom/sms/SmsParent.h" #include "nsDebugImpl.h" static NS_DEFINE_CID(kCClipboardCID, NS_CLIPBOARD_CID); static const char* sClipboardTextFlavors[] = { kUnicodeMime }; using mozilla::Preferences; using namespace mozilla::ipc; using namespace mozilla::hal_sandbox; using namespace mozilla::net; using namespace mozilla::places; using mozilla::unused; // heh using base::KillProcess; using namespace mozilla::dom::sms; namespace mozilla { namespace dom { #define NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC "ipc:network:set-offline" class MemoryReportRequestParent : public PMemoryReportRequestParent { public: MemoryReportRequestParent(); virtual ~MemoryReportRequestParent(); virtual bool Recv__delete__(const InfallibleTArray& report); private: ContentParent* Owner() { return static_cast(Manager()); } }; MemoryReportRequestParent::MemoryReportRequestParent() { MOZ_COUNT_CTOR(MemoryReportRequestParent); } bool MemoryReportRequestParent::Recv__delete__(const InfallibleTArray& report) { Owner()->SetChildMemoryReporters(report); return true; } MemoryReportRequestParent::~MemoryReportRequestParent() { MOZ_COUNT_DTOR(MemoryReportRequestParent); } nsTArray* ContentParent::gContentParents; // The first content child has ID 1, so the chrome process can have ID 0. static PRUint64 gContentChildID = 1; ContentParent* ContentParent::GetNewOrUsed() { if (!gContentParents) gContentParents = new nsTArray(); PRInt32 maxContentProcesses = Preferences::GetInt("dom.ipc.processCount", 1); if (maxContentProcesses < 1) maxContentProcesses = 1; if (gContentParents->Length() >= PRUint32(maxContentProcesses)) { ContentParent* p = (*gContentParents)[rand() % gContentParents->Length()]; NS_ASSERTION(p->IsAlive(), "Non-alive contentparent in gContentParents?"); return p; } nsRefPtr p = new ContentParent(); p->Init(); gContentParents->AppendElement(p); return p; } void ContentParent::GetAll(nsTArray& aArray) { if (!gContentParents) { aArray.Clear(); return; } aArray = *gContentParents; } void ContentParent::Init() { nsCOMPtr obs = mozilla::services::GetObserverService(); if (obs) { obs->AddObserver(this, "xpcom-shutdown", false); obs->AddObserver(this, NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC, false); obs->AddObserver(this, "child-memory-reporter-request", false); obs->AddObserver(this, "memory-pressure", false); obs->AddObserver(this, "child-gc-request", false); obs->AddObserver(this, "child-cc-request", false); #ifdef ACCESSIBILITY obs->AddObserver(this, "a11y-init-or-shutdown", false); #endif } Preferences::AddStrongObserver(this, ""); nsCOMPtr threadInt(do_QueryInterface(NS_GetCurrentThread())); if (threadInt) { threadInt->AddObserver(this); } if (obs) { obs->NotifyObservers(static_cast(this), "ipc:content-created", nsnull); } #ifdef ACCESSIBILITY // If accessibility is running in chrome process then start it in content // process. if (nsIPresShell::IsAccessibilityActive()) { unused << SendActivateA11y(); } #endif } void ContentParent::OnChannelConnected(int32 pid) { ProcessHandle handle; if (!base::OpenPrivilegedProcessHandle(pid, &handle)) { NS_WARNING("Can't open handle to child process."); } else { SetOtherProcess(handle); #if defined(ANDROID) || defined(LINUX) // Check nice preference PRInt32 nice = Preferences::GetInt("dom.ipc.content.nice", 0); // Environment variable overrides preference char* relativeNicenessStr = getenv("MOZ_CHILD_PROCESS_RELATIVE_NICENESS"); if (relativeNicenessStr) { nice = atoi(relativeNicenessStr); } /* make the GUI thread have higher priority on single-cpu devices */ nsCOMPtr infoService = do_GetService(NS_SYSTEMINFO_CONTRACTID); if (infoService) { PRInt32 cpus; nsresult rv = infoService->GetPropertyAsInt32(NS_LITERAL_STRING("cpucount"), &cpus); if (NS_FAILED(rv)) { cpus = 1; } if (nice != 0 && cpus == 1) { setpriority(PRIO_PROCESS, pid, getpriority(PRIO_PROCESS, pid) + nice); } } #endif } } namespace { void DelayedDeleteSubprocess(GeckoChildProcessHost* aSubprocess) { XRE_GetIOMessageLoop() ->PostTask(FROM_HERE, new DeleteTask(aSubprocess)); } // This runnable only exists to delegate ownership of the // ContentParent to this runnable, until it's deleted by the event // system. struct DelayedDeleteContentParentTask : public nsRunnable { DelayedDeleteContentParentTask(ContentParent* aObj) : mObj(aObj) { } // No-op NS_IMETHODIMP Run() { return NS_OK; } nsRefPtr mObj; }; } void ContentParent::ActorDestroy(ActorDestroyReason why) { nsCOMPtr kungFuDeathGrip(static_cast(this)); nsCOMPtr obs = mozilla::services::GetObserverService(); if (obs) { obs->RemoveObserver(static_cast(this), "xpcom-shutdown"); obs->RemoveObserver(static_cast(this), "memory-pressure"); obs->RemoveObserver(static_cast(this), "child-memory-reporter-request"); obs->RemoveObserver(static_cast(this), NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC); obs->RemoveObserver(static_cast(this), "child-gc-request"); obs->RemoveObserver(static_cast(this), "child-cc-request"); #ifdef ACCESSIBILITY obs->RemoveObserver(static_cast(this), "a11y-init-or-shutdown"); #endif } mMessageManager->Disconnect(); // clear the child memory reporters InfallibleTArray empty; SetChildMemoryReporters(empty); // remove the global remote preferences observers Preferences::RemoveObserver(this, ""); RecvRemoveGeolocationListener(); nsCOMPtr threadInt(do_QueryInterface(NS_GetCurrentThread())); if (threadInt) threadInt->RemoveObserver(this); if (mRunToCompletionDepth) mRunToCompletionDepth = 0; if (gContentParents) { gContentParents->RemoveElement(this); if (!gContentParents->Length()) { delete gContentParents; gContentParents = NULL; } } mIsAlive = false; if (obs) { nsRefPtr props = new nsHashPropertyBag(); props->Init(); if (AbnormalShutdown == why) { props->SetPropertyAsBool(NS_LITERAL_STRING("abnormal"), true); #ifdef MOZ_CRASHREPORTER MOZ_ASSERT(ManagedPCrashReporterParent().Length() > 0); CrashReporterParent* crashReporter = static_cast(ManagedPCrashReporterParent()[0]); crashReporter->GenerateCrashReport(this, NULL); nsAutoString dumpID(crashReporter->ChildDumpID()); props->SetPropertyAsAString(NS_LITERAL_STRING("dumpID"), dumpID); #endif obs->NotifyObservers((nsIPropertyBag2*) props, "ipc:content-shutdown", nsnull); } } MessageLoop::current()-> PostTask(FROM_HERE, NewRunnableFunction(DelayedDeleteSubprocess, mSubprocess)); mSubprocess = NULL; // IPDL rules require actors to live on past ActorDestroy, but it // may be that the kungFuDeathGrip above is the last reference to // |this|. If so, when we go out of scope here, we're deleted and // all hell breaks loose. // // This runnable ensures that a reference to |this| lives on at // least until after the current task finishes running. NS_DispatchToCurrentThread(new DelayedDeleteContentParentTask(this)); } TabParent* ContentParent::CreateTab(PRUint32 aChromeFlags) { return static_cast(SendPBrowserConstructor(aChromeFlags)); } TestShellParent* ContentParent::CreateTestShell() { return static_cast(SendPTestShellConstructor()); } bool ContentParent::DestroyTestShell(TestShellParent* aTestShell) { return PTestShellParent::Send__delete__(aTestShell); } TestShellParent* ContentParent::GetTestShellSingleton() { if (!ManagedPTestShellParent().Length()) return nsnull; return static_cast(ManagedPTestShellParent()[0]); } ContentParent::ContentParent() : mGeolocationWatchID(-1) , mRunToCompletionDepth(0) , mShouldCallUnblockChild(false) , mIsAlive(true) , mSendPermissionUpdates(false) { // From this point on, NS_WARNING, NS_ASSERTION, etc. should print out the // PID along with the warning. nsDebugImpl::SetMultiprocessMode("Parent"); NS_ASSERTION(NS_IsMainThread(), "Wrong thread!"); mSubprocess = new GeckoChildProcessHost(GeckoProcessType_Content); mSubprocess->AsyncLaunch(); Open(mSubprocess->GetChannel(), mSubprocess->GetChildProcessHandle()); unused << SendSetID(gContentChildID++); nsCOMPtr registrySvc = nsChromeRegistry::GetService(); nsChromeRegistryChrome* chromeRegistry = static_cast(registrySvc.get()); chromeRegistry->SendRegisteredChrome(this); mMessageManager = nsFrameMessageManager::NewProcessMessageManager(this); if (gAppData) { nsCString version(gAppData->version); nsCString buildID(gAppData->buildID); //Sending all information to content process SendAppInfo(version, buildID); } } ContentParent::~ContentParent() { if (OtherProcess()) base::CloseProcessHandle(OtherProcess()); NS_ASSERTION(NS_IsMainThread(), "Wrong thread!"); NS_ASSERTION(!gContentParents || !gContentParents->Contains(this), "Should have been removed in ActorDestroy"); } bool ContentParent::IsAlive() { return mIsAlive; } bool ContentParent::RecvReadPrefsArray(InfallibleTArray *prefs) { Preferences::MirrorPreferences(prefs); return true; } bool ContentParent::RecvReadFontList(InfallibleTArray* retValue) { #ifdef ANDROID gfxAndroidPlatform::GetPlatform()->GetFontList(retValue); #endif return true; } bool ContentParent::RecvReadPermissions(InfallibleTArray* aPermissions) { #ifdef MOZ_PERMISSIONS nsCOMPtr permissionManagerIface = do_GetService(NS_PERMISSIONMANAGER_CONTRACTID); nsPermissionManager* permissionManager = static_cast(permissionManagerIface.get()); NS_ABORT_IF_FALSE(permissionManager, "We have no permissionManager in the Chrome process !"); nsCOMPtr enumerator; DebugOnly rv = permissionManager->GetEnumerator(getter_AddRefs(enumerator)); NS_ABORT_IF_FALSE(NS_SUCCEEDED(rv), "Could not get enumerator!"); while(1) { bool hasMore; enumerator->HasMoreElements(&hasMore); if (!hasMore) break; nsCOMPtr supp; enumerator->GetNext(getter_AddRefs(supp)); nsCOMPtr perm = do_QueryInterface(supp); nsCString host; perm->GetHost(host); nsCString type; perm->GetType(type); PRUint32 capability; perm->GetCapability(&capability); PRUint32 expireType; perm->GetExpireType(&expireType); PRInt64 expireTime; perm->GetExpireTime(&expireTime); aPermissions->AppendElement(IPC::Permission(host, type, capability, expireType, expireTime)); } // Ask for future changes mSendPermissionUpdates = true; #endif return true; } bool ContentParent::RecvGetIndexedDBDirectory(nsString* aDirectory) { indexedDB::IDBFactory::NoteUsedByProcessType(GeckoProcessType_Content); nsCOMPtr dbDirectory; nsresult rv = indexedDB::IDBFactory::GetDirectory(getter_AddRefs(dbDirectory)); if (NS_FAILED(rv)) { NS_ERROR("Failed to get IndexedDB directory"); return true; } dbDirectory->GetPath(*aDirectory); return true; } bool ContentParent::RecvSetClipboardText(const nsString& text, const PRInt32& whichClipboard) { nsresult rv; nsCOMPtr clipboard(do_GetService(kCClipboardCID, &rv)); NS_ENSURE_SUCCESS(rv, true); nsCOMPtr dataWrapper = do_CreateInstance(NS_SUPPORTS_STRING_CONTRACTID, &rv); NS_ENSURE_SUCCESS(rv, true); rv = dataWrapper->SetData(text); NS_ENSURE_SUCCESS(rv, true); nsCOMPtr trans = do_CreateInstance("@mozilla.org/widget/transferable;1", &rv); NS_ENSURE_SUCCESS(rv, true); // If our data flavor has already been added, this will fail. But we don't care trans->AddDataFlavor(kUnicodeMime); nsCOMPtr nsisupportsDataWrapper = do_QueryInterface(dataWrapper); rv = trans->SetTransferData(kUnicodeMime, nsisupportsDataWrapper, text.Length() * sizeof(PRUnichar)); NS_ENSURE_SUCCESS(rv, true); clipboard->SetData(trans, NULL, whichClipboard); return true; } bool ContentParent::RecvGetClipboardText(const PRInt32& whichClipboard, nsString* text) { nsresult rv; nsCOMPtr clipboard(do_GetService(kCClipboardCID, &rv)); NS_ENSURE_SUCCESS(rv, true); nsCOMPtr trans = do_CreateInstance("@mozilla.org/widget/transferable;1", &rv); NS_ENSURE_SUCCESS(rv, true); clipboard->GetData(trans, whichClipboard); nsCOMPtr tmp; PRUint32 len; rv = trans->GetTransferData(kUnicodeMime, getter_AddRefs(tmp), &len); if (NS_FAILED(rv)) return false; nsCOMPtr supportsString = do_QueryInterface(tmp); // No support for non-text data if (!supportsString) return false; supportsString->GetData(*text); return true; } bool ContentParent::RecvEmptyClipboard() { nsresult rv; nsCOMPtr clipboard(do_GetService(kCClipboardCID, &rv)); NS_ENSURE_SUCCESS(rv, true); clipboard->EmptyClipboard(nsIClipboard::kGlobalClipboard); return true; } bool ContentParent::RecvClipboardHasText(bool* hasText) { nsresult rv; nsCOMPtr clipboard(do_GetService(kCClipboardCID, &rv)); NS_ENSURE_SUCCESS(rv, true); clipboard->HasDataMatchingFlavors(sClipboardTextFlavors, 1, nsIClipboard::kGlobalClipboard, hasText); return true; } bool ContentParent::RecvGetSystemColors(const PRUint32& colorsCount, InfallibleTArray* colors) { #ifdef MOZ_WIDGET_ANDROID NS_ASSERTION(AndroidBridge::Bridge() != nsnull, "AndroidBridge is not available"); if (AndroidBridge::Bridge() == nsnull) { // Do not fail - the colors won't be right, but it's not critical return true; } colors->AppendElements(colorsCount); // The array elements correspond to the members of AndroidSystemColors structure, // so just pass the pointer to the elements buffer AndroidBridge::Bridge()->GetSystemColors((AndroidSystemColors*)colors->Elements()); #endif return true; } bool ContentParent::RecvGetIconForExtension(const nsCString& aFileExt, const PRUint32& aIconSize, InfallibleTArray* bits) { #ifdef MOZ_WIDGET_ANDROID NS_ASSERTION(AndroidBridge::Bridge() != nsnull, "AndroidBridge is not available"); if (AndroidBridge::Bridge() == nsnull) { // Do not fail - just no icon will be shown return true; } bits->AppendElements(aIconSize * aIconSize * 4); AndroidBridge::Bridge()->GetIconForExtension(aFileExt, aIconSize, bits->Elements()); #endif return true; } bool ContentParent::RecvGetShowPasswordSetting(bool* showPassword) { // default behavior is to show the last password character *showPassword = true; #ifdef MOZ_WIDGET_ANDROID NS_ASSERTION(AndroidBridge::Bridge() != nsnull, "AndroidBridge is not available"); if (AndroidBridge::Bridge() != nsnull) *showPassword = AndroidBridge::Bridge()->GetShowPasswordSetting(); #endif return true; } NS_IMPL_THREADSAFE_ISUPPORTS3(ContentParent, nsIObserver, nsIThreadObserver, nsIDOMGeoPositionCallback) NS_IMETHODIMP ContentParent::Observe(nsISupports* aSubject, const char* aTopic, const PRUnichar* aData) { if (!strcmp(aTopic, "xpcom-shutdown") && mSubprocess) { Close(); NS_ASSERTION(!mSubprocess, "Close should have nulled mSubprocess"); } if (!mIsAlive || !mSubprocess) return NS_OK; // listening for memory pressure event if (!strcmp(aTopic, "memory-pressure")) { unused << SendFlushMemory(nsDependentString(aData)); } // listening for remotePrefs... else if (!strcmp(aTopic, "nsPref:changed")) { // We know prefs are ASCII here. NS_LossyConvertUTF16toASCII strData(aData); PrefTuple pref; bool prefNeedUpdate = Preferences::MirrorPreference(strData.get(), &pref); if (prefNeedUpdate) { if (!SendPreferenceUpdate(pref)) { return NS_ERROR_NOT_AVAILABLE; } } else { // Pref wasn't found. It was probably removed. if (!SendClearUserPreference(strData)) { return NS_ERROR_NOT_AVAILABLE; } } } else if (!strcmp(aTopic, NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC)) { NS_ConvertUTF16toUTF8 dataStr(aData); const char *offline = dataStr.get(); if (!SendSetOffline(!strcmp(offline, "true") ? true : false)) return NS_ERROR_NOT_AVAILABLE; } // listening for alert notifications else if (!strcmp(aTopic, "alertfinished") || !strcmp(aTopic, "alertclickcallback") ) { if (!SendNotifyAlertsObserver(nsDependentCString(aTopic), nsDependentString(aData))) return NS_ERROR_NOT_AVAILABLE; } else if (!strcmp(aTopic, "child-memory-reporter-request")) { unused << SendPMemoryReportRequestConstructor(); } else if (!strcmp(aTopic, "child-gc-request")){ SendGarbageCollect(); } else if (!strcmp(aTopic, "child-cc-request")){ SendCycleCollect(); } #ifdef ACCESSIBILITY // Make sure accessibility is running in content process when accessibility // gets initiated in chrome process. else if (aData && (*aData == '1') && !strcmp(aTopic, "a11y-init-or-shutdown")) { unused << SendActivateA11y(); } #endif return NS_OK; } PBrowserParent* ContentParent::AllocPBrowser(const PRUint32& aChromeFlags) { TabParent* parent = new TabParent(); if (parent){ NS_ADDREF(parent); } return parent; } bool ContentParent::DeallocPBrowser(PBrowserParent* frame) { TabParent* parent = static_cast(frame); NS_RELEASE(parent); return true; } PCrashReporterParent* ContentParent::AllocPCrashReporter(const NativeThreadId& tid, const PRUint32& processType) { #ifdef MOZ_CRASHREPORTER return new CrashReporterParent(); #else return nsnull; #endif } bool ContentParent::RecvPCrashReporterConstructor(PCrashReporterParent* actor, const NativeThreadId& tid, const PRUint32& processType) { static_cast(actor)->SetChildData(tid, processType); return true; } bool ContentParent::DeallocPCrashReporter(PCrashReporterParent* crashreporter) { delete crashreporter; return true; } PHalParent* ContentParent::AllocPHal() { return CreateHalParent(); } bool ContentParent::DeallocPHal(PHalParent* aHal) { delete aHal; return true; } PMemoryReportRequestParent* ContentParent::AllocPMemoryReportRequest() { MemoryReportRequestParent* parent = new MemoryReportRequestParent(); return parent; } bool ContentParent::DeallocPMemoryReportRequest(PMemoryReportRequestParent* actor) { delete actor; return true; } void ContentParent::SetChildMemoryReporters(const InfallibleTArray& report) { nsCOMPtr mgr = do_GetService("@mozilla.org/memory-reporter-manager;1"); for (PRInt32 i = 0; i < mMemoryReporters.Count(); i++) mgr->UnregisterReporter(mMemoryReporters[i]); for (PRUint32 i = 0; i < report.Length(); i++) { nsCString process = report[i].process(); nsCString path = report[i].path(); PRInt32 kind = report[i].kind(); PRInt32 units = report[i].units(); PRInt64 amount = report[i].amount(); nsCString desc = report[i].desc(); nsRefPtr r = new nsMemoryReporter(process, path, kind, units, amount, desc); mMemoryReporters.AppendObject(r); mgr->RegisterReporter(r); } nsCOMPtr obs = do_GetService("@mozilla.org/observer-service;1"); if (obs) obs->NotifyObservers(nsnull, "child-memory-reporter-update", nsnull); } PTestShellParent* ContentParent::AllocPTestShell() { return new TestShellParent(); } bool ContentParent::DeallocPTestShell(PTestShellParent* shell) { delete shell; return true; } PAudioParent* ContentParent::AllocPAudio(const PRInt32& numChannels, const PRInt32& rate, const PRInt32& format) { #if defined(MOZ_SYDNEYAUDIO) AudioParent *parent = new AudioParent(numChannels, rate, format); NS_ADDREF(parent); return parent; #else return nsnull; #endif } bool ContentParent::DeallocPAudio(PAudioParent* doomed) { #if defined(MOZ_SYDNEYAUDIO) AudioParent *parent = static_cast(doomed); NS_RELEASE(parent); #endif return true; } PNeckoParent* ContentParent::AllocPNecko() { return new NeckoParent(); } bool ContentParent::DeallocPNecko(PNeckoParent* necko) { delete necko; return true; } PExternalHelperAppParent* ContentParent::AllocPExternalHelperApp(const IPC::URI& uri, const nsCString& aMimeContentType, const nsCString& aContentDisposition, const bool& aForceSave, const PRInt64& aContentLength, const IPC::URI& aReferrer) { ExternalHelperAppParent *parent = new ExternalHelperAppParent(uri, aContentLength); parent->AddRef(); parent->Init(this, aMimeContentType, aContentDisposition, aForceSave, aReferrer); return parent; } bool ContentParent::DeallocPExternalHelperApp(PExternalHelperAppParent* aService) { ExternalHelperAppParent *parent = static_cast(aService); parent->Release(); return true; } PSmsParent* ContentParent::AllocPSms() { return new SmsParent(); } bool ContentParent::DeallocPSms(PSmsParent* aSms) { delete aSms; return true; } PStorageParent* ContentParent::AllocPStorage(const StorageConstructData& aData) { return new StorageParent(aData); } bool ContentParent::DeallocPStorage(PStorageParent* aActor) { delete aActor; return true; } void ContentParent::ReportChildAlreadyBlocked() { if (!mRunToCompletionDepth) { #ifdef DEBUG printf("Running to completion...\n"); #endif mRunToCompletionDepth = 1; mShouldCallUnblockChild = false; } } bool ContentParent::RequestRunToCompletion() { if (!mRunToCompletionDepth && BlockChild()) { #ifdef DEBUG printf("Running to completion...\n"); #endif mRunToCompletionDepth = 1; mShouldCallUnblockChild = true; } return !!mRunToCompletionDepth; } bool ContentParent::RecvStartVisitedQuery(const IPC::URI& aURI) { nsCOMPtr newURI(aURI); nsCOMPtr history = services::GetHistoryService(); NS_ABORT_IF_FALSE(history, "History must exist at this point."); if (history) { history->RegisterVisitedCallback(newURI, nsnull); } return true; } bool ContentParent::RecvVisitURI(const IPC::URI& uri, const IPC::URI& referrer, const PRUint32& flags) { nsCOMPtr ourURI(uri); nsCOMPtr ourReferrer(referrer); nsCOMPtr history = services::GetHistoryService(); NS_ABORT_IF_FALSE(history, "History must exist at this point"); if (history) { history->VisitURI(ourURI, ourReferrer, flags); } return true; } bool ContentParent::RecvSetURITitle(const IPC::URI& uri, const nsString& title) { nsCOMPtr ourURI(uri); nsCOMPtr history = services::GetHistoryService(); NS_ABORT_IF_FALSE(history, "History must exist at this point"); if (history) { history->SetURITitle(ourURI, title); } return true; } bool ContentParent::RecvShowFilePicker(const PRInt16& mode, const PRInt16& selectedType, const bool& addToRecentDocs, const nsString& title, const nsString& defaultFile, const nsString& defaultExtension, const InfallibleTArray& filters, const InfallibleTArray& filterNames, InfallibleTArray* files, PRInt16* retValue, nsresult* result) { nsCOMPtr filePicker = do_CreateInstance("@mozilla.org/filepicker;1"); if (!filePicker) { *result = NS_ERROR_NOT_AVAILABLE; return true; } // as the parent given to the content process would be meaningless in this // process, always use active window as the parent nsCOMPtr ww = do_GetService(NS_WINDOWWATCHER_CONTRACTID); nsCOMPtr window; ww->GetActiveWindow(getter_AddRefs(window)); // initialize the "real" picker with all data given *result = filePicker->Init(window, title, mode); if (NS_FAILED(*result)) return true; filePicker->SetAddToRecentDocs(addToRecentDocs); PRUint32 count = filters.Length(); for (PRUint32 i = 0; i < count; ++i) { filePicker->AppendFilter(filterNames[i], filters[i]); } filePicker->SetDefaultString(defaultFile); filePicker->SetDefaultExtension(defaultExtension); filePicker->SetFilterIndex(selectedType); // and finally open the dialog *result = filePicker->Show(retValue); if (NS_FAILED(*result)) return true; if (mode == nsIFilePicker::modeOpenMultiple) { nsCOMPtr fileIter; *result = filePicker->GetFiles(getter_AddRefs(fileIter)); nsCOMPtr singleFile; bool loop = true; while (NS_SUCCEEDED(fileIter->HasMoreElements(&loop)) && loop) { fileIter->GetNext(getter_AddRefs(singleFile)); if (singleFile) { nsAutoString filePath; singleFile->GetPath(filePath); files->AppendElement(filePath); } } return true; } nsCOMPtr file; filePicker->GetFile(getter_AddRefs(file)); // even with NS_OK file can be null if nothing was selected if (file) { nsAutoString filePath; file->GetPath(filePath); files->AppendElement(filePath); } return true; } bool ContentParent::RecvLoadURIExternal(const IPC::URI& uri) { nsCOMPtr extProtService(do_GetService(NS_EXTERNALPROTOCOLSERVICE_CONTRACTID)); if (!extProtService) return true; nsCOMPtr ourURI(uri); extProtService->LoadURI(ourURI, nsnull); return true; } /* void onDispatchedEvent (in nsIThreadInternal thread); */ NS_IMETHODIMP ContentParent::OnDispatchedEvent(nsIThreadInternal *thread) { NS_NOTREACHED("OnDispatchedEvent unimplemented"); return NS_ERROR_NOT_IMPLEMENTED; } /* void onProcessNextEvent (in nsIThreadInternal thread, in boolean mayWait, in unsigned long recursionDepth); */ NS_IMETHODIMP ContentParent::OnProcessNextEvent(nsIThreadInternal *thread, bool mayWait, PRUint32 recursionDepth) { if (mRunToCompletionDepth) ++mRunToCompletionDepth; return NS_OK; } /* void afterProcessNextEvent (in nsIThreadInternal thread, in unsigned long recursionDepth); */ NS_IMETHODIMP ContentParent::AfterProcessNextEvent(nsIThreadInternal *thread, PRUint32 recursionDepth) { if (mRunToCompletionDepth && !--mRunToCompletionDepth) { #ifdef DEBUG printf("... ran to completion.\n"); #endif if (mShouldCallUnblockChild) { mShouldCallUnblockChild = false; UnblockChild(); } } return NS_OK; } bool ContentParent::RecvShowAlertNotification(const nsString& aImageUrl, const nsString& aTitle, const nsString& aText, const bool& aTextClickable, const nsString& aCookie, const nsString& aName) { nsCOMPtr sysAlerts(do_GetService(NS_ALERTSERVICE_CONTRACTID)); if (sysAlerts) { sysAlerts->ShowAlertNotification(aImageUrl, aTitle, aText, aTextClickable, aCookie, this, aName); } return true; } bool ContentParent::RecvSyncMessage(const nsString& aMsg, const nsString& aJSON, InfallibleTArray* aRetvals) { nsRefPtr ppm = mMessageManager; if (ppm) { ppm->ReceiveMessage(static_cast(ppm.get()), aMsg,true, aJSON, nsnull, aRetvals); } return true; } bool ContentParent::RecvAsyncMessage(const nsString& aMsg, const nsString& aJSON) { nsRefPtr ppm = mMessageManager; if (ppm) { ppm->ReceiveMessage(static_cast(ppm.get()), aMsg, false, aJSON, nsnull, nsnull); } return true; } bool ContentParent::RecvAddGeolocationListener() { if (mGeolocationWatchID == -1) { nsCOMPtr geo = do_GetService("@mozilla.org/geolocation;1"); if (!geo) { return true; } jsval dummy = JSVAL_VOID; geo->WatchPosition(this, nsnull, dummy, nsnull, &mGeolocationWatchID); } return true; } bool ContentParent::RecvRemoveGeolocationListener() { if (mGeolocationWatchID != -1) { nsCOMPtr geo = do_GetService("@mozilla.org/geolocation;1"); if (!geo) { return true; } geo->ClearWatch(mGeolocationWatchID); mGeolocationWatchID = -1; } return true; } NS_IMETHODIMP ContentParent::HandleEvent(nsIDOMGeoPosition* postion) { unused << SendGeolocationUpdate(GeoPosition(postion)); return NS_OK; } bool ContentParent::RecvConsoleMessage(const nsString& aMessage) { nsCOMPtr svc(do_GetService(NS_CONSOLESERVICE_CONTRACTID)); if (!svc) return true; nsRefPtr msg(new nsConsoleMessage(aMessage.get())); svc->LogMessage(msg); return true; } bool ContentParent::RecvScriptError(const nsString& aMessage, const nsString& aSourceName, const nsString& aSourceLine, const PRUint32& aLineNumber, const PRUint32& aColNumber, const PRUint32& aFlags, const nsCString& aCategory) { nsCOMPtr svc(do_GetService(NS_CONSOLESERVICE_CONTRACTID)); if (!svc) return true; nsCOMPtr msg(do_CreateInstance(NS_SCRIPTERROR_CONTRACTID)); nsresult rv = msg->Init(aMessage.get(), aSourceName.get(), aSourceLine.get(), aLineNumber, aColNumber, aFlags, aCategory.get()); if (NS_FAILED(rv)) return true; svc->LogMessage(msg); return true; } } // namespace dom } // namespace mozilla