forked from mirrors/gecko-dev
Backed out changeset f41ac122a801 (bug 1646899) Backed out changeset 86a5e0827050 (bug 1646899) Backed out changeset d2fd0f955e24 (bug 1646899) Backed out changeset 7a7194146fe1 (bug 1646899) Backed out changeset 4731d76dae88 (bug 1646899)
509 lines
20 KiB
C++
509 lines
20 KiB
C++
/* vim: set sw=2 ts=8 et tw=80 : */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef mozilla_net_DocumentLoadListener_h
|
|
#define mozilla_net_DocumentLoadListener_h
|
|
|
|
#include "mozilla/MozPromise.h"
|
|
#include "mozilla/Variant.h"
|
|
#include "mozilla/ipc/ProtocolUtils.h"
|
|
#include "mozilla/dom/SessionHistoryEntry.h"
|
|
#include "mozilla/net/NeckoCommon.h"
|
|
#include "mozilla/net/NeckoParent.h"
|
|
#include "mozilla/net/PDocumentChannelParent.h"
|
|
#include "mozilla/net/ParentChannelListener.h"
|
|
#include "nsDOMNavigationTiming.h"
|
|
#include "nsIBrowser.h"
|
|
#include "nsIInterfaceRequestor.h"
|
|
#include "nsIMultiPartChannel.h"
|
|
#include "nsIParentChannel.h"
|
|
#include "nsIParentRedirectingChannel.h"
|
|
#include "nsIProgressEventSink.h"
|
|
#include "nsIRedirectResultListener.h"
|
|
|
|
#define DOCUMENT_LOAD_LISTENER_IID \
|
|
{ \
|
|
0x3b393c56, 0x9e01, 0x11e9, { \
|
|
0xa2, 0xa3, 0x2a, 0x2a, 0xe2, 0xdb, 0xcc, 0xe4 \
|
|
} \
|
|
}
|
|
|
|
namespace mozilla {
|
|
namespace dom {
|
|
class CanonicalBrowsingContext;
|
|
}
|
|
namespace net {
|
|
using ChildEndpointPromise =
|
|
MozPromise<ipc::Endpoint<extensions::PStreamFilterChild>, bool, true>;
|
|
|
|
// If we've been asked to attach a stream filter to our channel,
|
|
// then we return this promise and defer until we know the final
|
|
// content process. At that point we setup Endpoints between
|
|
// mStramFilterProcessId and the new content process, and send
|
|
// the parent Endpoint to the new process.
|
|
// Once we have confirmation of that being bound in the content
|
|
// process, we resolve the promise the child Endpoint.
|
|
struct StreamFilterRequest {
|
|
StreamFilterRequest() = default;
|
|
StreamFilterRequest(StreamFilterRequest&&) = default;
|
|
~StreamFilterRequest() {
|
|
if (mPromise) {
|
|
mPromise->Reject(false, __func__);
|
|
}
|
|
}
|
|
RefPtr<ChildEndpointPromise::Private> mPromise;
|
|
base::ProcessId mChildProcessId;
|
|
ipc::Endpoint<extensions::PStreamFilterChild> mChildEndpoint;
|
|
};
|
|
} // namespace net
|
|
} // namespace mozilla
|
|
MOZ_DECLARE_RELOCATE_USING_MOVE_CONSTRUCTOR(mozilla::net::StreamFilterRequest)
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
class LoadInfo;
|
|
|
|
/**
|
|
* DocumentLoadListener represents a connecting document load for a
|
|
* CanonicalBrowsingContext (in the parent process).
|
|
*
|
|
* It creates a network channel for the document load and then waits for it to
|
|
* receive a response (after all redirects are resolved). It then decides where
|
|
* to handle that load (could be in a different process from the initiator),
|
|
* and then sets up a real network nsIChannel to deliver the data to the final
|
|
* destination docshell, maybe through an nsIParentChannel/nsIChildChannel IPDL
|
|
* layer.
|
|
*
|
|
* In the case where this was initiated from an nsDocShell, we also create an
|
|
* nsIChannel to act as a placeholder within the docshell while this process
|
|
* completes, and then notify the docshell of a 'redirect' when we replace this
|
|
* channel with the real one.
|
|
*/
|
|
|
|
// TODO: We currently don't implement nsIProgressEventSink and forward those
|
|
// to the child. Should we? We get the interface requested.
|
|
class DocumentLoadListener : public nsIInterfaceRequestor,
|
|
public nsIAsyncVerifyRedirectReadyCallback,
|
|
public nsIParentChannel,
|
|
public nsIChannelEventSink,
|
|
public HttpChannelSecurityWarningReporter,
|
|
public nsIMultiPartChannelListener,
|
|
public nsIProgressEventSink {
|
|
public:
|
|
explicit DocumentLoadListener(
|
|
dom::CanonicalBrowsingContext* aBrowsingContext);
|
|
|
|
struct OpenPromiseSucceededType {
|
|
nsTArray<ipc::Endpoint<extensions::PStreamFilterParent>>
|
|
mStreamFilterEndpoints;
|
|
uint32_t mRedirectFlags;
|
|
uint32_t mLoadFlags;
|
|
RefPtr<PDocumentChannelParent::RedirectToRealChannelPromise::Private>
|
|
mPromise;
|
|
};
|
|
struct OpenPromiseFailedType {
|
|
nsresult mStatus;
|
|
nsresult mLoadGroupStatus;
|
|
// This is set to true if we're rejecting the promise because we
|
|
// switched to load away to a new process.
|
|
bool mSwitchedProcess = false;
|
|
};
|
|
|
|
typedef MozPromise<OpenPromiseSucceededType, OpenPromiseFailedType,
|
|
true /* isExclusive */>
|
|
OpenPromise;
|
|
|
|
// Creates the channel, and then calls AsyncOpen on it.
|
|
// The DocumentLoadListener will require additional process from the consumer
|
|
// in order to complete the redirect to the end channel. This is done by
|
|
// returning a RedirectToRealChannelPromise and then waiting for it to be
|
|
// resolved or rejected accordingly.
|
|
// Once that promise is resolved; the consumer no longer needs to hold a
|
|
// reference to the DocumentLoadListener nor will the consumer required to be
|
|
// used again.
|
|
RefPtr<OpenPromise> Open(nsDocShellLoadState* aLoadState, uint32_t aCacheKey,
|
|
const Maybe<uint64_t>& aChannelId,
|
|
const TimeStamp& aAsyncOpenTime,
|
|
nsDOMNavigationTiming* aTiming,
|
|
Maybe<dom::ClientInfo>&& aInfo,
|
|
uint64_t aOuterWindowId, bool aHasGesture,
|
|
Maybe<bool> aUriModified, Maybe<bool> aIsXFOError,
|
|
base::ProcessId aPid, nsresult* aRv);
|
|
|
|
// Creates a DocumentLoadListener entirely in the parent process and opens it,
|
|
// and never needs a DocumentChannel to connect to an existing docshell.
|
|
// Once we get a response it takes the 'process switch' path to find the right
|
|
// process and docshell, and delivers the response there directly.
|
|
static bool LoadInParent(dom::CanonicalBrowsingContext* aBrowsingContext,
|
|
nsDocShellLoadState* aLoadState,
|
|
uint64_t aOuterWindowId, bool aSetNavigating);
|
|
|
|
// Creates a DocumentLoadListener directly in the parent process and opens it,
|
|
// without needing an existing DocumentChannel.
|
|
// If successful it registers a unique identifier (return in aOutIdent) to
|
|
// keep it alive until a future DocumentChannel can attach to it, or we fail
|
|
// and clean up.
|
|
static bool SpeculativeLoadInParent(
|
|
dom::CanonicalBrowsingContext* aBrowsingContext,
|
|
nsDocShellLoadState* aLoadState, uint64_t aOuterWindowId);
|
|
|
|
// Ensures that a load identifier allocated by OpenFromParent has
|
|
// been deregistered if it hasn't already been claimed.
|
|
// This also cancels the load.
|
|
static void CleanupParentLoadAttempt(uint64_t aLoadIdent);
|
|
|
|
// Looks up aLoadIdent to find the associated, cleans up the registration
|
|
static RefPtr<OpenPromise> ClaimParentLoad(DocumentLoadListener** aListener,
|
|
uint64_t aLoadIdent);
|
|
|
|
// Called by the DocumentChannelParent if actor got destroyed or the parent
|
|
// channel got deleted.
|
|
void Abort();
|
|
|
|
NS_DECL_ISUPPORTS
|
|
NS_DECL_NSIREQUESTOBSERVER
|
|
NS_DECL_NSISTREAMLISTENER
|
|
NS_DECL_NSIPARENTCHANNEL
|
|
NS_DECL_NSIINTERFACEREQUESTOR
|
|
NS_DECL_NSIASYNCVERIFYREDIRECTREADYCALLBACK
|
|
NS_DECL_NSICHANNELEVENTSINK
|
|
NS_DECL_NSIMULTIPARTCHANNELLISTENER
|
|
NS_DECL_NSIPROGRESSEVENTSINK
|
|
|
|
// We suspend the underlying channel when replacing ourselves with
|
|
// the real listener channel.
|
|
// This helper resumes the underlying channel again, and manually
|
|
// forwards any nsIStreamListener messages that arrived while we
|
|
// were suspended (which might have failed).
|
|
// Returns true if the channel was finished before we could resume it.
|
|
bool ResumeSuspendedChannel(nsIStreamListener* aListener);
|
|
|
|
NS_DECLARE_STATIC_IID_ACCESSOR(DOCUMENT_LOAD_LISTENER_IID)
|
|
|
|
// Called by the DocumentChannel if cancelled.
|
|
void Cancel(const nsresult& status);
|
|
|
|
nsIChannel* GetChannel() const { return mChannel; }
|
|
|
|
uint32_t GetRedirectChannelId() const { return mRedirectChannelId; }
|
|
|
|
nsresult ReportSecurityMessage(const nsAString& aMessageTag,
|
|
const nsAString& aMessageCategory) override {
|
|
ReportSecurityMessageParams params;
|
|
params.mMessageTag = aMessageTag;
|
|
params.mMessageCategory = aMessageCategory;
|
|
mSecurityWarningFunctions.AppendElement(
|
|
SecurityWarningFunction{VariantIndex<0>{}, std::move(params)});
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult LogBlockedCORSRequest(const nsAString& aMessage,
|
|
const nsACString& aCategory) override {
|
|
LogBlockedCORSRequestParams params;
|
|
params.mMessage = aMessage;
|
|
params.mCategory = aCategory;
|
|
mSecurityWarningFunctions.AppendElement(
|
|
SecurityWarningFunction{VariantIndex<1>{}, std::move(params)});
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult LogMimeTypeMismatch(const nsACString& aMessageName, bool aWarning,
|
|
const nsAString& aURL,
|
|
const nsAString& aContentType) override {
|
|
LogMimeTypeMismatchParams params;
|
|
params.mMessageName = aMessageName;
|
|
params.mWarning = aWarning;
|
|
params.mURL = aURL;
|
|
params.mContentType = aContentType;
|
|
mSecurityWarningFunctions.AppendElement(
|
|
SecurityWarningFunction{VariantIndex<2>{}, std::move(params)});
|
|
return NS_OK;
|
|
}
|
|
|
|
base::ProcessId OtherPid() const { return mOtherPid; }
|
|
|
|
[[nodiscard]] RefPtr<ChildEndpointPromise> AttachStreamFilter(
|
|
base::ProcessId aChildProcessId);
|
|
|
|
// Serializes all data needed to setup the new replacement channel
|
|
// in the content process into the RedirectToRealChannelArgs struct.
|
|
void SerializeRedirectData(RedirectToRealChannelArgs& aArgs,
|
|
bool aIsCrossProcess, uint32_t aRedirectFlags,
|
|
uint32_t aLoadFlags,
|
|
dom::ContentParent* aParent) const;
|
|
|
|
uint64_t GetLoadIdentifier() const { return mLoadIdentifier; }
|
|
dom::CanonicalBrowsingContext* GetBrowsingContext() const;
|
|
|
|
uint32_t GetLoadType() const { return mLoadStateLoadType; }
|
|
|
|
protected:
|
|
virtual ~DocumentLoadListener();
|
|
|
|
private:
|
|
RefPtr<OpenPromise> OpenInParent(nsDocShellLoadState* aLoadState,
|
|
uint64_t aOuterWindowId,
|
|
bool aSupportsRedirectToRealChannel);
|
|
|
|
friend class ParentProcessDocumentOpenInfo;
|
|
// Will reject the promise to notify the DLL consumer that we are done.
|
|
void DisconnectListeners(nsresult aStatus, nsresult aLoadGroupStatus,
|
|
bool aSwitchedProcess = false);
|
|
|
|
// Called when we were created without a document channel, and creation has
|
|
// failed, and won't ever be attached.
|
|
void NotifyDocumentChannelFailed();
|
|
|
|
// Initiates the switch from DocumentChannel to the real protocol-specific
|
|
// channel, and ensures that RedirectToRealChannelFinished is called when
|
|
// this is complete.
|
|
void TriggerRedirectToRealChannel(const Maybe<uint64_t>& aDestinationProcess);
|
|
|
|
// Called once the content-process side on setting up a replacement
|
|
// channel is complete. May wait for the new parent channel to
|
|
// finish, and then calls into FinishReplacementChannelSetup.
|
|
void RedirectToRealChannelFinished(nsresult aRv);
|
|
|
|
// Completes the replacement of the new channel.
|
|
// This redirects the ParentChannelListener to forward any future
|
|
// messages to the new channel, manually forwards any being held
|
|
// by us, and resumes the underlying source channel.
|
|
void FinishReplacementChannelSetup(nsresult aResult);
|
|
|
|
// Called from `OnStartRequest` to make the decision about whether or not to
|
|
// change process. This method will return `nullptr` if the current target
|
|
// process is appropriate.
|
|
// aWillSwitchToRemote is set to true if we initiate a process switch,
|
|
// and that the new remote type will be something other than NOT_REMOTE
|
|
bool MaybeTriggerProcessSwitch(bool* aWillSwitchToRemote);
|
|
|
|
// A helper for TriggerRedirectToRealChannel that abstracts over
|
|
// the same-process and cross-process switch cases and returns
|
|
// a single promise to wait on.
|
|
using ParentEndpoint = ipc::Endpoint<extensions::PStreamFilterParent>;
|
|
RefPtr<PDocumentChannelParent::RedirectToRealChannelPromise>
|
|
RedirectToRealChannel(uint32_t aRedirectFlags, uint32_t aLoadFlags,
|
|
const Maybe<uint64_t>& aDestinationProcess,
|
|
nsTArray<ParentEndpoint>&& aStreamFilterEndpoints);
|
|
|
|
// A helper for RedirectToRealChannel that handles the case where we started
|
|
// from a content process and are process switching into the parent process.
|
|
RefPtr<PDocumentChannelParent::RedirectToRealChannelPromise>
|
|
RedirectToParentProcess(uint32_t aRedirectFlags, uint32_t aLoadFlags);
|
|
|
|
// Construct a LoadInfo object to use for the internal channel.
|
|
already_AddRefed<LoadInfo> CreateLoadInfo(
|
|
dom::CanonicalBrowsingContext* aBrowsingContext,
|
|
nsDocShellLoadState* aLoadState, uint64_t aOuterWindowId);
|
|
|
|
void AddURIVisit(nsIChannel* aChannel, uint32_t aLoadFlags);
|
|
bool HasCrossOriginOpenerPolicyMismatch() const;
|
|
void ApplyPendingFunctions(nsIParentChannel* aChannel) const;
|
|
|
|
void Disconnect();
|
|
|
|
void MaybeReportBlockedByURLClassifier(nsresult aStatus);
|
|
|
|
// Returns true if a channel with aStatus will display
|
|
// some sort of content (could be the actual channel data,
|
|
// attempt a uri fixup and new load, or an error page).
|
|
// Returns false if the docshell will ignore the load entirely.
|
|
bool DocShellWillDisplayContent(nsresult aStatus);
|
|
|
|
// Returns true if this is a failed load, where we have successfully
|
|
// created a fixed URI to attempt loading instead.
|
|
// If successful, this calls DisconnectListeners to completely finish
|
|
// the current load, and calls BrowsingContext::LoadURI to start the new one.
|
|
bool MaybeHandleLoadErrorWithURIFixup(nsresult aStatus);
|
|
|
|
// This defines a variant that describes all the attribute setters (and their
|
|
// parameters) from nsIParentChannel
|
|
//
|
|
// NotifyFlashPluginStateChanged(nsIHttpChannel::FlashPluginState aState) = 0;
|
|
// SetClassifierMatchedInfo(const nsACString& aList, const nsACString&
|
|
// aProvider, const nsACString& aFullHash) = 0;
|
|
// SetClassifierMatchedTrackingInfo(const nsACString& aLists, const
|
|
// nsACString& aFullHashes) = 0; NotifyClassificationFlags(uint32_t
|
|
// aClassificationFlags, bool aIsThirdParty) = 0;
|
|
struct ClassifierMatchedInfoParams {
|
|
nsCString mList;
|
|
nsCString mProvider;
|
|
nsCString mFullHash;
|
|
};
|
|
|
|
struct ClassifierMatchedTrackingInfoParams {
|
|
nsCString mLists;
|
|
nsCString mFullHashes;
|
|
};
|
|
|
|
struct ClassificationFlagsParams {
|
|
uint32_t mClassificationFlags;
|
|
bool mIsThirdParty;
|
|
};
|
|
|
|
typedef mozilla::Variant<
|
|
nsIHttpChannel::FlashPluginState, ClassifierMatchedInfoParams,
|
|
ClassifierMatchedTrackingInfoParams, ClassificationFlagsParams>
|
|
IParentChannelFunction;
|
|
|
|
// Store a list of all the attribute setters that have been called on this
|
|
// channel, so that we can repeat them on the real channel that we redirect
|
|
// to.
|
|
nsTArray<IParentChannelFunction> mIParentChannelFunctions;
|
|
|
|
// This defines a variant this describes all the functions
|
|
// from HttpChannelSecurityWarningReporter so that we can forward
|
|
// them on to the real channel.
|
|
|
|
struct ReportSecurityMessageParams {
|
|
nsString mMessageTag;
|
|
nsString mMessageCategory;
|
|
};
|
|
|
|
struct LogBlockedCORSRequestParams {
|
|
nsString mMessage;
|
|
nsCString mCategory;
|
|
};
|
|
|
|
struct LogMimeTypeMismatchParams {
|
|
nsCString mMessageName;
|
|
bool mWarning;
|
|
nsString mURL;
|
|
nsString mContentType;
|
|
};
|
|
|
|
typedef mozilla::Variant<ReportSecurityMessageParams,
|
|
LogBlockedCORSRequestParams,
|
|
LogMimeTypeMismatchParams>
|
|
SecurityWarningFunction;
|
|
nsTArray<SecurityWarningFunction> mSecurityWarningFunctions;
|
|
|
|
struct OnStartRequestParams {
|
|
nsCOMPtr<nsIRequest> request;
|
|
};
|
|
struct OnDataAvailableParams {
|
|
nsCOMPtr<nsIRequest> request;
|
|
nsCString data;
|
|
uint64_t offset;
|
|
uint32_t count;
|
|
};
|
|
struct OnStopRequestParams {
|
|
nsCOMPtr<nsIRequest> request;
|
|
nsresult status;
|
|
};
|
|
struct OnAfterLastPartParams {
|
|
nsresult status;
|
|
};
|
|
typedef mozilla::Variant<OnStartRequestParams, OnDataAvailableParams,
|
|
OnStopRequestParams, OnAfterLastPartParams>
|
|
StreamListenerFunction;
|
|
// TODO Backtrack this.
|
|
// The set of nsIStreamListener functions that got called on this
|
|
// listener, so that we can replay them onto the replacement channel's
|
|
// listener. This should generally only be OnStartRequest, since we
|
|
// Suspend() the channel at that point, but it can fail sometimes
|
|
// so we have to support holding a list.
|
|
nsTArray<StreamListenerFunction> mStreamListenerFunctions;
|
|
|
|
nsCOMPtr<nsIChannel> mChannel;
|
|
|
|
// An instance of ParentChannelListener that we use as a listener
|
|
// between mChannel (and any future redirected mChannels) and us.
|
|
// This handles service worker interception, and retargetting
|
|
// OnDataAvailable/OnStopRequest messages onto the listener that
|
|
// replaces us.
|
|
RefPtr<ParentChannelListener> mParentChannelListener;
|
|
|
|
// The original URI of the current channel. If there are redirects,
|
|
// then the value on the channel gets overwritten with the original
|
|
// URI of the first channel in the redirect chain, so we cache the
|
|
// value we need here.
|
|
nsCOMPtr<nsIURI> mChannelCreationURI;
|
|
|
|
// The original navigation timing information containing various timestamps
|
|
// such as when the original load started.
|
|
// This will be passed back to the new content process should a process
|
|
// switch occurs.
|
|
RefPtr<nsDOMNavigationTiming> mTiming;
|
|
|
|
// Used to identify an internal redirect in redirect chain.
|
|
// True when we have seen at least one non-interal redirect.
|
|
bool mHaveVisibleRedirect = false;
|
|
|
|
nsTArray<StreamFilterRequest> mStreamFilterRequests;
|
|
|
|
nsString mSrcdocData;
|
|
nsCOMPtr<nsIURI> mBaseURI;
|
|
|
|
mozilla::UniquePtr<mozilla::dom::SessionHistoryInfo> mSessionHistoryInfo;
|
|
|
|
// Flags from nsDocShellLoadState::LoadFlags/Type that we want to make
|
|
// available to the new docshell if we switch processes.
|
|
uint32_t mLoadStateLoadFlags = 0;
|
|
uint32_t mLoadStateLoadType = 0;
|
|
|
|
// Corresponding redirect channel registrar Id for the final channel that
|
|
// we want to use when redirecting the child, or doing a process switch.
|
|
// 0 means redirection is not started.
|
|
uint64_t mRedirectChannelId = 0;
|
|
// Set to true once we initiate the redirect to a real channel (either
|
|
// via a process switch or a same-process redirect, and Suspend the
|
|
// underlying channel.
|
|
bool mInitiatedRedirectToRealChannel = false;
|
|
// Set to true if we're currently in the middle of replacing this with
|
|
// a new channel connected a different process.
|
|
bool mDoingProcessSwitch = false;
|
|
// The value of GetApplyConversion on mChannel when OnStartRequest
|
|
// was called. We override it to false to prevent a conversion
|
|
// helper from being installed, but we need to restore the value
|
|
// later.
|
|
bool mOldApplyConversion = false;
|
|
// Set to true if any previous channel that we redirected away
|
|
// from had a COOP mismatch.
|
|
bool mHasCrossOriginOpenerPolicyMismatch = false;
|
|
// Set to true if we've received OnStopRequest, and shouldn't
|
|
// setup a reference from the ParentChannelListener to the replacement
|
|
// channel.
|
|
bool mIsFinished = false;
|
|
|
|
// The id of the currently pending load which is
|
|
// passed to the childChannel in order to identify it in the new process.
|
|
uint64_t mLoadIdentifier = 0;
|
|
|
|
Maybe<nsCString> mOriginalUriString;
|
|
|
|
bool mSupportsRedirectToRealChannel = true;
|
|
|
|
// The process id of the content process that we are being called from
|
|
// or 0 initiated from a parent process load.
|
|
base::ProcessId mOtherPid = 0;
|
|
|
|
void RejectOpenPromise(nsresult aStatus, nsresult aLoadGroupStatus,
|
|
bool aSwitchedProcess, const char* aLocation) {
|
|
// It is possible for mOpenPromise to not be set if AsyncOpen failed and
|
|
// the DocumentChannel got canceled.
|
|
if (!mOpenPromiseResolved && mOpenPromise) {
|
|
mOpenPromise->Reject(
|
|
OpenPromiseFailedType({aStatus, aLoadGroupStatus, aSwitchedProcess}),
|
|
aLocation);
|
|
mOpenPromiseResolved = true;
|
|
}
|
|
}
|
|
RefPtr<OpenPromise::Private> mOpenPromise;
|
|
bool mOpenPromiseResolved = false;
|
|
};
|
|
|
|
NS_DEFINE_STATIC_IID_ACCESSOR(DocumentLoadListener, DOCUMENT_LOAD_LISTENER_IID)
|
|
|
|
inline nsISupports* ToSupports(DocumentLoadListener* aObj) {
|
|
return static_cast<nsIInterfaceRequestor*>(aObj);
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|
|
|
|
#endif // mozilla_net_DocumentChannelParent_h
|