author Andrea Marchesini <>
Thu, 14 Mar 2019 17:47:59 +0000
changeset 521915 a0c8d47ee188ee72fb0896dd80b02076f9bcafb5
parent 521851 4d0c32fbf17c2146a1c1a51afc458de79c10b705
permissions -rw-r--r--
Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 1 - Classification flags in nsIHttpChannel, r=valentin,dimi Differential Revision:

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set sw=2 ts=8 et tw=80 : */

/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at */

#ifndef mozilla_net_TrackingDummyChannel_h
#define mozilla_net_TrackingDummyChannel_h

#include "nsIChannel.h"
#include <functional>

#define TRACKING_DUMMY_CHANNEL_IID                   \
  {                                                  \
    0x70ceb97d, 0xbfa6, 0x4255, {                    \
      0xb7, 0x08, 0xe1, 0xb4, 0x4a, 0x1e, 0x0e, 0x9a \
    }                                                \

class nsIChannel;

namespace mozilla {
namespace net {

 * In child intercept mode, the decision to intercept a channel is made in the
 * child process without consulting the parent process.  The decision is based
 * on whether there is a ServiceWorker with a scope covering the URL in question
 * and whether storage is allowed for the origin/URL.  When the
 * "network.cookie.cookieBehavior" preference is set to BEHAVIOR_REJECT_TRACKER,
 * annotated channels are denied storage which means that the ServiceWorker
 * should not intercept the channel.  However, the decision for tracking
 * protection to annotate a channel only occurs in the parent process.  The
 * dummy channel is a hack to allow the intercept decision process to ask the
 * parent process if the channel should be annotated.  Because this round-trip
 * to the parent has overhead, the dummy channel is only created 1) if the
 * ServiceWorker initially determines that the channel should be intercepted and
 * 2) it's a navigation request.
 * This hack can be removed once Bug 1231208's new "parent intercept" mechanism
 * fully lands, the pref is enabled by default it stays enabled for long enough
 * to be confident we will never need/want to turn it off.  Then as part of bug
 * 1496997 we can remove this implementation.  Bug 1498259 covers removing this
 * hack in particular.
class TrackingDummyChannel final : public nsIChannel,
                                   public nsIHttpChannelInternal {


  enum StorageAllowedState {

  static StorageAllowedState StorageAllowed(
      nsIChannel* aChannel, const std::function<void(bool)>& aCallback);

  TrackingDummyChannel(nsIURI* aURI, nsIURI* aTopWindowURI,
                       nsresult aTopWindowURIResult, nsILoadInfo* aLoadInfo);

  uint32_t ClassificationFlags() const;

  void AddClassificationFlags(uint32_t);


  nsCOMPtr<nsILoadInfo> mLoadInfo;
  nsCOMPtr<nsIURI> mURI;
  nsCOMPtr<nsIURI> mTopWindowURI;
  nsresult mTopWindowURIResult;

  uint32_t mClassificationFlags;


}  // namespace net
}  // namespace mozilla

#endif  // mozilla_net_TrackingDummyChannel_h