author Makoto Kato <m_kato@ga2.so-net.ne.jp>
Tue, 29 Dec 2015 22:57:38 +0900
changeset 315134 4cd8ab65dd297c2730b7237690eebd5d6a66cf69
parent 297642 2b6f2b470f955ea5d46f331faa75d8eedfb4c9f5
permissions -rw-r--r--
Bug 1208944 - Part 2-b. Workaround for OSX. r=masayuki

/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
 * You can obtain one at http://mozilla.org/MPL/2.0/. */

"use strict";

const {classes: Cc, interfaces: Ci, utils: Cu, results: Cr} = Components;


XPCOMUtils.defineLazyServiceGetter(this, "cpmm",

XPCOMUtils.defineLazyServiceGetter(this, "contentSecManager",

this.EXPORTED_SYMBOLS = ["ActivityChannel"];

this.ActivityChannel = function(aURI, aLoadInfo, aName, aDetails) {
  this._activityName = aName;
  this._activityDetails = aDetails;
  this.originalURI = aURI;
  this.URI = aURI;
  this.loadInfo = aLoadInfo;

this.ActivityChannel.prototype = {
  originalURI: null,
  URI: null,
  owner: null,
  notificationCallbacks: null,
  securityInfo: null,
  contentType: null,
  contentCharset: null,
  contentLength: 0,
  contentDisposition: Ci.nsIChannel.DISPOSITION_INLINE,
  contentDispositionFilename: null,
  contentDispositionHeader: null,
  loadInfo: null,

  open: function() {

  open2: function() {

  asyncOpen: function(aListener, aContext) {
    cpmm.sendAsyncMessage(this._activityName, this._activityDetails);
    // Let the listener cleanup.
    aListener.onStopRequest(this, aContext, Cr.NS_OK);

  asyncOpen2: function(aListener) {
    // throws an error if security checks fail
    var outListener = contentSecManager.performSecurityCheck(this, aListener);
    this.asyncOpen(outListener, null);

  QueryInterface2: XPCOMUtils.generateQI([Ci.nsIChannel])