| // third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom.cc is auto generated by mojom_bindings_generator.py, do not edit |
| |
| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #if defined(__clang__) |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wunused-private-field" |
| #endif |
| |
| #include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom.h" |
| |
| #include <math.h> |
| #include <stdint.h> |
| #include <utility> |
| |
| #include "base/debug/alias.h" |
| #include "base/hash/md5_constexpr.h" |
| #include "base/run_loop.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/trace_event/trace_event.h" |
| #include "base/trace_event/typed_macros.h" |
| #include "mojo/public/cpp/bindings/lib/generated_code_util.h" |
| #include "mojo/public/cpp/bindings/lib/message_internal.h" |
| #include "mojo/public/cpp/bindings/lib/send_message_helper.h" |
| #include "mojo/public/cpp/bindings/lib/proxy_to_responder.h" |
| #include "mojo/public/cpp/bindings/lib/serialization_util.h" |
| #include "mojo/public/cpp/bindings/lib/unserialized_message_context.h" |
| #include "mojo/public/cpp/bindings/lib/validate_params.h" |
| #include "mojo/public/cpp/bindings/lib/validation_errors.h" |
| #include "mojo/public/cpp/bindings/mojo_buildflags.h" |
| #include "mojo/public/interfaces/bindings/interface_control_messages.mojom.h" |
| #include "third_party/perfetto/include/perfetto/tracing/traced_value.h" |
| |
| #include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-params-data.h" |
| #include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-shared-message-ids.h" |
| |
| #include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-import-headers.h" |
| #include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-test-utils.h" |
| |
| |
| #ifndef THIRD_PARTY_BLINK_PUBLIC_MOJOM_FILE_SYSTEM_ACCESS_FILE_SYSTEM_ACCESS_DATA_TRANSFER_TOKEN_MOJOM_JUMBO_H_ |
| #define THIRD_PARTY_BLINK_PUBLIC_MOJOM_FILE_SYSTEM_ACCESS_FILE_SYSTEM_ACCESS_DATA_TRANSFER_TOKEN_MOJOM_JUMBO_H_ |
| #endif |
| |
| |
| |
| namespace blink { |
| namespace mojom { |
| const char FileSystemAccessDataTransferToken::Name_[] = "blink.mojom.FileSystemAccessDataTransferToken"; |
| |
| std::pair<uint32_t, const void*> FileSystemAccessDataTransferToken::MessageToMethodInfo_(mojo::Message& message) { |
| switch (message.name()) { |
| case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: { |
| constexpr uint32_t value = base::MD5Hash32Constexpr( |
| "(Impl)blink::mojom::FileSystemAccessDataTransferToken::GetInternalId"); |
| #if BUILDFLAG(IS_FUCHSIA) |
| return std::make_pair(value, nullptr); |
| #else |
| return std::make_pair(value, reinterpret_cast<const void*>(&FileSystemAccessDataTransferToken::GetInternalId_Sym::IPCSymbol)); |
| #endif // BUILDFLAG(IS_FUCHSIA) |
| } |
| case internal::kFileSystemAccessDataTransferToken_Clone_Name: { |
| constexpr uint32_t value = base::MD5Hash32Constexpr( |
| "(Impl)blink::mojom::FileSystemAccessDataTransferToken::Clone"); |
| #if BUILDFLAG(IS_FUCHSIA) |
| return std::make_pair(value, nullptr); |
| #else |
| return std::make_pair(value, reinterpret_cast<const void*>(&FileSystemAccessDataTransferToken::Clone_Sym::IPCSymbol)); |
| #endif // BUILDFLAG(IS_FUCHSIA) |
| } |
| } |
| return std::make_pair(0, nullptr); |
| } |
| |
| |
| const char* FileSystemAccessDataTransferToken::MessageToMethodName_(mojo::Message& message) { |
| #if BUILDFLAG(MOJO_TRACE_ENABLED) |
| bool is_response = message.has_flag(mojo::Message::kFlagIsResponse); |
| if (!is_response) { |
| switch (message.name()) { |
| case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: |
| return "Receive blink::mojom::FileSystemAccessDataTransferToken::GetInternalId"; |
| case internal::kFileSystemAccessDataTransferToken_Clone_Name: |
| return "Receive blink::mojom::FileSystemAccessDataTransferToken::Clone"; |
| } |
| } else { |
| switch (message.name()) { |
| case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: |
| return "Receive reply blink::mojom::FileSystemAccessDataTransferToken::GetInternalId"; |
| case internal::kFileSystemAccessDataTransferToken_Clone_Name: |
| return "Receive reply blink::mojom::FileSystemAccessDataTransferToken::Clone"; |
| } |
| } |
| return "Receive unknown mojo message"; |
| #else |
| bool is_response = message.has_flag(mojo::Message::kFlagIsResponse); |
| if (is_response) { |
| return "Receive mojo reply"; |
| } else { |
| return "Receive mojo message"; |
| } |
| #endif // BUILDFLAG(MOJO_TRACE_ENABLED) |
| } |
| |
| #if !BUILDFLAG(IS_FUCHSIA) |
| void FileSystemAccessDataTransferToken::GetInternalId_Sym::IPCSymbol() { |
| // This method's address is used for indetifiying the mojo method name after |
| // symblozation. So each IPCSymbol should have a unique address. |
| NO_CODE_FOLDING(); |
| } |
| void FileSystemAccessDataTransferToken::Clone_Sym::IPCSymbol() { |
| // This method's address is used for indetifiying the mojo method name after |
| // symblozation. So each IPCSymbol should have a unique address. |
| NO_CODE_FOLDING(); |
| } |
| # endif // !BUILDFLAG(IS_FUCHSIA) |
| |
| class FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback |
| : public mojo::MessageReceiver { |
| public: |
| FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback( |
| FileSystemAccessDataTransferToken::GetInternalIdCallback callback |
| ) : callback_(std::move(callback)) { |
| } |
| |
| FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback(const FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback&) = delete; |
| FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback& operator=(const FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback&) = delete; |
| |
| bool Accept(mojo::Message* message) override; |
| private: |
| FileSystemAccessDataTransferToken::GetInternalIdCallback callback_; |
| }; |
| |
| FileSystemAccessDataTransferTokenProxy::FileSystemAccessDataTransferTokenProxy(mojo::MessageReceiverWithResponder* receiver) |
| : receiver_(receiver) { |
| } |
| |
| void FileSystemAccessDataTransferTokenProxy::GetInternalId( |
| GetInternalIdCallback callback) { |
| #if BUILDFLAG(MOJO_TRACE_ENABLED) |
| TRACE_EVENT0("mojom", "Send blink::mojom::FileSystemAccessDataTransferToken::GetInternalId"); |
| #endif |
| const bool kExpectsResponse = true; |
| const bool kIsSync = false; |
| const bool kAllowInterrupt = true; |
| |
| const uint32_t kFlags = |
| ((kExpectsResponse) ? mojo::Message::kFlagExpectsResponse : 0) | |
| ((kIsSync) ? mojo::Message::kFlagIsSync : 0) | |
| ((kAllowInterrupt) ? 0 : mojo::Message::kFlagNoInterrupt); |
| |
| mojo::Message message( |
| internal::kFileSystemAccessDataTransferToken_GetInternalId_Name, kFlags, 0, 0, nullptr); |
| mojo::internal::MessageFragment< |
| ::blink::mojom::internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data> params( |
| message); |
| params.Allocate(); |
| |
| #if defined(ENABLE_IPC_FUZZER) |
| message.set_interface_name(FileSystemAccessDataTransferToken::Name_); |
| message.set_method_name("GetInternalId"); |
| #endif |
| std::unique_ptr<mojo::MessageReceiver> responder( |
| new FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback( |
| std::move(callback))); |
| ::mojo::internal::SendMessage(*receiver_, message, std::move(responder)); |
| } |
| |
| void FileSystemAccessDataTransferTokenProxy::Clone( |
| ::mojo::PendingReceiver<FileSystemAccessDataTransferToken> in_token_clone) { |
| #if BUILDFLAG(MOJO_TRACE_ENABLED) |
| TRACE_EVENT1( |
| "mojom", "Send blink::mojom::FileSystemAccessDataTransferToken::Clone", "input_parameters", |
| [&](perfetto::TracedValue context){ |
| auto dict = std::move(context).WriteDictionary(); |
| perfetto::WriteIntoTracedValueWithFallback( |
| dict.AddItem("token_clone"), in_token_clone, |
| "<value of type ::mojo::PendingReceiver<FileSystemAccessDataTransferToken>>"); |
| }); |
| #endif |
| const bool kExpectsResponse = false; |
| const bool kIsSync = false; |
| const bool kAllowInterrupt = true; |
| |
| const uint32_t kFlags = |
| ((kExpectsResponse) ? mojo::Message::kFlagExpectsResponse : 0) | |
| ((kIsSync) ? mojo::Message::kFlagIsSync : 0) | |
| ((kAllowInterrupt) ? 0 : mojo::Message::kFlagNoInterrupt); |
| |
| mojo::Message message( |
| internal::kFileSystemAccessDataTransferToken_Clone_Name, kFlags, 0, 0, nullptr); |
| mojo::internal::MessageFragment< |
| ::blink::mojom::internal::FileSystemAccessDataTransferToken_Clone_Params_Data> params( |
| message); |
| params.Allocate(); |
| mojo::internal::Serialize<mojo::InterfaceRequestDataView<::blink::mojom::FileSystemAccessDataTransferTokenInterfaceBase>>( |
| in_token_clone, ¶ms->token_clone, ¶ms.message()); |
| MOJO_INTERNAL_DLOG_SERIALIZATION_WARNING( |
| !mojo::internal::IsHandleOrInterfaceValid(params->token_clone), |
| mojo::internal::VALIDATION_ERROR_UNEXPECTED_INVALID_HANDLE, |
| "invalid token_clone in FileSystemAccessDataTransferToken.Clone request"); |
| |
| #if defined(ENABLE_IPC_FUZZER) |
| message.set_interface_name(FileSystemAccessDataTransferToken::Name_); |
| message.set_method_name("Clone"); |
| #endif |
| // This return value may be ignored as false implies the Connector has |
| // encountered an error, which will be visible through other means. |
| ::mojo::internal::SendMessage(*receiver_, message); |
| } |
| class FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder : public ::mojo::internal::ProxyToResponder { |
| public: |
| static FileSystemAccessDataTransferToken::GetInternalIdCallback CreateCallback( |
| ::mojo::Message& message, |
| std::unique_ptr<mojo::MessageReceiverWithStatus> responder) { |
| std::unique_ptr<FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder> proxy( |
| new FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder( |
| message, std::move(responder))); |
| return base::BindOnce(&FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder::Run, |
| std::move(proxy)); |
| } |
| |
| ~FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder() { |
| #if DCHECK_IS_ON() |
| if (responder_) { |
| // If we're being destroyed without being run, we want to ensure the |
| // binding endpoint has been closed. This checks for that asynchronously. |
| // We pass a bound generated callback to handle the response so that any |
| // resulting DCHECK stack will have useful interface type information. |
| responder_->IsConnectedAsync(base::BindOnce(&OnIsConnectedComplete)); |
| } |
| #endif |
| } |
| |
| private: |
| FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder( |
| ::mojo::Message& message, |
| std::unique_ptr<mojo::MessageReceiverWithStatus> responder) |
| : ::mojo::internal::ProxyToResponder(message, std::move(responder)) { |
| } |
| |
| #if DCHECK_IS_ON() |
| static void OnIsConnectedComplete(bool connected) { |
| DCHECK(!connected) |
| << "FileSystemAccessDataTransferToken::GetInternalIdCallback was destroyed without " |
| << "first either being run or its corresponding binding being closed. " |
| << "It is an error to drop response callbacks which still correspond " |
| << "to an open interface pipe."; |
| } |
| #endif |
| |
| void Run( |
| const ::base::UnguessableToken& in_id); |
| }; |
| |
| bool FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback::Accept( |
| mojo::Message* message) { |
| |
| DCHECK(message->is_serialized()); |
| internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data* params = |
| reinterpret_cast< |
| internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data*>( |
| message->mutable_payload()); |
| |
| bool success = true; |
| ::base::UnguessableToken p_id{}; |
| FileSystemAccessDataTransferToken_GetInternalId_ResponseParamsDataView input_data_view(params, message); |
| |
| if (success && !input_data_view.ReadId(&p_id)) |
| success = false; |
| if (!success) { |
| ReportValidationErrorForMessage( |
| message, |
| mojo::internal::VALIDATION_ERROR_DESERIALIZATION_FAILED, |
| FileSystemAccessDataTransferToken::Name_, 0, true); |
| return false; |
| } |
| if (!callback_.is_null()) |
| std::move(callback_).Run( |
| std::move(p_id)); |
| return true; |
| } |
| |
| void FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder::Run( |
| const ::base::UnguessableToken& in_id) { |
| #if BUILDFLAG(MOJO_TRACE_ENABLED) |
| TRACE_EVENT1( |
| "mojom", "Send reply blink::mojom::FileSystemAccessDataTransferToken::GetInternalId", "async_response_parameters", |
| [&](perfetto::TracedValue context){ |
| auto dict = std::move(context).WriteDictionary(); |
| perfetto::WriteIntoTracedValueWithFallback( |
| dict.AddItem("id"), in_id, |
| "<value of type const ::base::UnguessableToken&>"); |
| }); |
| #endif |
| |
| const uint32_t kFlags = mojo::Message::kFlagIsResponse | |
| ((is_sync_) ? mojo::Message::kFlagIsSync : 0) | |
| ((true) ? 0 : mojo::Message::kFlagNoInterrupt); |
| |
| mojo::Message message( |
| internal::kFileSystemAccessDataTransferToken_GetInternalId_Name, kFlags, 0, 0, nullptr); |
| mojo::internal::MessageFragment< |
| ::blink::mojom::internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data> params( |
| message); |
| params.Allocate(); |
| mojo::internal::MessageFragment< |
| typename decltype(params->id)::BaseType> id_fragment( |
| params.message()); |
| mojo::internal::Serialize<::mojo_base::mojom::UnguessableTokenDataView>( |
| in_id, id_fragment); |
| params->id.Set( |
| id_fragment.is_null() ? nullptr : id_fragment.data()); |
| MOJO_INTERNAL_DLOG_SERIALIZATION_WARNING( |
| params->id.is_null(), |
| mojo::internal::VALIDATION_ERROR_UNEXPECTED_NULL_POINTER, |
| "null id in "); |
| |
| #if defined(ENABLE_IPC_FUZZER) |
| message.set_interface_name(FileSystemAccessDataTransferToken::Name_); |
| message.set_method_name("GetInternalId"); |
| #endif |
| |
| message.set_request_id(request_id_); |
| message.set_trace_nonce(trace_nonce_); |
| ::mojo::internal::SendMessage(*responder_, message); |
| // SendMessage fails silently if the responder connection is closed, |
| // or if the message is malformed. |
| // |
| // TODO(darin): If Accept() returns false due to a malformed message, that |
| // may be good reason to close the connection. However, we don't have a |
| // way to do that from here. We should add a way. |
| responder_ = nullptr; |
| } |
| |
| // static |
| bool FileSystemAccessDataTransferTokenStubDispatch::Accept( |
| FileSystemAccessDataTransferToken* impl, |
| mojo::Message* message) { |
| switch (message->header()->name) { |
| case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: { |
| break; |
| } |
| case internal::kFileSystemAccessDataTransferToken_Clone_Name: { |
| |
| DCHECK(message->is_serialized()); |
| internal::FileSystemAccessDataTransferToken_Clone_Params_Data* params = |
| reinterpret_cast<internal::FileSystemAccessDataTransferToken_Clone_Params_Data*>( |
| message->mutable_payload()); |
| |
| bool success = true; |
| ::mojo::PendingReceiver<FileSystemAccessDataTransferToken> p_token_clone{}; |
| FileSystemAccessDataTransferToken_Clone_ParamsDataView input_data_view(params, message); |
| |
| if (success) { |
| p_token_clone = |
| input_data_view.TakeTokenClone<decltype(p_token_clone)>(); |
| } |
| if (!success) { |
| ReportValidationErrorForMessage( |
| message, |
| mojo::internal::VALIDATION_ERROR_DESERIALIZATION_FAILED, |
| FileSystemAccessDataTransferToken::Name_, 1, false); |
| return false; |
| } |
| // A null |impl| means no implementation was bound. |
| DCHECK(impl); |
| impl->Clone( |
| std::move(p_token_clone)); |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| // static |
| bool FileSystemAccessDataTransferTokenStubDispatch::AcceptWithResponder( |
| FileSystemAccessDataTransferToken* impl, |
| mojo::Message* message, |
| std::unique_ptr<mojo::MessageReceiverWithStatus> responder) { |
| [[maybe_unused]] const bool message_is_sync = |
| message->has_flag(mojo::Message::kFlagIsSync); |
| [[maybe_unused]] const uint64_t request_id = message->request_id(); |
| switch (message->header()->name) { |
| case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: { |
| |
| internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data* params = |
| reinterpret_cast< |
| internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data*>( |
| message->mutable_payload()); |
| |
| bool success = true; |
| FileSystemAccessDataTransferToken_GetInternalId_ParamsDataView input_data_view(params, message); |
| |
| if (!success) { |
| ReportValidationErrorForMessage( |
| message, |
| mojo::internal::VALIDATION_ERROR_DESERIALIZATION_FAILED, |
| FileSystemAccessDataTransferToken::Name_, 0, false); |
| return false; |
| } |
| FileSystemAccessDataTransferToken::GetInternalIdCallback callback = |
| FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder::CreateCallback( |
| *message, std::move(responder)); |
| // A null |impl| means no implementation was bound. |
| DCHECK(impl); |
| impl->GetInternalId(std::move(callback)); |
| return true; |
| } |
| case internal::kFileSystemAccessDataTransferToken_Clone_Name: { |
| break; |
| } |
| } |
| return false; |
| } |
| |
| |
| static const mojo::internal::GenericValidationInfo kFileSystemAccessDataTransferTokenValidationInfo[] = { |
| {&internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data::Validate, |
| &internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data::Validate}, |
| {&internal::FileSystemAccessDataTransferToken_Clone_Params_Data::Validate, |
| nullptr /* no response */}, |
| }; |
| |
| bool FileSystemAccessDataTransferTokenRequestValidator::Accept(mojo::Message* message) { |
| const char* name = ::blink::mojom::FileSystemAccessDataTransferToken::Name_; |
| return mojo::internal::ValidateRequestGenericPacked(message, name, kFileSystemAccessDataTransferTokenValidationInfo); |
| } |
| |
| bool FileSystemAccessDataTransferTokenResponseValidator::Accept(mojo::Message* message) { |
| const char* name = ::blink::mojom::FileSystemAccessDataTransferToken::Name_; |
| return mojo::internal::ValidateResponseGenericPacked(message, name, kFileSystemAccessDataTransferTokenValidationInfo); |
| } |
| |
| |
| } // namespace mojom |
| } // namespace blink |
| |
| |
| namespace mojo { |
| |
| } // namespace mojo |
| |
| |
| // Symbols declared in the -test-utils.h header are defined here instead of a |
| // separate .cc file to save compile time. |
| |
| |
| namespace blink { |
| namespace mojom { |
| |
| |
| void FileSystemAccessDataTransferTokenInterceptorForTesting::GetInternalId(GetInternalIdCallback callback) { |
| GetForwardingInterface()->GetInternalId(std::move(callback)); |
| } |
| void FileSystemAccessDataTransferTokenInterceptorForTesting::Clone(::mojo::PendingReceiver<FileSystemAccessDataTransferToken> token_clone) { |
| GetForwardingInterface()->Clone(std::move(token_clone)); |
| } |
| FileSystemAccessDataTransferTokenAsyncWaiter::FileSystemAccessDataTransferTokenAsyncWaiter( |
| FileSystemAccessDataTransferToken* proxy) : proxy_(proxy) {} |
| |
| FileSystemAccessDataTransferTokenAsyncWaiter::~FileSystemAccessDataTransferTokenAsyncWaiter() = default; |
| |
| void FileSystemAccessDataTransferTokenAsyncWaiter::GetInternalId( |
| ::base::UnguessableToken* out_id) { |
| base::RunLoop loop; |
| proxy_->GetInternalId( |
| base::BindOnce( |
| [](base::RunLoop* loop, |
| ::base::UnguessableToken* out_id |
| , |
| const ::base::UnguessableToken& id) {*out_id = std::move(id); |
| loop->Quit(); |
| }, |
| &loop, |
| out_id)); |
| loop.Run(); |
| } |
| |
| |
| |
| |
| |
| } // namespace mojom |
| } // namespace blink |
| |
| |
| #if defined(__clang__) |
| #pragma clang diagnostic pop |
| #endif |