blob: a58847ff06bd10d60b968b2547b61ce50647ce6d [file] [log] [blame]
// third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom.cc is auto generated by mojom_bindings_generator.py, do not edit
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#if defined(__clang__)
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wunused-private-field"
#endif
#include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom.h"
#include <math.h>
#include <stdint.h>
#include <utility>
#include "base/debug/alias.h"
#include "base/hash/md5_constexpr.h"
#include "base/run_loop.h"
#include "base/strings/string_number_conversions.h"
#include "base/trace_event/trace_event.h"
#include "base/trace_event/typed_macros.h"
#include "mojo/public/cpp/bindings/lib/generated_code_util.h"
#include "mojo/public/cpp/bindings/lib/message_internal.h"
#include "mojo/public/cpp/bindings/lib/send_message_helper.h"
#include "mojo/public/cpp/bindings/lib/proxy_to_responder.h"
#include "mojo/public/cpp/bindings/lib/serialization_util.h"
#include "mojo/public/cpp/bindings/lib/unserialized_message_context.h"
#include "mojo/public/cpp/bindings/lib/validate_params.h"
#include "mojo/public/cpp/bindings/lib/validation_errors.h"
#include "mojo/public/cpp/bindings/mojo_buildflags.h"
#include "mojo/public/interfaces/bindings/interface_control_messages.mojom.h"
#include "third_party/perfetto/include/perfetto/tracing/traced_value.h"
#include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-params-data.h"
#include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-shared-message-ids.h"
#include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-import-headers.h"
#include "third_party/blink/public/mojom/file_system_access/file_system_access_data_transfer_token.mojom-test-utils.h"
#ifndef THIRD_PARTY_BLINK_PUBLIC_MOJOM_FILE_SYSTEM_ACCESS_FILE_SYSTEM_ACCESS_DATA_TRANSFER_TOKEN_MOJOM_JUMBO_H_
#define THIRD_PARTY_BLINK_PUBLIC_MOJOM_FILE_SYSTEM_ACCESS_FILE_SYSTEM_ACCESS_DATA_TRANSFER_TOKEN_MOJOM_JUMBO_H_
#endif
namespace blink {
namespace mojom {
const char FileSystemAccessDataTransferToken::Name_[] = "blink.mojom.FileSystemAccessDataTransferToken";
std::pair<uint32_t, const void*> FileSystemAccessDataTransferToken::MessageToMethodInfo_(mojo::Message& message) {
switch (message.name()) {
case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: {
constexpr uint32_t value = base::MD5Hash32Constexpr(
"(Impl)blink::mojom::FileSystemAccessDataTransferToken::GetInternalId");
#if BUILDFLAG(IS_FUCHSIA)
return std::make_pair(value, nullptr);
#else
return std::make_pair(value, reinterpret_cast<const void*>(&FileSystemAccessDataTransferToken::GetInternalId_Sym::IPCSymbol));
#endif // BUILDFLAG(IS_FUCHSIA)
}
case internal::kFileSystemAccessDataTransferToken_Clone_Name: {
constexpr uint32_t value = base::MD5Hash32Constexpr(
"(Impl)blink::mojom::FileSystemAccessDataTransferToken::Clone");
#if BUILDFLAG(IS_FUCHSIA)
return std::make_pair(value, nullptr);
#else
return std::make_pair(value, reinterpret_cast<const void*>(&FileSystemAccessDataTransferToken::Clone_Sym::IPCSymbol));
#endif // BUILDFLAG(IS_FUCHSIA)
}
}
return std::make_pair(0, nullptr);
}
const char* FileSystemAccessDataTransferToken::MessageToMethodName_(mojo::Message& message) {
#if BUILDFLAG(MOJO_TRACE_ENABLED)
bool is_response = message.has_flag(mojo::Message::kFlagIsResponse);
if (!is_response) {
switch (message.name()) {
case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name:
return "Receive blink::mojom::FileSystemAccessDataTransferToken::GetInternalId";
case internal::kFileSystemAccessDataTransferToken_Clone_Name:
return "Receive blink::mojom::FileSystemAccessDataTransferToken::Clone";
}
} else {
switch (message.name()) {
case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name:
return "Receive reply blink::mojom::FileSystemAccessDataTransferToken::GetInternalId";
case internal::kFileSystemAccessDataTransferToken_Clone_Name:
return "Receive reply blink::mojom::FileSystemAccessDataTransferToken::Clone";
}
}
return "Receive unknown mojo message";
#else
bool is_response = message.has_flag(mojo::Message::kFlagIsResponse);
if (is_response) {
return "Receive mojo reply";
} else {
return "Receive mojo message";
}
#endif // BUILDFLAG(MOJO_TRACE_ENABLED)
}
#if !BUILDFLAG(IS_FUCHSIA)
void FileSystemAccessDataTransferToken::GetInternalId_Sym::IPCSymbol() {
// This method's address is used for indetifiying the mojo method name after
// symblozation. So each IPCSymbol should have a unique address.
NO_CODE_FOLDING();
}
void FileSystemAccessDataTransferToken::Clone_Sym::IPCSymbol() {
// This method's address is used for indetifiying the mojo method name after
// symblozation. So each IPCSymbol should have a unique address.
NO_CODE_FOLDING();
}
# endif // !BUILDFLAG(IS_FUCHSIA)
class FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback
: public mojo::MessageReceiver {
public:
FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback(
FileSystemAccessDataTransferToken::GetInternalIdCallback callback
) : callback_(std::move(callback)) {
}
FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback(const FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback&) = delete;
FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback& operator=(const FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback&) = delete;
bool Accept(mojo::Message* message) override;
private:
FileSystemAccessDataTransferToken::GetInternalIdCallback callback_;
};
FileSystemAccessDataTransferTokenProxy::FileSystemAccessDataTransferTokenProxy(mojo::MessageReceiverWithResponder* receiver)
: receiver_(receiver) {
}
void FileSystemAccessDataTransferTokenProxy::GetInternalId(
GetInternalIdCallback callback) {
#if BUILDFLAG(MOJO_TRACE_ENABLED)
TRACE_EVENT0("mojom", "Send blink::mojom::FileSystemAccessDataTransferToken::GetInternalId");
#endif
const bool kExpectsResponse = true;
const bool kIsSync = false;
const bool kAllowInterrupt = true;
const uint32_t kFlags =
((kExpectsResponse) ? mojo::Message::kFlagExpectsResponse : 0) |
((kIsSync) ? mojo::Message::kFlagIsSync : 0) |
((kAllowInterrupt) ? 0 : mojo::Message::kFlagNoInterrupt);
mojo::Message message(
internal::kFileSystemAccessDataTransferToken_GetInternalId_Name, kFlags, 0, 0, nullptr);
mojo::internal::MessageFragment<
::blink::mojom::internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data> params(
message);
params.Allocate();
#if defined(ENABLE_IPC_FUZZER)
message.set_interface_name(FileSystemAccessDataTransferToken::Name_);
message.set_method_name("GetInternalId");
#endif
std::unique_ptr<mojo::MessageReceiver> responder(
new FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback(
std::move(callback)));
::mojo::internal::SendMessage(*receiver_, message, std::move(responder));
}
void FileSystemAccessDataTransferTokenProxy::Clone(
::mojo::PendingReceiver<FileSystemAccessDataTransferToken> in_token_clone) {
#if BUILDFLAG(MOJO_TRACE_ENABLED)
TRACE_EVENT1(
"mojom", "Send blink::mojom::FileSystemAccessDataTransferToken::Clone", "input_parameters",
[&](perfetto::TracedValue context){
auto dict = std::move(context).WriteDictionary();
perfetto::WriteIntoTracedValueWithFallback(
dict.AddItem("token_clone"), in_token_clone,
"<value of type ::mojo::PendingReceiver<FileSystemAccessDataTransferToken>>");
});
#endif
const bool kExpectsResponse = false;
const bool kIsSync = false;
const bool kAllowInterrupt = true;
const uint32_t kFlags =
((kExpectsResponse) ? mojo::Message::kFlagExpectsResponse : 0) |
((kIsSync) ? mojo::Message::kFlagIsSync : 0) |
((kAllowInterrupt) ? 0 : mojo::Message::kFlagNoInterrupt);
mojo::Message message(
internal::kFileSystemAccessDataTransferToken_Clone_Name, kFlags, 0, 0, nullptr);
mojo::internal::MessageFragment<
::blink::mojom::internal::FileSystemAccessDataTransferToken_Clone_Params_Data> params(
message);
params.Allocate();
mojo::internal::Serialize<mojo::InterfaceRequestDataView<::blink::mojom::FileSystemAccessDataTransferTokenInterfaceBase>>(
in_token_clone, &params->token_clone, &params.message());
MOJO_INTERNAL_DLOG_SERIALIZATION_WARNING(
!mojo::internal::IsHandleOrInterfaceValid(params->token_clone),
mojo::internal::VALIDATION_ERROR_UNEXPECTED_INVALID_HANDLE,
"invalid token_clone in FileSystemAccessDataTransferToken.Clone request");
#if defined(ENABLE_IPC_FUZZER)
message.set_interface_name(FileSystemAccessDataTransferToken::Name_);
message.set_method_name("Clone");
#endif
// This return value may be ignored as false implies the Connector has
// encountered an error, which will be visible through other means.
::mojo::internal::SendMessage(*receiver_, message);
}
class FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder : public ::mojo::internal::ProxyToResponder {
public:
static FileSystemAccessDataTransferToken::GetInternalIdCallback CreateCallback(
::mojo::Message& message,
std::unique_ptr<mojo::MessageReceiverWithStatus> responder) {
std::unique_ptr<FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder> proxy(
new FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder(
message, std::move(responder)));
return base::BindOnce(&FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder::Run,
std::move(proxy));
}
~FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder() {
#if DCHECK_IS_ON()
if (responder_) {
// If we're being destroyed without being run, we want to ensure the
// binding endpoint has been closed. This checks for that asynchronously.
// We pass a bound generated callback to handle the response so that any
// resulting DCHECK stack will have useful interface type information.
responder_->IsConnectedAsync(base::BindOnce(&OnIsConnectedComplete));
}
#endif
}
private:
FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder(
::mojo::Message& message,
std::unique_ptr<mojo::MessageReceiverWithStatus> responder)
: ::mojo::internal::ProxyToResponder(message, std::move(responder)) {
}
#if DCHECK_IS_ON()
static void OnIsConnectedComplete(bool connected) {
DCHECK(!connected)
<< "FileSystemAccessDataTransferToken::GetInternalIdCallback was destroyed without "
<< "first either being run or its corresponding binding being closed. "
<< "It is an error to drop response callbacks which still correspond "
<< "to an open interface pipe.";
}
#endif
void Run(
const ::base::UnguessableToken& in_id);
};
bool FileSystemAccessDataTransferToken_GetInternalId_ForwardToCallback::Accept(
mojo::Message* message) {
DCHECK(message->is_serialized());
internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data* params =
reinterpret_cast<
internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data*>(
message->mutable_payload());
bool success = true;
::base::UnguessableToken p_id{};
FileSystemAccessDataTransferToken_GetInternalId_ResponseParamsDataView input_data_view(params, message);
if (success && !input_data_view.ReadId(&p_id))
success = false;
if (!success) {
ReportValidationErrorForMessage(
message,
mojo::internal::VALIDATION_ERROR_DESERIALIZATION_FAILED,
FileSystemAccessDataTransferToken::Name_, 0, true);
return false;
}
if (!callback_.is_null())
std::move(callback_).Run(
std::move(p_id));
return true;
}
void FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder::Run(
const ::base::UnguessableToken& in_id) {
#if BUILDFLAG(MOJO_TRACE_ENABLED)
TRACE_EVENT1(
"mojom", "Send reply blink::mojom::FileSystemAccessDataTransferToken::GetInternalId", "async_response_parameters",
[&](perfetto::TracedValue context){
auto dict = std::move(context).WriteDictionary();
perfetto::WriteIntoTracedValueWithFallback(
dict.AddItem("id"), in_id,
"<value of type const ::base::UnguessableToken&>");
});
#endif
const uint32_t kFlags = mojo::Message::kFlagIsResponse |
((is_sync_) ? mojo::Message::kFlagIsSync : 0) |
((true) ? 0 : mojo::Message::kFlagNoInterrupt);
mojo::Message message(
internal::kFileSystemAccessDataTransferToken_GetInternalId_Name, kFlags, 0, 0, nullptr);
mojo::internal::MessageFragment<
::blink::mojom::internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data> params(
message);
params.Allocate();
mojo::internal::MessageFragment<
typename decltype(params->id)::BaseType> id_fragment(
params.message());
mojo::internal::Serialize<::mojo_base::mojom::UnguessableTokenDataView>(
in_id, id_fragment);
params->id.Set(
id_fragment.is_null() ? nullptr : id_fragment.data());
MOJO_INTERNAL_DLOG_SERIALIZATION_WARNING(
params->id.is_null(),
mojo::internal::VALIDATION_ERROR_UNEXPECTED_NULL_POINTER,
"null id in ");
#if defined(ENABLE_IPC_FUZZER)
message.set_interface_name(FileSystemAccessDataTransferToken::Name_);
message.set_method_name("GetInternalId");
#endif
message.set_request_id(request_id_);
message.set_trace_nonce(trace_nonce_);
::mojo::internal::SendMessage(*responder_, message);
// SendMessage fails silently if the responder connection is closed,
// or if the message is malformed.
//
// TODO(darin): If Accept() returns false due to a malformed message, that
// may be good reason to close the connection. However, we don't have a
// way to do that from here. We should add a way.
responder_ = nullptr;
}
// static
bool FileSystemAccessDataTransferTokenStubDispatch::Accept(
FileSystemAccessDataTransferToken* impl,
mojo::Message* message) {
switch (message->header()->name) {
case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: {
break;
}
case internal::kFileSystemAccessDataTransferToken_Clone_Name: {
DCHECK(message->is_serialized());
internal::FileSystemAccessDataTransferToken_Clone_Params_Data* params =
reinterpret_cast<internal::FileSystemAccessDataTransferToken_Clone_Params_Data*>(
message->mutable_payload());
bool success = true;
::mojo::PendingReceiver<FileSystemAccessDataTransferToken> p_token_clone{};
FileSystemAccessDataTransferToken_Clone_ParamsDataView input_data_view(params, message);
if (success) {
p_token_clone =
input_data_view.TakeTokenClone<decltype(p_token_clone)>();
}
if (!success) {
ReportValidationErrorForMessage(
message,
mojo::internal::VALIDATION_ERROR_DESERIALIZATION_FAILED,
FileSystemAccessDataTransferToken::Name_, 1, false);
return false;
}
// A null |impl| means no implementation was bound.
DCHECK(impl);
impl->Clone(
std::move(p_token_clone));
return true;
}
}
return false;
}
// static
bool FileSystemAccessDataTransferTokenStubDispatch::AcceptWithResponder(
FileSystemAccessDataTransferToken* impl,
mojo::Message* message,
std::unique_ptr<mojo::MessageReceiverWithStatus> responder) {
[[maybe_unused]] const bool message_is_sync =
message->has_flag(mojo::Message::kFlagIsSync);
[[maybe_unused]] const uint64_t request_id = message->request_id();
switch (message->header()->name) {
case internal::kFileSystemAccessDataTransferToken_GetInternalId_Name: {
internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data* params =
reinterpret_cast<
internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data*>(
message->mutable_payload());
bool success = true;
FileSystemAccessDataTransferToken_GetInternalId_ParamsDataView input_data_view(params, message);
if (!success) {
ReportValidationErrorForMessage(
message,
mojo::internal::VALIDATION_ERROR_DESERIALIZATION_FAILED,
FileSystemAccessDataTransferToken::Name_, 0, false);
return false;
}
FileSystemAccessDataTransferToken::GetInternalIdCallback callback =
FileSystemAccessDataTransferToken_GetInternalId_ProxyToResponder::CreateCallback(
*message, std::move(responder));
// A null |impl| means no implementation was bound.
DCHECK(impl);
impl->GetInternalId(std::move(callback));
return true;
}
case internal::kFileSystemAccessDataTransferToken_Clone_Name: {
break;
}
}
return false;
}
static const mojo::internal::GenericValidationInfo kFileSystemAccessDataTransferTokenValidationInfo[] = {
{&internal::FileSystemAccessDataTransferToken_GetInternalId_Params_Data::Validate,
&internal::FileSystemAccessDataTransferToken_GetInternalId_ResponseParams_Data::Validate},
{&internal::FileSystemAccessDataTransferToken_Clone_Params_Data::Validate,
nullptr /* no response */},
};
bool FileSystemAccessDataTransferTokenRequestValidator::Accept(mojo::Message* message) {
const char* name = ::blink::mojom::FileSystemAccessDataTransferToken::Name_;
return mojo::internal::ValidateRequestGenericPacked(message, name, kFileSystemAccessDataTransferTokenValidationInfo);
}
bool FileSystemAccessDataTransferTokenResponseValidator::Accept(mojo::Message* message) {
const char* name = ::blink::mojom::FileSystemAccessDataTransferToken::Name_;
return mojo::internal::ValidateResponseGenericPacked(message, name, kFileSystemAccessDataTransferTokenValidationInfo);
}
} // namespace mojom
} // namespace blink
namespace mojo {
} // namespace mojo
// Symbols declared in the -test-utils.h header are defined here instead of a
// separate .cc file to save compile time.
namespace blink {
namespace mojom {
void FileSystemAccessDataTransferTokenInterceptorForTesting::GetInternalId(GetInternalIdCallback callback) {
GetForwardingInterface()->GetInternalId(std::move(callback));
}
void FileSystemAccessDataTransferTokenInterceptorForTesting::Clone(::mojo::PendingReceiver<FileSystemAccessDataTransferToken> token_clone) {
GetForwardingInterface()->Clone(std::move(token_clone));
}
FileSystemAccessDataTransferTokenAsyncWaiter::FileSystemAccessDataTransferTokenAsyncWaiter(
FileSystemAccessDataTransferToken* proxy) : proxy_(proxy) {}
FileSystemAccessDataTransferTokenAsyncWaiter::~FileSystemAccessDataTransferTokenAsyncWaiter() = default;
void FileSystemAccessDataTransferTokenAsyncWaiter::GetInternalId(
::base::UnguessableToken* out_id) {
base::RunLoop loop;
proxy_->GetInternalId(
base::BindOnce(
[](base::RunLoop* loop,
::base::UnguessableToken* out_id
,
const ::base::UnguessableToken& id) {*out_id = std::move(id);
loop->Quit();
},
&loop,
out_id));
loop.Run();
}
} // namespace mojom
} // namespace blink
#if defined(__clang__)
#pragma clang diagnostic pop
#endif