blob: 21859bf98c9cfb013159a5d49de266288550a3fb [file] [log] [blame]
// chrome/services/file_util/public/mojom/document_analysis_service.mojom.cc is auto generated by mojom_bindings_generator.py, do not edit
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#if defined(__clang__)
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wunused-private-field"
#endif
#include "chrome/services/file_util/public/mojom/document_analysis_service.mojom.h"
#include <math.h>
#include <stdint.h>
#include <utility>
#include "base/debug/alias.h"
#include "base/hash/md5_constexpr.h"
#include "base/run_loop.h"
#include "base/strings/string_number_conversions.h"
#include "base/task/thread_pool/thread_pool_instance.h"
#include "base/trace_event/trace_event.h"
#include "base/trace_event/typed_macros.h"
#include "mojo/public/cpp/bindings/features.h"
#include "mojo/public/cpp/bindings/lib/default_construct_tag_internal.h"
#include "mojo/public/cpp/bindings/lib/generated_code_util.h"
#include "mojo/public/cpp/bindings/lib/message_internal.h"
#include "mojo/public/cpp/bindings/lib/proxy_to_responder.h"
#include "mojo/public/cpp/bindings/lib/send_message_helper.h"
#include "mojo/public/cpp/bindings/lib/serialization_util.h"
#include "mojo/public/cpp/bindings/lib/unserialized_message_context.h"
#include "mojo/public/cpp/bindings/lib/validate_params.h"
#include "mojo/public/cpp/bindings/lib/validation_errors.h"
#include "mojo/public/cpp/bindings/mojo_buildflags.h"
#include "mojo/public/cpp/bindings/urgent_message_scope.h"
#include "mojo/public/interfaces/bindings/interface_control_messages.mojom.h"
#include "third_party/perfetto/include/perfetto/tracing/traced_value.h"
#include "chrome/services/file_util/public/mojom/document_analysis_service.mojom-params-data.h"
#include "chrome/services/file_util/public/mojom/document_analysis_service.mojom-shared-message-ids.h"
#include "chrome/services/file_util/public/mojom/document_analysis_service.mojom-import-headers.h"
#include "chrome/services/file_util/public/mojom/document_analysis_service.mojom-test-utils.h"
namespace chrome::mojom {
const char DocumentAnalysisService::Name_[] = "chrome.mojom.DocumentAnalysisService";
DocumentAnalysisService::IPCStableHashFunction DocumentAnalysisService::MessageToMethodInfo_(mojo::Message& message) {
#if !BUILDFLAG(IS_FUCHSIA)
switch (static_cast<messages::DocumentAnalysisService>(message.name())) {
case messages::DocumentAnalysisService::kBindSafeDocumentAnalyzer: {
return &DocumentAnalysisService::BindSafeDocumentAnalyzer_Sym::IPCStableHash;
}
}
#endif // !BUILDFLAG(IS_FUCHSIA)
return nullptr;
}
const char* DocumentAnalysisService::MessageToMethodName_(mojo::Message& message) {
#if BUILDFLAG(MOJO_TRACE_ENABLED)
bool is_response = message.has_flag(mojo::Message::kFlagIsResponse);
if (!is_response) {
switch (static_cast<messages::DocumentAnalysisService>(message.name())) {
case messages::DocumentAnalysisService::kBindSafeDocumentAnalyzer:
return "Receive chrome::mojom::DocumentAnalysisService::BindSafeDocumentAnalyzer";
}
} else {
switch (static_cast<messages::DocumentAnalysisService>(message.name())) {
case messages::DocumentAnalysisService::kBindSafeDocumentAnalyzer:
return "Receive reply chrome::mojom::DocumentAnalysisService::BindSafeDocumentAnalyzer";
}
}
return "Receive unknown mojo message";
#else
bool is_response = message.has_flag(mojo::Message::kFlagIsResponse);
if (is_response) {
return "Receive mojo reply";
} else {
return "Receive mojo message";
}
#endif // BUILDFLAG(MOJO_TRACE_ENABLED)
}
#if !BUILDFLAG(IS_FUCHSIA)
uint32_t DocumentAnalysisService::BindSafeDocumentAnalyzer_Sym::IPCStableHash() {
// This method's address is used for indetifiying the mojo method name after
// symbolization. So each IPCStableHash should have a unique address.
// We cannot use NO_CODE_FOLDING() here - it relies on the uniqueness of
// __LINE__ value, which is not unique accross different mojo modules.
// The code below is very similar to NO_CODE_FOLDING, but it uses a unique
// hash instead of __LINE__.
constexpr uint32_t kHash = base::MD5Hash32Constexpr(
"(Impl)chrome::mojom::DocumentAnalysisService::BindSafeDocumentAnalyzer");
const uint32_t hash = kHash;
base::debug::Alias(&hash);
return hash;
}
# endif // !BUILDFLAG(IS_FUCHSIA)
DocumentAnalysisServiceProxy::DocumentAnalysisServiceProxy(mojo::MessageReceiverWithResponder* receiver)
: receiver_(receiver) {
}
void DocumentAnalysisServiceProxy::BindSafeDocumentAnalyzer(
::mojo::PendingReceiver<::chrome::mojom::SafeDocumentAnalyzer> in_receiver) {
#if BUILDFLAG(MOJO_TRACE_ENABLED)
TRACE_EVENT1(
"mojom", "Send chrome::mojom::DocumentAnalysisService::BindSafeDocumentAnalyzer", "input_parameters",
[&](perfetto::TracedValue context){
auto dict = std::move(context).WriteDictionary();
perfetto::WriteIntoTracedValueWithFallback(
dict.AddItem("receiver"), in_receiver,
"<value of type ::mojo::PendingReceiver<::chrome::mojom::SafeDocumentAnalyzer>>");
});
#endif
const bool kExpectsResponse = false;
const bool kIsSync = false;
const bool kAllowInterrupt = true;
const bool is_urgent = false;
const uint32_t kFlags =
((kExpectsResponse) ? mojo::Message::kFlagExpectsResponse : 0) |
((kIsSync) ? mojo::Message::kFlagIsSync : 0) |
((kAllowInterrupt) ? 0 : mojo::Message::kFlagNoInterrupt) |
((is_urgent) ? mojo::Message::kFlagIsUrgent : 0);
const size_t estimated_payload_size =
0;
mojo::Message message(
base::to_underlying(messages::DocumentAnalysisService::kBindSafeDocumentAnalyzer), kFlags, estimated_payload_size);
mojo::internal::MessageFragment<
::chrome::mojom::internal::DocumentAnalysisService_BindSafeDocumentAnalyzer_Params_Data> params(
message);
params.Allocate();
mojo::internal::Serialize<mojo::InterfaceRequestDataView<::chrome::mojom::SafeDocumentAnalyzerInterfaceBase>>(
in_receiver, &params->receiver, &params.message());
MOJO_INTERNAL_DLOG_SERIALIZATION_WARNING(
!mojo::internal::IsHandleOrInterfaceValid(params->receiver),
mojo::internal::VALIDATION_ERROR_UNEXPECTED_INVALID_HANDLE,
"invalid receiver in DocumentAnalysisService.BindSafeDocumentAnalyzer request");
#if defined(ENABLE_IPC_FUZZER)
message.set_interface_name(DocumentAnalysisService::Name_);
message.set_method_name("BindSafeDocumentAnalyzer");
#endif
// This return value may be ignored as false implies the Connector has
// encountered an error, which will be visible through other means.
::mojo::internal::SendMojoMessage(*receiver_, message);
}
// static
bool DocumentAnalysisServiceStubDispatch::Accept(
DocumentAnalysisService* impl,
mojo::Message* message) {
switch (static_cast<messages::DocumentAnalysisService>(message->header()->name)) {
case messages::DocumentAnalysisService::kBindSafeDocumentAnalyzer: {
DCHECK(message->is_serialized());
internal::DocumentAnalysisService_BindSafeDocumentAnalyzer_Params_Data* params =
reinterpret_cast<internal::DocumentAnalysisService_BindSafeDocumentAnalyzer_Params_Data*>(
message->mutable_payload());
// Validation for DocumentAnalysisService.0
bool success = true;
::mojo::PendingReceiver<::chrome::mojom::SafeDocumentAnalyzer> p_receiver{};
DocumentAnalysisService_BindSafeDocumentAnalyzer_ParamsDataView input_data_view(params, message);
if (success) {
p_receiver =
input_data_view.TakeReceiver<decltype(p_receiver)>();
}
if (!success) {
ReportValidationErrorForMessage(
message,
mojo::internal::VALIDATION_ERROR_DESERIALIZATION_FAILED,
DocumentAnalysisService::Name_, 0, false);
return false;
}
// A null |impl| means no implementation was bound.
DCHECK(impl);
impl->BindSafeDocumentAnalyzer(
std::move(p_receiver));
return true;
}
}
return false;
}
// static
bool DocumentAnalysisServiceStubDispatch::AcceptWithResponder(
DocumentAnalysisService* impl,
mojo::Message* message,
std::unique_ptr<mojo::MessageReceiverWithStatus> responder) {
[[maybe_unused]] const bool message_is_sync =
message->has_flag(mojo::Message::kFlagIsSync);
[[maybe_unused]] const uint64_t request_id = message->request_id();
switch (static_cast<messages::DocumentAnalysisService>(message->header()->name)) {
case messages::DocumentAnalysisService::kBindSafeDocumentAnalyzer: {
break;
}
}
return false;
}
namespace {
} // namespace
static const mojo::internal::GenericValidationInfo kDocumentAnalysisServiceValidationInfo[] = {
{ &internal::DocumentAnalysisService_BindSafeDocumentAnalyzer_Params_Data::Validate,
nullptr /* no response */},
};
bool DocumentAnalysisServiceRequestValidator::Accept(mojo::Message* message) {
const char* name = ::chrome::mojom::DocumentAnalysisService::Name_;
return mojo::internal::ValidateRequestGenericPacked(message, name, kDocumentAnalysisServiceValidationInfo);
}
} // chrome::mojom
namespace mojo {
} // namespace mojo
// Symbols declared in the -test-utils.h header are defined here instead of a
// separate .cc file to save compile time.
namespace chrome::mojom {
void DocumentAnalysisServiceInterceptorForTesting::BindSafeDocumentAnalyzer(::mojo::PendingReceiver<::chrome::mojom::SafeDocumentAnalyzer> receiver) {
GetForwardingInterface()->BindSafeDocumentAnalyzer(
std::move(receiver)
);
}
DocumentAnalysisServiceAsyncWaiter::DocumentAnalysisServiceAsyncWaiter(
DocumentAnalysisService* proxy) : proxy_(proxy) {}
DocumentAnalysisServiceAsyncWaiter::~DocumentAnalysisServiceAsyncWaiter() = default;
} // chrome::mojom
#if defined(__clang__)
#pragma clang diagnostic pop
#endif