chromium/out/Default/gen/services/network/public/mojom/url_loader_network_service_observer.mojom.cc

// services/network/public/mojom/url_loader_network_service_observer.mojom.cc is auto generated by mojom_bindings_generator.py, do not edit

// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#if defined(__clang__)
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wunused-private-field"
#endif

#include "services/network/public/mojom/url_loader_network_service_observer.mojom.h"

#include <math.h>
#include <stdint.h>
#include <utility>

#include "base/debug/alias.h"
#include "base/hash/md5_constexpr.h"
#include "base/run_loop.h"
#include "base/strings/string_number_conversions.h"
#include "base/task/thread_pool/thread_pool_instance.h"
#include "base/trace_event/trace_event.h"
#include "base/trace_event/typed_macros.h"
#include "mojo/public/cpp/bindings/features.h"
#include "mojo/public/cpp/bindings/lib/default_construct_tag_internal.h"
#include "mojo/public/cpp/bindings/lib/generated_code_util.h"
#include "mojo/public/cpp/bindings/lib/message_internal.h"
#include "mojo/public/cpp/bindings/lib/proxy_to_responder.h"
#include "mojo/public/cpp/bindings/lib/send_message_helper.h"
#include "mojo/public/cpp/bindings/lib/serialization_util.h"
#include "mojo/public/cpp/bindings/lib/unserialized_message_context.h"
#include "mojo/public/cpp/bindings/lib/validate_params.h"
#include "mojo/public/cpp/bindings/lib/validation_errors.h"
#include "mojo/public/cpp/bindings/mojo_buildflags.h"
#include "mojo/public/cpp/bindings/urgent_message_scope.h"
#include "mojo/public/interfaces/bindings/interface_control_messages.mojom.h"
#include "third_party/perfetto/include/perfetto/tracing/traced_value.h"

#include "services/network/public/mojom/url_loader_network_service_observer.mojom-params-data.h"
#include "services/network/public/mojom/url_loader_network_service_observer.mojom-shared-message-ids.h"

#include "services/network/public/mojom/url_loader_network_service_observer.mojom-import-headers.h"
#include "services/network/public/mojom/url_loader_network_service_observer.mojom-test-utils.h"
#include "net/cert/cert_verify_result.h"


namespace network::mojom {
LoadInfo::LoadInfo()
    :{}

LoadInfo::LoadInfo(
    ::base::TimeTicks timestamp_in,
    const std::string& host_in,
    uint32_t load_state_in,
    const ::std::u16string& state_param_in,
    uint64_t upload_position_in,
    uint64_t upload_size_in)
    :{}

LoadInfo::~LoadInfo() = default;

void LoadInfo::WriteIntoTrace(
    perfetto::TracedValue traced_context) const {}

bool LoadInfo::Validate(
    const void* data,
    mojo::internal::ValidationContext* validation_context) {}
SharedStorageOperation::SharedStorageOperation()
    :{}

SharedStorageOperation::SharedStorageOperation(
    SharedStorageOperationType type_in,
    const std::optional<std::string>& key_in,
    const std::optional<std::string>& value_in,
    ::network::mojom::OptionalBool ignore_if_present_in)
    :{}

SharedStorageOperation::~SharedStorageOperation() = default;

void SharedStorageOperation::WriteIntoTrace(
    perfetto::TracedValue traced_context) const {}

bool SharedStorageOperation::Validate(
    const void* data,
    mojo::internal::ValidationContext* validation_context) {}
const char ClientCertificateResponder::Name_[] =;

ClientCertificateResponder::IPCStableHashFunction ClientCertificateResponder::MessageToMethodInfo_(mojo::Message& message) {}


const char* ClientCertificateResponder::MessageToMethodName_(mojo::Message& message) {}

#if !BUILDFLAG(IS_FUCHSIA)
uint32_t ClientCertificateResponder::ContinueWithCertificate_Sym::IPCStableHash() {}
uint32_t ClientCertificateResponder::ContinueWithoutCertificate_Sym::IPCStableHash() {}
uint32_t ClientCertificateResponder::CancelRequest_Sym::IPCStableHash() {}
# endif // !BUILDFLAG(IS_FUCHSIA)

ClientCertificateResponderProxy::ClientCertificateResponderProxy(mojo::MessageReceiverWithResponder* receiver)
    :{}

void ClientCertificateResponderProxy::ContinueWithCertificate(
    const ::scoped_refptr<::net::X509Certificate>& in_x509_certificate, const std::string& in_provider_name, const std::vector<uint16_t>& in_algorithm_preferences, ::mojo::PendingRemote<SSLPrivateKey> in_ssl_private_key) {}

void ClientCertificateResponderProxy::ContinueWithoutCertificate(
    ) {}

void ClientCertificateResponderProxy::CancelRequest(
    ) {}

// static
bool ClientCertificateResponderStubDispatch::Accept(
    ClientCertificateResponder* impl,
    mojo::Message* message) {}

// static
bool ClientCertificateResponderStubDispatch::AcceptWithResponder(
    ClientCertificateResponder* impl,
    mojo::Message* message,
    std::unique_ptr<mojo::MessageReceiverWithStatus> responder) {}
namespace {
}  // namespace
static const mojo::internal::GenericValidationInfo kClientCertificateResponderValidationInfo[] =;

bool ClientCertificateResponderRequestValidator::Accept(mojo::Message* message) {}

const char SSLPrivateKey::Name_[] =;

SSLPrivateKey::IPCStableHashFunction SSLPrivateKey::MessageToMethodInfo_(mojo::Message& message) {}


const char* SSLPrivateKey::MessageToMethodName_(mojo::Message& message) {}

#if !BUILDFLAG(IS_FUCHSIA)
uint32_t SSLPrivateKey::Sign_Sym::IPCStableHash() {}
# endif // !BUILDFLAG(IS_FUCHSIA)

class SSLPrivateKey_Sign_ForwardToCallback
    : public mojo::MessageReceiver {};

SSLPrivateKeyProxy::SSLPrivateKeyProxy(mojo::MessageReceiverWithResponder* receiver)
    :{}

void SSLPrivateKeyProxy::Sign(
    uint16_t in_algorithm, const std::vector<uint8_t>& in_input, SignCallback callback) {}
class SSLPrivateKey_Sign_ProxyToResponder : public ::mojo::internal::ProxyToResponder {};

bool SSLPrivateKey_Sign_ForwardToCallback::Accept(
    mojo::Message* message) {}

void SSLPrivateKey_Sign_ProxyToResponder::Run(
    int32_t in_net_error, const std::vector<uint8_t>& in_signature) {}

// static
bool SSLPrivateKeyStubDispatch::Accept(
    SSLPrivateKey* impl,
    mojo::Message* message) {}

// static
bool SSLPrivateKeyStubDispatch::AcceptWithResponder(
    SSLPrivateKey* impl,
    mojo::Message* message,
    std::unique_ptr<mojo::MessageReceiverWithStatus> responder) {}
namespace {
}  // namespace
static const mojo::internal::GenericValidationInfo kSSLPrivateKeyValidationInfo[] =;

bool SSLPrivateKeyRequestValidator::Accept(mojo::Message* message) {}

bool SSLPrivateKeyResponseValidator::Accept(mojo::Message* message) {}
const char AuthChallengeResponder::Name_[] =;

AuthChallengeResponder::IPCStableHashFunction AuthChallengeResponder::MessageToMethodInfo_(mojo::Message& message) {}


const char* AuthChallengeResponder::MessageToMethodName_(mojo::Message& message) {}

#if !BUILDFLAG(IS_FUCHSIA)
uint32_t AuthChallengeResponder::OnAuthCredentials_Sym::IPCStableHash() {}
# endif // !BUILDFLAG(IS_FUCHSIA)

AuthChallengeResponderProxy::AuthChallengeResponderProxy(mojo::MessageReceiverWithResponder* receiver)
    :{}

void AuthChallengeResponderProxy::OnAuthCredentials(
    const std::optional<::net::AuthCredentials>& in_credentials) {}

// static
bool AuthChallengeResponderStubDispatch::Accept(
    AuthChallengeResponder* impl,
    mojo::Message* message) {}

// static
bool AuthChallengeResponderStubDispatch::AcceptWithResponder(
    AuthChallengeResponder* impl,
    mojo::Message* message,
    std::unique_ptr<mojo::MessageReceiverWithStatus> responder) {}
namespace {
}  // namespace
static const mojo::internal::GenericValidationInfo kAuthChallengeResponderValidationInfo[] =;

bool AuthChallengeResponderRequestValidator::Accept(mojo::Message* message) {}

const char URLLoaderNetworkServiceObserver::Name_[] =;

URLLoaderNetworkServiceObserver::IPCStableHashFunction URLLoaderNetworkServiceObserver::MessageToMethodInfo_(mojo::Message& message) {}


const char* URLLoaderNetworkServiceObserver::MessageToMethodName_(mojo::Message& message) {}

#if !BUILDFLAG(IS_FUCHSIA)
uint32_t URLLoaderNetworkServiceObserver::OnSSLCertificateError_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnCertificateRequested_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnAuthRequired_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnPrivateNetworkAccessPermissionRequired_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnClearSiteData_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnLoadingStateUpdate_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnDataUseUpdate_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnSharedStorageHeaderReceived_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::Clone_Sym::IPCStableHash() {}
uint32_t URLLoaderNetworkServiceObserver::OnWebSocketConnectedToPrivateNetwork_Sym::IPCStableHash() {}
# endif // !BUILDFLAG(IS_FUCHSIA)

class URLLoaderNetworkServiceObserver_OnSSLCertificateError_ForwardToCallback
    : public mojo::MessageReceiver {};

class URLLoaderNetworkServiceObserver_OnPrivateNetworkAccessPermissionRequired_ForwardToCallback
    : public mojo::MessageReceiver {};

class URLLoaderNetworkServiceObserver_OnClearSiteData_ForwardToCallback
    : public mojo::MessageReceiver {};

class URLLoaderNetworkServiceObserver_OnLoadingStateUpdate_ForwardToCallback
    : public mojo::MessageReceiver {};

class URLLoaderNetworkServiceObserver_OnSharedStorageHeaderReceived_ForwardToCallback
    : public mojo::MessageReceiver {};

URLLoaderNetworkServiceObserverProxy::URLLoaderNetworkServiceObserverProxy(mojo::MessageReceiverWithResponder* receiver)
    :{}

void URLLoaderNetworkServiceObserverProxy::OnSSLCertificateError(
    const ::GURL& in_url, int32_t in_net_error, const ::net::SSLInfo& in_ssl_info, bool in_fatal, OnSSLCertificateErrorCallback callback) {}

void URLLoaderNetworkServiceObserverProxy::OnCertificateRequested(
    const std::optional<::base::UnguessableToken>& in_window_id, const ::scoped_refptr<::net::SSLCertRequestInfo>& in_cert_info, ::mojo::PendingRemote<ClientCertificateResponder> in_cert_responder) {}

void URLLoaderNetworkServiceObserverProxy::OnAuthRequired(
    const std::optional<::base::UnguessableToken>& in_window_id, int32_t in_request_id, const ::GURL& in_url, bool in_first_auth_attempt, const ::net::AuthChallengeInfo& in_auth_info, const ::scoped_refptr<::net::HttpResponseHeaders>& in_head_headers, ::mojo::PendingRemote<AuthChallengeResponder> in_auth_challenge_responder) {}

void URLLoaderNetworkServiceObserverProxy::OnPrivateNetworkAccessPermissionRequired(
    const ::GURL& in_url, const ::net::IPAddress& in_ip_address, const std::optional<std::string>& in_private_network_device_id, const std::optional<std::string>& in_private_network_device_name, OnPrivateNetworkAccessPermissionRequiredCallback callback) {}

void URLLoaderNetworkServiceObserverProxy::OnClearSiteData(
    const ::GURL& in_url, const std::string& in_header_value, int32_t in_load_flags, const std::optional<::net::CookiePartitionKey>& in_cookie_partition_key, bool in_partitioned_state_allowed_only, OnClearSiteDataCallback callback) {}

void URLLoaderNetworkServiceObserverProxy::OnLoadingStateUpdate(
    LoadInfoPtr in_info, OnLoadingStateUpdateCallback callback) {}

void URLLoaderNetworkServiceObserverProxy::OnDataUseUpdate(
    int32_t in_network_traffic_annotation_id_hash, int64_t in_recv_bytes, int64_t in_sent_bytes) {}

void URLLoaderNetworkServiceObserverProxy::OnSharedStorageHeaderReceived(
    const ::url::Origin& in_request_origin, std::vector<SharedStorageOperationPtr> in_operations, OnSharedStorageHeaderReceivedCallback callback) {}

void URLLoaderNetworkServiceObserverProxy::Clone(
    ::mojo::PendingReceiver<URLLoaderNetworkServiceObserver> in_listener) {}

void URLLoaderNetworkServiceObserverProxy::OnWebSocketConnectedToPrivateNetwork(
    ::network::mojom::IPAddressSpace in_ip_address_space) {}
class URLLoaderNetworkServiceObserver_OnSSLCertificateError_ProxyToResponder : public ::mojo::internal::ProxyToResponder {};

bool URLLoaderNetworkServiceObserver_OnSSLCertificateError_ForwardToCallback::Accept(
    mojo::Message* message) {}

void URLLoaderNetworkServiceObserver_OnSSLCertificateError_ProxyToResponder::Run(
    int32_t in_net_error) {}
class URLLoaderNetworkServiceObserver_OnPrivateNetworkAccessPermissionRequired_ProxyToResponder : public ::mojo::internal::ProxyToResponder {};

bool URLLoaderNetworkServiceObserver_OnPrivateNetworkAccessPermissionRequired_ForwardToCallback::Accept(
    mojo::Message* message) {}

void URLLoaderNetworkServiceObserver_OnPrivateNetworkAccessPermissionRequired_ProxyToResponder::Run(
    bool in_permission_granted) {}
class URLLoaderNetworkServiceObserver_OnClearSiteData_ProxyToResponder : public ::mojo::internal::ProxyToResponder {};

bool URLLoaderNetworkServiceObserver_OnClearSiteData_ForwardToCallback::Accept(
    mojo::Message* message) {}

void URLLoaderNetworkServiceObserver_OnClearSiteData_ProxyToResponder::Run(
    ) {}
class URLLoaderNetworkServiceObserver_OnLoadingStateUpdate_ProxyToResponder : public ::mojo::internal::ProxyToResponder {};

bool URLLoaderNetworkServiceObserver_OnLoadingStateUpdate_ForwardToCallback::Accept(
    mojo::Message* message) {}

void URLLoaderNetworkServiceObserver_OnLoadingStateUpdate_ProxyToResponder::Run(
    ) {}
class URLLoaderNetworkServiceObserver_OnSharedStorageHeaderReceived_ProxyToResponder : public ::mojo::internal::ProxyToResponder {};

bool URLLoaderNetworkServiceObserver_OnSharedStorageHeaderReceived_ForwardToCallback::Accept(
    mojo::Message* message) {}

void URLLoaderNetworkServiceObserver_OnSharedStorageHeaderReceived_ProxyToResponder::Run(
    ) {}

// static
bool URLLoaderNetworkServiceObserverStubDispatch::Accept(
    URLLoaderNetworkServiceObserver* impl,
    mojo::Message* message) {}

// static
bool URLLoaderNetworkServiceObserverStubDispatch::AcceptWithResponder(
    URLLoaderNetworkServiceObserver* impl,
    mojo::Message* message,
    std::unique_ptr<mojo::MessageReceiverWithStatus> responder) {}
namespace {
}  // namespace
static const mojo::internal::GenericValidationInfo kURLLoaderNetworkServiceObserverValidationInfo[] =;

bool URLLoaderNetworkServiceObserverRequestValidator::Accept(mojo::Message* message) {}

bool URLLoaderNetworkServiceObserverResponseValidator::Accept(mojo::Message* message) {}


}  // network::mojom


namespace mojo {


// static
bool StructTraits<::network::mojom::LoadInfo::DataView, ::network::mojom::LoadInfoPtr>::Read(
    ::network::mojom::LoadInfo::DataView input,
    ::network::mojom::LoadInfoPtr* output) {}


// static
bool StructTraits<::network::mojom::SharedStorageOperation::DataView, ::network::mojom::SharedStorageOperationPtr>::Read(
    ::network::mojom::SharedStorageOperation::DataView input,
    ::network::mojom::SharedStorageOperationPtr* output) {}

}  // namespace mojo


// Symbols declared in the -test-utils.h header are defined here instead of a
// separate .cc file to save compile time.


namespace network::mojom {


void ClientCertificateResponderInterceptorForTesting::ContinueWithCertificate(const ::scoped_refptr<::net::X509Certificate>& x509_certificate, const std::string& provider_name, const std::vector<uint16_t>& algorithm_preferences, ::mojo::PendingRemote<SSLPrivateKey> ssl_private_key) {}
void ClientCertificateResponderInterceptorForTesting::ContinueWithoutCertificate() {}
void ClientCertificateResponderInterceptorForTesting::CancelRequest() {}
ClientCertificateResponderAsyncWaiter::ClientCertificateResponderAsyncWaiter(
    ClientCertificateResponder* proxy) :{}

ClientCertificateResponderAsyncWaiter::~ClientCertificateResponderAsyncWaiter() = default;




void SSLPrivateKeyInterceptorForTesting::Sign(uint16_t algorithm, const std::vector<uint8_t>& input, SignCallback callback) {}
SSLPrivateKeyAsyncWaiter::SSLPrivateKeyAsyncWaiter(
    SSLPrivateKey* proxy) :{}

SSLPrivateKeyAsyncWaiter::~SSLPrivateKeyAsyncWaiter() = default;

void SSLPrivateKeyAsyncWaiter::Sign(
    uint16_t algorithm, const std::vector<uint8_t>& input, int32_t* out_net_error, std::vector<uint8_t>* out_signature) {}






void AuthChallengeResponderInterceptorForTesting::OnAuthCredentials(const std::optional<::net::AuthCredentials>& credentials) {}
AuthChallengeResponderAsyncWaiter::AuthChallengeResponderAsyncWaiter(
    AuthChallengeResponder* proxy) :{}

AuthChallengeResponderAsyncWaiter::~AuthChallengeResponderAsyncWaiter() = default;




void URLLoaderNetworkServiceObserverInterceptorForTesting::OnSSLCertificateError(const ::GURL& url, int32_t net_error, const ::net::SSLInfo& ssl_info, bool fatal, OnSSLCertificateErrorCallback callback) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnCertificateRequested(const std::optional<::base::UnguessableToken>& window_id, const ::scoped_refptr<::net::SSLCertRequestInfo>& cert_info, ::mojo::PendingRemote<ClientCertificateResponder> cert_responder) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnAuthRequired(const std::optional<::base::UnguessableToken>& window_id, int32_t request_id, const ::GURL& url, bool first_auth_attempt, const ::net::AuthChallengeInfo& auth_info, const ::scoped_refptr<::net::HttpResponseHeaders>& head_headers, ::mojo::PendingRemote<AuthChallengeResponder> auth_challenge_responder) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnPrivateNetworkAccessPermissionRequired(const ::GURL& url, const ::net::IPAddress& ip_address, const std::optional<std::string>& private_network_device_id, const std::optional<std::string>& private_network_device_name, OnPrivateNetworkAccessPermissionRequiredCallback callback) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnClearSiteData(const ::GURL& url, const std::string& header_value, int32_t load_flags, const std::optional<::net::CookiePartitionKey>& cookie_partition_key, bool partitioned_state_allowed_only, OnClearSiteDataCallback callback) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnLoadingStateUpdate(LoadInfoPtr info, OnLoadingStateUpdateCallback callback) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnDataUseUpdate(int32_t network_traffic_annotation_id_hash, int64_t recv_bytes, int64_t sent_bytes) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnSharedStorageHeaderReceived(const ::url::Origin& request_origin, std::vector<SharedStorageOperationPtr> operations, OnSharedStorageHeaderReceivedCallback callback) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::Clone(::mojo::PendingReceiver<URLLoaderNetworkServiceObserver> listener) {}
void URLLoaderNetworkServiceObserverInterceptorForTesting::OnWebSocketConnectedToPrivateNetwork(::network::mojom::IPAddressSpace ip_address_space) {}
URLLoaderNetworkServiceObserverAsyncWaiter::URLLoaderNetworkServiceObserverAsyncWaiter(
    URLLoaderNetworkServiceObserver* proxy) :{}

URLLoaderNetworkServiceObserverAsyncWaiter::~URLLoaderNetworkServiceObserverAsyncWaiter() = default;

void URLLoaderNetworkServiceObserverAsyncWaiter::OnSSLCertificateError(
    const ::GURL& url, int32_t net_error, const ::net::SSLInfo& ssl_info, bool fatal, int32_t* out_net_error) {}

int32_t URLLoaderNetworkServiceObserverAsyncWaiter::OnSSLCertificateError(
    const ::GURL& url, int32_t net_error, const ::net::SSLInfo& ssl_info, bool fatal) {}

void URLLoaderNetworkServiceObserverAsyncWaiter::OnPrivateNetworkAccessPermissionRequired(
    const ::GURL& url, const ::net::IPAddress& ip_address, const std::optional<std::string>& private_network_device_id, const std::optional<std::string>& private_network_device_name, bool* out_permission_granted) {}

bool URLLoaderNetworkServiceObserverAsyncWaiter::OnPrivateNetworkAccessPermissionRequired(
    const ::GURL& url, const ::net::IPAddress& ip_address, const std::optional<std::string>& private_network_device_id, const std::optional<std::string>& private_network_device_name) {}

void URLLoaderNetworkServiceObserverAsyncWaiter::OnClearSiteData(
    const ::GURL& url, const std::string& header_value, int32_t load_flags, const std::optional<::net::CookiePartitionKey>& cookie_partition_key, bool partitioned_state_allowed_only) {}



void URLLoaderNetworkServiceObserverAsyncWaiter::OnLoadingStateUpdate(
    LoadInfoPtr info) {}



void URLLoaderNetworkServiceObserverAsyncWaiter::OnSharedStorageHeaderReceived(
    const ::url::Origin& request_origin, std::vector<SharedStorageOperationPtr> operations) {}








}  // network::mojom


#if defined(__clang__)
#pragma clang diagnostic pop
#endif