forked from mirrors/gecko-dev
The primary browser navigational UI should now behave as if it's connected to the page content in the viewport, including things like: * Content page's URL is displayed in location bar * Content page's title is displayed on the tab * Back / forward navigates the viewport * Entering a location navigates the viewport * Page loading progress is displayed in the status bar as usual MozReview-Commit-ID: FzxWEwj13sJ
401 lines
15 KiB
JavaScript
401 lines
15 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
"use strict";
|
|
|
|
const { Ci } = require("chrome");
|
|
const Services = require("Services");
|
|
const { Task } = require("devtools/shared/task");
|
|
const DevToolsUtils = require("devtools/shared/DevToolsUtils");
|
|
const { BrowserElementWebNavigation } = require("./web-navigation");
|
|
|
|
function debug(msg) {
|
|
// console.log(msg);
|
|
}
|
|
|
|
/**
|
|
* Properties swapped between browsers by browser.xml's `swapDocShells`. See also the
|
|
* list at /devtools/client/responsive.html/docs/browser-swap.md.
|
|
*/
|
|
const SWAPPED_BROWSER_STATE = [
|
|
"_securityUI",
|
|
"_documentURI",
|
|
"_documentContentType",
|
|
"_contentTitle",
|
|
"_characterSet",
|
|
"_contentPrincipal",
|
|
"_imageDocument",
|
|
"_fullZoom",
|
|
"_textZoom",
|
|
"_isSyntheticDocument",
|
|
"_innerWindowID",
|
|
"_manifestURI",
|
|
];
|
|
|
|
/**
|
|
* This module takes an "outer" <xul:browser> from a browser tab as described by
|
|
* Firefox's tabbrowser.xml and wires it up to an "inner" <iframe mozbrowser>
|
|
* browser element containing arbitrary page content of interest.
|
|
*
|
|
* The inner <iframe mozbrowser> element is _just_ the page content. It is not
|
|
* enough to to replace <xul:browser> on its own. <xul:browser> comes along
|
|
* with lots of associated functionality via XBL bindings defined for such
|
|
* elements in browser.xml and remote-browser.xml, and the Firefox UI depends on
|
|
* these various things to make the UI function.
|
|
*
|
|
* By mapping various methods, properties, and messages from the outer browser
|
|
* to the inner browser, we can control the content inside the inner browser
|
|
* using the standard Firefox UI elements for navigation, reloading, and more.
|
|
*
|
|
* The approaches used in this module were chosen to avoid needing changes to
|
|
* the core browser for this specialized use case. If we start to increase
|
|
* usage of <iframe mozbrowser> in the core browser, we should avoid this module
|
|
* and instead refactor things to work with mozbrowser directly.
|
|
*
|
|
* For the moment though, this serves as a sufficient path to connect the
|
|
* Firefox UI to a mozbrowser.
|
|
*
|
|
* @param outer
|
|
* A <xul:browser> from a regular browser tab.
|
|
* @param inner
|
|
* A <iframe mozbrowser> containing page content to be wired up to the
|
|
* primary browser UI via the outer browser.
|
|
*/
|
|
function tunnelToInnerBrowser(outer, inner) {
|
|
let browserWindow = outer.ownerDocument.defaultView;
|
|
let gBrowser = browserWindow.gBrowser;
|
|
let mmTunnel;
|
|
|
|
return {
|
|
|
|
start: Task.async(function* () {
|
|
if (outer.isRemoteBrowser) {
|
|
throw new Error("The outer browser must be non-remote.");
|
|
}
|
|
if (!inner.isRemoteBrowser) {
|
|
throw new Error("The inner browser must be remote.");
|
|
}
|
|
|
|
// The `permanentKey` property on a <xul:browser> is used to index into various maps
|
|
// held by the session store. When you swap content around with
|
|
// `_swapBrowserDocShells`, these keys are also swapped so they follow the content.
|
|
// This means the key that matches the content is on the inner browser. Since we
|
|
// want the browser UI to believe the page content is part of the outer browser, we
|
|
// copy the content's `permanentKey` up to the outer browser.
|
|
copyPermanentKey(outer, inner);
|
|
|
|
// Replace the outer browser's native messageManager with a message manager tunnel
|
|
// which we can use to route messages of interest to the inner browser instead.
|
|
// Note: The _actual_ messageManager accessible from
|
|
// `browser.frameLoader.messageManager` is not overridable and is left unchanged.
|
|
// Only the XBL getter `browser.messageManager` is overridden. Browser UI code
|
|
// always uses this getter instead of `browser.frameLoader.messageManager` directly,
|
|
// so this has the effect of overriding the message manager for browser UI code.
|
|
mmTunnel = new MessageManagerTunnel(outer, inner);
|
|
Object.defineProperty(outer, "messageManager", {
|
|
value: mmTunnel,
|
|
writable: false,
|
|
configurable: true,
|
|
enumerable: true,
|
|
});
|
|
|
|
// We are tunneling to an inner browser with a specific remoteness, so it is simpler
|
|
// for the logic of the browser UI to assume this tab has taken on that remoteness,
|
|
// even though it's not true. Since the actions the browser UI performs are sent
|
|
// down to the inner browser by this tunnel, the tab's remoteness effectively is the
|
|
// remoteness of the inner browser.
|
|
Object.defineProperty(outer, "isRemoteBrowser", {
|
|
get() {
|
|
return true;
|
|
},
|
|
configurable: true,
|
|
enumerable: true,
|
|
});
|
|
|
|
// Clear out any cached state that references the current non-remote XBL binding,
|
|
// such as form fill controllers. Otherwise they will remain in place and leak the
|
|
// outer docshell.
|
|
outer.destroy();
|
|
// The XBL binding for remote browsers uses the message manager for many actions in
|
|
// the UI and that works well here, since it gives us one main thing we need to
|
|
// route to the inner browser (the messages), instead of having to tweak many
|
|
// different browser properties. It is safe to alter a XBL binding dynamically.
|
|
// The content within is not reloaded.
|
|
outer.style.MozBinding = "url(chrome://browser/content/tabbrowser.xml" +
|
|
"#tabbrowser-remote-browser)";
|
|
|
|
// The constructor of the new XBL binding is run asynchronously and there is no
|
|
// event to signal its completion. Spin an event loop to watch for properties that
|
|
// are set by the contructor.
|
|
while (!outer._remoteWebNavigation) {
|
|
Services.tm.currentThread.processNextEvent(true);
|
|
}
|
|
|
|
// Replace the `webNavigation` object with our own version which tries to use
|
|
// mozbrowser APIs where possible. This replaces the webNavigation object that the
|
|
// remote-browser.xml binding creates. We do not care about it's original value
|
|
// because stop() will remove the remote-browser.xml binding and these will no
|
|
// longer be used.
|
|
let webNavigation = new BrowserElementWebNavigation(inner);
|
|
webNavigation.copyStateFrom(inner._remoteWebNavigationImpl);
|
|
outer._remoteWebNavigation = webNavigation;
|
|
outer._remoteWebNavigationImpl = webNavigation;
|
|
|
|
// Now that we've flipped to the remote browser XBL binding, add `progressListener`
|
|
// onto the remote version of `webProgress`. Normally tabbrowser.xml does this step
|
|
// when it creates a new browser, etc. Since we manually changed the XBL binding
|
|
// above, it caused a fresh webProgress object to be created which does not have any
|
|
// listeners added. So, we get the listener that gBrowser is using for the tab and
|
|
// reattach it here.
|
|
let tab = gBrowser.getTabForBrowser(outer);
|
|
let filteredProgressListener = gBrowser._tabFilters.get(tab);
|
|
outer.webProgress.addProgressListener(filteredProgressListener);
|
|
|
|
// All of the browser state from content was swapped onto the inner browser. Pull
|
|
// this state up to the outer browser.
|
|
for (let property of SWAPPED_BROWSER_STATE) {
|
|
outer[property] = inner[property];
|
|
}
|
|
|
|
// Wants to access the content's `frameLoader`, so we'll redirect it to
|
|
// inner browser.
|
|
Object.defineProperty(outer, "hasContentOpener", {
|
|
get() {
|
|
return inner.frameLoader.tabParent.hasContentOpener;
|
|
},
|
|
configurable: true,
|
|
enumerable: true,
|
|
});
|
|
|
|
// Wants to access the content's `frameLoader`, so we'll redirect it to
|
|
// inner browser.
|
|
Object.defineProperty(outer, "docShellIsActive", {
|
|
get() {
|
|
return inner.frameLoader.tabParent.docShellIsActive;
|
|
},
|
|
set(value) {
|
|
inner.frameLoader.tabParent.docShellIsActive = value;
|
|
},
|
|
configurable: true,
|
|
enumerable: true,
|
|
});
|
|
|
|
// Wants to access the content's `frameLoader`, so we'll redirect it to
|
|
// inner browser.
|
|
outer.setDocShellIsActiveAndForeground = value => {
|
|
inner.frameLoader.tabParent.setDocShellIsActiveAndForeground(value);
|
|
};
|
|
}),
|
|
|
|
stop() {
|
|
let tab = gBrowser.getTabForBrowser(outer);
|
|
let filteredProgressListener = gBrowser._tabFilters.get(tab);
|
|
browserWindow = null;
|
|
gBrowser = null;
|
|
|
|
// The browser's state has changed over time while the tunnel was active. Push the
|
|
// the current state down to the inner browser, so that it follows the content in
|
|
// case that browser will be swapped elsewhere.
|
|
for (let property of SWAPPED_BROWSER_STATE) {
|
|
inner[property] = outer[property];
|
|
}
|
|
|
|
// Remove the progress listener we added manually.
|
|
outer.webProgress.removeProgressListener(filteredProgressListener);
|
|
|
|
// Reset the XBL binding back to the default.
|
|
outer.destroy();
|
|
outer.style.MozBinding = "";
|
|
|
|
// Reset overridden XBL properties and methods. Deleting the override
|
|
// means it will fallback to the original XBL binding definitions which
|
|
// are on the prototype.
|
|
delete outer.messageManager;
|
|
delete outer.isRemoteBrowser;
|
|
delete outer.hasContentOpener;
|
|
delete outer.docShellIsActive;
|
|
delete outer.setDocShellIsActiveAndForeground;
|
|
|
|
mmTunnel.destroy();
|
|
mmTunnel = null;
|
|
|
|
// Invalidate outer's permanentKey so that SessionStore stops associating
|
|
// things that happen to the outer browser with the content inside in the
|
|
// inner browser.
|
|
outer.permanentKey = { id: "zombie" };
|
|
},
|
|
|
|
};
|
|
}
|
|
|
|
exports.tunnelToInnerBrowser = tunnelToInnerBrowser;
|
|
|
|
function copyPermanentKey(outer, inner) {
|
|
// When we're in the process of swapping content around, we end up receiving a
|
|
// SessionStore:update message which lists the container page that is loaded into the
|
|
// outer browser (that we're hiding the inner browser within) as part of its history.
|
|
// We want SessionStore's view of the history for our tab to only have the page content
|
|
// of the inner browser, so we want to hide this message from SessionStore, but we have
|
|
// no direct mechanism to do so. As a workaround, we wait until the one errant message
|
|
// has gone by, and then we copy the permanentKey after that, since the permanentKey is
|
|
// what SessionStore uses to identify each browser.
|
|
let outerMM = outer.frameLoader.messageManager;
|
|
let onHistoryEntry = message => {
|
|
let history = message.data.data.history;
|
|
if (!history || !history.entries) {
|
|
// Wait for a message that contains history data
|
|
return;
|
|
}
|
|
outerMM.removeMessageListener("SessionStore:update", onHistoryEntry);
|
|
debug("Got session update for outer browser");
|
|
DevToolsUtils.executeSoon(() => {
|
|
debug("Copy inner permanentKey to outer browser");
|
|
outer.permanentKey = inner.permanentKey;
|
|
});
|
|
};
|
|
outerMM.addMessageListener("SessionStore:update", onHistoryEntry);
|
|
}
|
|
|
|
/**
|
|
* This module allows specific messages of interest to be directed from the
|
|
* outer browser to the inner browser (and vice versa) in a targetted fashion
|
|
* without having to touch the original code paths that use them.
|
|
*/
|
|
function MessageManagerTunnel(outer, inner) {
|
|
if (outer.isRemoteBrowser) {
|
|
throw new Error("The outer browser must be non-remote.");
|
|
}
|
|
this.outer = outer;
|
|
this.inner = inner;
|
|
this.init();
|
|
}
|
|
|
|
MessageManagerTunnel.prototype = {
|
|
|
|
/**
|
|
* Most message manager methods are left alone and are just passed along to
|
|
* the outer browser's real message manager. `sendAsyncMessage` is only one
|
|
* with special behavior.
|
|
*/
|
|
PASS_THROUGH_METHODS: [
|
|
"addMessageListener",
|
|
"loadFrameScript",
|
|
"killChild",
|
|
"assertPermission",
|
|
"assertContainApp",
|
|
"assertAppHasPermission",
|
|
"assertAppHasStatus",
|
|
"removeDelayedFrameScript",
|
|
"getDelayedFrameScripts",
|
|
"loadProcessScript",
|
|
"removeDelayedProcessScript",
|
|
"getDelayedProcessScripts",
|
|
"removeMessageListener",
|
|
"addWeakMessageListener",
|
|
"removeWeakMessageListener",
|
|
],
|
|
|
|
OUTER_TO_INNER_MESSAGES: [
|
|
// Messages sent from remote-browser.xml
|
|
"Browser:PurgeSessionHistory",
|
|
"InPermitUnload",
|
|
"PermitUnload",
|
|
// Messages sent from browser.js
|
|
"Browser:Reload",
|
|
// Messages sent from SelectParentHelper.jsm
|
|
"Forms:DismissedDropDown",
|
|
"Forms:MouseOut",
|
|
"Forms:MouseOver",
|
|
"Forms:SelectDropDownItem",
|
|
// Messages sent from SessionStore.jsm
|
|
"SessionStore:flush",
|
|
],
|
|
|
|
INNER_TO_OUTER_MESSAGES: [
|
|
// Messages sent to RemoteWebProgress.jsm
|
|
"Content:LoadURIResult",
|
|
"Content:LocationChange",
|
|
"Content:ProgressChange",
|
|
"Content:SecurityChange",
|
|
"Content:StateChange",
|
|
"Content:StatusChange",
|
|
// Messages sent to remote-browser.xml
|
|
"DOMTitleChanged",
|
|
"ImageDocumentLoaded",
|
|
"Forms:ShowDropDown",
|
|
"Forms:HideDropDown",
|
|
"InPermitUnload",
|
|
"PermitUnload",
|
|
// Messages sent to SelectParentHelper.jsm
|
|
"Forms:UpdateDropDown",
|
|
// Messages sent to browser.js
|
|
"PageVisibility:Hide",
|
|
"PageVisibility:Show",
|
|
// Messages sent to SessionStore.jsm
|
|
"SessionStore:update",
|
|
// Messages sent to BrowserTestUtils.jsm
|
|
"browser-test-utils:loadEvent",
|
|
],
|
|
|
|
get outerParentMM() {
|
|
return this.outer.frameLoader.messageManager;
|
|
},
|
|
|
|
get outerChildMM() {
|
|
// This is only possible because we require the outer browser to be
|
|
// non-remote, so we're able to reach into its window and use the child
|
|
// side message manager there.
|
|
let docShell = this.outer.frameLoader.docShell;
|
|
return docShell.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
.getInterface(Ci.nsIContentFrameMessageManager);
|
|
},
|
|
|
|
get innerParentMM() {
|
|
return this.inner.frameLoader.messageManager;
|
|
},
|
|
|
|
sendAsyncMessage(name, ...args) {
|
|
debug(`Calling sendAsyncMessage for ${name}`);
|
|
|
|
if (!this.OUTER_TO_INNER_MESSAGES.includes(name)) {
|
|
debug(`Should ${name} go to inner?`);
|
|
this.outerParentMM.sendAsyncMessage(name, ...args);
|
|
return;
|
|
}
|
|
|
|
debug(`${name} outer -> inner`);
|
|
this.innerParentMM.sendAsyncMessage(name, ...args);
|
|
},
|
|
|
|
init() {
|
|
for (let method of this.PASS_THROUGH_METHODS) {
|
|
// Workaround bug 449811 to ensure a fresh binding each time through the loop
|
|
let _method = method;
|
|
this[_method] = (...args) => {
|
|
return this.outerParentMM[_method](...args);
|
|
};
|
|
}
|
|
|
|
for (let message of this.INNER_TO_OUTER_MESSAGES) {
|
|
this.innerParentMM.addMessageListener(message, this);
|
|
}
|
|
},
|
|
|
|
destroy() {
|
|
for (let message of this.INNER_TO_OUTER_MESSAGES) {
|
|
this.innerParentMM.removeMessageListener(message, this);
|
|
}
|
|
},
|
|
|
|
receiveMessage({ name, data, objects, principal }) {
|
|
if (!this.INNER_TO_OUTER_MESSAGES.includes(name)) {
|
|
debug(`Received unexpected message ${name}`);
|
|
return;
|
|
}
|
|
|
|
debug(`${name} inner -> outer`);
|
|
this.outerChildMM.sendAsyncMessage(name, data, objects, principal);
|
|
},
|
|
|
|
};
|