forked from mirrors/gecko-dev
		
	 0412b67dd7
			
		
	
	
		0412b67dd7
		
	
	
	
	
		
			
			<!-- Please describe your changes on the following line: --> Now that script has `WindowProxy` rather than `BrowsingContext` objects, we can rename `Frame` in the constellation to `BrowsingContext`. In particular, this means that `FrameId`s are now `BrowsingContextid`s, which better captures their purpose (and they are used in a lot of places, not just the constellation). --- <!-- Thank you for contributing to Servo! Please replace each `[ ]` by `[X]` when the step is complete, and replace `__` with appropriate data: --> - [X] `./mach build -d` does not report any errors - [X] `./mach test-tidy` does not report any errors - [X] These changes do not require tests because renaming <!-- Also, please make sure that "Allow edits from maintainers" checkbox is checked, so that we can help you if you get stuck somewhere along the way.--> <!-- Pull requests that do not address these steps are welcome, but they will require additional verification as part of the review process. --> Source-Repo: https://github.com/servo/servo Source-Revision: 837531992864f920342020462830b933d5ed0280 --HG-- extra : subtree_source : https%3A//hg.mozilla.org/projects/converted-servo-linear extra : subtree_revision : c73d366cabd57d2776dbe787880f363ce7bae144
		
			
				
	
	
		
			808 lines
		
	
	
	
		
			33 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
			
		
		
	
	
			808 lines
		
	
	
	
		
			33 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
| /* This Source Code Form is subject to the terms of the Mozilla Public
 | |
|  * License, v. 2.0. If a copy of the MPL was not distributed with this
 | |
|  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 | |
| 
 | |
| use document_loader::{LoadBlocker, LoadType};
 | |
| use dom::attr::Attr;
 | |
| use dom::bindings::cell::DOMRefCell;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementErrorEventDetail;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementIconChangeEventDetail;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementLocationChangeEventDetail;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementOpenTabEventDetail;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementOpenWindowEventDetail;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementSecurityChangeDetail;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementVisibilityChangeEventDetail;
 | |
| use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserShowModalPromptEventDetail;
 | |
| use dom::bindings::codegen::Bindings::HTMLIFrameElementBinding;
 | |
| use dom::bindings::codegen::Bindings::HTMLIFrameElementBinding::HTMLIFrameElementMethods;
 | |
| use dom::bindings::codegen::Bindings::WindowBinding::WindowBinding::WindowMethods;
 | |
| use dom::bindings::conversions::ToJSValConvertible;
 | |
| use dom::bindings::error::{Error, ErrorResult, Fallible};
 | |
| use dom::bindings::inheritance::Castable;
 | |
| use dom::bindings::js::{LayoutJS, MutNullableJS, Root};
 | |
| use dom::bindings::refcounted::Trusted;
 | |
| use dom::bindings::reflector::DomObject;
 | |
| use dom::bindings::str::DOMString;
 | |
| use dom::customevent::CustomEvent;
 | |
| use dom::document::Document;
 | |
| use dom::domtokenlist::DOMTokenList;
 | |
| use dom::element::{AttributeMutation, Element, RawLayoutElementHelpers};
 | |
| use dom::event::Event;
 | |
| use dom::eventtarget::EventTarget;
 | |
| use dom::globalscope::GlobalScope;
 | |
| use dom::htmlelement::HTMLElement;
 | |
| use dom::node::{Node, NodeDamage, UnbindContext, document_from_node, window_from_node};
 | |
| use dom::virtualmethods::VirtualMethods;
 | |
| use dom::window::{ReflowReason, Window};
 | |
| use dom::windowproxy::WindowProxy;
 | |
| use dom_struct::dom_struct;
 | |
| use html5ever::{LocalName, Prefix};
 | |
| use ipc_channel::ipc;
 | |
| use js::jsapi::{JSAutoCompartment, JSContext, MutableHandleValue};
 | |
| use js::jsval::{NullValue, UndefinedValue};
 | |
| use msg::constellation_msg::{FrameType, BrowsingContextId, PipelineId, TraversalDirection};
 | |
| use net_traits::response::HttpsState;
 | |
| use script_layout_interface::message::ReflowQueryType;
 | |
| use script_thread::{ScriptThread, Runnable};
 | |
| use script_traits::{IFrameLoadInfo, IFrameLoadInfoWithData, LoadData, UpdatePipelineIdReason};
 | |
| use script_traits::{MozBrowserEvent, NewLayoutInfo, ScriptMsg as ConstellationMsg};
 | |
| use script_traits::IFrameSandboxState::{IFrameSandboxed, IFrameUnsandboxed};
 | |
| use servo_atoms::Atom;
 | |
| use servo_config::prefs::PREFS;
 | |
| use servo_config::servo_version;
 | |
| use servo_url::ServoUrl;
 | |
| use std::cell::Cell;
 | |
| use style::attr::{AttrValue, LengthOrPercentageOrAuto};
 | |
| use style::context::ReflowGoal;
 | |
| use task_source::TaskSource;
 | |
| 
 | |
| bitflags! {
 | |
|     #[derive(JSTraceable, HeapSizeOf)]
 | |
|     flags SandboxAllowance: u8 {
 | |
|         const ALLOW_NOTHING = 0x00,
 | |
|         const ALLOW_SAME_ORIGIN = 0x01,
 | |
|         const ALLOW_TOP_NAVIGATION = 0x02,
 | |
|         const ALLOW_FORMS = 0x04,
 | |
|         const ALLOW_SCRIPTS = 0x08,
 | |
|         const ALLOW_POINTER_LOCK = 0x10,
 | |
|         const ALLOW_POPUPS = 0x20
 | |
|     }
 | |
| }
 | |
| 
 | |
| #[derive(PartialEq)]
 | |
| pub enum NavigationType {
 | |
|     InitialAboutBlank,
 | |
|     Regular,
 | |
| }
 | |
| 
 | |
| #[derive(PartialEq)]
 | |
| enum ProcessingMode {
 | |
|     FirstTime,
 | |
|     NotFirstTime,
 | |
| }
 | |
| 
 | |
| #[dom_struct]
 | |
| pub struct HTMLIFrameElement {
 | |
|     htmlelement: HTMLElement,
 | |
|     browsing_context_id: BrowsingContextId,
 | |
|     pipeline_id: Cell<Option<PipelineId>>,
 | |
|     pending_pipeline_id: Cell<Option<PipelineId>>,
 | |
|     sandbox: MutNullableJS<DOMTokenList>,
 | |
|     sandbox_allowance: Cell<Option<SandboxAllowance>>,
 | |
|     load_blocker: DOMRefCell<Option<LoadBlocker>>,
 | |
|     visibility: Cell<bool>,
 | |
| }
 | |
| 
 | |
| impl HTMLIFrameElement {
 | |
|     pub fn is_sandboxed(&self) -> bool {
 | |
|         self.sandbox_allowance.get().is_some()
 | |
|     }
 | |
| 
 | |
|     /// <https://html.spec.whatwg.org/multipage/#otherwise-steps-for-iframe-or-frame-elements>,
 | |
|     /// step 1.
 | |
|     fn get_url(&self) -> ServoUrl {
 | |
|         let element = self.upcast::<Element>();
 | |
|         element.get_attribute(&ns!(), &local_name!("src")).and_then(|src| {
 | |
|             let url = src.value();
 | |
|             if url.is_empty() {
 | |
|                 None
 | |
|             } else {
 | |
|                 document_from_node(self).base_url().join(&url).ok()
 | |
|             }
 | |
|         }).unwrap_or_else(|| ServoUrl::parse("about:blank").unwrap())
 | |
|     }
 | |
| 
 | |
|     pub fn generate_new_pipeline_id(&self) -> (Option<PipelineId>, PipelineId) {
 | |
|         let old_pipeline_id = self.pipeline_id.get();
 | |
|         let new_pipeline_id = PipelineId::new();
 | |
|         debug!("Frame {} created pipeline {}.", self.browsing_context_id, new_pipeline_id);
 | |
|         (old_pipeline_id, new_pipeline_id)
 | |
|     }
 | |
| 
 | |
|     pub fn navigate_or_reload_child_browsing_context(&self,
 | |
|                                                      load_data: Option<LoadData>,
 | |
|                                                      nav_type: NavigationType,
 | |
|                                                      replace: bool) {
 | |
|         let sandboxed = if self.is_sandboxed() {
 | |
|             IFrameSandboxed
 | |
|         } else {
 | |
|             IFrameUnsandboxed
 | |
|         };
 | |
| 
 | |
|         let document = document_from_node(self);
 | |
| 
 | |
|         let mut load_blocker = self.load_blocker.borrow_mut();
 | |
|         // Any oustanding load is finished from the point of view of the blocked
 | |
|         // document; the new navigation will continue blocking it.
 | |
|         LoadBlocker::terminate(&mut load_blocker);
 | |
| 
 | |
|         //TODO(#9592): Deal with the case where an iframe is being reloaded so url is None.
 | |
|         //      The iframe should always have access to the nested context's active
 | |
|         //      document URL through the browsing context.
 | |
|         if let Some(ref load_data) = load_data {
 | |
|             *load_blocker = Some(LoadBlocker::new(&*document, LoadType::Subframe(load_data.url.clone())));
 | |
|         }
 | |
| 
 | |
|         let window = window_from_node(self);
 | |
|         let (old_pipeline_id, new_pipeline_id) = self.generate_new_pipeline_id();
 | |
|         self.pending_pipeline_id.set(Some(new_pipeline_id));
 | |
|         let private_iframe = self.privatebrowsing();
 | |
|         let frame_type = if self.Mozbrowser() { FrameType::MozBrowserIFrame } else { FrameType::IFrame };
 | |
| 
 | |
|         let global_scope = window.upcast::<GlobalScope>();
 | |
|         let load_info = IFrameLoadInfo {
 | |
|             parent_pipeline_id: global_scope.pipeline_id(),
 | |
|             browsing_context_id: self.browsing_context_id,
 | |
|             new_pipeline_id: new_pipeline_id,
 | |
|             is_private: private_iframe,
 | |
|             frame_type: frame_type,
 | |
|             replace: replace,
 | |
|         };
 | |
| 
 | |
|         match nav_type {
 | |
|             NavigationType::InitialAboutBlank => {
 | |
|                 let (pipeline_sender, pipeline_receiver) = ipc::channel().unwrap();
 | |
| 
 | |
|                 global_scope
 | |
|                     .constellation_chan()
 | |
|                     .send(ConstellationMsg::ScriptNewIFrame(load_info, pipeline_sender))
 | |
|                     .unwrap();
 | |
| 
 | |
|                 let new_layout_info = NewLayoutInfo {
 | |
|                     parent_info: Some((global_scope.pipeline_id(), frame_type)),
 | |
|                     new_pipeline_id: new_pipeline_id,
 | |
|                     browsing_context_id: self.browsing_context_id,
 | |
|                     load_data: load_data.unwrap(),
 | |
|                     pipeline_port: pipeline_receiver,
 | |
|                     content_process_shutdown_chan: None,
 | |
|                     window_size: None,
 | |
|                     layout_threads: PREFS.get("layout.threads").as_u64().expect("count") as usize,
 | |
|                 };
 | |
| 
 | |
|                 self.pipeline_id.set(Some(new_pipeline_id));
 | |
|                 ScriptThread::process_attach_layout(new_layout_info, document.origin().clone());
 | |
|             },
 | |
|             NavigationType::Regular => {
 | |
|                 let load_info = IFrameLoadInfoWithData {
 | |
|                     info: load_info,
 | |
|                     load_data: load_data,
 | |
|                     old_pipeline_id: old_pipeline_id,
 | |
|                     sandbox: sandboxed,
 | |
|                 };
 | |
|                 global_scope
 | |
|                   .constellation_chan()
 | |
|                   .send(ConstellationMsg::ScriptLoadedURLInIFrame(load_info))
 | |
|                   .unwrap();
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         if PREFS.is_mozbrowser_enabled() {
 | |
|             // https://developer.mozilla.org/en-US/docs/Web/Events/mozbrowserloadstart
 | |
|             self.dispatch_mozbrowser_event(MozBrowserEvent::LoadStart);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /// https://html.spec.whatwg.org/multipage/#process-the-iframe-attributes
 | |
|     fn process_the_iframe_attributes(&self, mode: ProcessingMode) {
 | |
|         // TODO: srcdoc
 | |
| 
 | |
|         let window = window_from_node(self);
 | |
| 
 | |
|         // https://github.com/whatwg/html/issues/490
 | |
|         if mode == ProcessingMode::FirstTime && !self.upcast::<Element>().has_attribute(&local_name!("src")) {
 | |
|             let event_loop = window.dom_manipulation_task_source();
 | |
|             let _ = event_loop.queue(box IFrameLoadEventSteps::new(self),
 | |
|                                      window.upcast());
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         let url = self.get_url();
 | |
| 
 | |
|         // TODO: check ancestor browsing contexts for same URL
 | |
| 
 | |
|         let creator_pipeline_id = if url.as_str() == "about:blank" {
 | |
|             Some(window.upcast::<GlobalScope>().pipeline_id())
 | |
|         } else {
 | |
|             None
 | |
|         };
 | |
| 
 | |
|         let document = document_from_node(self);
 | |
|         let load_data = LoadData::new(url, creator_pipeline_id, document.get_referrer_policy(), Some(document.url()));
 | |
|         self.navigate_or_reload_child_browsing_context(Some(load_data), NavigationType::Regular, false);
 | |
|     }
 | |
| 
 | |
|     #[allow(unsafe_code)]
 | |
|     pub fn dispatch_mozbrowser_event(&self, event: MozBrowserEvent) {
 | |
|         assert!(PREFS.is_mozbrowser_enabled());
 | |
| 
 | |
|         if self.Mozbrowser() {
 | |
|             let window = window_from_node(self);
 | |
|             let custom_event = build_mozbrowser_custom_event(&window, event);
 | |
|             custom_event.upcast::<Event>().fire(self.upcast());
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     fn create_nested_browsing_context(&self) {
 | |
|         // Synchronously create a new context and navigate it to about:blank.
 | |
|         let url = ServoUrl::parse("about:blank").unwrap();
 | |
|         let document = document_from_node(self);
 | |
|         let pipeline_id = Some(window_from_node(self).upcast::<GlobalScope>().pipeline_id());
 | |
|         let load_data = LoadData::new(url, pipeline_id, document.get_referrer_policy(), Some(document.url().clone()));
 | |
|         self.navigate_or_reload_child_browsing_context(Some(load_data), NavigationType::InitialAboutBlank, false);
 | |
|     }
 | |
| 
 | |
|     pub fn update_pipeline_id(&self, new_pipeline_id: PipelineId, reason: UpdatePipelineIdReason) {
 | |
|         if self.pending_pipeline_id.get() != Some(new_pipeline_id) && reason == UpdatePipelineIdReason::Navigation {
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         self.pipeline_id.set(Some(new_pipeline_id));
 | |
| 
 | |
|         // Only terminate the load blocker if the pipeline id was updated due to a traversal.
 | |
|         // The load blocker will be terminated for a navigation in iframe_load_event_steps.
 | |
|         if reason == UpdatePipelineIdReason::Traversal {
 | |
|             let mut blocker = self.load_blocker.borrow_mut();
 | |
|             LoadBlocker::terminate(&mut blocker);
 | |
|         }
 | |
| 
 | |
|         self.upcast::<Node>().dirty(NodeDamage::OtherNodeDamage);
 | |
|         let window = window_from_node(self);
 | |
|         window.reflow(ReflowGoal::ForDisplay,
 | |
|                       ReflowQueryType::NoQuery,
 | |
|                       ReflowReason::FramedContentChanged);
 | |
|     }
 | |
| 
 | |
|     fn new_inherited(local_name: LocalName,
 | |
|                      prefix: Option<Prefix>,
 | |
|                      document: &Document) -> HTMLIFrameElement {
 | |
|         HTMLIFrameElement {
 | |
|             htmlelement: HTMLElement::new_inherited(local_name, prefix, document),
 | |
|             browsing_context_id: BrowsingContextId::new(),
 | |
|             pipeline_id: Cell::new(None),
 | |
|             pending_pipeline_id: Cell::new(None),
 | |
|             sandbox: Default::default(),
 | |
|             sandbox_allowance: Cell::new(None),
 | |
|             load_blocker: DOMRefCell::new(None),
 | |
|             visibility: Cell::new(true),
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     #[allow(unrooted_must_root)]
 | |
|     pub fn new(local_name: LocalName,
 | |
|                prefix: Option<Prefix>,
 | |
|                document: &Document) -> Root<HTMLIFrameElement> {
 | |
|         Node::reflect_node(box HTMLIFrameElement::new_inherited(local_name, prefix, document),
 | |
|                            document,
 | |
|                            HTMLIFrameElementBinding::Wrap)
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     pub fn pipeline_id(&self) -> Option<PipelineId> {
 | |
|         self.pipeline_id.get()
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     pub fn browsing_context_id(&self) -> BrowsingContextId {
 | |
|         self.browsing_context_id
 | |
|     }
 | |
| 
 | |
|     pub fn change_visibility_status(&self, visibility: bool) {
 | |
|         if self.visibility.get() != visibility {
 | |
|             self.visibility.set(visibility);
 | |
| 
 | |
|             // Visibility changes are only exposed to Mozbrowser iframes
 | |
|             if self.Mozbrowser() {
 | |
|                 self.dispatch_mozbrowser_event(MozBrowserEvent::VisibilityChange(visibility));
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     pub fn set_visible(&self, visible: bool) {
 | |
|         if let Some(pipeline_id) = self.pipeline_id.get() {
 | |
|             let window = window_from_node(self);
 | |
|             let msg = ConstellationMsg::SetVisible(pipeline_id, visible);
 | |
|             window.upcast::<GlobalScope>().constellation_chan().send(msg).unwrap();
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /// https://html.spec.whatwg.org/multipage/#iframe-load-event-steps steps 1-4
 | |
|     pub fn iframe_load_event_steps(&self, loaded_pipeline: PipelineId) {
 | |
|         // TODO(#9592): assert that the load blocker is present at all times when we
 | |
|         //              can guarantee that it's created for the case of iframe.reload().
 | |
|         if Some(loaded_pipeline) != self.pending_pipeline_id.get() { return; }
 | |
| 
 | |
|         // TODO A cross-origin child document would not be easily accessible
 | |
|         //      from this script thread. It's unclear how to implement
 | |
|         //      steps 2, 3, and 5 efficiently in this case.
 | |
|         // TODO Step 2 - check child document `mute iframe load` flag
 | |
|         // TODO Step 3 - set child document  `mut iframe load` flag
 | |
| 
 | |
|         // Step 4
 | |
|         self.upcast::<EventTarget>().fire_event(atom!("load"));
 | |
| 
 | |
|         let mut blocker = self.load_blocker.borrow_mut();
 | |
|         LoadBlocker::terminate(&mut blocker);
 | |
| 
 | |
|         // TODO Step 5 - unset child document `mut iframe load` flag
 | |
| 
 | |
|         let window = window_from_node(self);
 | |
|         window.reflow(ReflowGoal::ForDisplay,
 | |
|                       ReflowQueryType::NoQuery,
 | |
|                       ReflowReason::IFrameLoadEvent);
 | |
|     }
 | |
| 
 | |
|     /// Check whether the iframe has the mozprivatebrowsing attribute set
 | |
|     pub fn privatebrowsing(&self) -> bool {
 | |
|         if self.Mozbrowser() {
 | |
|             let element = self.upcast::<Element>();
 | |
|             element.has_attribute(&LocalName::from("mozprivatebrowsing"))
 | |
|         } else {
 | |
|             false
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| pub trait HTMLIFrameElementLayoutMethods {
 | |
|     fn pipeline_id(&self) -> Option<PipelineId>;
 | |
|     fn browsing_context_id(&self) -> BrowsingContextId;
 | |
|     fn get_width(&self) -> LengthOrPercentageOrAuto;
 | |
|     fn get_height(&self) -> LengthOrPercentageOrAuto;
 | |
| }
 | |
| 
 | |
| impl HTMLIFrameElementLayoutMethods for LayoutJS<HTMLIFrameElement> {
 | |
|     #[inline]
 | |
|     #[allow(unsafe_code)]
 | |
|     fn pipeline_id(&self) -> Option<PipelineId> {
 | |
|         unsafe {
 | |
|             (*self.unsafe_get()).pipeline_id.get()
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     #[allow(unsafe_code)]
 | |
|     fn browsing_context_id(&self) -> BrowsingContextId {
 | |
|         unsafe {
 | |
|             (*self.unsafe_get()).browsing_context_id
 | |
|         }
 | |
|     }
 | |
| 
 | |
| 
 | |
|     #[allow(unsafe_code)]
 | |
|     fn get_width(&self) -> LengthOrPercentageOrAuto {
 | |
|         unsafe {
 | |
|             (*self.upcast::<Element>().unsafe_get())
 | |
|                 .get_attr_for_layout(&ns!(), &local_name!("width"))
 | |
|                 .map(AttrValue::as_dimension)
 | |
|                 .cloned()
 | |
|                 .unwrap_or(LengthOrPercentageOrAuto::Auto)
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     #[allow(unsafe_code)]
 | |
|     fn get_height(&self) -> LengthOrPercentageOrAuto {
 | |
|         unsafe {
 | |
|             (*self.upcast::<Element>().unsafe_get())
 | |
|                 .get_attr_for_layout(&ns!(), &local_name!("height"))
 | |
|                 .map(AttrValue::as_dimension)
 | |
|                 .cloned()
 | |
|                 .unwrap_or(LengthOrPercentageOrAuto::Auto)
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| #[allow(unsafe_code)]
 | |
| pub fn build_mozbrowser_custom_event(window: &Window, event: MozBrowserEvent) -> Root<CustomEvent> {
 | |
|     // TODO(gw): Support mozbrowser event types that have detail which is not a string.
 | |
|     // See https://developer.mozilla.org/en-US/docs/Web/API/Using_the_Browser_API
 | |
|     // for a list of mozbrowser events.
 | |
|     let cx = window.get_cx();
 | |
|     let _ac = JSAutoCompartment::new(cx, window.reflector().get_jsobject().get());
 | |
|     rooted!(in(cx) let mut detail = UndefinedValue());
 | |
|     let event_name = Atom::from(event.name());
 | |
|     unsafe { build_mozbrowser_event_detail(event, cx, detail.handle_mut()); }
 | |
|     CustomEvent::new(window.upcast(),
 | |
|                      event_name,
 | |
|                      true,
 | |
|                      true,
 | |
|                      detail.handle())
 | |
| }
 | |
| 
 | |
| #[allow(unsafe_code)]
 | |
| unsafe fn build_mozbrowser_event_detail(event: MozBrowserEvent,
 | |
|                                         cx: *mut JSContext,
 | |
|                                         rval: MutableHandleValue) {
 | |
|     match event {
 | |
|         MozBrowserEvent::AsyncScroll | MozBrowserEvent::Close | MozBrowserEvent::ContextMenu |
 | |
|         MozBrowserEvent::LoadEnd | MozBrowserEvent::LoadStart |
 | |
|         MozBrowserEvent::Connected | MozBrowserEvent::OpenSearch  |
 | |
|         MozBrowserEvent::UsernameAndPasswordRequired => {
 | |
|             rval.set(NullValue());
 | |
|         }
 | |
|         MozBrowserEvent::Error(error_type, description, report) => {
 | |
|             BrowserElementErrorEventDetail {
 | |
|                 type_: Some(DOMString::from(error_type.name())),
 | |
|                 description: Some(DOMString::from(description)),
 | |
|                 report: Some(DOMString::from(report)),
 | |
|                 version: Some(DOMString::from_string(servo_version())),
 | |
|             }.to_jsval(cx, rval);
 | |
|         },
 | |
|         MozBrowserEvent::SecurityChange(https_state) => {
 | |
|             BrowserElementSecurityChangeDetail {
 | |
|                 // https://developer.mozilla.org/en-US/docs/Web/Events/mozbrowsersecuritychange
 | |
|                 state: Some(DOMString::from(match https_state {
 | |
|                     HttpsState::Modern => "secure",
 | |
|                     HttpsState::Deprecated => "broken",
 | |
|                     HttpsState::None => "insecure",
 | |
|                 }.to_owned())),
 | |
|                 // FIXME - Not supported yet:
 | |
|                 trackingContent: None,
 | |
|                 mixedContent: None,
 | |
|                 trackingState: None,
 | |
|                 extendedValidation: None,
 | |
|                 mixedState: None,
 | |
|             }.to_jsval(cx, rval);
 | |
|         }
 | |
|         MozBrowserEvent::TitleChange(ref string) => {
 | |
|             string.to_jsval(cx, rval);
 | |
|         }
 | |
|         MozBrowserEvent::LocationChange(url, can_go_back, can_go_forward) => {
 | |
|             BrowserElementLocationChangeEventDetail {
 | |
|                 url: Some(DOMString::from(url)),
 | |
|                 canGoBack: Some(can_go_back),
 | |
|                 canGoForward: Some(can_go_forward),
 | |
|             }.to_jsval(cx, rval);
 | |
|         }
 | |
|         MozBrowserEvent::OpenTab(url) => {
 | |
|             BrowserElementOpenTabEventDetail {
 | |
|                 url: Some(DOMString::from(url)),
 | |
|             }.to_jsval(cx, rval);
 | |
|         }
 | |
|         MozBrowserEvent::OpenWindow(url, target, features) => {
 | |
|             BrowserElementOpenWindowEventDetail {
 | |
|                 url: Some(DOMString::from(url)),
 | |
|                 target: target.map(DOMString::from),
 | |
|                 features: features.map(DOMString::from),
 | |
|             }.to_jsval(cx, rval);
 | |
|         }
 | |
|         MozBrowserEvent::IconChange(rel, href, sizes) => {
 | |
|             BrowserElementIconChangeEventDetail {
 | |
|                 rel: Some(DOMString::from(rel)),
 | |
|                 href: Some(DOMString::from(href)),
 | |
|                 sizes: Some(DOMString::from(sizes)),
 | |
|             }.to_jsval(cx, rval);
 | |
|         }
 | |
|         MozBrowserEvent::ShowModalPrompt(prompt_type, title, message, return_value) => {
 | |
|             BrowserShowModalPromptEventDetail {
 | |
|                 promptType: Some(DOMString::from(prompt_type)),
 | |
|                 title: Some(DOMString::from(title)),
 | |
|                 message: Some(DOMString::from(message)),
 | |
|                 returnValue: Some(DOMString::from(return_value)),
 | |
|             }.to_jsval(cx, rval)
 | |
|         }
 | |
|         MozBrowserEvent::VisibilityChange(visibility) => {
 | |
|             BrowserElementVisibilityChangeEventDetail {
 | |
|                 visible: Some(visibility),
 | |
|             }.to_jsval(cx, rval);
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| pub fn Navigate(iframe: &HTMLIFrameElement, direction: TraversalDirection) -> ErrorResult {
 | |
|     if iframe.Mozbrowser() {
 | |
|         if iframe.upcast::<Node>().is_in_doc_with_browsing_context() {
 | |
|             let window = window_from_node(iframe);
 | |
|             let msg = ConstellationMsg::TraverseHistory(iframe.pipeline_id(), direction);
 | |
|             window.upcast::<GlobalScope>().constellation_chan().send(msg).unwrap();
 | |
|         }
 | |
| 
 | |
|         Ok(())
 | |
|     } else {
 | |
|         debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top",
 | |
|             "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)"));
 | |
|         Err(Error::NotSupported)
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl HTMLIFrameElementMethods for HTMLIFrameElement {
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-iframe-src
 | |
|     fn Src(&self) -> DOMString {
 | |
|         self.upcast::<Element>().get_string_attribute(&local_name!("src"))
 | |
|     }
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-iframe-src
 | |
|     fn SetSrc(&self, src: DOMString) {
 | |
|         self.upcast::<Element>().set_url_attribute(&local_name!("src"), src)
 | |
|     }
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-iframe-sandbox
 | |
|     fn Sandbox(&self) -> Root<DOMTokenList> {
 | |
|         self.sandbox.or_init(|| DOMTokenList::new(self.upcast::<Element>(), &local_name!("sandbox")))
 | |
|     }
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-iframe-contentwindow
 | |
|     fn GetContentWindow(&self) -> Option<Root<WindowProxy>> {
 | |
|         self.pipeline_id.get().and_then(|_| ScriptThread::find_window_proxy(self.browsing_context_id))
 | |
|     }
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-iframe-contentdocument
 | |
|     // https://html.spec.whatwg.org/multipage/#concept-bcc-content-document
 | |
|     fn GetContentDocument(&self) -> Option<Root<Document>> {
 | |
|         // Step 1.
 | |
|         let pipeline_id = match self.pipeline_id.get() {
 | |
|             None => return None,
 | |
|             Some(pipeline_id) => pipeline_id,
 | |
|         };
 | |
|         // Step 2-3.
 | |
|         // Note that this lookup will fail if the document is dissimilar-origin,
 | |
|         // so we should return None in that case.
 | |
|         let document = match ScriptThread::find_document(pipeline_id) {
 | |
|             None => return None,
 | |
|             Some(document) => document,
 | |
|         };
 | |
|         // Step 4.
 | |
|         let current = GlobalScope::current().as_window().Document();
 | |
|         if !current.origin().same_origin_domain(document.origin()) {
 | |
|             return None;
 | |
|         }
 | |
|         // Step 5.
 | |
|         Some(document)
 | |
|     }
 | |
| 
 | |
|     // Experimental mozbrowser implementation is based on the webidl
 | |
|     // present in the gecko source tree, and the documentation here:
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/API/Using_the_Browser_API
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-mozbrowser
 | |
|     fn Mozbrowser(&self) -> bool {
 | |
|         if window_from_node(self).is_mozbrowser() {
 | |
|             let element = self.upcast::<Element>();
 | |
|             element.has_attribute(&local_name!("mozbrowser"))
 | |
|         } else {
 | |
|             false
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-mozbrowser
 | |
|     fn SetMozbrowser(&self, value: bool) {
 | |
|         let element = self.upcast::<Element>();
 | |
|         element.set_bool_attribute(&local_name!("mozbrowser"), value);
 | |
|     }
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#attr-iframe-allowfullscreen
 | |
|     make_bool_getter!(AllowFullscreen, "allowfullscreen");
 | |
|     // https://html.spec.whatwg.org/multipage/#attr-iframe-allowfullscreen
 | |
|     make_bool_setter!(SetAllowFullscreen, "allowfullscreen");
 | |
| 
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/goBack
 | |
|     fn GoBack(&self) -> ErrorResult {
 | |
|         Navigate(self, TraversalDirection::Back(1))
 | |
|     }
 | |
| 
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/goForward
 | |
|     fn GoForward(&self) -> ErrorResult {
 | |
|         Navigate(self, TraversalDirection::Forward(1))
 | |
|     }
 | |
| 
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/reload
 | |
|     fn Reload(&self, _hard_reload: bool) -> ErrorResult {
 | |
|         if self.Mozbrowser() {
 | |
|             if self.upcast::<Node>().is_in_doc_with_browsing_context() {
 | |
|                 self.navigate_or_reload_child_browsing_context(None, NavigationType::Regular, true);
 | |
|             }
 | |
|             Ok(())
 | |
|         } else {
 | |
|             debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top",
 | |
|                 "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)"));
 | |
|             Err(Error::NotSupported)
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/setVisible
 | |
|     fn SetVisible(&self, visible: bool) -> ErrorResult {
 | |
|         if self.Mozbrowser() {
 | |
|             self.set_visible(visible);
 | |
|             Ok(())
 | |
|         } else {
 | |
|             debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top",
 | |
|                 "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)"));
 | |
|             Err(Error::NotSupported)
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/getVisible
 | |
|     fn GetVisible(&self) -> Fallible<bool> {
 | |
|         if self.Mozbrowser() {
 | |
|             Ok(self.visibility.get())
 | |
|         } else {
 | |
|             debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top",
 | |
|                 "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)"));
 | |
|             Err(Error::NotSupported)
 | |
|         }
 | |
|     }
 | |
| 
 | |
| 
 | |
|     // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/stop
 | |
|     fn Stop(&self) -> ErrorResult {
 | |
|         Err(Error::NotSupported)
 | |
|     }
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-dim-width
 | |
|     make_getter!(Width, "width");
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-dim-width
 | |
|     make_dimension_setter!(SetWidth, "width");
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-dim-height
 | |
|     make_getter!(Height, "height");
 | |
|     // https://html.spec.whatwg.org/multipage/#dom-dim-height
 | |
|     make_dimension_setter!(SetHeight, "height");
 | |
| 
 | |
|     // https://html.spec.whatwg.org/multipage/#other-elements,-attributes-and-apis:attr-iframe-frameborder
 | |
|     make_getter!(FrameBorder, "frameborder");
 | |
|     // https://html.spec.whatwg.org/multipage/#other-elements,-attributes-and-apis:attr-iframe-frameborder
 | |
|     make_setter!(SetFrameBorder, "frameborder");
 | |
| 
 | |
|     // check-tidy: no specs after this line
 | |
|     fn SetMozprivatebrowsing(&self, value: bool) {
 | |
|         let element = self.upcast::<Element>();
 | |
|         element.set_bool_attribute(&LocalName::from("mozprivatebrowsing"), value);
 | |
|     }
 | |
| 
 | |
|     fn Mozprivatebrowsing(&self) -> bool {
 | |
|         if window_from_node(self).is_mozbrowser() {
 | |
|             let element = self.upcast::<Element>();
 | |
|             element.has_attribute(&LocalName::from("mozprivatebrowsing"))
 | |
|         } else {
 | |
|             false
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl VirtualMethods for HTMLIFrameElement {
 | |
|     fn super_type(&self) -> Option<&VirtualMethods> {
 | |
|         Some(self.upcast::<HTMLElement>() as &VirtualMethods)
 | |
|     }
 | |
| 
 | |
|     fn attribute_mutated(&self, attr: &Attr, mutation: AttributeMutation) {
 | |
|         self.super_type().unwrap().attribute_mutated(attr, mutation);
 | |
|         match attr.local_name() {
 | |
|             &local_name!("sandbox") => {
 | |
|                 self.sandbox_allowance.set(mutation.new_value(attr).map(|value| {
 | |
|                     let mut modes = ALLOW_NOTHING;
 | |
|                     for token in value.as_tokens() {
 | |
|                         modes |= match &*token.to_ascii_lowercase() {
 | |
|                             "allow-same-origin" => ALLOW_SAME_ORIGIN,
 | |
|                             "allow-forms" => ALLOW_FORMS,
 | |
|                             "allow-pointer-lock" => ALLOW_POINTER_LOCK,
 | |
|                             "allow-popups" => ALLOW_POPUPS,
 | |
|                             "allow-scripts" => ALLOW_SCRIPTS,
 | |
|                             "allow-top-navigation" => ALLOW_TOP_NAVIGATION,
 | |
|                             _ => ALLOW_NOTHING
 | |
|                         };
 | |
|                     }
 | |
|                     modes
 | |
|                 }));
 | |
|             },
 | |
|             &local_name!("src") => {
 | |
|                 // https://html.spec.whatwg.org/multipage/#the-iframe-element
 | |
|                 // "Similarly, whenever an iframe element with a non-null nested browsing context
 | |
|                 // but with no srcdoc attribute specified has its src attribute set, changed, or removed,
 | |
|                 // the user agent must process the iframe attributes,"
 | |
|                 // but we can't check that directly, since the child browsing context
 | |
|                 // may be in a different script thread. Instread, we check to see if the parent
 | |
|                 // is in a document tree and has a browsing context, which is what causes
 | |
|                 // the child browsing context to be created.
 | |
|                 if self.upcast::<Node>().is_in_doc_with_browsing_context() {
 | |
|                     debug!("iframe {} src set while in browsing context.", self.browsing_context_id);
 | |
|                     self.process_the_iframe_attributes(ProcessingMode::NotFirstTime);
 | |
|                 }
 | |
|             },
 | |
|             _ => {},
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     fn parse_plain_attribute(&self, name: &LocalName, value: DOMString) -> AttrValue {
 | |
|         match name {
 | |
|             &local_name!("sandbox") => AttrValue::from_serialized_tokenlist(value.into()),
 | |
|             &local_name!("width") => AttrValue::from_dimension(value.into()),
 | |
|             &local_name!("height") => AttrValue::from_dimension(value.into()),
 | |
|             _ => self.super_type().unwrap().parse_plain_attribute(name, value),
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     fn bind_to_tree(&self, tree_in_doc: bool) {
 | |
|         if let Some(ref s) = self.super_type() {
 | |
|             s.bind_to_tree(tree_in_doc);
 | |
|         }
 | |
| 
 | |
|         // https://html.spec.whatwg.org/multipage/#the-iframe-element
 | |
|         // "When an iframe element is inserted into a document that has
 | |
|         // a browsing context, the user agent must create a new
 | |
|         // browsing context, set the element's nested browsing context
 | |
|         // to the newly-created browsing context, and then process the
 | |
|         // iframe attributes for the "first time"."
 | |
|         if self.upcast::<Node>().is_in_doc_with_browsing_context() {
 | |
|             debug!("iframe {} bound to browsing context.", self.browsing_context_id);
 | |
|             debug_assert!(tree_in_doc, "is_in_doc_with_bc, but not tree_in_doc");
 | |
|             self.create_nested_browsing_context();
 | |
|             self.process_the_iframe_attributes(ProcessingMode::FirstTime);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     fn unbind_from_tree(&self, context: &UnbindContext) {
 | |
|         self.super_type().unwrap().unbind_from_tree(context);
 | |
| 
 | |
|         let mut blocker = self.load_blocker.borrow_mut();
 | |
|         LoadBlocker::terminate(&mut blocker);
 | |
| 
 | |
|         // https://html.spec.whatwg.org/multipage/#a-browsing-context-is-discarded
 | |
|         debug!("Unbinding frame {}.", self.browsing_context_id);
 | |
|         let window = window_from_node(self);
 | |
|         let (sender, receiver) = ipc::channel().unwrap();
 | |
| 
 | |
|         // Ask the constellation to remove the iframe, and tell us the
 | |
|         // pipeline ids of the closed pipelines.
 | |
|         let msg = ConstellationMsg::RemoveIFrame(self.browsing_context_id, sender);
 | |
|         window.upcast::<GlobalScope>().constellation_chan().send(msg).unwrap();
 | |
|         let exited_pipeline_ids = receiver.recv().unwrap();
 | |
| 
 | |
|         // The spec for discarding is synchronous,
 | |
|         // so we need to discard the browsing contexts now, rather than
 | |
|         // when the `PipelineExit` message arrives.
 | |
|         for exited_pipeline_id in exited_pipeline_ids {
 | |
|             if let Some(exited_document) = ScriptThread::find_document(exited_pipeline_id) {
 | |
|                 exited_document.window().window_proxy().discard_browsing_context();
 | |
|                 for exited_iframe in exited_document.iter_iframes() {
 | |
|                     exited_iframe.pipeline_id.set(None);
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         // Resetting the pipeline_id to None is required here so that
 | |
|         // if this iframe is subsequently re-added to the document
 | |
|         // the load doesn't think that it's a navigation, but instead
 | |
|         // a new iframe. Without this, the constellation gets very
 | |
|         // confused.
 | |
|         self.pipeline_id.set(None);
 | |
|         self.pending_pipeline_id.set(None);
 | |
|     }
 | |
| }
 | |
| 
 | |
| struct IFrameLoadEventSteps {
 | |
|     frame_element: Trusted<HTMLIFrameElement>,
 | |
|     pipeline_id: PipelineId,
 | |
| }
 | |
| 
 | |
| impl IFrameLoadEventSteps {
 | |
|     fn new(frame_element: &HTMLIFrameElement) -> IFrameLoadEventSteps {
 | |
|         IFrameLoadEventSteps {
 | |
|             frame_element: Trusted::new(frame_element),
 | |
|             pipeline_id: frame_element.pipeline_id().unwrap(),
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl Runnable for IFrameLoadEventSteps {
 | |
|     fn handler(self: Box<IFrameLoadEventSteps>) {
 | |
|         let this = self.frame_element.root();
 | |
|         this.iframe_load_event_steps(self.pipeline_id);
 | |
|     }
 | |
| }
 |