forked from mirrors/gecko-dev
		
	
		
			
				
	
	
		
			162 lines
		
	
	
	
		
			5.4 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			162 lines
		
	
	
	
		
			5.4 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
 | 
						|
// This Source Code Form is subject to the terms of the Mozilla Public
 | 
						|
// License, v. 2.0. If a copy of the MPL was not distributed with this
 | 
						|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
 | 
						|
 | 
						|
ChromeUtils.import("resource://gre/modules/XPCOMUtils.jsm");
 | 
						|
 | 
						|
ChromeUtils.defineModuleGetter(this, "Services",
 | 
						|
  "resource://gre/modules/Services.jsm");
 | 
						|
ChromeUtils.defineModuleGetter(this, "NetUtil",
 | 
						|
  "resource://gre/modules/NetUtil.jsm");
 | 
						|
ChromeUtils.defineModuleGetter(this, "Utils",
 | 
						|
  "resource://gre/modules/sessionstore/Utils.jsm");
 | 
						|
ChromeUtils.defineModuleGetter(this, "PrivateBrowsingUtils",
 | 
						|
  "resource://gre/modules/PrivateBrowsingUtils.jsm");
 | 
						|
 | 
						|
function makeURI(url) {
 | 
						|
  return Services.io.newURI(url);
 | 
						|
}
 | 
						|
 | 
						|
function RemoteWebNavigation() {
 | 
						|
  this.wrappedJSObject = this;
 | 
						|
}
 | 
						|
 | 
						|
RemoteWebNavigation.prototype = {
 | 
						|
  classDescription: "nsIWebNavigation for remote browsers",
 | 
						|
  classID: Components.ID("{4b56964e-cdf3-4bb8-830c-0e2dad3f4ebd}"),
 | 
						|
  contractID: "@mozilla.org/remote-web-navigation;1",
 | 
						|
 | 
						|
  QueryInterface: ChromeUtils.generateQI([Ci.nsIWebNavigation]),
 | 
						|
 | 
						|
  swapBrowser(aBrowser) {
 | 
						|
    this._browser = aBrowser;
 | 
						|
  },
 | 
						|
 | 
						|
  LOAD_FLAGS_MASK: 65535,
 | 
						|
  LOAD_FLAGS_NONE: 0,
 | 
						|
  LOAD_FLAGS_IS_REFRESH: 16,
 | 
						|
  LOAD_FLAGS_IS_LINK: 32,
 | 
						|
  LOAD_FLAGS_BYPASS_HISTORY: 64,
 | 
						|
  LOAD_FLAGS_REPLACE_HISTORY: 128,
 | 
						|
  LOAD_FLAGS_BYPASS_CACHE: 256,
 | 
						|
  LOAD_FLAGS_BYPASS_PROXY: 512,
 | 
						|
  LOAD_FLAGS_CHARSET_CHANGE: 1024,
 | 
						|
  LOAD_FLAGS_STOP_CONTENT: 2048,
 | 
						|
  LOAD_FLAGS_FROM_EXTERNAL: 4096,
 | 
						|
  LOAD_FLAGS_ALLOW_THIRD_PARTY_FIXUP: 8192,
 | 
						|
  LOAD_FLAGS_FIRST_LOAD: 16384,
 | 
						|
  LOAD_FLAGS_ALLOW_POPUPS: 32768,
 | 
						|
  LOAD_FLAGS_BYPASS_CLASSIFIER: 65536,
 | 
						|
  LOAD_FLAGS_FORCE_ALLOW_COOKIES: 131072,
 | 
						|
 | 
						|
  STOP_NETWORK: 1,
 | 
						|
  STOP_CONTENT: 2,
 | 
						|
  STOP_ALL: 3,
 | 
						|
 | 
						|
  canGoBack: false,
 | 
						|
  canGoForward: false,
 | 
						|
  goBack() {
 | 
						|
    this._sendMessage("WebNavigation:GoBack", {});
 | 
						|
  },
 | 
						|
  goForward() {
 | 
						|
    this._sendMessage("WebNavigation:GoForward", {});
 | 
						|
  },
 | 
						|
  gotoIndex(aIndex) {
 | 
						|
    this._sendMessage("WebNavigation:GotoIndex", {index: aIndex});
 | 
						|
  },
 | 
						|
  loadURI(aURI, aLoadFlags, aReferrer, aPostData, aHeaders) {
 | 
						|
    this.loadURIWithOptions(aURI, aLoadFlags, aReferrer,
 | 
						|
                            Ci.nsIHttpChannel.REFERRER_POLICY_UNSET,
 | 
						|
                            aPostData, aHeaders, null);
 | 
						|
  },
 | 
						|
  loadURIWithOptions(aURI, aLoadFlags, aReferrer, aReferrerPolicy,
 | 
						|
                     aPostData, aHeaders, aBaseURI, aTriggeringPrincipal) {
 | 
						|
    // We know the url is going to be loaded, let's start requesting network
 | 
						|
    // connection before the content process asks.
 | 
						|
    // Note that we might have already setup the speculative connection in some
 | 
						|
    // cases, especially when the url is from location bar or its popup menu.
 | 
						|
    if (aURI.startsWith("http:") || aURI.startsWith("https:")) {
 | 
						|
      try {
 | 
						|
        let uri = makeURI(aURI);
 | 
						|
        let principal = aTriggeringPrincipal;
 | 
						|
        // We usually have a aTriggeringPrincipal assigned, but in case we
 | 
						|
        // don't have one or if it's a SystemPrincipal, let's create it with OA
 | 
						|
        // inferred from the current context.
 | 
						|
        if (!principal || principal.isSystemPrincipal) {
 | 
						|
          let attrs = {
 | 
						|
            userContextId: this._browser.getAttribute("usercontextid") || 0,
 | 
						|
            privateBrowsingId: PrivateBrowsingUtils.isBrowserPrivate(this._browser) ? 1 : 0,
 | 
						|
          };
 | 
						|
          principal = Services.scriptSecurityManager.createCodebasePrincipal(uri, attrs);
 | 
						|
        }
 | 
						|
        Services.io.speculativeConnect2(uri, principal, null);
 | 
						|
      } catch (ex) {
 | 
						|
        // Can't setup speculative connection for this uri string for some
 | 
						|
        // reason (such as failing to parse the URI), just ignore it.
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    this._sendMessage("WebNavigation:LoadURI", {
 | 
						|
      uri: aURI,
 | 
						|
      flags: aLoadFlags,
 | 
						|
      referrer: aReferrer ? aReferrer.spec : null,
 | 
						|
      referrerPolicy: aReferrerPolicy,
 | 
						|
      postData: aPostData ? Utils.serializeInputStream(aPostData) : null,
 | 
						|
      headers: aHeaders ? Utils.serializeInputStream(aHeaders) : null,
 | 
						|
      baseURI: aBaseURI ? aBaseURI.spec : null,
 | 
						|
      triggeringPrincipal: aTriggeringPrincipal
 | 
						|
                           ? Utils.serializePrincipal(aTriggeringPrincipal)
 | 
						|
                           : Services.scriptSecurityManager.createNullPrincipal({}),
 | 
						|
      requestTime: Services.telemetry.msSystemNow(),
 | 
						|
    });
 | 
						|
  },
 | 
						|
  setOriginAttributesBeforeLoading(aOriginAttributes) {
 | 
						|
    this._sendMessage("WebNavigation:SetOriginAttributes", {
 | 
						|
      originAttributes: aOriginAttributes,
 | 
						|
    });
 | 
						|
  },
 | 
						|
  reload(aReloadFlags) {
 | 
						|
    this._sendMessage("WebNavigation:Reload", {flags: aReloadFlags});
 | 
						|
  },
 | 
						|
  stop(aStopFlags) {
 | 
						|
    this._sendMessage("WebNavigation:Stop", {flags: aStopFlags});
 | 
						|
  },
 | 
						|
 | 
						|
  get document() {
 | 
						|
    return this._browser.contentDocument;
 | 
						|
  },
 | 
						|
 | 
						|
  _currentURI: null,
 | 
						|
  get currentURI() {
 | 
						|
    if (!this._currentURI) {
 | 
						|
      this._currentURI = makeURI("about:blank");
 | 
						|
    }
 | 
						|
 | 
						|
    return this._currentURI;
 | 
						|
  },
 | 
						|
  set currentURI(aURI) {
 | 
						|
    this.loadURI(aURI.spec, null, null, null);
 | 
						|
  },
 | 
						|
 | 
						|
  referringURI: null,
 | 
						|
 | 
						|
  // Bug 1233803 - accessing the sessionHistory of remote browsers should be
 | 
						|
  // done in content scripts.
 | 
						|
  get sessionHistory() {
 | 
						|
    throw Cr.NS_ERROR_NOT_IMPLEMENTED;
 | 
						|
  },
 | 
						|
  set sessionHistory(aValue) {
 | 
						|
    throw Cr.NS_ERROR_NOT_IMPLEMENTED;
 | 
						|
  },
 | 
						|
 | 
						|
  _sendMessage(aMessage, aData) {
 | 
						|
    try {
 | 
						|
      this._browser.messageManager.sendAsyncMessage(aMessage, aData);
 | 
						|
    } catch (e) {
 | 
						|
      Cu.reportError(e);
 | 
						|
    }
 | 
						|
  },
 | 
						|
};
 | 
						|
 | 
						|
this.NSGetFactory = XPCOMUtils.generateNSGetFactory([RemoteWebNavigation]);
 |