forked from mirrors/gecko-dev
Differential Revision: https://phabricator.services.mozilla.com/D17261 --HG-- extra : moz-landing-system : lando
156 lines
5.2 KiB
JavaScript
156 lines
5.2 KiB
JavaScript
// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
ChromeUtils.defineModuleGetter(this, "Services",
|
|
"resource://gre/modules/Services.jsm");
|
|
ChromeUtils.defineModuleGetter(this, "Utils",
|
|
"resource://gre/modules/sessionstore/Utils.jsm");
|
|
ChromeUtils.defineModuleGetter(this, "PrivateBrowsingUtils",
|
|
"resource://gre/modules/PrivateBrowsingUtils.jsm");
|
|
ChromeUtils.defineModuleGetter(this, "E10SUtils",
|
|
"resource://gre/modules/E10SUtils.jsm");
|
|
|
|
function makeURI(url) {
|
|
return Services.io.newURI(url);
|
|
}
|
|
|
|
function RemoteWebNavigation() {
|
|
this.wrappedJSObject = this;
|
|
}
|
|
|
|
RemoteWebNavigation.prototype = {
|
|
classDescription: "nsIWebNavigation for remote browsers",
|
|
classID: Components.ID("{4b56964e-cdf3-4bb8-830c-0e2dad3f4ebd}"),
|
|
contractID: "@mozilla.org/remote-web-navigation;1",
|
|
|
|
QueryInterface: ChromeUtils.generateQI([Ci.nsIWebNavigation]),
|
|
|
|
swapBrowser(aBrowser) {
|
|
this._browser = aBrowser;
|
|
},
|
|
|
|
LOAD_FLAGS_MASK: 65535,
|
|
LOAD_FLAGS_NONE: 0,
|
|
LOAD_FLAGS_IS_REFRESH: 16,
|
|
LOAD_FLAGS_IS_LINK: 32,
|
|
LOAD_FLAGS_BYPASS_HISTORY: 64,
|
|
LOAD_FLAGS_REPLACE_HISTORY: 128,
|
|
LOAD_FLAGS_BYPASS_CACHE: 256,
|
|
LOAD_FLAGS_BYPASS_PROXY: 512,
|
|
LOAD_FLAGS_CHARSET_CHANGE: 1024,
|
|
LOAD_FLAGS_STOP_CONTENT: 2048,
|
|
LOAD_FLAGS_FROM_EXTERNAL: 4096,
|
|
LOAD_FLAGS_ALLOW_THIRD_PARTY_FIXUP: 8192,
|
|
LOAD_FLAGS_FIRST_LOAD: 16384,
|
|
LOAD_FLAGS_ALLOW_POPUPS: 32768,
|
|
LOAD_FLAGS_BYPASS_CLASSIFIER: 65536,
|
|
LOAD_FLAGS_FORCE_ALLOW_COOKIES: 131072,
|
|
|
|
STOP_NETWORK: 1,
|
|
STOP_CONTENT: 2,
|
|
STOP_ALL: 3,
|
|
|
|
canGoBack: false,
|
|
canGoForward: false,
|
|
goBack() {
|
|
this._sendMessage("WebNavigation:GoBack", {});
|
|
},
|
|
goForward() {
|
|
this._sendMessage("WebNavigation:GoForward", {});
|
|
},
|
|
gotoIndex(aIndex) {
|
|
this._sendMessage("WebNavigation:GotoIndex", {index: aIndex});
|
|
},
|
|
loadURI(aURI, aLoadURIOptions) {
|
|
// We know the url is going to be loaded, let's start requesting network
|
|
// connection before the content process asks.
|
|
// Note that we might have already setup the speculative connection in some
|
|
// cases, especially when the url is from location bar or its popup menu.
|
|
if (aURI.startsWith("http:") || aURI.startsWith("https:")) {
|
|
try {
|
|
let uri = makeURI(aURI);
|
|
let principal = aLoadURIOptions.triggeringPrincipal;
|
|
// We usually have a triggeringPrincipal assigned, but in case we
|
|
// don't have one or if it's a SystemPrincipal, let's create it with OA
|
|
// inferred from the current context.
|
|
if (!principal || principal.isSystemPrincipal) {
|
|
let attrs = {
|
|
userContextId: this._browser.getAttribute("usercontextid") || 0,
|
|
privateBrowsingId: PrivateBrowsingUtils.isBrowserPrivate(this._browser) ? 1 : 0,
|
|
};
|
|
principal = Services.scriptSecurityManager.createCodebasePrincipal(uri, attrs);
|
|
}
|
|
Services.io.speculativeConnect2(uri, principal, null);
|
|
} catch (ex) {
|
|
// Can't setup speculative connection for this uri string for some
|
|
// reason (such as failing to parse the URI), just ignore it.
|
|
}
|
|
}
|
|
|
|
this._sendMessage("WebNavigation:LoadURI", {
|
|
uri: aURI,
|
|
flags: aLoadURIOptions.loadFlags,
|
|
referrerInfo: E10SUtils.serializeReferrerInfo(aLoadURIOptions.referrerInfo),
|
|
postData: aLoadURIOptions.postData ? Utils.serializeInputStream(aLoadURIOptions.postData) : null,
|
|
headers: aLoadURIOptions.headers ? Utils.serializeInputStream(aLoadURIOptions.headers) : null,
|
|
baseURI: aLoadURIOptions.baseURI ? aLoadURIOptions.baseURI.spec : null,
|
|
triggeringPrincipal: E10SUtils.serializePrincipal(
|
|
aLoadURIOptions.triggeringPrincipal || Services.scriptSecurityManager.createNullPrincipal({})),
|
|
requestTime: Services.telemetry.msSystemNow(),
|
|
});
|
|
},
|
|
setOriginAttributesBeforeLoading(aOriginAttributes) {
|
|
this._sendMessage("WebNavigation:SetOriginAttributes", {
|
|
originAttributes: aOriginAttributes,
|
|
});
|
|
},
|
|
reload(aReloadFlags) {
|
|
this._sendMessage("WebNavigation:Reload", {flags: aReloadFlags});
|
|
},
|
|
stop(aStopFlags) {
|
|
this._sendMessage("WebNavigation:Stop", {flags: aStopFlags});
|
|
},
|
|
|
|
get document() {
|
|
return this._browser.contentDocument;
|
|
},
|
|
|
|
_currentURI: null,
|
|
get currentURI() {
|
|
if (!this._currentURI) {
|
|
this._currentURI = makeURI("about:blank");
|
|
}
|
|
|
|
return this._currentURI;
|
|
},
|
|
set currentURI(aURI) {
|
|
// Bug 1498600 verify usages of systemPrincipal here
|
|
let loadURIOptions = {
|
|
triggeringPrincipal: Services.scriptSecurityManager.getSystemPrincipal(),
|
|
};
|
|
this.loadURI(aURI.spec, loadURIOptions);
|
|
},
|
|
|
|
referringURI: null,
|
|
|
|
// Bug 1233803 - accessing the sessionHistory of remote browsers should be
|
|
// done in content scripts.
|
|
get sessionHistory() {
|
|
throw Cr.NS_ERROR_NOT_IMPLEMENTED;
|
|
},
|
|
set sessionHistory(aValue) {
|
|
throw Cr.NS_ERROR_NOT_IMPLEMENTED;
|
|
},
|
|
|
|
_sendMessage(aMessage, aData) {
|
|
try {
|
|
this._browser.messageManager.sendAsyncMessage(aMessage, aData);
|
|
} catch (e) {
|
|
Cu.reportError(e);
|
|
}
|
|
},
|
|
};
|
|
|
|
var EXPORTED_SYMBOLS = ["RemoteWebNavigation"];
|