2018-07-26 10:31:00 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
2018-10-20 01:00:59 +03:00
|
|
|
#include "mozilla/dom/BrowsingContext.h"
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2019-02-21 23:14:28 +03:00
|
|
|
#include "ipc/IPCMessageUtils.h"
|
|
|
|
|
2019-01-29 20:32:28 +03:00
|
|
|
#include "mozilla/dom/CanonicalBrowsingContext.h"
|
2019-01-30 19:07:21 +03:00
|
|
|
#include "mozilla/dom/BrowsingContextGroup.h"
|
2018-08-29 05:00:00 +03:00
|
|
|
#include "mozilla/dom/BrowsingContextBinding.h"
|
2018-07-26 10:31:00 +03:00
|
|
|
#include "mozilla/dom/ContentChild.h"
|
2018-11-05 15:43:10 +03:00
|
|
|
#include "mozilla/dom/ContentParent.h"
|
2019-01-02 16:29:18 +03:00
|
|
|
#include "mozilla/dom/Location.h"
|
|
|
|
#include "mozilla/dom/LocationBinding.h"
|
|
|
|
#include "mozilla/dom/WindowBinding.h"
|
2019-01-03 10:11:00 +03:00
|
|
|
#include "mozilla/dom/WindowProxyHolder.h"
|
2018-07-26 10:31:00 +03:00
|
|
|
#include "mozilla/Assertions.h"
|
|
|
|
#include "mozilla/ClearOnShutdown.h"
|
2018-12-17 13:45:37 +03:00
|
|
|
#include "mozilla/HashTable.h"
|
2018-07-26 10:31:00 +03:00
|
|
|
#include "mozilla/Logging.h"
|
|
|
|
#include "mozilla/StaticPtr.h"
|
|
|
|
|
2018-11-05 15:43:10 +03:00
|
|
|
#include "nsDocShell.h"
|
2019-01-02 16:29:18 +03:00
|
|
|
#include "nsGlobalWindowOuter.h"
|
2018-07-26 10:31:00 +03:00
|
|
|
#include "nsContentUtils.h"
|
2019-01-02 16:29:18 +03:00
|
|
|
#include "nsScriptError.h"
|
2018-06-29 02:41:00 +03:00
|
|
|
#include "nsThreadUtils.h"
|
2019-02-28 21:23:15 +03:00
|
|
|
#include "xpcprivate.h"
|
2018-07-26 10:31:00 +03:00
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
|
2019-01-15 02:09:42 +03:00
|
|
|
extern mozilla::LazyLogModule gUserInteractionPRLog;
|
|
|
|
|
|
|
|
#define USER_ACTIVATION_LOG(msg, ...) \
|
|
|
|
MOZ_LOG(gUserInteractionPRLog, LogLevel::Debug, (msg, ##__VA_ARGS__))
|
|
|
|
|
2018-07-26 10:31:00 +03:00
|
|
|
static LazyLogModule gBrowsingContextLog("BrowsingContext");
|
|
|
|
|
2018-12-17 13:45:37 +03:00
|
|
|
template <template <typename> class PtrType>
|
|
|
|
using BrowsingContextMap =
|
|
|
|
HashMap<uint64_t, PtrType<BrowsingContext>, DefaultHasher<uint64_t>,
|
|
|
|
InfallibleAllocPolicy>;
|
|
|
|
|
|
|
|
static StaticAutoPtr<BrowsingContextMap<WeakPtr>> sBrowsingContexts;
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2018-06-28 05:40:00 +03:00
|
|
|
// TODO(farre): This duplicates some of the work performed by the
|
|
|
|
// bfcache. This should be unified. [Bug 1471601]
|
2018-12-17 13:45:37 +03:00
|
|
|
static StaticAutoPtr<BrowsingContextMap<RefPtr>> sCachedBrowsingContexts;
|
2018-06-28 05:40:00 +03:00
|
|
|
|
2018-11-05 15:43:10 +03:00
|
|
|
static void Register(BrowsingContext* aBrowsingContext) {
|
2018-12-17 13:45:37 +03:00
|
|
|
MOZ_ALWAYS_TRUE(
|
|
|
|
sBrowsingContexts->putNew(aBrowsingContext->Id(), aBrowsingContext));
|
2019-01-30 19:07:21 +03:00
|
|
|
|
|
|
|
aBrowsingContext->Group()->Register(aBrowsingContext);
|
2018-11-05 15:43:10 +03:00
|
|
|
}
|
|
|
|
|
2019-01-15 02:09:42 +03:00
|
|
|
BrowsingContext* BrowsingContext::TopLevelBrowsingContext() {
|
|
|
|
BrowsingContext* bc = this;
|
|
|
|
while (bc->mParent) {
|
|
|
|
bc = bc->mParent;
|
|
|
|
}
|
|
|
|
return bc;
|
|
|
|
}
|
|
|
|
|
2019-02-26 01:04:59 +03:00
|
|
|
/* static */
|
|
|
|
void BrowsingContext::Init() {
|
2018-07-26 10:31:00 +03:00
|
|
|
if (!sBrowsingContexts) {
|
2018-12-17 13:45:37 +03:00
|
|
|
sBrowsingContexts = new BrowsingContextMap<WeakPtr>();
|
2018-07-26 10:31:00 +03:00
|
|
|
ClearOnShutdown(&sBrowsingContexts);
|
|
|
|
}
|
2018-06-28 05:40:00 +03:00
|
|
|
|
|
|
|
if (!sCachedBrowsingContexts) {
|
2018-12-17 13:45:37 +03:00
|
|
|
sCachedBrowsingContexts = new BrowsingContextMap<RefPtr>();
|
2018-06-28 05:40:00 +03:00
|
|
|
ClearOnShutdown(&sCachedBrowsingContexts);
|
|
|
|
}
|
2018-07-26 10:31:00 +03:00
|
|
|
}
|
|
|
|
|
2019-02-26 01:04:59 +03:00
|
|
|
/* static */
|
|
|
|
LogModule* BrowsingContext::GetLog() { return gBrowsingContextLog; }
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2019-02-26 01:04:59 +03:00
|
|
|
/* static */
|
|
|
|
already_AddRefed<BrowsingContext> BrowsingContext::Get(uint64_t aId) {
|
2018-12-17 13:45:37 +03:00
|
|
|
if (BrowsingContextMap<WeakPtr>::Ptr abc = sBrowsingContexts->lookup(aId)) {
|
|
|
|
return do_AddRef(abc->value().get());
|
|
|
|
}
|
|
|
|
|
|
|
|
return nullptr;
|
2018-07-26 10:31:00 +03:00
|
|
|
}
|
|
|
|
|
2019-02-14 00:02:55 +03:00
|
|
|
CanonicalBrowsingContext* BrowsingContext::Canonical() {
|
|
|
|
return CanonicalBrowsingContext::Cast(this);
|
|
|
|
}
|
|
|
|
|
2019-02-26 01:04:59 +03:00
|
|
|
/* static */
|
|
|
|
already_AddRefed<BrowsingContext> BrowsingContext::Create(
|
2018-11-05 15:43:10 +03:00
|
|
|
BrowsingContext* aParent, BrowsingContext* aOpener, const nsAString& aName,
|
|
|
|
Type aType) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!aParent || aParent->mType == aType);
|
|
|
|
|
|
|
|
uint64_t id = nsContentUtils::GenerateBrowsingContextId();
|
|
|
|
|
|
|
|
MOZ_LOG(GetLog(), LogLevel::Debug,
|
|
|
|
("Creating 0x%08" PRIx64 " in %s", id,
|
|
|
|
XRE_IsParentProcess() ? "Parent" : "Child"));
|
|
|
|
|
2018-09-14 17:57:18 +03:00
|
|
|
RefPtr<BrowsingContext> context;
|
|
|
|
if (XRE_IsParentProcess()) {
|
2019-01-29 20:32:28 +03:00
|
|
|
context = new CanonicalBrowsingContext(aParent, aOpener, aName, id,
|
2019-02-04 22:10:18 +03:00
|
|
|
/* aProcessId */ 0, aType);
|
2018-09-14 17:57:18 +03:00
|
|
|
} else {
|
2018-11-27 12:59:44 +03:00
|
|
|
context = new BrowsingContext(aParent, aOpener, aName, id, aType);
|
2018-09-14 17:57:18 +03:00
|
|
|
}
|
|
|
|
|
2018-11-05 15:43:10 +03:00
|
|
|
Register(context);
|
|
|
|
|
|
|
|
// Attach the browsing context to the tree.
|
|
|
|
context->Attach();
|
|
|
|
|
2018-09-14 17:57:18 +03:00
|
|
|
return context.forget();
|
|
|
|
}
|
|
|
|
|
2019-02-26 01:04:59 +03:00
|
|
|
/* static */
|
|
|
|
already_AddRefed<BrowsingContext> BrowsingContext::CreateFromIPC(
|
2018-11-27 12:59:44 +03:00
|
|
|
BrowsingContext* aParent, BrowsingContext* aOpener, const nsAString& aName,
|
|
|
|
uint64_t aId, ContentParent* aOriginProcess) {
|
2018-11-05 15:43:10 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(aOriginProcess || XRE_IsContentProcess(),
|
|
|
|
"Parent Process IPC contexts need a Content Process.");
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!aParent || aParent->IsContent());
|
|
|
|
|
|
|
|
MOZ_LOG(GetLog(), LogLevel::Debug,
|
|
|
|
("Creating 0x%08" PRIx64 " from IPC (origin=0x%08" PRIx64 ")", aId,
|
|
|
|
aOriginProcess ? uint64_t(aOriginProcess->ChildID()) : 0));
|
|
|
|
|
|
|
|
RefPtr<BrowsingContext> context;
|
|
|
|
if (XRE_IsParentProcess()) {
|
2019-01-29 20:32:28 +03:00
|
|
|
context = new CanonicalBrowsingContext(
|
2018-11-27 12:59:44 +03:00
|
|
|
aParent, aOpener, aName, aId, aOriginProcess->ChildID(), Type::Content);
|
2019-02-15 14:35:48 +03:00
|
|
|
|
|
|
|
context->Group()->Subscribe(aOriginProcess);
|
2018-11-05 15:43:10 +03:00
|
|
|
} else {
|
2018-11-27 12:59:44 +03:00
|
|
|
context = new BrowsingContext(aParent, aOpener, aName, aId, Type::Content);
|
2018-11-05 15:43:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
Register(context);
|
|
|
|
|
2019-03-14 21:50:38 +03:00
|
|
|
// Caller handles attaching us to the tree.
|
2018-11-05 15:43:10 +03:00
|
|
|
|
|
|
|
return context.forget();
|
2018-07-26 10:31:00 +03:00
|
|
|
}
|
|
|
|
|
2018-11-05 15:43:10 +03:00
|
|
|
BrowsingContext::BrowsingContext(BrowsingContext* aParent,
|
2018-11-27 12:59:44 +03:00
|
|
|
BrowsingContext* aOpener,
|
2018-11-05 15:43:10 +03:00
|
|
|
const nsAString& aName,
|
|
|
|
uint64_t aBrowsingContextId, Type aType)
|
2019-02-21 23:14:28 +03:00
|
|
|
: mName(aName),
|
|
|
|
mClosed(false),
|
|
|
|
mType(aType),
|
2018-11-05 15:43:10 +03:00
|
|
|
mBrowsingContextId(aBrowsingContextId),
|
2019-03-06 00:11:48 +03:00
|
|
|
mParent(aParent),
|
|
|
|
mOpener(aOpener),
|
|
|
|
mIsActivatedByUserGesture(false) {
|
2019-03-12 11:04:01 +03:00
|
|
|
mCrossOriginPolicy = nsILoadInfo::CROSS_ORIGIN_POLICY_NULL;
|
2019-01-30 19:07:21 +03:00
|
|
|
// Specify our group in our constructor. We will explicitly join the group
|
|
|
|
// when we are registered, as doing so will take a reference.
|
2018-12-17 13:45:37 +03:00
|
|
|
if (mParent) {
|
2019-01-30 19:07:21 +03:00
|
|
|
mGroup = mParent->Group();
|
2019-03-12 11:04:01 +03:00
|
|
|
mCrossOriginPolicy = mParent->CrossOriginPolicy();
|
2018-12-17 13:45:37 +03:00
|
|
|
} else if (mOpener) {
|
2019-01-30 19:07:21 +03:00
|
|
|
mGroup = mOpener->Group();
|
2019-03-12 11:04:01 +03:00
|
|
|
mCrossOriginPolicy = mOpener->CrossOriginPolicy();
|
2018-12-17 13:45:37 +03:00
|
|
|
} else {
|
2019-01-30 19:07:21 +03:00
|
|
|
// To ensure the group has a unique ID, we will use our ID, as the founder
|
|
|
|
// of this BrowsingContextGroup.
|
|
|
|
mGroup = new BrowsingContextGroup();
|
2018-12-17 13:45:37 +03:00
|
|
|
}
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2018-11-05 15:43:10 +03:00
|
|
|
void BrowsingContext::SetDocShell(nsIDocShell* aDocShell) {
|
|
|
|
// XXX(nika): We should communicate that we are now an active BrowsingContext
|
|
|
|
// process to the parent & do other validation here.
|
|
|
|
MOZ_RELEASE_ASSERT(nsDocShell::Cast(aDocShell)->GetBrowsingContext() == this);
|
|
|
|
mDocShell = aDocShell;
|
|
|
|
}
|
|
|
|
|
2019-03-14 21:50:38 +03:00
|
|
|
void BrowsingContext::Attach(bool aFromIPC) {
|
2018-07-26 10:31:00 +03:00
|
|
|
MOZ_LOG(GetLog(), LogLevel::Debug,
|
2018-06-28 05:40:00 +03:00
|
|
|
("%s: %s 0x%08" PRIx64 " to 0x%08" PRIx64,
|
2018-07-26 10:31:00 +03:00
|
|
|
XRE_IsParentProcess() ? "Parent" : "Child",
|
2018-12-17 13:45:37 +03:00
|
|
|
sCachedBrowsingContexts->has(Id()) ? "Re-connecting" : "Connecting",
|
|
|
|
Id(), mParent ? mParent->Id() : 0));
|
|
|
|
|
|
|
|
sCachedBrowsingContexts->remove(Id());
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2019-01-30 19:07:21 +03:00
|
|
|
auto* children = mParent ? &mParent->mChildren : &mGroup->Toplevels();
|
2018-12-17 13:45:37 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!children->Contains(this));
|
|
|
|
|
|
|
|
children->AppendElement(this);
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2019-03-14 21:50:38 +03:00
|
|
|
// Send attach to our parent if we need to.
|
|
|
|
if (!aFromIPC && XRE_IsContentProcess()) {
|
|
|
|
auto cc = ContentChild::GetSingleton();
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(cc);
|
|
|
|
cc->SendAttachBrowsingContext(
|
|
|
|
mParent, mOpener, BrowsingContextId(mBrowsingContextId), Name());
|
|
|
|
}
|
2018-07-26 10:31:00 +03:00
|
|
|
}
|
|
|
|
|
2019-03-14 21:50:38 +03:00
|
|
|
void BrowsingContext::Detach(bool aFromIPC) {
|
2018-07-26 10:31:00 +03:00
|
|
|
MOZ_LOG(GetLog(), LogLevel::Debug,
|
|
|
|
("%s: Detaching 0x%08" PRIx64 " from 0x%08" PRIx64,
|
|
|
|
XRE_IsParentProcess() ? "Parent" : "Child", Id(),
|
|
|
|
mParent ? mParent->Id() : 0));
|
|
|
|
|
2018-12-17 13:45:37 +03:00
|
|
|
RefPtr<BrowsingContext> kungFuDeathGrip(this);
|
|
|
|
|
|
|
|
BrowsingContextMap<RefPtr>::Ptr p;
|
|
|
|
if (sCachedBrowsingContexts && (p = sCachedBrowsingContexts->lookup(Id()))) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!mParent || !mParent->mChildren.Contains(this));
|
2019-01-30 19:07:21 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!mGroup || !mGroup->Toplevels().Contains(this));
|
2018-12-17 13:45:37 +03:00
|
|
|
sCachedBrowsingContexts->remove(p);
|
|
|
|
} else {
|
2019-02-15 12:59:21 +03:00
|
|
|
Children& children = mParent ? mParent->mChildren : mGroup->Toplevels();
|
2019-01-30 19:07:21 +03:00
|
|
|
|
2018-12-17 13:45:37 +03:00
|
|
|
// TODO(farre): This assert looks extremely fishy, I know, but
|
|
|
|
// what we're actually saying is this: if we're detaching, but our
|
|
|
|
// parent doesn't have any children, it is because we're being
|
|
|
|
// detached by the cycle collector destroying docshells out of
|
|
|
|
// order.
|
2019-02-15 12:59:21 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(children.IsEmpty() || children.Contains(this));
|
2018-12-17 13:45:37 +03:00
|
|
|
|
2019-02-15 12:59:21 +03:00
|
|
|
children.RemoveElement(this);
|
2018-12-17 13:45:37 +03:00
|
|
|
}
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2019-01-30 19:07:21 +03:00
|
|
|
Group()->Unregister(this);
|
|
|
|
|
2019-03-14 21:50:45 +03:00
|
|
|
// By definition, we no longer are the current process for this
|
|
|
|
// BrowsingContext - clear our now-dead nsDocShell reference.
|
|
|
|
mDocShell = nullptr;
|
|
|
|
|
2019-03-14 21:50:38 +03:00
|
|
|
if (!aFromIPC && XRE_IsContentProcess()) {
|
|
|
|
auto cc = ContentChild::GetSingleton();
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(cc);
|
|
|
|
cc->SendDetachBrowsingContext(this, false /* aMoveToBFCache */);
|
2018-07-26 10:31:00 +03:00
|
|
|
}
|
2018-06-28 05:40:00 +03:00
|
|
|
}
|
|
|
|
|
2019-03-14 21:50:38 +03:00
|
|
|
void BrowsingContext::CacheChildren(bool aFromIPC) {
|
2018-12-17 13:45:37 +03:00
|
|
|
if (mChildren.IsEmpty()) {
|
2018-06-28 05:40:00 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_LOG(GetLog(), LogLevel::Debug,
|
|
|
|
("%s: Caching children of 0x%08" PRIx64 "",
|
|
|
|
XRE_IsParentProcess() ? "Parent" : "Child", Id()));
|
|
|
|
|
2018-12-17 13:45:37 +03:00
|
|
|
MOZ_ALWAYS_TRUE(sCachedBrowsingContexts->reserve(mChildren.Length()));
|
|
|
|
|
|
|
|
for (BrowsingContext* child : mChildren) {
|
|
|
|
MOZ_ALWAYS_TRUE(sCachedBrowsingContexts->putNew(child->Id(), child));
|
2018-06-28 05:40:00 +03:00
|
|
|
}
|
2018-12-17 13:45:37 +03:00
|
|
|
mChildren.Clear();
|
2018-06-28 05:40:00 +03:00
|
|
|
|
2019-03-14 21:50:38 +03:00
|
|
|
if (!aFromIPC && XRE_IsContentProcess()) {
|
|
|
|
auto cc = ContentChild::GetSingleton();
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(cc);
|
|
|
|
cc->SendDetachBrowsingContext(this, true /* aMoveToBFCache */);
|
2018-06-28 05:40:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-17 13:45:37 +03:00
|
|
|
bool BrowsingContext::IsCached() { return sCachedBrowsingContexts->has(Id()); }
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2018-08-29 05:00:00 +03:00
|
|
|
void BrowsingContext::GetChildren(
|
|
|
|
nsTArray<RefPtr<BrowsingContext>>& aChildren) {
|
2018-12-17 13:45:37 +03:00
|
|
|
MOZ_ALWAYS_TRUE(aChildren.AppendElements(mChildren));
|
2018-08-29 05:00:00 +03:00
|
|
|
}
|
|
|
|
|
2019-03-06 00:11:48 +03:00
|
|
|
void BrowsingContext::SetOpener(BrowsingContext* aOpener) {
|
|
|
|
if (mOpener == aOpener) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
mOpener = aOpener;
|
|
|
|
|
|
|
|
if (!XRE_IsContentProcess()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto cc = ContentChild::GetSingleton();
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(cc);
|
|
|
|
cc->SendSetOpenerBrowsingContext(this, aOpener);
|
|
|
|
}
|
|
|
|
|
2019-02-15 12:59:21 +03:00
|
|
|
// FindWithName follows the rules for choosing a browsing context,
|
|
|
|
// with the exception of sandboxing for iframes. The implementation
|
|
|
|
// for arbitrarily choosing between two browsing contexts with the
|
|
|
|
// same name is as follows:
|
|
|
|
//
|
|
|
|
// 1) The start browsing context, i.e. 'this'
|
|
|
|
// 2) Descendants in insertion order
|
|
|
|
// 3) The parent
|
|
|
|
// 4) Siblings and their children, both in insertion order
|
|
|
|
// 5) After this we iteratively follow the parent chain, repeating 3
|
|
|
|
// and 4 until
|
|
|
|
// 6) If there is no parent, consider all other top level browsing
|
|
|
|
// contexts and their children, both in insertion order
|
|
|
|
//
|
|
|
|
// See
|
|
|
|
// https://html.spec.whatwg.org/multipage/browsers.html#the-rules-for-choosing-a-browsing-context-given-a-browsing-context-name
|
|
|
|
BrowsingContext* BrowsingContext::FindWithName(const nsAString& aName) {
|
|
|
|
BrowsingContext* found = nullptr;
|
|
|
|
if (aName.IsEmpty()) {
|
|
|
|
// You can't find a browsing context with an empty name.
|
|
|
|
found = nullptr;
|
|
|
|
} else if (BrowsingContext* special = FindWithSpecialName(aName)) {
|
|
|
|
found = special;
|
|
|
|
} else if (aName.LowerCaseEqualsLiteral("_blank")) {
|
|
|
|
// Just return null. Caller must handle creating a new window with
|
|
|
|
// a blank name.
|
|
|
|
found = nullptr;
|
|
|
|
} else if (BrowsingContext* child = FindWithNameInSubtree(aName, this)) {
|
|
|
|
found = child;
|
|
|
|
} else {
|
|
|
|
BrowsingContext* current = this;
|
|
|
|
|
|
|
|
do {
|
|
|
|
Children* siblings;
|
|
|
|
BrowsingContext* parent = current->mParent;
|
|
|
|
|
|
|
|
if (!parent) {
|
|
|
|
// We've reached the root of the tree, consider browsing
|
|
|
|
// contexts in the same browsing context group.
|
|
|
|
siblings = &mGroup->Toplevels();
|
|
|
|
} else if (parent->NameEquals(aName) && CanAccess(parent) &&
|
|
|
|
parent->IsActive()) {
|
|
|
|
found = parent;
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
siblings = &parent->mChildren;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (BrowsingContext* sibling : *siblings) {
|
|
|
|
if (sibling == current) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (BrowsingContext* relative =
|
|
|
|
sibling->FindWithNameInSubtree(aName, this)) {
|
|
|
|
found = relative;
|
|
|
|
// Breaks the outer loop
|
|
|
|
parent = nullptr;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
current = parent;
|
|
|
|
} while (current);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Helpers should perform access control checks, which means that we
|
|
|
|
// only need to assert that we can access found.
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!found || CanAccess(found));
|
|
|
|
|
|
|
|
return found;
|
|
|
|
}
|
|
|
|
|
|
|
|
BrowsingContext* BrowsingContext::FindChildWithName(const nsAString& aName) {
|
|
|
|
if (aName.IsEmpty()) {
|
|
|
|
// You can't find a browsing context with the empty name.
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (BrowsingContext* child : mChildren) {
|
|
|
|
if (child->NameEquals(aName) && CanAccess(child) && child->IsActive()) {
|
|
|
|
return child;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
BrowsingContext* BrowsingContext::FindWithSpecialName(const nsAString& aName) {
|
|
|
|
// TODO(farre): Neither BrowsingContext nor nsDocShell checks if the
|
|
|
|
// browsing context pointed to by a special name is active. Should
|
|
|
|
// it be? See Bug 1527913.
|
|
|
|
if (aName.LowerCaseEqualsLiteral("_self")) {
|
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aName.LowerCaseEqualsLiteral("_parent")) {
|
|
|
|
return mParent && CanAccess(mParent.get()) ? mParent.get() : this;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aName.LowerCaseEqualsLiteral("_top")) {
|
|
|
|
BrowsingContext* top = TopLevelBrowsingContext();
|
|
|
|
|
|
|
|
return CanAccess(top) ? top : nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
BrowsingContext* BrowsingContext::FindWithNameInSubtree(
|
|
|
|
const nsAString& aName, BrowsingContext* aRequestingContext) {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!aName.IsEmpty());
|
|
|
|
|
|
|
|
if (NameEquals(aName) && aRequestingContext->CanAccess(this) && IsActive()) {
|
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (BrowsingContext* child : mChildren) {
|
|
|
|
if (BrowsingContext* found =
|
|
|
|
child->FindWithNameInSubtree(aName, aRequestingContext)) {
|
|
|
|
return found;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool BrowsingContext::CanAccess(BrowsingContext* aContext) {
|
|
|
|
// TODO(farre): Bouncing this to nsDocShell::CanAccessItem is
|
|
|
|
// temporary, we should implement a replacement for this in
|
|
|
|
// BrowsingContext. See Bug 151590.
|
|
|
|
return aContext && nsDocShell::CanAccessItem(aContext->mDocShell, mDocShell);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool BrowsingContext::IsActive() const {
|
|
|
|
// TODO(farre): Mimicking the bahaviour from
|
|
|
|
// ItemIsActive(nsIDocShellTreeItem* aItem) is temporary, we should
|
|
|
|
// implement a replacement for this using mClosed only. See Bug
|
|
|
|
// 1527321.
|
|
|
|
|
|
|
|
if (!mDocShell) {
|
|
|
|
return mClosed;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nsCOMPtr<nsPIDOMWindowOuter> window = mDocShell->GetWindow()) {
|
|
|
|
auto* win = nsGlobalWindowOuter::Cast(window);
|
|
|
|
if (!win->GetClosedOuter()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-07-26 10:31:00 +03:00
|
|
|
BrowsingContext::~BrowsingContext() {
|
2018-12-17 13:45:37 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!mParent || !mParent->mChildren.Contains(this));
|
2019-01-30 19:07:21 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!mGroup || !mGroup->Toplevels().Contains(this));
|
2018-12-17 13:45:37 +03:00
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!sCachedBrowsingContexts ||
|
|
|
|
!sCachedBrowsingContexts->has(Id()));
|
2018-07-26 10:31:00 +03:00
|
|
|
|
|
|
|
if (sBrowsingContexts) {
|
2018-12-17 13:45:37 +03:00
|
|
|
sBrowsingContexts->remove(Id());
|
2018-07-26 10:31:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-29 05:00:00 +03:00
|
|
|
nsISupports* BrowsingContext::GetParentObject() const {
|
|
|
|
return xpc::NativeGlobal(xpc::PrivilegedJunkScope());
|
|
|
|
}
|
|
|
|
|
|
|
|
JSObject* BrowsingContext::WrapObject(JSContext* aCx,
|
|
|
|
JS::Handle<JSObject*> aGivenProto) {
|
|
|
|
return BrowsingContext_Binding::Wrap(aCx, this, aGivenProto);
|
|
|
|
}
|
|
|
|
|
2019-01-15 02:09:42 +03:00
|
|
|
void BrowsingContext::NotifyUserGestureActivation() {
|
|
|
|
// We would set the user gesture activation flag on the top level browsing
|
|
|
|
// context, which would automatically be sync to other top level browsing
|
|
|
|
// contexts which are in the different process.
|
|
|
|
RefPtr<BrowsingContext> topLevelBC = TopLevelBrowsingContext();
|
2019-01-14 19:08:06 +03:00
|
|
|
USER_ACTIVATION_LOG("Get top level browsing context 0x%08" PRIx64,
|
|
|
|
topLevelBC->Id());
|
2019-03-06 00:11:48 +03:00
|
|
|
topLevelBC->SetUserGestureActivation();
|
|
|
|
|
|
|
|
if (!XRE_IsContentProcess()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto cc = ContentChild::GetSingleton();
|
|
|
|
MOZ_ASSERT(cc);
|
|
|
|
cc->SendSetUserGestureActivation(topLevelBC, true);
|
2019-01-15 02:09:42 +03:00
|
|
|
}
|
|
|
|
|
2019-01-15 02:21:05 +03:00
|
|
|
void BrowsingContext::NotifyResetUserGestureActivation() {
|
|
|
|
// We would reset the user gesture activation flag on the top level browsing
|
|
|
|
// context, which would automatically be sync to other top level browsing
|
|
|
|
// contexts which are in the different process.
|
|
|
|
RefPtr<BrowsingContext> topLevelBC = TopLevelBrowsingContext();
|
|
|
|
USER_ACTIVATION_LOG("Get top level browsing context 0x%08" PRIx64,
|
|
|
|
topLevelBC->Id());
|
2019-03-06 00:11:48 +03:00
|
|
|
topLevelBC->ResetUserGestureActivation();
|
|
|
|
|
|
|
|
if (!XRE_IsContentProcess()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto cc = ContentChild::GetSingleton();
|
|
|
|
MOZ_ASSERT(cc);
|
|
|
|
cc->SendSetUserGestureActivation(topLevelBC, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::SetUserGestureActivation() {
|
|
|
|
MOZ_ASSERT(!mParent, "Set user activation flag on non top-level context!");
|
|
|
|
USER_ACTIVATION_LOG(
|
|
|
|
"Set user gesture activation for browsing context 0x%08" PRIx64, Id());
|
|
|
|
mIsActivatedByUserGesture = true;
|
2019-01-15 02:09:42 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
bool BrowsingContext::GetUserGestureActivation() {
|
|
|
|
RefPtr<BrowsingContext> topLevelBC = TopLevelBrowsingContext();
|
2019-03-06 00:11:48 +03:00
|
|
|
return topLevelBC->mIsActivatedByUserGesture;
|
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::ResetUserGestureActivation() {
|
|
|
|
MOZ_ASSERT(!mParent, "Clear user activation flag on non top-level context!");
|
|
|
|
USER_ACTIVATION_LOG(
|
|
|
|
"Reset user gesture activation for browsing context 0x%08" PRIx64, Id());
|
|
|
|
mIsActivatedByUserGesture = false;
|
2019-01-15 02:21:05 +03:00
|
|
|
}
|
|
|
|
|
2018-09-14 17:57:18 +03:00
|
|
|
NS_IMPL_CYCLE_COLLECTION_CLASS(BrowsingContext)
|
|
|
|
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN(BrowsingContext)
|
2019-03-06 00:11:48 +03:00
|
|
|
NS_IMPL_CYCLE_COLLECTION_UNLINK(mDocShell, mChildren, mParent, mGroup)
|
2018-09-14 17:57:18 +03:00
|
|
|
if (XRE_IsParentProcess()) {
|
2019-01-29 20:32:28 +03:00
|
|
|
CanonicalBrowsingContext::Cast(tmp)->Unlink();
|
2018-09-14 17:57:18 +03:00
|
|
|
}
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_UNLINK_PRESERVED_WRAPPER
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_UNLINK_END
|
|
|
|
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN(BrowsingContext)
|
2019-03-06 00:11:48 +03:00
|
|
|
NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mDocShell, mChildren, mParent, mGroup)
|
2018-09-14 17:57:18 +03:00
|
|
|
if (XRE_IsParentProcess()) {
|
2019-01-29 20:32:28 +03:00
|
|
|
CanonicalBrowsingContext::Cast(tmp)->Traverse(cb);
|
2018-09-14 17:57:18 +03:00
|
|
|
}
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
|
|
|
|
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_TRACE_WRAPPERCACHE(BrowsingContext)
|
|
|
|
|
2018-07-26 10:31:00 +03:00
|
|
|
NS_IMPL_CYCLE_COLLECTION_ROOT_NATIVE(BrowsingContext, AddRef)
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_UNROOT_NATIVE(BrowsingContext, Release)
|
|
|
|
|
2019-02-28 21:23:15 +03:00
|
|
|
class RemoteLocationProxy
|
|
|
|
: public RemoteObjectProxy<BrowsingContext::LocationProxy,
|
|
|
|
Location_Binding::sCrossOriginAttributes,
|
|
|
|
Location_Binding::sCrossOriginMethods> {
|
|
|
|
public:
|
|
|
|
typedef RemoteObjectProxy Base;
|
|
|
|
|
|
|
|
constexpr RemoteLocationProxy()
|
|
|
|
: RemoteObjectProxy(prototypes::id::Location) {}
|
2019-02-28 22:34:02 +03:00
|
|
|
|
|
|
|
void NoteChildren(JSObject* aProxy,
|
|
|
|
nsCycleCollectionTraversalCallback& aCb) const override {
|
|
|
|
auto location =
|
|
|
|
static_cast<BrowsingContext::LocationProxy*>(GetNative(aProxy));
|
|
|
|
CycleCollectionNoteChild(aCb, location->GetBrowsingContext(),
|
|
|
|
"js::GetObjectPrivate(obj)->GetBrowsingContext()");
|
|
|
|
}
|
2019-02-28 21:23:15 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
static const RemoteLocationProxy sSingleton;
|
|
|
|
|
|
|
|
// Give RemoteLocationProxy 2 reserved slots, like the other wrappers,
|
|
|
|
// so JSObject::swap can swap it with CrossCompartmentWrappers without requiring
|
|
|
|
// malloc.
|
|
|
|
template <>
|
|
|
|
const js::Class RemoteLocationProxy::Base::sClass =
|
|
|
|
PROXY_CLASS_DEF("Proxy", JSCLASS_HAS_RESERVED_SLOTS(2));
|
|
|
|
|
2019-01-02 16:29:18 +03:00
|
|
|
void BrowsingContext::Location(JSContext* aCx,
|
|
|
|
JS::MutableHandle<JSObject*> aLocation,
|
2019-02-28 21:23:15 +03:00
|
|
|
ErrorResult& aError) {
|
|
|
|
aError.MightThrowJSException();
|
|
|
|
sSingleton.GetProxyObject(aCx, &mLocation, aLocation);
|
|
|
|
if (!aLocation) {
|
|
|
|
aError.StealExceptionFromJSContext(aCx);
|
|
|
|
}
|
|
|
|
}
|
2019-01-02 16:29:18 +03:00
|
|
|
|
|
|
|
void BrowsingContext::Close(CallerType aCallerType, ErrorResult& aError) {
|
|
|
|
// FIXME We need to set mClosed, but only once we're sending the
|
|
|
|
// DOMWindowClose event (which happens in the process where the
|
|
|
|
// document for this browsing context is loaded).
|
|
|
|
// See https://bugzilla.mozilla.org/show_bug.cgi?id=1516343.
|
2019-03-14 21:50:52 +03:00
|
|
|
if (ContentChild* cc = ContentChild::GetSingleton()) {
|
|
|
|
cc->SendWindowClose(this, aCallerType == CallerType::System);
|
|
|
|
} else if (ContentParent* cp = Canonical()->GetContentParent()) {
|
|
|
|
Unused << cp->SendWindowClose(this, aCallerType == CallerType::System);
|
|
|
|
}
|
2019-01-02 16:29:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::Focus(ErrorResult& aError) {
|
2019-03-14 21:50:52 +03:00
|
|
|
if (ContentChild* cc = ContentChild::GetSingleton()) {
|
|
|
|
cc->SendWindowFocus(this);
|
|
|
|
} else if (ContentParent* cp = Canonical()->GetContentParent()) {
|
|
|
|
Unused << cp->SendWindowFocus(this);
|
|
|
|
}
|
2019-01-02 16:29:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::Blur(ErrorResult& aError) {
|
2019-03-14 21:50:52 +03:00
|
|
|
if (ContentChild* cc = ContentChild::GetSingleton()) {
|
|
|
|
cc->SendWindowBlur(this);
|
|
|
|
} else if (ContentParent* cp = Canonical()->GetContentParent()) {
|
|
|
|
Unused << cp->SendWindowBlur(this);
|
|
|
|
}
|
2019-01-02 16:29:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
Nullable<WindowProxyHolder> BrowsingContext::GetTop(ErrorResult& aError) {
|
|
|
|
// We never return null or throw an error, but the implementation in
|
|
|
|
// nsGlobalWindow does and we need to use the same signature.
|
2019-01-15 20:06:12 +03:00
|
|
|
return WindowProxyHolder(TopLevelBrowsingContext());
|
2019-01-02 16:29:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::GetOpener(JSContext* aCx,
|
|
|
|
JS::MutableHandle<JS::Value> aOpener,
|
|
|
|
ErrorResult& aError) const {
|
2019-03-06 00:11:48 +03:00
|
|
|
auto* opener = GetOpener();
|
2019-01-02 16:29:18 +03:00
|
|
|
if (!opener) {
|
|
|
|
aOpener.setNull();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ToJSValue(aCx, WindowProxyHolder(opener), aOpener)) {
|
|
|
|
aError.NoteJSContextException(aCx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Nullable<WindowProxyHolder> BrowsingContext::GetParent(
|
|
|
|
ErrorResult& aError) const {
|
|
|
|
// We never throw an error, but the implementation in nsGlobalWindow does and
|
|
|
|
// we need to use the same signature.
|
|
|
|
if (!mParent) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
return WindowProxyHolder(mParent.get());
|
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::PostMessageMoz(JSContext* aCx,
|
|
|
|
JS::Handle<JS::Value> aMessage,
|
|
|
|
const nsAString& aTargetOrigin,
|
|
|
|
const Sequence<JSObject*>& aTransfer,
|
|
|
|
nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
RefPtr<BrowsingContext> sourceBc;
|
|
|
|
PostMessageData data;
|
|
|
|
data.targetOrigin() = aTargetOrigin;
|
|
|
|
data.subjectPrincipal() = &aSubjectPrincipal;
|
|
|
|
RefPtr<nsGlobalWindowInner> callerInnerWindow;
|
|
|
|
if (!nsGlobalWindowOuter::GatherPostMessageData(
|
|
|
|
aCx, aTargetOrigin, getter_AddRefs(sourceBc), data.origin(),
|
|
|
|
getter_AddRefs(data.targetOriginURI()),
|
|
|
|
getter_AddRefs(data.callerPrincipal()),
|
|
|
|
getter_AddRefs(callerInnerWindow),
|
|
|
|
getter_AddRefs(data.callerDocumentURI()), aError)) {
|
|
|
|
return;
|
|
|
|
}
|
2019-02-14 00:02:55 +03:00
|
|
|
data.source() = sourceBc;
|
2019-01-02 16:29:18 +03:00
|
|
|
data.isFromPrivateWindow() =
|
|
|
|
callerInnerWindow &&
|
|
|
|
nsScriptErrorBase::ComputeIsFromPrivateWindow(callerInnerWindow);
|
|
|
|
|
|
|
|
JS::Rooted<JS::Value> transferArray(aCx);
|
|
|
|
aError = nsContentUtils::CreateJSValueFromSequenceOfObject(aCx, aTransfer,
|
|
|
|
&transferArray);
|
|
|
|
if (NS_WARN_IF(aError.Failed())) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ipc::StructuredCloneData message;
|
|
|
|
message.Write(aCx, aMessage, transferArray, aError);
|
|
|
|
if (NS_WARN_IF(aError.Failed())) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ClonedMessageData messageData;
|
2019-03-14 21:50:52 +03:00
|
|
|
if (ContentChild* cc = ContentChild::GetSingleton()) {
|
|
|
|
if (!message.BuildClonedMessageDataForChild(cc, messageData)) {
|
|
|
|
aError.Throw(NS_ERROR_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
cc->SendWindowPostMessage(this, messageData, data);
|
|
|
|
} else if (ContentParent* cp = Canonical()->GetContentParent()) {
|
|
|
|
if (!message.BuildClonedMessageDataForParent(cp, messageData)) {
|
|
|
|
aError.Throw(NS_ERROR_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
2019-01-02 16:29:18 +03:00
|
|
|
|
2019-03-14 21:50:52 +03:00
|
|
|
Unused << cp->SendWindowPostMessage(this, messageData, data);
|
|
|
|
}
|
2019-01-02 16:29:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::PostMessageMoz(JSContext* aCx,
|
|
|
|
JS::Handle<JS::Value> aMessage,
|
|
|
|
const WindowPostMessageOptions& aOptions,
|
|
|
|
nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
PostMessageMoz(aCx, aMessage, aOptions.mTargetOrigin, aOptions.mTransfer,
|
|
|
|
aSubjectPrincipal, aError);
|
|
|
|
}
|
|
|
|
|
2019-02-21 23:14:28 +03:00
|
|
|
void BrowsingContext::Transaction::Commit(BrowsingContext* aBrowsingContext) {
|
|
|
|
if (XRE_IsContentProcess()) {
|
|
|
|
ContentChild* cc = ContentChild::GetSingleton();
|
|
|
|
cc->SendCommitBrowsingContextTransaction(aBrowsingContext, *this);
|
|
|
|
} else {
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(XRE_IsParentProcess());
|
|
|
|
for (auto iter = aBrowsingContext->Group()->ContentParentsIter();
|
|
|
|
!iter.Done(); iter.Next()) {
|
|
|
|
nsRefPtrHashKey<ContentParent>* entry = iter.Get();
|
|
|
|
Unused << entry->GetKey()->SendCommitBrowsingContextTransaction(
|
|
|
|
aBrowsingContext, *this);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Apply(aBrowsingContext);
|
|
|
|
}
|
|
|
|
|
2019-02-28 21:23:15 +03:00
|
|
|
void BrowsingContext::LocationProxy::SetHref(const nsAString& aHref,
|
|
|
|
nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
nsPIDOMWindowOuter* win = GetBrowsingContext()->GetDOMWindow();
|
|
|
|
if (!win || !win->GetLocation()) {
|
|
|
|
aError.Throw(NS_ERROR_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
win->GetLocation()->SetHref(aHref, aSubjectPrincipal, aError);
|
|
|
|
}
|
|
|
|
|
|
|
|
void BrowsingContext::LocationProxy::Replace(const nsAString& aUrl,
|
|
|
|
nsIPrincipal& aSubjectPrincipal,
|
|
|
|
ErrorResult& aError) {
|
|
|
|
nsPIDOMWindowOuter* win = GetBrowsingContext()->GetDOMWindow();
|
|
|
|
if (!win || !win->GetLocation()) {
|
|
|
|
aError.Throw(NS_ERROR_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
win->GetLocation()->Replace(aUrl, aSubjectPrincipal, aError);
|
|
|
|
}
|
|
|
|
|
2018-07-26 10:31:00 +03:00
|
|
|
} // namespace dom
|
2019-02-14 00:02:53 +03:00
|
|
|
|
|
|
|
namespace ipc {
|
|
|
|
|
|
|
|
void IPDLParamTraits<dom::BrowsingContext>::Write(
|
|
|
|
IPC::Message* aMsg, IProtocol* aActor, dom::BrowsingContext* aParam) {
|
|
|
|
uint64_t id = aParam ? aParam->Id() : 0;
|
|
|
|
WriteIPDLParam(aMsg, aActor, id);
|
|
|
|
|
|
|
|
// If his is an in-process send. We want to make sure that our BrowsingContext
|
|
|
|
// object lives long enough to make it to the other side, so we take an extra
|
|
|
|
// reference. This reference is freed in ::Read().
|
|
|
|
if (!aActor->GetIPCChannel()->IsCrossProcess()) {
|
|
|
|
NS_IF_ADDREF(aParam);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IPDLParamTraits<dom::BrowsingContext>::Read(
|
|
|
|
const IPC::Message* aMsg, PickleIterator* aIter, IProtocol* aActor,
|
|
|
|
RefPtr<dom::BrowsingContext>* aResult) {
|
|
|
|
uint64_t id = 0;
|
|
|
|
if (!ReadIPDLParam(aMsg, aIter, aActor, &id)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (id == 0) {
|
|
|
|
aResult = nullptr;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
*aResult = dom::BrowsingContext::Get(id);
|
|
|
|
MOZ_ASSERT(aResult, "Deserialized absent BrowsingContext!");
|
|
|
|
|
|
|
|
// If this is an in-process actor, free the reference taken in ::Write().
|
|
|
|
if (!aActor->GetIPCChannel()->IsCrossProcess()) {
|
|
|
|
dom::BrowsingContext* bc = *aResult;
|
|
|
|
NS_IF_RELEASE(bc);
|
|
|
|
}
|
|
|
|
|
|
|
|
return aResult != nullptr;
|
|
|
|
}
|
|
|
|
|
2019-02-21 23:14:28 +03:00
|
|
|
void IPDLParamTraits<dom::BrowsingContext::Transaction>::Write(
|
|
|
|
IPC::Message* aMessage, IProtocol* aActor,
|
|
|
|
const dom::BrowsingContext::Transaction& aTransaction) {
|
|
|
|
void_t sentinel;
|
|
|
|
const dom::BrowsingContext::Transaction* transaction = &aTransaction;
|
|
|
|
auto tuple = mozilla::Tie(
|
|
|
|
MOZ_FOR_EACH_SYNCED_BC_FIELD(MOZ_SYNCED_BC_FIELD_ARGUMENT, sentinel));
|
|
|
|
|
|
|
|
WriteIPDLParam(aMessage, aActor, tuple);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IPDLParamTraits<dom::BrowsingContext::Transaction>::Read(
|
|
|
|
const IPC::Message* aMessage, PickleIterator* aIterator, IProtocol* aActor,
|
|
|
|
dom::BrowsingContext::Transaction* aTransaction) {
|
|
|
|
void_t sentinel;
|
|
|
|
dom::BrowsingContext::Transaction* transaction = aTransaction;
|
|
|
|
auto tuple = mozilla::Tie(
|
|
|
|
MOZ_FOR_EACH_SYNCED_BC_FIELD(MOZ_SYNCED_BC_FIELD_ARGUMENT, sentinel));
|
|
|
|
return ReadIPDLParam(aMessage, aIterator, aActor, &tuple);
|
|
|
|
}
|
|
|
|
|
2019-02-14 00:02:53 +03:00
|
|
|
} // namespace ipc
|
2018-07-26 10:31:00 +03:00
|
|
|
} // namespace mozilla
|