2020-01-20 17:58:52 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#ifndef mozilla_dom_WindowContext_h
|
|
|
|
#define mozilla_dom_WindowContext_h
|
|
|
|
|
2020-06-12 19:31:49 +03:00
|
|
|
#include "mozilla/PermissionDelegateHandler.h"
|
2020-04-24 21:33:04 +03:00
|
|
|
#include "mozilla/Span.h"
|
2020-02-21 02:30:33 +03:00
|
|
|
#include "mozilla/dom/MaybeDiscarded.h"
|
2020-01-20 17:58:52 +03:00
|
|
|
#include "mozilla/dom/SyncedContext.h"
|
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
|
2020-04-22 22:32:52 +03:00
|
|
|
class WindowGlobalParent;
|
2020-05-08 23:44:12 +03:00
|
|
|
class WindowGlobalInit;
|
2020-05-27 03:27:30 +03:00
|
|
|
class BrowsingContextGroup;
|
2020-04-22 22:32:52 +03:00
|
|
|
|
2020-03-30 17:12:08 +03:00
|
|
|
#define MOZ_EACH_WC_FIELD(FIELD) \
|
2020-06-09 17:48:38 +03:00
|
|
|
/* Whether the SHEntry associated with the current top-level \
|
|
|
|
* window has already seen user interaction. \
|
|
|
|
* As such, this will be reset to false when a new SHEntry is \
|
|
|
|
* created without changing the WC (e.g. when using pushState or \
|
|
|
|
* sub-frame navigation) \
|
|
|
|
* This flag is set for optimization purposes, to avoid \
|
|
|
|
* having to get the top SHEntry and update it on every \
|
|
|
|
* user interaction. \
|
|
|
|
* This is only meaningful on the top-level WC. */ \
|
|
|
|
FIELD(SHEntryHasUserInteraction, bool) \
|
2020-05-08 23:10:56 +03:00
|
|
|
FIELD(CookieBehavior, Maybe<uint32_t>) \
|
|
|
|
FIELD(IsOnContentBlockingAllowList, bool) \
|
2020-04-23 17:24:56 +03:00
|
|
|
/* Whether the given window hierarchy is third party. See \
|
|
|
|
* ThirdPartyUtil::IsThirdPartyWindow for details */ \
|
|
|
|
FIELD(IsThirdPartyWindow, bool) \
|
|
|
|
/* Whether this window's channel has been marked as a third-party \
|
|
|
|
* tracking resource */ \
|
2020-05-07 10:22:17 +03:00
|
|
|
FIELD(IsThirdPartyTrackingResourceWindow, bool) \
|
2020-05-14 00:52:39 +03:00
|
|
|
FIELD(IsSecureContext, bool) \
|
2020-06-16 12:05:54 +03:00
|
|
|
/* Mixed-Content: If the corresponding documentURI is https, \
|
|
|
|
* then this flag is true. */ \
|
|
|
|
FIELD(IsSecure, bool) \
|
2020-05-07 10:22:17 +03:00
|
|
|
/* Whether the user has overriden the mixed content blocker to allow \
|
|
|
|
* mixed content loads to happen */ \
|
2020-05-11 21:41:16 +03:00
|
|
|
FIELD(AllowMixedContent, bool) \
|
2020-05-16 00:18:07 +03:00
|
|
|
FIELD(EmbedderPolicy, nsILoadInfo::CrossOriginEmbedderPolicy) \
|
2020-07-16 22:53:49 +03:00
|
|
|
/* True if this document tree contained an HTMLMediaElement that \
|
|
|
|
* played audibly. This should only be set on top level context. */ \
|
|
|
|
FIELD(DocTreeHadAudibleMedia, bool) \
|
2020-06-12 19:31:49 +03:00
|
|
|
FIELD(AutoplayPermission, uint32_t) \
|
|
|
|
FIELD(DelegatedPermissions, \
|
|
|
|
PermissionDelegateHandler::DelegatedPermissionList) \
|
|
|
|
FIELD(DelegatedExactHostMatchPermissions, \
|
2020-07-14 14:22:20 +03:00
|
|
|
PermissionDelegateHandler::DelegatedPermissionList) \
|
|
|
|
FIELD(HasReportedShadowDOMUsage, bool)
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
class WindowContext : public nsISupports, public nsWrapperCache {
|
|
|
|
MOZ_DECL_SYNCED_CONTEXT(WindowContext, MOZ_EACH_WC_FIELD)
|
|
|
|
|
|
|
|
NS_DECL_CYCLE_COLLECTING_ISUPPORTS
|
|
|
|
NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS(WindowContext)
|
|
|
|
|
|
|
|
public:
|
|
|
|
static already_AddRefed<WindowContext> GetById(uint64_t aInnerWindowId);
|
|
|
|
static LogModule* GetLog();
|
|
|
|
|
|
|
|
BrowsingContext* GetBrowsingContext() const { return mBrowsingContext; }
|
|
|
|
BrowsingContextGroup* Group() const;
|
2020-02-21 02:30:33 +03:00
|
|
|
uint64_t Id() const { return InnerWindowId(); }
|
2020-01-20 17:58:52 +03:00
|
|
|
uint64_t InnerWindowId() const { return mInnerWindowId; }
|
2020-05-08 23:44:12 +03:00
|
|
|
uint64_t OuterWindowId() const { return mOuterWindowId; }
|
2020-01-20 17:58:52 +03:00
|
|
|
bool IsDiscarded() const { return mIsDiscarded; }
|
|
|
|
|
2020-04-24 21:33:04 +03:00
|
|
|
bool IsCached() const;
|
|
|
|
|
2020-07-01 01:11:52 +03:00
|
|
|
bool IsInProcess() { return mInProcess; }
|
2020-05-08 04:38:02 +03:00
|
|
|
|
2020-05-04 17:26:34 +03:00
|
|
|
// Get the parent WindowContext of this WindowContext, taking the BFCache into
|
|
|
|
// account. This will not cross chrome/content <browser> boundaries.
|
|
|
|
WindowContext* GetParentWindowContext();
|
|
|
|
WindowContext* TopWindowContext();
|
|
|
|
|
2020-04-24 21:33:04 +03:00
|
|
|
Span<RefPtr<BrowsingContext>> Children() { return mChildren; }
|
|
|
|
|
2020-02-21 02:30:33 +03:00
|
|
|
// Cast this object to it's parent-process canonical form.
|
|
|
|
WindowGlobalParent* Canonical();
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
nsIGlobalObject* GetParentObject() const;
|
|
|
|
JSObject* WrapObject(JSContext* cx,
|
|
|
|
JS::Handle<JSObject*> aGivenProto) override;
|
|
|
|
|
|
|
|
void Discard();
|
|
|
|
|
|
|
|
struct IPCInitializer {
|
|
|
|
uint64_t mInnerWindowId;
|
2020-05-08 23:44:12 +03:00
|
|
|
uint64_t mOuterWindowId;
|
2020-01-20 17:58:52 +03:00
|
|
|
uint64_t mBrowsingContextId;
|
|
|
|
|
2020-07-22 17:07:26 +03:00
|
|
|
FieldValues mFields;
|
2020-01-20 17:58:52 +03:00
|
|
|
};
|
2020-05-08 23:44:12 +03:00
|
|
|
IPCInitializer GetIPCInitializer();
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
static void CreateFromIPC(IPCInitializer&& aInit);
|
|
|
|
|
2020-05-27 03:28:59 +03:00
|
|
|
// Add new mixed content security state flags.
|
|
|
|
// These should be some of the four nsIWebProgressListener
|
|
|
|
// 'MIXED' state flags, and should only be called on the
|
|
|
|
// top window context.
|
|
|
|
void AddMixedContentSecurityState(uint32_t aStateFlags);
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
protected:
|
|
|
|
WindowContext(BrowsingContext* aBrowsingContext, uint64_t aInnerWindowId,
|
2020-07-22 17:07:26 +03:00
|
|
|
uint64_t aOuterWindowId, bool aInProcess,
|
|
|
|
FieldValues&& aFields);
|
2020-01-20 17:58:52 +03:00
|
|
|
virtual ~WindowContext();
|
|
|
|
|
2020-05-08 23:44:12 +03:00
|
|
|
virtual void Init();
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
private:
|
2020-04-24 21:33:04 +03:00
|
|
|
friend class BrowsingContext;
|
2020-05-08 23:44:12 +03:00
|
|
|
friend class WindowGlobalChild;
|
2020-05-11 21:41:16 +03:00
|
|
|
friend class WindowGlobalActor;
|
2020-04-24 21:33:04 +03:00
|
|
|
|
|
|
|
void AppendChildBrowsingContext(BrowsingContext* aBrowsingContext);
|
|
|
|
void RemoveChildBrowsingContext(BrowsingContext* aBrowsingContext);
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
// Send a given `BaseTransaction` object to the correct remote.
|
|
|
|
void SendCommitTransaction(ContentParent* aParent,
|
|
|
|
const BaseTransaction& aTxn, uint64_t aEpoch);
|
|
|
|
void SendCommitTransaction(ContentChild* aChild, const BaseTransaction& aTxn,
|
|
|
|
uint64_t aEpoch);
|
|
|
|
|
2020-05-08 04:38:02 +03:00
|
|
|
bool CheckOnlyOwningProcessCanSet(ContentParent* aSource);
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
// Overload `CanSet` to get notifications for a particular field being set.
|
2020-06-16 12:05:54 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_IsSecure>, const bool& aIsSecure,
|
|
|
|
ContentParent* aSource);
|
2020-05-07 10:22:17 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_AllowMixedContent>, const bool& aAllowMixedContent,
|
|
|
|
ContentParent* aSource);
|
|
|
|
|
2020-05-08 23:10:56 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_CookieBehavior>, const Maybe<uint32_t>& aValue,
|
2020-05-08 04:38:02 +03:00
|
|
|
ContentParent* aSource);
|
2020-05-08 23:10:56 +03:00
|
|
|
|
|
|
|
bool CanSet(FieldIndex<IDX_IsOnContentBlockingAllowList>, const bool& aValue,
|
|
|
|
ContentParent* aSource);
|
|
|
|
|
2020-05-11 21:41:16 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_EmbedderPolicy>, const bool& aValue,
|
|
|
|
ContentParent* aSource) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-04-23 17:24:56 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_IsThirdPartyWindow>,
|
|
|
|
const bool& IsThirdPartyWindow, ContentParent* aSource);
|
|
|
|
bool CanSet(FieldIndex<IDX_IsThirdPartyTrackingResourceWindow>,
|
|
|
|
const bool& aIsThirdPartyTrackingResourceWindow,
|
|
|
|
ContentParent* aSource);
|
2020-05-14 00:52:39 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_IsSecureContext>, const bool& aIsSecureContext,
|
|
|
|
ContentParent* aSource);
|
2020-07-16 22:53:49 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_DocTreeHadAudibleMedia>, const bool& aValue,
|
|
|
|
ContentParent* aSource);
|
2020-05-16 00:18:07 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_AutoplayPermission>, const uint32_t& aValue,
|
|
|
|
ContentParent* aSource);
|
2020-06-09 17:48:38 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_SHEntryHasUserInteraction>,
|
|
|
|
const bool& aSHEntryHasUserInteraction, ContentParent* aSource) {
|
|
|
|
return true;
|
|
|
|
}
|
2020-06-12 19:31:49 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_DelegatedPermissions>,
|
|
|
|
const PermissionDelegateHandler::DelegatedPermissionList& aValue,
|
|
|
|
ContentParent* aSource);
|
|
|
|
bool CanSet(FieldIndex<IDX_DelegatedExactHostMatchPermissions>,
|
|
|
|
const PermissionDelegateHandler::DelegatedPermissionList& aValue,
|
|
|
|
ContentParent* aSource);
|
2020-04-23 17:24:56 +03:00
|
|
|
|
2020-07-14 14:22:20 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_HasReportedShadowDOMUsage>, const bool& aValue,
|
|
|
|
ContentParent* aSource) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
void DidSet(FieldIndex<IDX_HasReportedShadowDOMUsage>, bool aOldValue);
|
|
|
|
|
2020-04-20 23:09:32 +03:00
|
|
|
// Overload `DidSet` to get notifications for a particular field being set.
|
2020-04-20 23:25:22 +03:00
|
|
|
//
|
|
|
|
// You can also overload the variant that gets the old value if you need it.
|
2020-04-20 23:09:32 +03:00
|
|
|
template <size_t I>
|
|
|
|
void DidSet(FieldIndex<I>) {}
|
2020-04-20 23:25:22 +03:00
|
|
|
template <size_t I, typename T>
|
|
|
|
void DidSet(FieldIndex<I>, T&& aOldValue) {}
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
uint64_t mInnerWindowId;
|
2020-05-08 23:44:12 +03:00
|
|
|
uint64_t mOuterWindowId;
|
2020-01-20 17:58:52 +03:00
|
|
|
RefPtr<BrowsingContext> mBrowsingContext;
|
|
|
|
|
2020-04-24 21:33:04 +03:00
|
|
|
// --- NEVER CHANGE `mChildren` DIRECTLY! ---
|
|
|
|
// Changes to this list need to be synchronized to the list within our
|
|
|
|
// `mBrowsingContext`, and should only be performed through the
|
|
|
|
// `AppendChildBrowsingContext` and `RemoveChildBrowsingContext` methods.
|
|
|
|
nsTArray<RefPtr<BrowsingContext>> mChildren;
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
bool mIsDiscarded = false;
|
2020-05-08 04:38:02 +03:00
|
|
|
bool mInProcess = false;
|
2020-01-20 17:58:52 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
using WindowContextTransaction = WindowContext::BaseTransaction;
|
|
|
|
using WindowContextInitializer = WindowContext::IPCInitializer;
|
2020-02-21 02:30:33 +03:00
|
|
|
using MaybeDiscardedWindowContext = MaybeDiscarded<WindowContext>;
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
// Don't specialize the `Transaction` object for every translation unit it's
|
|
|
|
// used in. This should help keep code size down.
|
|
|
|
extern template class syncedcontext::Transaction<WindowContext>;
|
|
|
|
|
|
|
|
} // namespace dom
|
|
|
|
|
|
|
|
namespace ipc {
|
2020-02-21 02:30:33 +03:00
|
|
|
template <>
|
|
|
|
struct IPDLParamTraits<dom::MaybeDiscarded<dom::WindowContext>> {
|
|
|
|
static void Write(IPC::Message* aMsg, IProtocol* aActor,
|
|
|
|
const dom::MaybeDiscarded<dom::WindowContext>& aParam);
|
|
|
|
static bool Read(const IPC::Message* aMsg, PickleIterator* aIter,
|
|
|
|
IProtocol* aActor,
|
|
|
|
dom::MaybeDiscarded<dom::WindowContext>* aResult);
|
|
|
|
};
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
template <>
|
|
|
|
struct IPDLParamTraits<dom::WindowContext::IPCInitializer> {
|
|
|
|
static void Write(IPC::Message* aMessage, IProtocol* aActor,
|
|
|
|
const dom::WindowContext::IPCInitializer& aInitializer);
|
|
|
|
|
|
|
|
static bool Read(const IPC::Message* aMessage, PickleIterator* aIterator,
|
|
|
|
IProtocol* aActor,
|
|
|
|
dom::WindowContext::IPCInitializer* aInitializer);
|
|
|
|
};
|
|
|
|
} // namespace ipc
|
|
|
|
} // namespace mozilla
|
|
|
|
|
|
|
|
#endif // !defined(mozilla_dom_WindowContext_h)
|