mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-28 23:31:56 +00:00
200bfc652c
Backed out changeset 0df7b8660446 (bug 1597499) Backed out changeset d015ba9097c5 (bug 1597499) Backed out changeset e84054ccadb0 (bug 1597499) Backed out changeset 12762a25c4fa (bug 1597499)
13540 lines
456 KiB
C++
13540 lines
456 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsDocShell.h"
|
|
|
|
#include <algorithm>
|
|
|
|
#ifdef XP_WIN
|
|
# include <process.h>
|
|
# define getpid _getpid
|
|
#else
|
|
# include <unistd.h> // for getpid()
|
|
#endif
|
|
|
|
#include "mozilla/ArrayUtils.h"
|
|
#include "mozilla/Attributes.h"
|
|
#include "mozilla/AutoRestore.h"
|
|
#include "mozilla/BasePrincipal.h"
|
|
#include "mozilla/Casting.h"
|
|
#include "mozilla/Components.h"
|
|
#include "mozilla/DebugOnly.h"
|
|
#include "mozilla/Encoding.h"
|
|
#include "mozilla/EventStateManager.h"
|
|
#include "mozilla/HTMLEditor.h"
|
|
#include "mozilla/InputTaskManager.h"
|
|
#include "mozilla/LoadInfo.h"
|
|
#include "mozilla/Logging.h"
|
|
#include "mozilla/MediaFeatureChange.h"
|
|
#include "mozilla/ObservedDocShell.h"
|
|
#include "mozilla/Preferences.h"
|
|
#include "mozilla/PresShell.h"
|
|
#include "mozilla/ResultExtensions.h"
|
|
#include "mozilla/SchedulerGroup.h"
|
|
#include "mozilla/ScopeExit.h"
|
|
#include "mozilla/ScrollTypes.h"
|
|
#include "mozilla/StaticPrefs_browser.h"
|
|
#include "mozilla/StaticPrefs_docshell.h"
|
|
#include "mozilla/StaticPrefs_dom.h"
|
|
#include "mozilla/StaticPrefs_extensions.h"
|
|
#include "mozilla/StaticPrefs_privacy.h"
|
|
#include "mozilla/StaticPrefs_security.h"
|
|
#include "mozilla/StaticPrefs_ui.h"
|
|
#include "mozilla/StaticPrefs_fission.h"
|
|
#include "mozilla/StartupTimeline.h"
|
|
#include "mozilla/StorageAccess.h"
|
|
#include "mozilla/Telemetry.h"
|
|
#include "mozilla/Tuple.h"
|
|
#include "mozilla/Unused.h"
|
|
#include "mozilla/WidgetUtils.h"
|
|
|
|
#include "mozilla/dom/AutoEntryScript.h"
|
|
#include "mozilla/dom/ChildProcessChannelListener.h"
|
|
#include "mozilla/dom/ClientChannelHelper.h"
|
|
#include "mozilla/dom/ClientHandle.h"
|
|
#include "mozilla/dom/ClientInfo.h"
|
|
#include "mozilla/dom/ClientManager.h"
|
|
#include "mozilla/dom/ClientSource.h"
|
|
#include "mozilla/dom/ContentChild.h"
|
|
#include "mozilla/dom/ContentFrameMessageManager.h"
|
|
#include "mozilla/dom/DocGroup.h"
|
|
#include "mozilla/dom/Element.h"
|
|
#include "mozilla/dom/HTMLAnchorElement.h"
|
|
#include "mozilla/dom/HTMLIFrameElement.h"
|
|
#include "mozilla/dom/PerformanceNavigation.h"
|
|
#include "mozilla/dom/PermissionMessageUtils.h"
|
|
#include "mozilla/dom/PopupBlocker.h"
|
|
#include "mozilla/dom/ProfileTimelineMarkerBinding.h"
|
|
#include "mozilla/dom/ScreenOrientation.h"
|
|
#include "mozilla/dom/ScriptSettings.h"
|
|
#include "mozilla/dom/ServiceWorkerInterceptController.h"
|
|
#include "mozilla/dom/ServiceWorkerUtils.h"
|
|
#include "mozilla/dom/SessionHistoryEntry.h"
|
|
#include "mozilla/dom/SessionStorageManager.h"
|
|
#include "mozilla/dom/BrowserChild.h"
|
|
#include "mozilla/dom/ToJSValue.h"
|
|
#include "mozilla/dom/UserActivation.h"
|
|
#include "mozilla/dom/ChildSHistory.h"
|
|
#include "mozilla/dom/nsCSPContext.h"
|
|
#include "mozilla/dom/nsHTTPSOnlyUtils.h"
|
|
#include "mozilla/dom/LoadURIOptionsBinding.h"
|
|
#include "mozilla/dom/JSWindowActorChild.h"
|
|
#include "mozilla/ipc/ProtocolUtils.h"
|
|
#include "mozilla/net/DocumentChannel.h"
|
|
#include "mozilla/net/ParentChannelWrapper.h"
|
|
#include "mozilla/net/UrlClassifierFeatureFactory.h"
|
|
#include "ReferrerInfo.h"
|
|
|
|
#include "nsIApplicationCacheChannel.h"
|
|
#include "nsIApplicationCacheContainer.h"
|
|
#include "nsIAppShell.h"
|
|
#include "nsIAuthPrompt.h"
|
|
#include "nsIAuthPrompt2.h"
|
|
#include "nsICachingChannel.h"
|
|
#include "nsICaptivePortalService.h"
|
|
#include "nsIChannel.h"
|
|
#include "nsIChannelEventSink.h"
|
|
#include "nsIClassOfService.h"
|
|
#include "nsIConsoleReportCollector.h"
|
|
#include "nsIContent.h"
|
|
#include "nsIContentInlines.h"
|
|
#include "nsIContentSecurityPolicy.h"
|
|
#include "nsIContentViewer.h"
|
|
#include "nsIController.h"
|
|
#include "nsIDocShellTreeItem.h"
|
|
#include "nsIDocShellTreeOwner.h"
|
|
#include "mozilla/dom/Document.h"
|
|
#include "nsIDocumentLoaderFactory.h"
|
|
#include "nsIDOMWindow.h"
|
|
#include "nsIEditingSession.h"
|
|
#include "nsIEffectiveTLDService.h"
|
|
#include "nsIExternalProtocolService.h"
|
|
#include "nsIFormPOSTActionChannel.h"
|
|
#include "nsIFrame.h"
|
|
#include "nsIGlobalObject.h"
|
|
#include "nsIHttpChannel.h"
|
|
#include "nsIHttpChannelInternal.h"
|
|
#include "nsIIDNService.h"
|
|
#include "nsIInputStreamChannel.h"
|
|
#include "nsIInterfaceRequestorUtils.h"
|
|
#include "nsILayoutHistoryState.h"
|
|
#include "nsILoadInfo.h"
|
|
#include "nsILoadURIDelegate.h"
|
|
#include "nsIMultiPartChannel.h"
|
|
#include "nsINestedURI.h"
|
|
#include "nsINetworkPredictor.h"
|
|
#include "nsINode.h"
|
|
#include "nsINSSErrorsService.h"
|
|
#include "nsIObserverService.h"
|
|
#include "nsIOService.h"
|
|
#include "nsIPrincipal.h"
|
|
#include "nsIPrivacyTransitionObserver.h"
|
|
#include "nsIPrompt.h"
|
|
#include "nsIPromptCollection.h"
|
|
#include "nsIPromptFactory.h"
|
|
#include "nsIReflowObserver.h"
|
|
#include "nsIScriptChannel.h"
|
|
#include "nsIScriptObjectPrincipal.h"
|
|
#include "nsIScriptSecurityManager.h"
|
|
#include "nsIScrollableFrame.h"
|
|
#include "nsIScrollObserver.h"
|
|
#include "nsISecureBrowserUI.h"
|
|
#include "nsISeekableStream.h"
|
|
#include "nsISelectionDisplay.h"
|
|
#include "nsISHEntry.h"
|
|
#include "nsISiteSecurityService.h"
|
|
#include "nsISocketProvider.h"
|
|
#include "nsIStringBundle.h"
|
|
#include "nsIStructuredCloneContainer.h"
|
|
#include "nsIBrowserChild.h"
|
|
#include "nsITextToSubURI.h"
|
|
#include "nsITimedChannel.h"
|
|
#include "nsITimer.h"
|
|
#include "nsITransportSecurityInfo.h"
|
|
#include "nsIUploadChannel.h"
|
|
#include "nsIURIFixup.h"
|
|
#include "nsIURIMutator.h"
|
|
#include "nsIURILoader.h"
|
|
#include "nsIViewSourceChannel.h"
|
|
#include "nsIWebBrowserChrome.h"
|
|
#include "nsIWebBrowserChrome3.h"
|
|
#include "nsIWebBrowserChromeFocus.h"
|
|
#include "nsIWebBrowserFind.h"
|
|
#include "nsIWebProgress.h"
|
|
#include "nsIWidget.h"
|
|
#include "nsIWindowWatcher.h"
|
|
#include "nsIWritablePropertyBag2.h"
|
|
#include "nsIX509Cert.h"
|
|
#include "nsIXULRuntime.h"
|
|
|
|
#include "nsCommandManager.h"
|
|
#include "nsPIDOMWindow.h"
|
|
#include "nsPIWindowRoot.h"
|
|
|
|
#include "IHistory.h"
|
|
#include "IUrlClassifierUITelemetry.h"
|
|
|
|
#include "nsArray.h"
|
|
#include "nsArrayUtils.h"
|
|
#include "nsCExternalHandlerService.h"
|
|
#include "nsContentDLF.h"
|
|
#include "nsContentPolicyUtils.h" // NS_CheckContentLoadPolicy(...)
|
|
#include "nsContentSecurityManager.h"
|
|
#include "nsContentSecurityUtils.h"
|
|
#include "nsContentUtils.h"
|
|
#include "nsCURILoader.h"
|
|
#include "nsDocShellCID.h"
|
|
#include "nsDocShellEditorData.h"
|
|
#include "nsDocShellEnumerator.h"
|
|
#include "nsDocShellLoadState.h"
|
|
#include "nsDocShellLoadTypes.h"
|
|
#include "nsDOMCID.h"
|
|
#include "nsDOMNavigationTiming.h"
|
|
#include "nsDSURIContentListener.h"
|
|
#include "nsEditingSession.h"
|
|
#include "nsError.h"
|
|
#include "nsEscape.h"
|
|
#include "nsFocusManager.h"
|
|
#include "nsGlobalWindow.h"
|
|
#include "nsISearchService.h"
|
|
#include "nsJSEnvironment.h"
|
|
#include "nsNetCID.h"
|
|
#include "nsNetUtil.h"
|
|
#include "nsObjectLoadingContent.h"
|
|
#include "nsPingListener.h"
|
|
#include "nsPoint.h"
|
|
#include "nsQueryObject.h"
|
|
#include "nsQueryActor.h"
|
|
#include "nsRect.h"
|
|
#include "nsRefreshTimer.h"
|
|
#include "nsSandboxFlags.h"
|
|
#include "nsSHEntry.h"
|
|
#include "nsSHistory.h"
|
|
#include "nsSHEntry.h"
|
|
#include "nsStructuredCloneContainer.h"
|
|
#include "nsSubDocumentFrame.h"
|
|
#include "nsURILoader.h"
|
|
#include "nsURLHelper.h"
|
|
#include "nsView.h"
|
|
#include "nsViewManager.h"
|
|
#include "nsViewSourceHandler.h"
|
|
#include "nsWebBrowserFind.h"
|
|
#include "nsWhitespaceTokenizer.h"
|
|
#include "nsWidgetsCID.h"
|
|
#include "nsXULAppAPI.h"
|
|
|
|
#include "BRNameMatchingPolicy.h"
|
|
#include "GeckoProfiler.h"
|
|
#include "mozilla/NullPrincipal.h"
|
|
#include "Navigator.h"
|
|
#include "prenv.h"
|
|
#include "URIUtils.h"
|
|
#include "sslerr.h"
|
|
#include "mozpkix/pkix.h"
|
|
#include "NSSErrorsService.h"
|
|
|
|
#include "timeline/JavascriptTimelineMarker.h"
|
|
#include "nsDocShellTelemetryUtils.h"
|
|
|
|
#ifdef MOZ_PLACES
|
|
# include "nsIFaviconService.h"
|
|
# include "mozIPlacesPendingOperation.h"
|
|
#endif
|
|
|
|
#if NS_PRINT_PREVIEW
|
|
# include "nsIDocumentViewerPrint.h"
|
|
# include "nsIWebBrowserPrint.h"
|
|
#endif
|
|
|
|
using namespace mozilla;
|
|
using namespace mozilla::dom;
|
|
using namespace mozilla::net;
|
|
|
|
using mozilla::ipc::Endpoint;
|
|
|
|
// Threshold value in ms for META refresh based redirects
|
|
#define REFRESH_REDIRECT_TIMER 15000
|
|
|
|
// Hint for native dispatch of events on how long to delay after
|
|
// all documents have loaded in milliseconds before favoring normal
|
|
// native event dispatch priorites over performance
|
|
// Can be overridden with docshell.event_starvation_delay_hint pref.
|
|
#define NS_EVENT_STARVATION_DELAY_HINT 2000
|
|
|
|
static NS_DEFINE_CID(kAppShellCID, NS_APPSHELL_CID);
|
|
|
|
// Number of documents currently loading
|
|
static int32_t gNumberOfDocumentsLoading = 0;
|
|
|
|
// Global count of docshells with the private attribute set
|
|
static uint32_t gNumberOfPrivateDocShells = 0;
|
|
|
|
static mozilla::LazyLogModule gCharsetMenuLog("CharsetMenu");
|
|
|
|
#define LOGCHARSETMENU(args) \
|
|
MOZ_LOG(gCharsetMenuLog, mozilla::LogLevel::Debug, args)
|
|
|
|
#ifdef DEBUG
|
|
unsigned long nsDocShell::gNumberOfDocShells = 0;
|
|
static uint64_t gDocshellIDCounter = 0;
|
|
|
|
static mozilla::LazyLogModule gDocShellLog("nsDocShell");
|
|
static mozilla::LazyLogModule gDocShellAndDOMWindowLeakLogging(
|
|
"DocShellAndDOMWindowLeak");
|
|
#endif
|
|
static mozilla::LazyLogModule gDocShellLeakLog("nsDocShellLeak");
|
|
extern mozilla::LazyLogModule gPageCacheLog;
|
|
mozilla::LazyLogModule gSHLog("SessionHistory");
|
|
|
|
const char kBrandBundleURL[] = "chrome://branding/locale/brand.properties";
|
|
const char kAppstringsBundleURL[] =
|
|
"chrome://global/locale/appstrings.properties";
|
|
|
|
static void FavorPerformanceHint(bool aPerfOverStarvation) {
|
|
nsCOMPtr<nsIAppShell> appShell = do_GetService(kAppShellCID);
|
|
if (appShell) {
|
|
appShell->FavorPerformanceHint(
|
|
aPerfOverStarvation,
|
|
Preferences::GetUint("docshell.event_starvation_delay_hint",
|
|
NS_EVENT_STARVATION_DELAY_HINT));
|
|
}
|
|
}
|
|
|
|
static void IncreasePrivateDocShellCount() {
|
|
gNumberOfPrivateDocShells++;
|
|
if (gNumberOfPrivateDocShells > 1 || !XRE_IsContentProcess()) {
|
|
return;
|
|
}
|
|
|
|
mozilla::dom::ContentChild* cc = mozilla::dom::ContentChild::GetSingleton();
|
|
cc->SendPrivateDocShellsExist(true);
|
|
}
|
|
|
|
static void DecreasePrivateDocShellCount() {
|
|
MOZ_ASSERT(gNumberOfPrivateDocShells > 0);
|
|
gNumberOfPrivateDocShells--;
|
|
if (!gNumberOfPrivateDocShells) {
|
|
if (XRE_IsContentProcess()) {
|
|
dom::ContentChild* cc = dom::ContentChild::GetSingleton();
|
|
cc->SendPrivateDocShellsExist(false);
|
|
return;
|
|
}
|
|
|
|
nsCOMPtr<nsIObserverService> obsvc = services::GetObserverService();
|
|
if (obsvc) {
|
|
obsvc->NotifyObservers(nullptr, "last-pb-context-exited", nullptr);
|
|
}
|
|
}
|
|
}
|
|
|
|
static bool IsTopLevelDoc(BrowsingContext* aBrowsingContext,
|
|
nsILoadInfo* aLoadInfo) {
|
|
MOZ_ASSERT(aBrowsingContext);
|
|
MOZ_ASSERT(aLoadInfo);
|
|
|
|
if (aLoadInfo->GetExternalContentPolicyType() !=
|
|
ExtContentPolicy::TYPE_DOCUMENT) {
|
|
return false;
|
|
}
|
|
|
|
return aBrowsingContext->IsTopContent();
|
|
}
|
|
|
|
// True if loading for top level document loading in active tab.
|
|
static bool IsUrgentStart(BrowsingContext* aBrowsingContext,
|
|
nsILoadInfo* aLoadInfo, uint32_t aLoadType) {
|
|
MOZ_ASSERT(aBrowsingContext);
|
|
MOZ_ASSERT(aLoadInfo);
|
|
|
|
if (!IsTopLevelDoc(aBrowsingContext, aLoadInfo)) {
|
|
return false;
|
|
}
|
|
|
|
if (aLoadType &
|
|
(nsIDocShell::LOAD_CMD_NORMAL | nsIDocShell::LOAD_CMD_HISTORY)) {
|
|
return true;
|
|
}
|
|
|
|
return aBrowsingContext->IsActive();
|
|
}
|
|
|
|
nsDocShell::nsDocShell(BrowsingContext* aBrowsingContext,
|
|
uint64_t aContentWindowID)
|
|
: nsDocLoader(),
|
|
mContentWindowID(aContentWindowID),
|
|
mBrowsingContext(aBrowsingContext),
|
|
mForcedCharset(nullptr),
|
|
mParentCharset(nullptr),
|
|
mTreeOwner(nullptr),
|
|
mScrollbarPref(ScrollbarPreference::Auto),
|
|
mCharsetReloadState(eCharsetReloadInit),
|
|
mParentCharsetSource(0),
|
|
mFrameMargins(-1, -1),
|
|
mItemType(aBrowsingContext->IsContent() ? typeContent : typeChrome),
|
|
mPreviousEntryIndex(-1),
|
|
mLoadedEntryIndex(-1),
|
|
mChildOffset(0),
|
|
mBusyFlags(BUSY_FLAGS_NONE),
|
|
mAppType(nsIDocShell::APP_TYPE_UNKNOWN),
|
|
mLoadType(0),
|
|
mFailedLoadType(0),
|
|
mJSRunToCompletionDepth(0),
|
|
mMetaViewportOverride(nsIDocShell::META_VIEWPORT_OVERRIDE_NONE),
|
|
mCreatingDocument(false),
|
|
#ifdef DEBUG
|
|
mInEnsureScriptEnv(false),
|
|
#endif
|
|
mInitialized(false),
|
|
mAllowSubframes(true),
|
|
mAllowJavascript(true),
|
|
mAllowMetaRedirects(true),
|
|
mAllowImages(true),
|
|
mAllowMedia(true),
|
|
mAllowDNSPrefetch(true),
|
|
mAllowWindowControl(true),
|
|
mCSSErrorReportingEnabled(false),
|
|
mAllowAuth(mItemType == typeContent),
|
|
mAllowKeywordFixup(false),
|
|
mDisableMetaRefreshWhenInactive(false),
|
|
mIsAppTab(false),
|
|
mDeviceSizeIsPageSize(false),
|
|
mWindowDraggingAllowed(false),
|
|
mInFrameSwap(false),
|
|
mCanExecuteScripts(false),
|
|
mFiredUnloadEvent(false),
|
|
mEODForCurrentDocument(false),
|
|
mURIResultedInDocument(false),
|
|
mIsBeingDestroyed(false),
|
|
mIsExecutingOnLoadHandler(false),
|
|
mSavingOldViewer(false),
|
|
mAffectPrivateSessionLifetime(true),
|
|
mInvisible(false),
|
|
mHasLoadedNonBlankURI(false),
|
|
mBlankTiming(false),
|
|
mTitleValidForCurrentURI(false),
|
|
mWillChangeProcess(false),
|
|
mIsNavigating(false),
|
|
mSuspendMediaWhenInactive(false),
|
|
mForcedAutodetection(false) {
|
|
// If no outer window ID was provided, generate a new one.
|
|
if (aContentWindowID == 0) {
|
|
mContentWindowID = nsContentUtils::GenerateWindowId();
|
|
}
|
|
|
|
MOZ_LOG(gDocShellLeakLog, LogLevel::Debug, ("DOCSHELL %p created\n", this));
|
|
|
|
#ifdef DEBUG
|
|
mDocShellID = gDocshellIDCounter++;
|
|
// We're counting the number of |nsDocShells| to help find leaks
|
|
++gNumberOfDocShells;
|
|
MOZ_LOG(gDocShellAndDOMWindowLeakLogging, LogLevel::Info,
|
|
("++DOCSHELL %p == %ld [pid = %d] [id = %" PRIu64 "]\n", (void*)this,
|
|
gNumberOfDocShells, getpid(), mDocShellID));
|
|
#endif
|
|
}
|
|
|
|
nsDocShell::~nsDocShell() {
|
|
MOZ_ASSERT(!mObserved);
|
|
|
|
// Avoid notifying observers while we're in the dtor.
|
|
mIsBeingDestroyed = true;
|
|
|
|
Destroy();
|
|
|
|
if (mContentViewer) {
|
|
mContentViewer->Close(nullptr);
|
|
mContentViewer->Destroy();
|
|
mContentViewer = nullptr;
|
|
}
|
|
|
|
MOZ_LOG(gDocShellLeakLog, LogLevel::Debug, ("DOCSHELL %p destroyed\n", this));
|
|
|
|
#ifdef DEBUG
|
|
if (MOZ_LOG_TEST(gDocShellAndDOMWindowLeakLogging, LogLevel::Info)) {
|
|
nsAutoCString url;
|
|
if (mLastOpenedURI) {
|
|
url = mLastOpenedURI->GetSpecOrDefault();
|
|
|
|
// Data URLs can be very long, so truncate to avoid flooding the log.
|
|
const uint32_t maxURLLength = 1000;
|
|
if (url.Length() > maxURLLength) {
|
|
url.Truncate(maxURLLength);
|
|
}
|
|
}
|
|
|
|
// We're counting the number of |nsDocShells| to help find leaks
|
|
--gNumberOfDocShells;
|
|
MOZ_LOG(
|
|
gDocShellAndDOMWindowLeakLogging, LogLevel::Info,
|
|
("--DOCSHELL %p == %ld [pid = %d] [id = %" PRIu64 "] [url = %s]\n",
|
|
(void*)this, gNumberOfDocShells, getpid(), mDocShellID, url.get()));
|
|
}
|
|
#endif
|
|
}
|
|
|
|
bool nsDocShell::Initialize() {
|
|
if (mInitialized) {
|
|
// We've already been initialized.
|
|
return true;
|
|
}
|
|
|
|
NS_ASSERTION(mItemType == typeContent || mItemType == typeChrome,
|
|
"Unexpected item type in docshell");
|
|
|
|
NS_ENSURE_TRUE(Preferences::GetRootBranch(), false);
|
|
mInitialized = true;
|
|
|
|
mDisableMetaRefreshWhenInactive =
|
|
Preferences::GetBool("browser.meta_refresh_when_inactive.disabled",
|
|
mDisableMetaRefreshWhenInactive);
|
|
|
|
mDeviceSizeIsPageSize = Preferences::GetBool(
|
|
"docshell.device_size_is_page_size", mDeviceSizeIsPageSize);
|
|
|
|
if (nsCOMPtr<nsIObserverService> serv = services::GetObserverService()) {
|
|
const char* msg = mItemType == typeContent ? NS_WEBNAVIGATION_CREATE
|
|
: NS_CHROME_WEBNAVIGATION_CREATE;
|
|
serv->NotifyWhenScriptSafe(GetAsSupports(this), msg, nullptr);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<nsDocShell> nsDocShell::Create(
|
|
BrowsingContext* aBrowsingContext, uint64_t aContentWindowID) {
|
|
MOZ_ASSERT(aBrowsingContext, "DocShell without a BrowsingContext!");
|
|
|
|
nsresult rv;
|
|
RefPtr<nsDocShell> ds = new nsDocShell(aBrowsingContext, aContentWindowID);
|
|
|
|
// Initialize the underlying nsDocLoader.
|
|
rv = ds->nsDocLoader::InitWithBrowsingContext(aBrowsingContext);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Create our ContentListener
|
|
ds->mContentListener = new nsDSURIContentListener(ds);
|
|
|
|
// If parent intercept is not enabled then we must forward to
|
|
// the network controller from docshell. We also enable if we're
|
|
// in the parent process in order to support non-e10s configurations.
|
|
// Note: This check is duplicated in SharedWorkerInterfaceRequestor's
|
|
// constructor.
|
|
if (!ServiceWorkerParentInterceptEnabled() || XRE_IsParentProcess()) {
|
|
ds->mInterceptController = new ServiceWorkerInterceptController();
|
|
}
|
|
|
|
// We want to hold a strong ref to the loadgroup, so it better hold a weak
|
|
// ref to us... use an InterfaceRequestorProxy to do this.
|
|
nsCOMPtr<nsIInterfaceRequestor> proxy = new InterfaceRequestorProxy(ds);
|
|
ds->mLoadGroup->SetNotificationCallbacks(proxy);
|
|
|
|
// XXX(nika): We have our BrowsingContext, so we might be able to skip this.
|
|
// It could be nice to directly set up our DocLoader tree?
|
|
rv = nsDocLoader::AddDocLoaderAsChildOfRoot(ds);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Add |ds| as a progress listener to itself. A little weird, but simpler
|
|
// than reproducing all the listener-notification logic in overrides of the
|
|
// various methods via which nsDocLoader can be notified. Note that this
|
|
// holds an nsWeakPtr to |ds|, so it's ok.
|
|
rv = ds->AddProgressListener(ds, nsIWebProgress::NOTIFY_STATE_DOCUMENT |
|
|
nsIWebProgress::NOTIFY_STATE_NETWORK |
|
|
nsIWebProgress::NOTIFY_LOCATION);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
// If our BrowsingContext has private browsing enabled, update the number of
|
|
// private browsing docshells.
|
|
if (aBrowsingContext->UsePrivateBrowsing()) {
|
|
ds->NotifyPrivateBrowsingChanged();
|
|
}
|
|
|
|
// If our parent window is present in this process, set up our parent now.
|
|
RefPtr<WindowContext> parentWC = aBrowsingContext->GetParentWindowContext();
|
|
if (parentWC && parentWC->IsInProcess()) {
|
|
// If we don't have a parent element anymore, we can't finish this load!
|
|
// How'd we get here?
|
|
RefPtr<Element> parentElement = aBrowsingContext->GetEmbedderElement();
|
|
if (!parentElement) {
|
|
MOZ_ASSERT_UNREACHABLE("nsDocShell::Create() - !parentElement");
|
|
return nullptr;
|
|
}
|
|
|
|
// We have an in-process parent window, but don't have a parent nsDocShell?
|
|
// How'd we get here!
|
|
nsCOMPtr<nsIDocShell> parentShell =
|
|
parentElement->OwnerDoc()->GetDocShell();
|
|
if (!parentShell) {
|
|
MOZ_ASSERT_UNREACHABLE("nsDocShell::Create() - !parentShell");
|
|
return nullptr;
|
|
}
|
|
parentShell->AddChild(ds);
|
|
}
|
|
|
|
// Make |ds| the primary DocShell for the given context.
|
|
aBrowsingContext->SetDocShell(ds);
|
|
|
|
// Set |ds| default load flags on load group.
|
|
ds->SetLoadGroupDefaultLoadFlags(aBrowsingContext->GetDefaultLoadFlags());
|
|
|
|
if (XRE_IsParentProcess()) {
|
|
aBrowsingContext->Canonical()->MaybeAddAsProgressListener(ds);
|
|
}
|
|
|
|
return ds.forget();
|
|
}
|
|
|
|
void nsDocShell::DestroyChildren() {
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShellTreeItem> shell = do_QueryObject(child);
|
|
NS_ASSERTION(shell, "docshell has null child");
|
|
|
|
if (shell) {
|
|
shell->SetTreeOwner(nullptr);
|
|
}
|
|
}
|
|
|
|
nsDocLoader::DestroyChildren();
|
|
}
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_WEAK_PTR_INHERITED(nsDocShell, nsDocLoader,
|
|
mScriptGlobal, mInitialClientSource,
|
|
mBrowsingContext,
|
|
mChromeEventHandler)
|
|
|
|
NS_IMPL_ADDREF_INHERITED(nsDocShell, nsDocLoader)
|
|
NS_IMPL_RELEASE_INHERITED(nsDocShell, nsDocLoader)
|
|
|
|
NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(nsDocShell)
|
|
NS_INTERFACE_MAP_ENTRY(nsIDocShell)
|
|
NS_INTERFACE_MAP_ENTRY(nsIDocShellTreeItem)
|
|
NS_INTERFACE_MAP_ENTRY(nsIWebNavigation)
|
|
NS_INTERFACE_MAP_ENTRY(nsIBaseWindow)
|
|
NS_INTERFACE_MAP_ENTRY(nsIRefreshURI)
|
|
NS_INTERFACE_MAP_ENTRY(nsIWebProgressListener)
|
|
NS_INTERFACE_MAP_ENTRY(nsISupportsWeakReference)
|
|
NS_INTERFACE_MAP_ENTRY(nsIWebPageDescriptor)
|
|
NS_INTERFACE_MAP_ENTRY(nsIAuthPromptProvider)
|
|
NS_INTERFACE_MAP_ENTRY(nsILoadContext)
|
|
NS_INTERFACE_MAP_ENTRY_CONDITIONAL(nsINetworkInterceptController,
|
|
mInterceptController)
|
|
NS_INTERFACE_MAP_ENTRY(nsIDeprecationWarner)
|
|
NS_INTERFACE_MAP_END_INHERITING(nsDocLoader)
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetInterface(const nsIID& aIID, void** aSink) {
|
|
MOZ_ASSERT(aSink, "null out param");
|
|
|
|
*aSink = nullptr;
|
|
|
|
if (aIID.Equals(NS_GET_IID(nsICommandManager))) {
|
|
NS_ENSURE_SUCCESS(EnsureCommandHandler(), NS_ERROR_FAILURE);
|
|
*aSink = static_cast<nsICommandManager*>(mCommandManager.get());
|
|
} else if (aIID.Equals(NS_GET_IID(nsIURIContentListener))) {
|
|
*aSink = mContentListener;
|
|
} else if ((aIID.Equals(NS_GET_IID(nsIScriptGlobalObject)) ||
|
|
aIID.Equals(NS_GET_IID(nsIGlobalObject)) ||
|
|
aIID.Equals(NS_GET_IID(nsPIDOMWindowOuter)) ||
|
|
aIID.Equals(NS_GET_IID(mozIDOMWindowProxy)) ||
|
|
aIID.Equals(NS_GET_IID(nsIDOMWindow))) &&
|
|
NS_SUCCEEDED(EnsureScriptEnvironment())) {
|
|
return mScriptGlobal->QueryInterface(aIID, aSink);
|
|
} else if (aIID.Equals(NS_GET_IID(Document)) &&
|
|
NS_SUCCEEDED(EnsureContentViewer())) {
|
|
RefPtr<Document> doc = mContentViewer->GetDocument();
|
|
doc.forget(aSink);
|
|
return *aSink ? NS_OK : NS_NOINTERFACE;
|
|
} else if (aIID.Equals(NS_GET_IID(nsIApplicationCacheContainer))) {
|
|
*aSink = nullptr;
|
|
|
|
// Return application cache associated with this docshell, if any
|
|
|
|
nsCOMPtr<nsIContentViewer> contentViewer;
|
|
GetContentViewer(getter_AddRefs(contentViewer));
|
|
if (!contentViewer) {
|
|
return NS_ERROR_NO_INTERFACE;
|
|
}
|
|
|
|
RefPtr<Document> doc = contentViewer->GetDocument();
|
|
NS_ASSERTION(doc, "Should have a document.");
|
|
if (!doc) {
|
|
return NS_ERROR_NO_INTERFACE;
|
|
}
|
|
|
|
#if defined(DEBUG)
|
|
MOZ_LOG(
|
|
gDocShellLog, LogLevel::Debug,
|
|
("nsDocShell[%p]: returning app cache container %p", this, doc.get()));
|
|
#endif
|
|
return doc->QueryInterface(aIID, aSink);
|
|
} else if (aIID.Equals(NS_GET_IID(nsIPrompt)) &&
|
|
NS_SUCCEEDED(EnsureScriptEnvironment())) {
|
|
nsresult rv;
|
|
nsCOMPtr<nsIWindowWatcher> wwatch =
|
|
do_GetService(NS_WINDOWWATCHER_CONTRACTID, &rv);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Get the an auth prompter for our window so that the parenting
|
|
// of the dialogs works as it should when using tabs.
|
|
nsIPrompt* prompt;
|
|
rv = wwatch->GetNewPrompter(mScriptGlobal, &prompt);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
*aSink = prompt;
|
|
return NS_OK;
|
|
} else if (aIID.Equals(NS_GET_IID(nsIAuthPrompt)) ||
|
|
aIID.Equals(NS_GET_IID(nsIAuthPrompt2))) {
|
|
return NS_SUCCEEDED(GetAuthPrompt(PROMPT_NORMAL, aIID, aSink))
|
|
? NS_OK
|
|
: NS_NOINTERFACE;
|
|
} else if (aIID.Equals(NS_GET_IID(nsISHistory))) {
|
|
// This is deprecated, you should instead directly get
|
|
// ChildSHistory from the browsing context.
|
|
MOZ_DIAGNOSTIC_ASSERT(
|
|
false, "Do not try to get a nsISHistory interface from nsIDocShell");
|
|
return NS_NOINTERFACE;
|
|
} else if (aIID.Equals(NS_GET_IID(nsIWebBrowserFind))) {
|
|
nsresult rv = EnsureFind();
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
*aSink = mFind;
|
|
NS_ADDREF((nsISupports*)*aSink);
|
|
return NS_OK;
|
|
} else if (aIID.Equals(NS_GET_IID(nsISelectionDisplay))) {
|
|
if (PresShell* presShell = GetPresShell()) {
|
|
return presShell->QueryInterface(aIID, aSink);
|
|
}
|
|
} else if (aIID.Equals(NS_GET_IID(nsIDocShellTreeOwner))) {
|
|
nsCOMPtr<nsIDocShellTreeOwner> treeOwner;
|
|
nsresult rv = GetTreeOwner(getter_AddRefs(treeOwner));
|
|
if (NS_SUCCEEDED(rv) && treeOwner) {
|
|
return treeOwner->QueryInterface(aIID, aSink);
|
|
}
|
|
} else if (aIID.Equals(NS_GET_IID(nsIBrowserChild))) {
|
|
*aSink = GetBrowserChild().take();
|
|
return *aSink ? NS_OK : NS_ERROR_FAILURE;
|
|
} else {
|
|
return nsDocLoader::GetInterface(aIID, aSink);
|
|
}
|
|
|
|
NS_IF_ADDREF(((nsISupports*)*aSink));
|
|
return *aSink ? NS_OK : NS_NOINTERFACE;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetCancelContentJSEpoch(int32_t aEpoch) {
|
|
// Note: this gets called fairly early (before a pageload actually starts).
|
|
// We could probably defer this even longer.
|
|
nsCOMPtr<nsIBrowserChild> browserChild = GetBrowserChild();
|
|
static_cast<BrowserChild*>(browserChild.get())
|
|
->SetCancelContentJSEpoch(aEpoch);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::CheckDisallowedJavascriptLoad(
|
|
nsDocShellLoadState* aLoadState) {
|
|
if (!net::SchemeIsJavascript(aLoadState->URI())) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (nsCOMPtr<nsIPrincipal> targetPrincipal =
|
|
GetInheritedPrincipal(/* aConsiderCurrentDocument */ true)) {
|
|
if (!aLoadState->TriggeringPrincipal()->Subsumes(targetPrincipal)) {
|
|
return NS_ERROR_DOM_BAD_CROSS_ORIGIN_URI;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
return NS_ERROR_DOM_BAD_CROSS_ORIGIN_URI;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::LoadURI(nsDocShellLoadState* aLoadState, bool aSetNavigating) {
|
|
return LoadURI(aLoadState, aSetNavigating, false);
|
|
}
|
|
|
|
nsresult nsDocShell::LoadURI(nsDocShellLoadState* aLoadState,
|
|
bool aSetNavigating,
|
|
bool aContinueHandlingSubframeHistory) {
|
|
MOZ_ASSERT(aLoadState, "Must have a valid load state!");
|
|
// NOTE: This comparison between what appears to be internal/external load
|
|
// flags is intentional, as it's ensuring that the caller isn't using any of
|
|
// the flags reserved for implementations by the `nsIWebNavigation` interface.
|
|
// In the future, this check may be dropped.
|
|
MOZ_ASSERT(
|
|
(aLoadState->LoadFlags() & INTERNAL_LOAD_FLAGS_LOADURI_SETUP_FLAGS) == 0,
|
|
"Should not have these flags set");
|
|
MOZ_ASSERT(aLoadState->TargetBrowsingContext().IsNull(),
|
|
"Targeting doesn't occur until InternalLoad");
|
|
|
|
if (!aLoadState->TriggeringPrincipal()) {
|
|
MOZ_ASSERT(false, "LoadURI must have a triggering principal");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
MOZ_TRY(CheckDisallowedJavascriptLoad(aLoadState));
|
|
|
|
bool oldIsNavigating = mIsNavigating;
|
|
auto cleanupIsNavigating =
|
|
MakeScopeExit([&]() { mIsNavigating = oldIsNavigating; });
|
|
if (aSetNavigating) {
|
|
mIsNavigating = true;
|
|
}
|
|
|
|
PopupBlocker::PopupControlState popupState = PopupBlocker::openOverridden;
|
|
if (aLoadState->HasLoadFlags(LOAD_FLAGS_ALLOW_POPUPS)) {
|
|
popupState = PopupBlocker::openAllowed;
|
|
// If we allow popups as part of the navigation, ensure we fake a user
|
|
// interaction, so that popups can, in fact, be allowed to open.
|
|
if (WindowContext* wc = mBrowsingContext->GetCurrentWindowContext()) {
|
|
wc->NotifyUserGestureActivation();
|
|
}
|
|
}
|
|
|
|
AutoPopupStatePusher statePusher(popupState);
|
|
|
|
if (aLoadState->GetCancelContentJSEpoch().isSome()) {
|
|
SetCancelContentJSEpoch(*aLoadState->GetCancelContentJSEpoch());
|
|
}
|
|
|
|
// Note: we allow loads to get through here even if mFiredUnloadEvent is
|
|
// true; that case will get handled in LoadInternal or LoadHistoryEntry,
|
|
// so we pass false as the second parameter to IsNavigationAllowed.
|
|
// However, we don't allow the page to change location *in the middle of*
|
|
// firing beforeunload, so we do need to check if *beforeunload* is currently
|
|
// firing, so we call IsNavigationAllowed rather than just IsPrintingOrPP.
|
|
if (!IsNavigationAllowed(true, false)) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
|
|
nsLoadFlags defaultLoadFlags = mBrowsingContext->GetDefaultLoadFlags();
|
|
if (aLoadState->HasLoadFlags(LOAD_FLAGS_FORCE_TRR)) {
|
|
defaultLoadFlags |= nsIRequest::LOAD_TRR_ONLY_MODE;
|
|
} else if (aLoadState->HasLoadFlags(LOAD_FLAGS_DISABLE_TRR)) {
|
|
defaultLoadFlags |= nsIRequest::LOAD_TRR_DISABLED_MODE;
|
|
}
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(mBrowsingContext->SetDefaultLoadFlags(defaultLoadFlags));
|
|
|
|
if (!StartupTimeline::HasRecord(StartupTimeline::FIRST_LOAD_URI) &&
|
|
mItemType == typeContent && !NS_IsAboutBlank(aLoadState->URI())) {
|
|
StartupTimeline::RecordOnce(StartupTimeline::FIRST_LOAD_URI);
|
|
}
|
|
|
|
// LoadType used to be set to a default value here, if no LoadInfo/LoadState
|
|
// object was passed in. That functionality has been removed as of bug
|
|
// 1492648. LoadType should now be set up by the caller at the time they
|
|
// create their nsDocShellLoadState object to pass into LoadURI.
|
|
|
|
MOZ_LOG(
|
|
gDocShellLeakLog, LogLevel::Debug,
|
|
("nsDocShell[%p]: loading %s with flags 0x%08x", this,
|
|
aLoadState->URI()->GetSpecOrDefault().get(), aLoadState->LoadFlags()));
|
|
|
|
if ((!aLoadState->LoadIsFromSessionHistory() &&
|
|
!LOAD_TYPE_HAS_FLAGS(aLoadState->LoadType(),
|
|
LOAD_FLAGS_REPLACE_HISTORY)) ||
|
|
aContinueHandlingSubframeHistory) {
|
|
// This is possibly a subframe, so handle it accordingly.
|
|
//
|
|
// If history exists, it will be loaded into the aLoadState object, and the
|
|
// LoadType will be changed.
|
|
if (MaybeHandleSubframeHistory(aLoadState,
|
|
aContinueHandlingSubframeHistory)) {
|
|
// MaybeHandleSubframeHistory returns true if we need to continue loading
|
|
// asynchronously.
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
if (aLoadState->LoadIsFromSessionHistory()) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell[%p]: loading from session history", this));
|
|
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
return LoadHistoryEntry(aLoadState->SHEntry(), aLoadState->LoadType());
|
|
}
|
|
|
|
// FIXME Null check aLoadState->GetLoadingSessionHistoryInfo()?
|
|
return LoadHistoryEntry(*aLoadState->GetLoadingSessionHistoryInfo(),
|
|
aLoadState->LoadType());
|
|
}
|
|
|
|
// On history navigation via Back/Forward buttons, don't execute
|
|
// automatic JavaScript redirection such as |location.href = ...| or
|
|
// |window.open()|
|
|
//
|
|
// LOAD_NORMAL: window.open(...) etc.
|
|
// LOAD_STOP_CONTENT: location.href = ..., location.assign(...)
|
|
if ((aLoadState->LoadType() == LOAD_NORMAL ||
|
|
aLoadState->LoadType() == LOAD_STOP_CONTENT) &&
|
|
ShouldBlockLoadingForBackButton()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
BrowsingContext::Type bcType = mBrowsingContext->GetType();
|
|
|
|
// Set up the inheriting principal in LoadState.
|
|
nsresult rv = aLoadState->SetupInheritingPrincipal(
|
|
bcType, mBrowsingContext->OriginAttributesRef());
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = aLoadState->SetupTriggeringPrincipal(
|
|
mBrowsingContext->OriginAttributesRef());
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
aLoadState->CalculateLoadURIFlags();
|
|
|
|
MOZ_ASSERT(aLoadState->TypeHint().IsVoid(),
|
|
"Typehint should be null when calling InternalLoad from LoadURI");
|
|
MOZ_ASSERT(aLoadState->FileName().IsVoid(),
|
|
"FileName should be null when calling InternalLoad from LoadURI");
|
|
MOZ_ASSERT(!aLoadState->LoadIsFromSessionHistory(),
|
|
"Shouldn't be loading from an entry when calling InternalLoad "
|
|
"from LoadURI");
|
|
|
|
rv = InternalLoad(aLoadState);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
if (aLoadState->GetOriginalURIString().isSome()) {
|
|
// Save URI string in case it's needed later when
|
|
// sending to search engine service in EndPageLoad()
|
|
mOriginalUriString = *aLoadState->GetOriginalURIString();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
bool nsDocShell::IsLoadingFromSessionHistory() {
|
|
return mActiveEntryIsLoadingFromSessionHistory;
|
|
}
|
|
|
|
bool nsDocShell::MaybeHandleSubframeHistory(
|
|
nsDocShellLoadState* aLoadState, bool aContinueHandlingSubframeHistory) {
|
|
// First, verify if this is a subframe.
|
|
// Note, it is ok to rely on docshell here and not browsing context since when
|
|
// an iframe is created, it has first in-process docshell.
|
|
nsCOMPtr<nsIDocShellTreeItem> parentAsItem;
|
|
GetInProcessSameTypeParent(getter_AddRefs(parentAsItem));
|
|
nsCOMPtr<nsIDocShell> parentDS(do_QueryInterface(parentAsItem));
|
|
|
|
if (!parentDS || parentDS == static_cast<nsIDocShell*>(this)) {
|
|
if (mBrowsingContext && mBrowsingContext->IsTop()) {
|
|
// This is the root docshell. If we got here while
|
|
// executing an onLoad Handler,this load will not go
|
|
// into session history.
|
|
// XXX Why is this code in a method which deals with iframes!
|
|
bool inOnLoadHandler = false;
|
|
GetIsExecutingOnLoadHandler(&inOnLoadHandler);
|
|
if (inOnLoadHandler) {
|
|
aLoadState->SetLoadType(LOAD_NORMAL_REPLACE);
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/* OK. It is a subframe. Checkout the parent's loadtype. If the parent was
|
|
* loaded through a history mechanism, then get the SH entry for the child
|
|
* from the parent. This is done to restore frameset navigation while going
|
|
* back/forward. If the parent was loaded through any other loadType, set the
|
|
* child's loadType too accordingly, so that session history does not get
|
|
* confused.
|
|
*/
|
|
|
|
// Get the parent's load type
|
|
uint32_t parentLoadType;
|
|
parentDS->GetLoadType(&parentLoadType);
|
|
|
|
if (!aContinueHandlingSubframeHistory) {
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
if (nsDocShell::Cast(parentDS.get())->IsLoadingFromSessionHistory() &&
|
|
!GetCreatedDynamically()) {
|
|
if (XRE_IsContentProcess()) {
|
|
dom::ContentChild* contentChild = dom::ContentChild::GetSingleton();
|
|
if (contentChild) {
|
|
RefPtr<Document> parentDoc = parentDS->GetDocument();
|
|
parentDoc->BlockOnload();
|
|
RefPtr<BrowsingContext> browsingContext = mBrowsingContext;
|
|
Maybe<uint64_t> currentLoadIdentifier =
|
|
mBrowsingContext->GetCurrentLoadIdentifier();
|
|
RefPtr<nsDocShellLoadState> loadState = aLoadState;
|
|
bool isNavigating = mIsNavigating;
|
|
|
|
auto resolve =
|
|
[currentLoadIdentifier, browsingContext, parentDoc, loadState,
|
|
isNavigating](Tuple<mozilla::Maybe<LoadingSessionHistoryInfo>,
|
|
int32_t, int32_t>&& aResult) {
|
|
if (currentLoadIdentifier ==
|
|
browsingContext->GetCurrentLoadIdentifier() &&
|
|
Get<0>(aResult).isSome()) {
|
|
loadState->SetLoadingSessionHistoryInfo(
|
|
Get<0>(aResult).value());
|
|
loadState->SetLoadIsFromSessionHistory(
|
|
Get<1>(aResult), Get<2>(aResult), false);
|
|
}
|
|
RefPtr<nsDocShell> docShell =
|
|
static_cast<nsDocShell*>(browsingContext->GetDocShell());
|
|
if (docShell) {
|
|
// We got the results back from the parent process, call
|
|
// LoadURI again with the possibly updated data.
|
|
docShell->LoadURI(loadState, isNavigating, true);
|
|
}
|
|
parentDoc->UnblockOnload(false);
|
|
};
|
|
auto reject = [parentDoc](mozilla::ipc::ResponseRejectReason) {
|
|
parentDoc->UnblockOnload(false);
|
|
};
|
|
contentChild->SendGetLoadingSessionHistoryInfoFromParent(
|
|
mBrowsingContext, std::move(resolve), std::move(reject));
|
|
return true;
|
|
}
|
|
} else {
|
|
Maybe<LoadingSessionHistoryInfo> info;
|
|
int32_t requestedIndex = -1;
|
|
int32_t sessionHistoryLength = 0;
|
|
mBrowsingContext->Canonical()->GetLoadingSessionHistoryInfoFromParent(
|
|
info, &requestedIndex, &sessionHistoryLength);
|
|
if (info.isSome()) {
|
|
aLoadState->SetLoadingSessionHistoryInfo(info.value());
|
|
aLoadState->SetLoadIsFromSessionHistory(
|
|
requestedIndex, sessionHistoryLength, false);
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
// Get the ShEntry for the child from the parent
|
|
nsCOMPtr<nsISHEntry> currentSH;
|
|
bool oshe = false;
|
|
parentDS->GetCurrentSHEntry(getter_AddRefs(currentSH), &oshe);
|
|
bool dynamicallyAddedChild = GetCreatedDynamically();
|
|
|
|
if (!dynamicallyAddedChild && !oshe && currentSH) {
|
|
// Only use the old SHEntry, if we're sure enough that
|
|
// it wasn't originally for some other frame.
|
|
nsCOMPtr<nsISHEntry> shEntry;
|
|
currentSH->GetChildSHEntryIfHasNoDynamicallyAddedChild(
|
|
mChildOffset, getter_AddRefs(shEntry));
|
|
if (shEntry) {
|
|
aLoadState->SetSHEntry(shEntry);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Make some decisions on the child frame's loadType based on the
|
|
// parent's loadType, if the subframe hasn't loaded anything into it.
|
|
//
|
|
// In some cases privileged scripts may try to get the DOMWindow
|
|
// reference of this docshell before the loading starts, causing the
|
|
// initial about:blank content viewer being created and mCurrentURI being
|
|
// set. To handle this case we check if mCurrentURI is about:blank and
|
|
// currentSHEntry is null.
|
|
bool oshe = false;
|
|
nsCOMPtr<nsISHEntry> currentChildEntry;
|
|
GetCurrentSHEntry(getter_AddRefs(currentChildEntry), &oshe);
|
|
|
|
if (mCurrentURI && (!NS_IsAboutBlank(mCurrentURI) || currentChildEntry ||
|
|
mLoadingEntry || mActiveEntry)) {
|
|
// This is a pre-existing subframe. If
|
|
// 1. The load of this frame was not originally initiated by session
|
|
// history directly (i.e. (!shEntry) condition succeeded, but it can
|
|
// still be a history load on parent which causes this frame being
|
|
// loaded), which we checked with the above assert, and
|
|
// 2. mCurrentURI is not null, nor the initial about:blank,
|
|
// it is possible that a parent's onLoadHandler or even self's
|
|
// onLoadHandler is loading a new page in this child. Check parent's and
|
|
// self's busy flag and if it is set, we don't want this onLoadHandler
|
|
// load to get in to session history.
|
|
BusyFlags parentBusy = parentDS->GetBusyFlags();
|
|
BusyFlags selfBusy = GetBusyFlags();
|
|
|
|
if (parentBusy & BUSY_FLAGS_BUSY || selfBusy & BUSY_FLAGS_BUSY) {
|
|
aLoadState->SetLoadType(LOAD_NORMAL_REPLACE);
|
|
aLoadState->ClearLoadIsFromSessionHistory();
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// This is a newly created frame. Check for exception cases first.
|
|
// By default the subframe will inherit the parent's loadType.
|
|
if (aLoadState->LoadIsFromSessionHistory() &&
|
|
(parentLoadType == LOAD_NORMAL || parentLoadType == LOAD_LINK)) {
|
|
// The parent was loaded normally. In this case, this *brand new*
|
|
// child really shouldn't have a SHEntry. If it does, it could be
|
|
// because the parent is replacing an existing frame with a new frame,
|
|
// in the onLoadHandler. We don't want this url to get into session
|
|
// history. Clear off shEntry, and set load type to
|
|
// LOAD_BYPASS_HISTORY.
|
|
bool inOnLoadHandler = false;
|
|
parentDS->GetIsExecutingOnLoadHandler(&inOnLoadHandler);
|
|
if (inOnLoadHandler) {
|
|
aLoadState->SetLoadType(LOAD_NORMAL_REPLACE);
|
|
aLoadState->ClearLoadIsFromSessionHistory();
|
|
}
|
|
} else if (parentLoadType == LOAD_REFRESH) {
|
|
// Clear shEntry. For refresh loads, we have to load
|
|
// what comes through the pipe, not what's in history.
|
|
aLoadState->ClearLoadIsFromSessionHistory();
|
|
} else if ((parentLoadType == LOAD_BYPASS_HISTORY) ||
|
|
(aLoadState->LoadIsFromSessionHistory() &&
|
|
((parentLoadType & LOAD_CMD_HISTORY) ||
|
|
(parentLoadType == LOAD_RELOAD_NORMAL) ||
|
|
(parentLoadType == LOAD_RELOAD_CHARSET_CHANGE) ||
|
|
(parentLoadType == LOAD_RELOAD_CHARSET_CHANGE_BYPASS_CACHE) ||
|
|
(parentLoadType ==
|
|
LOAD_RELOAD_CHARSET_CHANGE_BYPASS_PROXY_AND_CACHE)))) {
|
|
// If the parent url, bypassed history or was loaded from
|
|
// history, pass on the parent's loadType to the new child
|
|
// frame too, so that the child frame will also
|
|
// avoid getting into history.
|
|
aLoadState->SetLoadType(parentLoadType);
|
|
} else if (parentLoadType == LOAD_ERROR_PAGE) {
|
|
// If the parent document is an error page, we don't
|
|
// want to update global/session history. However,
|
|
// this child frame is not an error page.
|
|
aLoadState->SetLoadType(LOAD_BYPASS_HISTORY);
|
|
} else if ((parentLoadType == LOAD_RELOAD_BYPASS_CACHE) ||
|
|
(parentLoadType == LOAD_RELOAD_BYPASS_PROXY) ||
|
|
(parentLoadType == LOAD_RELOAD_BYPASS_PROXY_AND_CACHE)) {
|
|
// the new frame should inherit the parent's load type so that it also
|
|
// bypasses the cache and/or proxy
|
|
aLoadState->SetLoadType(parentLoadType);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* Reset state to a new content model within the current document and the
|
|
* document viewer. Called by the document before initiating an out of band
|
|
* document.write().
|
|
*/
|
|
NS_IMETHODIMP
|
|
nsDocShell::PrepareForNewContentModel() {
|
|
// Clear out our form control state, because the state of controls
|
|
// in the pre-open() document should not affect the state of
|
|
// controls that are now going to be written.
|
|
SetLayoutHistoryState(nullptr);
|
|
mEODForCurrentDocument = false;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::FirePageHideNotification(bool aIsUnload) {
|
|
FirePageHideNotificationInternal(aIsUnload, false);
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::FirePageHideNotificationInternal(
|
|
bool aIsUnload, bool aSkipCheckingDynEntries) {
|
|
if (mContentViewer && !mFiredUnloadEvent) {
|
|
// Keep an explicit reference since calling PageHide could release
|
|
// mContentViewer
|
|
nsCOMPtr<nsIContentViewer> contentViewer(mContentViewer);
|
|
mFiredUnloadEvent = true;
|
|
|
|
if (mTiming) {
|
|
mTiming->NotifyUnloadEventStart();
|
|
}
|
|
|
|
contentViewer->PageHide(aIsUnload);
|
|
|
|
if (mTiming) {
|
|
mTiming->NotifyUnloadEventEnd();
|
|
}
|
|
|
|
AutoTArray<nsCOMPtr<nsIDocShell>, 8> kids;
|
|
uint32_t n = mChildList.Length();
|
|
kids.SetCapacity(n);
|
|
for (uint32_t i = 0; i < n; i++) {
|
|
kids.AppendElement(do_QueryInterface(ChildAt(i)));
|
|
}
|
|
|
|
n = kids.Length();
|
|
for (uint32_t i = 0; i < n; ++i) {
|
|
RefPtr<nsDocShell> child = static_cast<nsDocShell*>(kids[i].get());
|
|
if (child) {
|
|
// Skip checking dynamic subframe entries in our children.
|
|
child->FirePageHideNotificationInternal(aIsUnload, true);
|
|
}
|
|
}
|
|
|
|
// If the document is unloading, remove all dynamic subframe entries.
|
|
if (aIsUnload && !aSkipCheckingDynEntries) {
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (rootSH) {
|
|
MOZ_LOG(
|
|
gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p unloading, remove dynamic subframe entries", this));
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
if (mActiveEntry) {
|
|
mBrowsingContext->RemoveDynEntriesFromActiveSessionHistoryEntry();
|
|
}
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p unloading, no active entries", this));
|
|
} else if (mOSHE) {
|
|
int32_t index = rootSH->Index();
|
|
rootSH->LegacySHistory()->RemoveDynEntries(index, mOSHE);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Now make sure our editor, if any, is detached before we go
|
|
// any farther.
|
|
DetachEditorFromWindow();
|
|
}
|
|
}
|
|
|
|
void nsDocShell::FirePageHideShowNonRecursive(bool aShow) {
|
|
MOZ_ASSERT(mozilla::BFCacheInParent());
|
|
|
|
if (!mContentViewer) {
|
|
return;
|
|
}
|
|
|
|
// Emulate what non-SHIP BFCache does too. In pageshow case
|
|
// add and remove a request and before that call SetCurrentURI to get
|
|
// the location change notification.
|
|
// For pagehide, set mFiredUnloadEvent to true, so that unload doesn't fire.
|
|
nsCOMPtr<nsIContentViewer> contentViewer(mContentViewer);
|
|
if (aShow) {
|
|
mFiredUnloadEvent = false;
|
|
RefPtr<Document> doc = contentViewer->GetDocument();
|
|
if (doc) {
|
|
RefPtr<nsGlobalWindowInner> inner =
|
|
mScriptGlobal ? mScriptGlobal->GetCurrentInnerWindowInternal()
|
|
: nullptr;
|
|
if (mBrowsingContext->IsTop()) {
|
|
doc->NotifyPossibleTitleChange(false);
|
|
if (inner) {
|
|
// Now that we have found the inner window of the page restored
|
|
// from the history, we have to make sure that
|
|
// performance.navigation.type is 2.
|
|
// Traditionally this type change has been done to the top level page
|
|
// only.
|
|
inner->GetPerformance()->GetDOMTiming()->NotifyRestoreStart();
|
|
}
|
|
}
|
|
|
|
if (inner) {
|
|
inner->Thaw(false);
|
|
}
|
|
|
|
nsCOMPtr<nsIChannel> channel = doc->GetChannel();
|
|
if (channel) {
|
|
SetCurrentURI(doc->GetDocumentURI(), channel, true, 0);
|
|
mEODForCurrentDocument = false;
|
|
mIsRestoringDocument = true;
|
|
mLoadGroup->AddRequest(channel, nullptr);
|
|
mLoadGroup->RemoveRequest(channel, nullptr, NS_OK);
|
|
mIsRestoringDocument = false;
|
|
}
|
|
RefPtr<PresShell> presShell = GetPresShell();
|
|
if (presShell) {
|
|
presShell->Thaw(false);
|
|
}
|
|
}
|
|
} else if (!mFiredUnloadEvent) {
|
|
// XXXBFCache check again that the page can enter bfcache.
|
|
// XXXBFCache should mTiming->NotifyUnloadEventStart()/End() be called here?
|
|
mFiredUnloadEvent = true;
|
|
contentViewer->PageHide(false);
|
|
|
|
if (mScriptGlobal && mScriptGlobal->GetCurrentInnerWindowInternal()) {
|
|
mScriptGlobal->GetCurrentInnerWindowInternal()->Freeze(false);
|
|
}
|
|
RefPtr<PresShell> presShell = GetPresShell();
|
|
if (presShell) {
|
|
presShell->Freeze(false);
|
|
}
|
|
}
|
|
}
|
|
|
|
nsresult nsDocShell::Dispatch(TaskCategory aCategory,
|
|
already_AddRefed<nsIRunnable>&& aRunnable) {
|
|
nsCOMPtr<nsIRunnable> runnable(aRunnable);
|
|
nsCOMPtr<nsPIDOMWindowOuter> win = GetWindow();
|
|
if (NS_WARN_IF(!win)) {
|
|
// Window should only be unavailable after destroyed.
|
|
MOZ_ASSERT(mIsBeingDestroyed);
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
if (win->GetDocGroup()) {
|
|
return win->GetDocGroup()->Dispatch(aCategory, runnable.forget());
|
|
}
|
|
|
|
return SchedulerGroup::Dispatch(aCategory, runnable.forget());
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::DispatchLocationChangeEvent() {
|
|
return Dispatch(
|
|
TaskCategory::Other,
|
|
NewRunnableMethod("nsDocShell::FireDummyOnLocationChange", this,
|
|
&nsDocShell::FireDummyOnLocationChange));
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::StartDelayedAutoplayMediaComponents() {
|
|
RefPtr<nsPIDOMWindowOuter> outerWindow = GetWindow();
|
|
if (outerWindow) {
|
|
outerWindow->SetMediaSuspend(nsISuspendedTypes::NONE_SUSPENDED);
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
bool nsDocShell::MaybeInitTiming() {
|
|
if (mTiming && !mBlankTiming) {
|
|
return false;
|
|
}
|
|
|
|
bool canBeReset = false;
|
|
|
|
if (mScriptGlobal && mBlankTiming) {
|
|
nsPIDOMWindowInner* innerWin = mScriptGlobal->GetCurrentInnerWindow();
|
|
if (innerWin && innerWin->GetPerformance()) {
|
|
mTiming = innerWin->GetPerformance()->GetDOMTiming();
|
|
mBlankTiming = false;
|
|
}
|
|
}
|
|
|
|
if (!mTiming) {
|
|
mTiming = new nsDOMNavigationTiming(this);
|
|
canBeReset = true;
|
|
}
|
|
|
|
mTiming->NotifyNavigationStart(
|
|
mBrowsingContext->IsActive()
|
|
? nsDOMNavigationTiming::DocShellState::eActive
|
|
: nsDOMNavigationTiming::DocShellState::eInactive);
|
|
|
|
return canBeReset;
|
|
}
|
|
|
|
void nsDocShell::MaybeResetInitTiming(bool aReset) {
|
|
if (aReset) {
|
|
mTiming = nullptr;
|
|
}
|
|
}
|
|
|
|
nsDOMNavigationTiming* nsDocShell::GetNavigationTiming() const {
|
|
return mTiming;
|
|
}
|
|
|
|
//
|
|
// Bug 13871: Prevent frameset spoofing
|
|
//
|
|
// This routine answers: 'Is origin's document from same domain as
|
|
// target's document?'
|
|
//
|
|
// file: uris are considered the same domain for the purpose of
|
|
// frame navigation regardless of script accessibility (bug 420425)
|
|
//
|
|
/* static */
|
|
bool nsDocShell::ValidateOrigin(BrowsingContext* aOrigin,
|
|
BrowsingContext* aTarget) {
|
|
nsIDocShell* originDocShell = aOrigin->GetDocShell();
|
|
MOZ_ASSERT(originDocShell, "originDocShell must not be null");
|
|
Document* originDocument = originDocShell->GetDocument();
|
|
NS_ENSURE_TRUE(originDocument, false);
|
|
|
|
nsIDocShell* targetDocShell = aTarget->GetDocShell();
|
|
MOZ_ASSERT(targetDocShell, "targetDocShell must not be null");
|
|
Document* targetDocument = targetDocShell->GetDocument();
|
|
NS_ENSURE_TRUE(targetDocument, false);
|
|
|
|
bool equal;
|
|
nsresult rv = originDocument->NodePrincipal()->Equals(
|
|
targetDocument->NodePrincipal(), &equal);
|
|
if (NS_SUCCEEDED(rv) && equal) {
|
|
return true;
|
|
}
|
|
// Not strictly equal, special case if both are file: uris
|
|
nsCOMPtr<nsIURI> originURI;
|
|
nsCOMPtr<nsIURI> targetURI;
|
|
nsCOMPtr<nsIURI> innerOriginURI;
|
|
nsCOMPtr<nsIURI> innerTargetURI;
|
|
|
|
// Casting to BasePrincipal, as we can't get InnerMost URI otherwise
|
|
auto* originDocumentBasePrincipal =
|
|
BasePrincipal::Cast(originDocument->NodePrincipal());
|
|
|
|
rv = originDocumentBasePrincipal->GetURI(getter_AddRefs(originURI));
|
|
if (NS_SUCCEEDED(rv) && originURI) {
|
|
innerOriginURI = NS_GetInnermostURI(originURI);
|
|
}
|
|
|
|
auto* targetDocumentBasePrincipal =
|
|
BasePrincipal::Cast(targetDocument->NodePrincipal());
|
|
|
|
rv = targetDocumentBasePrincipal->GetURI(getter_AddRefs(targetURI));
|
|
if (NS_SUCCEEDED(rv) && targetURI) {
|
|
innerTargetURI = NS_GetInnermostURI(targetURI);
|
|
}
|
|
|
|
return innerOriginURI && innerTargetURI && SchemeIsFile(innerOriginURI) &&
|
|
SchemeIsFile(innerTargetURI);
|
|
}
|
|
|
|
nsPresContext* nsDocShell::GetEldestPresContext() {
|
|
nsIContentViewer* viewer = mContentViewer;
|
|
while (viewer) {
|
|
nsIContentViewer* prevViewer = viewer->GetPreviousViewer();
|
|
if (!prevViewer) {
|
|
return viewer->GetPresContext();
|
|
}
|
|
viewer = prevViewer;
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
nsPresContext* nsDocShell::GetPresContext() {
|
|
if (!mContentViewer) {
|
|
return nullptr;
|
|
}
|
|
|
|
return mContentViewer->GetPresContext();
|
|
}
|
|
|
|
PresShell* nsDocShell::GetPresShell() {
|
|
nsPresContext* presContext = GetPresContext();
|
|
return presContext ? presContext->GetPresShell() : nullptr;
|
|
}
|
|
|
|
PresShell* nsDocShell::GetEldestPresShell() {
|
|
nsPresContext* presContext = GetEldestPresContext();
|
|
|
|
if (presContext) {
|
|
return presContext->GetPresShell();
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetContentViewer(nsIContentViewer** aContentViewer) {
|
|
NS_ENSURE_ARG_POINTER(aContentViewer);
|
|
|
|
*aContentViewer = mContentViewer;
|
|
NS_IF_ADDREF(*aContentViewer);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetOuterWindowID(uint64_t* aWindowID) {
|
|
*aWindowID = mContentWindowID;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetChromeEventHandler(EventTarget* aChromeEventHandler) {
|
|
mChromeEventHandler = aChromeEventHandler;
|
|
|
|
if (mScriptGlobal) {
|
|
mScriptGlobal->SetChromeEventHandler(mChromeEventHandler);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetChromeEventHandler(EventTarget** aChromeEventHandler) {
|
|
NS_ENSURE_ARG_POINTER(aChromeEventHandler);
|
|
RefPtr<EventTarget> handler = mChromeEventHandler;
|
|
handler.forget(aChromeEventHandler);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetCurrentURI(nsIURI* aURI) {
|
|
// Note that securityUI will set STATE_IS_INSECURE, even if
|
|
// the scheme of |aURI| is "https".
|
|
SetCurrentURI(aURI, nullptr, true, 0);
|
|
return NS_OK;
|
|
}
|
|
|
|
bool nsDocShell::SetCurrentURI(nsIURI* aURI, nsIRequest* aRequest,
|
|
bool aFireOnLocationChange,
|
|
uint32_t aLocationFlags) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
MOZ_LOG(gDocShellLeakLog, LogLevel::Debug,
|
|
("DOCSHELL %p SetCurrentURI %s\n", this,
|
|
aURI ? aURI->GetSpecOrDefault().get() : ""));
|
|
|
|
// We don't want to send a location change when we're displaying an error
|
|
// page, and we don't want to change our idea of "current URI" either
|
|
if (mLoadType == LOAD_ERROR_PAGE) {
|
|
return false;
|
|
}
|
|
|
|
bool uriIsEqual = false;
|
|
if (!mCurrentURI || !aURI ||
|
|
NS_FAILED(mCurrentURI->Equals(aURI, &uriIsEqual)) || !uriIsEqual) {
|
|
mTitleValidForCurrentURI = false;
|
|
}
|
|
|
|
mCurrentURI = aURI;
|
|
|
|
#ifdef DEBUG
|
|
mLastOpenedURI = aURI;
|
|
#endif
|
|
|
|
if (!NS_IsAboutBlank(mCurrentURI)) {
|
|
mHasLoadedNonBlankURI = true;
|
|
}
|
|
|
|
// Don't bother firing onLocationChange when creating a subframe's initial
|
|
// about:blank document, as this can happen when it's not safe for us to run
|
|
// script.
|
|
if (!(mLoadingEntry || mLSHE) && !mHasLoadedNonBlankURI && !aRequest &&
|
|
aLocationFlags == 0 && !mBrowsingContext->IsTop()) {
|
|
return false;
|
|
}
|
|
|
|
MOZ_ASSERT(nsContentUtils::IsSafeToRunScript());
|
|
|
|
if (aFireOnLocationChange) {
|
|
FireOnLocationChange(this, aRequest, aURI, aLocationFlags);
|
|
}
|
|
return !aFireOnLocationChange;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCharset(nsACString& aCharset) {
|
|
aCharset.Truncate();
|
|
|
|
PresShell* presShell = GetPresShell();
|
|
NS_ENSURE_TRUE(presShell, NS_ERROR_FAILURE);
|
|
Document* doc = presShell->GetDocument();
|
|
NS_ENSURE_TRUE(doc, NS_ERROR_FAILURE);
|
|
doc->GetDocumentCharacterSet()->Name(aCharset);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GatherCharsetMenuTelemetry() {
|
|
nsCOMPtr<nsIContentViewer> viewer;
|
|
GetContentViewer(getter_AddRefs(viewer));
|
|
if (!viewer) {
|
|
return NS_OK;
|
|
}
|
|
|
|
Document* doc = viewer->GetDocument();
|
|
if (!doc || doc->WillIgnoreCharsetOverride()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (mForcedAutodetection) {
|
|
LOGCHARSETMENU(("ENCODING_OVERRIDE_USED_AUTOMATIC"));
|
|
Telemetry::ScalarSet(Telemetry::ScalarID::ENCODING_OVERRIDE_USED_AUTOMATIC,
|
|
true);
|
|
} else {
|
|
LOGCHARSETMENU(("ENCODING_OVERRIDE_USED_MANUAL"));
|
|
Telemetry::ScalarSet(Telemetry::ScalarID::ENCODING_OVERRIDE_USED_MANUAL,
|
|
true);
|
|
}
|
|
|
|
nsIURI* url = doc->GetOriginalURI();
|
|
bool isFileURL = url && SchemeIsFile(url);
|
|
|
|
int32_t charsetSource = doc->GetDocumentCharacterSetSource();
|
|
auto encoding = doc->GetDocumentCharacterSet();
|
|
switch (charsetSource) {
|
|
case kCharsetFromInitialUserForcedAutoDetection:
|
|
case kCharsetFromFinalUserForcedAutoDetection:
|
|
LOGCHARSETMENU(("AutoOverridden"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::AutoOverridden);
|
|
break;
|
|
case kCharsetFromUserForced:
|
|
case kCharsetFromUserForcedJapaneseAutoDetection:
|
|
LOGCHARSETMENU(("ManuallyOverridden"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::ManuallyOverridden);
|
|
break;
|
|
case kCharsetFromTopLevelDomain:
|
|
if (encoding == WINDOWS_1252_ENCODING) {
|
|
LOGCHARSETMENU(("UnlabeledInLk"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::UnlabeledInLk);
|
|
} else {
|
|
LOGCHARSETMENU(("UnlabeledJp"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::UnlabeledJp);
|
|
}
|
|
break;
|
|
case kCharsetFromFinalJapaneseAutoDetection:
|
|
LOGCHARSETMENU(("UnlabeledJp"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::UnlabeledJp);
|
|
break;
|
|
case kCharsetFromInitialAutoDetectionASCII:
|
|
// Deliberately no final version
|
|
LOGCHARSETMENU(("UnlabeledAscii"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::UnlabeledAscii);
|
|
break;
|
|
case kCharsetFromInitialAutoDetectionWouldNotHaveBeenUTF8Generic:
|
|
case kCharsetFromFinalAutoDetectionWouldNotHaveBeenUTF8Generic:
|
|
case kCharsetFromInitialAutoDetectionWouldNotHaveBeenUTF8Content:
|
|
case kCharsetFromFinalAutoDetectionWouldNotHaveBeenUTF8Content:
|
|
LOGCHARSETMENU(("UnlabeledNonUtf8"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::UnlabeledNonUtf8);
|
|
break;
|
|
case kCharsetFromInitialAutoDetectionWouldNotHaveBeenUTF8DependedOnTLD:
|
|
case kCharsetFromFinalAutoDetectionWouldNotHaveBeenUTF8DependedOnTLD:
|
|
LOGCHARSETMENU(("UnlabeledNonUtf8TLD"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::UnlabeledNonUtf8TLD);
|
|
break;
|
|
case kCharsetFromInitialAutoDetectionWouldHaveBeenUTF8:
|
|
case kCharsetFromFinalAutoDetectionWouldHaveBeenUTF8:
|
|
LOGCHARSETMENU(("UnlabeledUtf8"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::UnlabeledUtf8);
|
|
break;
|
|
case kCharsetFromChannel:
|
|
if (encoding == UTF_8_ENCODING) {
|
|
LOGCHARSETMENU(("ChannelUtf8"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::ChannelUtf8);
|
|
} else {
|
|
LOGCHARSETMENU(("ChannelNonUtf8"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::ChannelNonUtf8);
|
|
}
|
|
break;
|
|
case kCharsetFromMetaPrescan:
|
|
case kCharsetFromMetaTag:
|
|
if (isFileURL) {
|
|
LOGCHARSETMENU(("LocalLabeled"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::LocalLabeled);
|
|
} else if (encoding == UTF_8_ENCODING) {
|
|
LOGCHARSETMENU(("MetaUtf8"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::MetaUtf8);
|
|
} else {
|
|
LOGCHARSETMENU(("MetaNonUtf8"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::MetaNonUtf8);
|
|
}
|
|
break;
|
|
case kCharsetFromFinalAutoDetectionFile:
|
|
if (isFileURL) {
|
|
LOGCHARSETMENU(("LocalUnlabeled"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::LocalUnlabeled);
|
|
} else {
|
|
LOGCHARSETMENU(("Bug"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::Bug);
|
|
}
|
|
break;
|
|
default:
|
|
LOGCHARSETMENU(("Bug"));
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_ENCODING_OVERRIDE_SITUATION_2::Bug);
|
|
break;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetCharset(const nsACString& aCharset) {
|
|
mForcedAutodetection = false;
|
|
if (aCharset.IsEmpty()) {
|
|
mForcedCharset = nullptr;
|
|
return NS_OK;
|
|
}
|
|
if (aCharset.EqualsLiteral("_autodetect_all")) {
|
|
mForcedCharset = WINDOWS_1252_ENCODING;
|
|
mForcedAutodetection = true;
|
|
return NS_OK;
|
|
}
|
|
const Encoding* encoding = Encoding::ForLabel(aCharset);
|
|
if (!encoding) {
|
|
// Reject unknown labels
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
if (!encoding->IsAsciiCompatible() && encoding != ISO_2022_JP_ENCODING) {
|
|
// Reject XSS hazards
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
mForcedCharset = encoding;
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetParentCharset(const Encoding*& aCharset,
|
|
int32_t aCharsetSource,
|
|
nsIPrincipal* aPrincipal) {
|
|
mParentCharset = aCharset;
|
|
mParentCharsetSource = aCharsetSource;
|
|
mParentCharsetPrincipal = aPrincipal;
|
|
}
|
|
|
|
void nsDocShell::GetParentCharset(const Encoding*& aCharset,
|
|
int32_t* aCharsetSource,
|
|
nsIPrincipal** aPrincipal) {
|
|
aCharset = mParentCharset;
|
|
*aCharsetSource = mParentCharsetSource;
|
|
NS_IF_ADDREF(*aPrincipal = mParentCharsetPrincipal);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetHasTrackingContentBlocked(Promise** aPromise) {
|
|
MOZ_ASSERT(aPromise);
|
|
|
|
ErrorResult rv;
|
|
RefPtr<Document> doc(GetDocument());
|
|
RefPtr<Promise> retPromise = Promise::Create(doc->GetOwnerGlobal(), rv);
|
|
if (NS_WARN_IF(rv.Failed())) {
|
|
return rv.StealNSResult();
|
|
}
|
|
|
|
// Retrieve the document's content blocking events from the parent process.
|
|
RefPtr<Document::GetContentBlockingEventsPromise> promise =
|
|
doc->GetContentBlockingEvents();
|
|
if (promise) {
|
|
promise->Then(
|
|
GetCurrentSerialEventTarget(), __func__,
|
|
[retPromise](const Document::GetContentBlockingEventsPromise::
|
|
ResolveOrRejectValue& aValue) {
|
|
if (aValue.IsResolve()) {
|
|
bool has = aValue.ResolveValue() &
|
|
nsIWebProgressListener::STATE_BLOCKED_TRACKING_CONTENT;
|
|
retPromise->MaybeResolve(has);
|
|
} else {
|
|
retPromise->MaybeResolve(false);
|
|
}
|
|
});
|
|
} else {
|
|
retPromise->MaybeResolve(false);
|
|
}
|
|
|
|
retPromise.forget(aPromise);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowPlugins(bool* aAllowPlugins) {
|
|
NS_ENSURE_ARG_POINTER(aAllowPlugins);
|
|
|
|
*aAllowPlugins = mBrowsingContext->GetAllowPlugins();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowPlugins(bool aAllowPlugins) {
|
|
// XXX should enable or disable a plugin host
|
|
return mBrowsingContext->SetAllowPlugins(aAllowPlugins);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowJavascript(bool* aAllowJavascript) {
|
|
NS_ENSURE_ARG_POINTER(aAllowJavascript);
|
|
|
|
*aAllowJavascript = mAllowJavascript;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCssErrorReportingEnabled(bool* aEnabled) {
|
|
MOZ_ASSERT(aEnabled);
|
|
*aEnabled = mCSSErrorReportingEnabled;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetCssErrorReportingEnabled(bool aEnabled) {
|
|
mCSSErrorReportingEnabled = aEnabled;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowJavascript(bool aAllowJavascript) {
|
|
mAllowJavascript = aAllowJavascript;
|
|
RecomputeCanExecuteScripts();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetUsePrivateBrowsing(bool* aUsePrivateBrowsing) {
|
|
NS_ENSURE_ARG_POINTER(aUsePrivateBrowsing);
|
|
return mBrowsingContext->GetUsePrivateBrowsing(aUsePrivateBrowsing);
|
|
}
|
|
|
|
void nsDocShell::NotifyPrivateBrowsingChanged() {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
if (mAffectPrivateSessionLifetime) {
|
|
if (UsePrivateBrowsing()) {
|
|
IncreasePrivateDocShellCount();
|
|
} else {
|
|
DecreasePrivateDocShellCount();
|
|
}
|
|
}
|
|
|
|
nsTObserverArray<nsWeakPtr>::ForwardIterator iter(mPrivacyObservers);
|
|
while (iter.HasMore()) {
|
|
nsWeakPtr ref = iter.GetNext();
|
|
nsCOMPtr<nsIPrivacyTransitionObserver> obs = do_QueryReferent(ref);
|
|
if (!obs) {
|
|
iter.Remove();
|
|
} else {
|
|
obs->PrivateModeChanged(UsePrivateBrowsing());
|
|
}
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetUsePrivateBrowsing(bool aUsePrivateBrowsing) {
|
|
return mBrowsingContext->SetUsePrivateBrowsing(aUsePrivateBrowsing);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetPrivateBrowsing(bool aUsePrivateBrowsing) {
|
|
return mBrowsingContext->SetPrivateBrowsing(aUsePrivateBrowsing);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetHasLoadedNonBlankURI(bool* aResult) {
|
|
NS_ENSURE_ARG_POINTER(aResult);
|
|
|
|
*aResult = mHasLoadedNonBlankURI;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetUseRemoteTabs(bool* aUseRemoteTabs) {
|
|
NS_ENSURE_ARG_POINTER(aUseRemoteTabs);
|
|
return mBrowsingContext->GetUseRemoteTabs(aUseRemoteTabs);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetRemoteTabs(bool aUseRemoteTabs) {
|
|
return mBrowsingContext->SetRemoteTabs(aUseRemoteTabs);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetUseRemoteSubframes(bool* aUseRemoteSubframes) {
|
|
NS_ENSURE_ARG_POINTER(aUseRemoteSubframes);
|
|
return mBrowsingContext->GetUseRemoteSubframes(aUseRemoteSubframes);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetRemoteSubframes(bool aUseRemoteSubframes) {
|
|
return mBrowsingContext->SetRemoteSubframes(aUseRemoteSubframes);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAffectPrivateSessionLifetime(bool aAffectLifetime) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
bool change = aAffectLifetime != mAffectPrivateSessionLifetime;
|
|
if (change && UsePrivateBrowsing()) {
|
|
if (aAffectLifetime) {
|
|
IncreasePrivateDocShellCount();
|
|
} else {
|
|
DecreasePrivateDocShellCount();
|
|
}
|
|
}
|
|
mAffectPrivateSessionLifetime = aAffectLifetime;
|
|
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> shell = do_QueryObject(child);
|
|
if (shell) {
|
|
shell->SetAffectPrivateSessionLifetime(aAffectLifetime);
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAffectPrivateSessionLifetime(bool* aAffectLifetime) {
|
|
*aAffectLifetime = mAffectPrivateSessionLifetime;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::AddWeakPrivacyTransitionObserver(
|
|
nsIPrivacyTransitionObserver* aObserver) {
|
|
nsWeakPtr weakObs = do_GetWeakReference(aObserver);
|
|
if (!weakObs) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
mPrivacyObservers.AppendElement(weakObs);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::AddWeakReflowObserver(nsIReflowObserver* aObserver) {
|
|
nsWeakPtr weakObs = do_GetWeakReference(aObserver);
|
|
if (!weakObs) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
mReflowObservers.AppendElement(weakObs);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::RemoveWeakReflowObserver(nsIReflowObserver* aObserver) {
|
|
nsWeakPtr obs = do_GetWeakReference(aObserver);
|
|
return mReflowObservers.RemoveElement(obs) ? NS_OK : NS_ERROR_FAILURE;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::NotifyReflowObservers(bool aInterruptible,
|
|
DOMHighResTimeStamp aStart,
|
|
DOMHighResTimeStamp aEnd) {
|
|
nsTObserverArray<nsWeakPtr>::ForwardIterator iter(mReflowObservers);
|
|
while (iter.HasMore()) {
|
|
nsWeakPtr ref = iter.GetNext();
|
|
nsCOMPtr<nsIReflowObserver> obs = do_QueryReferent(ref);
|
|
if (!obs) {
|
|
iter.Remove();
|
|
} else if (aInterruptible) {
|
|
obs->ReflowInterruptible(aStart, aEnd);
|
|
} else {
|
|
obs->Reflow(aStart, aEnd);
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowMetaRedirects(bool* aReturn) {
|
|
NS_ENSURE_ARG_POINTER(aReturn);
|
|
|
|
*aReturn = mAllowMetaRedirects;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowMetaRedirects(bool aValue) {
|
|
mAllowMetaRedirects = aValue;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowSubframes(bool* aAllowSubframes) {
|
|
NS_ENSURE_ARG_POINTER(aAllowSubframes);
|
|
|
|
*aAllowSubframes = mAllowSubframes;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowSubframes(bool aAllowSubframes) {
|
|
mAllowSubframes = aAllowSubframes;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowImages(bool* aAllowImages) {
|
|
NS_ENSURE_ARG_POINTER(aAllowImages);
|
|
|
|
*aAllowImages = mAllowImages;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowImages(bool aAllowImages) {
|
|
mAllowImages = aAllowImages;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowMedia(bool* aAllowMedia) {
|
|
*aAllowMedia = mAllowMedia;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowMedia(bool aAllowMedia) {
|
|
mAllowMedia = aAllowMedia;
|
|
|
|
// Mute or unmute audio contexts attached to the inner window.
|
|
if (mScriptGlobal) {
|
|
if (nsPIDOMWindowInner* innerWin = mScriptGlobal->GetCurrentInnerWindow()) {
|
|
if (aAllowMedia) {
|
|
innerWin->UnmuteAudioContexts();
|
|
} else {
|
|
innerWin->MuteAudioContexts();
|
|
}
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowDNSPrefetch(bool* aAllowDNSPrefetch) {
|
|
*aAllowDNSPrefetch = mAllowDNSPrefetch;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowDNSPrefetch(bool aAllowDNSPrefetch) {
|
|
mAllowDNSPrefetch = aAllowDNSPrefetch;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowWindowControl(bool* aAllowWindowControl) {
|
|
*aAllowWindowControl = mAllowWindowControl;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowWindowControl(bool aAllowWindowControl) {
|
|
mAllowWindowControl = aAllowWindowControl;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowContentRetargeting(bool* aAllowContentRetargeting) {
|
|
*aAllowContentRetargeting = mBrowsingContext->GetAllowContentRetargeting();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowContentRetargeting(bool aAllowContentRetargeting) {
|
|
BrowsingContext::Transaction txn;
|
|
txn.SetAllowContentRetargeting(aAllowContentRetargeting);
|
|
txn.SetAllowContentRetargetingOnChildren(aAllowContentRetargeting);
|
|
return txn.Commit(mBrowsingContext);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowContentRetargetingOnChildren(
|
|
bool* aAllowContentRetargetingOnChildren) {
|
|
*aAllowContentRetargetingOnChildren =
|
|
mBrowsingContext->GetAllowContentRetargetingOnChildren();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowContentRetargetingOnChildren(
|
|
bool aAllowContentRetargetingOnChildren) {
|
|
return mBrowsingContext->SetAllowContentRetargetingOnChildren(
|
|
aAllowContentRetargetingOnChildren);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetMayEnableCharacterEncodingMenu(
|
|
bool* aMayEnableCharacterEncodingMenu) {
|
|
*aMayEnableCharacterEncodingMenu = false;
|
|
if (!mContentViewer) {
|
|
return NS_OK;
|
|
}
|
|
Document* doc = mContentViewer->GetDocument();
|
|
if (!doc) {
|
|
return NS_OK;
|
|
}
|
|
if (doc->WillIgnoreCharsetOverride()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
*aMayEnableCharacterEncodingMenu = true;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCharsetAutodetected(bool* aCharsetAutodetected) {
|
|
*aCharsetAutodetected = false;
|
|
if (!mContentViewer) {
|
|
return NS_OK;
|
|
}
|
|
Document* doc = mContentViewer->GetDocument();
|
|
if (!doc) {
|
|
return NS_OK;
|
|
}
|
|
int32_t source = doc->GetDocumentCharacterSetSource();
|
|
|
|
if ((source >= kCharsetFromInitialAutoDetectionASCII &&
|
|
source <= kCharsetFromFinalAutoDetectionFile) ||
|
|
source == kCharsetFromUserForcedJapaneseAutoDetection ||
|
|
source == kCharsetFromPendingUserForcedAutoDetection ||
|
|
source == kCharsetFromInitialUserForcedAutoDetection ||
|
|
source == kCharsetFromFinalUserForcedAutoDetection) {
|
|
*aCharsetAutodetected = true;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllDocShellsInSubtree(int32_t aItemType,
|
|
DocShellEnumeratorDirection aDirection,
|
|
nsTArray<RefPtr<nsIDocShell>>& aResult) {
|
|
aResult.Clear();
|
|
|
|
nsDocShellEnumerator docShellEnum(
|
|
(aDirection == ENUMERATE_FORWARDS)
|
|
? nsDocShellEnumerator::EnumerationDirection::Forwards
|
|
: nsDocShellEnumerator::EnumerationDirection::Backwards,
|
|
aItemType, *this);
|
|
|
|
nsresult rv = docShellEnum.BuildDocShellArray(aResult);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAppType(AppType* aAppType) {
|
|
*aAppType = mAppType;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAppType(AppType aAppType) {
|
|
mAppType = aAppType;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAllowAuth(bool* aAllowAuth) {
|
|
*aAllowAuth = mAllowAuth;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetAllowAuth(bool aAllowAuth) {
|
|
mAllowAuth = aAllowAuth;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetZoom(float* aZoom) {
|
|
NS_ENSURE_ARG_POINTER(aZoom);
|
|
*aZoom = 1.0f;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetZoom(float aZoom) { return NS_ERROR_NOT_IMPLEMENTED; }
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetBusyFlags(BusyFlags* aBusyFlags) {
|
|
NS_ENSURE_ARG_POINTER(aBusyFlags);
|
|
|
|
*aBusyFlags = mBusyFlags;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::TabToTreeOwner(bool aForward, bool aForDocumentNavigation,
|
|
bool* aTookFocus) {
|
|
NS_ENSURE_ARG_POINTER(aTookFocus);
|
|
|
|
nsCOMPtr<nsIWebBrowserChromeFocus> chromeFocus = do_GetInterface(mTreeOwner);
|
|
if (chromeFocus) {
|
|
if (aForward) {
|
|
*aTookFocus =
|
|
NS_SUCCEEDED(chromeFocus->FocusNextElement(aForDocumentNavigation));
|
|
} else {
|
|
*aTookFocus =
|
|
NS_SUCCEEDED(chromeFocus->FocusPrevElement(aForDocumentNavigation));
|
|
}
|
|
} else {
|
|
*aTookFocus = false;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetLoadURIDelegate(nsILoadURIDelegate** aLoadURIDelegate) {
|
|
nsCOMPtr<nsILoadURIDelegate> delegate = GetLoadURIDelegate();
|
|
delegate.forget(aLoadURIDelegate);
|
|
return NS_OK;
|
|
}
|
|
|
|
already_AddRefed<nsILoadURIDelegate> nsDocShell::GetLoadURIDelegate() {
|
|
if (nsCOMPtr<nsILoadURIDelegate> result =
|
|
do_QueryActor("LoadURIDelegate", GetDocument())) {
|
|
return result.forget();
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetUseErrorPages(bool* aUseErrorPages) {
|
|
*aUseErrorPages = mBrowsingContext->GetUseErrorPages();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetUseErrorPages(bool aUseErrorPages) {
|
|
return mBrowsingContext->SetUseErrorPages(aUseErrorPages);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetPreviousEntryIndex(int32_t* aPreviousEntryIndex) {
|
|
*aPreviousEntryIndex = mPreviousEntryIndex;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetLoadedEntryIndex(int32_t* aLoadedEntryIndex) {
|
|
*aLoadedEntryIndex = mLoadedEntryIndex;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::HistoryPurged(int32_t aNumEntries) {
|
|
// These indices are used for fastback cache eviction, to determine
|
|
// which session history entries are candidates for content viewer
|
|
// eviction. We need to adjust by the number of entries that we
|
|
// just purged from history, so that we look at the right session history
|
|
// entries during eviction.
|
|
mPreviousEntryIndex = std::max(-1, mPreviousEntryIndex - aNumEntries);
|
|
mLoadedEntryIndex = std::max(0, mLoadedEntryIndex - aNumEntries);
|
|
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> shell = do_QueryObject(child);
|
|
if (shell) {
|
|
shell->HistoryPurged(aNumEntries);
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::TriggerParentCheckDocShellIsEmpty() {
|
|
if (RefPtr<nsDocShell> parent = GetInProcessParentDocshell()) {
|
|
parent->DocLoaderIsEmpty(true);
|
|
}
|
|
if (GetBrowsingContext()->IsContentSubframe() &&
|
|
!GetBrowsingContext()->GetParent()->IsInProcess()) {
|
|
if (BrowserChild* browserChild = BrowserChild::GetFrom(this)) {
|
|
mozilla::Unused << browserChild->SendMaybeFireEmbedderLoadEvents(
|
|
EmbedderElementEventType::NoEvent);
|
|
}
|
|
}
|
|
}
|
|
|
|
nsresult nsDocShell::HistoryEntryRemoved(int32_t aIndex) {
|
|
// These indices are used for fastback cache eviction, to determine
|
|
// which session history entries are candidates for content viewer
|
|
// eviction. We need to adjust by the number of entries that we
|
|
// just purged from history, so that we look at the right session history
|
|
// entries during eviction.
|
|
if (aIndex == mPreviousEntryIndex) {
|
|
mPreviousEntryIndex = -1;
|
|
} else if (aIndex < mPreviousEntryIndex) {
|
|
--mPreviousEntryIndex;
|
|
}
|
|
if (mLoadedEntryIndex == aIndex) {
|
|
mLoadedEntryIndex = 0;
|
|
} else if (aIndex < mLoadedEntryIndex) {
|
|
--mLoadedEntryIndex;
|
|
}
|
|
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> shell = do_QueryObject(child);
|
|
if (shell) {
|
|
static_cast<nsDocShell*>(shell.get())->HistoryEntryRemoved(aIndex);
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetRecordProfileTimelineMarkers(bool aValue) {
|
|
bool currentValue = nsIDocShell::GetRecordProfileTimelineMarkers();
|
|
if (currentValue == aValue) {
|
|
return NS_OK;
|
|
}
|
|
|
|
RefPtr<TimelineConsumers> timelines = TimelineConsumers::Get();
|
|
if (!timelines) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (aValue) {
|
|
MOZ_ASSERT(!timelines->HasConsumer(this));
|
|
timelines->AddConsumer(this);
|
|
MOZ_ASSERT(timelines->HasConsumer(this));
|
|
UseEntryScriptProfiling();
|
|
} else {
|
|
MOZ_ASSERT(timelines->HasConsumer(this));
|
|
timelines->RemoveConsumer(this);
|
|
MOZ_ASSERT(!timelines->HasConsumer(this));
|
|
UnuseEntryScriptProfiling();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetRecordProfileTimelineMarkers(bool* aValue) {
|
|
*aValue = !!mObserved;
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::PopProfileTimelineMarkers(
|
|
JSContext* aCx, JS::MutableHandle<JS::Value> aOut) {
|
|
RefPtr<TimelineConsumers> timelines = TimelineConsumers::Get();
|
|
if (!timelines) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsTArray<dom::ProfileTimelineMarker> store;
|
|
SequenceRooter<dom::ProfileTimelineMarker> rooter(aCx, &store);
|
|
|
|
timelines->PopMarkers(this, aCx, store);
|
|
|
|
if (!ToJSValue(aCx, store, aOut)) {
|
|
JS_ClearPendingException(aCx);
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::Now(DOMHighResTimeStamp* aWhen) {
|
|
*aWhen = (TimeStamp::Now() - TimeStamp::ProcessCreation()).ToMilliseconds();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetWindowDraggingAllowed(bool aValue) {
|
|
RefPtr<nsDocShell> parent = GetInProcessParentDocshell();
|
|
if (!aValue && mItemType == typeChrome && !parent) {
|
|
// Window dragging is always allowed for top level
|
|
// chrome docshells.
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
mWindowDraggingAllowed = aValue;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetWindowDraggingAllowed(bool* aValue) {
|
|
// window dragging regions in CSS (-moz-window-drag:drag)
|
|
// can be slow. Default behavior is to only allow it for
|
|
// chrome top level windows.
|
|
RefPtr<nsDocShell> parent = GetInProcessParentDocshell();
|
|
if (mItemType == typeChrome && !parent) {
|
|
// Top level chrome window
|
|
*aValue = true;
|
|
} else {
|
|
*aValue = mWindowDraggingAllowed;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCurrentDocumentChannel(nsIChannel** aResult) {
|
|
NS_IF_ADDREF(*aResult = GetCurrentDocChannel());
|
|
return NS_OK;
|
|
}
|
|
|
|
nsIChannel* nsDocShell::GetCurrentDocChannel() {
|
|
if (mContentViewer) {
|
|
Document* doc = mContentViewer->GetDocument();
|
|
if (doc) {
|
|
return doc->GetChannel();
|
|
}
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::AddWeakScrollObserver(nsIScrollObserver* aObserver) {
|
|
nsWeakPtr weakObs = do_GetWeakReference(aObserver);
|
|
if (!weakObs) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
mScrollObservers.AppendElement(weakObs);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::RemoveWeakScrollObserver(nsIScrollObserver* aObserver) {
|
|
nsWeakPtr obs = do_GetWeakReference(aObserver);
|
|
return mScrollObservers.RemoveElement(obs) ? NS_OK : NS_ERROR_FAILURE;
|
|
}
|
|
|
|
void nsDocShell::NotifyAsyncPanZoomStarted() {
|
|
nsTObserverArray<nsWeakPtr>::ForwardIterator iter(mScrollObservers);
|
|
while (iter.HasMore()) {
|
|
nsWeakPtr ref = iter.GetNext();
|
|
nsCOMPtr<nsIScrollObserver> obs = do_QueryReferent(ref);
|
|
if (obs) {
|
|
obs->AsyncPanZoomStarted();
|
|
} else {
|
|
iter.Remove();
|
|
}
|
|
}
|
|
}
|
|
|
|
void nsDocShell::NotifyAsyncPanZoomStopped() {
|
|
nsTObserverArray<nsWeakPtr>::ForwardIterator iter(mScrollObservers);
|
|
while (iter.HasMore()) {
|
|
nsWeakPtr ref = iter.GetNext();
|
|
nsCOMPtr<nsIScrollObserver> obs = do_QueryReferent(ref);
|
|
if (obs) {
|
|
obs->AsyncPanZoomStopped();
|
|
} else {
|
|
iter.Remove();
|
|
}
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::NotifyScrollObservers() {
|
|
nsTObserverArray<nsWeakPtr>::ForwardIterator iter(mScrollObservers);
|
|
while (iter.HasMore()) {
|
|
nsWeakPtr ref = iter.GetNext();
|
|
nsCOMPtr<nsIScrollObserver> obs = do_QueryReferent(ref);
|
|
if (obs) {
|
|
obs->ScrollPositionChanged();
|
|
} else {
|
|
iter.Remove();
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsIDocShellTreeItem
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetName(nsAString& aName) {
|
|
aName = mBrowsingContext->Name();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetName(const nsAString& aName) {
|
|
return mBrowsingContext->SetName(aName);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::NameEquals(const nsAString& aName, bool* aResult) {
|
|
NS_ENSURE_ARG_POINTER(aResult);
|
|
*aResult = mBrowsingContext->NameEquals(aName);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCustomUserAgent(nsAString& aCustomUserAgent) {
|
|
mBrowsingContext->GetCustomUserAgent(aCustomUserAgent);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetCustomUserAgent(const nsAString& aCustomUserAgent) {
|
|
if (mWillChangeProcess) {
|
|
NS_WARNING("SetCustomUserAgent: Process is changing. Ignoring set");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
return mBrowsingContext->SetCustomUserAgent(aCustomUserAgent);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::ClearCachedPlatform() {
|
|
RefPtr<nsGlobalWindowInner> win =
|
|
mScriptGlobal ? mScriptGlobal->GetCurrentInnerWindowInternal() : nullptr;
|
|
if (win) {
|
|
Navigator* navigator = win->Navigator();
|
|
if (navigator) {
|
|
navigator->ClearPlatformCache();
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::ClearCachedUserAgent() {
|
|
RefPtr<nsGlobalWindowInner> win =
|
|
mScriptGlobal ? mScriptGlobal->GetCurrentInnerWindowInternal() : nullptr;
|
|
if (win) {
|
|
Navigator* navigator = win->Navigator();
|
|
if (navigator) {
|
|
navigator->ClearUserAgentCache();
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetMetaViewportOverride(
|
|
MetaViewportOverride* aMetaViewportOverride) {
|
|
NS_ENSURE_ARG_POINTER(aMetaViewportOverride);
|
|
|
|
*aMetaViewportOverride = mMetaViewportOverride;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetMetaViewportOverride(
|
|
MetaViewportOverride aMetaViewportOverride) {
|
|
// We don't have a way to verify this coming from Javascript, so this check is
|
|
// still needed.
|
|
if (!(aMetaViewportOverride == META_VIEWPORT_OVERRIDE_NONE ||
|
|
aMetaViewportOverride == META_VIEWPORT_OVERRIDE_ENABLED ||
|
|
aMetaViewportOverride == META_VIEWPORT_OVERRIDE_DISABLED)) {
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
|
|
mMetaViewportOverride = aMetaViewportOverride;
|
|
|
|
// Inform our presShell that it needs to re-check its need for a viewport
|
|
// override.
|
|
if (RefPtr<PresShell> presShell = GetPresShell()) {
|
|
presShell->MaybeRecreateMobileViewportManager(true);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
/* virtual */
|
|
int32_t nsDocShell::ItemType() { return mItemType; }
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetItemType(int32_t* aItemType) {
|
|
NS_ENSURE_ARG_POINTER(aItemType);
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(
|
|
(mBrowsingContext->IsContent() ? typeContent : typeChrome) == mItemType);
|
|
*aItemType = mItemType;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetInProcessParent(nsIDocShellTreeItem** aParent) {
|
|
if (!mParent) {
|
|
*aParent = nullptr;
|
|
} else {
|
|
CallQueryInterface(mParent, aParent);
|
|
}
|
|
// Note that in the case when the parent is not an nsIDocShellTreeItem we
|
|
// don't want to throw; we just want to return null.
|
|
return NS_OK;
|
|
}
|
|
|
|
// With Fission, related nsDocShell objects may exist in a different process. In
|
|
// that case, this method will return `nullptr`, despite a parent nsDocShell
|
|
// object existing.
|
|
//
|
|
// Prefer using `BrowsingContext::Parent()`, which will succeed even if the
|
|
// parent entry is not in the current process, and handle the case where the
|
|
// parent nsDocShell is inaccessible.
|
|
already_AddRefed<nsDocShell> nsDocShell::GetInProcessParentDocshell() {
|
|
nsCOMPtr<nsIDocShell> docshell = do_QueryInterface(GetAsSupports(mParent));
|
|
return docshell.forget().downcast<nsDocShell>();
|
|
}
|
|
|
|
void nsDocShell::MaybeCreateInitialClientSource(nsIPrincipal* aPrincipal) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
// If there is an existing document then there is no need to create
|
|
// a client for a future initial about:blank document.
|
|
if (mScriptGlobal && mScriptGlobal->GetCurrentInnerWindowInternal() &&
|
|
mScriptGlobal->GetCurrentInnerWindowInternal()->GetExtantDoc()) {
|
|
MOZ_DIAGNOSTIC_ASSERT(mScriptGlobal->GetCurrentInnerWindowInternal()
|
|
->GetClientInfo()
|
|
.isSome());
|
|
MOZ_DIAGNOSTIC_ASSERT(!mInitialClientSource);
|
|
return;
|
|
}
|
|
|
|
// Don't recreate the initial client source. We call this multiple times
|
|
// when DoChannelLoad() is called before CreateAboutBlankContentViewer.
|
|
if (mInitialClientSource) {
|
|
return;
|
|
}
|
|
|
|
// Don't pre-allocate the client when we are sandboxed. The inherited
|
|
// principal does not take sandboxing into account.
|
|
// TODO: Refactor sandboxing principal code out so we can use it here.
|
|
if (!aPrincipal && mBrowsingContext->GetSandboxFlags()) {
|
|
return;
|
|
}
|
|
|
|
nsIPrincipal* principal =
|
|
aPrincipal ? aPrincipal : GetInheritedPrincipal(false);
|
|
|
|
// Sometimes there is no principal available when we are called from
|
|
// CreateAboutBlankContentViewer. For example, sometimes the principal
|
|
// is only extracted from the load context after the document is created
|
|
// in Document::ResetToURI(). Ideally we would do something similar
|
|
// here, but for now lets just avoid the issue by not preallocating the
|
|
// client.
|
|
if (!principal) {
|
|
return;
|
|
}
|
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> win = GetWindow();
|
|
if (!win) {
|
|
return;
|
|
}
|
|
|
|
mInitialClientSource = ClientManager::CreateSource(
|
|
ClientType::Window, win->EventTargetFor(TaskCategory::Other), principal);
|
|
MOZ_DIAGNOSTIC_ASSERT(mInitialClientSource);
|
|
|
|
// Mark the initial client as execution ready, but owned by the docshell.
|
|
// If the client is actually used this will cause ClientSource to force
|
|
// the creation of the initial about:blank by calling
|
|
// nsDocShell::GetDocument().
|
|
mInitialClientSource->DocShellExecutionReady(this);
|
|
|
|
// Next, check to see if the parent is controlled.
|
|
nsCOMPtr<nsIDocShell> parent = GetInProcessParentDocshell();
|
|
nsPIDOMWindowOuter* parentOuter = parent ? parent->GetWindow() : nullptr;
|
|
nsPIDOMWindowInner* parentInner =
|
|
parentOuter ? parentOuter->GetCurrentInnerWindow() : nullptr;
|
|
if (!parentInner) {
|
|
return;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
MOZ_ALWAYS_SUCCEEDS(NS_NewURI(getter_AddRefs(uri), "about:blank"_ns));
|
|
|
|
// We're done if there is no parent controller or if this docshell
|
|
// is not permitted to control for some reason.
|
|
Maybe<ServiceWorkerDescriptor> controller(parentInner->GetController());
|
|
if (controller.isNothing() ||
|
|
!ServiceWorkerAllowedToControlWindow(principal, uri)) {
|
|
return;
|
|
}
|
|
|
|
mInitialClientSource->InheritController(controller.ref());
|
|
}
|
|
|
|
Maybe<ClientInfo> nsDocShell::GetInitialClientInfo() const {
|
|
if (mInitialClientSource) {
|
|
Maybe<ClientInfo> result;
|
|
result.emplace(mInitialClientSource->Info());
|
|
return result;
|
|
}
|
|
|
|
nsGlobalWindowInner* innerWindow =
|
|
mScriptGlobal ? mScriptGlobal->GetCurrentInnerWindowInternal() : nullptr;
|
|
Document* doc = innerWindow ? innerWindow->GetExtantDoc() : nullptr;
|
|
|
|
if (!doc || !doc->IsInitialDocument()) {
|
|
return Maybe<ClientInfo>();
|
|
}
|
|
|
|
return innerWindow->GetClientInfo();
|
|
}
|
|
|
|
void nsDocShell::RecomputeCanExecuteScripts() {
|
|
bool old = mCanExecuteScripts;
|
|
RefPtr<nsDocShell> parent = GetInProcessParentDocshell();
|
|
|
|
// If we have no tree owner, that means that we've been detached from the
|
|
// docshell tree (this is distinct from having no parent docshell, which
|
|
// is the case for root docshells). It would be nice to simply disallow
|
|
// script in detached docshells, but bug 986542 demonstrates that this
|
|
// behavior breaks at least one website.
|
|
//
|
|
// So instead, we use our previous value, unless mAllowJavascript has been
|
|
// explicitly set to false.
|
|
if (!mTreeOwner) {
|
|
mCanExecuteScripts = mCanExecuteScripts && mAllowJavascript;
|
|
// If scripting has been explicitly disabled on our docshell, we're done.
|
|
} else if (!mAllowJavascript) {
|
|
mCanExecuteScripts = false;
|
|
// If we have a parent, inherit.
|
|
} else if (parent) {
|
|
mCanExecuteScripts = parent->mCanExecuteScripts;
|
|
// Otherwise, we're the root of the tree, and we haven't explicitly disabled
|
|
// script. Allow.
|
|
} else {
|
|
mCanExecuteScripts = true;
|
|
}
|
|
|
|
// Inform our active DOM window.
|
|
//
|
|
// This will pass the outer, which will be in the scope of the active inner.
|
|
if (mScriptGlobal && mScriptGlobal->GetGlobalJSObject()) {
|
|
xpc::Scriptability& scriptability =
|
|
xpc::Scriptability::Get(mScriptGlobal->GetGlobalJSObject());
|
|
scriptability.SetDocShellAllowsScript(mCanExecuteScripts);
|
|
}
|
|
|
|
// If our value has changed, our children might be affected. Recompute their
|
|
// value as well.
|
|
if (old != mCanExecuteScripts) {
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
static_cast<nsDocShell*>(child)->RecomputeCanExecuteScripts();
|
|
}
|
|
}
|
|
}
|
|
|
|
nsresult nsDocShell::SetDocLoaderParent(nsDocLoader* aParent) {
|
|
bool wasFrame = IsFrame();
|
|
|
|
nsresult rv = nsDocLoader::SetDocLoaderParent(aParent);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
nsCOMPtr<nsISupportsPriority> priorityGroup = do_QueryInterface(mLoadGroup);
|
|
if (wasFrame != IsFrame() && priorityGroup) {
|
|
priorityGroup->AdjustPriority(wasFrame ? -1 : 1);
|
|
}
|
|
|
|
// Curse ambiguous nsISupports inheritance!
|
|
nsISupports* parent = GetAsSupports(aParent);
|
|
|
|
// If parent is another docshell, we inherit all their flags for
|
|
// allowing plugins, scripting etc.
|
|
bool value;
|
|
nsCOMPtr<nsIDocShell> parentAsDocShell(do_QueryInterface(parent));
|
|
|
|
if (parentAsDocShell) {
|
|
if (mAllowJavascript &&
|
|
NS_SUCCEEDED(parentAsDocShell->GetAllowJavascript(&value))) {
|
|
SetAllowJavascript(value);
|
|
}
|
|
if (mAllowMetaRedirects &&
|
|
NS_SUCCEEDED(parentAsDocShell->GetAllowMetaRedirects(&value))) {
|
|
SetAllowMetaRedirects(value);
|
|
}
|
|
if (mAllowSubframes &&
|
|
NS_SUCCEEDED(parentAsDocShell->GetAllowSubframes(&value))) {
|
|
SetAllowSubframes(value);
|
|
}
|
|
if (mAllowImages &&
|
|
NS_SUCCEEDED(parentAsDocShell->GetAllowImages(&value))) {
|
|
SetAllowImages(value);
|
|
}
|
|
SetAllowMedia(parentAsDocShell->GetAllowMedia() && mAllowMedia);
|
|
if (mAllowWindowControl &&
|
|
NS_SUCCEEDED(parentAsDocShell->GetAllowWindowControl(&value))) {
|
|
SetAllowWindowControl(value);
|
|
}
|
|
if (NS_FAILED(parentAsDocShell->GetAllowDNSPrefetch(&value))) {
|
|
value = false;
|
|
}
|
|
SetAllowDNSPrefetch(mAllowDNSPrefetch && value);
|
|
SetAffectPrivateSessionLifetime(
|
|
parentAsDocShell->GetAffectPrivateSessionLifetime());
|
|
|
|
// We don't need to inherit metaViewportOverride, because the viewport
|
|
// is only relevant for the outermost nsDocShell, not for any iframes
|
|
// like this that might be embedded within it.
|
|
}
|
|
|
|
nsCOMPtr<nsIURIContentListener> parentURIListener(do_GetInterface(parent));
|
|
if (parentURIListener) {
|
|
mContentListener->SetParentContentListener(parentURIListener);
|
|
}
|
|
|
|
// Our parent has changed. Recompute scriptability.
|
|
RecomputeCanExecuteScripts();
|
|
|
|
// Inform windows when they're being removed from their parent.
|
|
if (!aParent) {
|
|
MaybeClearStorageAccessFlag();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::MaybeClearStorageAccessFlag() {
|
|
if (mScriptGlobal) {
|
|
// Tell our window that the parent has now changed.
|
|
mScriptGlobal->ParentWindowChanged();
|
|
|
|
// Tell all of our children about the change recursively as well.
|
|
for (auto* childDocLoader : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> child = do_QueryObject(childDocLoader);
|
|
if (child) {
|
|
static_cast<nsDocShell*>(child.get())->MaybeClearStorageAccessFlag();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void nsDocShell::MaybeRestoreWindowName() {
|
|
if (!StaticPrefs::privacy_window_name_update_enabled()) {
|
|
return;
|
|
}
|
|
|
|
// We only restore window.name for the top-level content.
|
|
if (!mBrowsingContext->IsTopContent()) {
|
|
return;
|
|
}
|
|
|
|
nsAutoString name;
|
|
|
|
// Following implements https://html.spec.whatwg.org/#history-traversal:
|
|
// Step 4.4. Check if the loading entry has a name.
|
|
|
|
if (mLSHE) {
|
|
mLSHE->GetName(name);
|
|
}
|
|
|
|
if (mLoadingEntry) {
|
|
name = mLoadingEntry->mInfo.GetName();
|
|
}
|
|
|
|
if (name.IsEmpty()) {
|
|
return;
|
|
}
|
|
|
|
// Step 4.4.1. Set the name to the browsing context.
|
|
Unused << mBrowsingContext->SetName(name);
|
|
|
|
// Step 4.4.2. Clear the name of all entries that are contiguous and
|
|
// same-origin with the loading entry.
|
|
if (mLSHE) {
|
|
nsSHistory::WalkContiguousEntries(
|
|
mLSHE, [](nsISHEntry* aEntry) { aEntry->SetName(EmptyString()); });
|
|
}
|
|
|
|
if (mLoadingEntry) {
|
|
// Clear the name of the session entry in the child side. For parent side,
|
|
// the clearing will be done when we commit the history to the parent.
|
|
mLoadingEntry->mInfo.SetName(EmptyString());
|
|
}
|
|
}
|
|
|
|
void nsDocShell::StoreWindowNameToSHEntries() {
|
|
MOZ_ASSERT(mBrowsingContext->IsTopContent());
|
|
|
|
nsAutoString name;
|
|
mBrowsingContext->GetName(name);
|
|
|
|
if (mOSHE) {
|
|
nsSHistory::WalkContiguousEntries(
|
|
mOSHE, [&](nsISHEntry* aEntry) { aEntry->SetName(name); });
|
|
}
|
|
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
if (XRE_IsParentProcess()) {
|
|
SessionHistoryEntry* entry =
|
|
mBrowsingContext->Canonical()->GetActiveSessionHistoryEntry();
|
|
if (entry) {
|
|
nsSHistory::WalkContiguousEntries(
|
|
entry, [&](nsISHEntry* aEntry) { aEntry->SetName(name); });
|
|
}
|
|
} else {
|
|
// Ask parent process to store the name in entries.
|
|
mozilla::Unused
|
|
<< ContentChild::GetSingleton()
|
|
->SendSessionHistoryEntryStoreWindowNameInContiguousEntries(
|
|
mBrowsingContext, name);
|
|
}
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetInProcessSameTypeParent(nsIDocShellTreeItem** aParent) {
|
|
if (BrowsingContext* parentBC = mBrowsingContext->GetParent()) {
|
|
*aParent = do_AddRef(parentBC->GetDocShell()).take();
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetSameTypeInProcessParentIgnoreBrowserBoundaries(
|
|
nsIDocShell** aParent) {
|
|
NS_ENSURE_ARG_POINTER(aParent);
|
|
*aParent = nullptr;
|
|
|
|
nsCOMPtr<nsIDocShellTreeItem> parent =
|
|
do_QueryInterface(GetAsSupports(mParent));
|
|
if (!parent) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (parent->ItemType() == mItemType) {
|
|
nsCOMPtr<nsIDocShell> parentDS = do_QueryInterface(parent);
|
|
parentDS.forget(aParent);
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetInProcessRootTreeItem(nsIDocShellTreeItem** aRootTreeItem) {
|
|
NS_ENSURE_ARG_POINTER(aRootTreeItem);
|
|
|
|
RefPtr<nsDocShell> root = this;
|
|
RefPtr<nsDocShell> parent = root->GetInProcessParentDocshell();
|
|
while (parent) {
|
|
root = parent;
|
|
parent = root->GetInProcessParentDocshell();
|
|
}
|
|
|
|
root.forget(aRootTreeItem);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetInProcessSameTypeRootTreeItem(
|
|
nsIDocShellTreeItem** aRootTreeItem) {
|
|
NS_ENSURE_ARG_POINTER(aRootTreeItem);
|
|
*aRootTreeItem = static_cast<nsIDocShellTreeItem*>(this);
|
|
|
|
nsCOMPtr<nsIDocShellTreeItem> parent;
|
|
NS_ENSURE_SUCCESS(GetInProcessSameTypeParent(getter_AddRefs(parent)),
|
|
NS_ERROR_FAILURE);
|
|
while (parent) {
|
|
*aRootTreeItem = parent;
|
|
NS_ENSURE_SUCCESS(
|
|
(*aRootTreeItem)->GetInProcessSameTypeParent(getter_AddRefs(parent)),
|
|
NS_ERROR_FAILURE);
|
|
}
|
|
NS_ADDREF(*aRootTreeItem);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetTreeOwner(nsIDocShellTreeOwner** aTreeOwner) {
|
|
NS_ENSURE_ARG_POINTER(aTreeOwner);
|
|
|
|
*aTreeOwner = mTreeOwner;
|
|
NS_IF_ADDREF(*aTreeOwner);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetTreeOwner(nsIDocShellTreeOwner* aTreeOwner) {
|
|
if (mIsBeingDestroyed && aTreeOwner) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// Don't automatically set the progress based on the tree owner for frames
|
|
if (!IsFrame()) {
|
|
nsCOMPtr<nsIWebProgress> webProgress =
|
|
do_QueryInterface(GetAsSupports(this));
|
|
|
|
if (webProgress) {
|
|
nsCOMPtr<nsIWebProgressListener> oldListener =
|
|
do_QueryInterface(mTreeOwner);
|
|
nsCOMPtr<nsIWebProgressListener> newListener =
|
|
do_QueryInterface(aTreeOwner);
|
|
|
|
if (oldListener) {
|
|
webProgress->RemoveProgressListener(oldListener);
|
|
}
|
|
|
|
if (newListener) {
|
|
webProgress->AddProgressListener(newListener,
|
|
nsIWebProgress::NOTIFY_ALL);
|
|
}
|
|
}
|
|
}
|
|
|
|
mTreeOwner = aTreeOwner; // Weak reference per API
|
|
|
|
for (auto* childDocLoader : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShellTreeItem> child = do_QueryObject(childDocLoader);
|
|
NS_ENSURE_TRUE(child, NS_ERROR_FAILURE);
|
|
|
|
if (child->ItemType() == mItemType) {
|
|
child->SetTreeOwner(aTreeOwner);
|
|
}
|
|
}
|
|
|
|
// If we're in the content process and have had a TreeOwner set on us, extract
|
|
// our BrowserChild actor. If we've already had our BrowserChild set, assert
|
|
// that it hasn't changed.
|
|
if (mTreeOwner && XRE_IsContentProcess()) {
|
|
nsCOMPtr<nsIBrowserChild> newBrowserChild = do_GetInterface(mTreeOwner);
|
|
MOZ_ASSERT(newBrowserChild,
|
|
"No BrowserChild actor for tree owner in Content!");
|
|
|
|
if (mBrowserChild) {
|
|
nsCOMPtr<nsIBrowserChild> oldBrowserChild =
|
|
do_QueryReferent(mBrowserChild);
|
|
MOZ_RELEASE_ASSERT(
|
|
oldBrowserChild == newBrowserChild,
|
|
"Cannot change BrowserChild during nsDocShell lifetime!");
|
|
} else {
|
|
mBrowserChild = do_GetWeakReference(newBrowserChild);
|
|
}
|
|
}
|
|
|
|
// Our tree owner has changed. Recompute scriptability.
|
|
//
|
|
// Note that this is near-redundant with the recomputation in
|
|
// SetDocLoaderParent(), but not so for the root DocShell, where the call to
|
|
// SetTreeOwner() happens after the initial AddDocLoaderAsChildOfRoot(),
|
|
// and we never set another parent. Given that this is neither expensive nor
|
|
// performance-critical, let's be safe and unconditionally recompute this
|
|
// state whenever dependent state changes.
|
|
RecomputeCanExecuteScripts();
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetChildOffset(int32_t aChildOffset) {
|
|
mChildOffset = aChildOffset;
|
|
}
|
|
|
|
int32_t nsDocShell::GetChildOffset() { return mChildOffset; }
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetHistoryID(nsID& aID) {
|
|
aID = mBrowsingContext->GetHistoryID();
|
|
return NS_OK;
|
|
}
|
|
|
|
const nsID& nsDocShell::HistoryID() { return mBrowsingContext->GetHistoryID(); }
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetIsInUnload(bool* aIsInUnload) {
|
|
*aIsInUnload = mFiredUnloadEvent;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetInProcessChildCount(int32_t* aChildCount) {
|
|
NS_ENSURE_ARG_POINTER(aChildCount);
|
|
*aChildCount = mChildList.Length();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::AddChild(nsIDocShellTreeItem* aChild) {
|
|
NS_ENSURE_ARG_POINTER(aChild);
|
|
|
|
RefPtr<nsDocLoader> childAsDocLoader = GetAsDocLoader(aChild);
|
|
NS_ENSURE_TRUE(childAsDocLoader, NS_ERROR_UNEXPECTED);
|
|
|
|
// Make sure we're not creating a loop in the docshell tree
|
|
nsDocLoader* ancestor = this;
|
|
do {
|
|
if (childAsDocLoader == ancestor) {
|
|
return NS_ERROR_ILLEGAL_VALUE;
|
|
}
|
|
ancestor = ancestor->GetParent();
|
|
} while (ancestor);
|
|
|
|
// Make sure to remove the child from its current parent.
|
|
nsDocLoader* childsParent = childAsDocLoader->GetParent();
|
|
if (childsParent) {
|
|
nsresult rv = childsParent->RemoveChildLoader(childAsDocLoader);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
|
|
// Make sure to clear the treeowner in case this child is a different type
|
|
// from us.
|
|
aChild->SetTreeOwner(nullptr);
|
|
|
|
nsresult res = AddChildLoader(childAsDocLoader);
|
|
NS_ENSURE_SUCCESS(res, res);
|
|
NS_ASSERTION(!mChildList.IsEmpty(),
|
|
"child list must not be empty after a successful add");
|
|
|
|
nsCOMPtr<nsIDocShell> childDocShell = do_QueryInterface(aChild);
|
|
bool dynamic = nsDocShell::Cast(childDocShell)->GetCreatedDynamically();
|
|
if (!dynamic) {
|
|
nsCOMPtr<nsISHEntry> currentSH;
|
|
bool oshe = false;
|
|
GetCurrentSHEntry(getter_AddRefs(currentSH), &oshe);
|
|
if (currentSH) {
|
|
currentSH->HasDynamicallyAddedChild(&dynamic);
|
|
}
|
|
}
|
|
childDocShell->SetChildOffset(dynamic ? -1 : mChildList.Length() - 1);
|
|
|
|
/* Set the child's global history if the parent has one */
|
|
if (mBrowsingContext->GetUseGlobalHistory()) {
|
|
// childDocShell->SetUseGlobalHistory(true);
|
|
// this should be set through BC inherit
|
|
MOZ_ASSERT(nsDocShell::Cast(childDocShell)
|
|
->mBrowsingContext->GetUseGlobalHistory());
|
|
}
|
|
|
|
if (aChild->ItemType() != mItemType) {
|
|
return NS_OK;
|
|
}
|
|
|
|
aChild->SetTreeOwner(mTreeOwner);
|
|
|
|
nsCOMPtr<nsIDocShell> childAsDocShell(do_QueryInterface(aChild));
|
|
if (!childAsDocShell) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// charset, style-disabling, and zoom will be inherited in SetupNewViewer()
|
|
|
|
// Now take this document's charset and set the child's parentCharset field
|
|
// to it. We'll later use that field, in the loading process, for the
|
|
// charset choosing algorithm.
|
|
// If we fail, at any point, we just return NS_OK.
|
|
// This code has some performance impact. But this will be reduced when
|
|
// the current charset will finally be stored as an Atom, avoiding the
|
|
// alias resolution extra look-up.
|
|
|
|
// we are NOT going to propagate the charset is this Chrome's docshell
|
|
if (mItemType == nsIDocShellTreeItem::typeChrome) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// get the parent's current charset
|
|
if (!mContentViewer) {
|
|
return NS_OK;
|
|
}
|
|
Document* doc = mContentViewer->GetDocument();
|
|
if (!doc) {
|
|
return NS_OK;
|
|
}
|
|
|
|
const Encoding* parentCS = doc->GetDocumentCharacterSet();
|
|
int32_t charsetSource = doc->GetDocumentCharacterSetSource();
|
|
// set the child's parentCharset
|
|
childAsDocShell->SetParentCharset(parentCS, charsetSource,
|
|
doc->NodePrincipal());
|
|
|
|
// printf("### 1 >>> Adding child. Parent CS = %s. ItemType = %d.\n",
|
|
// NS_LossyConvertUTF16toASCII(parentCS).get(), mItemType);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::RemoveChild(nsIDocShellTreeItem* aChild) {
|
|
NS_ENSURE_ARG_POINTER(aChild);
|
|
|
|
RefPtr<nsDocLoader> childAsDocLoader = GetAsDocLoader(aChild);
|
|
NS_ENSURE_TRUE(childAsDocLoader, NS_ERROR_UNEXPECTED);
|
|
|
|
nsresult rv = RemoveChildLoader(childAsDocLoader);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
aChild->SetTreeOwner(nullptr);
|
|
|
|
return nsDocLoader::AddDocLoaderAsChildOfRoot(childAsDocLoader);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetInProcessChildAt(int32_t aIndex, nsIDocShellTreeItem** aChild) {
|
|
NS_ENSURE_ARG_POINTER(aChild);
|
|
|
|
RefPtr<nsDocShell> child = GetInProcessChildAt(aIndex);
|
|
NS_ENSURE_TRUE(child, NS_ERROR_UNEXPECTED);
|
|
|
|
child.forget(aChild);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsDocShell* nsDocShell::GetInProcessChildAt(int32_t aIndex) {
|
|
#ifdef DEBUG
|
|
if (aIndex < 0) {
|
|
NS_WARNING("Negative index passed to GetChildAt");
|
|
} else if (static_cast<uint32_t>(aIndex) >= mChildList.Length()) {
|
|
NS_WARNING("Too large an index passed to GetChildAt");
|
|
}
|
|
#endif
|
|
|
|
nsIDocumentLoader* child = ChildAt(aIndex);
|
|
|
|
// child may be nullptr here.
|
|
return static_cast<nsDocShell*>(child);
|
|
}
|
|
|
|
nsresult nsDocShell::AddChildSHEntry(nsISHEntry* aCloneRef,
|
|
nsISHEntry* aNewEntry,
|
|
int32_t aChildOffset, uint32_t aLoadType,
|
|
bool aCloneChildren) {
|
|
MOZ_ASSERT(!mozilla::SessionHistoryInParent());
|
|
nsresult rv = NS_OK;
|
|
|
|
if (mLSHE && aLoadType != LOAD_PUSHSTATE) {
|
|
/* You get here if you are currently building a
|
|
* hierarchy ie.,you just visited a frameset page
|
|
*/
|
|
if (NS_FAILED(mLSHE->ReplaceChild(aNewEntry))) {
|
|
rv = mLSHE->AddChild(aNewEntry, aChildOffset);
|
|
}
|
|
} else if (!aCloneRef) {
|
|
/* This is an initial load in some subframe. Just append it if we can */
|
|
if (mOSHE) {
|
|
rv = mOSHE->AddChild(aNewEntry, aChildOffset, UseRemoteSubframes());
|
|
}
|
|
} else {
|
|
RefPtr<ChildSHistory> shistory = GetRootSessionHistory();
|
|
if (shistory) {
|
|
rv = shistory->LegacySHistory()->AddChildSHEntryHelper(
|
|
aCloneRef, aNewEntry, mBrowsingContext->Top(), aCloneChildren);
|
|
}
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
nsresult nsDocShell::AddChildSHEntryToParent(nsISHEntry* aNewEntry,
|
|
int32_t aChildOffset,
|
|
bool aCloneChildren) {
|
|
MOZ_ASSERT(!mozilla::SessionHistoryInParent());
|
|
/* You will get here when you are in a subframe and
|
|
* a new url has been loaded on you.
|
|
* The mOSHE in this subframe will be the previous url's
|
|
* mOSHE. This mOSHE will be used as the identification
|
|
* for this subframe in the CloneAndReplace function.
|
|
*/
|
|
|
|
// In this case, we will end up calling AddEntry, which increases the
|
|
// current index by 1
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (rootSH) {
|
|
mPreviousEntryIndex = rootSH->Index();
|
|
}
|
|
|
|
nsresult rv;
|
|
// XXX(farre): this is not Fission safe, expect errors. This never
|
|
// get's executed once session history in the parent is enabled.
|
|
nsCOMPtr<nsIDocShell> parent = do_QueryInterface(GetAsSupports(mParent), &rv);
|
|
NS_WARNING_ASSERTION(
|
|
parent || !UseRemoteSubframes(),
|
|
"Failed to add child session history entry! This will be resolved once "
|
|
"session history in the parent is enabled.");
|
|
if (parent) {
|
|
rv = nsDocShell::Cast(parent)->AddChildSHEntry(
|
|
mOSHE, aNewEntry, aChildOffset, mLoadType, aCloneChildren);
|
|
}
|
|
|
|
if (rootSH) {
|
|
mLoadedEntryIndex = rootSH->Index();
|
|
|
|
if (MOZ_UNLIKELY(MOZ_LOG_TEST(gPageCacheLog, LogLevel::Verbose))) {
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Verbose,
|
|
("Previous index: %d, Loaded index: %d", mPreviousEntryIndex,
|
|
mLoadedEntryIndex));
|
|
}
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCurrentSHEntry(nsISHEntry** aEntry, bool* aOSHE) {
|
|
*aOSHE = false;
|
|
*aEntry = nullptr;
|
|
if (mLSHE) {
|
|
NS_ADDREF(*aEntry = mLSHE);
|
|
} else if (mOSHE) {
|
|
NS_ADDREF(*aEntry = mOSHE);
|
|
*aOSHE = true;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP nsDocShell::SynchronizeLayoutHistoryState() {
|
|
if (mActiveEntry && mActiveEntry->GetLayoutHistoryState() &&
|
|
mBrowsingContext) {
|
|
if (XRE_IsContentProcess()) {
|
|
dom::ContentChild* contentChild = dom::ContentChild::GetSingleton();
|
|
if (contentChild) {
|
|
contentChild->SendSynchronizeLayoutHistoryState(
|
|
mBrowsingContext, mActiveEntry->GetLayoutHistoryState());
|
|
}
|
|
} else {
|
|
SessionHistoryEntry* entry =
|
|
mBrowsingContext->Canonical()->GetActiveSessionHistoryEntry();
|
|
if (entry) {
|
|
entry->SetLayoutHistoryState(mActiveEntry->GetLayoutHistoryState());
|
|
}
|
|
}
|
|
if (mLoadingEntry &&
|
|
mLoadingEntry->mInfo.SharedId() == mActiveEntry->SharedId()) {
|
|
mLoadingEntry->mInfo.SetLayoutHistoryState(
|
|
mActiveEntry->GetLayoutHistoryState());
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetLoadGroupDefaultLoadFlags(nsLoadFlags aLoadFlags) {
|
|
if (mLoadGroup) {
|
|
mLoadGroup->SetDefaultLoadFlags(aLoadFlags);
|
|
} else {
|
|
NS_WARNING(
|
|
"nsDocShell::SetLoadGroupDefaultLoadFlags has no loadGroup to "
|
|
"propagate the mode to");
|
|
}
|
|
}
|
|
|
|
nsIScriptGlobalObject* nsDocShell::GetScriptGlobalObject() {
|
|
NS_ENSURE_SUCCESS(EnsureScriptEnvironment(), nullptr);
|
|
return mScriptGlobal;
|
|
}
|
|
|
|
Document* nsDocShell::GetDocument() {
|
|
NS_ENSURE_SUCCESS(EnsureContentViewer(), nullptr);
|
|
return mContentViewer->GetDocument();
|
|
}
|
|
|
|
Document* nsDocShell::GetExtantDocument() {
|
|
return mContentViewer ? mContentViewer->GetDocument() : nullptr;
|
|
}
|
|
|
|
nsPIDOMWindowOuter* nsDocShell::GetWindow() {
|
|
if (NS_FAILED(EnsureScriptEnvironment())) {
|
|
return nullptr;
|
|
}
|
|
return mScriptGlobal;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetDomWindow(mozIDOMWindowProxy** aWindow) {
|
|
NS_ENSURE_ARG_POINTER(aWindow);
|
|
|
|
nsresult rv = EnsureScriptEnvironment();
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
RefPtr<nsGlobalWindowOuter> window = mScriptGlobal;
|
|
window.forget(aWindow);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetMessageManager(ContentFrameMessageManager** aMessageManager) {
|
|
RefPtr<ContentFrameMessageManager> mm;
|
|
if (RefPtr<BrowserChild> browserChild = BrowserChild::GetFrom(this)) {
|
|
mm = browserChild->GetMessageManager();
|
|
} else if (nsPIDOMWindowOuter* win = GetWindow()) {
|
|
mm = win->GetMessageManager();
|
|
}
|
|
mm.forget(aMessageManager);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetIsNavigating(bool* aOut) {
|
|
*aOut = mIsNavigating;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetDeviceSizeIsPageSize(bool aValue) {
|
|
if (mDeviceSizeIsPageSize != aValue) {
|
|
mDeviceSizeIsPageSize = aValue;
|
|
RefPtr<nsPresContext> presContext = GetPresContext();
|
|
if (presContext) {
|
|
presContext->MediaFeatureValuesChanged(
|
|
{MediaFeatureChangeReason::DeviceSizeIsPageSizeChange},
|
|
MediaFeatureChangePropagation::JustThisDocument);
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetDeviceSizeIsPageSize(bool* aValue) {
|
|
*aValue = mDeviceSizeIsPageSize;
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::ClearFrameHistory(nsISHEntry* aEntry) {
|
|
MOZ_ASSERT(!mozilla::SessionHistoryInParent());
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (!rootSH || !aEntry) {
|
|
return;
|
|
}
|
|
|
|
rootSH->LegacySHistory()->RemoveFrameEntries(aEntry);
|
|
}
|
|
|
|
//-------------------------------------
|
|
//-- Helper Method for Print discovery
|
|
//-------------------------------------
|
|
bool nsDocShell::NavigationBlockedByPrinting(bool aDisplayErrorDialog) {
|
|
if (!mBrowsingContext->Top()->GetIsPrinting()) {
|
|
return false;
|
|
}
|
|
if (aDisplayErrorDialog) {
|
|
DisplayLoadError(NS_ERROR_DOCUMENT_IS_PRINTMODE, nullptr, nullptr, nullptr);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool nsDocShell::IsNavigationAllowed(bool aDisplayPrintErrorDialog,
|
|
bool aCheckIfUnloadFired) {
|
|
bool isAllowed = !NavigationBlockedByPrinting(aDisplayPrintErrorDialog) &&
|
|
(!aCheckIfUnloadFired || !mFiredUnloadEvent);
|
|
if (!isAllowed) {
|
|
return false;
|
|
}
|
|
if (!mContentViewer) {
|
|
return true;
|
|
}
|
|
bool firingBeforeUnload;
|
|
mContentViewer->GetBeforeUnloadFiring(&firingBeforeUnload);
|
|
return !firingBeforeUnload;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsIWebNavigation
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCanGoBack(bool* aCanGoBack) {
|
|
*aCanGoBack = false;
|
|
if (!IsNavigationAllowed(false)) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (rootSH) {
|
|
*aCanGoBack = rootSH->CanGo(-1);
|
|
MOZ_LOG(gSHLog, LogLevel::Verbose,
|
|
("nsDocShell %p CanGoBack()->%d", this, *aCanGoBack));
|
|
|
|
return NS_OK;
|
|
}
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCanGoForward(bool* aCanGoForward) {
|
|
*aCanGoForward = false;
|
|
if (!IsNavigationAllowed(false)) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (rootSH) {
|
|
*aCanGoForward = rootSH->CanGo(1);
|
|
MOZ_LOG(gSHLog, LogLevel::Verbose,
|
|
("nsDocShell %p CanGoForward()->%d", this, *aCanGoForward));
|
|
return NS_OK;
|
|
}
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GoBack(bool aRequireUserInteraction) {
|
|
if (!IsNavigationAllowed()) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
|
|
auto cleanupIsNavigating = MakeScopeExit([&]() { mIsNavigating = false; });
|
|
mIsNavigating = true;
|
|
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
NS_ENSURE_TRUE(rootSH, NS_ERROR_FAILURE);
|
|
ErrorResult rv;
|
|
rootSH->Go(-1, aRequireUserInteraction, rv);
|
|
return rv.StealNSResult();
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GoForward(bool aRequireUserInteraction) {
|
|
if (!IsNavigationAllowed()) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
|
|
auto cleanupIsNavigating = MakeScopeExit([&]() { mIsNavigating = false; });
|
|
mIsNavigating = true;
|
|
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
NS_ENSURE_TRUE(rootSH, NS_ERROR_FAILURE);
|
|
ErrorResult rv;
|
|
rootSH->Go(1, aRequireUserInteraction, rv);
|
|
return rv.StealNSResult();
|
|
}
|
|
|
|
// XXX(nika): We may want to stop exposing this API in the child process? Going
|
|
// to a specific index from multiple different processes could definitely race.
|
|
NS_IMETHODIMP
|
|
nsDocShell::GotoIndex(int32_t aIndex) {
|
|
if (!IsNavigationAllowed()) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
|
|
auto cleanupIsNavigating = MakeScopeExit([&]() { mIsNavigating = false; });
|
|
mIsNavigating = true;
|
|
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
NS_ENSURE_TRUE(rootSH, NS_ERROR_FAILURE);
|
|
|
|
ErrorResult rv;
|
|
rootSH->GotoIndex(aIndex, aIndex - rootSH->Index(), false, rv);
|
|
return rv.StealNSResult();
|
|
}
|
|
|
|
nsresult nsDocShell::LoadURI(const nsAString& aURI,
|
|
const LoadURIOptions& aLoadURIOptions) {
|
|
if (!IsNavigationAllowed()) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
|
|
RefPtr<nsDocShellLoadState> loadState;
|
|
nsresult rv = nsDocShellLoadState::CreateFromLoadURIOptions(
|
|
mBrowsingContext, aURI, aLoadURIOptions, getter_AddRefs(loadState));
|
|
|
|
uint32_t loadFlags = aLoadURIOptions.mLoadFlags;
|
|
if (NS_ERROR_MALFORMED_URI == rv) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("Creating an active entry on nsDocShell %p to %s (because "
|
|
"we're showing an error page)",
|
|
this, NS_ConvertUTF16toUTF8(aURI).get()));
|
|
|
|
// We need to store a session history entry. We don't have a valid URI, so
|
|
// we use about:blank instead.
|
|
nsCOMPtr<nsIURI> uri;
|
|
MOZ_ALWAYS_SUCCEEDS(NS_NewURI(getter_AddRefs(uri), "about:blank"_ns));
|
|
nsCOMPtr<nsIPrincipal> triggeringPrincipal;
|
|
if (aLoadURIOptions.mTriggeringPrincipal) {
|
|
triggeringPrincipal = aLoadURIOptions.mTriggeringPrincipal;
|
|
} else {
|
|
triggeringPrincipal = nsContentUtils::GetSystemPrincipal();
|
|
}
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
mActiveEntry = MakeUnique<SessionHistoryInfo>(
|
|
uri, triggeringPrincipal, nullptr, nullptr, nullptr,
|
|
nsLiteralCString("text/html"));
|
|
mBrowsingContext->SetActiveSessionHistoryEntry(
|
|
Nothing(), mActiveEntry.get(), MAKE_LOAD_TYPE(LOAD_NORMAL, loadFlags),
|
|
/* aUpdatedCacheKey = */ 0);
|
|
}
|
|
if (DisplayLoadError(rv, nullptr, PromiseFlatString(aURI).get(), nullptr) &&
|
|
(loadFlags & LOAD_FLAGS_ERROR_LOAD_CHANGES_RV) != 0) {
|
|
return NS_ERROR_LOAD_SHOWED_ERRORPAGE;
|
|
}
|
|
}
|
|
|
|
if (NS_FAILED(rv) || !loadState) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
return LoadURI(loadState, true);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::LoadURIFromScript(const nsAString& aURI,
|
|
JS::Handle<JS::Value> aLoadURIOptions,
|
|
JSContext* aCx) {
|
|
// generate dictionary for aLoadURIOptions and forward call
|
|
LoadURIOptions loadURIOptions;
|
|
if (!loadURIOptions.Init(aCx, aLoadURIOptions)) {
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
return LoadURI(aURI, loadURIOptions);
|
|
}
|
|
|
|
void nsDocShell::UnblockEmbedderLoadEventForFailure(bool aFireFrameErrorEvent) {
|
|
// If we're not in a content frame, or are at a BrowsingContext tree boundary,
|
|
// such as the content-chrome boundary, don't fire the error event.
|
|
if (mBrowsingContext->IsTopContent() || mBrowsingContext->IsChrome()) {
|
|
return;
|
|
}
|
|
|
|
// If embedder is same-process, then unblocking the load event is already
|
|
// handled by nsDocLoader. Fire the error event on our embedder element if
|
|
// requested.
|
|
//
|
|
// XXX: Bug 1440212 is looking into potentially changing this behaviour to act
|
|
// more like the remote case when in-process.
|
|
RefPtr<Element> element = mBrowsingContext->GetEmbedderElement();
|
|
if (element) {
|
|
if (aFireFrameErrorEvent) {
|
|
if (RefPtr<nsFrameLoaderOwner> flo = do_QueryObject(element)) {
|
|
if (RefPtr<nsFrameLoader> fl = flo->GetFrameLoader()) {
|
|
fl->FireErrorEvent();
|
|
}
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
|
|
// If we have a cross-process parent document, we must notify it that we no
|
|
// longer block its load event. This is necessary for OOP sub-documents
|
|
// because error documents do not result in a call to
|
|
// SendMaybeFireEmbedderLoadEvents via any of the normal call paths.
|
|
// (Obviously, we must do this before any of the returns below.)
|
|
RefPtr<BrowserChild> browserChild = BrowserChild::GetFrom(this);
|
|
if (browserChild) {
|
|
mozilla::Unused << browserChild->SendMaybeFireEmbedderLoadEvents(
|
|
aFireFrameErrorEvent ? EmbedderElementEventType::ErrorEvent
|
|
: EmbedderElementEventType::NoEvent);
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::DisplayLoadError(nsresult aError, nsIURI* aURI,
|
|
const char16_t* aURL, nsIChannel* aFailedChannel,
|
|
bool* aDisplayedErrorPage) {
|
|
MOZ_LOG(gDocShellLeakLog, LogLevel::Debug,
|
|
("DOCSHELL %p DisplayLoadError %s\n", this,
|
|
aURI ? aURI->GetSpecOrDefault().get() : ""));
|
|
|
|
*aDisplayedErrorPage = false;
|
|
// Get prompt and string bundle services
|
|
nsCOMPtr<nsIPrompt> prompter;
|
|
nsCOMPtr<nsIStringBundle> stringBundle;
|
|
GetPromptAndStringBundle(getter_AddRefs(prompter),
|
|
getter_AddRefs(stringBundle));
|
|
|
|
NS_ENSURE_TRUE(stringBundle, NS_ERROR_FAILURE);
|
|
NS_ENSURE_TRUE(prompter, NS_ERROR_FAILURE);
|
|
|
|
const char* error = nullptr;
|
|
// The key used to select the appropriate error message from the properties
|
|
// file.
|
|
const char* errorDescriptionID = nullptr;
|
|
AutoTArray<nsString, 3> formatStrs;
|
|
bool addHostPort = false;
|
|
nsresult rv = NS_OK;
|
|
nsAutoString messageStr;
|
|
nsAutoCString cssClass;
|
|
nsAutoCString errorPage;
|
|
|
|
errorPage.AssignLiteral("neterror");
|
|
|
|
// Turn the error code into a human readable error message.
|
|
if (NS_ERROR_UNKNOWN_PROTOCOL == aError) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
|
|
// Extract the schemes into a comma delimited list.
|
|
nsAutoCString scheme;
|
|
aURI->GetScheme(scheme);
|
|
CopyASCIItoUTF16(scheme, *formatStrs.AppendElement());
|
|
nsCOMPtr<nsINestedURI> nestedURI = do_QueryInterface(aURI);
|
|
while (nestedURI) {
|
|
nsCOMPtr<nsIURI> tempURI;
|
|
nsresult rv2;
|
|
rv2 = nestedURI->GetInnerURI(getter_AddRefs(tempURI));
|
|
if (NS_SUCCEEDED(rv2) && tempURI) {
|
|
tempURI->GetScheme(scheme);
|
|
formatStrs[0].AppendLiteral(", ");
|
|
AppendASCIItoUTF16(scheme, formatStrs[0]);
|
|
}
|
|
nestedURI = do_QueryInterface(tempURI);
|
|
}
|
|
error = "unknownProtocolFound";
|
|
} else if (NS_ERROR_FILE_NOT_FOUND == aError) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
error = "fileNotFound";
|
|
} else if (NS_ERROR_FILE_ACCESS_DENIED == aError) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
error = "fileAccessDenied";
|
|
} else if (NS_ERROR_UNKNOWN_HOST == aError) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
// Get the host
|
|
nsAutoCString host;
|
|
nsCOMPtr<nsIURI> innermostURI = NS_GetInnermostURI(aURI);
|
|
innermostURI->GetHost(host);
|
|
CopyUTF8toUTF16(host, *formatStrs.AppendElement());
|
|
errorDescriptionID = "dnsNotFound2";
|
|
error = "dnsNotFound";
|
|
} else if (NS_ERROR_CONNECTION_REFUSED == aError ||
|
|
NS_ERROR_PROXY_BAD_GATEWAY == aError) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
addHostPort = true;
|
|
error = "connectionFailure";
|
|
} else if (NS_ERROR_NET_INTERRUPT == aError) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
addHostPort = true;
|
|
error = "netInterrupt";
|
|
} else if (NS_ERROR_NET_TIMEOUT == aError ||
|
|
NS_ERROR_PROXY_GATEWAY_TIMEOUT == aError ||
|
|
NS_ERROR_NET_TIMEOUT_EXTERNAL == aError) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
// Get the host
|
|
nsAutoCString host;
|
|
aURI->GetHost(host);
|
|
CopyUTF8toUTF16(host, *formatStrs.AppendElement());
|
|
error = "netTimeout";
|
|
} else if (NS_ERROR_CSP_FRAME_ANCESTOR_VIOLATION == aError ||
|
|
NS_ERROR_CSP_FORM_ACTION_VIOLATION == aError ||
|
|
NS_ERROR_CSP_NAVIGATE_TO_VIOLATION == aError) {
|
|
// CSP error
|
|
cssClass.AssignLiteral("neterror");
|
|
error = "cspBlocked";
|
|
} else if (NS_ERROR_XFO_VIOLATION == aError) {
|
|
// XFO error
|
|
cssClass.AssignLiteral("neterror");
|
|
error = "xfoBlocked";
|
|
} else if (NS_ERROR_GET_MODULE(aError) == NS_ERROR_MODULE_SECURITY) {
|
|
nsCOMPtr<nsINSSErrorsService> nsserr =
|
|
do_GetService(NS_NSS_ERRORS_SERVICE_CONTRACTID);
|
|
|
|
uint32_t errorClass;
|
|
if (!nsserr || NS_FAILED(nsserr->GetErrorClass(aError, &errorClass))) {
|
|
errorClass = nsINSSErrorsService::ERROR_CLASS_SSL_PROTOCOL;
|
|
}
|
|
|
|
nsCOMPtr<nsISupports> securityInfo;
|
|
nsCOMPtr<nsITransportSecurityInfo> tsi;
|
|
if (aFailedChannel) {
|
|
aFailedChannel->GetSecurityInfo(getter_AddRefs(securityInfo));
|
|
}
|
|
tsi = do_QueryInterface(securityInfo);
|
|
if (tsi) {
|
|
uint32_t securityState;
|
|
tsi->GetSecurityState(&securityState);
|
|
if (securityState & nsIWebProgressListener::STATE_USES_SSL_3) {
|
|
error = "sslv3Used";
|
|
addHostPort = true;
|
|
} else if (securityState &
|
|
nsIWebProgressListener::STATE_USES_WEAK_CRYPTO) {
|
|
error = "weakCryptoUsed";
|
|
addHostPort = true;
|
|
}
|
|
} else {
|
|
// No channel, let's obtain the generic error message
|
|
if (nsserr) {
|
|
nsserr->GetErrorMessage(aError, messageStr);
|
|
}
|
|
}
|
|
// We don't have a message string here anymore but DisplayLoadError
|
|
// requires a non-empty messageStr.
|
|
messageStr.Truncate();
|
|
messageStr.AssignLiteral(u" ");
|
|
if (errorClass == nsINSSErrorsService::ERROR_CLASS_BAD_CERT) {
|
|
error = "nssBadCert";
|
|
|
|
// If this is an HTTP Strict Transport Security host or a pinned host
|
|
// and the certificate is bad, don't allow overrides (RFC 6797 section
|
|
// 12.1).
|
|
uint32_t flags =
|
|
UsePrivateBrowsing() ? nsISocketProvider::NO_PERMANENT_STORAGE : 0;
|
|
bool isStsHost = false;
|
|
bool isPinnedHost = false;
|
|
if (XRE_IsParentProcess()) {
|
|
nsCOMPtr<nsISiteSecurityService> sss =
|
|
do_GetService(NS_SSSERVICE_CONTRACTID, &rv);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = sss->IsSecureURI(nsISiteSecurityService::HEADER_HSTS, aURI, flags,
|
|
GetOriginAttributes(), nullptr, nullptr,
|
|
&isStsHost);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = sss->IsSecureURI(nsISiteSecurityService::STATIC_PINNING, aURI,
|
|
flags, GetOriginAttributes(), nullptr, nullptr,
|
|
&isPinnedHost);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
} else {
|
|
mozilla::dom::ContentChild* cc =
|
|
mozilla::dom::ContentChild::GetSingleton();
|
|
cc->SendIsSecureURI(nsISiteSecurityService::HEADER_HSTS, aURI, flags,
|
|
GetOriginAttributes(), &isStsHost);
|
|
cc->SendIsSecureURI(nsISiteSecurityService::STATIC_PINNING, aURI, flags,
|
|
GetOriginAttributes(), &isPinnedHost);
|
|
}
|
|
|
|
if (Preferences::GetBool("browser.xul.error_pages.expert_bad_cert",
|
|
false)) {
|
|
cssClass.AssignLiteral("expertBadCert");
|
|
}
|
|
|
|
// HSTS/pinning takes precedence over the expert bad cert pref. We
|
|
// never want to show the "Add Exception" button for these sites.
|
|
// In the future we should differentiate between an HSTS host and a
|
|
// pinned host and display a more informative message to the user.
|
|
if (isStsHost || isPinnedHost) {
|
|
cssClass.AssignLiteral("badStsCert");
|
|
}
|
|
|
|
// See if an alternate cert error page is registered
|
|
nsAutoCString alternateErrorPage;
|
|
nsresult rv = Preferences::GetCString(
|
|
"security.alternate_certificate_error_page", alternateErrorPage);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
errorPage.Assign(alternateErrorPage);
|
|
}
|
|
} else {
|
|
error = "nssFailure2";
|
|
}
|
|
} else if (NS_ERROR_PHISHING_URI == aError ||
|
|
NS_ERROR_MALWARE_URI == aError ||
|
|
NS_ERROR_UNWANTED_URI == aError ||
|
|
NS_ERROR_HARMFUL_URI == aError) {
|
|
nsAutoCString host;
|
|
aURI->GetHost(host);
|
|
CopyUTF8toUTF16(host, *formatStrs.AppendElement());
|
|
|
|
// Malware and phishing detectors may want to use an alternate error
|
|
// page, but if the pref's not set, we'll fall back on the standard page
|
|
nsAutoCString alternateErrorPage;
|
|
nsresult rv = Preferences::GetCString("urlclassifier.alternate_error_page",
|
|
alternateErrorPage);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
errorPage.Assign(alternateErrorPage);
|
|
}
|
|
|
|
if (NS_ERROR_PHISHING_URI == aError) {
|
|
error = "deceptiveBlocked";
|
|
} else if (NS_ERROR_MALWARE_URI == aError) {
|
|
error = "malwareBlocked";
|
|
} else if (NS_ERROR_UNWANTED_URI == aError) {
|
|
error = "unwantedBlocked";
|
|
} else if (NS_ERROR_HARMFUL_URI == aError) {
|
|
error = "harmfulBlocked";
|
|
}
|
|
|
|
cssClass.AssignLiteral("blacklist");
|
|
} else if (NS_ERROR_CONTENT_CRASHED == aError) {
|
|
errorPage.AssignLiteral("tabcrashed");
|
|
error = "tabcrashed";
|
|
|
|
RefPtr<EventTarget> handler = mChromeEventHandler;
|
|
if (handler) {
|
|
nsCOMPtr<Element> element = do_QueryInterface(handler);
|
|
element->GetAttribute(u"crashedPageTitle"_ns, messageStr);
|
|
}
|
|
|
|
// DisplayLoadError requires a non-empty messageStr to proceed and call
|
|
// LoadErrorPage. If the page doesn't have a title, we will use a blank
|
|
// space which will be trimmed and thus treated as empty by the front-end.
|
|
if (messageStr.IsEmpty()) {
|
|
messageStr.AssignLiteral(u" ");
|
|
}
|
|
} else if (NS_ERROR_FRAME_CRASHED == aError) {
|
|
errorPage.AssignLiteral("framecrashed");
|
|
error = "framecrashed";
|
|
messageStr.AssignLiteral(u" ");
|
|
} else if (NS_ERROR_BUILDID_MISMATCH == aError) {
|
|
errorPage.AssignLiteral("restartrequired");
|
|
error = "restartrequired";
|
|
|
|
// DisplayLoadError requires a non-empty messageStr to proceed and call
|
|
// LoadErrorPage. If the page doesn't have a title, we will use a blank
|
|
// space which will be trimmed and thus treated as empty by the front-end.
|
|
if (messageStr.IsEmpty()) {
|
|
messageStr.AssignLiteral(u" ");
|
|
}
|
|
} else {
|
|
// Errors requiring simple formatting
|
|
switch (aError) {
|
|
case NS_ERROR_MALFORMED_URI:
|
|
// URI is malformed
|
|
error = "malformedURI";
|
|
errorDescriptionID = "malformedURI2";
|
|
break;
|
|
case NS_ERROR_REDIRECT_LOOP:
|
|
// Doc failed to load because the server generated too many redirects
|
|
error = "redirectLoop";
|
|
break;
|
|
case NS_ERROR_UNKNOWN_SOCKET_TYPE:
|
|
// Doc failed to load because PSM is not installed
|
|
error = "unknownSocketType";
|
|
break;
|
|
case NS_ERROR_NET_RESET:
|
|
// Doc failed to load because the server kept reseting the connection
|
|
// before we could read any data from it
|
|
error = "netReset";
|
|
break;
|
|
case NS_ERROR_DOCUMENT_NOT_CACHED:
|
|
// Doc failed to load because the cache does not contain a copy of
|
|
// the document.
|
|
error = "notCached";
|
|
break;
|
|
case NS_ERROR_OFFLINE:
|
|
// Doc failed to load because we are offline.
|
|
error = "netOffline";
|
|
break;
|
|
case NS_ERROR_DOCUMENT_IS_PRINTMODE:
|
|
// Doc navigation attempted while Printing or Print Preview
|
|
error = "isprinting";
|
|
break;
|
|
case NS_ERROR_PORT_ACCESS_NOT_ALLOWED:
|
|
// Port blocked for security reasons
|
|
addHostPort = true;
|
|
error = "deniedPortAccess";
|
|
break;
|
|
case NS_ERROR_UNKNOWN_PROXY_HOST:
|
|
// Proxy hostname could not be resolved.
|
|
error = "proxyResolveFailure";
|
|
break;
|
|
case NS_ERROR_PROXY_CONNECTION_REFUSED:
|
|
case NS_ERROR_PROXY_FORBIDDEN:
|
|
case NS_ERROR_PROXY_NOT_IMPLEMENTED:
|
|
case NS_ERROR_PROXY_AUTHENTICATION_FAILED:
|
|
case NS_ERROR_PROXY_TOO_MANY_REQUESTS:
|
|
// Proxy connection was refused.
|
|
error = "proxyConnectFailure";
|
|
break;
|
|
case NS_ERROR_INVALID_CONTENT_ENCODING:
|
|
// Bad Content Encoding.
|
|
error = "contentEncodingError";
|
|
break;
|
|
case NS_ERROR_REMOTE_XUL:
|
|
error = "remoteXUL";
|
|
break;
|
|
case NS_ERROR_UNSAFE_CONTENT_TYPE:
|
|
// Channel refused to load from an unrecognized content type.
|
|
error = "unsafeContentType";
|
|
break;
|
|
case NS_ERROR_CORRUPTED_CONTENT:
|
|
// Broken Content Detected. e.g. Content-MD5 check failure.
|
|
error = "corruptedContentErrorv2";
|
|
break;
|
|
case NS_ERROR_INTERCEPTION_FAILED:
|
|
// ServiceWorker intercepted request, but something went wrong.
|
|
error = "corruptedContentErrorv2";
|
|
break;
|
|
case NS_ERROR_NET_INADEQUATE_SECURITY:
|
|
// Server negotiated bad TLS for HTTP/2.
|
|
error = "inadequateSecurityError";
|
|
addHostPort = true;
|
|
break;
|
|
case NS_ERROR_BLOCKED_BY_POLICY:
|
|
// Page blocked by policy
|
|
error = "blockedByPolicy";
|
|
break;
|
|
case NS_ERROR_NET_HTTP2_SENT_GOAWAY:
|
|
case NS_ERROR_NET_HTTP3_PROTOCOL_ERROR:
|
|
// HTTP/2 or HTTP/3 stack detected a protocol error
|
|
error = "networkProtocolError";
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
// If the HTTPS-Only Mode upgraded this request and the upgrade might have
|
|
// caused this error, we replace the error-page with about:httpsonlyerror
|
|
if (nsHTTPSOnlyUtils::CouldBeHttpsOnlyError(aFailedChannel, aError)) {
|
|
errorPage.AssignLiteral("httpsonlyerror");
|
|
}
|
|
|
|
if (nsCOMPtr<nsILoadURIDelegate> loadURIDelegate = GetLoadURIDelegate()) {
|
|
nsCOMPtr<nsIURI> errorPageURI;
|
|
rv = loadURIDelegate->HandleLoadError(aURI, aError,
|
|
NS_ERROR_GET_MODULE(aError),
|
|
getter_AddRefs(errorPageURI));
|
|
// If the docshell is going away there's no point in showing an error page.
|
|
if (NS_FAILED(rv) || mIsBeingDestroyed) {
|
|
*aDisplayedErrorPage = false;
|
|
return NS_OK;
|
|
}
|
|
|
|
if (errorPageURI) {
|
|
*aDisplayedErrorPage =
|
|
NS_SUCCEEDED(LoadErrorPage(errorPageURI, aURI, aFailedChannel));
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
// Test if the error should be displayed
|
|
if (!error) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (!errorDescriptionID) {
|
|
errorDescriptionID = error;
|
|
}
|
|
|
|
Telemetry::AccumulateCategoricalKeyed(
|
|
IsFrame() ? "frame"_ns : "top"_ns,
|
|
mozilla::dom::LoadErrorToTelemetryLabel(aError));
|
|
|
|
// Test if the error needs to be formatted
|
|
if (!messageStr.IsEmpty()) {
|
|
// already obtained message
|
|
} else {
|
|
if (addHostPort) {
|
|
// Build up the host:port string.
|
|
nsAutoCString hostport;
|
|
if (aURI) {
|
|
aURI->GetHostPort(hostport);
|
|
} else {
|
|
hostport.Assign('?');
|
|
}
|
|
CopyUTF8toUTF16(hostport, *formatStrs.AppendElement());
|
|
}
|
|
|
|
nsAutoCString spec;
|
|
rv = NS_ERROR_NOT_AVAILABLE;
|
|
auto& nextFormatStr = *formatStrs.AppendElement();
|
|
if (aURI) {
|
|
// displaying "file://" is aesthetically unpleasing and could even be
|
|
// confusing to the user
|
|
if (SchemeIsFile(aURI)) {
|
|
aURI->GetPathQueryRef(spec);
|
|
} else {
|
|
aURI->GetSpec(spec);
|
|
}
|
|
|
|
nsCOMPtr<nsITextToSubURI> textToSubURI(
|
|
do_GetService(NS_ITEXTTOSUBURI_CONTRACTID, &rv));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
rv = textToSubURI->UnEscapeURIForUI(spec, nextFormatStr);
|
|
}
|
|
} else {
|
|
spec.Assign('?');
|
|
}
|
|
if (NS_FAILED(rv)) {
|
|
CopyUTF8toUTF16(spec, nextFormatStr);
|
|
}
|
|
rv = NS_OK;
|
|
|
|
nsAutoString str;
|
|
rv =
|
|
stringBundle->FormatStringFromName(errorDescriptionID, formatStrs, str);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
messageStr.Assign(str);
|
|
}
|
|
|
|
// Display the error as a page or an alert prompt
|
|
NS_ENSURE_FALSE(messageStr.IsEmpty(), NS_ERROR_FAILURE);
|
|
|
|
if ((NS_ERROR_NET_INTERRUPT == aError || NS_ERROR_NET_RESET == aError) &&
|
|
SchemeIsHTTPS(aURI)) {
|
|
// Maybe TLS intolerant. Treat this as an SSL error.
|
|
error = "nssFailure2";
|
|
}
|
|
|
|
if (mBrowsingContext->GetUseErrorPages()) {
|
|
// Display an error page
|
|
nsresult loadedPage =
|
|
LoadErrorPage(aURI, aURL, errorPage.get(), error, messageStr.get(),
|
|
cssClass.get(), aFailedChannel);
|
|
*aDisplayedErrorPage = NS_SUCCEEDED(loadedPage);
|
|
} else {
|
|
// The prompter reqires that our private window has a document (or it
|
|
// asserts). Satisfy that assertion now since GetDoc will force
|
|
// creation of one if it hasn't already been created.
|
|
if (mScriptGlobal) {
|
|
Unused << mScriptGlobal->GetDoc();
|
|
}
|
|
|
|
// Display a message box
|
|
prompter->Alert(nullptr, messageStr.get());
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
#define PREF_SAFEBROWSING_ALLOWOVERRIDE "browser.safebrowsing.allowOverride"
|
|
|
|
nsresult nsDocShell::LoadErrorPage(nsIURI* aURI, const char16_t* aURL,
|
|
const char* aErrorPage,
|
|
const char* aErrorType,
|
|
const char16_t* aDescription,
|
|
const char* aCSSClass,
|
|
nsIChannel* aFailedChannel) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
#if defined(DEBUG)
|
|
if (MOZ_LOG_TEST(gDocShellLog, LogLevel::Debug)) {
|
|
nsAutoCString chanName;
|
|
if (aFailedChannel) {
|
|
aFailedChannel->GetName(chanName);
|
|
} else {
|
|
chanName.AssignLiteral("<no channel>");
|
|
}
|
|
|
|
MOZ_LOG(gDocShellLog, LogLevel::Debug,
|
|
("nsDocShell[%p]::LoadErrorPage(\"%s\", \"%s\", {...}, [%s])\n",
|
|
this, aURI ? aURI->GetSpecOrDefault().get() : "",
|
|
NS_ConvertUTF16toUTF8(aURL).get(), chanName.get()));
|
|
}
|
|
#endif
|
|
|
|
nsAutoCString url;
|
|
if (aURI) {
|
|
nsresult rv = aURI->GetSpec(url);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
} else if (aURL) {
|
|
CopyUTF16toUTF8(MakeStringSpan(aURL), url);
|
|
} else {
|
|
return NS_ERROR_INVALID_POINTER;
|
|
}
|
|
|
|
// Create a URL to pass all the error information through to the page.
|
|
|
|
#undef SAFE_ESCAPE
|
|
#define SAFE_ESCAPE(output, input, params) \
|
|
if (NS_WARN_IF(!NS_Escape(input, output, params))) { \
|
|
return NS_ERROR_OUT_OF_MEMORY; \
|
|
}
|
|
|
|
nsCString escapedUrl, escapedError, escapedDescription, escapedCSSClass;
|
|
SAFE_ESCAPE(escapedUrl, url, url_Path);
|
|
SAFE_ESCAPE(escapedError, nsDependentCString(aErrorType), url_Path);
|
|
SAFE_ESCAPE(escapedDescription, NS_ConvertUTF16toUTF8(aDescription),
|
|
url_Path);
|
|
if (aCSSClass) {
|
|
nsCString cssClass(aCSSClass);
|
|
SAFE_ESCAPE(escapedCSSClass, cssClass, url_Path);
|
|
}
|
|
nsCString errorPageUrl("about:");
|
|
errorPageUrl.AppendASCII(aErrorPage);
|
|
errorPageUrl.AppendLiteral("?e=");
|
|
|
|
errorPageUrl.AppendASCII(escapedError.get());
|
|
errorPageUrl.AppendLiteral("&u=");
|
|
errorPageUrl.AppendASCII(escapedUrl.get());
|
|
if ((strcmp(aErrorPage, "blocked") == 0) &&
|
|
Preferences::GetBool(PREF_SAFEBROWSING_ALLOWOVERRIDE, true)) {
|
|
errorPageUrl.AppendLiteral("&o=1");
|
|
}
|
|
if (!escapedCSSClass.IsEmpty()) {
|
|
errorPageUrl.AppendLiteral("&s=");
|
|
errorPageUrl.AppendASCII(escapedCSSClass.get());
|
|
}
|
|
errorPageUrl.AppendLiteral("&c=UTF-8");
|
|
|
|
nsCOMPtr<nsICaptivePortalService> cps = do_GetService(NS_CAPTIVEPORTAL_CID);
|
|
int32_t cpsState;
|
|
if (cps && NS_SUCCEEDED(cps->GetState(&cpsState)) &&
|
|
cpsState == nsICaptivePortalService::LOCKED_PORTAL) {
|
|
errorPageUrl.AppendLiteral("&captive=true");
|
|
}
|
|
|
|
// netError.xhtml's getDescription only handles the "d" parameter at the
|
|
// end of the URL, so append it last.
|
|
errorPageUrl.AppendLiteral("&d=");
|
|
errorPageUrl.AppendASCII(escapedDescription.get());
|
|
|
|
nsCOMPtr<nsIURI> errorPageURI;
|
|
nsresult rv = NS_NewURI(getter_AddRefs(errorPageURI), errorPageUrl);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
return LoadErrorPage(errorPageURI, aURI, aFailedChannel);
|
|
}
|
|
|
|
nsresult nsDocShell::LoadErrorPage(nsIURI* aErrorURI, nsIURI* aFailedURI,
|
|
nsIChannel* aFailedChannel) {
|
|
mFailedChannel = aFailedChannel;
|
|
mFailedURI = aFailedURI;
|
|
mFailedLoadType = mLoadType;
|
|
|
|
if (mLSHE) {
|
|
// Abandon mLSHE's BFCache entry and create a new one. This way, if
|
|
// we go back or forward to another SHEntry with the same doc
|
|
// identifier, the error page won't persist.
|
|
mLSHE->AbandonBFCacheEntry();
|
|
}
|
|
|
|
RefPtr<nsDocShellLoadState> loadState = new nsDocShellLoadState(aErrorURI);
|
|
loadState->SetTriggeringPrincipal(nsContentUtils::GetSystemPrincipal());
|
|
if (mBrowsingContext) {
|
|
loadState->SetTriggeringSandboxFlags(mBrowsingContext->GetSandboxFlags());
|
|
}
|
|
loadState->SetLoadType(LOAD_ERROR_PAGE);
|
|
loadState->SetFirstParty(true);
|
|
loadState->SetSourceBrowsingContext(mBrowsingContext);
|
|
if (mozilla::SessionHistoryInParent() && mLoadingEntry) {
|
|
// We keep the loading entry for the load that failed here. If the user
|
|
// reloads we want to try to reload the original load, not the error page.
|
|
loadState->SetLoadingSessionHistoryInfo(
|
|
MakeUnique<LoadingSessionHistoryInfo>(*mLoadingEntry));
|
|
}
|
|
return InternalLoad(loadState);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::Reload(uint32_t aReloadFlags) {
|
|
if (!IsNavigationAllowed()) {
|
|
return NS_OK; // JS may not handle returning of an error code
|
|
}
|
|
|
|
NS_ASSERTION(((aReloadFlags & INTERNAL_LOAD_FLAGS_LOADURI_SETUP_FLAGS) == 0),
|
|
"Reload command not updated to use load flags!");
|
|
NS_ASSERTION((aReloadFlags & EXTRA_LOAD_FLAGS) == 0,
|
|
"Don't pass these flags to Reload");
|
|
|
|
uint32_t loadType = MAKE_LOAD_TYPE(LOAD_RELOAD_NORMAL, aReloadFlags);
|
|
NS_ENSURE_TRUE(IsValidLoadType(loadType), NS_ERROR_INVALID_ARG);
|
|
|
|
// Send notifications to the HistoryListener if any, about the impending
|
|
// reload
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug, ("nsDocShell %p Reload", this));
|
|
bool forceReload = IsForceReloadType(loadType);
|
|
if (!XRE_IsParentProcess()) {
|
|
RefPtr<nsDocShell> docShell(this);
|
|
nsCOMPtr<nsIContentViewer> cv(mContentViewer);
|
|
|
|
bool okToUnload = true;
|
|
MOZ_TRY(cv->PermitUnload(&okToUnload));
|
|
if (!okToUnload) {
|
|
return NS_OK;
|
|
}
|
|
|
|
RefPtr<Document> doc(GetDocument());
|
|
RefPtr<BrowsingContext> browsingContext(mBrowsingContext);
|
|
nsCOMPtr<nsIURI> currentURI(mCurrentURI);
|
|
nsCOMPtr<nsIReferrerInfo> referrerInfo(mReferrerInfo);
|
|
|
|
ContentChild::GetSingleton()->SendNotifyOnHistoryReload(
|
|
mBrowsingContext, forceReload,
|
|
[docShell, doc, loadType, browsingContext, currentURI, referrerInfo](
|
|
Tuple<bool, Maybe<RefPtr<nsDocShellLoadState>>, Maybe<bool>>&&
|
|
aResult) {
|
|
bool canReload;
|
|
Maybe<RefPtr<nsDocShellLoadState>> loadState;
|
|
Maybe<bool> reloadingActiveEntry;
|
|
|
|
Tie(canReload, loadState, reloadingActiveEntry) = aResult;
|
|
|
|
if (!canReload) {
|
|
return;
|
|
}
|
|
|
|
if (loadState.isSome()) {
|
|
MOZ_LOG(
|
|
gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p Reload - LoadHistoryEntry", docShell.get()));
|
|
loadState.ref()->SetNotifiedBeforeUnloadListeners(true);
|
|
docShell->LoadHistoryEntry(loadState.ref(), loadType,
|
|
reloadingActiveEntry.ref());
|
|
} else {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p ReloadDocument", docShell.get()));
|
|
ReloadDocument(docShell, doc, loadType, browsingContext,
|
|
currentURI, referrerInfo,
|
|
/* aNotifiedBeforeUnloadListeners */ true);
|
|
}
|
|
},
|
|
[](mozilla::ipc::ResponseRejectReason) {});
|
|
} else {
|
|
// Parent process
|
|
bool canReload = false;
|
|
Maybe<RefPtr<nsDocShellLoadState>> loadState;
|
|
Maybe<bool> reloadingActiveEntry;
|
|
if (!mBrowsingContext->IsDiscarded()) {
|
|
mBrowsingContext->Canonical()->NotifyOnHistoryReload(
|
|
forceReload, canReload, loadState, reloadingActiveEntry);
|
|
}
|
|
if (canReload) {
|
|
if (loadState.isSome()) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p Reload - LoadHistoryEntry", this));
|
|
LoadHistoryEntry(loadState.ref(), loadType,
|
|
reloadingActiveEntry.ref());
|
|
} else {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p ReloadDocument", this));
|
|
ReloadDocument(this, GetDocument(), loadType, mBrowsingContext,
|
|
mCurrentURI, mReferrerInfo);
|
|
}
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
bool canReload = true;
|
|
if (rootSH) {
|
|
rootSH->LegacySHistory()->NotifyOnHistoryReload(&canReload);
|
|
}
|
|
|
|
if (!canReload) {
|
|
return NS_OK;
|
|
}
|
|
|
|
/* If you change this part of code, make sure bug 45297 does not re-occur */
|
|
if (mOSHE) {
|
|
return LoadHistoryEntry(mOSHE, loadType);
|
|
}
|
|
|
|
if (mLSHE) { // In case a reload happened before the current load is done
|
|
return LoadHistoryEntry(mLSHE, loadType);
|
|
}
|
|
|
|
return ReloadDocument(this, GetDocument(), loadType, mBrowsingContext,
|
|
mCurrentURI, mReferrerInfo);
|
|
}
|
|
|
|
/* static */
|
|
nsresult nsDocShell::ReloadDocument(nsDocShell* aDocShell, Document* aDocument,
|
|
uint32_t aLoadType,
|
|
BrowsingContext* aBrowsingContext,
|
|
nsIURI* aCurrentURI,
|
|
nsIReferrerInfo* aReferrerInfo,
|
|
bool aNotifiedBeforeUnloadListeners) {
|
|
if (!aDocument) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Do not inherit owner from document
|
|
uint32_t flags = INTERNAL_LOAD_FLAGS_NONE;
|
|
nsAutoString srcdoc;
|
|
nsIURI* baseURI = nullptr;
|
|
nsCOMPtr<nsIURI> originalURI;
|
|
nsCOMPtr<nsIURI> resultPrincipalURI;
|
|
bool loadReplace = false;
|
|
|
|
nsIPrincipal* triggeringPrincipal = aDocument->NodePrincipal();
|
|
nsCOMPtr<nsIContentSecurityPolicy> csp = aDocument->GetCsp();
|
|
uint32_t triggeringSandboxFlags = aDocument->GetSandboxFlags();
|
|
|
|
nsAutoString contentTypeHint;
|
|
aDocument->GetContentType(contentTypeHint);
|
|
|
|
if (aDocument->IsSrcdocDocument()) {
|
|
aDocument->GetSrcdocData(srcdoc);
|
|
flags |= INTERNAL_LOAD_FLAGS_IS_SRCDOC;
|
|
baseURI = aDocument->GetBaseURI();
|
|
} else {
|
|
srcdoc = VoidString();
|
|
}
|
|
nsCOMPtr<nsIChannel> chan = aDocument->GetChannel();
|
|
if (chan) {
|
|
uint32_t loadFlags;
|
|
chan->GetLoadFlags(&loadFlags);
|
|
loadReplace = loadFlags & nsIChannel::LOAD_REPLACE;
|
|
nsCOMPtr<nsIHttpChannel> httpChan(do_QueryInterface(chan));
|
|
if (httpChan) {
|
|
httpChan->GetOriginalURI(getter_AddRefs(originalURI));
|
|
}
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = chan->LoadInfo();
|
|
loadInfo->GetResultPrincipalURI(getter_AddRefs(resultPrincipalURI));
|
|
}
|
|
|
|
if (!triggeringPrincipal) {
|
|
MOZ_ASSERT(false, "Reload needs a valid triggeringPrincipal");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// Stack variables to ensure changes to the member variables don't affect to
|
|
// the call.
|
|
nsCOMPtr<nsIURI> currentURI = aCurrentURI;
|
|
|
|
// Reload always rewrites result principal URI.
|
|
Maybe<nsCOMPtr<nsIURI>> emplacedResultPrincipalURI;
|
|
emplacedResultPrincipalURI.emplace(std::move(resultPrincipalURI));
|
|
|
|
RefPtr<WindowContext> context = aBrowsingContext->GetCurrentWindowContext();
|
|
RefPtr<nsDocShellLoadState> loadState = new nsDocShellLoadState(currentURI);
|
|
loadState->SetReferrerInfo(aReferrerInfo);
|
|
loadState->SetOriginalURI(originalURI);
|
|
loadState->SetMaybeResultPrincipalURI(emplacedResultPrincipalURI);
|
|
loadState->SetLoadReplace(loadReplace);
|
|
loadState->SetTriggeringPrincipal(triggeringPrincipal);
|
|
loadState->SetTriggeringSandboxFlags(triggeringSandboxFlags);
|
|
loadState->SetPrincipalToInherit(triggeringPrincipal);
|
|
loadState->SetCsp(csp);
|
|
loadState->SetInternalLoadFlags(flags);
|
|
loadState->SetTypeHint(NS_ConvertUTF16toUTF8(contentTypeHint));
|
|
loadState->SetLoadType(aLoadType);
|
|
loadState->SetFirstParty(true);
|
|
loadState->SetSrcdocData(srcdoc);
|
|
loadState->SetSourceBrowsingContext(aBrowsingContext);
|
|
loadState->SetBaseURI(baseURI);
|
|
loadState->SetHasValidUserGestureActivation(
|
|
context && context->HasValidTransientUserGestureActivation());
|
|
loadState->SetNotifiedBeforeUnloadListeners(aNotifiedBeforeUnloadListeners);
|
|
return aDocShell->InternalLoad(loadState);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::Stop(uint32_t aStopFlags) {
|
|
// Revoke any pending event related to content viewer restoration
|
|
mRestorePresentationEvent.Revoke();
|
|
|
|
if (mLoadType == LOAD_ERROR_PAGE) {
|
|
if (mLSHE) {
|
|
// Since error page loads never unset mLSHE, do so now
|
|
SetHistoryEntryAndUpdateBC(Some(nullptr), Some<nsISHEntry*>(mLSHE));
|
|
}
|
|
mActiveEntryIsLoadingFromSessionHistory = false;
|
|
|
|
mFailedChannel = nullptr;
|
|
mFailedURI = nullptr;
|
|
}
|
|
|
|
if (nsIWebNavigation::STOP_CONTENT & aStopFlags) {
|
|
// Stop the document loading and animations
|
|
if (mContentViewer) {
|
|
nsCOMPtr<nsIContentViewer> cv = mContentViewer;
|
|
cv->Stop();
|
|
}
|
|
} else if (nsIWebNavigation::STOP_NETWORK & aStopFlags) {
|
|
// Stop the document loading only
|
|
if (mContentViewer) {
|
|
RefPtr<Document> doc = mContentViewer->GetDocument();
|
|
if (doc) {
|
|
doc->StopDocumentLoad();
|
|
}
|
|
}
|
|
}
|
|
|
|
if (nsIWebNavigation::STOP_NETWORK & aStopFlags) {
|
|
// Suspend any timers that were set for this loader. We'll clear
|
|
// them out for good in CreateContentViewer.
|
|
if (mRefreshURIList) {
|
|
SuspendRefreshURIs();
|
|
mSavedRefreshURIList.swap(mRefreshURIList);
|
|
mRefreshURIList = nullptr;
|
|
}
|
|
|
|
// XXXbz We could also pass |this| to nsIURILoader::Stop. That will
|
|
// just call Stop() on us as an nsIDocumentLoader... We need fewer
|
|
// redundant apis!
|
|
Stop();
|
|
}
|
|
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIWebNavigation> shellAsNav(do_QueryObject(child));
|
|
if (shellAsNav) {
|
|
shellAsNav->Stop(aStopFlags);
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetDocument(Document** aDocument) {
|
|
NS_ENSURE_ARG_POINTER(aDocument);
|
|
NS_ENSURE_SUCCESS(EnsureContentViewer(), NS_ERROR_FAILURE);
|
|
|
|
RefPtr<Document> doc = mContentViewer->GetDocument();
|
|
if (!doc) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
doc.forget(aDocument);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCurrentURI(nsIURI** aURI) {
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
|
|
nsCOMPtr<nsIURI> uri = mCurrentURI;
|
|
uri.forget(aURI);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetSessionHistoryXPCOM(nsISupports** aSessionHistory) {
|
|
NS_ENSURE_ARG_POINTER(aSessionHistory);
|
|
RefPtr<ChildSHistory> shistory = GetSessionHistory();
|
|
shistory.forget(aSessionHistory);
|
|
return NS_OK;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsIWebPageDescriptor
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::LoadPageAsViewSource(nsIDocShell* aOtherDocShell,
|
|
const nsAString& aURI) {
|
|
if (!aOtherDocShell) {
|
|
return NS_ERROR_INVALID_POINTER;
|
|
}
|
|
nsCOMPtr<nsIURI> newURI;
|
|
nsresult rv = NS_NewURI(getter_AddRefs(newURI), aURI);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
RefPtr<nsDocShellLoadState> loadState;
|
|
uint32_t cacheKey;
|
|
auto* otherDocShell = nsDocShell::Cast(aOtherDocShell);
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
loadState = new nsDocShellLoadState(newURI);
|
|
if (!otherDocShell->FillLoadStateFromCurrentEntry(*loadState)) {
|
|
return NS_ERROR_INVALID_POINTER;
|
|
}
|
|
cacheKey = otherDocShell->GetCacheKeyFromCurrentEntry().valueOr(0);
|
|
} else {
|
|
nsCOMPtr<nsISHEntry> entry;
|
|
bool isOriginalSHE;
|
|
otherDocShell->GetCurrentSHEntry(getter_AddRefs(entry), &isOriginalSHE);
|
|
if (!entry) {
|
|
return NS_ERROR_INVALID_POINTER;
|
|
}
|
|
rv = entry->CreateLoadInfo(getter_AddRefs(loadState));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
entry->GetCacheKey(&cacheKey);
|
|
loadState->SetURI(newURI);
|
|
loadState->SetSHEntry(nullptr);
|
|
}
|
|
|
|
// We're doing a load of the page, via an API that
|
|
// is only exposed to system code. The triggering principal for this load
|
|
// should be the system principal.
|
|
loadState->SetTriggeringPrincipal(nsContentUtils::GetSystemPrincipal());
|
|
loadState->SetOriginalURI(nullptr);
|
|
loadState->SetResultPrincipalURI(nullptr);
|
|
|
|
return InternalLoad(loadState, Some(cacheKey));
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCurrentDescriptor(nsISupports** aPageDescriptor) {
|
|
MOZ_ASSERT(aPageDescriptor, "Null out param?");
|
|
|
|
*aPageDescriptor = nullptr;
|
|
|
|
nsISHEntry* src = mOSHE ? mOSHE : mLSHE;
|
|
if (src) {
|
|
nsCOMPtr<nsISHEntry> dest;
|
|
|
|
nsresult rv = src->Clone(getter_AddRefs(dest));
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
// null out inappropriate cloned attributes...
|
|
dest->SetParent(nullptr);
|
|
dest->SetIsSubFrame(false);
|
|
|
|
return CallQueryInterface(dest, aPageDescriptor);
|
|
}
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
already_AddRefed<nsIInputStream> nsDocShell::GetPostDataFromCurrentEntry()
|
|
const {
|
|
nsCOMPtr<nsIInputStream> postData;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
if (mActiveEntry) {
|
|
postData = mActiveEntry->GetPostData();
|
|
} else if (mLoadingEntry) {
|
|
postData = mLoadingEntry->mInfo.GetPostData();
|
|
}
|
|
} else {
|
|
if (mOSHE) {
|
|
postData = mOSHE->GetPostData();
|
|
} else if (mLSHE) {
|
|
postData = mLSHE->GetPostData();
|
|
}
|
|
}
|
|
|
|
return postData.forget();
|
|
}
|
|
|
|
Maybe<uint32_t> nsDocShell::GetCacheKeyFromCurrentEntry() const {
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
if (mActiveEntry) {
|
|
return Some(mActiveEntry->GetCacheKey());
|
|
}
|
|
|
|
if (mLoadingEntry) {
|
|
return Some(mLoadingEntry->mInfo.GetCacheKey());
|
|
}
|
|
} else {
|
|
if (mOSHE) {
|
|
return Some(mOSHE->GetCacheKey());
|
|
}
|
|
|
|
if (mLSHE) {
|
|
return Some(mLSHE->GetCacheKey());
|
|
}
|
|
}
|
|
|
|
return Nothing();
|
|
}
|
|
|
|
bool nsDocShell::FillLoadStateFromCurrentEntry(
|
|
nsDocShellLoadState& aLoadState) {
|
|
if (mLoadingEntry) {
|
|
mLoadingEntry->mInfo.FillLoadInfo(aLoadState);
|
|
return true;
|
|
}
|
|
if (mActiveEntry) {
|
|
mActiveEntry->FillLoadInfo(aLoadState);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsIBaseWindow
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::InitWindow(nativeWindow aParentNativeWindow,
|
|
nsIWidget* aParentWidget, int32_t aX, int32_t aY,
|
|
int32_t aWidth, int32_t aHeight) {
|
|
SetParentWidget(aParentWidget);
|
|
SetPositionAndSize(aX, aY, aWidth, aHeight, 0);
|
|
NS_ENSURE_TRUE(Initialize(), NS_ERROR_FAILURE);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::Destroy() {
|
|
// XXX: We allow this function to be called just once. If you are going to
|
|
// reset new variables in this function, please make sure the variables will
|
|
// never be re-initialized. Adding assertions to check |mIsBeingDestroyed|
|
|
// in the setter functions for the variables would be enough.
|
|
if (mIsBeingDestroyed) {
|
|
return NS_ERROR_DOCSHELL_DYING;
|
|
}
|
|
|
|
NS_ASSERTION(mItemType == typeContent || mItemType == typeChrome,
|
|
"Unexpected item type in docshell");
|
|
|
|
nsCOMPtr<nsIObserverService> serv = services::GetObserverService();
|
|
if (serv) {
|
|
const char* msg = mItemType == typeContent
|
|
? NS_WEBNAVIGATION_DESTROY
|
|
: NS_CHROME_WEBNAVIGATION_DESTROY;
|
|
serv->NotifyObservers(GetAsSupports(this), msg, nullptr);
|
|
}
|
|
|
|
mIsBeingDestroyed = true;
|
|
|
|
// Brak the cycle with the initial client, if present.
|
|
mInitialClientSource.reset();
|
|
|
|
// Make sure we don't record profile timeline markers anymore
|
|
SetRecordProfileTimelineMarkers(false);
|
|
|
|
// Make sure to blow away our mLoadingURI just in case. No loads
|
|
// from inside this pagehide.
|
|
mLoadingURI = nullptr;
|
|
|
|
// Fire unload event before we blow anything away.
|
|
(void)FirePageHideNotification(true);
|
|
|
|
// Clear pointers to any detached nsEditorData that's lying
|
|
// around in shistory entries. Breaks cycle. See bug 430921.
|
|
if (mOSHE) {
|
|
mOSHE->SetEditorData(nullptr);
|
|
}
|
|
if (mLSHE) {
|
|
mLSHE->SetEditorData(nullptr);
|
|
}
|
|
|
|
// Note: mContentListener can be null if Init() failed and we're being
|
|
// called from the destructor.
|
|
if (mContentListener) {
|
|
mContentListener->DropDocShellReference();
|
|
mContentListener->SetParentContentListener(nullptr);
|
|
// Note that we do NOT set mContentListener to null here; that
|
|
// way if someone tries to do a load in us after this point
|
|
// the nsDSURIContentListener will block it. All of which
|
|
// means that we should do this before calling Stop(), of
|
|
// course.
|
|
}
|
|
|
|
// Stop any URLs that are currently being loaded...
|
|
Stop(nsIWebNavigation::STOP_ALL);
|
|
|
|
mEditorData = nullptr;
|
|
|
|
// Save the state of the current document, before destroying the window.
|
|
// This is needed to capture the state of a frameset when the new document
|
|
// causes the frameset to be destroyed...
|
|
PersistLayoutHistoryState();
|
|
|
|
// Remove this docshell from its parent's child list
|
|
nsCOMPtr<nsIDocShellTreeItem> docShellParentAsItem =
|
|
do_QueryInterface(GetAsSupports(mParent));
|
|
if (docShellParentAsItem) {
|
|
docShellParentAsItem->RemoveChild(this);
|
|
}
|
|
|
|
if (mContentViewer) {
|
|
mContentViewer->Close(nullptr);
|
|
mContentViewer->Destroy();
|
|
mContentViewer = nullptr;
|
|
}
|
|
|
|
nsDocLoader::Destroy();
|
|
|
|
mParentWidget = nullptr;
|
|
mCurrentURI = nullptr;
|
|
|
|
if (mScriptGlobal) {
|
|
mScriptGlobal->DetachFromDocShell(!mWillChangeProcess);
|
|
mScriptGlobal = nullptr;
|
|
}
|
|
|
|
if (GetSessionHistory()) {
|
|
// We want to destroy these content viewers now rather than
|
|
// letting their destruction wait for the session history
|
|
// entries to get garbage collected. (Bug 488394)
|
|
GetSessionHistory()->EvictLocalContentViewers();
|
|
}
|
|
|
|
if (mWillChangeProcess) {
|
|
mBrowsingContext->PrepareForProcessChange();
|
|
}
|
|
|
|
SetTreeOwner(nullptr);
|
|
|
|
mBrowserChild = nullptr;
|
|
|
|
mChromeEventHandler = nullptr;
|
|
|
|
// Cancel any timers that were set for this docshell; this is needed
|
|
// to break the cycle between us and the timers.
|
|
CancelRefreshURITimers();
|
|
|
|
if (UsePrivateBrowsing() && mAffectPrivateSessionLifetime) {
|
|
DecreasePrivateDocShellCount();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetUnscaledDevicePixelsPerCSSPixel(double* aScale) {
|
|
if (mParentWidget) {
|
|
*aScale = mParentWidget->GetDefaultScale().scale;
|
|
return NS_OK;
|
|
}
|
|
|
|
nsCOMPtr<nsIBaseWindow> ownerWindow(do_QueryInterface(mTreeOwner));
|
|
if (ownerWindow) {
|
|
return ownerWindow->GetUnscaledDevicePixelsPerCSSPixel(aScale);
|
|
}
|
|
|
|
*aScale = 1.0;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetDevicePixelsPerDesktopPixel(double* aScale) {
|
|
if (mParentWidget) {
|
|
*aScale = mParentWidget->GetDesktopToDeviceScale().scale;
|
|
return NS_OK;
|
|
}
|
|
|
|
nsCOMPtr<nsIBaseWindow> ownerWindow(do_QueryInterface(mTreeOwner));
|
|
if (ownerWindow) {
|
|
return ownerWindow->GetDevicePixelsPerDesktopPixel(aScale);
|
|
}
|
|
|
|
*aScale = 1.0;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetPosition(int32_t aX, int32_t aY) {
|
|
mBounds.MoveTo(aX, aY);
|
|
|
|
if (mContentViewer) {
|
|
NS_ENSURE_SUCCESS(mContentViewer->Move(aX, aY), NS_ERROR_FAILURE);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetPositionDesktopPix(int32_t aX, int32_t aY) {
|
|
nsCOMPtr<nsIBaseWindow> ownerWindow(do_QueryInterface(mTreeOwner));
|
|
if (ownerWindow) {
|
|
return ownerWindow->SetPositionDesktopPix(aX, aY);
|
|
}
|
|
|
|
double scale = 1.0;
|
|
GetDevicePixelsPerDesktopPixel(&scale);
|
|
return SetPosition(NSToIntRound(aX * scale), NSToIntRound(aY * scale));
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetPosition(int32_t* aX, int32_t* aY) {
|
|
return GetPositionAndSize(aX, aY, nullptr, nullptr);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetSize(int32_t aWidth, int32_t aHeight, bool aRepaint) {
|
|
int32_t x = 0, y = 0;
|
|
GetPosition(&x, &y);
|
|
return SetPositionAndSize(x, y, aWidth, aHeight,
|
|
aRepaint ? nsIBaseWindow::eRepaint : 0);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetSize(int32_t* aWidth, int32_t* aHeight) {
|
|
return GetPositionAndSize(nullptr, nullptr, aWidth, aHeight);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetPositionAndSize(int32_t aX, int32_t aY, int32_t aWidth,
|
|
int32_t aHeight, uint32_t aFlags) {
|
|
mBounds.SetRect(aX, aY, aWidth, aHeight);
|
|
|
|
// Hold strong ref, since SetBounds can make us null out mContentViewer
|
|
nsCOMPtr<nsIContentViewer> viewer = mContentViewer;
|
|
if (viewer) {
|
|
uint32_t cvflags = (aFlags & nsIBaseWindow::eDelayResize)
|
|
? nsIContentViewer::eDelayResize
|
|
: 0;
|
|
// XXX Border figured in here or is that handled elsewhere?
|
|
nsresult rv = viewer->SetBoundsWithFlags(mBounds, cvflags);
|
|
NS_ENSURE_SUCCESS(rv, NS_ERROR_FAILURE);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetPositionAndSize(int32_t* aX, int32_t* aY, int32_t* aWidth,
|
|
int32_t* aHeight) {
|
|
if (mParentWidget) {
|
|
// ensure size is up-to-date if window has changed resolution
|
|
LayoutDeviceIntRect r = mParentWidget->GetClientBounds();
|
|
SetPositionAndSize(mBounds.X(), mBounds.Y(), r.Width(), r.Height(), 0);
|
|
}
|
|
|
|
// We should really consider just getting this information from
|
|
// our window instead of duplicating the storage and code...
|
|
if (aWidth || aHeight) {
|
|
// Caller wants to know our size; make sure to give them up to
|
|
// date information.
|
|
RefPtr<Document> doc(do_GetInterface(GetAsSupports(mParent)));
|
|
if (doc) {
|
|
doc->FlushPendingNotifications(FlushType::Layout);
|
|
}
|
|
}
|
|
|
|
DoGetPositionAndSize(aX, aY, aWidth, aHeight);
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::DoGetPositionAndSize(int32_t* aX, int32_t* aY, int32_t* aWidth,
|
|
int32_t* aHeight) {
|
|
if (aX) {
|
|
*aX = mBounds.X();
|
|
}
|
|
if (aY) {
|
|
*aY = mBounds.Y();
|
|
}
|
|
if (aWidth) {
|
|
*aWidth = mBounds.Width();
|
|
}
|
|
if (aHeight) {
|
|
*aHeight = mBounds.Height();
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::Repaint(bool aForce) {
|
|
PresShell* presShell = GetPresShell();
|
|
NS_ENSURE_TRUE(presShell, NS_ERROR_FAILURE);
|
|
|
|
RefPtr<nsViewManager> viewManager = presShell->GetViewManager();
|
|
NS_ENSURE_TRUE(viewManager, NS_ERROR_FAILURE);
|
|
|
|
viewManager->InvalidateAllViews();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetParentWidget(nsIWidget** aParentWidget) {
|
|
NS_ENSURE_ARG_POINTER(aParentWidget);
|
|
|
|
*aParentWidget = mParentWidget;
|
|
NS_IF_ADDREF(*aParentWidget);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetParentWidget(nsIWidget* aParentWidget) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
mParentWidget = aParentWidget;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetParentNativeWindow(nativeWindow* aParentNativeWindow) {
|
|
NS_ENSURE_ARG_POINTER(aParentNativeWindow);
|
|
|
|
if (mParentWidget) {
|
|
*aParentNativeWindow = mParentWidget->GetNativeData(NS_NATIVE_WIDGET);
|
|
} else {
|
|
*aParentNativeWindow = nullptr;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetParentNativeWindow(nativeWindow aParentNativeWindow) {
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetNativeHandle(nsAString& aNativeHandle) {
|
|
// the nativeHandle should be accessed from nsIAppWindow
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetVisibility(bool* aVisibility) {
|
|
NS_ENSURE_ARG_POINTER(aVisibility);
|
|
|
|
*aVisibility = false;
|
|
|
|
if (!mContentViewer) {
|
|
return NS_OK;
|
|
}
|
|
|
|
PresShell* presShell = GetPresShell();
|
|
if (!presShell) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// get the view manager
|
|
nsViewManager* vm = presShell->GetViewManager();
|
|
NS_ENSURE_TRUE(vm, NS_ERROR_FAILURE);
|
|
|
|
// get the root view
|
|
nsView* view = vm->GetRootView(); // views are not ref counted
|
|
NS_ENSURE_TRUE(view, NS_ERROR_FAILURE);
|
|
|
|
// if our root view is hidden, we are not visible
|
|
if (view->GetVisibility() == nsViewVisibility_kHide) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// otherwise, we must walk up the document and view trees checking
|
|
// for a hidden view, unless we're an off screen browser, which
|
|
// would make this test meaningless.
|
|
|
|
RefPtr<nsDocShell> docShell = this;
|
|
RefPtr<nsDocShell> parentItem = docShell->GetInProcessParentDocshell();
|
|
while (parentItem) {
|
|
// Null-check for crash in bug 267804
|
|
if (!parentItem->GetPresShell()) {
|
|
MOZ_ASSERT_UNREACHABLE("parent docshell has null pres shell");
|
|
return NS_OK;
|
|
}
|
|
|
|
vm = docShell->GetPresShell()->GetViewManager();
|
|
if (vm) {
|
|
view = vm->GetRootView();
|
|
}
|
|
|
|
if (view) {
|
|
view = view->GetParent(); // anonymous inner view
|
|
if (view) {
|
|
view = view->GetParent(); // subdocumentframe's view
|
|
}
|
|
}
|
|
|
|
nsIFrame* frame = view ? view->GetFrame() : nullptr;
|
|
if (frame && !frame->IsVisibleConsideringAncestors(
|
|
nsIFrame::VISIBILITY_CROSS_CHROME_CONTENT_BOUNDARY)) {
|
|
return NS_OK;
|
|
}
|
|
|
|
docShell = parentItem;
|
|
parentItem = docShell->GetInProcessParentDocshell();
|
|
}
|
|
|
|
nsCOMPtr<nsIBaseWindow> treeOwnerAsWin(do_QueryInterface(mTreeOwner));
|
|
if (!treeOwnerAsWin) {
|
|
*aVisibility = true;
|
|
return NS_OK;
|
|
}
|
|
|
|
// Check with the tree owner as well to give embedders a chance to
|
|
// expose visibility as well.
|
|
return treeOwnerAsWin->GetVisibility(aVisibility);
|
|
}
|
|
|
|
void nsDocShell::ActivenessMaybeChanged() {
|
|
bool isActive = mBrowsingContext->IsActive();
|
|
if (RefPtr<PresShell> presShell = GetPresShell()) {
|
|
presShell->SetIsActive(isActive);
|
|
}
|
|
|
|
// Tell the window about it
|
|
if (mScriptGlobal) {
|
|
mScriptGlobal->SetIsBackground(!isActive);
|
|
if (RefPtr<Document> doc = mScriptGlobal->GetExtantDoc()) {
|
|
// Update orientation when the top-level browsing context becomes active.
|
|
if (isActive && mBrowsingContext->IsTop()) {
|
|
// We only care about the top-level browsing context.
|
|
uint16_t orientation = mBrowsingContext->GetOrientationLock();
|
|
ScreenOrientation::UpdateActiveOrientationLock(orientation);
|
|
}
|
|
|
|
doc->PostVisibilityUpdateEvent();
|
|
}
|
|
}
|
|
|
|
// Tell the nsDOMNavigationTiming about it
|
|
RefPtr<nsDOMNavigationTiming> timing = mTiming;
|
|
if (!timing && mContentViewer) {
|
|
if (Document* doc = mContentViewer->GetDocument()) {
|
|
timing = doc->GetNavigationTiming();
|
|
}
|
|
}
|
|
if (timing) {
|
|
timing->NotifyDocShellStateChanged(
|
|
isActive ? nsDOMNavigationTiming::DocShellState::eActive
|
|
: nsDOMNavigationTiming::DocShellState::eInactive);
|
|
}
|
|
|
|
// Restart or stop meta refresh timers if necessary
|
|
if (mDisableMetaRefreshWhenInactive) {
|
|
if (isActive) {
|
|
ResumeRefreshURIs();
|
|
} else {
|
|
SuspendRefreshURIs();
|
|
}
|
|
}
|
|
|
|
if (InputTaskManager::CanSuspendInputEvent()) {
|
|
mBrowsingContext->Group()->UpdateInputTaskManagerIfNeeded(isActive);
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetIsAppTab(bool aIsAppTab) {
|
|
mIsAppTab = aIsAppTab;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetIsAppTab(bool* aIsAppTab) {
|
|
*aIsAppTab = mIsAppTab;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetDefaultLoadFlags(uint32_t aDefaultLoadFlags) {
|
|
if (!mWillChangeProcess) {
|
|
// Intentionally ignoring handling discarded browsing contexts.
|
|
Unused << mBrowsingContext->SetDefaultLoadFlags(aDefaultLoadFlags);
|
|
} else {
|
|
// Bug 1623565: DevTools tries to clean up defaultLoadFlags on
|
|
// shutdown. Sorry DevTools, your DocShell is in another process.
|
|
NS_WARNING("nsDocShell::SetDefaultLoadFlags called on Zombie DocShell");
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetDefaultLoadFlags(uint32_t* aDefaultLoadFlags) {
|
|
*aDefaultLoadFlags = mBrowsingContext->GetDefaultLoadFlags();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetMixedContentChannel(nsIChannel* aMixedContentChannel) {
|
|
#ifdef DEBUG
|
|
// if the channel is non-null
|
|
if (aMixedContentChannel) {
|
|
NS_WARNING_ASSERTION(mBrowsingContext->IsTop(),
|
|
"Setting mMixedContentChannel on a docshell that is "
|
|
"not the root docshell");
|
|
}
|
|
#endif
|
|
mMixedContentChannel = aMixedContentChannel;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetFailedChannel(nsIChannel** aFailedChannel) {
|
|
NS_ENSURE_ARG_POINTER(aFailedChannel);
|
|
Document* doc = GetDocument();
|
|
if (!doc) {
|
|
*aFailedChannel = nullptr;
|
|
return NS_OK;
|
|
}
|
|
NS_IF_ADDREF(*aFailedChannel = doc->GetFailedChannel());
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetMixedContentChannel(nsIChannel** aMixedContentChannel) {
|
|
NS_ENSURE_ARG_POINTER(aMixedContentChannel);
|
|
NS_IF_ADDREF(*aMixedContentChannel = mMixedContentChannel);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetVisibility(bool aVisibility) {
|
|
// Show()/Hide() may change mContentViewer.
|
|
nsCOMPtr<nsIContentViewer> cv = mContentViewer;
|
|
if (!cv) {
|
|
return NS_OK;
|
|
}
|
|
if (aVisibility) {
|
|
cv->Show();
|
|
} else {
|
|
cv->Hide();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetEnabled(bool* aEnabled) {
|
|
NS_ENSURE_ARG_POINTER(aEnabled);
|
|
*aEnabled = true;
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetEnabled(bool aEnabled) { return NS_ERROR_NOT_IMPLEMENTED; }
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetFocus() { return NS_OK; }
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetMainWidget(nsIWidget** aMainWidget) {
|
|
// We don't create our own widget, so simply return the parent one.
|
|
return GetParentWidget(aMainWidget);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetTitle(nsAString& aTitle) {
|
|
aTitle = mTitle;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetTitle(const nsAString& aTitle) {
|
|
// Avoid unnecessary updates of the title if the URI and the title haven't
|
|
// changed.
|
|
if (mTitleValidForCurrentURI && mTitle == aTitle) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Store local title
|
|
mTitle = aTitle;
|
|
mTitleValidForCurrentURI = true;
|
|
|
|
// When title is set on the top object it should then be passed to the
|
|
// tree owner.
|
|
if (mBrowsingContext->IsTop()) {
|
|
nsCOMPtr<nsIBaseWindow> treeOwnerAsWin(do_QueryInterface(mTreeOwner));
|
|
if (treeOwnerAsWin) {
|
|
treeOwnerAsWin->SetTitle(aTitle);
|
|
}
|
|
}
|
|
|
|
if (mCurrentURI && mLoadType != LOAD_ERROR_PAGE) {
|
|
UpdateGlobalHistoryTitle(mCurrentURI);
|
|
}
|
|
|
|
// Update SessionHistory with the document's title.
|
|
if (mLoadType != LOAD_BYPASS_HISTORY && mLoadType != LOAD_ERROR_PAGE) {
|
|
SetTitleOnHistoryEntry();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetTitleOnHistoryEntry() {
|
|
if (mOSHE) {
|
|
mOSHE->SetTitle(mTitle);
|
|
}
|
|
|
|
if (mActiveEntry && mBrowsingContext) {
|
|
mActiveEntry->SetTitle(mTitle);
|
|
if (XRE_IsParentProcess()) {
|
|
SessionHistoryEntry* entry =
|
|
mBrowsingContext->Canonical()->GetActiveSessionHistoryEntry();
|
|
if (entry) {
|
|
entry->SetTitle(mTitle);
|
|
}
|
|
} else {
|
|
mozilla::Unused
|
|
<< ContentChild::GetSingleton()->SendSessionHistoryEntryTitle(
|
|
mBrowsingContext, mTitle);
|
|
}
|
|
}
|
|
}
|
|
|
|
nsPoint nsDocShell::GetCurScrollPos() {
|
|
nsPoint scrollPos;
|
|
if (nsIScrollableFrame* sf = GetRootScrollFrame()) {
|
|
scrollPos = sf->GetVisualViewportOffset();
|
|
}
|
|
return scrollPos;
|
|
}
|
|
|
|
nsresult nsDocShell::SetCurScrollPosEx(int32_t aCurHorizontalPos,
|
|
int32_t aCurVerticalPos) {
|
|
nsIScrollableFrame* sf = GetRootScrollFrame();
|
|
NS_ENSURE_TRUE(sf, NS_ERROR_FAILURE);
|
|
|
|
ScrollMode scrollMode =
|
|
sf->IsSmoothScroll() ? ScrollMode::SmoothMsd : ScrollMode::Instant;
|
|
|
|
nsPoint targetPos(aCurHorizontalPos, aCurVerticalPos);
|
|
sf->ScrollTo(targetPos, scrollMode);
|
|
|
|
// Set the visual viewport offset as well.
|
|
|
|
RefPtr<PresShell> presShell = GetPresShell();
|
|
NS_ENSURE_TRUE(presShell, NS_ERROR_FAILURE);
|
|
|
|
nsPresContext* presContext = presShell->GetPresContext();
|
|
NS_ENSURE_TRUE(presContext, NS_ERROR_FAILURE);
|
|
|
|
// Only the root content document can have a distinct visual viewport offset.
|
|
if (!presContext->IsRootContentDocument()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Not on a platform with a distinct visual viewport - don't bother setting
|
|
// the visual viewport offset.
|
|
if (!presShell->IsVisualViewportSizeSet()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
presShell->ScrollToVisual(targetPos, layers::FrameMetrics::eMainThread,
|
|
scrollMode);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetScrollbarPreference(mozilla::ScrollbarPreference aPref) {
|
|
if (mScrollbarPref == aPref) {
|
|
return;
|
|
}
|
|
mScrollbarPref = aPref;
|
|
auto* ps = GetPresShell();
|
|
if (!ps) {
|
|
return;
|
|
}
|
|
nsIFrame* scrollFrame = ps->GetRootScrollFrame();
|
|
if (!scrollFrame) {
|
|
return;
|
|
}
|
|
ps->FrameNeedsReflow(scrollFrame, IntrinsicDirty::StyleChange,
|
|
NS_FRAME_IS_DIRTY);
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsIRefreshURI
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::RefreshURI(nsIURI* aURI, nsIPrincipal* aPrincipal, int32_t aDelay,
|
|
bool aRepeat, bool aMetaRefresh) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
NS_ENSURE_ARG(aURI);
|
|
|
|
/* Check if Meta refresh/redirects are permitted. Some
|
|
* embedded applications may not want to do this.
|
|
* Must do this before sending out NOTIFY_REFRESH events
|
|
* because listeners may have side effects (e.g. displaying a
|
|
* button to manually trigger the refresh later).
|
|
*/
|
|
bool allowRedirects = true;
|
|
GetAllowMetaRedirects(&allowRedirects);
|
|
if (!allowRedirects) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// If any web progress listeners are listening for NOTIFY_REFRESH events,
|
|
// give them a chance to block this refresh.
|
|
bool sameURI;
|
|
nsresult rv = aURI->Equals(mCurrentURI, &sameURI);
|
|
if (NS_FAILED(rv)) {
|
|
sameURI = false;
|
|
}
|
|
if (!RefreshAttempted(this, aURI, aDelay, sameURI)) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsCOMPtr<nsITimerCallback> refreshTimer =
|
|
new nsRefreshTimer(this, aURI, aPrincipal, aDelay, aRepeat, aMetaRefresh);
|
|
|
|
BusyFlags busyFlags = GetBusyFlags();
|
|
|
|
if (!mRefreshURIList) {
|
|
mRefreshURIList = nsArray::Create();
|
|
}
|
|
|
|
if (busyFlags & BUSY_FLAGS_BUSY ||
|
|
(!mBrowsingContext->IsActive() && mDisableMetaRefreshWhenInactive)) {
|
|
// We don't want to create the timer right now. Instead queue up the
|
|
// request and trigger the timer in EndPageLoad() or whenever we become
|
|
// active.
|
|
mRefreshURIList->AppendElement(refreshTimer);
|
|
} else {
|
|
// There is no page loading going on right now. Create the
|
|
// timer and fire it right away.
|
|
nsCOMPtr<nsPIDOMWindowOuter> win = GetWindow();
|
|
NS_ENSURE_TRUE(win, NS_ERROR_FAILURE);
|
|
|
|
nsCOMPtr<nsITimer> timer;
|
|
MOZ_TRY_VAR(timer, NS_NewTimerWithCallback(refreshTimer, aDelay,
|
|
nsITimer::TYPE_ONE_SHOT));
|
|
|
|
mRefreshURIList->AppendElement(timer); // owning timer ref
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::ForceRefreshURIFromTimer(nsIURI* aURI,
|
|
nsIPrincipal* aPrincipal,
|
|
int32_t aDelay, bool aMetaRefresh,
|
|
nsITimer* aTimer) {
|
|
MOZ_ASSERT(aTimer, "Must have a timer here");
|
|
|
|
// Remove aTimer from mRefreshURIList if needed
|
|
if (mRefreshURIList) {
|
|
uint32_t n = 0;
|
|
mRefreshURIList->GetLength(&n);
|
|
|
|
for (uint32_t i = 0; i < n; ++i) {
|
|
nsCOMPtr<nsITimer> timer = do_QueryElementAt(mRefreshURIList, i);
|
|
if (timer == aTimer) {
|
|
mRefreshURIList->RemoveElementAt(i);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ForceRefreshURI(aURI, aPrincipal, aDelay, aMetaRefresh);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::ForceRefreshURI(nsIURI* aURI, nsIPrincipal* aPrincipal,
|
|
int32_t aDelay, bool aMetaRefresh) {
|
|
NS_ENSURE_ARG(aURI);
|
|
|
|
RefPtr<nsDocShellLoadState> loadState = new nsDocShellLoadState(aURI);
|
|
loadState->SetOriginalURI(mCurrentURI);
|
|
loadState->SetResultPrincipalURI(aURI);
|
|
loadState->SetResultPrincipalURIIsSome(true);
|
|
loadState->SetKeepResultPrincipalURIIfSet(true);
|
|
loadState->SetIsMetaRefresh(aMetaRefresh);
|
|
|
|
// Set the triggering pricipal to aPrincipal if available, or current
|
|
// document's principal otherwise.
|
|
nsCOMPtr<nsIPrincipal> principal = aPrincipal;
|
|
RefPtr<Document> doc = GetDocument();
|
|
if (!principal) {
|
|
if (!doc) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
principal = doc->NodePrincipal();
|
|
}
|
|
loadState->SetTriggeringPrincipal(principal);
|
|
if (doc) {
|
|
loadState->SetCsp(doc->GetCsp());
|
|
loadState->SetHasValidUserGestureActivation(
|
|
doc->HasValidTransientUserGestureActivation());
|
|
loadState->SetTriggeringSandboxFlags(doc->GetSandboxFlags());
|
|
}
|
|
|
|
loadState->SetPrincipalIsExplicit(true);
|
|
|
|
/* Check if this META refresh causes a redirection
|
|
* to another site.
|
|
*/
|
|
bool equalUri = false;
|
|
nsresult rv = aURI->Equals(mCurrentURI, &equalUri);
|
|
|
|
nsCOMPtr<nsIReferrerInfo> referrerInfo;
|
|
if (NS_SUCCEEDED(rv) && (!equalUri) && aMetaRefresh &&
|
|
aDelay <= REFRESH_REDIRECT_TIMER) {
|
|
/* It is a META refresh based redirection within the threshold time
|
|
* we have in mind (15000 ms as defined by REFRESH_REDIRECT_TIMER).
|
|
* Pass a REPLACE flag to LoadURI().
|
|
*/
|
|
loadState->SetLoadType(LOAD_NORMAL_REPLACE);
|
|
|
|
/* For redirects we mimic HTTP, which passes the
|
|
* original referrer.
|
|
* We will pass in referrer but will not send to server
|
|
*/
|
|
if (mReferrerInfo) {
|
|
referrerInfo = static_cast<ReferrerInfo*>(mReferrerInfo.get())
|
|
->CloneWithNewSendReferrer(false);
|
|
}
|
|
} else {
|
|
loadState->SetLoadType(LOAD_REFRESH);
|
|
/* We do need to pass in a referrer, but we don't want it to
|
|
* be sent to the server.
|
|
* For most refreshes the current URI is an appropriate
|
|
* internal referrer.
|
|
*/
|
|
referrerInfo = new ReferrerInfo(mCurrentURI, ReferrerPolicy::_empty, false);
|
|
}
|
|
|
|
loadState->SetReferrerInfo(referrerInfo);
|
|
loadState->SetLoadFlags(
|
|
nsIWebNavigation::LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL);
|
|
loadState->SetFirstParty(true);
|
|
|
|
/*
|
|
* LoadURI(...) will cancel all refresh timers... This causes the
|
|
* Timer and its refreshData instance to be released...
|
|
*/
|
|
LoadURI(loadState, false);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::SetupRefreshURIFromHeader(nsIURI* aBaseURI,
|
|
nsIPrincipal* aPrincipal,
|
|
uint64_t aInnerWindowID,
|
|
const nsACString& aHeader) {
|
|
if (mIsBeingDestroyed) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// Refresh headers are parsed with the following format in mind
|
|
// <META HTTP-EQUIV=REFRESH CONTENT="5; URL=http://uri">
|
|
// By the time we are here, the following is true:
|
|
// header = "REFRESH"
|
|
// content = "5; URL=http://uri" // note the URL attribute is
|
|
// optional, if it is absent, the currently loaded url is used.
|
|
// Also note that the seconds and URL separator can be either
|
|
// a ';' or a ','. The ',' separator should be illegal but CNN
|
|
// is using it.
|
|
//
|
|
// We need to handle the following strings, where
|
|
// - X is a set of digits
|
|
// - URI is either a relative or absolute URI
|
|
//
|
|
// Note that URI should start with "url=" but we allow omission
|
|
//
|
|
// "" || ";" || ","
|
|
// empty string. use the currently loaded URI
|
|
// and refresh immediately.
|
|
// "X" || "X;" || "X,"
|
|
// Refresh the currently loaded URI in X seconds.
|
|
// "X; URI" || "X, URI"
|
|
// Refresh using URI as the destination in X seconds.
|
|
// "URI" || "; URI" || ", URI"
|
|
// Refresh immediately using URI as the destination.
|
|
//
|
|
// Currently, anything immediately following the URI, if
|
|
// separated by any char in the set "'\"\t\r\n " will be
|
|
// ignored. So "10; url=go.html ; foo=bar" will work,
|
|
// and so will "10; url='go.html'; foo=bar". However,
|
|
// "10; url=go.html; foo=bar" will result in the uri
|
|
// "go.html;" since ';' and ',' are valid uri characters.
|
|
//
|
|
// Note that we need to remove any tokens wrapping the URI.
|
|
// These tokens currently include spaces, double and single
|
|
// quotes.
|
|
|
|
// when done, seconds is 0 or the given number of seconds
|
|
// uriAttrib is empty or the URI specified
|
|
MOZ_ASSERT(aPrincipal);
|
|
|
|
nsAutoCString uriAttrib;
|
|
int32_t seconds = 0;
|
|
bool specifiesSeconds = false;
|
|
|
|
nsACString::const_iterator iter, tokenStart, doneIterating;
|
|
|
|
aHeader.BeginReading(iter);
|
|
aHeader.EndReading(doneIterating);
|
|
|
|
// skip leading whitespace
|
|
while (iter != doneIterating && nsCRT::IsAsciiSpace(*iter)) {
|
|
++iter;
|
|
}
|
|
|
|
tokenStart = iter;
|
|
|
|
// skip leading + and -
|
|
if (iter != doneIterating && (*iter == '-' || *iter == '+')) {
|
|
++iter;
|
|
}
|
|
|
|
// parse number
|
|
while (iter != doneIterating && (*iter >= '0' && *iter <= '9')) {
|
|
seconds = seconds * 10 + (*iter - '0');
|
|
specifiesSeconds = true;
|
|
++iter;
|
|
}
|
|
|
|
if (iter != doneIterating) {
|
|
// if we started with a '-', number is negative
|
|
if (*tokenStart == '-') {
|
|
seconds = -seconds;
|
|
}
|
|
|
|
// skip to next ';' or ','
|
|
nsACString::const_iterator iterAfterDigit = iter;
|
|
while (iter != doneIterating && !(*iter == ';' || *iter == ',')) {
|
|
if (specifiesSeconds) {
|
|
// Non-whitespace characters here mean that the string is
|
|
// malformed but tolerate sites that specify a decimal point,
|
|
// even though meta refresh only works on whole seconds.
|
|
if (iter == iterAfterDigit && !nsCRT::IsAsciiSpace(*iter) &&
|
|
*iter != '.') {
|
|
// The characters between the seconds and the next
|
|
// section are just garbage!
|
|
// e.g. content="2a0z+,URL=http://www.mozilla.org/"
|
|
// Just ignore this redirect.
|
|
return NS_ERROR_FAILURE;
|
|
} else if (nsCRT::IsAsciiSpace(*iter)) {
|
|
// We've had at least one whitespace so tolerate the mistake
|
|
// and drop through.
|
|
// e.g. content="10 foo"
|
|
++iter;
|
|
break;
|
|
}
|
|
}
|
|
++iter;
|
|
}
|
|
|
|
// skip any remaining whitespace
|
|
while (iter != doneIterating && nsCRT::IsAsciiSpace(*iter)) {
|
|
++iter;
|
|
}
|
|
|
|
// skip ';' or ','
|
|
if (iter != doneIterating && (*iter == ';' || *iter == ',')) {
|
|
++iter;
|
|
}
|
|
|
|
// skip whitespace
|
|
while (iter != doneIterating && nsCRT::IsAsciiSpace(*iter)) {
|
|
++iter;
|
|
}
|
|
}
|
|
|
|
// possible start of URI
|
|
tokenStart = iter;
|
|
|
|
// skip "url = " to real start of URI
|
|
if (iter != doneIterating && (*iter == 'u' || *iter == 'U')) {
|
|
++iter;
|
|
if (iter != doneIterating && (*iter == 'r' || *iter == 'R')) {
|
|
++iter;
|
|
if (iter != doneIterating && (*iter == 'l' || *iter == 'L')) {
|
|
++iter;
|
|
|
|
// skip whitespace
|
|
while (iter != doneIterating && nsCRT::IsAsciiSpace(*iter)) {
|
|
++iter;
|
|
}
|
|
|
|
if (iter != doneIterating && *iter == '=') {
|
|
++iter;
|
|
|
|
// skip whitespace
|
|
while (iter != doneIterating && nsCRT::IsAsciiSpace(*iter)) {
|
|
++iter;
|
|
}
|
|
|
|
// found real start of URI
|
|
tokenStart = iter;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// skip a leading '"' or '\''.
|
|
|
|
bool isQuotedURI = false;
|
|
if (tokenStart != doneIterating &&
|
|
(*tokenStart == '"' || *tokenStart == '\'')) {
|
|
isQuotedURI = true;
|
|
++tokenStart;
|
|
}
|
|
|
|
// set iter to start of URI
|
|
iter = tokenStart;
|
|
|
|
// tokenStart here points to the beginning of URI
|
|
|
|
// grab the rest of the URI
|
|
while (iter != doneIterating) {
|
|
if (isQuotedURI && (*iter == '"' || *iter == '\'')) {
|
|
break;
|
|
}
|
|
++iter;
|
|
}
|
|
|
|
// move iter one back if the last character is a '"' or '\''
|
|
if (iter != tokenStart && isQuotedURI) {
|
|
--iter;
|
|
if (!(*iter == '"' || *iter == '\'')) {
|
|
++iter;
|
|
}
|
|
}
|
|
|
|
// URI is whatever's contained from tokenStart to iter.
|
|
// note: if tokenStart == doneIterating, so is iter.
|
|
|
|
nsresult rv = NS_OK;
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
bool specifiesURI = false;
|
|
if (tokenStart == iter) {
|
|
uri = aBaseURI;
|
|
} else {
|
|
uriAttrib = Substring(tokenStart, iter);
|
|
// NS_NewURI takes care of any whitespace surrounding the URL
|
|
rv = NS_NewURI(getter_AddRefs(uri), uriAttrib, nullptr, aBaseURI);
|
|
specifiesURI = true;
|
|
}
|
|
|
|
// No URI or seconds were specified
|
|
if (!specifiesSeconds && !specifiesURI) {
|
|
// Do nothing because the alternative is to spin around in a refresh
|
|
// loop forever!
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
nsCOMPtr<nsIScriptSecurityManager> securityManager(
|
|
do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID, &rv));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
rv = securityManager->CheckLoadURIWithPrincipal(
|
|
aPrincipal, uri,
|
|
nsIScriptSecurityManager::LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT,
|
|
aInnerWindowID);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
bool isjs = true;
|
|
rv = NS_URIChainHasFlags(
|
|
uri, nsIProtocolHandler::URI_OPENING_EXECUTES_SCRIPT, &isjs);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
if (isjs) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
// Since we can't travel back in time yet, just pretend
|
|
// negative numbers do nothing at all.
|
|
if (seconds < 0) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
rv = RefreshURI(uri, aPrincipal, seconds * 1000, false, true);
|
|
}
|
|
}
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetupRefreshURI(nsIChannel* aChannel) {
|
|
nsresult rv;
|
|
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(aChannel, &rv));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
nsAutoCString refreshHeader;
|
|
rv = httpChannel->GetResponseHeader("refresh"_ns, refreshHeader);
|
|
|
|
if (!refreshHeader.IsEmpty()) {
|
|
nsCOMPtr<nsIScriptSecurityManager> secMan =
|
|
do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID, &rv);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
nsCOMPtr<nsIPrincipal> principal;
|
|
rv = secMan->GetChannelResultPrincipal(aChannel,
|
|
getter_AddRefs(principal));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
SetupReferrerInfoFromChannel(aChannel);
|
|
// We have no idea what window id to use for error reporting
|
|
// here, so just pass 0.
|
|
rv = SetupRefreshURIFromHeader(mCurrentURI, principal, 0, refreshHeader);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
return NS_REFRESHURI_HEADER_FOUND;
|
|
}
|
|
}
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
static void DoCancelRefreshURITimers(nsIMutableArray* aTimerList) {
|
|
if (!aTimerList) {
|
|
return;
|
|
}
|
|
|
|
uint32_t n = 0;
|
|
aTimerList->GetLength(&n);
|
|
|
|
while (n) {
|
|
nsCOMPtr<nsITimer> timer(do_QueryElementAt(aTimerList, --n));
|
|
|
|
aTimerList->RemoveElementAt(n); // bye bye owning timer ref
|
|
|
|
if (timer) {
|
|
timer->Cancel();
|
|
}
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::CancelRefreshURITimers() {
|
|
DoCancelRefreshURITimers(mRefreshURIList);
|
|
DoCancelRefreshURITimers(mSavedRefreshURIList);
|
|
mRefreshURIList = nullptr;
|
|
mSavedRefreshURIList = nullptr;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetRefreshPending(bool* aResult) {
|
|
if (!mRefreshURIList) {
|
|
*aResult = false;
|
|
return NS_OK;
|
|
}
|
|
|
|
uint32_t count;
|
|
nsresult rv = mRefreshURIList->GetLength(&count);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
*aResult = (count != 0);
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SuspendRefreshURIs() {
|
|
if (mRefreshURIList) {
|
|
uint32_t n = 0;
|
|
mRefreshURIList->GetLength(&n);
|
|
|
|
for (uint32_t i = 0; i < n; ++i) {
|
|
nsCOMPtr<nsITimer> timer = do_QueryElementAt(mRefreshURIList, i);
|
|
if (!timer) {
|
|
continue; // this must be a nsRefreshURI already
|
|
}
|
|
|
|
// Replace this timer object with a nsRefreshTimer object.
|
|
nsCOMPtr<nsITimerCallback> callback;
|
|
timer->GetCallback(getter_AddRefs(callback));
|
|
|
|
timer->Cancel();
|
|
|
|
mRefreshURIList->ReplaceElementAt(callback, i);
|
|
}
|
|
}
|
|
|
|
// Suspend refresh URIs for our child shells as well.
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> shell = do_QueryObject(child);
|
|
if (shell) {
|
|
shell->SuspendRefreshURIs();
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::ResumeRefreshURIs() {
|
|
RefreshURIFromQueue();
|
|
|
|
// Resume refresh URIs for our child shells as well.
|
|
for (auto* child : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> shell = do_QueryObject(child);
|
|
if (shell) {
|
|
shell->ResumeRefreshURIs();
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::RefreshURIFromQueue() {
|
|
if (!mRefreshURIList) {
|
|
return NS_OK;
|
|
}
|
|
uint32_t n = 0;
|
|
mRefreshURIList->GetLength(&n);
|
|
|
|
while (n) {
|
|
nsCOMPtr<nsITimerCallback> refreshInfo =
|
|
do_QueryElementAt(mRefreshURIList, --n);
|
|
|
|
if (refreshInfo) {
|
|
// This is the nsRefreshTimer object, waiting to be
|
|
// setup in a timer object and fired.
|
|
// Create the timer and trigger it.
|
|
uint32_t delay = static_cast<nsRefreshTimer*>(
|
|
static_cast<nsITimerCallback*>(refreshInfo))
|
|
->GetDelay();
|
|
nsCOMPtr<nsPIDOMWindowOuter> win = GetWindow();
|
|
if (win) {
|
|
nsCOMPtr<nsITimer> timer;
|
|
NS_NewTimerWithCallback(getter_AddRefs(timer), refreshInfo, delay,
|
|
nsITimer::TYPE_ONE_SHOT);
|
|
|
|
if (timer) {
|
|
// Replace the nsRefreshTimer element in the queue with
|
|
// its corresponding timer object, so that in case another
|
|
// load comes through before the timer can go off, the timer will
|
|
// get cancelled in CancelRefreshURITimer()
|
|
mRefreshURIList->ReplaceElementAt(timer, n);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::Embed(nsIContentViewer* aContentViewer,
|
|
WindowGlobalChild* aWindowActor,
|
|
bool aIsTransientAboutBlank, bool aPersist) {
|
|
// Save the LayoutHistoryState of the previous document, before
|
|
// setting up new document
|
|
PersistLayoutHistoryState();
|
|
|
|
nsresult rv = SetupNewViewer(aContentViewer, aWindowActor);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// XXX What if SetupNewViewer fails?
|
|
if (mozilla::SessionHistoryInParent() ? !!mLoadingEntry : !!mLSHE) {
|
|
// Set history.state
|
|
SetDocCurrentStateObj(mLSHE,
|
|
mLoadingEntry ? &mLoadingEntry->mInfo : nullptr);
|
|
}
|
|
|
|
if (mLSHE) {
|
|
// Restore the editing state, if it's stored in session history.
|
|
if (mLSHE->HasDetachedEditor()) {
|
|
ReattachEditorToWindow(mLSHE);
|
|
}
|
|
|
|
SetHistoryEntryAndUpdateBC(Nothing(), Some<nsISHEntry*>(mLSHE));
|
|
}
|
|
|
|
if (!aIsTransientAboutBlank && mozilla::SessionHistoryInParent()) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug, ("document %p Embed", this));
|
|
MoveLoadingToActiveEntry(aPersist);
|
|
}
|
|
|
|
bool updateHistory = true;
|
|
|
|
// Determine if this type of load should update history
|
|
switch (mLoadType) {
|
|
case LOAD_NORMAL_REPLACE:
|
|
case LOAD_STOP_CONTENT_AND_REPLACE:
|
|
case LOAD_RELOAD_BYPASS_CACHE:
|
|
case LOAD_RELOAD_BYPASS_PROXY:
|
|
case LOAD_RELOAD_BYPASS_PROXY_AND_CACHE:
|
|
case LOAD_REPLACE_BYPASS_CACHE:
|
|
updateHistory = false;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if (!updateHistory) {
|
|
SetLayoutHistoryState(nullptr);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsIWebProgressListener
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::OnProgressChange(nsIWebProgress* aProgress, nsIRequest* aRequest,
|
|
int32_t aCurSelfProgress, int32_t aMaxSelfProgress,
|
|
int32_t aCurTotalProgress,
|
|
int32_t aMaxTotalProgress) {
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::OnStateChange(nsIWebProgress* aProgress, nsIRequest* aRequest,
|
|
uint32_t aStateFlags, nsresult aStatus) {
|
|
if ((~aStateFlags & (STATE_START | STATE_IS_NETWORK)) == 0) {
|
|
// Save timing statistics.
|
|
nsCOMPtr<nsIChannel> channel(do_QueryInterface(aRequest));
|
|
nsCOMPtr<nsIURI> uri;
|
|
channel->GetURI(getter_AddRefs(uri));
|
|
nsAutoCString aURI;
|
|
uri->GetAsciiSpec(aURI);
|
|
|
|
if (this == aProgress) {
|
|
mozilla::Unused << MaybeInitTiming();
|
|
mTiming->NotifyFetchStart(uri,
|
|
ConvertLoadTypeToNavigationType(mLoadType));
|
|
// If we are starting a DocumentChannel, we need to pass the timing
|
|
// statistics so that should a process switch occur, the starting type can
|
|
// be passed to the new DocShell running in the other content process.
|
|
if (RefPtr<DocumentChannel> docChannel = do_QueryObject(aRequest)) {
|
|
docChannel->SetNavigationTiming(mTiming);
|
|
}
|
|
}
|
|
|
|
// Page has begun to load
|
|
mBusyFlags = (BusyFlags)(BUSY_FLAGS_BUSY | BUSY_FLAGS_BEFORE_PAGE_LOAD);
|
|
|
|
if ((aStateFlags & STATE_RESTORING) == 0) {
|
|
// Show the progress cursor if the pref is set
|
|
if (StaticPrefs::ui_use_activity_cursor()) {
|
|
nsCOMPtr<nsIWidget> mainWidget;
|
|
GetMainWidget(getter_AddRefs(mainWidget));
|
|
if (mainWidget) {
|
|
mainWidget->SetCursor(eCursor_spinning, nullptr, 0, 0);
|
|
}
|
|
}
|
|
}
|
|
} else if ((~aStateFlags & (STATE_TRANSFERRING | STATE_IS_DOCUMENT)) == 0) {
|
|
// Page is loading
|
|
mBusyFlags = (BusyFlags)(BUSY_FLAGS_BUSY | BUSY_FLAGS_PAGE_LOADING);
|
|
} else if ((aStateFlags & STATE_STOP) && (aStateFlags & STATE_IS_NETWORK)) {
|
|
// Page has finished loading
|
|
mBusyFlags = BUSY_FLAGS_NONE;
|
|
|
|
// Hide the progress cursor if the pref is set
|
|
if (StaticPrefs::ui_use_activity_cursor()) {
|
|
nsCOMPtr<nsIWidget> mainWidget;
|
|
GetMainWidget(getter_AddRefs(mainWidget));
|
|
if (mainWidget) {
|
|
mainWidget->SetCursor(eCursor_standard, nullptr, 0, 0);
|
|
}
|
|
}
|
|
}
|
|
if ((~aStateFlags & (STATE_IS_DOCUMENT | STATE_STOP)) == 0) {
|
|
nsCOMPtr<nsIWebProgress> webProgress =
|
|
do_QueryInterface(GetAsSupports(this));
|
|
// Is the document stop notification for this document?
|
|
if (aProgress == webProgress.get()) {
|
|
nsCOMPtr<nsIChannel> channel(do_QueryInterface(aRequest));
|
|
EndPageLoad(aProgress, channel, aStatus);
|
|
}
|
|
}
|
|
// note that redirect state changes will go through here as well, but it
|
|
// is better to handle those in OnRedirectStateChange where more
|
|
// information is available.
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::OnLocationChange(nsIWebProgress* aProgress, nsIRequest* aRequest,
|
|
nsIURI* aURI, uint32_t aFlags) {
|
|
// Since we've now changed Documents, notify the BrowsingContext that we've
|
|
// changed. Ideally we'd just let the BrowsingContext do this when it
|
|
// changes the current window global, but that happens before this and we
|
|
// have a lot of tests that depend on the specific ordering of messages.
|
|
bool isTopLevel = false;
|
|
if (XRE_IsParentProcess() &&
|
|
!(aFlags & nsIWebProgressListener::LOCATION_CHANGE_SAME_DOCUMENT) &&
|
|
NS_SUCCEEDED(aProgress->GetIsTopLevel(&isTopLevel)) && isTopLevel) {
|
|
GetBrowsingContext()->Canonical()->UpdateSecurityState();
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::OnRedirectStateChange(nsIChannel* aOldChannel,
|
|
nsIChannel* aNewChannel,
|
|
uint32_t aRedirectFlags,
|
|
uint32_t aStateFlags) {
|
|
NS_ASSERTION(aStateFlags & STATE_REDIRECTING,
|
|
"Calling OnRedirectStateChange when there is no redirect");
|
|
|
|
// If mixed content is allowed for the old channel, we forward
|
|
// the permission to the new channel if it has the same origin
|
|
// as the old one.
|
|
if (mMixedContentChannel && mMixedContentChannel == aOldChannel) {
|
|
nsresult rv =
|
|
nsContentUtils::CheckSameOrigin(mMixedContentChannel, aNewChannel);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
SetMixedContentChannel(aNewChannel); // Same origin: forward permission.
|
|
} else {
|
|
SetMixedContentChannel(
|
|
nullptr); // Different origin: clear mMixedContentChannel.
|
|
}
|
|
}
|
|
|
|
if (!(aStateFlags & STATE_IS_DOCUMENT)) {
|
|
return; // not a toplevel document
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> oldURI, newURI;
|
|
aOldChannel->GetURI(getter_AddRefs(oldURI));
|
|
aNewChannel->GetURI(getter_AddRefs(newURI));
|
|
if (!oldURI || !newURI) {
|
|
return;
|
|
}
|
|
|
|
// DocumentChannel adds redirect chain to global history in the parent
|
|
// process. The redirect chain can't be queried from the content process, so
|
|
// there's no need to update global history here.
|
|
RefPtr<DocumentChannel> docChannel = do_QueryObject(aOldChannel);
|
|
if (!docChannel) {
|
|
// Below a URI visit is saved (see AddURIVisit method doc).
|
|
// The visit chain looks something like:
|
|
// ...
|
|
// Site N - 1
|
|
// => Site N
|
|
// (redirect to =>) Site N + 1 (we are here!)
|
|
|
|
// Get N - 1 and transition type
|
|
nsCOMPtr<nsIURI> previousURI;
|
|
uint32_t previousFlags = 0;
|
|
ExtractLastVisit(aOldChannel, getter_AddRefs(previousURI), &previousFlags);
|
|
|
|
if (aRedirectFlags & nsIChannelEventSink::REDIRECT_INTERNAL ||
|
|
net::ChannelIsPost(aOldChannel)) {
|
|
// 1. Internal redirects are ignored because they are specific to the
|
|
// channel implementation.
|
|
// 2. POSTs are not saved by global history.
|
|
//
|
|
// Regardless, we need to propagate the previous visit to the new
|
|
// channel.
|
|
SaveLastVisit(aNewChannel, previousURI, previousFlags);
|
|
} else {
|
|
// Get the HTTP response code, if available.
|
|
uint32_t responseStatus = 0;
|
|
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aOldChannel);
|
|
if (httpChannel) {
|
|
Unused << httpChannel->GetResponseStatus(&responseStatus);
|
|
}
|
|
|
|
// Add visit N -1 => N
|
|
AddURIVisit(oldURI, previousURI, previousFlags, responseStatus);
|
|
|
|
// Since N + 1 could be the final destination, we will not save N => N + 1
|
|
// here. OnNewURI will do that, so we will cache it.
|
|
SaveLastVisit(aNewChannel, oldURI, aRedirectFlags);
|
|
}
|
|
}
|
|
|
|
// check if the new load should go through the application cache.
|
|
nsCOMPtr<nsIApplicationCacheChannel> appCacheChannel =
|
|
do_QueryInterface(aNewChannel);
|
|
if (appCacheChannel && !docChannel) {
|
|
if (GeckoProcessType_Default != XRE_GetProcessType()) {
|
|
// Permission will be checked in the parent process.
|
|
appCacheChannel->SetChooseApplicationCache(true);
|
|
} else {
|
|
nsCOMPtr<nsIScriptSecurityManager> secMan =
|
|
do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID);
|
|
|
|
if (secMan) {
|
|
nsCOMPtr<nsIPrincipal> principal;
|
|
secMan->GetDocShellContentPrincipal(newURI, this,
|
|
getter_AddRefs(principal));
|
|
appCacheChannel->SetChooseApplicationCache(
|
|
NS_ShouldCheckAppCache(principal));
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!(aRedirectFlags & nsIChannelEventSink::REDIRECT_INTERNAL) &&
|
|
mLoadType & (LOAD_CMD_RELOAD | LOAD_CMD_HISTORY)) {
|
|
mLoadType = LOAD_NORMAL_REPLACE;
|
|
SetHistoryEntryAndUpdateBC(Some(nullptr), Nothing());
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::OnStatusChange(nsIWebProgress* aWebProgress, nsIRequest* aRequest,
|
|
nsresult aStatus, const char16_t* aMessage) {
|
|
MOZ_ASSERT_UNREACHABLE("notification excluded in AddProgressListener(...)");
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::OnSecurityChange(nsIWebProgress* aWebProgress, nsIRequest* aRequest,
|
|
uint32_t aState) {
|
|
MOZ_ASSERT_UNREACHABLE("notification excluded in AddProgressListener(...)");
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::OnContentBlockingEvent(nsIWebProgress* aWebProgress,
|
|
nsIRequest* aRequest, uint32_t aEvent) {
|
|
MOZ_ASSERT_UNREACHABLE("notification excluded in AddProgressListener(...)");
|
|
return NS_OK;
|
|
}
|
|
|
|
already_AddRefed<nsIURIFixupInfo> nsDocShell::KeywordToURI(
|
|
const nsACString& aKeyword, bool aIsPrivateContext) {
|
|
nsCOMPtr<nsIURIFixupInfo> info;
|
|
if (!XRE_IsContentProcess()) {
|
|
nsCOMPtr<nsIURIFixup> uriFixup = components::URIFixup::Service();
|
|
if (uriFixup) {
|
|
uriFixup->KeywordToURI(aKeyword, aIsPrivateContext, getter_AddRefs(info));
|
|
}
|
|
}
|
|
return info.forget();
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<nsIURI> nsDocShell::MaybeFixBadCertDomainErrorURI(
|
|
nsIChannel* aChannel, nsIURI* aUrl) {
|
|
if (!aChannel) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsresult rv = NS_OK;
|
|
nsAutoCString host;
|
|
rv = aUrl->GetAsciiHost(host);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
// No point in going further if "www." is included in the hostname
|
|
// already. That is the only hueristic we're applying in this function.
|
|
if (StringBeginsWith(host, "www."_ns)) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Return if fixup enable pref is turned off.
|
|
if (!mozilla::StaticPrefs::security_bad_cert_domain_error_url_fix_enabled()) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Return if scheme is not HTTPS.
|
|
if (!SchemeIsHTTPS(aUrl)) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsILoadInfo> info = aChannel->LoadInfo();
|
|
if (!info) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Skip doing the fixup if our channel was redirected, because we
|
|
// shouldn't be guessing things about the post-redirect URI.
|
|
if (!info->RedirectChain().IsEmpty()) {
|
|
return nullptr;
|
|
}
|
|
|
|
int32_t port = 0;
|
|
rv = aUrl->GetPort(&port);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Don't fix up hosts with ports.
|
|
if (port != -1) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Don't fix up localhost url.
|
|
if (host == "localhost") {
|
|
return nullptr;
|
|
}
|
|
|
|
// Don't fix up hostnames with IP address.
|
|
if (net_IsValidIPv4Addr(host) || net_IsValidIPv6Addr(host)) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsAutoCString userPass;
|
|
rv = aUrl->GetUserPass(userPass);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Security - URLs with user / password info should NOT be modified.
|
|
if (!userPass.IsEmpty()) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsISupports> securityInfo;
|
|
rv = aChannel->GetSecurityInfo(getter_AddRefs(securityInfo));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsITransportSecurityInfo> tsi = do_QueryInterface(securityInfo);
|
|
if (NS_WARN_IF(!tsi)) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsIX509Cert> cert;
|
|
rv = tsi->GetServerCert(getter_AddRefs(cert));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsTArray<uint8_t> certBytes;
|
|
rv = cert->GetRawDER(certBytes);
|
|
if (NS_FAILED(rv)) {
|
|
return nullptr;
|
|
}
|
|
|
|
mozilla::pkix::Input serverCertInput;
|
|
mozilla::pkix::Result rv1 =
|
|
serverCertInput.Init(certBytes.Elements(), certBytes.Length());
|
|
if (rv1 != mozilla::pkix::Success) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsAutoCString newHost("www."_ns);
|
|
newHost.Append(host);
|
|
|
|
mozilla::pkix::Input newHostInput;
|
|
rv1 = newHostInput.Init(
|
|
BitwiseCast<const uint8_t*, const char*>(newHost.BeginReading()),
|
|
newHost.Length());
|
|
if (rv1 != mozilla::pkix::Success) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Check if adding a "www." prefix to the request's hostname will
|
|
// cause the response's certificate to match.
|
|
mozilla::psm::BRNameMatchingPolicy nameMatchingPolicy(
|
|
mozilla::psm::BRNameMatchingPolicy::Mode::Enforce);
|
|
rv1 = mozilla::pkix::CheckCertHostname(serverCertInput, newHostInput,
|
|
nameMatchingPolicy);
|
|
if (rv1 != mozilla::pkix::Success) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> newURI;
|
|
Unused << NS_MutateURI(aUrl).SetHost(newHost).Finalize(
|
|
getter_AddRefs(newURI));
|
|
|
|
return newURI.forget();
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<nsIURI> nsDocShell::AttemptURIFixup(
|
|
nsIChannel* aChannel, nsresult aStatus,
|
|
const mozilla::Maybe<nsCString>& aOriginalURIString, uint32_t aLoadType,
|
|
bool aIsTopFrame, bool aAllowKeywordFixup, bool aUsePrivateBrowsing,
|
|
bool aNotifyKeywordSearchLoading, nsIInputStream** aNewPostData) {
|
|
if (aStatus != NS_ERROR_UNKNOWN_HOST && aStatus != NS_ERROR_NET_RESET &&
|
|
aStatus != NS_ERROR_CONNECTION_REFUSED &&
|
|
aStatus !=
|
|
mozilla::psm::GetXPCOMFromNSSError(SSL_ERROR_BAD_CERT_DOMAIN)) {
|
|
return nullptr;
|
|
}
|
|
|
|
if (!(aLoadType == LOAD_NORMAL && aIsTopFrame) && !aAllowKeywordFixup) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> url;
|
|
nsresult rv = aChannel->GetURI(getter_AddRefs(url));
|
|
if (NS_FAILED(rv)) {
|
|
return nullptr;
|
|
}
|
|
|
|
//
|
|
// Try and make an alternative URI from the old one
|
|
//
|
|
nsCOMPtr<nsIURI> newURI;
|
|
nsCOMPtr<nsIInputStream> newPostData;
|
|
|
|
nsAutoCString oldSpec;
|
|
url->GetSpec(oldSpec);
|
|
|
|
//
|
|
// First try keyword fixup
|
|
//
|
|
nsAutoString keywordProviderName, keywordAsSent;
|
|
if (aStatus == NS_ERROR_UNKNOWN_HOST && aAllowKeywordFixup) {
|
|
// we should only perform a keyword search under the following
|
|
// conditions:
|
|
// (0) Pref keyword.enabled is true
|
|
// (1) the url scheme is http (or https)
|
|
// (2) the url does not have a protocol scheme
|
|
// If we don't enforce such a policy, then we end up doing
|
|
// keyword searchs on urls we don't intend like imap, file,
|
|
// mailbox, etc. This could lead to a security problem where we
|
|
// send data to the keyword server that we shouldn't be.
|
|
// Someone needs to clean up keywords in general so we can
|
|
// determine on a per url basis if we want keywords
|
|
// enabled...this is just a bandaid...
|
|
nsAutoCString scheme;
|
|
Unused << url->GetScheme(scheme);
|
|
if (Preferences::GetBool("keyword.enabled", false) &&
|
|
StringBeginsWith(scheme, "http"_ns)) {
|
|
bool attemptFixup = false;
|
|
nsAutoCString host;
|
|
Unused << url->GetHost(host);
|
|
if (host.FindChar('.') == kNotFound) {
|
|
attemptFixup = true;
|
|
} else {
|
|
// For domains with dots, we check the public suffix validity.
|
|
nsCOMPtr<nsIEffectiveTLDService> tldService =
|
|
do_GetService(NS_EFFECTIVETLDSERVICE_CONTRACTID);
|
|
if (tldService) {
|
|
nsAutoCString suffix;
|
|
attemptFixup =
|
|
NS_SUCCEEDED(tldService->GetKnownPublicSuffix(url, suffix)) &&
|
|
suffix.IsEmpty();
|
|
}
|
|
}
|
|
if (attemptFixup) {
|
|
nsCOMPtr<nsIURIFixupInfo> info;
|
|
// only send non-qualified hosts to the keyword server
|
|
if (aOriginalURIString && !aOriginalURIString->IsEmpty()) {
|
|
info = KeywordToURI(*aOriginalURIString, aUsePrivateBrowsing);
|
|
} else {
|
|
//
|
|
// If this string was passed through nsStandardURL by
|
|
// chance, then it may have been converted from UTF-8 to
|
|
// ACE, which would result in a completely bogus keyword
|
|
// query. Here we try to recover the original Unicode
|
|
// value, but this is not 100% correct since the value may
|
|
// have been normalized per the IDN normalization rules.
|
|
//
|
|
// Since we don't have access to the exact original string
|
|
// that was entered by the user, this will just have to do.
|
|
bool isACE;
|
|
nsAutoCString utf8Host;
|
|
nsCOMPtr<nsIIDNService> idnSrv =
|
|
do_GetService(NS_IDNSERVICE_CONTRACTID);
|
|
if (idnSrv && NS_SUCCEEDED(idnSrv->IsACE(host, &isACE)) && isACE &&
|
|
NS_SUCCEEDED(idnSrv->ConvertACEtoUTF8(host, utf8Host))) {
|
|
info = KeywordToURI(utf8Host, aUsePrivateBrowsing);
|
|
|
|
} else {
|
|
info = KeywordToURI(host, aUsePrivateBrowsing);
|
|
}
|
|
}
|
|
if (info) {
|
|
info->GetPreferredURI(getter_AddRefs(newURI));
|
|
if (newURI) {
|
|
info->GetKeywordAsSent(keywordAsSent);
|
|
info->GetKeywordProviderName(keywordProviderName);
|
|
info->GetPostData(getter_AddRefs(newPostData));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Now try change the address, e.g. turn http://foo into
|
|
// http://www.foo.com, and if that doesn't work try https with
|
|
// https://foo and https://www.foo.com.
|
|
//
|
|
if (aStatus == NS_ERROR_UNKNOWN_HOST || aStatus == NS_ERROR_NET_RESET) {
|
|
// Skip fixup for anything except a normal document load
|
|
// operation on the topframe.
|
|
bool doCreateAlternate = aLoadType == LOAD_NORMAL && aIsTopFrame;
|
|
|
|
if (doCreateAlternate) {
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
|
nsIPrincipal* principal = loadInfo->TriggeringPrincipal();
|
|
// Only do this if our channel was loaded directly by the user from the
|
|
// URL bar or similar (system principal) and not redirected, because we
|
|
// shouldn't be guessing things about links from other sites, or a
|
|
// post-redirect URI.
|
|
doCreateAlternate = principal && principal->IsSystemPrincipal() &&
|
|
loadInfo->RedirectChain().IsEmpty();
|
|
}
|
|
// Test if keyword lookup produced a new URI or not
|
|
if (doCreateAlternate && newURI) {
|
|
bool sameURI = false;
|
|
url->Equals(newURI, &sameURI);
|
|
if (!sameURI) {
|
|
// Keyword lookup made a new URI so no need to try
|
|
// an alternate one.
|
|
doCreateAlternate = false;
|
|
}
|
|
}
|
|
if (doCreateAlternate) {
|
|
newURI = nullptr;
|
|
newPostData = nullptr;
|
|
keywordProviderName.Truncate();
|
|
keywordAsSent.Truncate();
|
|
nsCOMPtr<nsIURIFixup> uriFixup = components::URIFixup::Service();
|
|
if (uriFixup) {
|
|
nsCOMPtr<nsIURIFixupInfo> fixupInfo;
|
|
uriFixup->GetFixupURIInfo(oldSpec,
|
|
nsIURIFixup::FIXUP_FLAGS_MAKE_ALTERNATE_URI,
|
|
getter_AddRefs(fixupInfo));
|
|
if (fixupInfo) {
|
|
fixupInfo->GetPreferredURI(getter_AddRefs(newURI));
|
|
}
|
|
}
|
|
}
|
|
} else if (aStatus == NS_ERROR_CONNECTION_REFUSED &&
|
|
Preferences::GetBool("browser.fixup.fallback-to-https", false)) {
|
|
// Try HTTPS, since http didn't work
|
|
if (SchemeIsHTTP(url)) {
|
|
int32_t port = 0;
|
|
url->GetPort(&port);
|
|
|
|
// Fall back to HTTPS only if port is default
|
|
if (port == -1) {
|
|
newURI = nullptr;
|
|
newPostData = nullptr;
|
|
Unused << NS_MutateURI(url)
|
|
.SetScheme("https"_ns)
|
|
.Finalize(getter_AddRefs(newURI));
|
|
}
|
|
}
|
|
}
|
|
|
|
// If we have a SSL_ERROR_BAD_CERT_DOMAIN error, try prefixing the domain name
|
|
// with www. to see if we can avoid showing the cert error page. For example,
|
|
// https://example.com -> https://www.example.com.
|
|
if (aStatus ==
|
|
mozilla::psm::GetXPCOMFromNSSError(SSL_ERROR_BAD_CERT_DOMAIN)) {
|
|
newPostData = nullptr;
|
|
newURI = MaybeFixBadCertDomainErrorURI(aChannel, url);
|
|
}
|
|
|
|
// Did we make a new URI that is different to the old one? If so
|
|
// load it.
|
|
//
|
|
if (newURI) {
|
|
// Make sure the new URI is different from the old one,
|
|
// otherwise there's little point trying to load it again.
|
|
bool sameURI = false;
|
|
url->Equals(newURI, &sameURI);
|
|
if (!sameURI) {
|
|
if (aNewPostData) {
|
|
newPostData.forget(aNewPostData);
|
|
}
|
|
if (aNotifyKeywordSearchLoading) {
|
|
// This notification is meant for Firefox Health Report so it
|
|
// can increment counts from the search engine
|
|
MaybeNotifyKeywordSearchLoading(keywordProviderName, keywordAsSent);
|
|
}
|
|
return newURI.forget();
|
|
}
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
nsresult nsDocShell::FilterStatusForErrorPage(
|
|
nsresult aStatus, nsIChannel* aChannel, uint32_t aLoadType,
|
|
bool aIsTopFrame, bool aUseErrorPages, bool aIsInitialDocument,
|
|
bool* aSkippedUnknownProtocolNavigation) {
|
|
// Errors to be shown only on top-level frames
|
|
if ((aStatus == NS_ERROR_UNKNOWN_HOST ||
|
|
aStatus == NS_ERROR_CONNECTION_REFUSED ||
|
|
aStatus == NS_ERROR_UNKNOWN_PROXY_HOST ||
|
|
aStatus == NS_ERROR_PROXY_CONNECTION_REFUSED ||
|
|
aStatus == NS_ERROR_PROXY_FORBIDDEN ||
|
|
aStatus == NS_ERROR_PROXY_NOT_IMPLEMENTED ||
|
|
aStatus == NS_ERROR_PROXY_AUTHENTICATION_FAILED ||
|
|
aStatus == NS_ERROR_PROXY_TOO_MANY_REQUESTS ||
|
|
aStatus == NS_ERROR_MALFORMED_URI ||
|
|
aStatus == NS_ERROR_BLOCKED_BY_POLICY) &&
|
|
(aIsTopFrame || aUseErrorPages)) {
|
|
return aStatus;
|
|
}
|
|
|
|
if (aStatus == NS_ERROR_NET_TIMEOUT ||
|
|
aStatus == NS_ERROR_NET_TIMEOUT_EXTERNAL ||
|
|
aStatus == NS_ERROR_PROXY_GATEWAY_TIMEOUT ||
|
|
aStatus == NS_ERROR_REDIRECT_LOOP ||
|
|
aStatus == NS_ERROR_UNKNOWN_SOCKET_TYPE ||
|
|
aStatus == NS_ERROR_NET_INTERRUPT || aStatus == NS_ERROR_NET_RESET ||
|
|
aStatus == NS_ERROR_PROXY_BAD_GATEWAY || aStatus == NS_ERROR_OFFLINE ||
|
|
aStatus == NS_ERROR_MALWARE_URI || aStatus == NS_ERROR_PHISHING_URI ||
|
|
aStatus == NS_ERROR_UNWANTED_URI || aStatus == NS_ERROR_HARMFUL_URI ||
|
|
aStatus == NS_ERROR_UNSAFE_CONTENT_TYPE ||
|
|
aStatus == NS_ERROR_REMOTE_XUL ||
|
|
aStatus == NS_ERROR_INTERCEPTION_FAILED ||
|
|
aStatus == NS_ERROR_NET_INADEQUATE_SECURITY ||
|
|
aStatus == NS_ERROR_NET_HTTP2_SENT_GOAWAY ||
|
|
aStatus == NS_ERROR_NET_HTTP3_PROTOCOL_ERROR ||
|
|
aStatus == NS_ERROR_DOM_BAD_URI || aStatus == NS_ERROR_FILE_NOT_FOUND ||
|
|
aStatus == NS_ERROR_FILE_ACCESS_DENIED ||
|
|
aStatus == NS_ERROR_CORRUPTED_CONTENT ||
|
|
aStatus == NS_ERROR_INVALID_CONTENT_ENCODING ||
|
|
NS_ERROR_GET_MODULE(aStatus) == NS_ERROR_MODULE_SECURITY) {
|
|
// Errors to be shown for any frame
|
|
return aStatus;
|
|
}
|
|
|
|
if (aStatus == NS_ERROR_UNKNOWN_PROTOCOL) {
|
|
// For unknown protocols we only display an error if the load is triggered
|
|
// by the browser itself, or we're replacing the initial document (and
|
|
// nothing else). Showing the error for page-triggered navigations causes
|
|
// annoying behavior for users, see bug 1528305.
|
|
//
|
|
// We could, maybe, try to detect if this is in response to some user
|
|
// interaction (like clicking a link, or something else) and maybe show
|
|
// the error page in that case. But this allows for ctrl+clicking and such
|
|
// to see the error page.
|
|
nsCOMPtr<nsILoadInfo> info = aChannel->LoadInfo();
|
|
if (!info->TriggeringPrincipal()->IsSystemPrincipal() &&
|
|
StaticPrefs::dom_no_unknown_protocol_error_enabled() &&
|
|
!aIsInitialDocument) {
|
|
if (aSkippedUnknownProtocolNavigation) {
|
|
*aSkippedUnknownProtocolNavigation = true;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
return aStatus;
|
|
}
|
|
|
|
if (aStatus == NS_ERROR_DOCUMENT_NOT_CACHED) {
|
|
// Non-caching channels will simply return NS_ERROR_OFFLINE.
|
|
// Caching channels would have to look at their flags to work
|
|
// out which error to return. Or we can fix up the error here.
|
|
if (!(aLoadType & LOAD_CMD_HISTORY)) {
|
|
return NS_ERROR_OFFLINE;
|
|
}
|
|
return aStatus;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::EndPageLoad(nsIWebProgress* aProgress,
|
|
nsIChannel* aChannel, nsresult aStatus) {
|
|
MOZ_LOG(gDocShellLeakLog, LogLevel::Debug,
|
|
("DOCSHELL %p EndPageLoad status: %" PRIx32 "\n", this,
|
|
static_cast<uint32_t>(aStatus)));
|
|
if (!aChannel) {
|
|
return NS_ERROR_NULL_POINTER;
|
|
}
|
|
|
|
// Make sure to discard the initial client if we never created the initial
|
|
// about:blank document. Do this before possibly returning from the method
|
|
// due to an error.
|
|
mInitialClientSource.reset();
|
|
|
|
nsCOMPtr<nsIConsoleReportCollector> reporter = do_QueryInterface(aChannel);
|
|
if (reporter) {
|
|
nsCOMPtr<nsILoadGroup> loadGroup;
|
|
aChannel->GetLoadGroup(getter_AddRefs(loadGroup));
|
|
if (loadGroup) {
|
|
reporter->FlushConsoleReports(loadGroup);
|
|
} else {
|
|
reporter->FlushConsoleReports(GetDocument());
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> url;
|
|
nsresult rv = aChannel->GetURI(getter_AddRefs(url));
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
nsCOMPtr<nsITimedChannel> timingChannel = do_QueryInterface(aChannel);
|
|
if (timingChannel) {
|
|
TimeStamp channelCreationTime;
|
|
rv = timingChannel->GetChannelCreation(&channelCreationTime);
|
|
if (NS_SUCCEEDED(rv) && !channelCreationTime.IsNull()) {
|
|
Telemetry::AccumulateTimeDelta(Telemetry::TOTAL_CONTENT_PAGE_LOAD_TIME,
|
|
channelCreationTime);
|
|
}
|
|
}
|
|
|
|
// Timing is picked up by the window, we don't need it anymore
|
|
mTiming = nullptr;
|
|
|
|
// clean up reload state for meta charset
|
|
if (eCharsetReloadRequested == mCharsetReloadState) {
|
|
mCharsetReloadState = eCharsetReloadStopOrigional;
|
|
} else {
|
|
mCharsetReloadState = eCharsetReloadInit;
|
|
}
|
|
|
|
// Save a pointer to the currently-loading history entry.
|
|
// nsDocShell::EndPageLoad will clear mLSHE, but we may need this history
|
|
// entry further down in this method.
|
|
nsCOMPtr<nsISHEntry> loadingSHE = mLSHE;
|
|
mozilla::Unused << loadingSHE; // XXX: Not sure if we need this anymore
|
|
|
|
//
|
|
// one of many safeguards that prevent death and destruction if
|
|
// someone is so very very rude as to bring this window down
|
|
// during this load handler.
|
|
//
|
|
nsCOMPtr<nsIDocShell> kungFuDeathGrip(this);
|
|
|
|
// Notify the ContentViewer that the Document has finished loading. This
|
|
// will cause any OnLoad(...) and PopState(...) handlers to fire.
|
|
if (!mEODForCurrentDocument && mContentViewer) {
|
|
mIsExecutingOnLoadHandler = true;
|
|
nsCOMPtr<nsIContentViewer> contentViewer = mContentViewer;
|
|
contentViewer->LoadComplete(aStatus);
|
|
mIsExecutingOnLoadHandler = false;
|
|
|
|
mEODForCurrentDocument = true;
|
|
|
|
// If all documents have completed their loading
|
|
// favor native event dispatch priorities
|
|
// over performance
|
|
if (--gNumberOfDocumentsLoading == 0) {
|
|
// Hint to use normal native event dispatch priorities
|
|
FavorPerformanceHint(false);
|
|
}
|
|
}
|
|
/* Check if the httpChannel has any cache-control related response headers,
|
|
* like no-store, no-cache. If so, update SHEntry so that
|
|
* when a user goes back/forward to this page, we appropriately do
|
|
* form value restoration or load from server.
|
|
*/
|
|
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(aChannel));
|
|
if (!httpChannel) {
|
|
// HttpChannel could be hiding underneath a Multipart channel.
|
|
GetHttpChannel(aChannel, getter_AddRefs(httpChannel));
|
|
}
|
|
|
|
if (httpChannel) {
|
|
// figure out if SH should be saving layout state.
|
|
bool discardLayoutState = ShouldDiscardLayoutState(httpChannel);
|
|
if (mLSHE && discardLayoutState && (mLoadType & LOAD_CMD_NORMAL) &&
|
|
(mLoadType != LOAD_BYPASS_HISTORY) && (mLoadType != LOAD_ERROR_PAGE)) {
|
|
mLSHE->SetSaveLayoutStateFlag(false);
|
|
}
|
|
}
|
|
|
|
// Clear mLSHE after calling the onLoadHandlers. This way, if the
|
|
// onLoadHandler tries to load something different in
|
|
// itself or one of its children, we can deal with it appropriately.
|
|
if (mLSHE) {
|
|
mLSHE->SetLoadType(LOAD_HISTORY);
|
|
|
|
// Clear the mLSHE reference to indicate document loading is done one
|
|
// way or another.
|
|
SetHistoryEntryAndUpdateBC(Some(nullptr), Nothing());
|
|
}
|
|
mActiveEntryIsLoadingFromSessionHistory = false;
|
|
|
|
// if there's a refresh header in the channel, this method
|
|
// will set it up for us.
|
|
if (mBrowsingContext->IsActive() || !mDisableMetaRefreshWhenInactive)
|
|
RefreshURIFromQueue();
|
|
|
|
// Test whether this is the top frame or a subframe
|
|
bool isTopFrame = mBrowsingContext->IsTop();
|
|
|
|
// If status code indicates an error it means that DocumentChannel already
|
|
// tried to fixup the uri and failed. Throw an error dialog box here.
|
|
if (NS_FAILED(aStatus)) {
|
|
// If we got CONTENT_BLOCKED from EndPageLoad, then we need to fire
|
|
// the error event to our embedder, since tests are relying on this.
|
|
// The error event is usually fired by the caller of InternalLoad, but
|
|
// this particular error can happen asynchronously.
|
|
// Bug 1629201 is filed for having much clearer decision making around
|
|
// which cases need error events.
|
|
bool fireFrameErrorEvent = (aStatus == NS_ERROR_CONTENT_BLOCKED_SHOW_ALT ||
|
|
aStatus == NS_ERROR_CONTENT_BLOCKED);
|
|
UnblockEmbedderLoadEventForFailure(fireFrameErrorEvent);
|
|
|
|
bool isInitialDocument =
|
|
!GetExtantDocument() || GetExtantDocument()->IsInitialDocument();
|
|
bool skippedUnknownProtocolNavigation = false;
|
|
aStatus = FilterStatusForErrorPage(aStatus, aChannel, mLoadType, isTopFrame,
|
|
mBrowsingContext->GetUseErrorPages(),
|
|
isInitialDocument,
|
|
&skippedUnknownProtocolNavigation);
|
|
if (NS_FAILED(aStatus)) {
|
|
DisplayLoadError(aStatus, url, nullptr, aChannel);
|
|
} else if (skippedUnknownProtocolNavigation) {
|
|
nsTArray<nsString> params;
|
|
if (NS_FAILED(
|
|
NS_GetSanitizedURIStringFromURI(url, *params.AppendElement()))) {
|
|
params.LastElement().AssignLiteral(u"(unknown uri)");
|
|
}
|
|
nsContentUtils::ReportToConsole(
|
|
nsIScriptError::warningFlag, "DOM"_ns, GetExtantDocument(),
|
|
nsContentUtils::eDOM_PROPERTIES, "UnknownProtocolNavigationPrevented",
|
|
params);
|
|
}
|
|
} else {
|
|
// If we have a host
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
|
PredictorLearnRedirect(url, aChannel, loadInfo->GetOriginAttributes());
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell: Content Viewer Management
|
|
//*****************************************************************************
|
|
|
|
nsresult nsDocShell::EnsureContentViewer() {
|
|
if (mContentViewer) {
|
|
return NS_OK;
|
|
}
|
|
if (mIsBeingDestroyed) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsCOMPtr<nsIContentSecurityPolicy> cspToInheritForAboutBlank;
|
|
nsCOMPtr<nsIURI> baseURI;
|
|
nsIPrincipal* principal = GetInheritedPrincipal(false);
|
|
nsIPrincipal* partitionedPrincipal = GetInheritedPrincipal(false, true);
|
|
|
|
nsCOMPtr<nsIDocShellTreeItem> parentItem;
|
|
GetInProcessSameTypeParent(getter_AddRefs(parentItem));
|
|
if (parentItem) {
|
|
if (nsCOMPtr<nsPIDOMWindowOuter> domWin = GetWindow()) {
|
|
nsCOMPtr<Element> parentElement = domWin->GetFrameElementInternal();
|
|
if (parentElement) {
|
|
baseURI = parentElement->GetBaseURI();
|
|
cspToInheritForAboutBlank = parentElement->GetCsp();
|
|
}
|
|
}
|
|
}
|
|
|
|
nsresult rv = CreateAboutBlankContentViewer(
|
|
principal, partitionedPrincipal, cspToInheritForAboutBlank, baseURI);
|
|
|
|
NS_ENSURE_STATE(mContentViewer);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
RefPtr<Document> doc(GetDocument());
|
|
NS_ASSERTION(doc,
|
|
"Should have doc if CreateAboutBlankContentViewer "
|
|
"succeeded!");
|
|
|
|
doc->SetIsInitialDocument(true);
|
|
|
|
// Documents created using EnsureContentViewer may be transient
|
|
// placeholders created by framescripts before content has a
|
|
// chance to load. In some cases, window.open(..., "noopener")
|
|
// will create such a document and then synchronously tear it
|
|
// down, firing a "pagehide" event. Doing so violates our
|
|
// assertions about DocGroups. It's easier to silence the
|
|
// assertion here than to avoid creating the extra document.
|
|
doc->IgnoreDocGroupMismatches();
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
nsresult nsDocShell::CreateAboutBlankContentViewer(
|
|
nsIPrincipal* aPrincipal, nsIPrincipal* aPartitionedPrincipal,
|
|
nsIContentSecurityPolicy* aCSP, nsIURI* aBaseURI,
|
|
const Maybe<nsILoadInfo::CrossOriginEmbedderPolicy>& aCOEP,
|
|
bool aTryToSaveOldPresentation, bool aCheckPermitUnload,
|
|
WindowGlobalChild* aActor) {
|
|
RefPtr<Document> blankDoc;
|
|
nsCOMPtr<nsIContentViewer> viewer;
|
|
nsresult rv = NS_ERROR_FAILURE;
|
|
|
|
MOZ_ASSERT_IF(aActor, aActor->DocumentPrincipal() == aPrincipal);
|
|
|
|
/* mCreatingDocument should never be true at this point. However, it's
|
|
a theoretical possibility. We want to know about it and make it stop,
|
|
and this sounds like a job for an assertion. */
|
|
NS_ASSERTION(!mCreatingDocument,
|
|
"infinite(?) loop creating document averted");
|
|
if (mCreatingDocument) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
if (!mBrowsingContext->AncestorsAreCurrent()) {
|
|
mBrowsingContext->RemoveRootFromBFCacheSync();
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
// mContentViewer->PermitUnload may release |this| docshell.
|
|
nsCOMPtr<nsIDocShell> kungFuDeathGrip(this);
|
|
|
|
AutoRestore<bool> creatingDocument(mCreatingDocument);
|
|
mCreatingDocument = true;
|
|
|
|
if (aPrincipal && !aPrincipal->IsSystemPrincipal() &&
|
|
mItemType != typeChrome) {
|
|
MOZ_ASSERT(aPrincipal->OriginAttributesRef() ==
|
|
mBrowsingContext->OriginAttributesRef());
|
|
}
|
|
|
|
// Make sure timing is created. But first record whether we had it
|
|
// already, so we don't clobber the timing for an in-progress load.
|
|
bool hadTiming = mTiming;
|
|
bool toBeReset = MaybeInitTiming();
|
|
if (mContentViewer) {
|
|
if (aCheckPermitUnload) {
|
|
// We've got a content viewer already. Make sure the user
|
|
// permits us to discard the current document and replace it
|
|
// with about:blank. And also ensure we fire the unload events
|
|
// in the current document.
|
|
|
|
// Unload gets fired first for
|
|
// document loaded from the session history.
|
|
mTiming->NotifyBeforeUnload();
|
|
|
|
bool okToUnload;
|
|
rv = mContentViewer->PermitUnload(&okToUnload);
|
|
|
|
if (NS_SUCCEEDED(rv) && !okToUnload) {
|
|
// The user chose not to unload the page, interrupt the load.
|
|
MaybeResetInitTiming(toBeReset);
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
if (mTiming) {
|
|
mTiming->NotifyUnloadAccepted(mCurrentURI);
|
|
}
|
|
}
|
|
|
|
mSavingOldViewer = aTryToSaveOldPresentation &&
|
|
CanSavePresentation(LOAD_NORMAL, nullptr, nullptr);
|
|
|
|
// Make sure to blow away our mLoadingURI just in case. No loads
|
|
// from inside this pagehide.
|
|
mLoadingURI = nullptr;
|
|
|
|
// Stop any in-progress loading, so that we don't accidentally trigger any
|
|
// PageShow notifications from Embed() interrupting our loading below.
|
|
Stop();
|
|
|
|
// Notify the current document that it is about to be unloaded!!
|
|
//
|
|
// It is important to fire the unload() notification *before* any state
|
|
// is changed within the DocShell - otherwise, javascript will get the
|
|
// wrong information :-(
|
|
//
|
|
(void)FirePageHideNotification(!mSavingOldViewer);
|
|
// pagehide notification might destroy this docshell.
|
|
if (mIsBeingDestroyed) {
|
|
return NS_ERROR_DOCSHELL_DYING;
|
|
}
|
|
}
|
|
|
|
// Now make sure we don't think we're in the middle of firing unload after
|
|
// this point. This will make us fire unload when the about:blank document
|
|
// unloads... but that's ok, more or less. Would be nice if it fired load
|
|
// too, of course.
|
|
mFiredUnloadEvent = false;
|
|
|
|
nsCOMPtr<nsIDocumentLoaderFactory> docFactory =
|
|
nsContentUtils::FindInternalContentViewer("text/html"_ns);
|
|
|
|
if (docFactory) {
|
|
nsCOMPtr<nsIPrincipal> principal, partitionedPrincipal;
|
|
const uint32_t sandboxFlags =
|
|
mBrowsingContext->GetHasLoadedNonInitialDocument()
|
|
? mBrowsingContext->GetSandboxFlags()
|
|
: mBrowsingContext->GetInitialSandboxFlags();
|
|
// If we're sandboxed, then create a new null principal. We skip
|
|
// this if we're being created from WindowGlobalChild, since in
|
|
// that case we already have a null principal if required.
|
|
// We can't compare againt the BrowsingContext sandbox flag, since
|
|
// the value was taken when the load initiated and may have since
|
|
// changed.
|
|
if ((sandboxFlags & SANDBOXED_ORIGIN) && !aActor) {
|
|
if (aPrincipal) {
|
|
principal = NullPrincipal::CreateWithInheritedAttributes(aPrincipal);
|
|
} else {
|
|
principal = NullPrincipal::CreateWithInheritedAttributes(this);
|
|
}
|
|
partitionedPrincipal = principal;
|
|
} else {
|
|
principal = aPrincipal;
|
|
partitionedPrincipal = aPartitionedPrincipal;
|
|
}
|
|
|
|
MaybeCreateInitialClientSource(principal);
|
|
|
|
// generate (about:blank) document to load
|
|
blankDoc = nsContentDLF::CreateBlankDocument(mLoadGroup, principal,
|
|
partitionedPrincipal, this);
|
|
if (blankDoc) {
|
|
// Hack: manually set the CSP for the new document
|
|
// Please create an actual copy of the CSP (do not share the same
|
|
// reference) otherwise appending a new policy within the new
|
|
// document will be incorrectly propagated to the opening doc.
|
|
if (aCSP) {
|
|
RefPtr<nsCSPContext> cspToInherit = new nsCSPContext();
|
|
cspToInherit->InitFromOther(static_cast<nsCSPContext*>(aCSP));
|
|
blankDoc->SetCsp(cspToInherit);
|
|
}
|
|
|
|
blankDoc->SetEmbedderPolicy(aCOEP);
|
|
|
|
// Hack: set the base URI manually, since this document never
|
|
// got Reset() with a channel.
|
|
blankDoc->SetBaseURI(aBaseURI);
|
|
|
|
// Copy our sandbox flags to the document. These are immutable
|
|
// after being set here.
|
|
blankDoc->SetSandboxFlags(sandboxFlags);
|
|
|
|
// create a content viewer for us and the new document
|
|
docFactory->CreateInstanceForDocument(
|
|
NS_ISUPPORTS_CAST(nsIDocShell*, this), blankDoc, "view",
|
|
getter_AddRefs(viewer));
|
|
|
|
// hook 'em up
|
|
if (viewer) {
|
|
viewer->SetContainer(this);
|
|
rv = Embed(viewer, aActor, true, false);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
SetCurrentURI(blankDoc->GetDocumentURI(), nullptr, true, 0);
|
|
rv = mIsBeingDestroyed ? NS_ERROR_NOT_AVAILABLE : NS_OK;
|
|
}
|
|
}
|
|
}
|
|
|
|
// The transient about:blank viewer doesn't have a session history entry.
|
|
SetHistoryEntryAndUpdateBC(Nothing(), Some(nullptr));
|
|
|
|
// Clear out our mTiming like we would in EndPageLoad, if we didn't
|
|
// have one before entering this function.
|
|
if (!hadTiming) {
|
|
mTiming = nullptr;
|
|
mBlankTiming = true;
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::CreateAboutBlankContentViewer(nsIPrincipal* aPrincipal,
|
|
nsIPrincipal* aPartitionedPrincipal,
|
|
nsIContentSecurityPolicy* aCSP) {
|
|
return CreateAboutBlankContentViewer(aPrincipal, aPartitionedPrincipal, aCSP,
|
|
nullptr);
|
|
}
|
|
|
|
nsresult nsDocShell::CreateContentViewerForActor(
|
|
WindowGlobalChild* aWindowActor) {
|
|
MOZ_ASSERT(aWindowActor);
|
|
|
|
// FIXME: WindowGlobalChild should provide the PartitionedPrincipal.
|
|
nsresult rv = CreateAboutBlankContentViewer(
|
|
aWindowActor->DocumentPrincipal(), aWindowActor->DocumentPrincipal(),
|
|
/* aCsp */ nullptr,
|
|
/* aBaseURI */ nullptr,
|
|
/* aCOEP */ Nothing(),
|
|
/* aTryToSaveOldPresentation */ true,
|
|
/* aCheckPermitUnload */ true, aWindowActor);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
RefPtr<Document> doc(GetDocument());
|
|
MOZ_ASSERT(
|
|
doc,
|
|
"Should have a document if CreateAboutBlankContentViewer succeeded");
|
|
MOZ_ASSERT(doc->GetOwnerGlobal() == aWindowActor->GetWindowGlobal(),
|
|
"New document should be in the same global as our actor");
|
|
|
|
// FIXME: We may want to support non-initial documents here.
|
|
doc->SetIsInitialDocument(true);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
bool nsDocShell::CanSavePresentation(uint32_t aLoadType,
|
|
nsIRequest* aNewRequest,
|
|
Document* aNewDocument) {
|
|
if (!mOSHE) {
|
|
return false; // no entry to save into
|
|
}
|
|
|
|
nsCOMPtr<nsIContentViewer> viewer = mOSHE->GetContentViewer();
|
|
if (viewer) {
|
|
NS_WARNING("mOSHE already has a content viewer!");
|
|
return false;
|
|
}
|
|
|
|
// Only save presentation for "normal" loads and link loads. Anything else
|
|
// probably wants to refetch the page, so caching the old presentation
|
|
// would be incorrect.
|
|
if (aLoadType != LOAD_NORMAL && aLoadType != LOAD_HISTORY &&
|
|
aLoadType != LOAD_LINK && aLoadType != LOAD_STOP_CONTENT &&
|
|
aLoadType != LOAD_STOP_CONTENT_AND_REPLACE &&
|
|
aLoadType != LOAD_ERROR_PAGE) {
|
|
return false;
|
|
}
|
|
|
|
// If the session history entry has the saveLayoutState flag set to false,
|
|
// then we should not cache the presentation.
|
|
if (!mOSHE->GetSaveLayoutStateFlag()) {
|
|
return false;
|
|
}
|
|
|
|
// If the document is not done loading, don't cache it.
|
|
if (!mScriptGlobal || mScriptGlobal->IsLoading()) {
|
|
MOZ_LOG(gPageCacheLog, mozilla::LogLevel::Verbose,
|
|
("Blocked due to document still loading"));
|
|
return false;
|
|
}
|
|
|
|
if (mScriptGlobal->WouldReuseInnerWindow(aNewDocument)) {
|
|
return false;
|
|
}
|
|
|
|
// Avoid doing the work of saving the presentation state in the case where
|
|
// the content viewer cache is disabled.
|
|
if (nsSHistory::GetMaxTotalViewers() == 0) {
|
|
return false;
|
|
}
|
|
|
|
// Don't cache the content viewer if we're in a subframe.
|
|
if (mBrowsingContext->GetParent()) {
|
|
return false; // this is a subframe load
|
|
}
|
|
|
|
// If the document does not want its presentation cached, then don't.
|
|
RefPtr<Document> doc = mScriptGlobal->GetExtantDoc();
|
|
|
|
uint16_t bfCacheCombo = 0;
|
|
bool canSavePresentation =
|
|
doc->CanSavePresentation(aNewRequest, bfCacheCombo, true);
|
|
MOZ_ASSERT_IF(canSavePresentation, bfCacheCombo == 0);
|
|
if (canSavePresentation && doc->IsTopLevelContentDocument()) {
|
|
auto* browsingContextGroup = mBrowsingContext->Group();
|
|
nsTArray<RefPtr<BrowsingContext>>& topLevelContext =
|
|
browsingContextGroup->Toplevels();
|
|
|
|
for (const auto& browsingContext : topLevelContext) {
|
|
if (browsingContext != mBrowsingContext) {
|
|
if (StaticPrefs::docshell_shistory_bfcache_require_no_opener()) {
|
|
canSavePresentation = false;
|
|
}
|
|
bfCacheCombo |= BFCacheStatus::NOT_ONLY_TOPLEVEL_IN_BCG;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
ReportBFCacheComboTelemetry(bfCacheCombo);
|
|
|
|
return doc && canSavePresentation;
|
|
}
|
|
|
|
void nsDocShell::ReportBFCacheComboTelemetry(uint16_t aCombo) {
|
|
// There are 11 possible reasons to make a request fails to use BFCache
|
|
// (see BFCacheStatus in dom/base/Document.h), and we'd like to record
|
|
// the common combinations for reasons which make requests fail to use
|
|
// BFCache. These combinations are generated based on some local browsings,
|
|
// we need to adjust them when necessary.
|
|
enum BFCacheStatusCombo : uint16_t {
|
|
BFCACHE_SUCCESS,
|
|
NOT_ONLY_TOPLEVEL = mozilla::dom::BFCacheStatus::NOT_ONLY_TOPLEVEL_IN_BCG,
|
|
UNLOAD = mozilla::dom::BFCacheStatus::UNLOAD_LISTENER,
|
|
UNLOAD_REQUEST = mozilla::dom::BFCacheStatus::UNLOAD_LISTENER |
|
|
mozilla::dom::BFCacheStatus::REQUEST,
|
|
REQUEST = mozilla::dom::BFCacheStatus::REQUEST,
|
|
UNLOAD_REQUEST_PEER = mozilla::dom::BFCacheStatus::UNLOAD_LISTENER |
|
|
mozilla::dom::BFCacheStatus::REQUEST |
|
|
mozilla::dom::BFCacheStatus::ACTIVE_PEER_CONNECTION,
|
|
UNLOAD_REQUEST_PEER_MSE =
|
|
mozilla::dom::BFCacheStatus::UNLOAD_LISTENER |
|
|
mozilla::dom::BFCacheStatus::REQUEST |
|
|
mozilla::dom::BFCacheStatus::ACTIVE_PEER_CONNECTION |
|
|
mozilla::dom::BFCacheStatus::CONTAINS_MSE_CONTENT,
|
|
UNLOAD_REQUEST_MSE = mozilla::dom::BFCacheStatus::UNLOAD_LISTENER |
|
|
mozilla::dom::BFCacheStatus::REQUEST |
|
|
mozilla::dom::BFCacheStatus::CONTAINS_MSE_CONTENT,
|
|
SUSPENDED_UNLOAD_REQUEST_PEER =
|
|
mozilla::dom::BFCacheStatus::SUSPENDED |
|
|
mozilla::dom::BFCacheStatus::UNLOAD_LISTENER |
|
|
mozilla::dom::BFCacheStatus::REQUEST |
|
|
mozilla::dom::BFCacheStatus::ACTIVE_PEER_CONNECTION,
|
|
REMOTE_SUBFRAMES = mozilla::dom::BFCacheStatus::CONTAINS_REMOTE_SUBFRAMES
|
|
};
|
|
|
|
switch (aCombo) {
|
|
case BFCACHE_SUCCESS:
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::BFCache_Success);
|
|
break;
|
|
case NOT_ONLY_TOPLEVEL:
|
|
if (StaticPrefs::docshell_shistory_bfcache_require_no_opener()) {
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::Other);
|
|
break;
|
|
}
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::BFCache_Success);
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::Success_Not_Toplevel);
|
|
break;
|
|
case UNLOAD:
|
|
Telemetry::AccumulateCategorical(Telemetry::LABELS_BFCACHE_COMBO::Unload);
|
|
break;
|
|
case UNLOAD_REQUEST:
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::Unload_Req);
|
|
break;
|
|
case REQUEST:
|
|
Telemetry::AccumulateCategorical(Telemetry::LABELS_BFCACHE_COMBO::Req);
|
|
break;
|
|
case UNLOAD_REQUEST_PEER:
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::Unload_Req_Peer);
|
|
break;
|
|
case UNLOAD_REQUEST_PEER_MSE:
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::Unload_Req_Peer_MSE);
|
|
break;
|
|
case UNLOAD_REQUEST_MSE:
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::Unload_Req_MSE);
|
|
break;
|
|
case SUSPENDED_UNLOAD_REQUEST_PEER:
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::SPD_Unload_Req_Peer);
|
|
break;
|
|
case REMOTE_SUBFRAMES:
|
|
Telemetry::AccumulateCategorical(
|
|
Telemetry::LABELS_BFCACHE_COMBO::Remote_Subframes);
|
|
break;
|
|
default:
|
|
Telemetry::AccumulateCategorical(Telemetry::LABELS_BFCACHE_COMBO::Other);
|
|
break;
|
|
}
|
|
};
|
|
|
|
void nsDocShell::ReattachEditorToWindow(nsISHEntry* aSHEntry) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
NS_ASSERTION(!mEditorData,
|
|
"Why reattach an editor when we already have one?");
|
|
NS_ASSERTION(aSHEntry && aSHEntry->HasDetachedEditor(),
|
|
"Reattaching when there's not a detached editor.");
|
|
|
|
if (mEditorData || !aSHEntry) {
|
|
return;
|
|
}
|
|
|
|
mEditorData = WrapUnique(aSHEntry->ForgetEditorData());
|
|
if (mEditorData) {
|
|
#ifdef DEBUG
|
|
nsresult rv =
|
|
#endif
|
|
mEditorData->ReattachToWindow(this);
|
|
NS_ASSERTION(NS_SUCCEEDED(rv), "Failed to reattach editing session");
|
|
}
|
|
}
|
|
|
|
void nsDocShell::DetachEditorFromWindow() {
|
|
if (!mEditorData || mEditorData->WaitingForLoad()) {
|
|
// If there's nothing to detach, or if the editor data is actually set
|
|
// up for the _new_ page that's coming in, don't detach.
|
|
return;
|
|
}
|
|
|
|
NS_ASSERTION(!mOSHE || !mOSHE->HasDetachedEditor(),
|
|
"Detaching editor when it's already detached.");
|
|
|
|
nsresult res = mEditorData->DetachFromWindow();
|
|
NS_ASSERTION(NS_SUCCEEDED(res), "Failed to detach editor");
|
|
|
|
if (NS_SUCCEEDED(res)) {
|
|
// Make mOSHE hold the owning ref to the editor data.
|
|
if (mOSHE) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed || !mOSHE->HasDetachedEditor(),
|
|
"We should not set the editor data again once after we "
|
|
"detached the editor data during destroying this docshell");
|
|
mOSHE->SetEditorData(mEditorData.release());
|
|
} else {
|
|
mEditorData = nullptr;
|
|
}
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
{
|
|
bool isEditable;
|
|
GetEditable(&isEditable);
|
|
NS_ASSERTION(!isEditable,
|
|
"Window is still editable after detaching editor.");
|
|
}
|
|
#endif // DEBUG
|
|
}
|
|
|
|
nsresult nsDocShell::CaptureState() {
|
|
if (!mOSHE || mOSHE == mLSHE) {
|
|
// No entry to save into, or we're replacing the existing entry.
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
if (!mScriptGlobal) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsCOMPtr<nsISupports> windowState = mScriptGlobal->SaveWindowState();
|
|
NS_ENSURE_TRUE(windowState, NS_ERROR_FAILURE);
|
|
|
|
if (MOZ_UNLIKELY(MOZ_LOG_TEST(gPageCacheLog, LogLevel::Debug))) {
|
|
nsAutoCString spec;
|
|
nsCOMPtr<nsIURI> uri;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
uri = mActiveEntry->GetURI();
|
|
} else {
|
|
uri = mOSHE->GetURI();
|
|
}
|
|
if (uri) {
|
|
uri->GetSpec(spec);
|
|
}
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Debug,
|
|
("Saving presentation into session history, URI: %s", spec.get()));
|
|
}
|
|
|
|
mOSHE->SetWindowState(windowState);
|
|
|
|
// Suspend refresh URIs and save off the timer queue
|
|
mOSHE->SetRefreshURIList(mSavedRefreshURIList);
|
|
|
|
// Capture the current content viewer bounds.
|
|
if (mContentViewer) {
|
|
nsIntRect bounds;
|
|
mContentViewer->GetBounds(bounds);
|
|
mOSHE->SetViewerBounds(bounds);
|
|
}
|
|
|
|
// Capture the docshell hierarchy.
|
|
mOSHE->ClearChildShells();
|
|
|
|
uint32_t childCount = mChildList.Length();
|
|
for (uint32_t i = 0; i < childCount; ++i) {
|
|
nsCOMPtr<nsIDocShellTreeItem> childShell = do_QueryInterface(ChildAt(i));
|
|
NS_ASSERTION(childShell, "null child shell");
|
|
|
|
mOSHE->AddChildShell(childShell);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::RestorePresentationEvent::Run() {
|
|
if (mDocShell && NS_FAILED(mDocShell->RestoreFromHistory())) {
|
|
NS_WARNING("RestoreFromHistory failed");
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::BeginRestore(nsIContentViewer* aContentViewer, bool aTop) {
|
|
nsresult rv;
|
|
if (!aContentViewer) {
|
|
rv = EnsureContentViewer();
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
aContentViewer = mContentViewer;
|
|
}
|
|
|
|
// Dispatch events for restoring the presentation. We try to simulate
|
|
// the progress notifications loading the document would cause, so we add
|
|
// the document's channel to the loadgroup to initiate stateChange
|
|
// notifications.
|
|
|
|
RefPtr<Document> doc = aContentViewer->GetDocument();
|
|
if (doc) {
|
|
nsIChannel* channel = doc->GetChannel();
|
|
if (channel) {
|
|
mEODForCurrentDocument = false;
|
|
mIsRestoringDocument = true;
|
|
mLoadGroup->AddRequest(channel, nullptr);
|
|
mIsRestoringDocument = false;
|
|
}
|
|
}
|
|
|
|
if (!aTop) {
|
|
// This point corresponds to us having gotten OnStartRequest or
|
|
// STATE_START, so do the same thing that CreateContentViewer does at
|
|
// this point to ensure that unload/pagehide events for this document
|
|
// will fire when it's unloaded again.
|
|
mFiredUnloadEvent = false;
|
|
|
|
// For non-top frames, there is no notion of making sure that the
|
|
// previous document is in the domwindow when STATE_START notifications
|
|
// happen. We can just call BeginRestore for all of the child shells
|
|
// now.
|
|
rv = BeginRestoreChildren();
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::BeginRestoreChildren() {
|
|
for (auto* childDocLoader : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> child = do_QueryObject(childDocLoader);
|
|
if (child) {
|
|
nsresult rv = child->BeginRestore(nullptr, false);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::FinishRestore() {
|
|
// First we call finishRestore() on our children. In the simulated load,
|
|
// all of the child frames finish loading before the main document.
|
|
|
|
for (auto* childDocLoader : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> child = do_QueryObject(childDocLoader);
|
|
if (child) {
|
|
child->FinishRestore();
|
|
}
|
|
}
|
|
|
|
if (mOSHE && mOSHE->HasDetachedEditor()) {
|
|
ReattachEditorToWindow(mOSHE);
|
|
}
|
|
|
|
RefPtr<Document> doc = GetDocument();
|
|
if (doc) {
|
|
// Finally, we remove the request from the loadgroup. This will
|
|
// cause onStateChange(STATE_STOP) to fire, which will fire the
|
|
// pageshow event to the chrome.
|
|
|
|
nsIChannel* channel = doc->GetChannel();
|
|
if (channel) {
|
|
mIsRestoringDocument = true;
|
|
mLoadGroup->RemoveRequest(channel, nullptr, NS_OK);
|
|
mIsRestoringDocument = false;
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetRestoringDocument(bool* aRestoring) {
|
|
*aRestoring = mIsRestoringDocument;
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::RestorePresentation(nsISHEntry* aSHEntry,
|
|
bool* aRestoring) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
NS_ASSERTION(mLoadType & LOAD_CMD_HISTORY,
|
|
"RestorePresentation should only be called for history loads");
|
|
|
|
nsCOMPtr<nsIContentViewer> viewer = aSHEntry->GetContentViewer();
|
|
|
|
nsAutoCString spec;
|
|
if (MOZ_UNLIKELY(MOZ_LOG_TEST(gPageCacheLog, LogLevel::Debug))) {
|
|
nsCOMPtr<nsIURI> uri = aSHEntry->GetURI();
|
|
if (uri) {
|
|
uri->GetSpec(spec);
|
|
}
|
|
}
|
|
|
|
*aRestoring = false;
|
|
|
|
if (!viewer) {
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Debug,
|
|
("no saved presentation for uri: %s", spec.get()));
|
|
return NS_OK;
|
|
}
|
|
|
|
// We need to make sure the content viewer's container is this docshell.
|
|
// In subframe navigation, it's possible for the docshell that the
|
|
// content viewer was originally loaded into to be replaced with a
|
|
// different one. We don't currently support restoring the presentation
|
|
// in that case.
|
|
|
|
nsCOMPtr<nsIDocShell> container;
|
|
viewer->GetContainer(getter_AddRefs(container));
|
|
if (!::SameCOMIdentity(container, GetAsSupports(this))) {
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Debug,
|
|
("No valid container, clearing presentation"));
|
|
aSHEntry->SetContentViewer(nullptr);
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
NS_ASSERTION(mContentViewer != viewer, "Restoring existing presentation");
|
|
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Debug,
|
|
("restoring presentation from session history: %s", spec.get()));
|
|
|
|
SetHistoryEntryAndUpdateBC(Some(aSHEntry), Nothing());
|
|
|
|
// Post an event that will remove the request after we've returned
|
|
// to the event loop. This mimics the way it is called by nsIChannel
|
|
// implementations.
|
|
|
|
// Revoke any pending restore (just in case).
|
|
NS_ASSERTION(!mRestorePresentationEvent.IsPending(),
|
|
"should only have one RestorePresentationEvent");
|
|
mRestorePresentationEvent.Revoke();
|
|
|
|
RefPtr<RestorePresentationEvent> evt = new RestorePresentationEvent(this);
|
|
nsresult rv = Dispatch(TaskCategory::Other, do_AddRef(evt));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
mRestorePresentationEvent = evt.get();
|
|
// The rest of the restore processing will happen on our event
|
|
// callback.
|
|
*aRestoring = true;
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
namespace {
|
|
class MOZ_STACK_CLASS PresentationEventForgetter {
|
|
public:
|
|
explicit PresentationEventForgetter(
|
|
nsRevocableEventPtr<nsDocShell::RestorePresentationEvent>&
|
|
aRestorePresentationEvent)
|
|
: mRestorePresentationEvent(aRestorePresentationEvent),
|
|
mEvent(aRestorePresentationEvent.get()) {}
|
|
|
|
~PresentationEventForgetter() { Forget(); }
|
|
|
|
void Forget() {
|
|
if (mRestorePresentationEvent.get() == mEvent) {
|
|
mRestorePresentationEvent.Forget();
|
|
mEvent = nullptr;
|
|
}
|
|
}
|
|
|
|
private:
|
|
nsRevocableEventPtr<nsDocShell::RestorePresentationEvent>&
|
|
mRestorePresentationEvent;
|
|
RefPtr<nsDocShell::RestorePresentationEvent> mEvent;
|
|
};
|
|
|
|
} // namespace
|
|
|
|
bool nsDocShell::SandboxFlagsImplyCookies(const uint32_t& aSandboxFlags) {
|
|
return (aSandboxFlags & (SANDBOXED_ORIGIN | SANDBOXED_SCRIPTS)) == 0;
|
|
}
|
|
|
|
nsresult nsDocShell::RestoreFromHistory() {
|
|
MOZ_ASSERT(mRestorePresentationEvent.IsPending());
|
|
PresentationEventForgetter forgetter(mRestorePresentationEvent);
|
|
|
|
// This section of code follows the same ordering as CreateContentViewer.
|
|
if (!mLSHE) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsCOMPtr<nsIContentViewer> viewer = mLSHE->GetContentViewer();
|
|
if (!viewer) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
if (mSavingOldViewer) {
|
|
// We determined that it was safe to cache the document presentation
|
|
// at the time we initiated the new load. We need to check whether
|
|
// it's still safe to do so, since there may have been DOM mutations
|
|
// or new requests initiated.
|
|
RefPtr<Document> doc = viewer->GetDocument();
|
|
nsIRequest* request = nullptr;
|
|
if (doc) {
|
|
request = doc->GetChannel();
|
|
}
|
|
mSavingOldViewer = CanSavePresentation(mLoadType, request, doc);
|
|
}
|
|
|
|
// Protect against mLSHE going away via a load triggered from
|
|
// pagehide or unload.
|
|
nsCOMPtr<nsISHEntry> origLSHE = mLSHE;
|
|
|
|
// Make sure to blow away our mLoadingURI just in case. No loads
|
|
// from inside this pagehide.
|
|
mLoadingURI = nullptr;
|
|
|
|
// Notify the old content viewer that it's being hidden.
|
|
FirePageHideNotification(!mSavingOldViewer);
|
|
// pagehide notification might destroy this docshell.
|
|
if (mIsBeingDestroyed) {
|
|
return NS_ERROR_DOCSHELL_DYING;
|
|
}
|
|
|
|
// If mLSHE was changed as a result of the pagehide event, then
|
|
// something else was loaded. Don't finish restoring.
|
|
if (mLSHE != origLSHE) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Add the request to our load group. We do this before swapping out
|
|
// the content viewers so that consumers of STATE_START can access
|
|
// the old document. We only deal with the toplevel load at this time --
|
|
// to be consistent with normal document loading, subframes cannot start
|
|
// loading until after data arrives, which is after STATE_START completes.
|
|
|
|
RefPtr<RestorePresentationEvent> currentPresentationRestoration =
|
|
mRestorePresentationEvent.get();
|
|
Stop();
|
|
// Make sure we're still restoring the same presentation.
|
|
// If we aren't, docshell is in process doing another load already.
|
|
NS_ENSURE_STATE(currentPresentationRestoration ==
|
|
mRestorePresentationEvent.get());
|
|
BeginRestore(viewer, true);
|
|
NS_ENSURE_STATE(currentPresentationRestoration ==
|
|
mRestorePresentationEvent.get());
|
|
forgetter.Forget();
|
|
|
|
// Set mFiredUnloadEvent = false so that the unload handler for the
|
|
// *new* document will fire.
|
|
mFiredUnloadEvent = false;
|
|
|
|
mURIResultedInDocument = true;
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (rootSH) {
|
|
mPreviousEntryIndex = rootSH->Index();
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
rootSH->LegacySHistory()->UpdateIndex();
|
|
}
|
|
mLoadedEntryIndex = rootSH->Index();
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Verbose,
|
|
("Previous index: %d, Loaded index: %d", mPreviousEntryIndex,
|
|
mLoadedEntryIndex));
|
|
}
|
|
|
|
// Rather than call Embed(), we will retrieve the viewer from the session
|
|
// history entry and swap it in.
|
|
// XXX can we refactor this so that we can just call Embed()?
|
|
PersistLayoutHistoryState();
|
|
nsresult rv;
|
|
if (mContentViewer) {
|
|
if (mSavingOldViewer && NS_FAILED(CaptureState())) {
|
|
if (mOSHE) {
|
|
mOSHE->SyncPresentationState();
|
|
}
|
|
mSavingOldViewer = false;
|
|
}
|
|
}
|
|
|
|
mSavedRefreshURIList = nullptr;
|
|
|
|
// In cases where we use a transient about:blank viewer between loads,
|
|
// we never show the transient viewer, so _its_ previous viewer is never
|
|
// unhooked from the view hierarchy. Destroy any such previous viewer now,
|
|
// before we grab the root view sibling, so that we don't grab a view
|
|
// that's about to go away.
|
|
|
|
if (mContentViewer) {
|
|
// Make sure to hold a strong ref to previousViewer here while we
|
|
// drop the reference to it from mContentViewer.
|
|
nsCOMPtr<nsIContentViewer> previousViewer =
|
|
mContentViewer->GetPreviousViewer();
|
|
if (previousViewer) {
|
|
mContentViewer->SetPreviousViewer(nullptr);
|
|
previousViewer->Destroy();
|
|
}
|
|
}
|
|
|
|
// Save off the root view's parent and sibling so that we can insert the
|
|
// new content viewer's root view at the same position. Also save the
|
|
// bounds of the root view's widget.
|
|
|
|
nsView* rootViewSibling = nullptr;
|
|
nsView* rootViewParent = nullptr;
|
|
nsIntRect newBounds(0, 0, 0, 0);
|
|
|
|
PresShell* oldPresShell = GetPresShell();
|
|
if (oldPresShell) {
|
|
nsViewManager* vm = oldPresShell->GetViewManager();
|
|
if (vm) {
|
|
nsView* oldRootView = vm->GetRootView();
|
|
|
|
if (oldRootView) {
|
|
rootViewSibling = oldRootView->GetNextSibling();
|
|
rootViewParent = oldRootView->GetParent();
|
|
|
|
mContentViewer->GetBounds(newBounds);
|
|
}
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsIContent> container;
|
|
RefPtr<Document> sibling;
|
|
if (rootViewParent && rootViewParent->GetParent()) {
|
|
nsIFrame* frame = rootViewParent->GetParent()->GetFrame();
|
|
container = frame ? frame->GetContent() : nullptr;
|
|
}
|
|
if (rootViewSibling) {
|
|
nsIFrame* frame = rootViewSibling->GetFrame();
|
|
sibling = frame ? frame->PresShell()->GetDocument() : nullptr;
|
|
}
|
|
|
|
// Transfer ownership to mContentViewer. By ensuring that either the
|
|
// docshell or the session history, but not both, have references to the
|
|
// content viewer, we prevent the viewer from being torn down after
|
|
// Destroy() is called.
|
|
|
|
if (mContentViewer) {
|
|
mContentViewer->Close(mSavingOldViewer ? mOSHE.get() : nullptr);
|
|
viewer->SetPreviousViewer(mContentViewer);
|
|
}
|
|
if (mOSHE && (!mContentViewer || !mSavingOldViewer)) {
|
|
// We don't plan to save a viewer in mOSHE; tell it to drop
|
|
// any other state it's holding.
|
|
mOSHE->SyncPresentationState();
|
|
}
|
|
|
|
// Order the mContentViewer setup just like Embed does.
|
|
mContentViewer = nullptr;
|
|
|
|
// Now that we're about to switch documents, forget all of our children.
|
|
// Note that we cached them as needed up in CaptureState above.
|
|
DestroyChildren();
|
|
|
|
mContentViewer.swap(viewer);
|
|
|
|
// Grab all of the related presentation from the SHEntry now.
|
|
// Clearing the viewer from the SHEntry will clear all of this state.
|
|
nsCOMPtr<nsISupports> windowState = mLSHE->GetWindowState();
|
|
mLSHE->SetWindowState(nullptr);
|
|
|
|
bool sticky = mLSHE->GetSticky();
|
|
|
|
RefPtr<Document> document = mContentViewer->GetDocument();
|
|
|
|
nsCOMArray<nsIDocShellTreeItem> childShells;
|
|
int32_t i = 0;
|
|
nsCOMPtr<nsIDocShellTreeItem> child;
|
|
while (NS_SUCCEEDED(mLSHE->ChildShellAt(i++, getter_AddRefs(child))) &&
|
|
child) {
|
|
childShells.AppendObject(child);
|
|
}
|
|
|
|
// get the previous content viewer size
|
|
nsIntRect oldBounds(0, 0, 0, 0);
|
|
mLSHE->GetViewerBounds(oldBounds);
|
|
|
|
// Restore the refresh URI list. The refresh timers will be restarted
|
|
// when EndPageLoad() is called.
|
|
nsCOMPtr<nsIMutableArray> refreshURIList = mLSHE->GetRefreshURIList();
|
|
|
|
// Reattach to the window object.
|
|
mIsRestoringDocument = true; // for MediaDocument::BecomeInteractive
|
|
rv = mContentViewer->Open(windowState, mLSHE);
|
|
mIsRestoringDocument = false;
|
|
|
|
// Hack to keep nsDocShellEditorData alive across the
|
|
// SetContentViewer(nullptr) call below.
|
|
UniquePtr<nsDocShellEditorData> data(mLSHE->ForgetEditorData());
|
|
|
|
// Now remove it from the cached presentation.
|
|
mLSHE->SetContentViewer(nullptr);
|
|
mEODForCurrentDocument = false;
|
|
|
|
mLSHE->SetEditorData(data.release());
|
|
|
|
#ifdef DEBUG
|
|
{
|
|
nsCOMPtr<nsIMutableArray> refreshURIs = mLSHE->GetRefreshURIList();
|
|
nsCOMPtr<nsIDocShellTreeItem> childShell;
|
|
mLSHE->ChildShellAt(0, getter_AddRefs(childShell));
|
|
NS_ASSERTION(!refreshURIs && !childShell,
|
|
"SHEntry should have cleared presentation state");
|
|
}
|
|
#endif
|
|
|
|
// Restore the sticky state of the viewer. The viewer has set this state
|
|
// on the history entry in Destroy() just before marking itself non-sticky,
|
|
// to avoid teardown of the presentation.
|
|
mContentViewer->SetSticky(sticky);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// mLSHE is now our currently-loaded document.
|
|
SetHistoryEntryAndUpdateBC(Nothing(), Some<nsISHEntry*>(mLSHE));
|
|
|
|
// We aren't going to restore any items from the LayoutHistoryState,
|
|
// but we don't want them to stay around in case the page is reloaded.
|
|
SetLayoutHistoryState(nullptr);
|
|
|
|
// This is the end of our Embed() replacement
|
|
|
|
mSavingOldViewer = false;
|
|
mEODForCurrentDocument = false;
|
|
|
|
// Tell the event loop to favor plevents over user events, see comments
|
|
// in CreateContentViewer.
|
|
if (++gNumberOfDocumentsLoading == 1) {
|
|
FavorPerformanceHint(true);
|
|
}
|
|
|
|
if (document) {
|
|
RefPtr<nsDocShell> parent = GetInProcessParentDocshell();
|
|
if (parent) {
|
|
RefPtr<Document> d = parent->GetDocument();
|
|
if (d) {
|
|
if (d->EventHandlingSuppressed()) {
|
|
document->SuppressEventHandling(d->EventHandlingSuppressed());
|
|
}
|
|
}
|
|
}
|
|
|
|
// Use the uri from the mLSHE we had when we entered this function
|
|
// (which need not match the document's URI if anchors are involved),
|
|
// since that's the history entry we're loading. Note that if we use
|
|
// origLSHE we don't have to worry about whether the entry in question
|
|
// is still mLSHE or whether it's now mOSHE.
|
|
nsCOMPtr<nsIURI> uri = origLSHE->GetURI();
|
|
SetCurrentURI(uri, document->GetChannel(), true, 0);
|
|
}
|
|
|
|
// This is the end of our CreateContentViewer() replacement.
|
|
// Now we simulate a load. First, we restore the state of the javascript
|
|
// window object.
|
|
nsCOMPtr<nsPIDOMWindowOuter> privWin = GetWindow();
|
|
NS_ASSERTION(privWin, "could not get nsPIDOMWindow interface");
|
|
|
|
// Now, dispatch a title change event which would happen as the
|
|
// <head> is parsed.
|
|
document->NotifyPossibleTitleChange(false);
|
|
|
|
// Now we simulate appending child docshells for subframes.
|
|
for (i = 0; i < childShells.Count(); ++i) {
|
|
nsIDocShellTreeItem* childItem = childShells.ObjectAt(i);
|
|
nsCOMPtr<nsIDocShell> childShell = do_QueryInterface(childItem);
|
|
|
|
// Make sure to not clobber the state of the child. Since AddChild
|
|
// always clobbers it, save it off first.
|
|
bool allowJavascript;
|
|
childShell->GetAllowJavascript(&allowJavascript);
|
|
|
|
bool allowRedirects;
|
|
childShell->GetAllowMetaRedirects(&allowRedirects);
|
|
|
|
bool allowSubframes;
|
|
childShell->GetAllowSubframes(&allowSubframes);
|
|
|
|
bool allowImages;
|
|
childShell->GetAllowImages(&allowImages);
|
|
|
|
bool allowMedia = childShell->GetAllowMedia();
|
|
|
|
bool allowDNSPrefetch;
|
|
childShell->GetAllowDNSPrefetch(&allowDNSPrefetch);
|
|
|
|
bool allowContentRetargeting = childShell->GetAllowContentRetargeting();
|
|
bool allowContentRetargetingOnChildren =
|
|
childShell->GetAllowContentRetargetingOnChildren();
|
|
|
|
// this.AddChild(child) calls child.SetDocLoaderParent(this), meaning that
|
|
// the child inherits our state. Among other things, this means that the
|
|
// child inherits our mPrivateBrowsingId, which is what we want.
|
|
AddChild(childItem);
|
|
|
|
childShell->SetAllowJavascript(allowJavascript);
|
|
childShell->SetAllowMetaRedirects(allowRedirects);
|
|
childShell->SetAllowSubframes(allowSubframes);
|
|
childShell->SetAllowImages(allowImages);
|
|
childShell->SetAllowMedia(allowMedia);
|
|
childShell->SetAllowDNSPrefetch(allowDNSPrefetch);
|
|
childShell->SetAllowContentRetargeting(allowContentRetargeting);
|
|
childShell->SetAllowContentRetargetingOnChildren(
|
|
allowContentRetargetingOnChildren);
|
|
|
|
rv = childShell->BeginRestore(nullptr, false);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
|
|
// Make sure to restore the window state after adding the child shells back
|
|
// to the tree. This is necessary for Thaw() and Resume() to propagate
|
|
// properly.
|
|
rv = privWin->RestoreWindowState(windowState);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
RefPtr<PresShell> presShell = GetPresShell();
|
|
|
|
// We may be displayed on a different monitor (or in a different
|
|
// HiDPI mode) than when we got into the history list. So we need
|
|
// to check if this has happened. See bug 838239.
|
|
|
|
// Because the prescontext normally handles resolution changes via
|
|
// a runnable (see nsPresContext::UIResolutionChanged), its device
|
|
// context won't be -immediately- updated as a result of calling
|
|
// presShell->BackingScaleFactorChanged().
|
|
|
|
// But we depend on that device context when adjusting the view size
|
|
// via mContentViewer->SetBounds(newBounds) below. So we need to
|
|
// explicitly tell it to check for changed resolution here.
|
|
if (presShell) {
|
|
RefPtr<nsPresContext> pc = presShell->GetPresContext();
|
|
if (pc->DeviceContext()->CheckDPIChange()) {
|
|
presShell->BackingScaleFactorChanged();
|
|
}
|
|
// Recompute zoom and text-zoom and such.
|
|
pc->RecomputeBrowsingContextDependentData();
|
|
}
|
|
|
|
nsViewManager* newVM = presShell ? presShell->GetViewManager() : nullptr;
|
|
nsView* newRootView = newVM ? newVM->GetRootView() : nullptr;
|
|
|
|
// Insert the new root view at the correct location in the view tree.
|
|
if (container) {
|
|
nsSubDocumentFrame* subDocFrame =
|
|
do_QueryFrame(container->GetPrimaryFrame());
|
|
rootViewParent = subDocFrame ? subDocFrame->EnsureInnerView() : nullptr;
|
|
} else {
|
|
rootViewParent = nullptr;
|
|
}
|
|
if (sibling && sibling->GetPresShell() &&
|
|
sibling->GetPresShell()->GetViewManager()) {
|
|
rootViewSibling = sibling->GetPresShell()->GetViewManager()->GetRootView();
|
|
} else {
|
|
rootViewSibling = nullptr;
|
|
}
|
|
if (rootViewParent && newRootView &&
|
|
newRootView->GetParent() != rootViewParent) {
|
|
nsViewManager* parentVM = rootViewParent->GetViewManager();
|
|
if (parentVM) {
|
|
// InsertChild(parent, child, sib, true) inserts the child after
|
|
// sib in content order, which is before sib in view order. BUT
|
|
// when sib is null it inserts at the end of the the document
|
|
// order, i.e., first in view order. But when oldRootSibling is
|
|
// null, the old root as at the end of the view list --- last in
|
|
// content order --- and we want to call InsertChild(parent, child,
|
|
// nullptr, false) in that case.
|
|
parentVM->InsertChild(rootViewParent, newRootView, rootViewSibling,
|
|
rootViewSibling ? true : false);
|
|
|
|
NS_ASSERTION(newRootView->GetNextSibling() == rootViewSibling,
|
|
"error in InsertChild");
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsPIDOMWindowInner> privWinInner = privWin->GetCurrentInnerWindow();
|
|
|
|
// If parent is suspended, increase suspension count.
|
|
// This can't be done as early as event suppression since this
|
|
// depends on docshell tree.
|
|
privWinInner->SyncStateFromParentWindow();
|
|
|
|
// Now that all of the child docshells have been put into place, we can
|
|
// restart the timers for the window and all of the child frames.
|
|
privWinInner->Resume();
|
|
|
|
// Now that we have found the inner window of the page restored
|
|
// from the history, we have to make sure that
|
|
// performance.navigation.type is 2.
|
|
privWinInner->GetPerformance()->GetDOMTiming()->NotifyRestoreStart();
|
|
|
|
// Restore the refresh URI list. The refresh timers will be restarted
|
|
// when EndPageLoad() is called.
|
|
mRefreshURIList = refreshURIList;
|
|
|
|
// Meta-refresh timers have been restarted for this shell, but not
|
|
// for our children. Walk the child shells and restart their timers.
|
|
for (auto* childDocLoader : mChildList.ForwardRange()) {
|
|
nsCOMPtr<nsIDocShell> child = do_QueryObject(childDocLoader);
|
|
if (child) {
|
|
child->ResumeRefreshURIs();
|
|
}
|
|
}
|
|
|
|
// Make sure this presentation is the same size as the previous
|
|
// presentation. If this is not the same size we showed it at last time,
|
|
// then we need to resize the widget.
|
|
|
|
// XXXbryner This interacts poorly with Firefox's infobar. If the old
|
|
// presentation had the infobar visible, then we will resize the new
|
|
// presentation to that smaller size. However, firing the locationchanged
|
|
// event will hide the infobar, which will immediately resize the window
|
|
// back to the larger size. A future optimization might be to restore
|
|
// the presentation at the "wrong" size, then fire the locationchanged
|
|
// event and check whether the docshell's new size is the same as the
|
|
// cached viewer size (skipping the resize if they are equal).
|
|
|
|
if (newRootView) {
|
|
if (!newBounds.IsEmpty() && !newBounds.IsEqualEdges(oldBounds)) {
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Debug,
|
|
("resize widget(%d, %d, %d, %d)", newBounds.x, newBounds.y,
|
|
newBounds.width, newBounds.height));
|
|
mContentViewer->SetBounds(newBounds);
|
|
} else {
|
|
nsIScrollableFrame* rootScrollFrame =
|
|
presShell->GetRootScrollFrameAsScrollable();
|
|
if (rootScrollFrame) {
|
|
rootScrollFrame->PostScrolledAreaEventForCurrentArea();
|
|
}
|
|
}
|
|
}
|
|
|
|
// The FinishRestore call below can kill these, null them out so we don't
|
|
// have invalid pointer lying around.
|
|
newRootView = rootViewSibling = rootViewParent = nullptr;
|
|
newVM = nullptr;
|
|
|
|
// If the IsUnderHiddenEmbedderElement() state has been changed, we need to
|
|
// update it.
|
|
if (oldPresShell && presShell &&
|
|
presShell->IsUnderHiddenEmbedderElement() !=
|
|
oldPresShell->IsUnderHiddenEmbedderElement()) {
|
|
presShell->SetIsUnderHiddenEmbedderElement(
|
|
oldPresShell->IsUnderHiddenEmbedderElement());
|
|
}
|
|
|
|
// Simulate the completion of the load.
|
|
nsDocShell::FinishRestore();
|
|
|
|
// Restart plugins, and paint the content.
|
|
if (presShell) {
|
|
presShell->Thaw();
|
|
}
|
|
|
|
return privWin->FireDelayedDOMEvents();
|
|
}
|
|
|
|
nsresult nsDocShell::CreateContentViewer(const nsACString& aContentType,
|
|
nsIRequest* aRequest,
|
|
nsIStreamListener** aContentHandler) {
|
|
if (DocGroup::TryToLoadIframesInBackground()) {
|
|
ResetToFirstLoad();
|
|
}
|
|
|
|
*aContentHandler = nullptr;
|
|
|
|
if (!mTreeOwner || mIsBeingDestroyed) {
|
|
// If we don't have a tree owner, then we're in the process of being
|
|
// destroyed. Rather than continue trying to load something, just give up.
|
|
return NS_ERROR_DOCSHELL_DYING;
|
|
}
|
|
|
|
if (!mBrowsingContext->AncestorsAreCurrent()) {
|
|
mBrowsingContext->RemoveRootFromBFCacheSync();
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
// Can we check the content type of the current content viewer
|
|
// and reuse it without destroying it and re-creating it?
|
|
|
|
NS_ASSERTION(mLoadGroup, "Someone ignored return from Init()?");
|
|
|
|
// Instantiate the content viewer object
|
|
nsCOMPtr<nsIContentViewer> viewer;
|
|
nsresult rv = NewContentViewerObj(aContentType, aRequest, mLoadGroup,
|
|
aContentHandler, getter_AddRefs(viewer));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
// Notify the current document that it is about to be unloaded!!
|
|
//
|
|
// It is important to fire the unload() notification *before* any state
|
|
// is changed within the DocShell - otherwise, javascript will get the
|
|
// wrong information :-(
|
|
//
|
|
|
|
if (mSavingOldViewer) {
|
|
// We determined that it was safe to cache the document presentation
|
|
// at the time we initiated the new load. We need to check whether
|
|
// it's still safe to do so, since there may have been DOM mutations
|
|
// or new requests initiated.
|
|
RefPtr<Document> doc = viewer->GetDocument();
|
|
mSavingOldViewer = CanSavePresentation(mLoadType, aRequest, doc);
|
|
}
|
|
|
|
NS_ASSERTION(!mLoadingURI, "Re-entering unload?");
|
|
|
|
nsCOMPtr<nsIChannel> aOpenedChannel = do_QueryInterface(aRequest);
|
|
if (aOpenedChannel) {
|
|
aOpenedChannel->GetURI(getter_AddRefs(mLoadingURI));
|
|
}
|
|
FirePageHideNotification(!mSavingOldViewer);
|
|
if (mIsBeingDestroyed) {
|
|
// Force to stop the newly created orphaned viewer.
|
|
viewer->Stop();
|
|
return NS_ERROR_DOCSHELL_DYING;
|
|
}
|
|
mLoadingURI = nullptr;
|
|
|
|
// Set mFiredUnloadEvent = false so that the unload handler for the
|
|
// *new* document will fire.
|
|
mFiredUnloadEvent = false;
|
|
|
|
// we've created a new document so go ahead and call
|
|
// OnNewURI(), but don't fire OnLocationChange()
|
|
// notifications before we've called Embed(). See bug 284993.
|
|
mURIResultedInDocument = true;
|
|
bool errorOnLocationChangeNeeded = false;
|
|
nsCOMPtr<nsIChannel> failedChannel = mFailedChannel;
|
|
nsCOMPtr<nsIURI> failedURI;
|
|
|
|
if (mLoadType == LOAD_ERROR_PAGE) {
|
|
// We need to set the SH entry and our current URI here and not
|
|
// at the moment we load the page. We want the same behavior
|
|
// of Stop() as for a normal page load. See bug 514232 for details.
|
|
|
|
// Revert mLoadType to load type to state the page load failed,
|
|
// following function calls need it.
|
|
mLoadType = mFailedLoadType;
|
|
|
|
Document* doc = viewer->GetDocument();
|
|
if (doc) {
|
|
doc->SetFailedChannel(failedChannel);
|
|
}
|
|
|
|
nsCOMPtr<nsIPrincipal> triggeringPrincipal;
|
|
if (failedChannel) {
|
|
// Make sure we have a URI to set currentURI.
|
|
NS_GetFinalChannelURI(failedChannel, getter_AddRefs(failedURI));
|
|
} else {
|
|
// if there is no failed channel we have to explicitly provide
|
|
// a triggeringPrincipal for the history entry.
|
|
triggeringPrincipal = nsContentUtils::GetSystemPrincipal();
|
|
}
|
|
|
|
if (!failedURI) {
|
|
failedURI = mFailedURI;
|
|
}
|
|
if (!failedURI) {
|
|
// We need a URI object to store a session history entry, so make up a URI
|
|
NS_NewURI(getter_AddRefs(failedURI), "about:blank");
|
|
}
|
|
|
|
// When we don't have failedURI, something wrong will happen. See
|
|
// bug 291876.
|
|
MOZ_ASSERT(failedURI, "We don't have a URI for history APIs.");
|
|
|
|
mFailedChannel = nullptr;
|
|
mFailedURI = nullptr;
|
|
|
|
// Create an shistory entry for the old load.
|
|
if (failedURI) {
|
|
errorOnLocationChangeNeeded =
|
|
OnNewURI(failedURI, failedChannel, triggeringPrincipal, nullptr,
|
|
nullptr, nullptr, false, false, false);
|
|
}
|
|
|
|
// Be sure to have a correct mLSHE, it may have been cleared by
|
|
// EndPageLoad. See bug 302115.
|
|
ChildSHistory* shistory = GetSessionHistory();
|
|
if (!mozilla::SessionHistoryInParent() && shistory && !mLSHE) {
|
|
int32_t idx = shistory->LegacySHistory()->GetRequestedIndex();
|
|
if (idx == -1) {
|
|
idx = shistory->Index();
|
|
}
|
|
shistory->LegacySHistory()->GetEntryAtIndex(idx, getter_AddRefs(mLSHE));
|
|
}
|
|
|
|
mLoadType = LOAD_ERROR_PAGE;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> finalURI;
|
|
// If this a redirect, use the final url (uri)
|
|
// else use the original url
|
|
//
|
|
// Note that this should match what documents do (see Document::Reset).
|
|
NS_GetFinalChannelURI(aOpenedChannel, getter_AddRefs(finalURI));
|
|
|
|
bool onLocationChangeNeeded = false;
|
|
if (finalURI) {
|
|
// Pass false for aCloneSHChildren, since we're loading a new page here.
|
|
onLocationChangeNeeded =
|
|
OnNewURI(finalURI, aOpenedChannel, nullptr, nullptr, nullptr, nullptr,
|
|
false, true, false);
|
|
}
|
|
|
|
// let's try resetting the load group if we need to...
|
|
nsCOMPtr<nsILoadGroup> currentLoadGroup;
|
|
NS_ENSURE_SUCCESS(
|
|
aOpenedChannel->GetLoadGroup(getter_AddRefs(currentLoadGroup)),
|
|
NS_ERROR_FAILURE);
|
|
|
|
if (currentLoadGroup != mLoadGroup) {
|
|
nsLoadFlags loadFlags = 0;
|
|
|
|
// Cancel any URIs that are currently loading...
|
|
// XXX: Need to do this eventually Stop();
|
|
//
|
|
// Retarget the document to this loadgroup...
|
|
//
|
|
/* First attach the channel to the right loadgroup
|
|
* and then remove from the old loadgroup. This
|
|
* puts the notifications in the right order and
|
|
* we don't null-out mLSHE in OnStateChange() for
|
|
* all redirected urls
|
|
*/
|
|
aOpenedChannel->SetLoadGroup(mLoadGroup);
|
|
|
|
// Mark the channel as being a document URI...
|
|
aOpenedChannel->GetLoadFlags(&loadFlags);
|
|
loadFlags |= nsIChannel::LOAD_DOCUMENT_URI;
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aOpenedChannel->LoadInfo();
|
|
if (SandboxFlagsImplyCookies(loadInfo->GetSandboxFlags())) {
|
|
loadFlags |= nsIRequest::LOAD_DOCUMENT_NEEDS_COOKIE;
|
|
}
|
|
|
|
aOpenedChannel->SetLoadFlags(loadFlags);
|
|
|
|
mLoadGroup->AddRequest(aRequest, nullptr);
|
|
if (currentLoadGroup) {
|
|
currentLoadGroup->RemoveRequest(aRequest, nullptr, NS_BINDING_RETARGETED);
|
|
}
|
|
|
|
// Update the notification callbacks, so that progress and
|
|
// status information are sent to the right docshell...
|
|
aOpenedChannel->SetNotificationCallbacks(this);
|
|
}
|
|
|
|
if (DocGroup::TryToLoadIframesInBackground()) {
|
|
if ((!mContentViewer || GetDocument()->IsInitialDocument()) && IsFrame()) {
|
|
// At this point, we know we just created a new iframe document based on
|
|
// the response from the server, and we check if it's a cross-domain
|
|
// iframe
|
|
|
|
RefPtr<Document> newDoc = viewer->GetDocument();
|
|
|
|
RefPtr<nsDocShell> parent = GetInProcessParentDocshell();
|
|
nsCOMPtr<nsIPrincipal> parentPrincipal =
|
|
parent->GetDocument()->NodePrincipal();
|
|
nsCOMPtr<nsIPrincipal> thisPrincipal = newDoc->NodePrincipal();
|
|
|
|
SiteIdentifier parentSite;
|
|
SiteIdentifier thisSite;
|
|
|
|
nsresult rv =
|
|
BasePrincipal::Cast(parentPrincipal)->GetSiteIdentifier(parentSite);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = BasePrincipal::Cast(thisPrincipal)->GetSiteIdentifier(thisSite);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
if (!parentSite.Equals(thisSite)) {
|
|
#ifdef MOZ_GECKO_PROFILER
|
|
nsCOMPtr<nsIURI> prinURI;
|
|
BasePrincipal::Cast(thisPrincipal)->GetURI(getter_AddRefs(prinURI));
|
|
nsPrintfCString marker("Iframe loaded in background: %s",
|
|
prinURI->GetSpecOrDefault().get());
|
|
PROFILER_MARKER_TEXT("Background Iframe", DOM, {}, marker);
|
|
#endif
|
|
SetBackgroundLoadIframe();
|
|
}
|
|
}
|
|
}
|
|
|
|
NS_ENSURE_SUCCESS(Embed(viewer, nullptr, false,
|
|
ShouldAddToSessionHistory(finalURI, aOpenedChannel)),
|
|
NS_ERROR_FAILURE);
|
|
|
|
if (!mBrowsingContext->GetHasLoadedNonInitialDocument()) {
|
|
MOZ_ALWAYS_SUCCEEDS(mBrowsingContext->SetHasLoadedNonInitialDocument(true));
|
|
}
|
|
|
|
if (TreatAsBackgroundLoad()) {
|
|
nsCOMPtr<nsIRunnable> triggerParentCheckDocShell =
|
|
NewRunnableMethod("nsDocShell::TriggerParentCheckDocShellIsEmpty", this,
|
|
&nsDocShell::TriggerParentCheckDocShellIsEmpty);
|
|
nsresult rv = NS_DispatchToCurrentThread(triggerParentCheckDocShell);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
|
|
mSavedRefreshURIList = nullptr;
|
|
mSavingOldViewer = false;
|
|
mEODForCurrentDocument = false;
|
|
|
|
// if this document is part of a multipart document,
|
|
// the ID can be used to distinguish it from the other parts.
|
|
nsCOMPtr<nsIMultiPartChannel> multiPartChannel(do_QueryInterface(aRequest));
|
|
if (multiPartChannel) {
|
|
if (PresShell* presShell = GetPresShell()) {
|
|
if (Document* doc = presShell->GetDocument()) {
|
|
uint32_t partID;
|
|
multiPartChannel->GetPartID(&partID);
|
|
doc->SetPartID(partID);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Give hint to native plevent dispatch mechanism. If a document
|
|
// is loading the native plevent dispatch mechanism should favor
|
|
// performance over normal native event dispatch priorities.
|
|
if (++gNumberOfDocumentsLoading == 1) {
|
|
// Hint to favor performance for the plevent notification mechanism.
|
|
// We want the pages to load as fast as possible even if its means
|
|
// native messages might be starved.
|
|
FavorPerformanceHint(true);
|
|
}
|
|
|
|
if (errorOnLocationChangeNeeded) {
|
|
FireOnLocationChange(this, failedChannel, failedURI,
|
|
LOCATION_CHANGE_ERROR_PAGE);
|
|
} else if (onLocationChangeNeeded) {
|
|
uint32_t locationFlags =
|
|
(mLoadType & LOAD_CMD_RELOAD) ? uint32_t(LOCATION_CHANGE_RELOAD) : 0;
|
|
FireOnLocationChange(this, aRequest, mCurrentURI, locationFlags);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::NewContentViewerObj(const nsACString& aContentType,
|
|
nsIRequest* aRequest,
|
|
nsILoadGroup* aLoadGroup,
|
|
nsIStreamListener** aContentHandler,
|
|
nsIContentViewer** aViewer) {
|
|
nsCOMPtr<nsIChannel> aOpenedChannel = do_QueryInterface(aRequest);
|
|
|
|
nsCOMPtr<nsIDocumentLoaderFactory> docLoaderFactory =
|
|
nsContentUtils::FindInternalContentViewer(aContentType);
|
|
if (!docLoaderFactory) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// Now create an instance of the content viewer nsLayoutDLF makes the
|
|
// determination if it should be a "view-source" instead of "view"
|
|
nsresult rv = docLoaderFactory->CreateInstance(
|
|
"view", aOpenedChannel, aLoadGroup, aContentType, this, nullptr,
|
|
aContentHandler, aViewer);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
(*aViewer)->SetContainer(this);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::SetupNewViewer(nsIContentViewer* aNewViewer,
|
|
WindowGlobalChild* aWindowActor) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
//
|
|
// Copy content viewer state from previous or parent content viewer.
|
|
//
|
|
// The following logic is mirrored in nsHTMLDocument::StartDocumentLoad!
|
|
//
|
|
// Do NOT to maintain a reference to the old content viewer outside
|
|
// of this "copying" block, or it will not be destroyed until the end of
|
|
// this routine and all <SCRIPT>s and event handlers fail! (bug 20315)
|
|
//
|
|
// In this block of code, if we get an error result, we return it
|
|
// but if we get a null pointer, that's perfectly legal for parent
|
|
// and parentContentViewer.
|
|
//
|
|
|
|
int32_t x = 0;
|
|
int32_t y = 0;
|
|
int32_t cx = 0;
|
|
int32_t cy = 0;
|
|
|
|
// This will get the size from the current content viewer or from the
|
|
// Init settings
|
|
DoGetPositionAndSize(&x, &y, &cx, &cy);
|
|
|
|
nsCOMPtr<nsIDocShellTreeItem> parentAsItem;
|
|
NS_ENSURE_SUCCESS(GetInProcessSameTypeParent(getter_AddRefs(parentAsItem)),
|
|
NS_ERROR_FAILURE);
|
|
nsCOMPtr<nsIDocShell> parent(do_QueryInterface(parentAsItem));
|
|
|
|
const Encoding* hintCharset = nullptr;
|
|
int32_t hintCharsetSource = kCharsetUninitialized;
|
|
// |newMUDV| also serves as a flag to set the data from the above vars
|
|
nsCOMPtr<nsIContentViewer> newCv;
|
|
|
|
if (mContentViewer || parent) {
|
|
nsCOMPtr<nsIContentViewer> oldCv;
|
|
if (mContentViewer) {
|
|
// Get any interesting state from old content viewer
|
|
// XXX: it would be far better to just reuse the document viewer ,
|
|
// since we know we're just displaying the same document as before
|
|
oldCv = mContentViewer;
|
|
|
|
// Tell the old content viewer to hibernate in session history when
|
|
// it is destroyed.
|
|
|
|
if (mSavingOldViewer && NS_FAILED(CaptureState())) {
|
|
if (mOSHE) {
|
|
mOSHE->SyncPresentationState();
|
|
}
|
|
mSavingOldViewer = false;
|
|
}
|
|
} else {
|
|
// No old content viewer, so get state from parent's content viewer
|
|
parent->GetContentViewer(getter_AddRefs(oldCv));
|
|
}
|
|
|
|
if (oldCv) {
|
|
newCv = aNewViewer;
|
|
if (newCv) {
|
|
hintCharset = oldCv->GetHintCharset();
|
|
NS_ENSURE_SUCCESS(oldCv->GetHintCharacterSetSource(&hintCharsetSource),
|
|
NS_ERROR_FAILURE);
|
|
}
|
|
}
|
|
}
|
|
|
|
nscolor bgcolor = NS_RGBA(0, 0, 0, 0);
|
|
bool isActive = false;
|
|
// Ensure that the content viewer is destroyed *after* the GC - bug 71515
|
|
nsCOMPtr<nsIContentViewer> contentViewer = mContentViewer;
|
|
if (contentViewer) {
|
|
// Stop any activity that may be happening in the old document before
|
|
// releasing it...
|
|
contentViewer->Stop();
|
|
|
|
// Try to extract the canvas background color from the old
|
|
// presentation shell, so we can use it for the next document.
|
|
if (PresShell* presShell = contentViewer->GetPresShell()) {
|
|
bgcolor = presShell->GetCanvasBackground();
|
|
isActive = presShell->IsActive();
|
|
}
|
|
|
|
contentViewer->Close(mSavingOldViewer ? mOSHE.get() : nullptr);
|
|
aNewViewer->SetPreviousViewer(contentViewer);
|
|
}
|
|
if (mOSHE && (!mContentViewer || !mSavingOldViewer)) {
|
|
// We don't plan to save a viewer in mOSHE; tell it to drop
|
|
// any other state it's holding.
|
|
mOSHE->SyncPresentationState();
|
|
}
|
|
|
|
mContentViewer = nullptr;
|
|
|
|
// Now that we're about to switch documents, forget all of our children.
|
|
// Note that we cached them as needed up in CaptureState above.
|
|
DestroyChildren();
|
|
|
|
mContentViewer = aNewViewer;
|
|
|
|
nsCOMPtr<nsIWidget> widget;
|
|
NS_ENSURE_SUCCESS(GetMainWidget(getter_AddRefs(widget)), NS_ERROR_FAILURE);
|
|
|
|
nsIntRect bounds(x, y, cx, cy);
|
|
|
|
mContentViewer->SetNavigationTiming(mTiming);
|
|
|
|
if (NS_FAILED(mContentViewer->Init(widget, bounds, aWindowActor))) {
|
|
mContentViewer = nullptr;
|
|
NS_WARNING("ContentViewer Initialization failed");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// If we have old state to copy, set the old state onto the new content
|
|
// viewer
|
|
if (newCv) {
|
|
newCv->SetHintCharset(hintCharset);
|
|
NS_ENSURE_SUCCESS(newCv->SetHintCharacterSetSource(hintCharsetSource),
|
|
NS_ERROR_FAILURE);
|
|
}
|
|
|
|
NS_ENSURE_TRUE(mContentViewer, NS_ERROR_FAILURE);
|
|
|
|
// Stuff the bgcolor from the old pres shell into the new
|
|
// pres shell. This improves page load continuity.
|
|
if (RefPtr<PresShell> presShell = mContentViewer->GetPresShell()) {
|
|
presShell->SetCanvasBackground(bgcolor);
|
|
if (isActive) {
|
|
presShell->SetIsActive(isActive);
|
|
}
|
|
}
|
|
|
|
// XXX: It looks like the LayoutState gets restored again in Embed()
|
|
// right after the call to SetupNewViewer(...)
|
|
|
|
// We don't show the mContentViewer yet, since we want to draw the old page
|
|
// until we have enough of the new page to show. Just return with the new
|
|
// viewer still set to hidden.
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetDocCurrentStateObj(nsISHEntry* aShEntry,
|
|
SessionHistoryInfo* aInfo) {
|
|
NS_ENSURE_TRUE_VOID(mContentViewer);
|
|
|
|
RefPtr<Document> document = GetDocument();
|
|
NS_ENSURE_TRUE_VOID(document);
|
|
|
|
nsCOMPtr<nsIStructuredCloneContainer> scContainer;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
// If aInfo is null, just set the document's state object to null.
|
|
if (aInfo) {
|
|
scContainer = aInfo->GetStateData();
|
|
}
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p SetCurrentDocState %p", this, scContainer.get()));
|
|
} else {
|
|
if (aShEntry) {
|
|
scContainer = aShEntry->GetStateData();
|
|
|
|
// If aShEntry is null, just set the document's state object to null.
|
|
}
|
|
}
|
|
|
|
// It's OK for scContainer too be null here; that just means there's no
|
|
// state data associated with this history entry.
|
|
document->SetStateObject(scContainer);
|
|
}
|
|
|
|
nsresult nsDocShell::CheckLoadingPermissions() {
|
|
// This method checks whether the caller may load content into
|
|
// this docshell. Even though we've done our best to hide windows
|
|
// from code that doesn't have the right to access them, it's
|
|
// still possible for an evil site to open a window and access
|
|
// frames in the new window through window.frames[] (which is
|
|
// allAccess for historic reasons), so we still need to do this
|
|
// check on load.
|
|
nsresult rv = NS_OK;
|
|
|
|
if (!IsFrame()) {
|
|
// We're not a frame. Permit all loads.
|
|
return rv;
|
|
}
|
|
|
|
// Note - The check for a current JSContext here isn't necessarily sensical.
|
|
// It's just designed to preserve the old semantics during a mass-conversion
|
|
// patch.
|
|
if (!nsContentUtils::GetCurrentJSContext()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Check if the caller is from the same origin as this docshell,
|
|
// or any of its ancestors.
|
|
for (RefPtr<BrowsingContext> bc = mBrowsingContext; bc;
|
|
bc = bc->GetParent()) {
|
|
// If the BrowsingContext is not in process, then it
|
|
// is true by construction that its principal will not
|
|
// subsume the current docshell principal.
|
|
if (!bc->IsInProcess()) {
|
|
continue;
|
|
}
|
|
|
|
nsCOMPtr<nsIScriptGlobalObject> sgo =
|
|
bc->GetDocShell()->GetScriptGlobalObject();
|
|
nsCOMPtr<nsIScriptObjectPrincipal> sop(do_QueryInterface(sgo));
|
|
|
|
nsIPrincipal* p;
|
|
if (!sop || !(p = sop->GetPrincipal())) {
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
if (nsContentUtils::SubjectPrincipal()->Subsumes(p)) {
|
|
// Same origin, permit load
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
return NS_ERROR_DOM_PROP_ACCESS_DENIED;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell: Site Loading
|
|
//*****************************************************************************
|
|
|
|
void nsDocShell::CopyFavicon(nsIURI* aOldURI, nsIURI* aNewURI,
|
|
bool aInPrivateBrowsing) {
|
|
if (XRE_IsContentProcess()) {
|
|
dom::ContentChild* contentChild = dom::ContentChild::GetSingleton();
|
|
if (contentChild) {
|
|
contentChild->SendCopyFavicon(aOldURI, aNewURI, aInPrivateBrowsing);
|
|
}
|
|
return;
|
|
}
|
|
|
|
#ifdef MOZ_PLACES
|
|
nsCOMPtr<nsIFaviconService> favSvc =
|
|
do_GetService("@mozilla.org/browser/favicon-service;1");
|
|
if (favSvc) {
|
|
favSvc->CopyFavicons(aOldURI, aNewURI,
|
|
aInPrivateBrowsing
|
|
? nsIFaviconService::FAVICON_LOAD_PRIVATE
|
|
: nsIFaviconService::FAVICON_LOAD_NON_PRIVATE,
|
|
nullptr);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
class InternalLoadEvent : public Runnable {
|
|
public:
|
|
InternalLoadEvent(nsDocShell* aDocShell, nsDocShellLoadState* aLoadState)
|
|
: mozilla::Runnable("InternalLoadEvent"),
|
|
mDocShell(aDocShell),
|
|
mLoadState(aLoadState) {
|
|
// For events, both target and filename should be the version of "null" they
|
|
// expect. By the time the event is fired, both window targeting and file
|
|
// downloading have been handled, so we should never have an internal load
|
|
// event that retargets or had a download.
|
|
mLoadState->SetTarget(u""_ns);
|
|
mLoadState->SetFileName(VoidString());
|
|
}
|
|
|
|
NS_IMETHOD
|
|
Run() override {
|
|
#ifndef ANDROID
|
|
MOZ_ASSERT(mLoadState->TriggeringPrincipal(),
|
|
"InternalLoadEvent: Should always have a principal here");
|
|
#endif
|
|
return mDocShell->InternalLoad(mLoadState);
|
|
}
|
|
|
|
private:
|
|
RefPtr<nsDocShell> mDocShell;
|
|
RefPtr<nsDocShellLoadState> mLoadState;
|
|
};
|
|
|
|
/**
|
|
* Returns true if we started an asynchronous load (i.e., from the network), but
|
|
* the document we're loading there hasn't yet become this docshell's active
|
|
* document.
|
|
*
|
|
* When JustStartedNetworkLoad is true, you should be careful about modifying
|
|
* mLoadType and mLSHE. These are both set when the asynchronous load first
|
|
* starts, and the load expects that, when it eventually runs InternalLoad,
|
|
* mLoadType and mLSHE will have their original values.
|
|
*/
|
|
bool nsDocShell::JustStartedNetworkLoad() {
|
|
return mDocumentRequest && mDocumentRequest != GetCurrentDocChannel();
|
|
}
|
|
|
|
// The contentType will be INTERNAL_(I)FRAME if this docshell is for a
|
|
// non-toplevel browsing context in spec terms. (frame, iframe, <object>,
|
|
// <embed>, etc)
|
|
//
|
|
// This return value will be used when we call NS_CheckContentLoadPolicy, and
|
|
// later when we call DoURILoad.
|
|
nsContentPolicyType nsDocShell::DetermineContentType() {
|
|
if (!IsFrame()) {
|
|
return nsIContentPolicy::TYPE_DOCUMENT;
|
|
}
|
|
|
|
const auto& maybeEmbedderElementType =
|
|
GetBrowsingContext()->GetEmbedderElementType();
|
|
if (!maybeEmbedderElementType) {
|
|
// If the EmbedderElementType hasn't been set yet, just assume we're
|
|
// an iframe since that's more common.
|
|
return nsIContentPolicy::TYPE_INTERNAL_IFRAME;
|
|
}
|
|
|
|
return maybeEmbedderElementType->EqualsLiteral("iframe")
|
|
? nsIContentPolicy::TYPE_INTERNAL_IFRAME
|
|
: nsIContentPolicy::TYPE_INTERNAL_FRAME;
|
|
}
|
|
|
|
bool nsDocShell::NoopenerForceEnabled() {
|
|
// If current's top-level browsing context's active document's
|
|
// cross-origin-opener-policy is "same-origin" or "same-origin + COEP" then
|
|
// if currentDoc's origin is not same origin with currentDoc's top-level
|
|
// origin, noopener is force enabled, and name is cleared to "_blank".
|
|
auto topPolicy = mBrowsingContext->Top()->GetOpenerPolicy();
|
|
return (topPolicy == nsILoadInfo::OPENER_POLICY_SAME_ORIGIN ||
|
|
topPolicy ==
|
|
nsILoadInfo::
|
|
OPENER_POLICY_SAME_ORIGIN_EMBEDDER_POLICY_REQUIRE_CORP) &&
|
|
!mBrowsingContext->SameOriginWithTop();
|
|
}
|
|
|
|
nsresult nsDocShell::PerformRetargeting(nsDocShellLoadState* aLoadState) {
|
|
MOZ_ASSERT(aLoadState, "need a load state!");
|
|
MOZ_ASSERT(!aLoadState->Target().IsEmpty(), "should have a target here!");
|
|
MOZ_ASSERT(aLoadState->TargetBrowsingContext().IsNull(),
|
|
"should not have picked target yet");
|
|
|
|
nsresult rv = NS_OK;
|
|
RefPtr<BrowsingContext> targetContext;
|
|
|
|
// Only _self, _parent, and _top are supported in noopener case. But we
|
|
// have to be careful to not apply that to the noreferrer case. See bug
|
|
// 1358469.
|
|
bool allowNamedTarget =
|
|
!aLoadState->HasInternalLoadFlags(INTERNAL_LOAD_FLAGS_NO_OPENER) ||
|
|
aLoadState->HasInternalLoadFlags(INTERNAL_LOAD_FLAGS_DONT_SEND_REFERRER);
|
|
if (allowNamedTarget ||
|
|
aLoadState->Target().LowerCaseEqualsLiteral("_self") ||
|
|
aLoadState->Target().LowerCaseEqualsLiteral("_parent") ||
|
|
aLoadState->Target().LowerCaseEqualsLiteral("_top")) {
|
|
targetContext = mBrowsingContext->FindWithName(
|
|
aLoadState->Target(), /* aUseEntryGlobalForAccessCheck */ false);
|
|
}
|
|
|
|
if (!targetContext) {
|
|
// If the targetContext doesn't exist, then this is a new docShell and we
|
|
// should consider this a TYPE_DOCUMENT load
|
|
//
|
|
// For example, when target="_blank"
|
|
|
|
// If there's no targetContext, that means we are about to create a new
|
|
// window. Perform a content policy check before creating the window. Please
|
|
// note for all other docshell loads content policy checks are performed
|
|
// within the contentSecurityManager when the channel is about to be
|
|
// openend.
|
|
nsISupports* requestingContext = nullptr;
|
|
if (XRE_IsContentProcess()) {
|
|
// In e10s the child process doesn't have access to the element that
|
|
// contains the browsing context (because that element is in the chrome
|
|
// process). So we just pass mScriptGlobal.
|
|
requestingContext = ToSupports(mScriptGlobal);
|
|
} else {
|
|
// This is for loading non-e10s tabs and toplevel windows of various
|
|
// sorts.
|
|
// For the toplevel window cases, requestingElement will be null.
|
|
nsCOMPtr<Element> requestingElement =
|
|
mScriptGlobal->GetFrameElementInternal();
|
|
requestingContext = requestingElement;
|
|
}
|
|
|
|
// Ideally we should use the same loadinfo as within DoURILoad which
|
|
// should match this one when both are applicable.
|
|
nsCOMPtr<nsILoadInfo> secCheckLoadInfo = new LoadInfo(
|
|
mScriptGlobal, aLoadState->TriggeringPrincipal(), requestingContext,
|
|
nsILoadInfo::SEC_ONLY_FOR_EXPLICIT_CONTENTSEC_CHECK, 0);
|
|
|
|
// Since Content Policy checks are performed within docShell as well as
|
|
// the ContentSecurityManager we need a reliable way to let certain
|
|
// nsIContentPolicy consumers ignore duplicate calls.
|
|
secCheckLoadInfo->SetSkipContentPolicyCheckForWebRequest(true);
|
|
|
|
int16_t shouldLoad = nsIContentPolicy::ACCEPT;
|
|
rv = NS_CheckContentLoadPolicy(aLoadState->URI(), secCheckLoadInfo,
|
|
""_ns, // mime guess
|
|
&shouldLoad);
|
|
|
|
if (NS_FAILED(rv) || NS_CP_REJECTED(shouldLoad)) {
|
|
if (NS_SUCCEEDED(rv)) {
|
|
if (shouldLoad == nsIContentPolicy::REJECT_TYPE) {
|
|
return NS_ERROR_CONTENT_BLOCKED_SHOW_ALT;
|
|
}
|
|
if (shouldLoad == nsIContentPolicy::REJECT_POLICY) {
|
|
return NS_ERROR_BLOCKED_BY_POLICY;
|
|
}
|
|
}
|
|
|
|
return NS_ERROR_CONTENT_BLOCKED;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Resolve the window target before going any further...
|
|
// If the load has been targeted to another DocShell, then transfer the
|
|
// load to it...
|
|
//
|
|
|
|
// We've already done our owner-inheriting. Mask out that bit, so we
|
|
// don't try inheriting an owner from the target window if we came up
|
|
// with a null owner above.
|
|
aLoadState->UnsetInternalLoadFlag(INTERNAL_LOAD_FLAGS_INHERIT_PRINCIPAL);
|
|
|
|
if (!targetContext) {
|
|
// If the docshell's document is sandboxed, only open a new window
|
|
// if the document's SANDBOXED_AUXILLARY_NAVIGATION flag is not set.
|
|
// (i.e. if allow-popups is specified)
|
|
NS_ENSURE_TRUE(mContentViewer, NS_ERROR_FAILURE);
|
|
Document* doc = mContentViewer->GetDocument();
|
|
|
|
const bool isDocumentAuxSandboxed =
|
|
doc && (doc->GetSandboxFlags() & SANDBOXED_AUXILIARY_NAVIGATION);
|
|
|
|
if (isDocumentAuxSandboxed) {
|
|
return NS_ERROR_DOM_INVALID_ACCESS_ERR;
|
|
}
|
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> win = GetWindow();
|
|
NS_ENSURE_TRUE(win, NS_ERROR_NOT_AVAILABLE);
|
|
|
|
RefPtr<BrowsingContext> newBC;
|
|
nsAutoCString spec;
|
|
aLoadState->URI()->GetSpec(spec);
|
|
|
|
// If we are a noopener load, we just hand the whole thing over to our
|
|
// window.
|
|
if (aLoadState->HasInternalLoadFlags(INTERNAL_LOAD_FLAGS_NO_OPENER) ||
|
|
NoopenerForceEnabled()) {
|
|
// Various asserts that we know to hold because NO_OPENER loads can only
|
|
// happen for links.
|
|
MOZ_ASSERT(!aLoadState->LoadReplace());
|
|
MOZ_ASSERT(aLoadState->PrincipalToInherit() ==
|
|
aLoadState->TriggeringPrincipal());
|
|
MOZ_ASSERT(!(aLoadState->InternalLoadFlags() &
|
|
~(INTERNAL_LOAD_FLAGS_NO_OPENER |
|
|
INTERNAL_LOAD_FLAGS_DONT_SEND_REFERRER)),
|
|
"Only INTERNAL_LOAD_FLAGS_NO_OPENER and "
|
|
"INTERNAL_LOAD_FLAGS_DONT_SEND_REFERRER can be set");
|
|
MOZ_ASSERT_IF(aLoadState->PostDataStream(),
|
|
aLoadState->IsFormSubmission());
|
|
MOZ_ASSERT(!aLoadState->HeadersStream());
|
|
// If OnLinkClickSync was invoked inside the onload handler, the load
|
|
// type would be set to LOAD_NORMAL_REPLACE; otherwise it should be
|
|
// LOAD_LINK.
|
|
MOZ_ASSERT(aLoadState->LoadType() == LOAD_LINK ||
|
|
aLoadState->LoadType() == LOAD_NORMAL_REPLACE);
|
|
MOZ_ASSERT(!aLoadState->LoadIsFromSessionHistory());
|
|
MOZ_ASSERT(aLoadState->FirstParty()); // Windowwatcher will assume this.
|
|
|
|
RefPtr<nsDocShellLoadState> loadState =
|
|
new nsDocShellLoadState(aLoadState->URI());
|
|
|
|
// Set up our loadinfo so it will do the load as much like we would have
|
|
// as possible.
|
|
loadState->SetReferrerInfo(aLoadState->GetReferrerInfo());
|
|
loadState->SetOriginalURI(aLoadState->OriginalURI());
|
|
|
|
Maybe<nsCOMPtr<nsIURI>> resultPrincipalURI;
|
|
aLoadState->GetMaybeResultPrincipalURI(resultPrincipalURI);
|
|
|
|
loadState->SetMaybeResultPrincipalURI(resultPrincipalURI);
|
|
loadState->SetKeepResultPrincipalURIIfSet(
|
|
aLoadState->KeepResultPrincipalURIIfSet());
|
|
// LoadReplace will always be false due to asserts above, skip setting
|
|
// it.
|
|
loadState->SetTriggeringPrincipal(aLoadState->TriggeringPrincipal());
|
|
loadState->SetTriggeringSandboxFlags(
|
|
aLoadState->TriggeringSandboxFlags());
|
|
loadState->SetCsp(aLoadState->Csp());
|
|
loadState->SetInheritPrincipal(aLoadState->HasInternalLoadFlags(
|
|
INTERNAL_LOAD_FLAGS_INHERIT_PRINCIPAL));
|
|
// Explicit principal because we do not want any guesses as to what the
|
|
// principal to inherit is: it should be aTriggeringPrincipal.
|
|
loadState->SetPrincipalIsExplicit(true);
|
|
loadState->SetLoadType(LOAD_LINK);
|
|
loadState->SetForceAllowDataURI(aLoadState->HasInternalLoadFlags(
|
|
INTERNAL_LOAD_FLAGS_FORCE_ALLOW_DATA_URI));
|
|
|
|
loadState->SetHasValidUserGestureActivation(
|
|
aLoadState->HasValidUserGestureActivation());
|
|
|
|
// Propagate POST data to the new load.
|
|
loadState->SetPostDataStream(aLoadState->PostDataStream());
|
|
loadState->SetIsFormSubmission(aLoadState->IsFormSubmission());
|
|
|
|
rv = win->Open(NS_ConvertUTF8toUTF16(spec),
|
|
aLoadState->Target(), // window name
|
|
u""_ns, // Features
|
|
loadState,
|
|
true, // aForceNoOpener
|
|
getter_AddRefs(newBC));
|
|
MOZ_ASSERT(!newBC);
|
|
return rv;
|
|
}
|
|
|
|
rv = win->OpenNoNavigate(NS_ConvertUTF8toUTF16(spec),
|
|
aLoadState->Target(), // window name
|
|
u""_ns, // Features
|
|
getter_AddRefs(newBC));
|
|
|
|
// In some cases the Open call doesn't actually result in a new
|
|
// window being opened. We can detect these cases by examining the
|
|
// document in |newBC|, if any.
|
|
nsCOMPtr<nsPIDOMWindowOuter> piNewWin =
|
|
newBC ? newBC->GetDOMWindow() : nullptr;
|
|
if (piNewWin) {
|
|
RefPtr<Document> newDoc = piNewWin->GetExtantDoc();
|
|
if (!newDoc || newDoc->IsInitialDocument()) {
|
|
aLoadState->SetInternalLoadFlag(INTERNAL_LOAD_FLAGS_FIRST_LOAD);
|
|
}
|
|
}
|
|
|
|
if (newBC) {
|
|
targetContext = newBC;
|
|
}
|
|
}
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
NS_ENSURE_TRUE(targetContext, rv);
|
|
|
|
// If our target BrowsingContext is still pending initialization, ignore the
|
|
// navigation request targeting it.
|
|
if (NS_WARN_IF(targetContext->GetPendingInitialization())) {
|
|
return NS_OK;
|
|
}
|
|
|
|
aLoadState->SetTargetBrowsingContext(targetContext);
|
|
//
|
|
// Transfer the load to the target BrowsingContext... Clear the window target
|
|
// name to the empty string to prevent recursive retargeting!
|
|
//
|
|
// No window target
|
|
aLoadState->SetTarget(u""_ns);
|
|
// No forced download
|
|
aLoadState->SetFileName(VoidString());
|
|
return targetContext->InternalLoad(aLoadState);
|
|
}
|
|
|
|
bool nsDocShell::IsSameDocumentNavigation(nsDocShellLoadState* aLoadState,
|
|
SameDocumentNavigationState& aState) {
|
|
MOZ_ASSERT(aLoadState);
|
|
if (!(aLoadState->LoadType() == LOAD_NORMAL ||
|
|
aLoadState->LoadType() == LOAD_STOP_CONTENT ||
|
|
LOAD_TYPE_HAS_FLAGS(aLoadState->LoadType(),
|
|
LOAD_FLAGS_REPLACE_HISTORY) ||
|
|
aLoadState->LoadType() == LOAD_HISTORY ||
|
|
aLoadState->LoadType() == LOAD_LINK)) {
|
|
return false;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> currentURI = mCurrentURI;
|
|
|
|
nsresult rvURINew = aLoadState->URI()->GetRef(aState.mNewHash);
|
|
if (NS_SUCCEEDED(rvURINew)) {
|
|
rvURINew = aLoadState->URI()->GetHasRef(&aState.mNewURIHasRef);
|
|
}
|
|
|
|
if (currentURI && NS_SUCCEEDED(rvURINew)) {
|
|
nsresult rvURIOld = currentURI->GetRef(aState.mCurrentHash);
|
|
if (NS_SUCCEEDED(rvURIOld)) {
|
|
rvURIOld = currentURI->GetHasRef(&aState.mCurrentURIHasRef);
|
|
}
|
|
if (NS_SUCCEEDED(rvURIOld)) {
|
|
if (NS_FAILED(currentURI->EqualsExceptRef(aLoadState->URI(),
|
|
&aState.mSameExceptHashes))) {
|
|
aState.mSameExceptHashes = false;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!aState.mSameExceptHashes && currentURI && NS_SUCCEEDED(rvURINew)) {
|
|
// Maybe aLoadState->URI() came from the exposable form of currentURI?
|
|
nsCOMPtr<nsIURI> currentExposableURI =
|
|
nsIOService::CreateExposableURI(currentURI);
|
|
nsresult rvURIOld = currentExposableURI->GetRef(aState.mCurrentHash);
|
|
if (NS_SUCCEEDED(rvURIOld)) {
|
|
rvURIOld = currentExposableURI->GetHasRef(&aState.mCurrentURIHasRef);
|
|
}
|
|
if (NS_SUCCEEDED(rvURIOld)) {
|
|
if (NS_FAILED(currentExposableURI->EqualsExceptRef(
|
|
aLoadState->URI(), &aState.mSameExceptHashes))) {
|
|
aState.mSameExceptHashes = false;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
if (mActiveEntry && aLoadState->LoadIsFromSessionHistory()) {
|
|
aState.mHistoryNavBetweenSameDoc = mActiveEntry->SharesDocumentWith(
|
|
aLoadState->GetLoadingSessionHistoryInfo()->mInfo);
|
|
}
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell::IsSameDocumentNavigation %p NavBetweenSameDoc=%d",
|
|
this, aState.mHistoryNavBetweenSameDoc));
|
|
} else {
|
|
if (mOSHE && aLoadState->LoadIsFromSessionHistory()) {
|
|
// We're doing a history load.
|
|
|
|
mOSHE->SharesDocumentWith(aLoadState->SHEntry(),
|
|
&aState.mHistoryNavBetweenSameDoc);
|
|
}
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
if (aState.mHistoryNavBetweenSameDoc) {
|
|
nsCOMPtr<nsIInputStream> currentPostData;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
currentPostData = mActiveEntry->GetPostData();
|
|
} else {
|
|
currentPostData = mOSHE->GetPostData();
|
|
}
|
|
NS_ASSERTION(currentPostData == aLoadState->PostDataStream(),
|
|
"Different POST data for entries for the same page?");
|
|
}
|
|
#endif
|
|
|
|
// A same document navigation happens when we navigate between two SHEntries
|
|
// for the same document. We do a same document navigation under two
|
|
// circumstances. Either
|
|
//
|
|
// a) we're navigating between two different SHEntries which share a
|
|
// document, or
|
|
//
|
|
// b) we're navigating to a new shentry whose URI differs from the
|
|
// current URI only in its hash, the new hash is non-empty, and
|
|
// we're not doing a POST.
|
|
//
|
|
// The restriction that the SHEntries in (a) must be different ensures
|
|
// that history.go(0) and the like trigger full refreshes, rather than
|
|
// same document navigations.
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
bool doSameDocumentNavigation =
|
|
(aState.mHistoryNavBetweenSameDoc && mOSHE != aLoadState->SHEntry()) ||
|
|
(!aLoadState->SHEntry() && !aLoadState->PostDataStream() &&
|
|
aState.mSameExceptHashes && aState.mNewURIHasRef);
|
|
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p NavBetweenSameDoc=%d is same doc = %d", this,
|
|
aState.mHistoryNavBetweenSameDoc, doSameDocumentNavigation));
|
|
return doSameDocumentNavigation;
|
|
}
|
|
|
|
if (aState.mHistoryNavBetweenSameDoc &&
|
|
!aLoadState->GetLoadingSessionHistoryInfo()->mLoadingCurrentActiveEntry) {
|
|
return true;
|
|
}
|
|
|
|
MOZ_LOG(
|
|
gSHLog, LogLevel::Debug,
|
|
("nsDocShell::IsSameDocumentNavigation %p !LoadIsFromSessionHistory=%s "
|
|
"!PostDataStream: %s mSameExceptHashes: %s mNewURIHasRef: %s",
|
|
this, !aLoadState->LoadIsFromSessionHistory() ? "true" : "false",
|
|
!aLoadState->PostDataStream() ? "true" : "false",
|
|
aState.mSameExceptHashes ? "true" : "false",
|
|
aState.mNewURIHasRef ? "true" : "false"));
|
|
return !aLoadState->LoadIsFromSessionHistory() &&
|
|
!aLoadState->PostDataStream() && aState.mSameExceptHashes &&
|
|
aState.mNewURIHasRef;
|
|
}
|
|
|
|
nsresult nsDocShell::HandleSameDocumentNavigation(
|
|
nsDocShellLoadState* aLoadState, SameDocumentNavigationState& aState) {
|
|
#ifdef DEBUG
|
|
SameDocumentNavigationState state;
|
|
MOZ_ASSERT(IsSameDocumentNavigation(aLoadState, state));
|
|
#endif
|
|
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell::HandleSameDocumentNavigation %p %s -> %s", this,
|
|
mCurrentURI->GetSpecOrDefault().get(),
|
|
aLoadState->URI()->GetSpecOrDefault().get()));
|
|
nsCOMPtr<nsIURI> currentURI = mCurrentURI;
|
|
|
|
// Save the position of the scrollers.
|
|
nsPoint scrollPos = GetCurScrollPos();
|
|
|
|
// Reset mLoadType to its original value once we exit this block, because this
|
|
// same document navigation might have started after a normal, network load,
|
|
// and we don't want to clobber its load type. See bug 737307.
|
|
AutoRestore<uint32_t> loadTypeResetter(mLoadType);
|
|
|
|
// If a non-same-document-navigation (i.e., a network load) is pending, make
|
|
// this a replacement load, so that we don't add a SHEntry here and the
|
|
// network load goes into the SHEntry it expects to.
|
|
if (JustStartedNetworkLoad() && (aLoadState->LoadType() & LOAD_CMD_NORMAL)) {
|
|
mLoadType = LOAD_NORMAL_REPLACE;
|
|
} else {
|
|
mLoadType = aLoadState->LoadType();
|
|
}
|
|
|
|
mURIResultedInDocument = true;
|
|
|
|
nsCOMPtr<nsISHEntry> oldLSHE = mLSHE;
|
|
|
|
// we need to assign aLoadState->SHEntry() to mLSHE right here, so that on
|
|
// History loads, SetCurrentURI() called from OnNewURI() will send proper
|
|
// onLocationChange() notifications to the browser to update back/forward
|
|
// buttons.
|
|
SetHistoryEntryAndUpdateBC(Some<nsISHEntry*>(aLoadState->SHEntry()),
|
|
Nothing());
|
|
UniquePtr<mozilla::dom::LoadingSessionHistoryInfo> oldLoadingEntry;
|
|
mLoadingEntry.swap(oldLoadingEntry);
|
|
if (aLoadState->GetLoadingSessionHistoryInfo()) {
|
|
mLoadingEntry = MakeUnique<LoadingSessionHistoryInfo>(
|
|
*aLoadState->GetLoadingSessionHistoryInfo());
|
|
}
|
|
|
|
// Set the doc's URI according to the new history entry's URI.
|
|
RefPtr<Document> doc = GetDocument();
|
|
NS_ENSURE_TRUE(doc, NS_ERROR_FAILURE);
|
|
doc->SetDocumentURI(aLoadState->URI());
|
|
|
|
/* This is a anchor traversal within the same page.
|
|
* call OnNewURI() so that, this traversal will be
|
|
* recorded in session and global history.
|
|
*/
|
|
nsCOMPtr<nsIPrincipal> newURITriggeringPrincipal, newURIPrincipalToInherit,
|
|
newURIPartitionedPrincipalToInherit;
|
|
nsCOMPtr<nsIContentSecurityPolicy> newCsp;
|
|
if (mozilla::SessionHistoryInParent() ? !!mActiveEntry : !!mOSHE) {
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
newURITriggeringPrincipal = mActiveEntry->GetTriggeringPrincipal();
|
|
newURIPrincipalToInherit = mActiveEntry->GetPrincipalToInherit();
|
|
newURIPartitionedPrincipalToInherit =
|
|
mActiveEntry->GetPartitionedPrincipalToInherit();
|
|
newCsp = mActiveEntry->GetCsp();
|
|
} else {
|
|
newURITriggeringPrincipal = mOSHE->GetTriggeringPrincipal();
|
|
newURIPrincipalToInherit = mOSHE->GetPrincipalToInherit();
|
|
newURIPartitionedPrincipalToInherit =
|
|
mOSHE->GetPartitionedPrincipalToInherit();
|
|
newCsp = mOSHE->GetCsp();
|
|
}
|
|
} else {
|
|
newURITriggeringPrincipal = aLoadState->TriggeringPrincipal();
|
|
newURIPrincipalToInherit = doc->NodePrincipal();
|
|
newURIPartitionedPrincipalToInherit = doc->PartitionedPrincipal();
|
|
newCsp = doc->GetCsp();
|
|
}
|
|
// Pass true for aCloneSHChildren, since we're not
|
|
// changing documents here, so all of our subframes are
|
|
// still relevant to the new session history entry.
|
|
//
|
|
// It also makes OnNewURI(...) set LOCATION_CHANGE_SAME_DOCUMENT
|
|
// flag on firing onLocationChange(...).
|
|
// Anyway, aCloneSHChildren param is simply reflecting
|
|
// doSameDocumentNavigation in this scope.
|
|
//
|
|
// Note: we'll actually fire onLocationChange later, in order to preserve
|
|
// ordering of HistoryCommit() in the parent vs onLocationChange (bug
|
|
// 1668126)
|
|
bool locationChangeNeeded =
|
|
OnNewURI(aLoadState->URI(), nullptr, newURITriggeringPrincipal,
|
|
newURIPrincipalToInherit, newURIPartitionedPrincipalToInherit,
|
|
newCsp, false, true, true);
|
|
|
|
nsCOMPtr<nsIInputStream> postData;
|
|
uint32_t cacheKey = 0;
|
|
|
|
bool scrollRestorationIsManual = false;
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
if (mOSHE) {
|
|
/* save current position of scroller(s) (bug 59774) */
|
|
mOSHE->SetScrollPosition(scrollPos.x, scrollPos.y);
|
|
scrollRestorationIsManual = mOSHE->GetScrollRestorationIsManual();
|
|
// Get the postdata and page ident from the current page, if
|
|
// the new load is being done via normal means. Note that
|
|
// "normal means" can be checked for just by checking for
|
|
// LOAD_CMD_NORMAL, given the loadType and allowScroll check
|
|
// above -- it filters out some LOAD_CMD_NORMAL cases that we
|
|
// wouldn't want here.
|
|
if (aLoadState->LoadType() & LOAD_CMD_NORMAL) {
|
|
postData = mOSHE->GetPostData();
|
|
cacheKey = mOSHE->GetCacheKey();
|
|
}
|
|
|
|
// Link our new SHEntry to the old SHEntry's back/forward
|
|
// cache data, since the two SHEntries correspond to the
|
|
// same document.
|
|
if (mLSHE) {
|
|
if (!aLoadState->LoadIsFromSessionHistory()) {
|
|
// If we're not doing a history load, scroll restoration
|
|
// should be inherited from the previous session history entry.
|
|
SetScrollRestorationIsManualOnHistoryEntry(mLSHE,
|
|
scrollRestorationIsManual);
|
|
}
|
|
mLSHE->AdoptBFCacheEntry(mOSHE);
|
|
}
|
|
}
|
|
} else {
|
|
if (mLoadingEntry) {
|
|
if (!mLoadingEntry->mLoadIsFromSessionHistory) {
|
|
// If we're not doing a history load, scroll restoration
|
|
// should be inherited from the previous session history entry.
|
|
// XXX This needs most probably tweaks once fragment navigation is
|
|
// fixed to work with session-history-in-parent.
|
|
SetScrollRestorationIsManualOnHistoryEntry(nullptr,
|
|
scrollRestorationIsManual);
|
|
}
|
|
}
|
|
}
|
|
|
|
// If we're doing a history load, use its scroll restoration state.
|
|
if (aLoadState->LoadIsFromSessionHistory()) {
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
scrollRestorationIsManual = aLoadState->GetLoadingSessionHistoryInfo()
|
|
->mInfo.GetScrollRestorationIsManual();
|
|
} else {
|
|
scrollRestorationIsManual =
|
|
aLoadState->SHEntry()->GetScrollRestorationIsManual();
|
|
}
|
|
}
|
|
|
|
/* Assign mLSHE to mOSHE. This will either be a new entry created
|
|
* by OnNewURI() for normal loads or aLoadState->SHEntry() for history
|
|
* loads.
|
|
*/
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
if (mLSHE) {
|
|
SetHistoryEntryAndUpdateBC(Nothing(), Some<nsISHEntry*>(mLSHE));
|
|
// Save the postData obtained from the previous page
|
|
// in to the session history entry created for the
|
|
// anchor page, so that any history load of the anchor
|
|
// page will restore the appropriate postData.
|
|
if (postData) {
|
|
mOSHE->SetPostData(postData);
|
|
}
|
|
|
|
// Make sure we won't just repost without hitting the
|
|
// cache first
|
|
if (cacheKey != 0) {
|
|
mOSHE->SetCacheKey(cacheKey);
|
|
}
|
|
}
|
|
|
|
/* Set the title for the SH entry for this target url so that
|
|
* SH menus in go/back/forward buttons won't be empty for this.
|
|
* Note, this happens on mOSHE (and mActiveEntry in the future) because of
|
|
* the code above.
|
|
* XXX HandleSameDocumentNavigation needs to be made work with
|
|
* session-history-in-parent, and then this might not be needed.
|
|
*/
|
|
SetTitleOnHistoryEntry();
|
|
} else {
|
|
if (aLoadState->LoadIsFromSessionHistory()) {
|
|
MOZ_LOG(
|
|
gSHLog, LogLevel::Debug,
|
|
("Moving the loading entry to the active entry on nsDocShell %p to "
|
|
"%s",
|
|
this, mLoadingEntry->mInfo.GetURI()->GetSpecOrDefault().get()));
|
|
bool hadActiveEntry = !!mActiveEntry;
|
|
mActiveEntry = MakeUnique<SessionHistoryInfo>(mLoadingEntry->mInfo);
|
|
mBrowsingContext->SessionHistoryCommit(*mLoadingEntry, mLoadType,
|
|
hadActiveEntry, true, true);
|
|
// FIXME Need to set postdata.
|
|
SetCacheKeyOnHistoryEntry(nullptr, cacheKey);
|
|
|
|
// Set the title for the SH entry for this target url so that
|
|
// SH menus in go/back/forward buttons won't be empty for this.
|
|
SetTitleOnHistoryEntry();
|
|
} else {
|
|
Maybe<bool> scrollRestorationIsManual;
|
|
if (mActiveEntry) {
|
|
scrollRestorationIsManual.emplace(
|
|
mActiveEntry->GetScrollRestorationIsManual());
|
|
|
|
// Get the postdata and page ident from the current page, if the new
|
|
// load is being done via normal means. Note that "normal means" can be
|
|
// checked for just by checking for LOAD_CMD_NORMAL, given the loadType
|
|
// and allowScroll check above -- it filters out some LOAD_CMD_NORMAL
|
|
// cases that we wouldn't want here.
|
|
if (aLoadState->LoadType() & LOAD_CMD_NORMAL) {
|
|
postData = mActiveEntry->GetPostData();
|
|
cacheKey = mActiveEntry->GetCacheKey();
|
|
}
|
|
}
|
|
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("Creating an active entry on nsDocShell %p to %s", this,
|
|
aLoadState->URI()->GetSpecOrDefault().get()));
|
|
if (mActiveEntry) {
|
|
mActiveEntry =
|
|
MakeUnique<SessionHistoryInfo>(*mActiveEntry, aLoadState->URI());
|
|
} else {
|
|
mActiveEntry = MakeUnique<SessionHistoryInfo>(
|
|
aLoadState->URI(), newURITriggeringPrincipal,
|
|
newURIPrincipalToInherit, newURIPartitionedPrincipalToInherit,
|
|
newCsp, mContentTypeHint);
|
|
}
|
|
|
|
// Save the postData obtained from the previous page in to the session
|
|
// history entry created for the anchor page, so that any history load of
|
|
// the anchor page will restore the appropriate postData.
|
|
if (postData) {
|
|
mActiveEntry->SetPostData(postData);
|
|
}
|
|
|
|
// Make sure we won't just repost without hitting the
|
|
// cache first
|
|
if (cacheKey != 0) {
|
|
mActiveEntry->SetCacheKey(cacheKey);
|
|
}
|
|
|
|
// Set the title for the SH entry for this target url so that
|
|
// SH menus in go/back/forward buttons won't be empty for this.
|
|
mActiveEntry->SetTitle(mTitle);
|
|
|
|
if (scrollRestorationIsManual.isSome()) {
|
|
mActiveEntry->SetScrollRestorationIsManual(
|
|
scrollRestorationIsManual.value());
|
|
}
|
|
|
|
if (LOAD_TYPE_HAS_FLAGS(mLoadType, LOAD_FLAGS_REPLACE_HISTORY)) {
|
|
mBrowsingContext->ReplaceActiveSessionHistoryEntry(mActiveEntry.get());
|
|
} else {
|
|
mBrowsingContext->IncrementHistoryEntryCountForBrowsingContext();
|
|
// FIXME We should probably just compute mChildOffset in the parent
|
|
// instead of passing it over IPC here.
|
|
mBrowsingContext->SetActiveSessionHistoryEntry(
|
|
Some(scrollPos), mActiveEntry.get(), mLoadType, cacheKey);
|
|
// FIXME Do we need to update mPreviousEntryIndex and mLoadedEntryIndex?
|
|
}
|
|
}
|
|
}
|
|
|
|
if (locationChangeNeeded) {
|
|
FireOnLocationChange(this, nullptr, aLoadState->URI(),
|
|
LOCATION_CHANGE_SAME_DOCUMENT);
|
|
}
|
|
|
|
/* Restore the original LSHE if we were loading something
|
|
* while same document navigation was initiated.
|
|
*/
|
|
SetHistoryEntryAndUpdateBC(Some<nsISHEntry*>(oldLSHE), Nothing());
|
|
mLoadingEntry.swap(oldLoadingEntry);
|
|
|
|
/* Set the title for the Global History entry for this anchor url.
|
|
*/
|
|
UpdateGlobalHistoryTitle(aLoadState->URI());
|
|
|
|
SetDocCurrentStateObj(mOSHE, mActiveEntry.get());
|
|
|
|
// Inform the favicon service that the favicon for oldURI also
|
|
// applies to aLoadState->URI().
|
|
CopyFavicon(currentURI, aLoadState->URI(), UsePrivateBrowsing());
|
|
|
|
RefPtr<nsGlobalWindowOuter> scriptGlobal = mScriptGlobal;
|
|
RefPtr<nsGlobalWindowInner> win =
|
|
scriptGlobal ? scriptGlobal->GetCurrentInnerWindowInternal() : nullptr;
|
|
|
|
// ScrollToAnchor doesn't necessarily cause us to scroll the window;
|
|
// the function decides whether a scroll is appropriate based on the
|
|
// arguments it receives. But even if we don't end up scrolling,
|
|
// ScrollToAnchor performs other important tasks, such as informing
|
|
// the presShell that we have a new hash. See bug 680257.
|
|
nsresult rv = ScrollToAnchor(aState.mCurrentURIHasRef, aState.mNewURIHasRef,
|
|
aState.mNewHash, aLoadState->LoadType());
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
/* restore previous position of scroller(s), if we're moving
|
|
* back in history (bug 59774)
|
|
*/
|
|
nscoord bx = 0;
|
|
nscoord by = 0;
|
|
bool needsScrollPosUpdate = false;
|
|
if ((mozilla::SessionHistoryInParent() ? !!mActiveEntry : !!mOSHE) &&
|
|
(aLoadState->LoadType() == LOAD_HISTORY ||
|
|
aLoadState->LoadType() == LOAD_RELOAD_NORMAL) &&
|
|
!scrollRestorationIsManual) {
|
|
needsScrollPosUpdate = true;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
mActiveEntry->GetScrollPosition(&bx, &by);
|
|
} else {
|
|
mOSHE->GetScrollPosition(&bx, &by);
|
|
}
|
|
}
|
|
|
|
// Dispatch the popstate and hashchange events, as appropriate.
|
|
//
|
|
// The event dispatch below can cause us to re-enter script and
|
|
// destroy the docshell, nulling out mScriptGlobal. Hold a stack
|
|
// reference to avoid null derefs. See bug 914521.
|
|
if (win) {
|
|
// Fire a hashchange event URIs differ, and only in their hashes.
|
|
bool doHashchange = aState.mSameExceptHashes &&
|
|
(aState.mCurrentURIHasRef != aState.mNewURIHasRef ||
|
|
!aState.mCurrentHash.Equals(aState.mNewHash));
|
|
|
|
if (aState.mHistoryNavBetweenSameDoc || doHashchange) {
|
|
win->DispatchSyncPopState();
|
|
}
|
|
|
|
if (needsScrollPosUpdate && win->HasActiveDocument()) {
|
|
SetCurScrollPosEx(bx, by);
|
|
}
|
|
|
|
if (doHashchange) {
|
|
// Note that currentURI hasn't changed because it's on the
|
|
// stack, so we can just use it directly as the old URI.
|
|
win->DispatchAsyncHashchange(currentURI, aLoadState->URI());
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
static bool NavigationShouldTakeFocus(nsDocShell* aDocShell,
|
|
nsDocShellLoadState* aLoadState) {
|
|
if (!aLoadState->AllowFocusMove()) {
|
|
return false;
|
|
}
|
|
|
|
const auto& sourceBC = aLoadState->SourceBrowsingContext();
|
|
if (!sourceBC || !sourceBC->IsActive()) {
|
|
// If the navigation didn't come from a foreground tab, then we don't steal
|
|
// focus.
|
|
return false;
|
|
}
|
|
auto* bc = aDocShell->GetBrowsingContext();
|
|
if (sourceBC.get() == bc) {
|
|
// If it comes from the same tab / frame, don't steal focus either.
|
|
return false;
|
|
}
|
|
auto* fm = nsFocusManager::GetFocusManager();
|
|
if (fm && bc->IsActive() && fm->IsInActiveWindow(bc)) {
|
|
// If we're already on the foreground tab of the foreground window, then we
|
|
// don't need to do this. This helps to e.g. not steal focus from the
|
|
// browser chrome unnecessarily.
|
|
return false;
|
|
}
|
|
if (auto* doc = aDocShell->GetExtantDocument()) {
|
|
if (doc->IsInitialDocument()) {
|
|
// If we're the initial load for the browsing context, the browser
|
|
// chrome determines what to focus. This is important because the
|
|
// browser chrome may want to e.g focus the url-bar
|
|
return false;
|
|
}
|
|
}
|
|
// Take loadDivertedInBackground into account so the behavior would be the
|
|
// same as how the tab first opened.
|
|
return !Preferences::GetBool("browser.tabs.loadDivertedInBackground", false);
|
|
}
|
|
|
|
nsresult nsDocShell::InternalLoad(nsDocShellLoadState* aLoadState,
|
|
Maybe<uint32_t> aCacheKey) {
|
|
MOZ_ASSERT(aLoadState, "need a load state!");
|
|
MOZ_ASSERT(aLoadState->TriggeringPrincipal(),
|
|
"need a valid TriggeringPrincipal");
|
|
|
|
if (!aLoadState->TriggeringPrincipal()) {
|
|
MOZ_ASSERT(false, "InternalLoad needs a valid triggeringPrincipal");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
if (NS_WARN_IF(mBrowsingContext->GetPendingInitialization())) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
const bool shouldTakeFocus = NavigationShouldTakeFocus(this, aLoadState);
|
|
|
|
mOriginalUriString.Truncate();
|
|
|
|
MOZ_LOG(gDocShellLeakLog, LogLevel::Debug,
|
|
("DOCSHELL %p InternalLoad %s\n", this,
|
|
aLoadState->URI()->GetSpecOrDefault().get()));
|
|
|
|
NS_ENSURE_TRUE(IsValidLoadType(aLoadState->LoadType()), NS_ERROR_INVALID_ARG);
|
|
|
|
// Cancel loads coming from Docshells that are being destroyed.
|
|
if (mIsBeingDestroyed) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
nsresult rv = EnsureScriptEnvironment();
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
// If we have a target to move to, do that now.
|
|
if (!aLoadState->Target().IsEmpty()) {
|
|
return PerformRetargeting(aLoadState);
|
|
}
|
|
|
|
if (aLoadState->TargetBrowsingContext().IsNull()) {
|
|
aLoadState->SetTargetBrowsingContext(GetBrowsingContext());
|
|
}
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(
|
|
aLoadState->TargetBrowsingContext() == GetBrowsingContext(),
|
|
"Load must be targeting this BrowsingContext");
|
|
|
|
MOZ_TRY(CheckDisallowedJavascriptLoad(aLoadState));
|
|
|
|
// If we don't have a target, we're loading into ourselves, and our load
|
|
// delegate may want to intercept that load.
|
|
SameDocumentNavigationState sameDocumentNavigationState;
|
|
bool sameDocument =
|
|
IsSameDocumentNavigation(aLoadState, sameDocumentNavigationState) &&
|
|
!aLoadState->GetPendingRedirectedChannel();
|
|
|
|
// Note: We do this check both here and in BrowsingContext::
|
|
// LoadURI/InternalLoad, since document-specific sandbox flags are only
|
|
// available in the process triggering the load, and we don't want the target
|
|
// process to have to trust the triggering process to do the appropriate
|
|
// checks for the BrowsingContext's sandbox flags.
|
|
MOZ_TRY(mBrowsingContext->CheckSandboxFlags(aLoadState));
|
|
|
|
NS_ENSURE_STATE(!HasUnloadedParent());
|
|
|
|
rv = CheckLoadingPermissions();
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
if (mFiredUnloadEvent) {
|
|
if (IsOKToLoadURI(aLoadState->URI())) {
|
|
MOZ_ASSERT(aLoadState->Target().IsEmpty(),
|
|
"Shouldn't have a window target here!");
|
|
|
|
// If this is a replace load, make whatever load triggered
|
|
// the unload event also a replace load, so we don't
|
|
// create extra history entries.
|
|
if (LOAD_TYPE_HAS_FLAGS(aLoadState->LoadType(),
|
|
LOAD_FLAGS_REPLACE_HISTORY)) {
|
|
mLoadType = LOAD_NORMAL_REPLACE;
|
|
}
|
|
|
|
// Do this asynchronously
|
|
nsCOMPtr<nsIRunnable> ev = new InternalLoadEvent(this, aLoadState);
|
|
return Dispatch(TaskCategory::Other, ev.forget());
|
|
}
|
|
|
|
// Just ignore this load attempt
|
|
return NS_OK;
|
|
}
|
|
|
|
// If we are loading a URI that should inherit a security context (basically
|
|
// javascript: at this point), and the caller has said that principal
|
|
// inheritance is allowed, there are a few possible cases:
|
|
//
|
|
// 1) We are provided with the principal to inherit. In that case, we just use
|
|
// it.
|
|
//
|
|
// 2) The load is coming from some other application. In this case we don't
|
|
// want to inherit from whatever document we have loaded now, since the
|
|
// load is unrelated to it.
|
|
//
|
|
// 3) It's a load from our application, but does not provide an explicit
|
|
// principal to inherit. In that case, we want to inherit the principal of
|
|
// our current document, or of our parent document (if any) if we don't
|
|
// have a current document.
|
|
{
|
|
bool inherits;
|
|
|
|
if (!aLoadState->HasLoadFlags(LOAD_FLAGS_FROM_EXTERNAL) &&
|
|
!aLoadState->PrincipalToInherit() &&
|
|
(aLoadState->HasInternalLoadFlags(
|
|
INTERNAL_LOAD_FLAGS_INHERIT_PRINCIPAL)) &&
|
|
NS_SUCCEEDED(nsContentUtils::URIInheritsSecurityContext(
|
|
aLoadState->URI(), &inherits)) &&
|
|
inherits) {
|
|
aLoadState->SetPrincipalToInherit(GetInheritedPrincipal(true));
|
|
}
|
|
// If principalToInherit is still null (e.g. if some of the conditions of
|
|
// were not satisfied), then no inheritance of any sort will happen: the
|
|
// load will just get a principal based on the URI being loaded.
|
|
}
|
|
|
|
// If this docshell is owned by a frameloader, make sure to cancel
|
|
// possible frameloader initialization before loading a new page.
|
|
nsCOMPtr<nsIDocShellTreeItem> parent = GetInProcessParentDocshell();
|
|
if (parent) {
|
|
RefPtr<Document> doc = parent->GetDocument();
|
|
if (doc) {
|
|
doc->TryCancelFrameLoaderInitialization(this);
|
|
}
|
|
}
|
|
|
|
// Before going any further vet loads initiated by external programs.
|
|
if (aLoadState->HasLoadFlags(LOAD_FLAGS_FROM_EXTERNAL)) {
|
|
MOZ_DIAGNOSTIC_ASSERT(aLoadState->LoadType() == LOAD_NORMAL);
|
|
|
|
// Disallow external chrome: loads targetted at content windows
|
|
if (SchemeIsChrome(aLoadState->URI())) {
|
|
NS_WARNING("blocked external chrome: url -- use '--chrome' option");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// clear the decks to prevent context bleed-through (bug 298255)
|
|
rv = CreateAboutBlankContentViewer(nullptr, nullptr, nullptr, nullptr);
|
|
if (NS_FAILED(rv)) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
}
|
|
|
|
mAllowKeywordFixup = aLoadState->HasInternalLoadFlags(
|
|
INTERNAL_LOAD_FLAGS_ALLOW_THIRD_PARTY_FIXUP);
|
|
mURIResultedInDocument = false; // reset the clock...
|
|
|
|
// See if this is actually a load between two history entries for the same
|
|
// document. If the process fails, or if we successfully navigate within the
|
|
// same document, return.
|
|
if (sameDocument) {
|
|
nsresult rv =
|
|
HandleSameDocumentNavigation(aLoadState, sameDocumentNavigationState);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
if (shouldTakeFocus) {
|
|
mBrowsingContext->Focus(CallerType::System, IgnoreErrors());
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
// mContentViewer->PermitUnload can destroy |this| docShell, which
|
|
// causes the next call of CanSavePresentation to crash.
|
|
// Hold onto |this| until we return, to prevent a crash from happening.
|
|
// (bug#331040)
|
|
nsCOMPtr<nsIDocShell> kungFuDeathGrip(this);
|
|
|
|
// Don't init timing for javascript:, since it generally doesn't
|
|
// actually start a load or anything. If it does, we'll init
|
|
// timing then, from OnStateChange.
|
|
|
|
// XXXbz mTiming should know what channel it's for, so we don't
|
|
// need this hackery.
|
|
bool toBeReset = false;
|
|
bool isJavaScript = SchemeIsJavascript(aLoadState->URI());
|
|
|
|
if (!isJavaScript) {
|
|
toBeReset = MaybeInitTiming();
|
|
}
|
|
bool isNotDownload = aLoadState->FileName().IsVoid();
|
|
if (mTiming && isNotDownload) {
|
|
mTiming->NotifyBeforeUnload();
|
|
}
|
|
// Check if the page doesn't want to be unloaded. The javascript:
|
|
// protocol handler deals with this for javascript: URLs.
|
|
if (!isJavaScript && isNotDownload &&
|
|
!aLoadState->NotifiedBeforeUnloadListeners() && mContentViewer) {
|
|
bool okToUnload;
|
|
rv = mContentViewer->PermitUnload(&okToUnload);
|
|
|
|
if (NS_SUCCEEDED(rv) && !okToUnload) {
|
|
// The user chose not to unload the page, interrupt the
|
|
// load.
|
|
MaybeResetInitTiming(toBeReset);
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
if (mTiming && isNotDownload) {
|
|
mTiming->NotifyUnloadAccepted(mCurrentURI);
|
|
}
|
|
|
|
// Check if the webbrowser chrome wants the load to proceed; this can be
|
|
// used to cancel attempts to load URIs in the wrong process. testing
|
|
// GetPendingRedirectedChannel() helps to avoid revisiting an earlier
|
|
// redirect decision.
|
|
nsCOMPtr<nsIWebBrowserChrome3> browserChrome3 = do_GetInterface(mTreeOwner);
|
|
if (browserChrome3 && !aLoadState->GetPendingRedirectedChannel()) {
|
|
bool shouldLoad;
|
|
rv = browserChrome3->ShouldLoadURI(
|
|
this, aLoadState->URI(), aLoadState->GetReferrerInfo(),
|
|
!!aLoadState->PostDataStream(), aLoadState->TriggeringPrincipal(),
|
|
aLoadState->Csp(), &shouldLoad);
|
|
if (NS_SUCCEEDED(rv) && !shouldLoad) {
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
// In e10s, in the parent process, we refuse to load anything other than
|
|
// "safe" resources that we ship or trust enough to give "special" URLs.
|
|
// Similar check will be performed by the ParentProcessDocumentChannel if in
|
|
// use.
|
|
if (XRE_IsE10sParentProcess() &&
|
|
!DocumentChannel::CanUseDocumentChannel(aLoadState->URI()) &&
|
|
!CanLoadInParentProcess(aLoadState->URI())) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// Whenever a top-level browsing context is navigated, the user agent MUST
|
|
// lock the orientation of the document to the document's default
|
|
// orientation. We don't explicitly check for a top-level browsing context
|
|
// here because orientation is only set on top-level browsing contexts.
|
|
if (mBrowsingContext->GetOrientationLock() != hal::eScreenOrientation_None) {
|
|
MOZ_ASSERT(mBrowsingContext->IsTop());
|
|
MOZ_ALWAYS_SUCCEEDS(
|
|
mBrowsingContext->SetOrientationLock(hal::eScreenOrientation_None));
|
|
if (mBrowsingContext->IsActive()) {
|
|
ScreenOrientation::UpdateActiveOrientationLock(
|
|
hal::eScreenOrientation_None);
|
|
}
|
|
}
|
|
|
|
// Check for saving the presentation here, before calling Stop().
|
|
// This is necessary so that we can catch any pending requests.
|
|
// Since the new request has not been created yet, we pass null for the
|
|
// new request parameter.
|
|
// Also pass nullptr for the document, since it doesn't affect the return
|
|
// value for our purposes here.
|
|
bool savePresentation =
|
|
CanSavePresentation(aLoadState->LoadType(), nullptr, nullptr);
|
|
|
|
// Don't stop current network activity for javascript: URL's since
|
|
// they might not result in any data, and thus nothing should be
|
|
// stopped in those cases. In the case where they do result in
|
|
// data, the javascript: URL channel takes care of stopping
|
|
// current network activity.
|
|
if (!isJavaScript && isNotDownload) {
|
|
// Stop any current network activity.
|
|
// Also stop content if this is a zombie doc. otherwise
|
|
// the onload will be delayed by other loads initiated in the
|
|
// background by the first document that
|
|
// didn't fully load before the next load was initiated.
|
|
// If not a zombie, don't stop content until data
|
|
// starts arriving from the new URI...
|
|
|
|
if ((mContentViewer && mContentViewer->GetPreviousViewer()) ||
|
|
LOAD_TYPE_HAS_FLAGS(aLoadState->LoadType(), LOAD_FLAGS_STOP_CONTENT)) {
|
|
rv = Stop(nsIWebNavigation::STOP_ALL);
|
|
} else {
|
|
rv = Stop(nsIWebNavigation::STOP_NETWORK);
|
|
}
|
|
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
}
|
|
|
|
mLoadType = aLoadState->LoadType();
|
|
|
|
// aLoadState->SHEntry() should be assigned to mLSHE, only after Stop() has
|
|
// been called. But when loading an error page, do not clear the
|
|
// mLSHE for the real page.
|
|
if (mLoadType != LOAD_ERROR_PAGE) {
|
|
SetHistoryEntryAndUpdateBC(Some<nsISHEntry*>(aLoadState->SHEntry()),
|
|
Nothing());
|
|
if (aLoadState->LoadIsFromSessionHistory() &&
|
|
!mozilla::SessionHistoryInParent()) {
|
|
// We're making history navigation or a reload. Make sure our history ID
|
|
// points to the same ID as SHEntry's docshell ID.
|
|
nsID historyID = {};
|
|
aLoadState->SHEntry()->GetDocshellID(historyID);
|
|
|
|
Unused << mBrowsingContext->SetHistoryID(historyID);
|
|
}
|
|
}
|
|
|
|
mSavingOldViewer = savePresentation;
|
|
|
|
// If we have a saved content viewer in history, restore and show it now.
|
|
if (aLoadState->LoadIsFromSessionHistory() &&
|
|
(mLoadType & LOAD_CMD_HISTORY)) {
|
|
// https://html.spec.whatwg.org/#history-traversal:
|
|
// To traverse the history
|
|
// "If entry has a different Document object than the current entry, then
|
|
// run the following substeps: Remove any tasks queued by the history
|
|
// traversal task source..."
|
|
// Same document object case was handled already above with
|
|
// HandleSameDocumentNavigation call.
|
|
RefPtr<ChildSHistory> shistory = GetRootSessionHistory();
|
|
if (shistory) {
|
|
shistory->RemovePendingHistoryNavigations();
|
|
}
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
// It's possible that the previous viewer of mContentViewer is the
|
|
// viewer that will end up in aLoadState->SHEntry() when it gets closed.
|
|
// If that's the case, we need to go ahead and force it into its shentry
|
|
// so we can restore it.
|
|
if (mContentViewer) {
|
|
nsCOMPtr<nsIContentViewer> prevViewer =
|
|
mContentViewer->GetPreviousViewer();
|
|
if (prevViewer) {
|
|
#ifdef DEBUG
|
|
nsCOMPtr<nsIContentViewer> prevPrevViewer =
|
|
prevViewer->GetPreviousViewer();
|
|
NS_ASSERTION(!prevPrevViewer, "Should never have viewer chain here");
|
|
#endif
|
|
nsCOMPtr<nsISHEntry> viewerEntry;
|
|
prevViewer->GetHistoryEntry(getter_AddRefs(viewerEntry));
|
|
if (viewerEntry == aLoadState->SHEntry()) {
|
|
// Make sure this viewer ends up in the right place
|
|
mContentViewer->SetPreviousViewer(nullptr);
|
|
prevViewer->Destroy();
|
|
}
|
|
}
|
|
}
|
|
nsCOMPtr<nsISHEntry> oldEntry = mOSHE;
|
|
bool restoring;
|
|
rv = RestorePresentation(aLoadState->SHEntry(), &restoring);
|
|
if (restoring) {
|
|
Telemetry::Accumulate(Telemetry::BFCACHE_PAGE_RESTORED, true);
|
|
return rv;
|
|
}
|
|
Telemetry::Accumulate(Telemetry::BFCACHE_PAGE_RESTORED, false);
|
|
|
|
// We failed to restore the presentation, so clean up.
|
|
// Both the old and new history entries could potentially be in
|
|
// an inconsistent state.
|
|
if (NS_FAILED(rv)) {
|
|
if (oldEntry) {
|
|
oldEntry->SyncPresentationState();
|
|
}
|
|
|
|
aLoadState->SHEntry()->SyncPresentationState();
|
|
}
|
|
}
|
|
}
|
|
|
|
bool isTopLevelDoc = mBrowsingContext->IsTopContent();
|
|
|
|
OriginAttributes attrs = GetOriginAttributes();
|
|
attrs.SetFirstPartyDomain(isTopLevelDoc, aLoadState->URI());
|
|
|
|
PredictorLearn(aLoadState->URI(), nullptr,
|
|
nsINetworkPredictor::LEARN_LOAD_TOPLEVEL, attrs);
|
|
PredictorPredict(aLoadState->URI(), nullptr,
|
|
nsINetworkPredictor::PREDICT_LOAD, attrs, nullptr);
|
|
|
|
nsCOMPtr<nsIRequest> req;
|
|
rv = DoURILoad(aLoadState, aCacheKey, getter_AddRefs(req));
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
if (shouldTakeFocus) {
|
|
mBrowsingContext->Focus(CallerType::System, IgnoreErrors());
|
|
}
|
|
}
|
|
|
|
if (NS_FAILED(rv)) {
|
|
nsCOMPtr<nsIChannel> chan(do_QueryInterface(req));
|
|
UnblockEmbedderLoadEventForFailure();
|
|
if (DisplayLoadError(rv, aLoadState->URI(), nullptr, chan) &&
|
|
// FIXME: At this point code was using internal load flags, but checking
|
|
// non-internal load flags?
|
|
aLoadState->HasLoadFlags(LOAD_FLAGS_ERROR_LOAD_CHANGES_RV)) {
|
|
return NS_ERROR_LOAD_SHOWED_ERRORPAGE;
|
|
}
|
|
|
|
// We won't report any error if this is an unknown protocol error. The
|
|
// reason behind this is that it will allow enumeration of external
|
|
// protocols if we report an error for each unknown protocol.
|
|
if (NS_ERROR_UNKNOWN_PROTOCOL == rv) {
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
/* static */
|
|
bool nsDocShell::CanLoadInParentProcess(nsIURI* aURI) {
|
|
nsCOMPtr<nsIURI> uri = aURI;
|
|
// In e10s, in the parent process, we refuse to load anything other than
|
|
// "safe" resources that we ship or trust enough to give "special" URLs.
|
|
bool canLoadInParent = false;
|
|
if (NS_SUCCEEDED(NS_URIChainHasFlags(
|
|
uri, nsIProtocolHandler::URI_IS_UI_RESOURCE, &canLoadInParent)) &&
|
|
canLoadInParent) {
|
|
// We allow UI resources.
|
|
return true;
|
|
}
|
|
// For about: and extension-based URIs, which don't get
|
|
// URI_IS_UI_RESOURCE, first remove layers of view-source:, if present.
|
|
while (uri && uri->SchemeIs("view-source")) {
|
|
nsCOMPtr<nsINestedURI> nested = do_QueryInterface(uri);
|
|
if (nested) {
|
|
nested->GetInnerURI(getter_AddRefs(uri));
|
|
} else {
|
|
break;
|
|
}
|
|
}
|
|
// Allow about: URIs, and allow moz-extension ones if we're running
|
|
// extension content in the parent process.
|
|
if (!uri || uri->SchemeIs("about") ||
|
|
(!StaticPrefs::extensions_webextensions_remote() &&
|
|
uri->SchemeIs("moz-extension"))) {
|
|
return true;
|
|
}
|
|
#ifdef MOZ_THUNDERBIRD
|
|
if (uri->SchemeIs("imap") || uri->SchemeIs("mailbox") ||
|
|
uri->SchemeIs("news") || uri->SchemeIs("nntp") ||
|
|
uri->SchemeIs("snews")) {
|
|
return true;
|
|
}
|
|
#endif
|
|
nsAutoCString scheme;
|
|
uri->GetScheme(scheme);
|
|
// Allow ext+foo URIs (extension-registered custom protocols). See
|
|
// https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/manifest.json/protocol_handlers
|
|
if (StringBeginsWith(scheme, "ext+"_ns) &&
|
|
!StaticPrefs::extensions_webextensions_remote()) {
|
|
return true;
|
|
}
|
|
// Final exception for some legacy automated tests:
|
|
if (xpc::IsInAutomation() &&
|
|
StaticPrefs::security_allow_unsafe_parent_loads()) {
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
nsIPrincipal* nsDocShell::GetInheritedPrincipal(
|
|
bool aConsiderCurrentDocument, bool aConsiderPartitionedPrincipal) {
|
|
RefPtr<Document> document;
|
|
bool inheritedFromCurrent = false;
|
|
|
|
if (aConsiderCurrentDocument && mContentViewer) {
|
|
document = mContentViewer->GetDocument();
|
|
inheritedFromCurrent = true;
|
|
}
|
|
|
|
if (!document) {
|
|
nsCOMPtr<nsIDocShellTreeItem> parentItem;
|
|
GetInProcessSameTypeParent(getter_AddRefs(parentItem));
|
|
if (parentItem) {
|
|
document = parentItem->GetDocument();
|
|
}
|
|
}
|
|
|
|
if (!document) {
|
|
if (!aConsiderCurrentDocument) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Make sure we end up with _something_ as the principal no matter
|
|
// what.If this fails, we'll just get a null docViewer and bail.
|
|
EnsureContentViewer();
|
|
if (!mContentViewer) {
|
|
return nullptr;
|
|
}
|
|
document = mContentViewer->GetDocument();
|
|
}
|
|
|
|
//-- Get the document's principal
|
|
if (document) {
|
|
nsIPrincipal* docPrincipal = aConsiderPartitionedPrincipal
|
|
? document->PartitionedPrincipal()
|
|
: document->NodePrincipal();
|
|
|
|
// Don't allow loads in typeContent docShells to inherit the system
|
|
// principal from existing documents.
|
|
if (inheritedFromCurrent && mItemType == typeContent &&
|
|
docPrincipal->IsSystemPrincipal()) {
|
|
return nullptr;
|
|
}
|
|
|
|
return docPrincipal;
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
/* static */ nsresult nsDocShell::CreateRealChannelForDocument(
|
|
nsIChannel** aChannel, nsIURI* aURI, nsILoadInfo* aLoadInfo,
|
|
nsIInterfaceRequestor* aCallbacks, nsLoadFlags aLoadFlags,
|
|
const nsAString& aSrcdoc, nsIURI* aBaseURI) {
|
|
nsCOMPtr<nsIChannel> channel;
|
|
if (aSrcdoc.IsVoid()) {
|
|
MOZ_TRY(NS_NewChannelInternal(getter_AddRefs(channel), aURI, aLoadInfo,
|
|
nullptr, // PerformanceStorage
|
|
nullptr, // loadGroup
|
|
aCallbacks, aLoadFlags));
|
|
|
|
if (aBaseURI) {
|
|
nsCOMPtr<nsIViewSourceChannel> vsc = do_QueryInterface(channel);
|
|
if (vsc) {
|
|
MOZ_ALWAYS_SUCCEEDS(vsc->SetBaseURI(aBaseURI));
|
|
}
|
|
}
|
|
} else if (SchemeIsViewSource(aURI)) {
|
|
// Instantiate view source handler protocol, if it doesn't exist already.
|
|
nsCOMPtr<nsIIOService> io(do_GetIOService());
|
|
MOZ_ASSERT(io);
|
|
nsCOMPtr<nsIProtocolHandler> handler;
|
|
nsresult rv =
|
|
io->GetProtocolHandler("view-source", getter_AddRefs(handler));
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
nsViewSourceHandler* vsh = nsViewSourceHandler::GetInstance();
|
|
if (!vsh) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
MOZ_TRY(vsh->NewSrcdocChannel(aURI, aBaseURI, aSrcdoc, aLoadInfo,
|
|
getter_AddRefs(channel)));
|
|
} else {
|
|
MOZ_TRY(NS_NewInputStreamChannelInternal(getter_AddRefs(channel), aURI,
|
|
aSrcdoc, "text/html"_ns, aLoadInfo,
|
|
true));
|
|
nsCOMPtr<nsIInputStreamChannel> isc = do_QueryInterface(channel);
|
|
MOZ_ASSERT(isc);
|
|
isc->SetBaseURI(aBaseURI);
|
|
}
|
|
|
|
if (aLoadFlags != nsIRequest::LOAD_NORMAL) {
|
|
nsresult rv = channel->SetLoadFlags(aLoadFlags);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
|
|
channel.forget(aChannel);
|
|
return NS_OK;
|
|
}
|
|
|
|
/* static */ bool nsDocShell::CreateAndConfigureRealChannelForLoadState(
|
|
BrowsingContext* aBrowsingContext, nsDocShellLoadState* aLoadState,
|
|
LoadInfo* aLoadInfo, nsIInterfaceRequestor* aCallbacks,
|
|
nsDocShell* aDocShell, const OriginAttributes& aOriginAttributes,
|
|
nsLoadFlags aLoadFlags, uint32_t aCacheKey, nsresult& aRv,
|
|
nsIChannel** aChannel) {
|
|
MOZ_ASSERT(aLoadInfo);
|
|
|
|
nsString srcdoc = VoidString();
|
|
bool isSrcdoc =
|
|
aLoadState->HasInternalLoadFlags(INTERNAL_LOAD_FLAGS_IS_SRCDOC);
|
|
if (isSrcdoc) {
|
|
srcdoc = aLoadState->SrcdocData();
|
|
}
|
|
|
|
if (aLoadState->PrincipalToInherit()) {
|
|
aLoadInfo->SetPrincipalToInherit(aLoadState->PrincipalToInherit());
|
|
}
|
|
aLoadInfo->SetLoadTriggeredFromExternal(
|
|
aLoadState->HasLoadFlags(LOAD_FLAGS_FROM_EXTERNAL));
|
|
aLoadInfo->SetForceAllowDataURI(aLoadState->HasInternalLoadFlags(
|
|
INTERNAL_LOAD_FLAGS_FORCE_ALLOW_DATA_URI));
|
|
aLoadInfo->SetOriginalFrameSrcLoad(
|
|
aLoadState->HasInternalLoadFlags(INTERNAL_LOAD_FLAGS_ORIGINAL_FRAME_SRC));
|
|
|
|
bool inheritAttrs = false;
|
|
if (aLoadState->PrincipalToInherit()) {
|
|
inheritAttrs = nsContentUtils::ChannelShouldInheritPrincipal(
|
|
aLoadState->PrincipalToInherit(), aLoadState->URI(),
|
|
true, // aInheritForAboutBlank
|
|
isSrcdoc);
|
|
}
|
|
|
|
OriginAttributes attrs;
|
|
|
|
// Inherit origin attributes from PrincipalToInherit if inheritAttrs is
|
|
// true. Otherwise we just use the origin attributes from docshell.
|
|
if (inheritAttrs) {
|
|
MOZ_ASSERT(aLoadState->PrincipalToInherit(),
|
|
"We should have PrincipalToInherit here.");
|
|
attrs = aLoadState->PrincipalToInherit()->OriginAttributesRef();
|
|
// If firstPartyIsolation is not enabled, then PrincipalToInherit should
|
|
// have the same origin attributes with docshell.
|
|
MOZ_ASSERT_IF(!OriginAttributes::IsFirstPartyEnabled(),
|
|
attrs == aOriginAttributes);
|
|
} else {
|
|
attrs = aOriginAttributes;
|
|
attrs.SetFirstPartyDomain(IsTopLevelDoc(aBrowsingContext, aLoadInfo),
|
|
aLoadState->URI());
|
|
}
|
|
|
|
aRv = aLoadInfo->SetOriginAttributes(attrs);
|
|
if (NS_WARN_IF(NS_FAILED(aRv))) {
|
|
return false;
|
|
}
|
|
|
|
if (aLoadState->GetIsFromProcessingFrameAttributes()) {
|
|
aLoadInfo->SetIsFromProcessingFrameAttributes();
|
|
}
|
|
|
|
// Propagate the IsFormSubmission flag to the loadInfo.
|
|
if (aLoadState->IsFormSubmission()) {
|
|
aLoadInfo->SetIsFormSubmission(true);
|
|
}
|
|
|
|
nsCOMPtr<nsIChannel> channel;
|
|
aRv = CreateRealChannelForDocument(getter_AddRefs(channel), aLoadState->URI(),
|
|
aLoadInfo, aCallbacks, aLoadFlags, srcdoc,
|
|
aLoadState->BaseURI());
|
|
NS_ENSURE_SUCCESS(aRv, false);
|
|
|
|
if (!channel) {
|
|
return false;
|
|
}
|
|
|
|
// If the HTTPS-Only mode is enabled, every insecure request gets upgraded to
|
|
// HTTPS by default. This behavior can be disabled through the loadinfo flag
|
|
// HTTPS_ONLY_EXEMPT.
|
|
nsHTTPSOnlyUtils::TestSitePermissionAndPotentiallyAddExemption(channel);
|
|
|
|
if (nsCOMPtr<nsIApplicationCacheChannel> appCacheChannel =
|
|
do_QueryInterface(channel)) {
|
|
// Any document load should not inherit application cache.
|
|
appCacheChannel->SetInheritApplicationCache(false);
|
|
|
|
// Loads with the correct permissions should check for a matching
|
|
// application cache.
|
|
if (GeckoProcessType_Default != XRE_GetProcessType()) {
|
|
// Permission will be checked in the parent process
|
|
appCacheChannel->SetChooseApplicationCache(true);
|
|
} else if (aDocShell) {
|
|
// TODO: Figure out how to handle this in the parent,
|
|
// on behalf of a content process.
|
|
nsCOMPtr<nsIScriptSecurityManager> secMan =
|
|
do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID);
|
|
|
|
if (secMan) {
|
|
nsCOMPtr<nsIPrincipal> principal;
|
|
secMan->GetDocShellContentPrincipal(aLoadState->URI(), aDocShell,
|
|
getter_AddRefs(principal));
|
|
appCacheChannel->SetChooseApplicationCache(
|
|
NS_ShouldCheckAppCache(principal));
|
|
}
|
|
}
|
|
}
|
|
|
|
// hack
|
|
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(channel));
|
|
nsCOMPtr<nsIHttpChannelInternal> httpChannelInternal(
|
|
do_QueryInterface(channel));
|
|
nsCOMPtr<nsIURI> referrer;
|
|
nsIReferrerInfo* referrerInfo = aLoadState->GetReferrerInfo();
|
|
if (referrerInfo) {
|
|
referrerInfo->GetOriginalReferrer(getter_AddRefs(referrer));
|
|
}
|
|
if (httpChannelInternal) {
|
|
if (aLoadState->HasInternalLoadFlags(
|
|
INTERNAL_LOAD_FLAGS_FORCE_ALLOW_COOKIES)) {
|
|
aRv = httpChannelInternal->SetThirdPartyFlags(
|
|
nsIHttpChannelInternal::THIRD_PARTY_FORCE_ALLOW);
|
|
MOZ_ASSERT(NS_SUCCEEDED(aRv));
|
|
}
|
|
if (aLoadState->FirstParty()) {
|
|
aRv = httpChannelInternal->SetDocumentURI(aLoadState->URI());
|
|
MOZ_ASSERT(NS_SUCCEEDED(aRv));
|
|
} else {
|
|
aRv = httpChannelInternal->SetDocumentURI(referrer);
|
|
MOZ_ASSERT(NS_SUCCEEDED(aRv));
|
|
}
|
|
aRv = httpChannelInternal->SetRedirectMode(
|
|
nsIHttpChannelInternal::REDIRECT_MODE_MANUAL);
|
|
MOZ_ASSERT(NS_SUCCEEDED(aRv));
|
|
}
|
|
|
|
if (httpChannel) {
|
|
if (aLoadState->HeadersStream()) {
|
|
aRv = AddHeadersToChannel(aLoadState->HeadersStream(), httpChannel);
|
|
}
|
|
// Set the referrer explicitly
|
|
// Referrer is currenly only set for link clicks here.
|
|
if (referrerInfo) {
|
|
aRv = httpChannel->SetReferrerInfo(referrerInfo);
|
|
MOZ_ASSERT(NS_SUCCEEDED(aRv));
|
|
}
|
|
|
|
// Mark the http channel as UrgentStart for top level document loading in
|
|
// active tab.
|
|
if (IsUrgentStart(aBrowsingContext, aLoadInfo, aLoadState->LoadType())) {
|
|
nsCOMPtr<nsIClassOfService> cos(do_QueryInterface(channel));
|
|
if (cos) {
|
|
cos->AddClassFlags(nsIClassOfService::UrgentStart);
|
|
}
|
|
}
|
|
}
|
|
|
|
channel->SetOriginalURI(aLoadState->OriginalURI() ? aLoadState->OriginalURI()
|
|
: aLoadState->URI());
|
|
|
|
const nsACString& typeHint = aLoadState->TypeHint();
|
|
if (!typeHint.IsVoid()) {
|
|
channel->SetContentType(typeHint);
|
|
}
|
|
|
|
const nsAString& fileName = aLoadState->FileName();
|
|
if (!fileName.IsVoid()) {
|
|
aRv = channel->SetContentDisposition(nsIChannel::DISPOSITION_ATTACHMENT);
|
|
NS_ENSURE_SUCCESS(aRv, false);
|
|
if (!fileName.IsEmpty()) {
|
|
aRv = channel->SetContentDispositionFilename(fileName);
|
|
NS_ENSURE_SUCCESS(aRv, false);
|
|
}
|
|
}
|
|
|
|
if (nsCOMPtr<nsIWritablePropertyBag2> props = do_QueryInterface(channel)) {
|
|
nsCOMPtr<nsIURI> referrer;
|
|
nsIReferrerInfo* referrerInfo = aLoadState->GetReferrerInfo();
|
|
if (referrerInfo) {
|
|
referrerInfo->GetOriginalReferrer(getter_AddRefs(referrer));
|
|
}
|
|
// save true referrer for those who need it (e.g. xpinstall whitelisting)
|
|
// Currently only http and ftp channels support this.
|
|
props->SetPropertyAsInterface(u"docshell.internalReferrer"_ns, referrer);
|
|
|
|
if (aLoadState->HasInternalLoadFlags(INTERNAL_LOAD_FLAGS_FIRST_LOAD)) {
|
|
props->SetPropertyAsBool(u"docshell.newWindowTarget"_ns, true);
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsICacheInfoChannel> cacheChannel(do_QueryInterface(channel));
|
|
auto loadType = aLoadState->LoadType();
|
|
|
|
// figure out if we need to set the post data stream on the channel...
|
|
if (aLoadState->PostDataStream()) {
|
|
if (nsCOMPtr<nsIFormPOSTActionChannel> postChannel =
|
|
do_QueryInterface(channel)) {
|
|
// XXX it's a bit of a hack to rewind the postdata stream here but
|
|
// it has to be done in case the post data is being reused multiple
|
|
// times.
|
|
nsCOMPtr<nsISeekableStream> postDataSeekable =
|
|
do_QueryInterface(aLoadState->PostDataStream());
|
|
if (postDataSeekable) {
|
|
aRv = postDataSeekable->Seek(nsISeekableStream::NS_SEEK_SET, 0);
|
|
NS_ENSURE_SUCCESS(aRv, false);
|
|
}
|
|
|
|
// we really need to have a content type associated with this stream!!
|
|
postChannel->SetUploadStream(aLoadState->PostDataStream(), ""_ns, -1);
|
|
}
|
|
|
|
/* If there is a valid postdata *and* it is a History Load,
|
|
* set up the cache key on the channel, to retrieve the
|
|
* data *only* from the cache. If it is a normal reload, the
|
|
* cache is free to go to the server for updated postdata.
|
|
*/
|
|
if (cacheChannel && aCacheKey != 0) {
|
|
if (loadType == LOAD_HISTORY || loadType == LOAD_RELOAD_CHARSET_CHANGE) {
|
|
cacheChannel->SetCacheKey(aCacheKey);
|
|
uint32_t loadFlags;
|
|
if (NS_SUCCEEDED(channel->GetLoadFlags(&loadFlags))) {
|
|
channel->SetLoadFlags(loadFlags |
|
|
nsICachingChannel::LOAD_ONLY_FROM_CACHE);
|
|
}
|
|
} else if (loadType == LOAD_RELOAD_NORMAL) {
|
|
cacheChannel->SetCacheKey(aCacheKey);
|
|
}
|
|
}
|
|
} else {
|
|
/* If there is no postdata, set the cache key on the channel, and
|
|
* do not set the LOAD_ONLY_FROM_CACHE flag, so that the channel
|
|
* will be free to get it from net if it is not found in cache.
|
|
* New cache may use it creatively on CGI pages with GET
|
|
* method and even on those that say "no-cache"
|
|
*/
|
|
if (loadType == LOAD_HISTORY || loadType == LOAD_RELOAD_NORMAL ||
|
|
loadType == LOAD_RELOAD_CHARSET_CHANGE ||
|
|
loadType == LOAD_RELOAD_CHARSET_CHANGE_BYPASS_CACHE ||
|
|
loadType == LOAD_RELOAD_CHARSET_CHANGE_BYPASS_PROXY_AND_CACHE) {
|
|
if (cacheChannel && aCacheKey != 0) {
|
|
cacheChannel->SetCacheKey(aCacheKey);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (nsCOMPtr<nsIScriptChannel> scriptChannel = do_QueryInterface(channel)) {
|
|
// Allow execution against our context if the principals match
|
|
scriptChannel->SetExecutionPolicy(nsIScriptChannel::EXECUTE_NORMAL);
|
|
}
|
|
|
|
if (nsCOMPtr<nsITimedChannel> timedChannel = do_QueryInterface(channel)) {
|
|
timedChannel->SetTimingEnabled(true);
|
|
|
|
nsString initiatorType;
|
|
switch (aLoadInfo->InternalContentPolicyType()) {
|
|
case nsIContentPolicy::TYPE_INTERNAL_EMBED:
|
|
initiatorType = u"embed"_ns;
|
|
break;
|
|
case nsIContentPolicy::TYPE_INTERNAL_OBJECT:
|
|
initiatorType = u"object"_ns;
|
|
break;
|
|
default: {
|
|
const auto& embedderElementType =
|
|
aBrowsingContext->GetEmbedderElementType();
|
|
if (embedderElementType) {
|
|
initiatorType = *embedderElementType;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!initiatorType.IsEmpty()) {
|
|
timedChannel->SetInitiatorType(initiatorType);
|
|
}
|
|
}
|
|
|
|
if (httpChannelInternal && aBrowsingContext->GetSandboxFlags() != 0) {
|
|
httpChannelInternal->SetHasNonEmptySandboxingFlag(true);
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> rpURI;
|
|
aLoadInfo->GetResultPrincipalURI(getter_AddRefs(rpURI));
|
|
Maybe<nsCOMPtr<nsIURI>> originalResultPrincipalURI;
|
|
aLoadState->GetMaybeResultPrincipalURI(originalResultPrincipalURI);
|
|
if (originalResultPrincipalURI &&
|
|
(!aLoadState->KeepResultPrincipalURIIfSet() || !rpURI)) {
|
|
// Unconditionally override, we want the replay to be equal to what has
|
|
// been captured.
|
|
aLoadInfo->SetResultPrincipalURI(originalResultPrincipalURI.ref());
|
|
}
|
|
|
|
if (aLoadState->OriginalURI() && aLoadState->LoadReplace()) {
|
|
// The LOAD_REPLACE flag and its handling here will be removed as part
|
|
// of bug 1319110. For now preserve its restoration here to not break
|
|
// any code expecting it being set specially on redirected channels.
|
|
// If the flag has originally been set to change result of
|
|
// NS_GetFinalChannelURI it won't have any effect and also won't cause
|
|
// any harm.
|
|
uint32_t loadFlags;
|
|
aRv = channel->GetLoadFlags(&loadFlags);
|
|
NS_ENSURE_SUCCESS(aRv, false);
|
|
channel->SetLoadFlags(loadFlags | nsIChannel::LOAD_REPLACE);
|
|
}
|
|
|
|
nsCOMPtr<nsIContentSecurityPolicy> csp = aLoadState->Csp();
|
|
if (csp) {
|
|
// Navigational requests that are same origin need to be upgraded in case
|
|
// upgrade-insecure-requests is present. Please note that for document
|
|
// navigations that bit is re-computed in case we encounter a server
|
|
// side redirect so the navigation is not same-origin anymore.
|
|
bool upgradeInsecureRequests = false;
|
|
csp->GetUpgradeInsecureRequests(&upgradeInsecureRequests);
|
|
if (upgradeInsecureRequests) {
|
|
// only upgrade if the navigation is same origin
|
|
nsCOMPtr<nsIPrincipal> resultPrincipal;
|
|
aRv = nsContentUtils::GetSecurityManager()->GetChannelResultPrincipal(
|
|
channel, getter_AddRefs(resultPrincipal));
|
|
NS_ENSURE_SUCCESS(aRv, false);
|
|
if (nsContentSecurityUtils::IsConsideredSameOriginForUIR(
|
|
aLoadState->TriggeringPrincipal(), resultPrincipal)) {
|
|
aLoadInfo->SetUpgradeInsecureRequests(true);
|
|
}
|
|
}
|
|
|
|
// For document loads we store the CSP that potentially needs to
|
|
// be inherited by the new document, e.g. in case we are loading
|
|
// an opaque origin like a data: URI. The actual inheritance
|
|
// check happens within Document::InitCSP().
|
|
// Please create an actual copy of the CSP (do not share the same
|
|
// reference) otherwise a Meta CSP of an opaque origin will
|
|
// incorrectly be propagated to the embedding document.
|
|
RefPtr<nsCSPContext> cspToInherit = new nsCSPContext();
|
|
cspToInherit->InitFromOther(static_cast<nsCSPContext*>(csp.get()));
|
|
aLoadInfo->SetCSPToInherit(cspToInherit);
|
|
}
|
|
|
|
channel.forget(aChannel);
|
|
return true;
|
|
}
|
|
|
|
nsresult nsDocShell::DoURILoad(nsDocShellLoadState* aLoadState,
|
|
Maybe<uint32_t> aCacheKey,
|
|
nsIRequest** aRequest) {
|
|
// Double-check that we're still around to load this URI.
|
|
if (mIsBeingDestroyed) {
|
|
// Return NS_OK despite not doing anything to avoid throwing exceptions
|
|
// from nsLocation::SetHref if the unload handler of the existing page
|
|
// tears us down.
|
|
return NS_OK;
|
|
}
|
|
|
|
nsCOMPtr<nsIURILoader> uriLoader = components::URILoader::Service();
|
|
if (NS_WARN_IF(!uriLoader)) {
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
nsresult rv;
|
|
nsContentPolicyType contentPolicyType = DetermineContentType();
|
|
|
|
if (IsFrame()) {
|
|
MOZ_ASSERT(contentPolicyType == nsIContentPolicy::TYPE_INTERNAL_IFRAME ||
|
|
contentPolicyType == nsIContentPolicy::TYPE_INTERNAL_FRAME,
|
|
"DoURILoad thinks this is a frame and InternalLoad does not");
|
|
|
|
if (StaticPrefs::dom_block_external_protocol_in_iframes()) {
|
|
// Only allow URLs able to return data in iframes.
|
|
bool doesNotReturnData = false;
|
|
NS_URIChainHasFlags(aLoadState->URI(),
|
|
nsIProtocolHandler::URI_DOES_NOT_RETURN_DATA,
|
|
&doesNotReturnData);
|
|
if (doesNotReturnData) {
|
|
// The context to check user-interaction with for the purposes of
|
|
// popup-blocking.
|
|
//
|
|
// We generally want to check the context that initiated the navigation.
|
|
WindowContext* sourceWindowContext = [&] {
|
|
const MaybeDiscardedBrowsingContext& sourceBC =
|
|
aLoadState->SourceBrowsingContext();
|
|
if (!sourceBC.IsNullOrDiscarded()) {
|
|
if (WindowContext* wc = sourceBC.get()->GetCurrentWindowContext()) {
|
|
return wc;
|
|
}
|
|
}
|
|
return mBrowsingContext->GetParentWindowContext();
|
|
}();
|
|
|
|
MOZ_ASSERT(sourceWindowContext);
|
|
// FIXME: We can't check user-interaction against an OOP window. This is
|
|
// the next best thing we can really do. The load state keeps whether
|
|
// the navigation had a user interaction in process
|
|
// (aLoadState->HasValidUserGestureActivation()), but we can't really
|
|
// consume it, which we want to prevent popup-spamming from the same
|
|
// click event.
|
|
WindowContext* context =
|
|
sourceWindowContext->IsInProcess()
|
|
? sourceWindowContext
|
|
: mBrowsingContext->GetCurrentWindowContext();
|
|
const bool popupBlocked = [&] {
|
|
const bool active = mBrowsingContext->IsActive();
|
|
|
|
// For same-origin-with-top windows, we grant a single free popup
|
|
// without user activation, see bug 1680721.
|
|
//
|
|
// We consume the flag now even if there's no user activation.
|
|
const bool hasFreePass = [&] {
|
|
if (!active ||
|
|
!(context->IsInProcess() && context->SameOriginWithTop())) {
|
|
return false;
|
|
}
|
|
nsGlobalWindowInner* win =
|
|
context->TopWindowContext()->GetInnerWindow();
|
|
return win && win->TryOpenExternalProtocolIframe();
|
|
}();
|
|
|
|
if (context->IsInProcess() &&
|
|
context->ConsumeTransientUserGestureActivation()) {
|
|
// If the user has interacted with the page, consume it.
|
|
return false;
|
|
}
|
|
|
|
// TODO(emilio): Can we remove this check? It seems like what prompted
|
|
// this code (bug 1514547) should be covered by transient user
|
|
// activation, see bug 1514547.
|
|
if (active &&
|
|
PopupBlocker::ConsumeTimerTokenForExternalProtocolIframe()) {
|
|
return false;
|
|
}
|
|
|
|
if (sourceWindowContext->CanShowPopup()) {
|
|
return false;
|
|
}
|
|
|
|
if (hasFreePass) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}();
|
|
|
|
// No error must be returned when iframes are blocked.
|
|
if (popupBlocked) {
|
|
nsAutoString message;
|
|
nsresult rv = nsContentUtils::GetLocalizedString(
|
|
nsContentUtils::eDOM_PROPERTIES,
|
|
"ExternalProtocolFrameBlockedNoUserActivation", message);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
nsContentUtils::ReportToConsoleByWindowID(
|
|
message, nsIScriptError::warningFlag, "DOM"_ns,
|
|
context->InnerWindowId());
|
|
}
|
|
return NS_OK;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Only allow view-source scheme in top-level docshells. view-source is
|
|
// the only scheme to which this applies at the moment due to potential
|
|
// timing attacks to read data from cross-origin iframes. If this widens
|
|
// we should add a protocol flag for whether the scheme is allowed in
|
|
// frames and use something like nsNetUtil::NS_URIChainHasFlags.
|
|
nsCOMPtr<nsIURI> tempURI = aLoadState->URI();
|
|
nsCOMPtr<nsINestedURI> nestedURI = do_QueryInterface(tempURI);
|
|
while (nestedURI) {
|
|
// view-source should always be an nsINestedURI, loop and check the
|
|
// scheme on this and all inner URIs that are also nested URIs.
|
|
if (SchemeIsViewSource(tempURI)) {
|
|
return NS_ERROR_UNKNOWN_PROTOCOL;
|
|
}
|
|
nestedURI->GetInnerURI(getter_AddRefs(tempURI));
|
|
nestedURI = do_QueryInterface(tempURI);
|
|
}
|
|
} else {
|
|
MOZ_ASSERT(contentPolicyType == nsIContentPolicy::TYPE_DOCUMENT,
|
|
"DoURILoad thinks this is a document and InternalLoad does not");
|
|
}
|
|
|
|
// FIXME We still have a ton of codepaths that don't pass through
|
|
// DocumentLoadListener, so probably need to create session history info
|
|
// in more places.
|
|
if (aLoadState->GetLoadingSessionHistoryInfo()) {
|
|
SetLoadingSessionHistoryInfo(*aLoadState->GetLoadingSessionHistoryInfo());
|
|
}
|
|
|
|
// open a channel for the url
|
|
|
|
// If we have a pending channel, use the channel we've already created here.
|
|
// We don't need to set up load flags for our channel, as it has already been
|
|
// created.
|
|
|
|
if (nsCOMPtr<nsIChannel> channel =
|
|
aLoadState->GetPendingRedirectedChannel()) {
|
|
// If we have a request outparameter, shove our channel into it.
|
|
if (aRequest) {
|
|
nsCOMPtr<nsIRequest> outRequest = channel;
|
|
outRequest.forget(aRequest);
|
|
}
|
|
|
|
return OpenRedirectedChannel(aLoadState);
|
|
}
|
|
|
|
// There are two cases we care about:
|
|
// * Top-level load: In this case, loadingNode is null, but loadingWindow
|
|
// is our mScriptGlobal. We pass null for loadingPrincipal in this case.
|
|
// * Subframe load: loadingWindow is null, but loadingNode is the frame
|
|
// element for the load. loadingPrincipal is the NodePrincipal of the
|
|
// frame element.
|
|
nsCOMPtr<nsINode> loadingNode;
|
|
nsCOMPtr<nsPIDOMWindowOuter> loadingWindow;
|
|
nsCOMPtr<nsIPrincipal> loadingPrincipal;
|
|
nsCOMPtr<nsISupports> topLevelLoadingContext;
|
|
|
|
if (contentPolicyType == nsIContentPolicy::TYPE_DOCUMENT) {
|
|
loadingNode = nullptr;
|
|
loadingPrincipal = nullptr;
|
|
loadingWindow = mScriptGlobal;
|
|
if (XRE_IsContentProcess()) {
|
|
// In e10s the child process doesn't have access to the element that
|
|
// contains the browsing context (because that element is in the chrome
|
|
// process).
|
|
nsCOMPtr<nsIBrowserChild> browserChild = GetBrowserChild();
|
|
topLevelLoadingContext = ToSupports(browserChild);
|
|
} else {
|
|
// This is for loading non-e10s tabs and toplevel windows of various
|
|
// sorts.
|
|
// For the toplevel window cases, requestingElement will be null.
|
|
nsCOMPtr<Element> requestingElement =
|
|
loadingWindow->GetFrameElementInternal();
|
|
topLevelLoadingContext = requestingElement;
|
|
}
|
|
} else {
|
|
loadingWindow = nullptr;
|
|
loadingNode = mScriptGlobal->GetFrameElementInternal();
|
|
if (loadingNode) {
|
|
// If we have a loading node, then use that as our loadingPrincipal.
|
|
loadingPrincipal = loadingNode->NodePrincipal();
|
|
#ifdef DEBUG
|
|
// Get the docshell type for requestingElement.
|
|
RefPtr<Document> requestingDoc = loadingNode->OwnerDoc();
|
|
nsCOMPtr<nsIDocShell> elementDocShell = requestingDoc->GetDocShell();
|
|
// requestingElement docshell type = current docshell type.
|
|
MOZ_ASSERT(
|
|
mItemType == elementDocShell->ItemType(),
|
|
"subframes should have the same docshell type as their parent");
|
|
#endif
|
|
} else {
|
|
if (mIsBeingDestroyed) {
|
|
// If this isn't a top-level load and mScriptGlobal's frame element is
|
|
// null, then the element got removed from the DOM while we were trying
|
|
// to load this resource. This docshell is scheduled for destruction
|
|
// already, so bail out here.
|
|
return NS_OK;
|
|
}
|
|
// If we are not being destroyed and we do not have access to the loading
|
|
// node, then we are a remote subframe. Set the loading principal
|
|
// to be a null principal and then set it correctly in the parent.
|
|
loadingPrincipal = NullPrincipal::Create(GetOriginAttributes(), nullptr);
|
|
}
|
|
}
|
|
|
|
if (!aLoadState->TriggeringPrincipal()) {
|
|
MOZ_ASSERT(false, "DoURILoad needs a valid triggeringPrincipal");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// We want to inherit aLoadState->PrincipalToInherit() when:
|
|
// 1. ChannelShouldInheritPrincipal returns true.
|
|
// 2. aLoadState->URI() is not data: URI, or data: URI is not
|
|
// configured as unique opaque origin.
|
|
bool inheritPrincipal = false;
|
|
|
|
if (aLoadState->PrincipalToInherit()) {
|
|
bool isSrcdoc =
|
|
aLoadState->HasInternalLoadFlags(INTERNAL_LOAD_FLAGS_IS_SRCDOC);
|
|
bool inheritAttrs = nsContentUtils::ChannelShouldInheritPrincipal(
|
|
aLoadState->PrincipalToInherit(), aLoadState->URI(),
|
|
true, // aInheritForAboutBlank
|
|
isSrcdoc);
|
|
|
|
inheritPrincipal = inheritAttrs && !SchemeIsData(aLoadState->URI());
|
|
}
|
|
|
|
uint32_t sandboxFlags = mBrowsingContext->GetSandboxFlags();
|
|
nsSecurityFlags securityFlags =
|
|
nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL;
|
|
|
|
if (mLoadType == LOAD_ERROR_PAGE) {
|
|
securityFlags |= nsILoadInfo::SEC_LOAD_ERROR_PAGE;
|
|
}
|
|
|
|
if (inheritPrincipal) {
|
|
securityFlags |= nsILoadInfo::SEC_FORCE_INHERIT_PRINCIPAL;
|
|
}
|
|
|
|
// Must never have a parent for TYPE_DOCUMENT loads
|
|
MOZ_ASSERT_IF(contentPolicyType == nsIContentPolicy::TYPE_DOCUMENT,
|
|
!mBrowsingContext->GetParent());
|
|
// Subdocuments must have a parent
|
|
MOZ_ASSERT_IF(contentPolicyType == nsIContentPolicy::TYPE_SUBDOCUMENT,
|
|
mBrowsingContext->GetParent());
|
|
mBrowsingContext->SetTriggeringAndInheritPrincipals(
|
|
aLoadState->TriggeringPrincipal(), aLoadState->PrincipalToInherit(),
|
|
aLoadState->GetLoadIdentifier());
|
|
RefPtr<LoadInfo> loadInfo =
|
|
(contentPolicyType == nsIContentPolicy::TYPE_DOCUMENT)
|
|
? new LoadInfo(loadingWindow, aLoadState->TriggeringPrincipal(),
|
|
topLevelLoadingContext, securityFlags, sandboxFlags)
|
|
: new LoadInfo(loadingPrincipal, aLoadState->TriggeringPrincipal(),
|
|
loadingNode, securityFlags, contentPolicyType,
|
|
Maybe<mozilla::dom::ClientInfo>(),
|
|
Maybe<mozilla::dom::ServiceWorkerDescriptor>(),
|
|
sandboxFlags);
|
|
RefPtr<WindowContext> context = mBrowsingContext->GetCurrentWindowContext();
|
|
|
|
if (mLoadType != LOAD_ERROR_PAGE && context && context->IsInProcess() &&
|
|
context->HasValidTransientUserGestureActivation()) {
|
|
aLoadState->SetHasValidUserGestureActivation(true);
|
|
}
|
|
|
|
// in case this docshell load was triggered by a valid transient user gesture,
|
|
// or also the load originates from external, then we pass that information on
|
|
// to the loadinfo, which allows e.g. setting Sec-Fetch-User request headers.
|
|
if (aLoadState->HasValidUserGestureActivation() ||
|
|
aLoadState->HasLoadFlags(LOAD_FLAGS_FROM_EXTERNAL)) {
|
|
loadInfo->SetHasValidUserGestureActivation(true);
|
|
}
|
|
loadInfo->SetTriggeringSandboxFlags(aLoadState->TriggeringSandboxFlags());
|
|
loadInfo->SetIsMetaRefresh(aLoadState->IsMetaRefresh());
|
|
|
|
uint32_t cacheKey = 0;
|
|
if (aCacheKey) {
|
|
cacheKey = *aCacheKey;
|
|
} else if (mozilla::SessionHistoryInParent()) {
|
|
if (mLoadingEntry) {
|
|
cacheKey = mLoadingEntry->mInfo.GetCacheKey();
|
|
} else if (mActiveEntry) { // for reload cases
|
|
cacheKey = mActiveEntry->GetCacheKey();
|
|
}
|
|
} else {
|
|
if (mLSHE) {
|
|
cacheKey = mLSHE->GetCacheKey();
|
|
} else if (mOSHE) { // for reload cases
|
|
cacheKey = mOSHE->GetCacheKey();
|
|
}
|
|
}
|
|
|
|
bool uriModified;
|
|
if (mLSHE || mLoadingEntry) {
|
|
if (mLoadingEntry) {
|
|
uriModified = mLoadingEntry->mInfo.GetURIWasModified();
|
|
} else {
|
|
uriModified = mLSHE->GetURIWasModified();
|
|
}
|
|
} else {
|
|
uriModified = false;
|
|
}
|
|
|
|
bool isXFOError = false;
|
|
if (mFailedChannel) {
|
|
nsresult status;
|
|
mFailedChannel->GetStatus(&status);
|
|
isXFOError = status == NS_ERROR_XFO_VIOLATION;
|
|
}
|
|
|
|
nsLoadFlags loadFlags = aLoadState->CalculateChannelLoadFlags(
|
|
mBrowsingContext, Some(uriModified), Some(isXFOError));
|
|
|
|
nsCOMPtr<nsIChannel> channel;
|
|
if (DocumentChannel::CanUseDocumentChannel(aLoadState->URI())) {
|
|
channel = DocumentChannel::CreateForDocument(aLoadState, loadInfo,
|
|
loadFlags, this, cacheKey,
|
|
uriModified, isXFOError);
|
|
MOZ_ASSERT(channel);
|
|
|
|
// Disable keyword fixup when using DocumentChannel, since
|
|
// DocumentLoadListener will handle this for us (in the parent process).
|
|
mAllowKeywordFixup = false;
|
|
} else if (!CreateAndConfigureRealChannelForLoadState(
|
|
mBrowsingContext, aLoadState, loadInfo, this, this,
|
|
GetOriginAttributes(), loadFlags, cacheKey, rv,
|
|
getter_AddRefs(channel))) {
|
|
return rv;
|
|
}
|
|
|
|
// Make sure to give the caller a channel if we managed to create one
|
|
// This is important for correct error page/session history interaction
|
|
if (aRequest) {
|
|
NS_ADDREF(*aRequest = channel);
|
|
}
|
|
|
|
nsCOMPtr<nsIContentSecurityPolicy> csp = aLoadState->Csp();
|
|
if (csp) {
|
|
// Check CSP navigate-to
|
|
bool allowsNavigateTo = false;
|
|
rv = csp->GetAllowsNavigateTo(aLoadState->URI(),
|
|
aLoadState->IsFormSubmission(),
|
|
false, /* aWasRedirected */
|
|
false, /* aEnforceWhitelist */
|
|
&allowsNavigateTo);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
if (!allowsNavigateTo) {
|
|
return NS_ERROR_CSP_NAVIGATE_TO_VIOLATION;
|
|
}
|
|
}
|
|
|
|
const nsACString& typeHint = aLoadState->TypeHint();
|
|
if (!typeHint.IsVoid()) {
|
|
mContentTypeHint = typeHint;
|
|
} else {
|
|
mContentTypeHint.Truncate();
|
|
}
|
|
|
|
// Load attributes depend on load type...
|
|
if (mLoadType == LOAD_RELOAD_CHARSET_CHANGE) {
|
|
// Use SetAllowStaleCacheContent (not LOAD_FROM_CACHE flag) since we
|
|
// only want to force cache load for this channel, not the whole
|
|
// loadGroup.
|
|
nsCOMPtr<nsICacheInfoChannel> cachingChannel = do_QueryInterface(channel);
|
|
if (cachingChannel) {
|
|
cachingChannel->SetAllowStaleCacheContent(true);
|
|
}
|
|
}
|
|
|
|
uint32_t openFlags =
|
|
nsDocShell::ComputeURILoaderFlags(mBrowsingContext, mLoadType);
|
|
return OpenInitializedChannel(channel, uriLoader, openFlags);
|
|
}
|
|
|
|
static nsresult AppendSegmentToString(nsIInputStream* aIn, void* aClosure,
|
|
const char* aFromRawSegment,
|
|
uint32_t aToOffset, uint32_t aCount,
|
|
uint32_t* aWriteCount) {
|
|
// aFromSegment now contains aCount bytes of data.
|
|
|
|
nsAutoCString* buf = static_cast<nsAutoCString*>(aClosure);
|
|
buf->Append(aFromRawSegment, aCount);
|
|
|
|
// Indicate that we have consumed all of aFromSegment
|
|
*aWriteCount = aCount;
|
|
return NS_OK;
|
|
}
|
|
|
|
/* static */ nsresult nsDocShell::AddHeadersToChannel(
|
|
nsIInputStream* aHeadersData, nsIChannel* aGenericChannel) {
|
|
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aGenericChannel);
|
|
NS_ENSURE_STATE(httpChannel);
|
|
|
|
uint32_t numRead;
|
|
nsAutoCString headersString;
|
|
nsresult rv = aHeadersData->ReadSegments(
|
|
AppendSegmentToString, &headersString, UINT32_MAX, &numRead);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// used during the manipulation of the String from the InputStream
|
|
nsAutoCString headerName;
|
|
nsAutoCString headerValue;
|
|
int32_t crlf;
|
|
int32_t colon;
|
|
|
|
//
|
|
// Iterate over the headersString: for each "\r\n" delimited chunk,
|
|
// add the value as a header to the nsIHttpChannel
|
|
//
|
|
|
|
static const char kWhitespace[] = "\b\t\r\n ";
|
|
while (true) {
|
|
crlf = headersString.Find("\r\n");
|
|
if (crlf == kNotFound) {
|
|
return NS_OK;
|
|
}
|
|
|
|
const nsACString& oneHeader = StringHead(headersString, crlf);
|
|
|
|
colon = oneHeader.FindChar(':');
|
|
if (colon == kNotFound) {
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
headerName = StringHead(oneHeader, colon);
|
|
headerValue = Substring(oneHeader, colon + 1);
|
|
|
|
headerName.Trim(kWhitespace);
|
|
headerValue.Trim(kWhitespace);
|
|
|
|
headersString.Cut(0, crlf + 2);
|
|
|
|
//
|
|
// FINALLY: we can set the header!
|
|
//
|
|
|
|
rv = httpChannel->SetRequestHeader(headerName, headerValue, true);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
|
|
MOZ_ASSERT_UNREACHABLE("oops");
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
/* static */ uint32_t nsDocShell::ComputeURILoaderFlags(
|
|
BrowsingContext* aBrowsingContext, uint32_t aLoadType) {
|
|
MOZ_ASSERT(aBrowsingContext);
|
|
|
|
uint32_t openFlags = 0;
|
|
if (aLoadType == LOAD_LINK) {
|
|
openFlags |= nsIURILoader::IS_CONTENT_PREFERRED;
|
|
}
|
|
if (!aBrowsingContext->GetAllowContentRetargeting()) {
|
|
openFlags |= nsIURILoader::DONT_RETARGET;
|
|
}
|
|
|
|
return openFlags;
|
|
}
|
|
|
|
void nsDocShell::UpdateMixedContentChannelForNewLoad(nsIChannel* aChannel) {
|
|
if (mLoadType == LOAD_NORMAL_ALLOW_MIXED_CONTENT ||
|
|
mLoadType == LOAD_RELOAD_ALLOW_MIXED_CONTENT) {
|
|
SetMixedContentChannel(aChannel);
|
|
} else if (mMixedContentChannel) {
|
|
/*
|
|
* If the user "Disables Protection on This Page", we call
|
|
* SetMixedContentChannel for the first time, otherwise
|
|
* mMixedContentChannel is still null.
|
|
* Later, if the new channel passes a same orign check, we remember the
|
|
* users decision by calling SetMixedContentChannel using the new channel.
|
|
* This way, the user does not have to click the disable protection button
|
|
* over and over for browsing the same site.
|
|
*/
|
|
nsresult rv =
|
|
nsContentUtils::CheckSameOrigin(mMixedContentChannel, aChannel);
|
|
if (NS_FAILED(rv) || NS_FAILED(SetMixedContentChannel(aChannel))) {
|
|
SetMixedContentChannel(nullptr);
|
|
}
|
|
}
|
|
}
|
|
|
|
nsresult nsDocShell::OpenInitializedChannel(nsIChannel* aChannel,
|
|
nsIURILoader* aURILoader,
|
|
uint32_t aOpenFlags) {
|
|
nsresult rv = NS_OK;
|
|
|
|
UpdateMixedContentChannelForNewLoad(aChannel);
|
|
|
|
// If anything fails here, make sure to clear our initial ClientSource.
|
|
auto cleanupInitialClient =
|
|
MakeScopeExit([&] { mInitialClientSource.reset(); });
|
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> win = GetWindow();
|
|
NS_ENSURE_TRUE(win, NS_ERROR_FAILURE);
|
|
|
|
MaybeCreateInitialClientSource();
|
|
|
|
// Let the client channel helper know if we are using DocumentChannel,
|
|
// since redirects get handled in the parent process in that case.
|
|
RefPtr<net::DocumentChannel> docChannel = do_QueryObject(aChannel);
|
|
if (docChannel && XRE_IsContentProcess()) {
|
|
// Tell the content process nsDocumentOpenInfo to not try to do
|
|
// any sort of targeting.
|
|
aOpenFlags |= nsIURILoader::DONT_RETARGET;
|
|
}
|
|
|
|
// Since we are loading a document we need to make sure the proper reserved
|
|
// and initial client data is stored on the nsILoadInfo. The
|
|
// ClientChannelHelper does this and ensures that it is propagated properly
|
|
// on redirects. We pass no reserved client here so that the helper will
|
|
// create the reserved ClientSource if necessary.
|
|
Maybe<ClientInfo> noReservedClient;
|
|
if (docChannel) {
|
|
// When using DocumentChannel, all redirect handling is done in the parent,
|
|
// so we just need the child variant to watch for the internal redirect
|
|
// to the final channel.
|
|
rv = AddClientChannelHelperInChild(
|
|
aChannel, win->EventTargetFor(TaskCategory::Other));
|
|
docChannel->SetInitialClientInfo(GetInitialClientInfo());
|
|
} else {
|
|
rv = AddClientChannelHelper(aChannel, std::move(noReservedClient),
|
|
GetInitialClientInfo(),
|
|
win->EventTargetFor(TaskCategory::Other));
|
|
}
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = aURILoader->OpenURI(aChannel, aOpenFlags, this);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// We're about to load a new page and it may take time before necko
|
|
// gives back any data, so main thread might have a chance to process a
|
|
// collector slice
|
|
nsJSContext::MaybeRunNextCollectorSlice(this, JS::GCReason::DOCSHELL);
|
|
|
|
// Success. Keep the initial ClientSource if it exists.
|
|
cleanupInitialClient.release();
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::OpenRedirectedChannel(nsDocShellLoadState* aLoadState) {
|
|
nsCOMPtr<nsIChannel> channel = aLoadState->GetPendingRedirectedChannel();
|
|
MOZ_ASSERT(channel);
|
|
|
|
UpdateMixedContentChannelForNewLoad(channel);
|
|
|
|
// If anything fails here, make sure to clear our initial ClientSource.
|
|
auto cleanupInitialClient =
|
|
MakeScopeExit([&] { mInitialClientSource.reset(); });
|
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> win = GetWindow();
|
|
NS_ENSURE_TRUE(win, NS_ERROR_FAILURE);
|
|
|
|
MaybeCreateInitialClientSource();
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
|
|
|
|
LoadInfo* li = static_cast<LoadInfo*>(loadInfo.get());
|
|
if (loadInfo->GetExternalContentPolicyType() ==
|
|
ExtContentPolicy::TYPE_DOCUMENT) {
|
|
li->UpdateBrowsingContextID(mBrowsingContext->Id());
|
|
} else if (loadInfo->GetExternalContentPolicyType() ==
|
|
ExtContentPolicy::TYPE_SUBDOCUMENT) {
|
|
li->UpdateFrameBrowsingContextID(mBrowsingContext->Id());
|
|
}
|
|
// TODO: more attributes need to be updated on the LoadInfo (bug 1561706)
|
|
|
|
// If we did a process switch, then we should have an existing allocated
|
|
// ClientInfo, so we just need to allocate a corresponding ClientSource.
|
|
CreateReservedSourceIfNeeded(channel,
|
|
win->EventTargetFor(TaskCategory::Other));
|
|
|
|
RefPtr<nsDocumentOpenInfo> loader =
|
|
new nsDocumentOpenInfo(this, nsIURILoader::DONT_RETARGET, nullptr);
|
|
channel->SetLoadGroup(mLoadGroup);
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(loader->Prepare());
|
|
|
|
nsresult rv = NS_OK;
|
|
if (XRE_IsParentProcess()) {
|
|
// If we're in the parent, the we don't have an nsIChildChannel, just
|
|
// the original channel, which is already open in this process.
|
|
|
|
// DocumentLoadListener expects to get an nsIParentChannel, so
|
|
// we create a wrapper around the channel and nsIStreamListener
|
|
// that forwards functionality as needed, and then we register
|
|
// it under the provided identifier.
|
|
RefPtr<ParentChannelWrapper> wrapper =
|
|
new ParentChannelWrapper(channel, loader);
|
|
wrapper->Register(aLoadState->GetPendingRedirectChannelRegistrarId());
|
|
|
|
mLoadGroup->AddRequest(channel, nullptr);
|
|
} else if (nsCOMPtr<nsIChildChannel> childChannel =
|
|
do_QueryInterface(channel)) {
|
|
// Our channel was redirected from another process, so doesn't need to
|
|
// be opened again. However, it does need its listener hooked up
|
|
// correctly.
|
|
rv = childChannel->CompleteRedirectSetup(loader);
|
|
} else {
|
|
// It's possible for the redirected channel to not implement
|
|
// nsIChildChannel and be entirely local (like srcdoc). In that case we
|
|
// can just open the local instance and it will work.
|
|
rv = channel->AsyncOpen(loader);
|
|
}
|
|
if (rv == NS_ERROR_NO_CONTENT) {
|
|
return NS_OK;
|
|
}
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Success. Keep the initial ClientSource if it exists.
|
|
cleanupInitialClient.release();
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::ScrollToAnchor(bool aCurHasRef, bool aNewHasRef,
|
|
nsACString& aNewHash, uint32_t aLoadType) {
|
|
if (!mCurrentURI) {
|
|
return NS_OK;
|
|
}
|
|
|
|
RefPtr<PresShell> presShell = GetPresShell();
|
|
if (!presShell) {
|
|
// If we failed to get the shell, or if there is no shell,
|
|
// nothing left to do here.
|
|
return NS_OK;
|
|
}
|
|
|
|
nsIScrollableFrame* rootScroll = presShell->GetRootScrollFrameAsScrollable();
|
|
if (rootScroll) {
|
|
rootScroll->ClearDidHistoryRestore();
|
|
}
|
|
|
|
// If we have no new anchor, we do not want to scroll, unless there is a
|
|
// current anchor and we are doing a history load. So return if we have no
|
|
// new anchor, and there is no current anchor or the load is not a history
|
|
// load.
|
|
if ((!aCurHasRef || aLoadType != LOAD_HISTORY) && !aNewHasRef) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Both the new and current URIs refer to the same page. We can now
|
|
// browse to the hash stored in the new URI.
|
|
|
|
if (!aNewHash.IsEmpty()) {
|
|
// anchor is there, but if it's a load from history,
|
|
// we don't have any anchor jumping to do
|
|
bool scroll = aLoadType != LOAD_HISTORY && aLoadType != LOAD_RELOAD_NORMAL;
|
|
|
|
// We assume that the bytes are in UTF-8, as it says in the
|
|
// spec:
|
|
// http://www.w3.org/TR/html4/appendix/notes.html#h-B.2.1
|
|
|
|
// We try the UTF-8 string first, and then try the document's
|
|
// charset (see below). If the string is not UTF-8,
|
|
// conversion will fail and give us an empty Unicode string.
|
|
// In that case, we should just fall through to using the
|
|
// page's charset.
|
|
nsresult rv = NS_ERROR_FAILURE;
|
|
NS_ConvertUTF8toUTF16 uStr(aNewHash);
|
|
if (!uStr.IsEmpty()) {
|
|
rv = presShell->GoToAnchor(uStr, scroll, ScrollFlags::ScrollSmoothAuto);
|
|
}
|
|
|
|
if (NS_FAILED(rv)) {
|
|
char* str = ToNewCString(aNewHash, mozilla::fallible);
|
|
if (!str) {
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
}
|
|
nsUnescape(str);
|
|
NS_ConvertUTF8toUTF16 utf16Str(str);
|
|
if (!utf16Str.IsEmpty()) {
|
|
rv = presShell->GoToAnchor(utf16Str, scroll,
|
|
ScrollFlags::ScrollSmoothAuto);
|
|
}
|
|
free(str);
|
|
}
|
|
|
|
// Above will fail if the anchor name is not UTF-8. Need to
|
|
// convert from document charset to unicode.
|
|
if (NS_FAILED(rv)) {
|
|
// Get a document charset
|
|
NS_ENSURE_TRUE(mContentViewer, NS_ERROR_FAILURE);
|
|
Document* doc = mContentViewer->GetDocument();
|
|
NS_ENSURE_TRUE(doc, NS_ERROR_FAILURE);
|
|
nsAutoCString charset;
|
|
doc->GetDocumentCharacterSet()->Name(charset);
|
|
|
|
nsCOMPtr<nsITextToSubURI> textToSubURI =
|
|
do_GetService(NS_ITEXTTOSUBURI_CONTRACTID, &rv);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Unescape and convert to unicode
|
|
nsAutoString uStr;
|
|
|
|
rv = textToSubURI->UnEscapeAndConvert(charset, aNewHash, uStr);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Ignore return value of GoToAnchor, since it will return an error
|
|
// if there is no such anchor in the document, which is actually a
|
|
// success condition for us (we want to update the session history
|
|
// with the new URI no matter whether we actually scrolled
|
|
// somewhere).
|
|
//
|
|
// When aNewHash contains "%00", unescaped string may be empty.
|
|
// And GoToAnchor asserts if we ask it to scroll to an empty ref.
|
|
presShell->GoToAnchor(uStr, scroll && !uStr.IsEmpty(),
|
|
ScrollFlags::ScrollSmoothAuto);
|
|
}
|
|
} else {
|
|
// Tell the shell it's at an anchor, without scrolling.
|
|
presShell->GoToAnchor(u""_ns, false);
|
|
|
|
// An empty anchor was found, but if it's a load from history,
|
|
// we don't have to jump to the top of the page. Scrollbar
|
|
// position will be restored by the caller, based on positions
|
|
// stored in session history.
|
|
if (aLoadType == LOAD_HISTORY || aLoadType == LOAD_RELOAD_NORMAL) {
|
|
return NS_OK;
|
|
}
|
|
// An empty anchor. Scroll to the top of the page. Ignore the
|
|
// return value; failure to scroll here (e.g. if there is no
|
|
// root scrollframe) is not grounds for canceling the load!
|
|
SetCurScrollPosEx(0, 0);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetupReferrerInfoFromChannel(nsIChannel* aChannel) {
|
|
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(aChannel));
|
|
if (httpChannel) {
|
|
nsCOMPtr<nsIReferrerInfo> referrerInfo = httpChannel->GetReferrerInfo();
|
|
SetReferrerInfo(referrerInfo);
|
|
}
|
|
}
|
|
|
|
bool nsDocShell::OnNewURI(nsIURI* aURI, nsIChannel* aChannel,
|
|
nsIPrincipal* aTriggeringPrincipal,
|
|
nsIPrincipal* aPrincipalToInherit,
|
|
nsIPrincipal* aPartitionedPrincipalToInherit,
|
|
nsIContentSecurityPolicy* aCsp,
|
|
bool aFireOnLocationChange, bool aAddToGlobalHistory,
|
|
bool aCloneSHChildren) {
|
|
MOZ_ASSERT(aURI, "uri is null");
|
|
MOZ_ASSERT(!aChannel || !aTriggeringPrincipal, "Shouldn't have both set");
|
|
|
|
MOZ_ASSERT(!aPrincipalToInherit ||
|
|
(aPrincipalToInherit && aTriggeringPrincipal));
|
|
|
|
#if defined(DEBUG)
|
|
if (MOZ_LOG_TEST(gDocShellLog, LogLevel::Debug)) {
|
|
nsAutoCString chanName;
|
|
if (aChannel) {
|
|
aChannel->GetName(chanName);
|
|
} else {
|
|
chanName.AssignLiteral("<no channel>");
|
|
}
|
|
|
|
MOZ_LOG(gDocShellLog, LogLevel::Debug,
|
|
("nsDocShell[%p]::OnNewURI(\"%s\", [%s], 0x%x)\n", this,
|
|
aURI->GetSpecOrDefault().get(), chanName.get(), mLoadType));
|
|
}
|
|
#endif
|
|
|
|
bool equalUri = false;
|
|
|
|
// Get the post data and the HTTP response code from the channel.
|
|
uint32_t responseStatus = 0;
|
|
nsCOMPtr<nsIInputStream> inputStream;
|
|
if (aChannel) {
|
|
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(aChannel));
|
|
|
|
// Check if the HTTPChannel is hiding under a multiPartChannel
|
|
if (!httpChannel) {
|
|
GetHttpChannel(aChannel, getter_AddRefs(httpChannel));
|
|
}
|
|
|
|
if (httpChannel) {
|
|
nsCOMPtr<nsIUploadChannel> uploadChannel(do_QueryInterface(httpChannel));
|
|
if (uploadChannel) {
|
|
uploadChannel->GetUploadStream(getter_AddRefs(inputStream));
|
|
}
|
|
|
|
// If the response status indicates an error, unlink this session
|
|
// history entry from any entries sharing its document.
|
|
nsresult rv = httpChannel->GetResponseStatus(&responseStatus);
|
|
if (mLSHE && NS_SUCCEEDED(rv) && responseStatus >= 400) {
|
|
mLSHE->AbandonBFCacheEntry();
|
|
// FIXME Do the same for mLoadingEntry
|
|
}
|
|
}
|
|
}
|
|
|
|
// Determine if this type of load should update history.
|
|
bool updateGHistory = ShouldUpdateGlobalHistory(mLoadType);
|
|
|
|
// We don't update session history on reload unless we're loading
|
|
// an iframe in shift-reload case.
|
|
bool updateSHistory = mBrowsingContext->ShouldUpdateSessionHistory(mLoadType);
|
|
|
|
// Create SH Entry (mLSHE) only if there is a SessionHistory object in the
|
|
// root browsing context.
|
|
// FIXME If session history in the parent is enabled then we only do this if
|
|
// the session history object is in process, otherwise we can't really
|
|
// use the mLSHE anyway. Once session history is only stored in the
|
|
// parent then this code will probably be removed anyway.
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (!rootSH) {
|
|
updateSHistory = false;
|
|
updateGHistory = false; // XXX Why global history too?
|
|
}
|
|
|
|
// Check if the url to be loaded is the same as the one already loaded.
|
|
if (mCurrentURI) {
|
|
aURI->Equals(mCurrentURI, &equalUri);
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
bool shAvailable = (rootSH != nullptr);
|
|
|
|
// XXX This log message is almost useless because |updateSHistory|
|
|
// and |updateGHistory| are not correct at this point.
|
|
|
|
MOZ_LOG(gDocShellLog, LogLevel::Debug,
|
|
(" shAvailable=%i updateSHistory=%i updateGHistory=%i"
|
|
" equalURI=%i\n",
|
|
shAvailable, updateSHistory, updateGHistory, equalUri));
|
|
#endif
|
|
|
|
/* If the url to be loaded is the same as the one already there,
|
|
* and the original loadType is LOAD_NORMAL, LOAD_LINK, or
|
|
* LOAD_STOP_CONTENT, set loadType to LOAD_NORMAL_REPLACE so that
|
|
* AddToSessionHistory() won't mess with the current SHEntry and
|
|
* if this page has any frame children, it also will be handled
|
|
* properly. see bug 83684
|
|
*
|
|
* NB: If mOSHE is null but we have a current URI, then it probably
|
|
* means that we must be at the transient about:blank content viewer;
|
|
* we should let the normal load continue, since there's nothing to
|
|
* replace. Sometimes this happens after a session restore (eg process
|
|
* switch) and mCurrentURI is not about:blank; we assume we can let the load
|
|
* continue (Bug 1301399).
|
|
*
|
|
* XXX Hopefully changing the loadType at this time will not hurt
|
|
* anywhere. The other way to take care of sequentially repeating
|
|
* frameset pages is to add new methods to nsIDocShellTreeItem.
|
|
* Hopefully I don't have to do that.
|
|
*/
|
|
if (equalUri &&
|
|
(mozilla::SessionHistoryInParent() ? !!mActiveEntry : !!mOSHE) &&
|
|
(mLoadType == LOAD_NORMAL || mLoadType == LOAD_LINK ||
|
|
mLoadType == LOAD_STOP_CONTENT) &&
|
|
!inputStream) {
|
|
mLoadType = LOAD_NORMAL_REPLACE;
|
|
}
|
|
|
|
// If this is a refresh to the currently loaded url, we don't
|
|
// have to update session or global history.
|
|
if (mLoadType == LOAD_REFRESH && !inputStream && equalUri) {
|
|
SetHistoryEntryAndUpdateBC(Some<nsISHEntry*>(mOSHE), Nothing());
|
|
}
|
|
|
|
/* If the user pressed shift-reload, cache will create a new cache key
|
|
* for the page. Save the new cacheKey in Session History.
|
|
* see bug 90098
|
|
*/
|
|
if (aChannel && IsForceReloadType(mLoadType)) {
|
|
MOZ_ASSERT(!updateSHistory || IsFrame(),
|
|
"We shouldn't be updating session history for forced"
|
|
" reloads unless we're in a newly created iframe!");
|
|
|
|
nsCOMPtr<nsICacheInfoChannel> cacheChannel(do_QueryInterface(aChannel));
|
|
uint32_t cacheKey = 0;
|
|
// Get the Cache Key and store it in SH.
|
|
if (cacheChannel) {
|
|
cacheChannel->GetCacheKey(&cacheKey);
|
|
}
|
|
// If we already have a loading history entry, store the new cache key
|
|
// in it. Otherwise, since we're doing a reload and won't be updating
|
|
// our history entry, store the cache key in our current history entry.
|
|
SetCacheKeyOnHistoryEntry(mLSHE ? mLSHE : mOSHE, cacheKey);
|
|
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
// Since we're force-reloading, clear all the sub frame history.
|
|
ClearFrameHistory(mLSHE);
|
|
ClearFrameHistory(mOSHE);
|
|
}
|
|
}
|
|
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
// Clear subframe history on refresh.
|
|
// XXX: history.go(0) won't go this path as mLoadType is LOAD_HISTORY in
|
|
// this case. One should re-validate after bug 1331865 fixed.
|
|
if (mLoadType == LOAD_REFRESH) {
|
|
ClearFrameHistory(mLSHE);
|
|
ClearFrameHistory(mOSHE);
|
|
}
|
|
|
|
if (updateSHistory) {
|
|
// Update session history if necessary...
|
|
if (!mLSHE && (mItemType == typeContent) && mURIResultedInDocument) {
|
|
/* This is a fresh page getting loaded for the first time
|
|
*.Create a Entry for it and add it to SH, if this is the
|
|
* rootDocShell
|
|
*/
|
|
(void)AddToSessionHistory(aURI, aChannel, aTriggeringPrincipal,
|
|
aPrincipalToInherit,
|
|
aPartitionedPrincipalToInherit, aCsp,
|
|
aCloneSHChildren, getter_AddRefs(mLSHE));
|
|
}
|
|
} else if (GetSessionHistory() && mLSHE && mURIResultedInDocument) {
|
|
// Even if we don't add anything to SHistory, ensure the current index
|
|
// points to the same SHEntry as our mLSHE.
|
|
|
|
GetSessionHistory()->LegacySHistory()->EnsureCorrectEntryAtCurrIndex(
|
|
mLSHE);
|
|
}
|
|
}
|
|
|
|
// If this is a POST request, we do not want to include this in global
|
|
// history.
|
|
if (ShouldAddURIVisit(aChannel) && updateGHistory && aAddToGlobalHistory &&
|
|
!net::ChannelIsPost(aChannel)) {
|
|
nsCOMPtr<nsIURI> previousURI;
|
|
uint32_t previousFlags = 0;
|
|
|
|
if (mLoadType & LOAD_CMD_RELOAD) {
|
|
// On a reload request, we don't set redirecting flags.
|
|
previousURI = aURI;
|
|
} else {
|
|
ExtractLastVisit(aChannel, getter_AddRefs(previousURI), &previousFlags);
|
|
}
|
|
|
|
AddURIVisit(aURI, previousURI, previousFlags, responseStatus);
|
|
}
|
|
|
|
// If this was a history load or a refresh, or it was a history load but
|
|
// later changed to LOAD_NORMAL_REPLACE due to redirection, update the index
|
|
// in session history.
|
|
if (!mozilla::SessionHistoryInParent() && rootSH &&
|
|
((mLoadType & (LOAD_CMD_HISTORY | LOAD_CMD_RELOAD)) ||
|
|
mLoadType == LOAD_NORMAL_REPLACE)) {
|
|
mPreviousEntryIndex = rootSH->Index();
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
rootSH->LegacySHistory()->UpdateIndex();
|
|
}
|
|
mLoadedEntryIndex = rootSH->Index();
|
|
MOZ_LOG(gPageCacheLog, LogLevel::Verbose,
|
|
("Previous index: %d, Loaded index: %d", mPreviousEntryIndex,
|
|
mLoadedEntryIndex));
|
|
}
|
|
|
|
// aCloneSHChildren exactly means "we are not loading a new document".
|
|
uint32_t locationFlags =
|
|
aCloneSHChildren ? uint32_t(LOCATION_CHANGE_SAME_DOCUMENT) : 0;
|
|
|
|
bool onLocationChangeNeeded =
|
|
SetCurrentURI(aURI, aChannel, aFireOnLocationChange, locationFlags);
|
|
// Make sure to store the referrer from the channel, if any
|
|
SetupReferrerInfoFromChannel(aChannel);
|
|
return onLocationChangeNeeded;
|
|
}
|
|
|
|
void nsDocShell::SetReferrerInfo(nsIReferrerInfo* aReferrerInfo) {
|
|
mReferrerInfo = aReferrerInfo; // This assigment addrefs
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell: Session History
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::AddState(JS::Handle<JS::Value> aData, const nsAString& aTitle,
|
|
const nsAString& aURL, bool aReplace, JSContext* aCx) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell[%p]: AddState(..., %s, %s, %d)", this,
|
|
NS_ConvertUTF16toUTF8(aTitle).get(),
|
|
NS_ConvertUTF16toUTF8(aURL).get(), aReplace));
|
|
// Implements History.pushState and History.replaceState
|
|
|
|
// Here's what we do, roughly in the order specified by HTML5. The specific
|
|
// steps we are executing are at
|
|
// <https://html.spec.whatwg.org/multipage/history.html#dom-history-pushstate>
|
|
// and
|
|
// <https://html.spec.whatwg.org/multipage/history.html#url-and-history-update-steps>.
|
|
// This function basically implements #dom-history-pushstate and
|
|
// UpdateURLAndHistory implements #url-and-history-update-steps.
|
|
//
|
|
// A. Serialize aData using structured clone. This is #dom-history-pushstate
|
|
// step 5.
|
|
// B. If the third argument is present, #dom-history-pushstate step 7.
|
|
// 7.1. Resolve the url, relative to our document.
|
|
// 7.2. If (a) fails, raise a SECURITY_ERR
|
|
// 7.4. Compare the resulting absolute URL to the document's address. If
|
|
// any part of the URLs difer other than the <path>, <query>, and
|
|
// <fragment> components, raise a SECURITY_ERR and abort.
|
|
// C. If !aReplace, #url-and-history-update-steps steps 2.1-2.3:
|
|
// Remove from the session history all entries after the current entry,
|
|
// as we would after a regular navigation, and save the current
|
|
// entry's scroll position (bug 590573).
|
|
// D. #url-and-history-update-steps step 2.4 or step 3. As apropriate,
|
|
// either add a state object entry to the session history after the
|
|
// current entry with the following properties, or modify the current
|
|
// session history entry to set
|
|
// a. cloned data as the state object,
|
|
// b. if the third argument was present, the absolute URL found in
|
|
// step 2
|
|
// Also clear the new history entry's POST data (see bug 580069).
|
|
// E. If aReplace is false (i.e. we're doing a pushState instead of a
|
|
// replaceState), notify bfcache that we've navigated to a new page.
|
|
// F. If the third argument is present, set the document's current address
|
|
// to the absolute URL found in step B. This is
|
|
// #url-and-history-update-steps step 4.
|
|
//
|
|
// It's important that this function not run arbitrary scripts after step A
|
|
// and before completing step E. For example, if a script called
|
|
// history.back() before we completed step E, bfcache might destroy an
|
|
// active content viewer. Since EvictOutOfRangeContentViewers at the end of
|
|
// step E might run script, we can't just put a script blocker around the
|
|
// critical section.
|
|
//
|
|
// Note that we completely ignore the aTitle parameter.
|
|
|
|
nsresult rv;
|
|
|
|
// Don't clobber the load type of an existing network load.
|
|
AutoRestore<uint32_t> loadTypeResetter(mLoadType);
|
|
|
|
// pushState effectively becomes replaceState when we've started a network
|
|
// load but haven't adopted its document yet. This mirrors what we do with
|
|
// changes to the hash at this stage of the game.
|
|
if (JustStartedNetworkLoad()) {
|
|
aReplace = true;
|
|
}
|
|
|
|
RefPtr<Document> document = GetDocument();
|
|
NS_ENSURE_TRUE(document, NS_ERROR_FAILURE);
|
|
|
|
// Step A: Serialize aData using structured clone.
|
|
// https://html.spec.whatwg.org/multipage/history.html#dom-history-pushstate
|
|
// step 5.
|
|
nsCOMPtr<nsIStructuredCloneContainer> scContainer;
|
|
|
|
// scContainer->Init might cause arbitrary JS to run, and this code might
|
|
// navigate the page we're on, potentially to a different origin! (bug
|
|
// 634834) To protect against this, we abort if our principal changes due
|
|
// to the InitFromJSVal() call.
|
|
{
|
|
RefPtr<Document> origDocument = GetDocument();
|
|
if (!origDocument) {
|
|
return NS_ERROR_DOM_SECURITY_ERR;
|
|
}
|
|
nsCOMPtr<nsIPrincipal> origPrincipal = origDocument->NodePrincipal();
|
|
|
|
scContainer = new nsStructuredCloneContainer();
|
|
rv = scContainer->InitFromJSVal(aData, aCx);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
RefPtr<Document> newDocument = GetDocument();
|
|
if (!newDocument) {
|
|
return NS_ERROR_DOM_SECURITY_ERR;
|
|
}
|
|
nsCOMPtr<nsIPrincipal> newPrincipal = newDocument->NodePrincipal();
|
|
|
|
bool principalsEqual = false;
|
|
origPrincipal->Equals(newPrincipal, &principalsEqual);
|
|
NS_ENSURE_TRUE(principalsEqual, NS_ERROR_DOM_SECURITY_ERR);
|
|
}
|
|
|
|
// Check that the state object isn't too long.
|
|
// Default max length: 2097152 (0x200000) bytes.
|
|
int32_t maxStateObjSize =
|
|
Preferences::GetInt("browser.history.maxStateObjectSize", 2097152);
|
|
if (maxStateObjSize < 0) {
|
|
maxStateObjSize = 0;
|
|
}
|
|
|
|
uint64_t scSize;
|
|
rv = scContainer->GetSerializedNBytes(&scSize);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
NS_ENSURE_TRUE(scSize <= (uint32_t)maxStateObjSize, NS_ERROR_ILLEGAL_VALUE);
|
|
|
|
// Step B: Resolve aURL.
|
|
// https://html.spec.whatwg.org/multipage/history.html#dom-history-pushstate
|
|
// step 7.
|
|
bool equalURIs = true;
|
|
nsCOMPtr<nsIURI> currentURI;
|
|
if (mCurrentURI) {
|
|
currentURI = nsIOService::CreateExposableURI(mCurrentURI);
|
|
} else {
|
|
currentURI = mCurrentURI;
|
|
}
|
|
nsCOMPtr<nsIURI> newURI;
|
|
if (aURL.Length() == 0) {
|
|
newURI = currentURI;
|
|
} else {
|
|
// 7.1: Resolve aURL relative to mURI
|
|
|
|
nsIURI* docBaseURI = document->GetDocBaseURI();
|
|
if (!docBaseURI) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsAutoCString spec;
|
|
docBaseURI->GetSpec(spec);
|
|
|
|
rv = NS_NewURI(getter_AddRefs(newURI), aURL,
|
|
document->GetDocumentCharacterSet(), docBaseURI);
|
|
|
|
// 7.2: If 2a fails, raise a SECURITY_ERR
|
|
if (NS_FAILED(rv)) {
|
|
return NS_ERROR_DOM_SECURITY_ERR;
|
|
}
|
|
|
|
// 7.4 and 7.5: Same-origin check.
|
|
if (!nsContentUtils::URIIsLocalFile(newURI)) {
|
|
// In addition to checking that the security manager says that
|
|
// the new URI has the same origin as our current URI, we also
|
|
// check that the two URIs have the same userpass. (The
|
|
// security manager says that |http://foo.com| and
|
|
// |http://me@foo.com| have the same origin.) currentURI
|
|
// won't contain the password part of the userpass, so this
|
|
// means that it's never valid to specify a password in a
|
|
// pushState or replaceState URI.
|
|
|
|
nsCOMPtr<nsIScriptSecurityManager> secMan =
|
|
do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID);
|
|
NS_ENSURE_TRUE(secMan, NS_ERROR_FAILURE);
|
|
|
|
// It's very important that we check that newURI is of the same
|
|
// origin as currentURI, not docBaseURI, because a page can
|
|
// set docBaseURI arbitrarily to any domain.
|
|
nsAutoCString currentUserPass, newUserPass;
|
|
NS_ENSURE_SUCCESS(currentURI->GetUserPass(currentUserPass),
|
|
NS_ERROR_FAILURE);
|
|
NS_ENSURE_SUCCESS(newURI->GetUserPass(newUserPass), NS_ERROR_FAILURE);
|
|
bool isPrivateWin =
|
|
document->NodePrincipal()->OriginAttributesRef().mPrivateBrowsingId >
|
|
0;
|
|
if (NS_FAILED(secMan->CheckSameOriginURI(currentURI, newURI, true,
|
|
isPrivateWin)) ||
|
|
!currentUserPass.Equals(newUserPass)) {
|
|
return NS_ERROR_DOM_SECURITY_ERR;
|
|
}
|
|
} else {
|
|
// It's a file:// URI
|
|
nsCOMPtr<nsIPrincipal> principal = document->GetPrincipal();
|
|
|
|
if (!principal || NS_FAILED(principal->CheckMayLoadWithReporting(
|
|
newURI, false, document->InnerWindowID()))) {
|
|
return NS_ERROR_DOM_SECURITY_ERR;
|
|
}
|
|
}
|
|
|
|
if (currentURI) {
|
|
currentURI->Equals(newURI, &equalURIs);
|
|
} else {
|
|
equalURIs = false;
|
|
}
|
|
|
|
} // end of same-origin check
|
|
|
|
// Step 8: call "URL and history update steps"
|
|
rv = UpdateURLAndHistory(document, newURI, scContainer, aTitle, aReplace,
|
|
currentURI, equalURIs);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::UpdateURLAndHistory(Document* aDocument, nsIURI* aNewURI,
|
|
nsIStructuredCloneContainer* aData,
|
|
const nsAString& aTitle, bool aReplace,
|
|
nsIURI* aCurrentURI, bool aEqualURIs) {
|
|
// Implements
|
|
// https://html.spec.whatwg.org/multipage/history.html#url-and-history-update-steps
|
|
|
|
// Step 2, if aReplace is false: Create a new entry in the session
|
|
// history. This will erase all SHEntries after the new entry and make this
|
|
// entry the current one. This operation may modify mOSHE, which we need
|
|
// later, so we keep a reference here.
|
|
NS_ENSURE_TRUE(mOSHE || mActiveEntry || aReplace, NS_ERROR_FAILURE);
|
|
nsCOMPtr<nsISHEntry> oldOSHE = mOSHE;
|
|
|
|
// If this push/replaceState changed the document's current URI and the new
|
|
// URI differs from the old URI in more than the hash, or if the old
|
|
// SHEntry's URI was modified in this way by a push/replaceState call
|
|
// set URIWasModified to true for the current SHEntry (bug 669671).
|
|
bool sameExceptHashes = true;
|
|
aNewURI->EqualsExceptRef(aCurrentURI, &sameExceptHashes);
|
|
bool uriWasModified;
|
|
if (sameExceptHashes) {
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
uriWasModified = mActiveEntry && mActiveEntry->GetURIWasModified();
|
|
} else {
|
|
uriWasModified = oldOSHE && oldOSHE->GetURIWasModified();
|
|
}
|
|
} else {
|
|
uriWasModified = true;
|
|
}
|
|
|
|
mLoadType = LOAD_PUSHSTATE;
|
|
|
|
nsCOMPtr<nsISHEntry> newSHEntry;
|
|
if (!aReplace) {
|
|
// Step 2.
|
|
|
|
// Step 2.2, "Remove any tasks queued by the history traversal task
|
|
// source that are associated with any Document objects in the
|
|
// top-level browsing context's document family." This is very hard in
|
|
// SessionHistoryInParent since we can't synchronously access the
|
|
// pending navigations that are already sent to the parent. We can
|
|
// abort any AsyncGo navigations that are waiting to be sent. If we
|
|
// send a message to the parent, it would be processed after any
|
|
// navigations previously sent. So long as we consider the "history
|
|
// traversal task source" to be the list in this process we match the
|
|
// spec. If we move the entire list to the parent, we can handle the
|
|
// aborting of loads there, but we don't have a way to synchronously
|
|
// remove entries as we do here for non-SHIP.
|
|
RefPtr<ChildSHistory> shistory = GetRootSessionHistory();
|
|
if (shistory) {
|
|
shistory->RemovePendingHistoryNavigations();
|
|
}
|
|
|
|
nsPoint scrollPos = GetCurScrollPos();
|
|
|
|
bool scrollRestorationIsManual;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
// FIXME Need to save the current scroll position on mActiveEntry.
|
|
scrollRestorationIsManual = mActiveEntry->GetScrollRestorationIsManual();
|
|
} else {
|
|
// Save the current scroll position (bug 590573). Step 2.3.
|
|
mOSHE->SetScrollPosition(scrollPos.x, scrollPos.y);
|
|
|
|
scrollRestorationIsManual = mOSHE->GetScrollRestorationIsManual();
|
|
}
|
|
|
|
nsCOMPtr<nsIContentSecurityPolicy> csp = aDocument->GetCsp();
|
|
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p UpdateActiveEntry (not replacing)", this));
|
|
nsString title(mActiveEntry->GetTitle());
|
|
UpdateActiveEntry(false,
|
|
/* aPreviousScrollPos = */ Some(scrollPos), aNewURI,
|
|
/* aOriginalURI = */ nullptr,
|
|
/* aTriggeringPrincipal = */ aDocument->NodePrincipal(),
|
|
csp, title, scrollRestorationIsManual, aData,
|
|
uriWasModified);
|
|
} else {
|
|
// Since we're not changing which page we have loaded, pass
|
|
// true for aCloneChildren.
|
|
nsresult rv = AddToSessionHistory(
|
|
aNewURI, nullptr,
|
|
aDocument->NodePrincipal(), // triggeringPrincipal
|
|
nullptr, nullptr, csp, true, getter_AddRefs(newSHEntry));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
NS_ENSURE_TRUE(newSHEntry, NS_ERROR_FAILURE);
|
|
|
|
// Session history entries created by pushState inherit scroll restoration
|
|
// mode from the current entry.
|
|
newSHEntry->SetScrollRestorationIsManual(scrollRestorationIsManual);
|
|
|
|
nsString title;
|
|
mOSHE->GetTitle(title);
|
|
|
|
// Set the new SHEntry's title (bug 655273).
|
|
newSHEntry->SetTitle(title);
|
|
|
|
// Link the new SHEntry to the old SHEntry's BFCache entry, since the
|
|
// two entries correspond to the same document.
|
|
NS_ENSURE_SUCCESS(newSHEntry->AdoptBFCacheEntry(oldOSHE),
|
|
NS_ERROR_FAILURE);
|
|
|
|
// AddToSessionHistory may not modify mOSHE. In case it doesn't,
|
|
// we'll just set mOSHE here.
|
|
mOSHE = newSHEntry;
|
|
}
|
|
} else if (mozilla::SessionHistoryInParent()) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p UpdateActiveEntry (replacing) mActiveEntry %p",
|
|
this, mActiveEntry.get()));
|
|
// Setting the resultPrincipalURI to nullptr is fine here: it will cause
|
|
// NS_GetFinalChannelURI to use the originalURI as the URI, which is aNewURI
|
|
// in our case. We could also set it to aNewURI, with the same result.
|
|
// We don't use aTitle here, see bug 544535.
|
|
nsString title;
|
|
if (mActiveEntry) {
|
|
title = mActiveEntry->GetTitle();
|
|
}
|
|
UpdateActiveEntry(
|
|
true, /* aPreviousScrollPos = */ Nothing(), aNewURI, aNewURI,
|
|
aDocument->NodePrincipal(), aDocument->GetCsp(), title,
|
|
mActiveEntry && mActiveEntry->GetScrollRestorationIsManual(), aData,
|
|
uriWasModified);
|
|
} else {
|
|
// Step 3.
|
|
newSHEntry = mOSHE;
|
|
|
|
MOZ_LOG(gSHLog, LogLevel::Debug, ("nsDocShell %p step 3", this));
|
|
// Since we're not changing which page we have loaded, pass
|
|
// true for aCloneChildren.
|
|
if (!newSHEntry) {
|
|
nsresult rv = AddToSessionHistory(
|
|
aNewURI, nullptr,
|
|
aDocument->NodePrincipal(), // triggeringPrincipal
|
|
nullptr, nullptr, aDocument->GetCsp(), true,
|
|
getter_AddRefs(newSHEntry));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
mOSHE = newSHEntry;
|
|
}
|
|
|
|
newSHEntry->SetURI(aNewURI);
|
|
newSHEntry->SetOriginalURI(aNewURI);
|
|
// Setting the resultPrincipalURI to nullptr is fine here: it will cause
|
|
// NS_GetFinalChannelURI to use the originalURI as the URI, which is aNewURI
|
|
// in our case. We could also set it to aNewURI, with the same result.
|
|
newSHEntry->SetResultPrincipalURI(nullptr);
|
|
newSHEntry->SetLoadReplace(false);
|
|
}
|
|
|
|
if (!mozilla::SessionHistoryInParent()) {
|
|
// Step 2.4 and 3: Modify new/original session history entry and clear its
|
|
// POST data, if there is any.
|
|
newSHEntry->SetStateData(aData);
|
|
newSHEntry->SetPostData(nullptr);
|
|
|
|
newSHEntry->SetURIWasModified(uriWasModified);
|
|
|
|
// Step E as described at the top of AddState: If aReplace is false,
|
|
// indicating that we're doing a pushState rather than a replaceState,
|
|
// notify bfcache that we've added a page to the history so it can evict
|
|
// content viewers if appropriate. Otherwise call ReplaceEntry so that we
|
|
// notify nsIHistoryListeners that an entry was replaced. We may not have a
|
|
// root session history if this call is coming from a document.open() in a
|
|
// docshell subtree that disables session history.
|
|
RefPtr<ChildSHistory> rootSH = GetRootSessionHistory();
|
|
if (rootSH) {
|
|
rootSH->LegacySHistory()->EvictContentViewersOrReplaceEntry(newSHEntry,
|
|
aReplace);
|
|
}
|
|
}
|
|
|
|
// Step 4: If the document's URI changed, update document's URI and update
|
|
// global history.
|
|
//
|
|
// We need to call FireOnLocationChange so that the browser's address bar
|
|
// gets updated and the back button is enabled, but we only need to
|
|
// explicitly call FireOnLocationChange if we're not calling SetCurrentURI,
|
|
// since SetCurrentURI will call FireOnLocationChange for us.
|
|
//
|
|
// Both SetCurrentURI(...) and FireDummyOnLocationChange() pass
|
|
// nullptr for aRequest param to FireOnLocationChange(...). Such an update
|
|
// notification is allowed only when we know docshell is not loading a new
|
|
// document and it requires LOCATION_CHANGE_SAME_DOCUMENT flag. Otherwise,
|
|
// FireOnLocationChange(...) breaks security UI.
|
|
//
|
|
// If the docshell is shutting down, don't update the document URI, as we
|
|
// can't load into a docshell that is being destroyed.
|
|
if (!aEqualURIs && !mIsBeingDestroyed) {
|
|
aDocument->SetDocumentURI(aNewURI);
|
|
SetCurrentURI(aNewURI, nullptr, true, LOCATION_CHANGE_SAME_DOCUMENT);
|
|
|
|
AddURIVisit(aNewURI, aCurrentURI, 0);
|
|
|
|
// AddURIVisit doesn't set the title for the new URI in global history,
|
|
// so do that here.
|
|
UpdateGlobalHistoryTitle(aNewURI);
|
|
|
|
// Inform the favicon service that our old favicon applies to this new
|
|
// URI.
|
|
CopyFavicon(aCurrentURI, aNewURI, UsePrivateBrowsing());
|
|
} else {
|
|
FireDummyOnLocationChange();
|
|
}
|
|
aDocument->SetStateObject(aData);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCurrentScrollRestorationIsManual(bool* aIsManual) {
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
*aIsManual = mActiveEntry && mActiveEntry->GetScrollRestorationIsManual();
|
|
return NS_OK;
|
|
}
|
|
|
|
*aIsManual = false;
|
|
if (mOSHE) {
|
|
return mOSHE->GetScrollRestorationIsManual(aIsManual);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetCurrentScrollRestorationIsManual(bool aIsManual) {
|
|
SetScrollRestorationIsManualOnHistoryEntry(mOSHE, aIsManual);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
void nsDocShell::SetScrollRestorationIsManualOnHistoryEntry(
|
|
nsISHEntry* aSHEntry, bool aIsManual) {
|
|
if (aSHEntry) {
|
|
aSHEntry->SetScrollRestorationIsManual(aIsManual);
|
|
}
|
|
|
|
if (mActiveEntry && mBrowsingContext) {
|
|
mActiveEntry->SetScrollRestorationIsManual(aIsManual);
|
|
if (XRE_IsParentProcess()) {
|
|
SessionHistoryEntry* entry =
|
|
mBrowsingContext->Canonical()->GetActiveSessionHistoryEntry();
|
|
if (entry) {
|
|
entry->SetScrollRestorationIsManual(aIsManual);
|
|
}
|
|
} else {
|
|
mozilla::Unused << ContentChild::GetSingleton()
|
|
->SendSessionHistoryEntryScrollRestorationIsManual(
|
|
mBrowsingContext, aIsManual);
|
|
}
|
|
}
|
|
}
|
|
|
|
void nsDocShell::SetCacheKeyOnHistoryEntry(nsISHEntry* aSHEntry,
|
|
uint32_t aCacheKey) {
|
|
if (aSHEntry) {
|
|
aSHEntry->SetCacheKey(aCacheKey);
|
|
}
|
|
|
|
if (mActiveEntry && mBrowsingContext) {
|
|
mActiveEntry->SetCacheKey(aCacheKey);
|
|
if (XRE_IsParentProcess()) {
|
|
SessionHistoryEntry* entry =
|
|
mBrowsingContext->Canonical()->GetActiveSessionHistoryEntry();
|
|
if (entry) {
|
|
entry->SetCacheKey(aCacheKey);
|
|
}
|
|
} else {
|
|
mozilla::Unused
|
|
<< ContentChild::GetSingleton()->SendSessionHistoryEntryCacheKey(
|
|
mBrowsingContext, aCacheKey);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
bool nsDocShell::ShouldAddToSessionHistory(nsIURI* aURI, nsIChannel* aChannel) {
|
|
// I believe none of the about: urls should go in the history. But then
|
|
// that could just be me... If the intent is only deny about:blank then we
|
|
// should just do a spec compare, rather than two gets of the scheme and
|
|
// then the path. -Gagan
|
|
nsresult rv;
|
|
nsAutoCString buf;
|
|
|
|
rv = aURI->GetScheme(buf);
|
|
if (NS_FAILED(rv)) {
|
|
return false;
|
|
}
|
|
|
|
if (buf.EqualsLiteral("about")) {
|
|
rv = aURI->GetPathQueryRef(buf);
|
|
if (NS_FAILED(rv)) {
|
|
return false;
|
|
}
|
|
|
|
if (buf.EqualsLiteral("blank")) {
|
|
return false;
|
|
}
|
|
// We only want to add about:newtab if it's not privileged:
|
|
if (buf.EqualsLiteral("newtab")) {
|
|
NS_ENSURE_TRUE(aChannel, false);
|
|
nsCOMPtr<nsIPrincipal> resultPrincipal;
|
|
rv = nsContentUtils::GetSecurityManager()->GetChannelResultPrincipal(
|
|
aChannel, getter_AddRefs(resultPrincipal));
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
return !resultPrincipal->IsSystemPrincipal();
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
nsresult nsDocShell::AddToSessionHistory(
|
|
nsIURI* aURI, nsIChannel* aChannel, nsIPrincipal* aTriggeringPrincipal,
|
|
nsIPrincipal* aPrincipalToInherit,
|
|
nsIPrincipal* aPartitionedPrincipalToInherit,
|
|
nsIContentSecurityPolicy* aCsp, bool aCloneChildren,
|
|
nsISHEntry** aNewEntry) {
|
|
MOZ_ASSERT(aURI, "uri is null");
|
|
MOZ_ASSERT(!aChannel || !aTriggeringPrincipal, "Shouldn't have both set");
|
|
MOZ_DIAGNOSTIC_ASSERT(!mozilla::SessionHistoryInParent());
|
|
|
|
#if defined(DEBUG)
|
|
if (MOZ_LOG_TEST(gDocShellLog, LogLevel::Debug)) {
|
|
nsAutoCString chanName;
|
|
if (aChannel) {
|
|
aChannel->GetName(chanName);
|
|
} else {
|
|
chanName.AssignLiteral("<no channel>");
|
|
}
|
|
|
|
MOZ_LOG(gDocShellLog, LogLevel::Debug,
|
|
("nsDocShell[%p]::AddToSessionHistory(\"%s\", [%s])\n", this,
|
|
aURI->GetSpecOrDefault().get(), chanName.get()));
|
|
}
|
|
#endif
|
|
|
|
nsresult rv = NS_OK;
|
|
nsCOMPtr<nsISHEntry> entry;
|
|
|
|
/*
|
|
* If this is a LOAD_FLAGS_REPLACE_HISTORY in a subframe, we use
|
|
* the existing SH entry in the page and replace the url and
|
|
* other vitalities.
|
|
*/
|
|
if (LOAD_TYPE_HAS_FLAGS(mLoadType, LOAD_FLAGS_REPLACE_HISTORY) &&
|
|
!mBrowsingContext->IsTop()) {
|
|
// This is a subframe
|
|
entry = mOSHE;
|
|
if (entry) {
|
|
entry->ClearEntry();
|
|
}
|
|
}
|
|
|
|
// Create a new entry if necessary.
|
|
if (!entry) {
|
|
entry = new nsSHEntry();
|
|
}
|
|
|
|
// Get the post data & referrer
|
|
nsCOMPtr<nsIInputStream> inputStream;
|
|
nsCOMPtr<nsIURI> originalURI;
|
|
nsCOMPtr<nsIURI> resultPrincipalURI;
|
|
bool loadReplace = false;
|
|
nsCOMPtr<nsIReferrerInfo> referrerInfo;
|
|
uint32_t cacheKey = 0;
|
|
nsCOMPtr<nsIPrincipal> triggeringPrincipal = aTriggeringPrincipal;
|
|
nsCOMPtr<nsIPrincipal> principalToInherit = aPrincipalToInherit;
|
|
nsCOMPtr<nsIPrincipal> partitionedPrincipalToInherit =
|
|
aPartitionedPrincipalToInherit;
|
|
nsCOMPtr<nsIContentSecurityPolicy> csp = aCsp;
|
|
bool expired = false; // by default the page is not expired
|
|
bool discardLayoutState = false;
|
|
nsCOMPtr<nsICacheInfoChannel> cacheChannel;
|
|
if (aChannel) {
|
|
cacheChannel = do_QueryInterface(aChannel);
|
|
|
|
/* If there is a caching channel, get the Cache Key and store it
|
|
* in SH.
|
|
*/
|
|
if (cacheChannel) {
|
|
cacheChannel->GetCacheKey(&cacheKey);
|
|
}
|
|
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(aChannel));
|
|
|
|
// Check if the httpChannel is hiding under a multipartChannel
|
|
if (!httpChannel) {
|
|
GetHttpChannel(aChannel, getter_AddRefs(httpChannel));
|
|
}
|
|
if (httpChannel) {
|
|
nsCOMPtr<nsIUploadChannel> uploadChannel(do_QueryInterface(httpChannel));
|
|
if (uploadChannel) {
|
|
uploadChannel->GetUploadStream(getter_AddRefs(inputStream));
|
|
}
|
|
httpChannel->GetOriginalURI(getter_AddRefs(originalURI));
|
|
uint32_t loadFlags;
|
|
aChannel->GetLoadFlags(&loadFlags);
|
|
loadReplace = loadFlags & nsIChannel::LOAD_REPLACE;
|
|
rv = httpChannel->GetReferrerInfo(getter_AddRefs(referrerInfo));
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
|
|
|
discardLayoutState = ShouldDiscardLayoutState(httpChannel);
|
|
}
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
|
if (!triggeringPrincipal) {
|
|
triggeringPrincipal = loadInfo->TriggeringPrincipal();
|
|
}
|
|
if (!csp) {
|
|
csp = loadInfo->GetCspToInherit();
|
|
}
|
|
|
|
loadInfo->GetResultPrincipalURI(getter_AddRefs(resultPrincipalURI));
|
|
|
|
// For now keep storing just the principal in the SHEntry.
|
|
if (!principalToInherit) {
|
|
if (loadInfo->GetLoadingSandboxed()) {
|
|
if (loadInfo->GetLoadingPrincipal()) {
|
|
principalToInherit = NullPrincipal::CreateWithInheritedAttributes(
|
|
loadInfo->GetLoadingPrincipal());
|
|
} else {
|
|
// get the OriginAttributes
|
|
OriginAttributes attrs;
|
|
loadInfo->GetOriginAttributes(&attrs);
|
|
principalToInherit = NullPrincipal::Create(attrs);
|
|
}
|
|
} else {
|
|
principalToInherit = loadInfo->PrincipalToInherit();
|
|
}
|
|
}
|
|
|
|
if (!partitionedPrincipalToInherit) {
|
|
// XXXehsan is it correct to fall back to the principal to inherit in all
|
|
// cases? For example, what about the cases where we are using the load
|
|
// info's principal to inherit? Do we need to add a similar concept to
|
|
// load info for partitioned principal?
|
|
partitionedPrincipalToInherit = principalToInherit;
|
|
}
|
|
}
|
|
|
|
nsAutoString srcdoc;
|
|
bool srcdocEntry = false;
|
|
nsCOMPtr<nsIURI> baseURI;
|
|
|
|
nsCOMPtr<nsIInputStreamChannel> inStrmChan = do_QueryInterface(aChannel);
|
|
if (inStrmChan) {
|
|
bool isSrcdocChannel;
|
|
inStrmChan->GetIsSrcdocChannel(&isSrcdocChannel);
|
|
if (isSrcdocChannel) {
|
|
inStrmChan->GetSrcdocData(srcdoc);
|
|
srcdocEntry = true;
|
|
inStrmChan->GetBaseURI(getter_AddRefs(baseURI));
|
|
} else {
|
|
srcdoc.SetIsVoid(true);
|
|
}
|
|
}
|
|
/* If cache got a 'no-store', ask SH not to store
|
|
* HistoryLayoutState. By default, SH will set this
|
|
* flag to true and save HistoryLayoutState.
|
|
*/
|
|
bool saveLayoutState = !discardLayoutState;
|
|
|
|
if (cacheChannel) {
|
|
// Check if the page has expired from cache
|
|
uint32_t expTime = 0;
|
|
cacheChannel->GetCacheTokenExpirationTime(&expTime);
|
|
uint32_t now = PRTimeToSeconds(PR_Now());
|
|
if (expTime <= now) {
|
|
expired = true;
|
|
}
|
|
}
|
|
|
|
// Title is set in nsDocShell::SetTitle()
|
|
entry->Create(aURI, // uri
|
|
u""_ns, // Title
|
|
inputStream, // Post data stream
|
|
cacheKey, // CacheKey
|
|
mContentTypeHint, // Content-type
|
|
triggeringPrincipal, // Channel or provided principal
|
|
principalToInherit, partitionedPrincipalToInherit, csp,
|
|
HistoryID(), GetCreatedDynamically(), originalURI,
|
|
resultPrincipalURI, loadReplace, referrerInfo, srcdoc,
|
|
srcdocEntry, baseURI, saveLayoutState, expired);
|
|
|
|
if (mBrowsingContext->IsTop() && GetSessionHistory()) {
|
|
bool shouldPersist = ShouldAddToSessionHistory(aURI, aChannel);
|
|
Maybe<int32_t> previousEntryIndex;
|
|
Maybe<int32_t> loadedEntryIndex;
|
|
rv = GetSessionHistory()->LegacySHistory()->AddToRootSessionHistory(
|
|
aCloneChildren, mOSHE, mBrowsingContext, entry, mLoadType,
|
|
shouldPersist, &previousEntryIndex, &loadedEntryIndex);
|
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv), "Could not add entry to root session history");
|
|
if (previousEntryIndex.isSome()) {
|
|
mPreviousEntryIndex = previousEntryIndex.value();
|
|
}
|
|
if (loadedEntryIndex.isSome()) {
|
|
mLoadedEntryIndex = loadedEntryIndex.value();
|
|
}
|
|
|
|
// aCloneChildren implies that we are retaining the same document, thus we
|
|
// need to signal to the top WC that the new SHEntry may receive a fresh
|
|
// user interaction flag.
|
|
if (aCloneChildren) {
|
|
WindowContext* topWc = mBrowsingContext->GetTopWindowContext();
|
|
if (topWc && !topWc->IsDiscarded()) {
|
|
MOZ_ALWAYS_SUCCEEDS(topWc->SetSHEntryHasUserInteraction(false));
|
|
}
|
|
}
|
|
} else {
|
|
// This is a subframe, make sure that this new SHEntry will be
|
|
// marked with user interaction.
|
|
WindowContext* topWc = mBrowsingContext->GetTopWindowContext();
|
|
if (topWc && !topWc->IsDiscarded()) {
|
|
MOZ_ALWAYS_SUCCEEDS(topWc->SetSHEntryHasUserInteraction(false));
|
|
}
|
|
if (!mOSHE || !LOAD_TYPE_HAS_FLAGS(mLoadType, LOAD_FLAGS_REPLACE_HISTORY)) {
|
|
rv = AddChildSHEntryToParent(entry, mChildOffset, aCloneChildren);
|
|
}
|
|
}
|
|
|
|
// Return the new SH entry...
|
|
if (aNewEntry) {
|
|
*aNewEntry = nullptr;
|
|
if (NS_SUCCEEDED(rv)) {
|
|
entry.forget(aNewEntry);
|
|
}
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
void nsDocShell::UpdateActiveEntry(
|
|
bool aReplace, const Maybe<nsPoint>& aPreviousScrollPos, nsIURI* aURI,
|
|
nsIURI* aOriginalURI, nsIPrincipal* aTriggeringPrincipal,
|
|
nsIContentSecurityPolicy* aCsp, const nsAString& aTitle,
|
|
bool aScrollRestorationIsManual, nsIStructuredCloneContainer* aData,
|
|
bool aURIWasModified) {
|
|
MOZ_ASSERT(mozilla::SessionHistoryInParent());
|
|
MOZ_ASSERT(aURI, "uri is null");
|
|
MOZ_ASSERT(mLoadType == LOAD_PUSHSTATE,
|
|
"This code only deals with pushState");
|
|
MOZ_ASSERT_IF(aPreviousScrollPos.isSome(), !aReplace);
|
|
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("Creating an active entry on nsDocShell %p to %s", this,
|
|
aURI->GetSpecOrDefault().get()));
|
|
|
|
// Even if we're replacing an existing entry we create new a
|
|
// SessionHistoryInfo. In the parent process we'll keep the existing
|
|
// SessionHistoryEntry, but just replace its SessionHistoryInfo, that way the
|
|
// entry keeps identity but its data is replaced.
|
|
bool replace = aReplace && mActiveEntry;
|
|
if (mActiveEntry) {
|
|
// Link this entry to the previous active entry.
|
|
mActiveEntry = MakeUnique<SessionHistoryInfo>(*mActiveEntry, aURI);
|
|
} else {
|
|
mActiveEntry = MakeUnique<SessionHistoryInfo>(
|
|
aURI, aTriggeringPrincipal, nullptr, nullptr, aCsp, mContentTypeHint);
|
|
}
|
|
mActiveEntry->SetOriginalURI(aOriginalURI);
|
|
mActiveEntry->SetTitle(aTitle);
|
|
mActiveEntry->SetStateData(static_cast<nsStructuredCloneContainer*>(aData));
|
|
mActiveEntry->SetURIWasModified(aURIWasModified);
|
|
mActiveEntry->SetScrollRestorationIsManual(aScrollRestorationIsManual);
|
|
|
|
if (replace) {
|
|
mBrowsingContext->ReplaceActiveSessionHistoryEntry(mActiveEntry.get());
|
|
} else {
|
|
mBrowsingContext->IncrementHistoryEntryCountForBrowsingContext();
|
|
// FIXME We should probably just compute mChildOffset in the parent
|
|
// instead of passing it over IPC here.
|
|
mBrowsingContext->SetActiveSessionHistoryEntry(
|
|
aPreviousScrollPos, mActiveEntry.get(), mLoadType,
|
|
/* aCacheKey = */ 0);
|
|
// FIXME Do we need to update mPreviousEntryIndex and mLoadedEntryIndex?
|
|
}
|
|
}
|
|
|
|
nsresult nsDocShell::LoadHistoryEntry(nsISHEntry* aEntry, uint32_t aLoadType) {
|
|
NS_ENSURE_TRUE(aEntry, NS_ERROR_FAILURE);
|
|
|
|
nsresult rv;
|
|
RefPtr<nsDocShellLoadState> loadState;
|
|
rv = aEntry->CreateLoadInfo(getter_AddRefs(loadState));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Calling CreateAboutBlankContentViewer can set mOSHE to null, and if
|
|
// that's the only thing holding a ref to aEntry that will cause aEntry to
|
|
// die while we're loading it. So hold a strong ref to aEntry here, just
|
|
// in case.
|
|
nsCOMPtr<nsISHEntry> kungFuDeathGrip(aEntry);
|
|
|
|
return LoadHistoryEntry(loadState, aLoadType, aEntry == mOSHE);
|
|
}
|
|
|
|
nsresult nsDocShell::LoadHistoryEntry(const LoadingSessionHistoryInfo& aEntry,
|
|
uint32_t aLoadType) {
|
|
RefPtr<nsDocShellLoadState> loadState = aEntry.CreateLoadInfo();
|
|
return LoadHistoryEntry(loadState, aLoadType,
|
|
aEntry.mLoadingCurrentActiveEntry);
|
|
}
|
|
|
|
nsresult nsDocShell::LoadHistoryEntry(nsDocShellLoadState* aLoadState,
|
|
uint32_t aLoadType,
|
|
bool aReloadingActiveEntry) {
|
|
if (!IsNavigationAllowed()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// We are setting load type afterwards so we don't have to
|
|
// send it in an IPC message
|
|
aLoadState->SetLoadType(aLoadType);
|
|
|
|
nsresult rv;
|
|
if (SchemeIsJavascript(aLoadState->URI())) {
|
|
// We're loading a URL that will execute script from inside asyncOpen.
|
|
// Replace the current document with about:blank now to prevent
|
|
// anything from the current document from leaking into any JavaScript
|
|
// code in the URL.
|
|
// Don't cache the presentation if we're going to just reload the
|
|
// current entry. Caching would lead to trying to save the different
|
|
// content viewers in the same nsISHEntry object.
|
|
rv = CreateAboutBlankContentViewer(
|
|
aLoadState->PrincipalToInherit(),
|
|
aLoadState->PartitionedPrincipalToInherit(), nullptr, nullptr,
|
|
Nothing(), !aReloadingActiveEntry);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
// The creation of the intermittent about:blank content
|
|
// viewer failed for some reason (potentially because the
|
|
// user prevented it). Interrupt the history load.
|
|
return NS_OK;
|
|
}
|
|
|
|
if (!aLoadState->TriggeringPrincipal()) {
|
|
// Ensure that we have a triggeringPrincipal. Otherwise javascript:
|
|
// URIs will pick it up from the about:blank page we just loaded,
|
|
// and we don't really want even that in this case.
|
|
nsCOMPtr<nsIPrincipal> principal =
|
|
NullPrincipal::CreateWithInheritedAttributes(this);
|
|
aLoadState->SetTriggeringPrincipal(principal);
|
|
}
|
|
}
|
|
|
|
/* If there is a valid postdata *and* the user pressed
|
|
* reload or shift-reload, take user's permission before we
|
|
* repost the data to the server.
|
|
*/
|
|
if ((aLoadType & LOAD_CMD_RELOAD) && aLoadState->PostDataStream()) {
|
|
bool repost;
|
|
rv = ConfirmRepost(&repost);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
// If the user pressed cancel in the dialog, return. We're done here.
|
|
if (!repost) {
|
|
return NS_BINDING_ABORTED;
|
|
}
|
|
}
|
|
|
|
// If there is no valid triggeringPrincipal, we deny the load
|
|
MOZ_ASSERT(aLoadState->TriggeringPrincipal(),
|
|
"need a valid triggeringPrincipal to load from history");
|
|
if (!aLoadState->TriggeringPrincipal()) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
return InternalLoad(aLoadState); // No nsIRequest
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::PersistLayoutHistoryState() {
|
|
nsresult rv = NS_OK;
|
|
|
|
if (mozilla::SessionHistoryInParent() ? !!mActiveEntry : !!mOSHE) {
|
|
bool scrollRestorationIsManual;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
scrollRestorationIsManual = mActiveEntry->GetScrollRestorationIsManual();
|
|
} else {
|
|
scrollRestorationIsManual = mOSHE->GetScrollRestorationIsManual();
|
|
}
|
|
nsCOMPtr<nsILayoutHistoryState> layoutState;
|
|
if (RefPtr<PresShell> presShell = GetPresShell()) {
|
|
rv = presShell->CaptureHistoryState(getter_AddRefs(layoutState));
|
|
} else if (scrollRestorationIsManual) {
|
|
// Even if we don't have layout anymore, we may want to reset the
|
|
// current scroll state in layout history.
|
|
GetLayoutHistoryState(getter_AddRefs(layoutState));
|
|
}
|
|
|
|
if (scrollRestorationIsManual && layoutState) {
|
|
layoutState->ResetScrollState();
|
|
}
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
void nsDocShell::SwapHistoryEntries(nsISHEntry* aOldEntry,
|
|
nsISHEntry* aNewEntry) {
|
|
if (aOldEntry == mOSHE) {
|
|
mOSHE = aNewEntry;
|
|
}
|
|
|
|
if (aOldEntry == mLSHE) {
|
|
mLSHE = aNewEntry;
|
|
}
|
|
}
|
|
|
|
void nsDocShell::SetHistoryEntryAndUpdateBC(const Maybe<nsISHEntry*>& aLSHE,
|
|
const Maybe<nsISHEntry*>& aOSHE) {
|
|
// We want to hold on to the reference in mLSHE before we update it.
|
|
// Otherwise, SetHistoryEntry could release the last reference to
|
|
// the entry while aOSHE is pointing to it.
|
|
nsCOMPtr<nsISHEntry> deathGripOldLSHE;
|
|
if (aLSHE.isSome()) {
|
|
deathGripOldLSHE = SetHistoryEntry(&mLSHE, aLSHE.value());
|
|
MOZ_ASSERT(mLSHE.get() == aLSHE.value());
|
|
}
|
|
nsCOMPtr<nsISHEntry> deathGripOldOSHE;
|
|
if (aOSHE.isSome()) {
|
|
deathGripOldOSHE = SetHistoryEntry(&mOSHE, aOSHE.value());
|
|
MOZ_ASSERT(mOSHE.get() == aOSHE.value());
|
|
}
|
|
}
|
|
|
|
already_AddRefed<nsISHEntry> nsDocShell::SetHistoryEntry(
|
|
nsCOMPtr<nsISHEntry>* aPtr, nsISHEntry* aEntry) {
|
|
// We need to sync up the docshell and session history trees for
|
|
// subframe navigation. If the load was in a subframe, we forward up to
|
|
// the root docshell, which will then recursively sync up all docshells
|
|
// to their corresponding entries in the new session history tree.
|
|
// If we don't do this, then we can cache a content viewer on the wrong
|
|
// cloned entry, and subsequently restore it at the wrong time.
|
|
RefPtr<BrowsingContext> topBC = mBrowsingContext->Top();
|
|
if (topBC->IsDiscarded()) {
|
|
topBC = nullptr;
|
|
}
|
|
RefPtr<BrowsingContext> currBC =
|
|
mBrowsingContext->IsDiscarded() ? nullptr : mBrowsingContext;
|
|
if (topBC && *aPtr) {
|
|
(*aPtr)->SyncTreesForSubframeNavigation(aEntry, topBC, currBC);
|
|
}
|
|
nsCOMPtr<nsISHEntry> entry(aEntry);
|
|
entry.swap(*aPtr);
|
|
return entry.forget();
|
|
}
|
|
|
|
already_AddRefed<ChildSHistory> nsDocShell::GetRootSessionHistory() {
|
|
RefPtr<ChildSHistory> childSHistory =
|
|
mBrowsingContext->Top()->GetChildSessionHistory();
|
|
return childSHistory.forget();
|
|
}
|
|
|
|
nsresult nsDocShell::GetHttpChannel(nsIChannel* aChannel,
|
|
nsIHttpChannel** aReturn) {
|
|
NS_ENSURE_ARG_POINTER(aReturn);
|
|
if (!aChannel) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsCOMPtr<nsIMultiPartChannel> multiPartChannel(do_QueryInterface(aChannel));
|
|
if (multiPartChannel) {
|
|
nsCOMPtr<nsIChannel> baseChannel;
|
|
multiPartChannel->GetBaseChannel(getter_AddRefs(baseChannel));
|
|
nsCOMPtr<nsIHttpChannel> httpChannel(do_QueryInterface(baseChannel));
|
|
*aReturn = httpChannel;
|
|
NS_IF_ADDREF(*aReturn);
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
bool nsDocShell::ShouldDiscardLayoutState(nsIHttpChannel* aChannel) {
|
|
// By default layout State will be saved.
|
|
if (!aChannel) {
|
|
return false;
|
|
}
|
|
|
|
// figure out if SH should be saving layout state
|
|
bool noStore = false;
|
|
Unused << aChannel->IsNoStoreResponse(&noStore);
|
|
return noStore;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetEditor(nsIEditor** aEditor) {
|
|
NS_ENSURE_ARG_POINTER(aEditor);
|
|
RefPtr<HTMLEditor> htmlEditor = GetHTMLEditorInternal();
|
|
htmlEditor.forget(aEditor);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetEditor(nsIEditor* aEditor) {
|
|
HTMLEditor* htmlEditor = aEditor ? aEditor->AsHTMLEditor() : nullptr;
|
|
// If TextEditor comes, throw an error.
|
|
if (aEditor && !htmlEditor) {
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
return SetHTMLEditorInternal(htmlEditor);
|
|
}
|
|
|
|
HTMLEditor* nsDocShell::GetHTMLEditorInternal() {
|
|
return mEditorData ? mEditorData->GetHTMLEditor() : nullptr;
|
|
}
|
|
|
|
nsresult nsDocShell::SetHTMLEditorInternal(HTMLEditor* aHTMLEditor) {
|
|
if (!aHTMLEditor && !mEditorData) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv = EnsureEditorData();
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
return mEditorData->SetHTMLEditor(aHTMLEditor);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetEditable(bool* aEditable) {
|
|
NS_ENSURE_ARG_POINTER(aEditable);
|
|
*aEditable = mEditorData && mEditorData->GetEditable();
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetHasEditingSession(bool* aHasEditingSession) {
|
|
NS_ENSURE_ARG_POINTER(aHasEditingSession);
|
|
|
|
if (mEditorData) {
|
|
*aHasEditingSession = !!mEditorData->GetEditingSession();
|
|
} else {
|
|
*aHasEditingSession = false;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::MakeEditable(bool aInWaitForUriLoad) {
|
|
nsresult rv = EnsureEditorData();
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
return mEditorData->MakeEditable(aInWaitForUriLoad);
|
|
}
|
|
|
|
/* static */ bool nsDocShell::ShouldAddURIVisit(nsIChannel* aChannel) {
|
|
bool needToAddURIVisit = true;
|
|
nsCOMPtr<nsIPropertyBag2> props(do_QueryInterface(aChannel));
|
|
if (props) {
|
|
mozilla::Unused << props->GetPropertyAsBool(
|
|
u"docshell.needToAddURIVisit"_ns, &needToAddURIVisit);
|
|
}
|
|
|
|
return needToAddURIVisit;
|
|
}
|
|
|
|
/* static */ void nsDocShell::ExtractLastVisit(
|
|
nsIChannel* aChannel, nsIURI** aURI, uint32_t* aChannelRedirectFlags) {
|
|
nsCOMPtr<nsIPropertyBag2> props(do_QueryInterface(aChannel));
|
|
if (!props) {
|
|
return;
|
|
}
|
|
|
|
nsresult rv = props->GetPropertyAsInterface(u"docshell.previousURI"_ns,
|
|
NS_GET_IID(nsIURI),
|
|
reinterpret_cast<void**>(aURI));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
// There is no last visit for this channel, so this must be the first
|
|
// link. Link the visit to the referrer of this request, if any.
|
|
// Treat referrer as null if there is an error getting it.
|
|
(void)NS_GetReferrerFromChannel(aChannel, aURI);
|
|
} else {
|
|
rv = props->GetPropertyAsUint32(u"docshell.previousFlags"_ns,
|
|
aChannelRedirectFlags);
|
|
|
|
NS_WARNING_ASSERTION(
|
|
NS_SUCCEEDED(rv),
|
|
"Could not fetch previous flags, URI will be treated like referrer");
|
|
}
|
|
}
|
|
|
|
void nsDocShell::SaveLastVisit(nsIChannel* aChannel, nsIURI* aURI,
|
|
uint32_t aChannelRedirectFlags) {
|
|
nsCOMPtr<nsIWritablePropertyBag2> props(do_QueryInterface(aChannel));
|
|
if (!props || !aURI) {
|
|
return;
|
|
}
|
|
|
|
props->SetPropertyAsInterface(u"docshell.previousURI"_ns, aURI);
|
|
props->SetPropertyAsUint32(u"docshell.previousFlags"_ns,
|
|
aChannelRedirectFlags);
|
|
}
|
|
|
|
/* static */ void nsDocShell::InternalAddURIVisit(
|
|
nsIURI* aURI, nsIURI* aPreviousURI, uint32_t aChannelRedirectFlags,
|
|
uint32_t aResponseStatus, BrowsingContext* aBrowsingContext,
|
|
nsIWidget* aWidget, uint32_t aLoadType) {
|
|
MOZ_ASSERT(aURI, "Visited URI is null!");
|
|
MOZ_ASSERT(aLoadType != LOAD_ERROR_PAGE && aLoadType != LOAD_BYPASS_HISTORY,
|
|
"Do not add error or bypass pages to global history");
|
|
|
|
bool usePrivateBrowsing = false;
|
|
aBrowsingContext->GetUsePrivateBrowsing(&usePrivateBrowsing);
|
|
|
|
// Only content-type docshells save URI visits. Also don't do
|
|
// anything here if we're not supposed to use global history.
|
|
if (!aBrowsingContext->IsContent() ||
|
|
!aBrowsingContext->GetUseGlobalHistory() || usePrivateBrowsing) {
|
|
return;
|
|
}
|
|
|
|
nsCOMPtr<IHistory> history = components::History::Service();
|
|
|
|
if (history) {
|
|
uint32_t visitURIFlags = 0;
|
|
|
|
if (aBrowsingContext->IsTop()) {
|
|
visitURIFlags |= IHistory::TOP_LEVEL;
|
|
}
|
|
|
|
if (aChannelRedirectFlags & nsIChannelEventSink::REDIRECT_TEMPORARY) {
|
|
visitURIFlags |= IHistory::REDIRECT_TEMPORARY;
|
|
} else if (aChannelRedirectFlags &
|
|
nsIChannelEventSink::REDIRECT_PERMANENT) {
|
|
visitURIFlags |= IHistory::REDIRECT_PERMANENT;
|
|
} else {
|
|
MOZ_ASSERT(!aChannelRedirectFlags,
|
|
"One of REDIRECT_TEMPORARY or REDIRECT_PERMANENT must be set "
|
|
"if any flags in aChannelRedirectFlags is set.");
|
|
}
|
|
|
|
if (aResponseStatus >= 300 && aResponseStatus < 400) {
|
|
visitURIFlags |= IHistory::REDIRECT_SOURCE;
|
|
if (aResponseStatus == 301 || aResponseStatus == 308) {
|
|
visitURIFlags |= IHistory::REDIRECT_SOURCE_PERMANENT;
|
|
}
|
|
}
|
|
// Errors 400-501 and 505 are considered unrecoverable, in the sense a
|
|
// simple retry attempt by the user is unlikely to solve them.
|
|
// 408 is special cased, since may actually indicate a temporary
|
|
// connection problem.
|
|
else if (aResponseStatus != 408 &&
|
|
((aResponseStatus >= 400 && aResponseStatus <= 501) ||
|
|
aResponseStatus == 505)) {
|
|
visitURIFlags |= IHistory::UNRECOVERABLE_ERROR;
|
|
}
|
|
|
|
mozilla::Unused << history->VisitURI(aWidget, aURI, aPreviousURI,
|
|
visitURIFlags);
|
|
}
|
|
}
|
|
|
|
void nsDocShell::AddURIVisit(nsIURI* aURI, nsIURI* aPreviousURI,
|
|
uint32_t aChannelRedirectFlags,
|
|
uint32_t aResponseStatus) {
|
|
nsPIDOMWindowOuter* outer = GetWindow();
|
|
nsCOMPtr<nsIWidget> widget = widget::WidgetUtils::DOMWindowToWidget(outer);
|
|
|
|
InternalAddURIVisit(aURI, aPreviousURI, aChannelRedirectFlags,
|
|
aResponseStatus, mBrowsingContext, widget, mLoadType);
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell: Helper Routines
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetLoadType(uint32_t aLoadType) {
|
|
mLoadType = aLoadType;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetLoadType(uint32_t* aLoadType) {
|
|
*aLoadType = mLoadType;
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult nsDocShell::ConfirmRepost(bool* aRepost) {
|
|
if (StaticPrefs::dom_confirm_repost_testing_always_accept()) {
|
|
*aRepost = true;
|
|
return NS_OK;
|
|
}
|
|
|
|
nsCOMPtr<nsIPromptCollection> prompter =
|
|
do_GetService("@mozilla.org/embedcomp/prompt-collection;1");
|
|
if (!prompter) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
return prompter->ConfirmRepost(mBrowsingContext, aRepost);
|
|
}
|
|
|
|
nsresult nsDocShell::GetPromptAndStringBundle(nsIPrompt** aPrompt,
|
|
nsIStringBundle** aStringBundle) {
|
|
NS_ENSURE_SUCCESS(GetInterface(NS_GET_IID(nsIPrompt), (void**)aPrompt),
|
|
NS_ERROR_FAILURE);
|
|
|
|
nsCOMPtr<nsIStringBundleService> stringBundleService =
|
|
mozilla::components::StringBundle::Service();
|
|
NS_ENSURE_TRUE(stringBundleService, NS_ERROR_FAILURE);
|
|
|
|
NS_ENSURE_SUCCESS(
|
|
stringBundleService->CreateBundle(kAppstringsBundleURL, aStringBundle),
|
|
NS_ERROR_FAILURE);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsIScrollableFrame* nsDocShell::GetRootScrollFrame() {
|
|
PresShell* presShell = GetPresShell();
|
|
NS_ENSURE_TRUE(presShell, nullptr);
|
|
|
|
return presShell->GetRootScrollFrameAsScrollable();
|
|
}
|
|
|
|
nsresult nsDocShell::EnsureScriptEnvironment() {
|
|
if (mScriptGlobal) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (mIsBeingDestroyed) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
NS_ASSERTION(!mInEnsureScriptEnv,
|
|
"Infinite loop! Calling EnsureScriptEnvironment() from "
|
|
"within EnsureScriptEnvironment()!");
|
|
|
|
// Yeah, this isn't re-entrant safe, but that's ok since if we
|
|
// re-enter this method, we'll infinitely loop...
|
|
AutoRestore<bool> boolSetter(mInEnsureScriptEnv);
|
|
mInEnsureScriptEnv = true;
|
|
#endif
|
|
|
|
nsCOMPtr<nsIWebBrowserChrome> browserChrome(do_GetInterface(mTreeOwner));
|
|
NS_ENSURE_TRUE(browserChrome, NS_ERROR_NOT_AVAILABLE);
|
|
|
|
uint32_t chromeFlags;
|
|
browserChrome->GetChromeFlags(&chromeFlags);
|
|
|
|
// If our window is modal and we're not opened as chrome, make
|
|
// this window a modal content window.
|
|
mScriptGlobal = nsGlobalWindowOuter::Create(this, mItemType == typeChrome);
|
|
MOZ_ASSERT(mScriptGlobal);
|
|
|
|
// Ensure the script object is set up to run script.
|
|
return mScriptGlobal->EnsureScriptEnvironment();
|
|
}
|
|
|
|
nsresult nsDocShell::EnsureEditorData() {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
|
|
bool openDocHasDetachedEditor = mOSHE && mOSHE->HasDetachedEditor();
|
|
if (!mEditorData && !mIsBeingDestroyed && !openDocHasDetachedEditor) {
|
|
// We shouldn't recreate the editor data if it already exists, or
|
|
// we're shutting down, or we already have a detached editor data
|
|
// stored in the session history. We should only have one editordata
|
|
// per docshell.
|
|
mEditorData = MakeUnique<nsDocShellEditorData>(this);
|
|
}
|
|
|
|
return mEditorData ? NS_OK : NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
nsresult nsDocShell::EnsureFind() {
|
|
if (!mFind) {
|
|
mFind = new nsWebBrowserFind();
|
|
}
|
|
|
|
// we promise that the nsIWebBrowserFind that we return has been set
|
|
// up to point to the focused, or content window, so we have to
|
|
// set that up each time.
|
|
|
|
nsIScriptGlobalObject* scriptGO = GetScriptGlobalObject();
|
|
NS_ENSURE_TRUE(scriptGO, NS_ERROR_UNEXPECTED);
|
|
|
|
// default to our window
|
|
nsCOMPtr<nsPIDOMWindowOuter> ourWindow = do_QueryInterface(scriptGO);
|
|
nsCOMPtr<nsPIDOMWindowOuter> windowToSearch;
|
|
nsFocusManager::GetFocusedDescendant(ourWindow,
|
|
nsFocusManager::eIncludeAllDescendants,
|
|
getter_AddRefs(windowToSearch));
|
|
|
|
nsCOMPtr<nsIWebBrowserFindInFrames> findInFrames = do_QueryInterface(mFind);
|
|
if (!findInFrames) {
|
|
return NS_ERROR_NO_INTERFACE;
|
|
}
|
|
|
|
nsresult rv = findInFrames->SetRootSearchFrame(ourWindow);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
rv = findInFrames->SetCurrentSearchFrame(windowToSearch);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::IsBeingDestroyed(bool* aDoomed) {
|
|
NS_ENSURE_ARG(aDoomed);
|
|
*aDoomed = mIsBeingDestroyed;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetIsExecutingOnLoadHandler(bool* aResult) {
|
|
NS_ENSURE_ARG(aResult);
|
|
*aResult = mIsExecutingOnLoadHandler;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetLayoutHistoryState(nsILayoutHistoryState** aLayoutHistoryState) {
|
|
nsCOMPtr<nsILayoutHistoryState> state;
|
|
if (mozilla::SessionHistoryInParent()) {
|
|
if (mActiveEntry) {
|
|
state = mActiveEntry->GetLayoutHistoryState();
|
|
}
|
|
} else {
|
|
if (mOSHE) {
|
|
state = mOSHE->GetLayoutHistoryState();
|
|
}
|
|
}
|
|
state.forget(aLayoutHistoryState);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetLayoutHistoryState(nsILayoutHistoryState* aLayoutHistoryState) {
|
|
if (mOSHE) {
|
|
mOSHE->SetLayoutHistoryState(aLayoutHistoryState);
|
|
}
|
|
if (mActiveEntry) {
|
|
mActiveEntry->SetLayoutHistoryState(aLayoutHistoryState);
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
nsDocShell::InterfaceRequestorProxy::InterfaceRequestorProxy(
|
|
nsIInterfaceRequestor* aRequestor) {
|
|
if (aRequestor) {
|
|
mWeakPtr = do_GetWeakReference(aRequestor);
|
|
}
|
|
}
|
|
|
|
nsDocShell::InterfaceRequestorProxy::~InterfaceRequestorProxy() {
|
|
mWeakPtr = nullptr;
|
|
}
|
|
|
|
NS_IMPL_ISUPPORTS(nsDocShell::InterfaceRequestorProxy, nsIInterfaceRequestor)
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::InterfaceRequestorProxy::GetInterface(const nsIID& aIID,
|
|
void** aSink) {
|
|
NS_ENSURE_ARG_POINTER(aSink);
|
|
nsCOMPtr<nsIInterfaceRequestor> ifReq = do_QueryReferent(mWeakPtr);
|
|
if (ifReq) {
|
|
return ifReq->GetInterface(aIID, aSink);
|
|
}
|
|
*aSink = nullptr;
|
|
return NS_NOINTERFACE;
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsIAuthPromptProvider
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAuthPrompt(uint32_t aPromptReason, const nsIID& aIID,
|
|
void** aResult) {
|
|
// a priority prompt request will override a false mAllowAuth setting
|
|
bool priorityPrompt = (aPromptReason == PROMPT_PROXY);
|
|
|
|
if (!mAllowAuth && !priorityPrompt) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
// we're either allowing auth, or it's a proxy request
|
|
nsresult rv;
|
|
nsCOMPtr<nsIPromptFactory> wwatch =
|
|
do_GetService(NS_WINDOWWATCHER_CONTRACTID, &rv);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = EnsureScriptEnvironment();
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// Get the an auth prompter for our window so that the parenting
|
|
// of the dialogs works as it should when using tabs.
|
|
|
|
return wwatch->GetPrompt(mScriptGlobal, aIID,
|
|
reinterpret_cast<void**>(aResult));
|
|
}
|
|
|
|
//*****************************************************************************
|
|
// nsDocShell::nsILoadContext
|
|
//*****************************************************************************
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAssociatedWindow(mozIDOMWindowProxy** aWindow) {
|
|
CallGetInterface(this, aWindow);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetTopWindow(mozIDOMWindowProxy** aWindow) {
|
|
return mBrowsingContext->GetTopWindow(aWindow);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetTopFrameElement(Element** aElement) {
|
|
return mBrowsingContext->GetTopFrameElement(aElement);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetUseTrackingProtection(bool* aUseTrackingProtection) {
|
|
return mBrowsingContext->GetUseTrackingProtection(aUseTrackingProtection);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetUseTrackingProtection(bool aUseTrackingProtection) {
|
|
return mBrowsingContext->SetUseTrackingProtection(aUseTrackingProtection);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetIsContent(bool* aIsContent) {
|
|
*aIsContent = (mItemType == typeContent);
|
|
return NS_OK;
|
|
}
|
|
|
|
bool nsDocShell::IsOKToLoadURI(nsIURI* aURI) {
|
|
MOZ_ASSERT(aURI, "Must have a URI!");
|
|
|
|
if (!mFiredUnloadEvent) {
|
|
return true;
|
|
}
|
|
|
|
if (!mLoadingURI) {
|
|
return false;
|
|
}
|
|
|
|
bool isPrivateWin = false;
|
|
Document* doc = GetDocument();
|
|
if (doc) {
|
|
isPrivateWin =
|
|
doc->NodePrincipal()->OriginAttributesRef().mPrivateBrowsingId > 0;
|
|
}
|
|
|
|
nsCOMPtr<nsIScriptSecurityManager> secMan =
|
|
do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID);
|
|
return secMan && NS_SUCCEEDED(secMan->CheckSameOriginURI(
|
|
aURI, mLoadingURI, false, isPrivateWin));
|
|
}
|
|
|
|
//
|
|
// Routines for selection and clipboard
|
|
//
|
|
nsresult nsDocShell::GetControllerForCommand(const char* aCommand,
|
|
nsIController** aResult) {
|
|
NS_ENSURE_ARG_POINTER(aResult);
|
|
*aResult = nullptr;
|
|
|
|
NS_ENSURE_TRUE(mScriptGlobal, NS_ERROR_FAILURE);
|
|
|
|
nsCOMPtr<nsPIWindowRoot> root = mScriptGlobal->GetTopWindowRoot();
|
|
NS_ENSURE_TRUE(root, NS_ERROR_FAILURE);
|
|
|
|
return root->GetControllerForCommand(aCommand, false /* for any window */,
|
|
aResult);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::IsCommandEnabled(const char* aCommand, bool* aResult) {
|
|
NS_ENSURE_ARG_POINTER(aResult);
|
|
*aResult = false;
|
|
|
|
nsresult rv = NS_ERROR_FAILURE;
|
|
|
|
nsCOMPtr<nsIController> controller;
|
|
rv = GetControllerForCommand(aCommand, getter_AddRefs(controller));
|
|
if (controller) {
|
|
rv = controller->IsCommandEnabled(aCommand, aResult);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::DoCommand(const char* aCommand) {
|
|
nsresult rv = NS_ERROR_FAILURE;
|
|
|
|
nsCOMPtr<nsIController> controller;
|
|
rv = GetControllerForCommand(aCommand, getter_AddRefs(controller));
|
|
if (controller) {
|
|
rv = controller->DoCommand(aCommand);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::DoCommandWithParams(const char* aCommand,
|
|
nsICommandParams* aParams) {
|
|
nsCOMPtr<nsIController> controller;
|
|
nsresult rv = GetControllerForCommand(aCommand, getter_AddRefs(controller));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
|
|
nsCOMPtr<nsICommandController> commandController =
|
|
do_QueryInterface(controller, &rv);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
|
|
return commandController->DoCommandWithParams(aCommand, aParams);
|
|
}
|
|
|
|
nsresult nsDocShell::EnsureCommandHandler() {
|
|
if (!mCommandManager) {
|
|
if (nsCOMPtr<nsPIDOMWindowOuter> domWindow = GetWindow()) {
|
|
mCommandManager = new nsCommandManager(domWindow);
|
|
}
|
|
}
|
|
return mCommandManager ? NS_OK : NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// link handling
|
|
|
|
class OnLinkClickEvent : public Runnable {
|
|
public:
|
|
OnLinkClickEvent(nsDocShell* aHandler, nsIContent* aContent,
|
|
nsDocShellLoadState* aLoadState, bool aNoOpenerImplied,
|
|
bool aIsTrusted, nsIPrincipal* aTriggeringPrincipal);
|
|
|
|
NS_IMETHOD Run() override {
|
|
AutoPopupStatePusher popupStatePusher(mPopupState);
|
|
|
|
// We need to set up an AutoJSAPI here for the following reason: When we
|
|
// do OnLinkClickSync we'll eventually end up in
|
|
// nsGlobalWindow::OpenInternal which only does popup blocking if
|
|
// !LegacyIsCallerChromeOrNativeCode(). So we need to fake things so that
|
|
// we don't look like native code as far as LegacyIsCallerNativeCode() is
|
|
// concerned.
|
|
AutoJSAPI jsapi;
|
|
if (mIsTrusted || jsapi.Init(mContent->OwnerDoc()->GetScopeObject())) {
|
|
mHandler->OnLinkClickSync(mContent, mLoadState, mNoOpenerImplied,
|
|
mTriggeringPrincipal);
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
private:
|
|
RefPtr<nsDocShell> mHandler;
|
|
nsCOMPtr<nsIContent> mContent;
|
|
RefPtr<nsDocShellLoadState> mLoadState;
|
|
nsCOMPtr<nsIPrincipal> mTriggeringPrincipal;
|
|
PopupBlocker::PopupControlState mPopupState;
|
|
bool mNoOpenerImplied;
|
|
bool mIsTrusted;
|
|
};
|
|
|
|
OnLinkClickEvent::OnLinkClickEvent(nsDocShell* aHandler, nsIContent* aContent,
|
|
nsDocShellLoadState* aLoadState,
|
|
bool aNoOpenerImplied, bool aIsTrusted,
|
|
nsIPrincipal* aTriggeringPrincipal)
|
|
: mozilla::Runnable("OnLinkClickEvent"),
|
|
mHandler(aHandler),
|
|
mContent(aContent),
|
|
mLoadState(aLoadState),
|
|
mTriggeringPrincipal(aTriggeringPrincipal),
|
|
mPopupState(PopupBlocker::GetPopupControlState()),
|
|
mNoOpenerImplied(aNoOpenerImplied),
|
|
mIsTrusted(aIsTrusted) {}
|
|
|
|
nsresult nsDocShell::OnLinkClick(
|
|
nsIContent* aContent, nsIURI* aURI, const nsAString& aTargetSpec,
|
|
const nsAString& aFileName, nsIInputStream* aPostDataStream,
|
|
nsIInputStream* aHeadersDataStream, bool aIsUserTriggered, bool aIsTrusted,
|
|
nsIPrincipal* aTriggeringPrincipal, nsIContentSecurityPolicy* aCsp) {
|
|
#ifndef ANDROID
|
|
MOZ_ASSERT(aTriggeringPrincipal, "Need a valid triggeringPrincipal");
|
|
#endif
|
|
NS_ASSERTION(NS_IsMainThread(), "wrong thread");
|
|
|
|
if (!IsNavigationAllowed() || !IsOKToLoadURI(aURI)) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// On history navigation through Back/Forward buttons, don't execute
|
|
// automatic JavaScript redirection such as |anchorElement.click()| or
|
|
// |formElement.submit()|.
|
|
//
|
|
// XXX |formElement.submit()| bypasses this checkpoint because it calls
|
|
// nsDocShell::OnLinkClickSync(...) instead.
|
|
if (ShouldBlockLoadingForBackButton()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (aContent->IsEditable()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv = NS_ERROR_FAILURE;
|
|
nsAutoString target;
|
|
|
|
nsCOMPtr<nsIWebBrowserChrome3> browserChrome3 = do_GetInterface(mTreeOwner);
|
|
bool noOpenerImplied = false;
|
|
if (browserChrome3) {
|
|
rv = browserChrome3->OnBeforeLinkTraversal(aTargetSpec, aURI, aContent,
|
|
mIsAppTab, target);
|
|
if (!aTargetSpec.Equals(target)) {
|
|
noOpenerImplied = true;
|
|
}
|
|
}
|
|
|
|
if (NS_FAILED(rv)) {
|
|
target = aTargetSpec;
|
|
}
|
|
|
|
RefPtr<nsDocShellLoadState> loadState = new nsDocShellLoadState(aURI);
|
|
loadState->SetTarget(target);
|
|
loadState->SetFileName(aFileName);
|
|
loadState->SetPostDataStream(aPostDataStream);
|
|
loadState->SetHeadersStream(aHeadersDataStream);
|
|
loadState->SetFirstParty(true);
|
|
loadState->SetTriggeringPrincipal(
|
|
aTriggeringPrincipal ? aTriggeringPrincipal : aContent->NodePrincipal());
|
|
loadState->SetPrincipalToInherit(aContent->NodePrincipal());
|
|
loadState->SetCsp(aCsp ? aCsp : aContent->GetCsp());
|
|
|
|
nsCOMPtr<nsIRunnable> ev =
|
|
new OnLinkClickEvent(this, aContent, loadState, noOpenerImplied,
|
|
aIsTrusted, aTriggeringPrincipal);
|
|
return Dispatch(TaskCategory::UI, ev.forget());
|
|
}
|
|
|
|
static bool IsElementAnchorOrArea(nsIContent* aContent) {
|
|
// Make sure we are dealing with either an <A> or <AREA> element in the HTML
|
|
// or XHTML namespace.
|
|
return aContent->IsAnyOfHTMLElements(nsGkAtoms::a, nsGkAtoms::area);
|
|
}
|
|
|
|
nsresult nsDocShell::OnLinkClickSync(nsIContent* aContent,
|
|
nsDocShellLoadState* aLoadState,
|
|
bool aNoOpenerImplied,
|
|
nsIPrincipal* aTriggeringPrincipal) {
|
|
if (!IsNavigationAllowed() || !IsOKToLoadURI(aLoadState->URI())) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// XXX When the linking node was HTMLFormElement, it is synchronous event.
|
|
// That is, the caller of this method is not |OnLinkClickEvent::Run()|
|
|
// but |HTMLFormElement::SubmitSubmission(...)|.
|
|
if (aContent->IsHTMLElement(nsGkAtoms::form) &&
|
|
ShouldBlockLoadingForBackButton()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
if (aContent->IsEditable()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// if the triggeringPrincipal is not passed explicitly, then we
|
|
// fall back to using doc->NodePrincipal() as the triggeringPrincipal.
|
|
nsCOMPtr<nsIPrincipal> triggeringPrincipal =
|
|
aTriggeringPrincipal ? aTriggeringPrincipal : aContent->NodePrincipal();
|
|
|
|
{
|
|
// defer to an external protocol handler if necessary...
|
|
nsCOMPtr<nsIExternalProtocolService> extProtService =
|
|
do_GetService(NS_EXTERNALPROTOCOLSERVICE_CONTRACTID);
|
|
if (extProtService) {
|
|
nsAutoCString scheme;
|
|
aLoadState->URI()->GetScheme(scheme);
|
|
if (!scheme.IsEmpty()) {
|
|
// if the URL scheme does not correspond to an exposed protocol, then
|
|
// we need to hand this link click over to the external protocol
|
|
// handler.
|
|
bool isExposed;
|
|
nsresult rv =
|
|
extProtService->IsExposedProtocol(scheme.get(), &isExposed);
|
|
if (NS_SUCCEEDED(rv) && !isExposed) {
|
|
return extProtService->LoadURI(aLoadState->URI(), triggeringPrincipal,
|
|
mBrowsingContext,
|
|
/* aTriggeredExternally */ false);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
uint32_t triggeringSandboxFlags = 0;
|
|
if (mBrowsingContext) {
|
|
triggeringSandboxFlags = mBrowsingContext->GetSandboxFlags();
|
|
}
|
|
|
|
uint32_t flags = INTERNAL_LOAD_FLAGS_NONE;
|
|
bool isElementAnchorOrArea = IsElementAnchorOrArea(aContent);
|
|
bool triggeringPrincipalIsSystemPrincipal =
|
|
aLoadState->TriggeringPrincipal()->IsSystemPrincipal();
|
|
if (isElementAnchorOrArea) {
|
|
MOZ_ASSERT(aContent->IsHTMLElement());
|
|
nsAutoString relString;
|
|
aContent->AsElement()->GetAttr(kNameSpaceID_None, nsGkAtoms::rel,
|
|
relString);
|
|
nsWhitespaceTokenizerTemplate<nsContentUtils::IsHTMLWhitespace> tok(
|
|
relString);
|
|
|
|
bool targetBlank = aLoadState->Target().LowerCaseEqualsLiteral("_blank");
|
|
bool explicitOpenerSet = false;
|
|
|
|
// The opener behaviour follows a hierarchy, such that if a higher
|
|
// priority behaviour is specified, it always takes priority. That
|
|
// priority is currently: norefrerer > noopener > opener > default
|
|
|
|
while (tok.hasMoreTokens()) {
|
|
const nsAString& token = tok.nextToken();
|
|
if (token.LowerCaseEqualsLiteral("noreferrer")) {
|
|
flags |= INTERNAL_LOAD_FLAGS_DONT_SEND_REFERRER |
|
|
INTERNAL_LOAD_FLAGS_NO_OPENER;
|
|
// noreferrer cannot be overwritten by a 'rel=opener'.
|
|
explicitOpenerSet = true;
|
|
break;
|
|
}
|
|
|
|
if (token.LowerCaseEqualsLiteral("noopener")) {
|
|
flags |= INTERNAL_LOAD_FLAGS_NO_OPENER;
|
|
explicitOpenerSet = true;
|
|
}
|
|
|
|
if (targetBlank && StaticPrefs::dom_targetBlankNoOpener_enabled() &&
|
|
token.LowerCaseEqualsLiteral("opener") && !explicitOpenerSet) {
|
|
explicitOpenerSet = true;
|
|
}
|
|
}
|
|
|
|
if (targetBlank && StaticPrefs::dom_targetBlankNoOpener_enabled() &&
|
|
!explicitOpenerSet && !triggeringPrincipalIsSystemPrincipal) {
|
|
flags |= INTERNAL_LOAD_FLAGS_NO_OPENER;
|
|
}
|
|
|
|
if (aNoOpenerImplied) {
|
|
flags |= INTERNAL_LOAD_FLAGS_NO_OPENER;
|
|
}
|
|
}
|
|
|
|
// Get the owner document of the link that was clicked, this will be
|
|
// the document that the link is in, or the last document that the
|
|
// link was in. From that document, we'll get the URI to use as the
|
|
// referrer, since the current URI in this docshell may be a
|
|
// new document that we're in the process of loading.
|
|
RefPtr<Document> referrerDoc = aContent->OwnerDoc();
|
|
|
|
// Now check that the referrerDoc's inner window is the current inner
|
|
// window for mScriptGlobal. If it's not, then we don't want to
|
|
// follow this link.
|
|
nsPIDOMWindowInner* referrerInner = referrerDoc->GetInnerWindow();
|
|
NS_ENSURE_TRUE(referrerInner, NS_ERROR_UNEXPECTED);
|
|
if (!mScriptGlobal ||
|
|
mScriptGlobal->GetCurrentInnerWindow() != referrerInner) {
|
|
// We're no longer the current inner window
|
|
return NS_OK;
|
|
}
|
|
|
|
// referrer could be null here in some odd cases, but that's ok,
|
|
// we'll just load the link w/o sending a referrer in those cases.
|
|
|
|
// If this is an anchor element, grab its type property to use as a hint
|
|
nsAutoString typeHint;
|
|
RefPtr<HTMLAnchorElement> anchor = HTMLAnchorElement::FromNode(aContent);
|
|
if (anchor) {
|
|
anchor->GetType(typeHint);
|
|
NS_ConvertUTF16toUTF8 utf8Hint(typeHint);
|
|
nsAutoCString type, dummy;
|
|
NS_ParseRequestContentType(utf8Hint, type, dummy);
|
|
CopyUTF8toUTF16(type, typeHint);
|
|
}
|
|
|
|
// Link click (or form submission) can be triggered inside an onload
|
|
// handler, and we don't want to add history entry in this case.
|
|
bool inOnLoadHandler = false;
|
|
GetIsExecutingOnLoadHandler(&inOnLoadHandler);
|
|
uint32_t loadType = inOnLoadHandler ? LOAD_NORMAL_REPLACE : LOAD_LINK;
|
|
|
|
nsCOMPtr<nsIReferrerInfo> referrerInfo =
|
|
isElementAnchorOrArea ? new ReferrerInfo(*aContent->AsElement())
|
|
: new ReferrerInfo(*referrerDoc);
|
|
RefPtr<WindowContext> context = mBrowsingContext->GetCurrentWindowContext();
|
|
|
|
aLoadState->SetTriggeringSandboxFlags(triggeringSandboxFlags);
|
|
aLoadState->SetReferrerInfo(referrerInfo);
|
|
aLoadState->SetInternalLoadFlags(flags);
|
|
aLoadState->SetTypeHint(NS_ConvertUTF16toUTF8(typeHint));
|
|
aLoadState->SetLoadType(loadType);
|
|
aLoadState->SetSourceBrowsingContext(mBrowsingContext);
|
|
aLoadState->SetAllowFocusMove(true);
|
|
aLoadState->SetHasValidUserGestureActivation(
|
|
context && context->HasValidTransientUserGestureActivation());
|
|
|
|
nsresult rv = InternalLoad(aLoadState);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
nsPingListener::DispatchPings(this, aContent, aLoadState->URI(),
|
|
referrerInfo);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
nsresult nsDocShell::OnOverLink(nsIContent* aContent, nsIURI* aURI,
|
|
const nsAString& aTargetSpec) {
|
|
if (aContent->IsEditable()) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv = NS_ERROR_FAILURE;
|
|
|
|
nsCOMPtr<nsIWebBrowserChrome> browserChrome = do_GetInterface(mTreeOwner);
|
|
if (!browserChrome) {
|
|
return rv;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> exposableURI = nsIOService::CreateExposableURI(aURI);
|
|
nsAutoCString spec;
|
|
rv = exposableURI->GetDisplaySpec(spec);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
NS_ConvertUTF8toUTF16 uStr(spec);
|
|
|
|
PredictorPredict(aURI, mCurrentURI, nsINetworkPredictor::PREDICT_LINK,
|
|
aContent->NodePrincipal()->OriginAttributesRef(), nullptr);
|
|
|
|
rv = browserChrome->SetLinkStatus(uStr);
|
|
return rv;
|
|
}
|
|
|
|
nsresult nsDocShell::OnLeaveLink() {
|
|
nsCOMPtr<nsIWebBrowserChrome> browserChrome(do_GetInterface(mTreeOwner));
|
|
nsresult rv = NS_ERROR_FAILURE;
|
|
|
|
if (browserChrome) {
|
|
rv = browserChrome->SetLinkStatus(u""_ns);
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
bool nsDocShell::ShouldBlockLoadingForBackButton() {
|
|
if (!(mLoadType & LOAD_CMD_HISTORY) ||
|
|
UserActivation::IsHandlingUserInput() ||
|
|
!Preferences::GetBool("accessibility.blockjsredirection")) {
|
|
return false;
|
|
}
|
|
|
|
bool canGoForward = false;
|
|
GetCanGoForward(&canGoForward);
|
|
return canGoForward;
|
|
}
|
|
|
|
bool nsDocShell::PluginsAllowedInCurrentDoc() {
|
|
if (!mContentViewer) {
|
|
return false;
|
|
}
|
|
|
|
Document* doc = mContentViewer->GetDocument();
|
|
if (!doc) {
|
|
return false;
|
|
}
|
|
|
|
return doc->GetAllowPlugins();
|
|
}
|
|
|
|
//----------------------------------------------------------------------
|
|
// Web Shell Services API
|
|
|
|
// This functions is only called when a new charset is detected in loading a
|
|
// document.
|
|
nsresult nsDocShell::CharsetChangeReloadDocument(const char* aCharset,
|
|
int32_t aSource) {
|
|
// XXX hack. keep the aCharset and aSource wait to pick it up
|
|
nsCOMPtr<nsIContentViewer> cv;
|
|
NS_ENSURE_SUCCESS(GetContentViewer(getter_AddRefs(cv)), NS_ERROR_FAILURE);
|
|
if (cv) {
|
|
int32_t hint;
|
|
cv->GetHintCharacterSetSource(&hint);
|
|
if (aSource > hint) {
|
|
nsCString charset(aCharset);
|
|
cv->SetHintCharacterSet(charset);
|
|
cv->SetHintCharacterSetSource(aSource);
|
|
if (eCharsetReloadRequested != mCharsetReloadState) {
|
|
mCharsetReloadState = eCharsetReloadRequested;
|
|
switch (mLoadType) {
|
|
case LOAD_RELOAD_BYPASS_PROXY_AND_CACHE:
|
|
return Reload(LOAD_FLAGS_CHARSET_CHANGE | LOAD_FLAGS_BYPASS_CACHE |
|
|
LOAD_FLAGS_BYPASS_PROXY);
|
|
case LOAD_RELOAD_BYPASS_CACHE:
|
|
return Reload(LOAD_FLAGS_CHARSET_CHANGE | LOAD_FLAGS_BYPASS_CACHE);
|
|
default:
|
|
return Reload(LOAD_FLAGS_CHARSET_CHANGE);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
// return failure if this request is not accepted due to mCharsetReloadState
|
|
return NS_ERROR_DOCSHELL_REQUEST_REJECTED;
|
|
}
|
|
|
|
nsresult nsDocShell::CharsetChangeStopDocumentLoad() {
|
|
if (eCharsetReloadRequested != mCharsetReloadState) {
|
|
Stop(nsIWebNavigation::STOP_ALL);
|
|
return NS_OK;
|
|
}
|
|
// return failer if this request is not accepted due to mCharsetReloadState
|
|
return NS_ERROR_DOCSHELL_REQUEST_REJECTED;
|
|
}
|
|
|
|
NS_IMETHODIMP nsDocShell::ExitPrintPreview() {
|
|
#if NS_PRINT_PREVIEW
|
|
nsCOMPtr<nsIWebBrowserPrint> viewer = do_QueryInterface(mContentViewer);
|
|
return viewer->ExitPrintPreview();
|
|
#else
|
|
return NS_OK;
|
|
#endif
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetCanExecuteScripts(bool* aResult) {
|
|
*aResult = mCanExecuteScripts;
|
|
return NS_OK;
|
|
}
|
|
|
|
/* [infallible] */
|
|
NS_IMETHODIMP nsDocShell::GetIsTopLevelContentDocShell(
|
|
bool* aIsTopLevelContentDocShell) {
|
|
*aIsTopLevelContentDocShell = false;
|
|
|
|
if (mItemType == typeContent) {
|
|
*aIsTopLevelContentDocShell = mBrowsingContext->IsTopContent();
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
// Implements nsILoadContext.originAttributes
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetScriptableOriginAttributes(JSContext* aCx,
|
|
JS::MutableHandle<JS::Value> aVal) {
|
|
return mBrowsingContext->GetScriptableOriginAttributes(aCx, aVal);
|
|
}
|
|
|
|
// Implements nsIDocShell.GetOriginAttributes()
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetOriginAttributes(JSContext* aCx,
|
|
JS::MutableHandle<JS::Value> aVal) {
|
|
return mBrowsingContext->GetScriptableOriginAttributes(aCx, aVal);
|
|
}
|
|
|
|
bool nsDocShell::ServiceWorkerAllowedToControlWindow(nsIPrincipal* aPrincipal,
|
|
nsIURI* aURI) {
|
|
MOZ_ASSERT(aPrincipal);
|
|
MOZ_ASSERT(aURI);
|
|
|
|
if (UsePrivateBrowsing() || mBrowsingContext->GetSandboxFlags()) {
|
|
return false;
|
|
}
|
|
|
|
nsCOMPtr<nsIDocShellTreeItem> parent;
|
|
GetInProcessSameTypeParent(getter_AddRefs(parent));
|
|
nsPIDOMWindowOuter* parentOuter = parent ? parent->GetWindow() : nullptr;
|
|
nsPIDOMWindowInner* parentInner =
|
|
parentOuter ? parentOuter->GetCurrentInnerWindow() : nullptr;
|
|
|
|
StorageAccess storage =
|
|
StorageAllowedForNewWindow(aPrincipal, aURI, parentInner);
|
|
|
|
return storage == StorageAccess::eAllow;
|
|
}
|
|
|
|
nsresult nsDocShell::SetOriginAttributes(const OriginAttributes& aAttrs) {
|
|
MOZ_ASSERT(!mIsBeingDestroyed);
|
|
return mBrowsingContext->SetOriginAttributes(aAttrs);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::ResumeRedirectedLoad(uint64_t aIdentifier, int32_t aHistoryIndex) {
|
|
RefPtr<nsDocShell> self = this;
|
|
RefPtr<ChildProcessChannelListener> cpcl =
|
|
ChildProcessChannelListener::GetSingleton();
|
|
|
|
// Call into InternalLoad with the pending channel when it is received.
|
|
cpcl->RegisterCallback(
|
|
aIdentifier, [self, aHistoryIndex](
|
|
nsDocShellLoadState* aLoadState,
|
|
nsTArray<Endpoint<extensions::PStreamFilterParent>>&&
|
|
aStreamFilterEndpoints,
|
|
nsDOMNavigationTiming* aTiming) {
|
|
MOZ_ASSERT(aLoadState->GetPendingRedirectedChannel());
|
|
if (NS_WARN_IF(self->mIsBeingDestroyed)) {
|
|
aLoadState->GetPendingRedirectedChannel()->Cancel(NS_BINDING_ABORTED);
|
|
return NS_BINDING_ABORTED;
|
|
}
|
|
|
|
self->mLoadType = aLoadState->LoadType();
|
|
nsCOMPtr<nsIURI> previousURI;
|
|
uint32_t previousFlags = 0;
|
|
ExtractLastVisit(aLoadState->GetPendingRedirectedChannel(),
|
|
getter_AddRefs(previousURI), &previousFlags);
|
|
self->SaveLastVisit(aLoadState->GetPendingRedirectedChannel(),
|
|
previousURI, previousFlags);
|
|
|
|
if (aTiming) {
|
|
self->mTiming = new nsDOMNavigationTiming(self, aTiming);
|
|
self->mBlankTiming = false;
|
|
}
|
|
|
|
// If we're performing a history load, locate the correct history entry,
|
|
// and set the relevant bits on our loadState.
|
|
if (aHistoryIndex >= 0 && self->GetSessionHistory() &&
|
|
!mozilla::SessionHistoryInParent()) {
|
|
nsCOMPtr<nsISHistory> legacySHistory =
|
|
self->GetSessionHistory()->LegacySHistory();
|
|
|
|
nsCOMPtr<nsISHEntry> entry;
|
|
nsresult rv = legacySHistory->GetEntryAtIndex(aHistoryIndex,
|
|
getter_AddRefs(entry));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
legacySHistory->InternalSetRequestedIndex(aHistoryIndex);
|
|
aLoadState->SetLoadType(LOAD_HISTORY);
|
|
aLoadState->SetSHEntry(entry);
|
|
}
|
|
}
|
|
|
|
self->InternalLoad(aLoadState);
|
|
|
|
if (aLoadState->GetOriginalURIString().isSome()) {
|
|
// Save URI string in case it's needed later when
|
|
// sending to search engine service in EndPageLoad()
|
|
self->mOriginalUriString = *aLoadState->GetOriginalURIString();
|
|
}
|
|
|
|
for (auto& endpoint : aStreamFilterEndpoints) {
|
|
extensions::StreamFilterParent::Attach(
|
|
aLoadState->GetPendingRedirectedChannel(), std::move(endpoint));
|
|
}
|
|
|
|
// If the channel isn't pending, then it means that InternalLoad
|
|
// never connected it, and we shouldn't try to continue. This
|
|
// can happen even if InternalLoad returned NS_OK.
|
|
bool pending = false;
|
|
aLoadState->GetPendingRedirectedChannel()->IsPending(&pending);
|
|
NS_ASSERTION(pending, "We should have connected the pending channel!");
|
|
if (!pending) {
|
|
return NS_BINDING_ABORTED;
|
|
}
|
|
return NS_OK;
|
|
});
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetOriginAttributes(JS::Handle<JS::Value> aOriginAttributes,
|
|
JSContext* aCx) {
|
|
OriginAttributes attrs;
|
|
if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) {
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
|
|
return SetOriginAttributes(attrs);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetAsyncPanZoomEnabled(bool* aOut) {
|
|
if (PresShell* presShell = GetPresShell()) {
|
|
*aOut = presShell->AsyncPanZoomEnabled();
|
|
return NS_OK;
|
|
}
|
|
|
|
// If we don't have a presShell, fall back to the default platform value of
|
|
// whether or not APZ is enabled.
|
|
*aOut = gfxPlatform::AsyncPanZoomEnabled();
|
|
return NS_OK;
|
|
}
|
|
|
|
bool nsDocShell::HasUnloadedParent() {
|
|
for (WindowContext* wc = GetBrowsingContext()->GetParentWindowContext(); wc;
|
|
wc = wc->GetParentWindowContext()) {
|
|
if (wc->IsCached() || wc->IsDiscarded() ||
|
|
wc->GetBrowsingContext()->IsDiscarded()) {
|
|
// If a parent is OOP and the parent WindowContext is no
|
|
// longer current, we can assume the parent was unloaded.
|
|
return true;
|
|
}
|
|
|
|
if (wc->GetBrowsingContext()->IsInProcess() &&
|
|
(!wc->GetBrowsingContext()->GetDocShell() ||
|
|
wc->GetBrowsingContext()->GetDocShell()->GetIsInUnload())) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/* static */
|
|
bool nsDocShell::ShouldUpdateGlobalHistory(uint32_t aLoadType) {
|
|
return !(aLoadType == LOAD_BYPASS_HISTORY || aLoadType == LOAD_ERROR_PAGE ||
|
|
aLoadType & LOAD_CMD_HISTORY);
|
|
}
|
|
|
|
void nsDocShell::UpdateGlobalHistoryTitle(nsIURI* aURI) {
|
|
if (!mBrowsingContext->GetUseGlobalHistory() || UsePrivateBrowsing()) {
|
|
return;
|
|
}
|
|
|
|
// Global history is interested into sub-frame visits only for link-coloring
|
|
// purposes, thus title updates are skipped for those.
|
|
//
|
|
// Moreover, some iframe documents (such as the ones created via
|
|
// document.open()) inherit the document uri of the caller, which would cause
|
|
// us to override a previously set page title with one from the subframe.
|
|
if (IsFrame()) {
|
|
return;
|
|
}
|
|
|
|
if (nsCOMPtr<IHistory> history = components::History::Service()) {
|
|
history->SetURITitle(aURI, mTitle);
|
|
}
|
|
}
|
|
|
|
bool nsDocShell::IsInvisible() { return mInvisible; }
|
|
|
|
void nsDocShell::SetInvisible(bool aInvisible) { mInvisible = aInvisible; }
|
|
|
|
// The caller owns |aAsyncCause| here.
|
|
void nsDocShell::NotifyJSRunToCompletionStart(const char* aReason,
|
|
const nsAString& aFunctionName,
|
|
const nsAString& aFilename,
|
|
const uint32_t aLineNumber,
|
|
JS::Handle<JS::Value> aAsyncStack,
|
|
const char* aAsyncCause) {
|
|
// If first start, mark interval start.
|
|
if (mJSRunToCompletionDepth == 0) {
|
|
RefPtr<TimelineConsumers> timelines = TimelineConsumers::Get();
|
|
if (timelines && timelines->HasConsumer(this)) {
|
|
timelines->AddMarkerForDocShell(
|
|
this, mozilla::MakeUnique<JavascriptTimelineMarker>(
|
|
aReason, aFunctionName, aFilename, aLineNumber,
|
|
MarkerTracingType::START, aAsyncStack, aAsyncCause));
|
|
}
|
|
}
|
|
|
|
mJSRunToCompletionDepth++;
|
|
}
|
|
|
|
void nsDocShell::NotifyJSRunToCompletionStop() {
|
|
mJSRunToCompletionDepth--;
|
|
|
|
// If last stop, mark interval end.
|
|
if (mJSRunToCompletionDepth == 0) {
|
|
RefPtr<TimelineConsumers> timelines = TimelineConsumers::Get();
|
|
if (timelines && timelines->HasConsumer(this)) {
|
|
timelines->AddMarkerForDocShell(this, "Javascript",
|
|
MarkerTracingType::END);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void nsDocShell::MaybeNotifyKeywordSearchLoading(const nsString& aProvider,
|
|
const nsString& aKeyword) {
|
|
if (aProvider.IsEmpty()) {
|
|
return;
|
|
}
|
|
|
|
nsCOMPtr<nsISearchService> searchSvc =
|
|
do_GetService("@mozilla.org/browser/search-service;1");
|
|
if (searchSvc) {
|
|
nsCOMPtr<nsISearchEngine> searchEngine;
|
|
searchSvc->GetEngineByName(aProvider, getter_AddRefs(searchEngine));
|
|
if (searchEngine) {
|
|
nsCOMPtr<nsIObserverService> obsSvc = services::GetObserverService();
|
|
if (obsSvc) {
|
|
// Note that "keyword-search" refers to a search via the url
|
|
// bar, not a bookmarks keyword search.
|
|
obsSvc->NotifyObservers(searchEngine, "keyword-search", aKeyword.get());
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::ShouldPrepareForIntercept(nsIURI* aURI, nsIChannel* aChannel,
|
|
bool* aShouldIntercept) {
|
|
return mInterceptController->ShouldPrepareForIntercept(aURI, aChannel,
|
|
aShouldIntercept);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::ChannelIntercepted(nsIInterceptedChannel* aChannel) {
|
|
return mInterceptController->ChannelIntercepted(aChannel);
|
|
}
|
|
|
|
bool nsDocShell::InFrameSwap() {
|
|
RefPtr<nsDocShell> shell = this;
|
|
do {
|
|
if (shell->mInFrameSwap) {
|
|
return true;
|
|
}
|
|
shell = shell->GetInProcessParentDocshell();
|
|
} while (shell);
|
|
return false;
|
|
}
|
|
|
|
UniquePtr<ClientSource> nsDocShell::TakeInitialClientSource() {
|
|
return std::move(mInitialClientSource);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::IssueWarning(uint32_t aWarning, bool aAsError) {
|
|
if (mContentViewer) {
|
|
RefPtr<Document> doc = mContentViewer->GetDocument();
|
|
if (doc) {
|
|
doc->WarnOnceAbout(DeprecatedOperations(aWarning), aAsError);
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetEditingSession(nsIEditingSession** aEditSession) {
|
|
if (!NS_SUCCEEDED(EnsureEditorData())) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
*aEditSession = do_AddRef(mEditorData->GetEditingSession()).take();
|
|
return *aEditSession ? NS_OK : NS_ERROR_FAILURE;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetScriptableBrowserChild(nsIBrowserChild** aBrowserChild) {
|
|
*aBrowserChild = GetBrowserChild().take();
|
|
return *aBrowserChild ? NS_OK : NS_ERROR_FAILURE;
|
|
}
|
|
|
|
already_AddRefed<nsIBrowserChild> nsDocShell::GetBrowserChild() {
|
|
nsCOMPtr<nsIBrowserChild> tc = do_QueryReferent(mBrowserChild);
|
|
return tc.forget();
|
|
}
|
|
|
|
nsCommandManager* nsDocShell::GetCommandManager() {
|
|
NS_ENSURE_SUCCESS(EnsureCommandHandler(), nullptr);
|
|
return mCommandManager;
|
|
}
|
|
|
|
NS_IMETHODIMP_(void)
|
|
nsDocShell::GetOriginAttributes(mozilla::OriginAttributes& aAttrs) {
|
|
mBrowsingContext->GetOriginAttributes(aAttrs);
|
|
}
|
|
|
|
HTMLEditor* nsIDocShell::GetHTMLEditor() {
|
|
nsDocShell* docShell = static_cast<nsDocShell*>(this);
|
|
return docShell->GetHTMLEditorInternal();
|
|
}
|
|
|
|
nsresult nsIDocShell::SetHTMLEditor(HTMLEditor* aHTMLEditor) {
|
|
nsDocShell* docShell = static_cast<nsDocShell*>(this);
|
|
return docShell->SetHTMLEditorInternal(aHTMLEditor);
|
|
}
|
|
|
|
#define MATRIX_LENGTH 20
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::SetColorMatrix(const nsTArray<float>& aMatrix) {
|
|
if (aMatrix.Length() == MATRIX_LENGTH) {
|
|
mColorMatrix.reset(new gfx::Matrix5x4());
|
|
static_assert(
|
|
MATRIX_LENGTH * sizeof(float) == sizeof(mColorMatrix->components),
|
|
"Size mismatch for our memcpy");
|
|
memcpy(mColorMatrix->components, aMatrix.Elements(),
|
|
sizeof(mColorMatrix->components));
|
|
} else if (aMatrix.Length() == 0) {
|
|
mColorMatrix.reset();
|
|
} else {
|
|
return NS_ERROR_INVALID_ARG;
|
|
}
|
|
|
|
PresShell* presShell = GetPresShell();
|
|
if (!presShell) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsIFrame* frame = presShell->GetRootFrame();
|
|
if (!frame) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
frame->SchedulePaint();
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetColorMatrix(nsTArray<float>& aMatrix) {
|
|
if (mColorMatrix) {
|
|
aMatrix.SetLength(MATRIX_LENGTH);
|
|
static_assert(
|
|
MATRIX_LENGTH * sizeof(float) == sizeof(mColorMatrix->components),
|
|
"Size mismatch for our memcpy");
|
|
memcpy(aMatrix.Elements(), mColorMatrix->components,
|
|
MATRIX_LENGTH * sizeof(float));
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
#undef MATRIX_LENGTH
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetIsForceReloading(bool* aForceReload) {
|
|
*aForceReload = IsForceReloading();
|
|
return NS_OK;
|
|
}
|
|
|
|
bool nsDocShell::IsForceReloading() { return IsForceReloadType(mLoadType); }
|
|
|
|
NS_IMETHODIMP
|
|
nsDocShell::GetBrowsingContextXPCOM(BrowsingContext** aBrowsingContext) {
|
|
*aBrowsingContext = do_AddRef(mBrowsingContext).take();
|
|
return NS_OK;
|
|
}
|
|
|
|
BrowsingContext* nsDocShell::GetBrowsingContext() { return mBrowsingContext; }
|
|
|
|
bool nsDocShell::GetIsAttemptingToNavigate() {
|
|
// XXXbz the document.open spec says to abort even if there's just a
|
|
// queued navigation task, sort of. It's not clear whether browsers
|
|
// actually do that, and we didn't use to do it, so for now let's
|
|
// not do that.
|
|
// https://github.com/whatwg/html/issues/3447 tracks the spec side of this.
|
|
if (mDocumentRequest) {
|
|
// There's definitely a navigation in progress.
|
|
return true;
|
|
}
|
|
|
|
// javascript: channels have slightly weird behavior: they're LOAD_BACKGROUND
|
|
// until the script runs, which means they're not sending loadgroup
|
|
// notifications and hence not getting set as mDocumentRequest. Look through
|
|
// our loadgroup for document-level javascript: loads.
|
|
if (!mLoadGroup) {
|
|
return false;
|
|
}
|
|
|
|
nsCOMPtr<nsISimpleEnumerator> requests;
|
|
mLoadGroup->GetRequests(getter_AddRefs(requests));
|
|
bool hasMore = false;
|
|
while (NS_SUCCEEDED(requests->HasMoreElements(&hasMore)) && hasMore) {
|
|
nsCOMPtr<nsISupports> elem;
|
|
requests->GetNext(getter_AddRefs(elem));
|
|
nsCOMPtr<nsIScriptChannel> scriptChannel(do_QueryInterface(elem));
|
|
if (!scriptChannel) {
|
|
continue;
|
|
}
|
|
|
|
if (scriptChannel->GetIsDocumentLoad()) {
|
|
// This is a javascript: load that might lead to a new document,
|
|
// hence a navigation.
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void nsDocShell::SetLoadingSessionHistoryInfo(
|
|
const mozilla::dom::LoadingSessionHistoryInfo& aLoadingInfo) {
|
|
// FIXME Would like to assert this, but can't yet.
|
|
// MOZ_ASSERT(!mLoadingEntry);
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("Setting the loading entry on nsDocShell %p to %s", this,
|
|
aLoadingInfo.mInfo.GetURI()->GetSpecOrDefault().get()));
|
|
mLoadingEntry = MakeUnique<LoadingSessionHistoryInfo>(aLoadingInfo);
|
|
}
|
|
|
|
void nsDocShell::MoveLoadingToActiveEntry(bool aPersist) {
|
|
MOZ_ASSERT(mozilla::SessionHistoryInParent());
|
|
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("nsDocShell %p MoveLoadingToActiveEntry", this));
|
|
|
|
bool hadActiveEntry = !!mActiveEntry;
|
|
mActiveEntry = nullptr;
|
|
mozilla::UniquePtr<mozilla::dom::LoadingSessionHistoryInfo> loadingEntry;
|
|
mActiveEntryIsLoadingFromSessionHistory =
|
|
mLoadingEntry && mLoadingEntry->mLoadIsFromSessionHistory;
|
|
if (mLoadingEntry) {
|
|
MOZ_LOG(gSHLog, LogLevel::Debug,
|
|
("Moving the loading entry to the active entry on nsDocShell %p "
|
|
"to %s",
|
|
this, mLoadingEntry->mInfo.GetURI()->GetSpecOrDefault().get()));
|
|
mActiveEntry = MakeUnique<SessionHistoryInfo>(mLoadingEntry->mInfo);
|
|
mLoadingEntry.swap(loadingEntry);
|
|
if (!mActiveEntryIsLoadingFromSessionHistory) {
|
|
mBrowsingContext->IncrementHistoryEntryCountForBrowsingContext();
|
|
}
|
|
}
|
|
|
|
if (mActiveEntry) {
|
|
MOZ_ASSERT(loadingEntry);
|
|
uint32_t loadType =
|
|
mLoadType == LOAD_ERROR_PAGE ? mFailedLoadType : mLoadType;
|
|
mBrowsingContext->SessionHistoryCommit(*loadingEntry, loadType,
|
|
hadActiveEntry, aPersist, false);
|
|
}
|
|
}
|