diff options
author | Alan Jeffrey <ajeffrey@mozilla.com> | 2017-03-01 12:00:33 -0600 |
---|---|---|
committer | Alan Jeffrey <ajeffrey@mozilla.com> | 2017-03-17 10:53:20 -0500 |
commit | 6bcb5f68be752d5439a4e5a899c5a72016b626df (patch) | |
tree | 24e8b34f3c78173465098e083a9982becf332756 | |
parent | 0b590aeed73df3c1f1891fbb276010b29a8d7051 (diff) | |
download | servo-6bcb5f68be752d5439a4e5a899c5a72016b626df.tar.gz servo-6bcb5f68be752d5439a4e5a899c5a72016b626df.zip |
Implement dissimilar-origin window.parent and window.top.
9 files changed, 207 insertions, 87 deletions
diff --git a/components/constellation/constellation.rs b/components/constellation/constellation.rs index 124731f4bf8..0682cbe526b 100644 --- a/components/constellation/constellation.rs +++ b/components/constellation/constellation.rs @@ -1092,7 +1092,18 @@ impl<Message, LTF, STF> Constellation<Message, LTF, STF> FromScriptMsg::TouchEventProcessed(result) => { self.compositor_proxy.send(ToCompositorMsg::TouchEventProcessed(result)) } - + FromScriptMsg::GetFrameId(pipeline_id, sender) => { + let result = self.pipelines.get(&pipeline_id).map(|pipeline| pipeline.frame_id); + if let Err(e) = sender.send(result) { + warn!("Sending reply to get frame id failed ({:?}).", e); + } + } + FromScriptMsg::GetParentInfo(pipeline_id, sender) => { + let result = self.pipelines.get(&pipeline_id).and_then(|pipeline| pipeline.parent_info); + if let Err(e) = sender.send(result) { + warn!("Sending reply to get parent info failed ({:?}).", e); + } + } FromScriptMsg::RegisterServiceWorker(scope_things, scope) => { debug!("constellation got store registration scope message"); self.handle_register_serviceworker(scope_things, scope); diff --git a/components/script/dom/browsingcontext.rs b/components/script/dom/browsingcontext.rs index 6363e08095f..b5e66b0fd7b 100644 --- a/components/script/dom/browsingcontext.rs +++ b/components/script/dom/browsingcontext.rs @@ -63,25 +63,35 @@ pub struct BrowsingContext { /// The containing iframe element, if this is a same-origin iframe frame_element: Option<JS<Element>>, + + /// The parent browsing context, if this is a nested browsing context + parent: Option<JS<BrowsingContext>>, } impl BrowsingContext { pub fn new_inherited(frame_id: FrameId, - currently_active: PipelineId, - frame_element: Option<&Element>) + currently_active: Option<PipelineId>, + frame_element: Option<&Element>, + parent: Option<&BrowsingContext>) -> BrowsingContext { BrowsingContext { reflector: Reflector::new(), frame_id: frame_id, - currently_active: Cell::new(Some(currently_active)), + currently_active: Cell::new(currently_active), discarded: Cell::new(false), frame_element: frame_element.map(JS::from_ref), + parent: parent.map(JS::from_ref), } } #[allow(unsafe_code)] - pub fn new(window: &Window, frame_id: FrameId, frame_element: Option<&Element>) -> Root<BrowsingContext> { + pub fn new(window: &Window, + frame_id: FrameId, + frame_element: Option<&Element>, + parent: Option<&BrowsingContext>) + -> Root<BrowsingContext> + { unsafe { let WindowProxyHandler(handler) = window.windowproxy_handler(); assert!(!handler.is_null()); @@ -97,8 +107,48 @@ impl BrowsingContext { assert!(!window_proxy.is_null()); // Create a new browsing context. - let currently_active = window.global().pipeline_id(); - let mut browsing_context = box BrowsingContext::new_inherited(frame_id, currently_active, frame_element); + let current = Some(window.global().pipeline_id()); + let mut browsing_context = box BrowsingContext::new_inherited(frame_id, current, frame_element, parent); + + // The window proxy owns the browsing context. + // When we finalize the window proxy, it drops the browsing context it owns. + SetProxyExtra(window_proxy.get(), 0, &PrivateValue(&*browsing_context as *const _ as *const _)); + + // Notify the JS engine about the new window proxy binding. + SetWindowProxy(cx, window_jsobject, window_proxy.handle()); + + // Set the reflector. + debug!("Initializing reflector of {:p} to {:p}.", browsing_context, window_proxy.get()); + browsing_context.reflector.set_jsobject(window_proxy.get()); + Root::from_ref(&*Box::into_raw(browsing_context)) + } + } + + #[allow(unsafe_code)] + pub fn new_dissimilar_origin(global_to_clone_from: &GlobalScope, + frame_id: FrameId, + parent: Option<&BrowsingContext>) + -> Root<BrowsingContext> + { + unsafe { + let handler = CreateWrapperProxyHandler(&XORIGIN_PROXY_HANDLER); + assert!(!handler.is_null()); + + let cx = global_to_clone_from.get_cx(); + + // Create a new browsing context. + let mut browsing_context = box BrowsingContext::new_inherited(frame_id, None, None, parent); + + // Create a new dissimilar-origin window. + let window = DissimilarOriginWindow::new(global_to_clone_from, &*browsing_context); + let window_jsobject = window.reflector().get_jsobject(); + assert!(!window_jsobject.get().is_null()); + assert!(((*get_object_class(window_jsobject.get())).flags & JSCLASS_IS_GLOBAL) != 0); + let _ac = JSAutoCompartment::new(cx, window_jsobject.get()); + + // Create a new window proxy. + rooted!(in(cx) let window_proxy = NewWindowProxy(cx, window_jsobject, handler)); + assert!(!window_proxy.is_null()); // The window proxy owns the browsing context. // When we finalize the window proxy, it drops the browsing context it owns. @@ -130,6 +180,18 @@ impl BrowsingContext { self.frame_element.r() } + pub fn parent(&self) -> Option<&BrowsingContext> { + self.parent.r() + } + + pub fn top(&self) -> &BrowsingContext { + let mut result = self; + while let Some(parent) = result.parent() { + result = parent; + } + result + } + #[allow(unsafe_code)] /// Change the Window that this browsing context's WindowProxy resolves to. // TODO: support setting the window proxy to a dummy value, @@ -181,7 +243,8 @@ impl BrowsingContext { } pub fn unset_currently_active(&self) { - let window = DissimilarOriginWindow::new(self); + let globalscope = self.global(); + let window = DissimilarOriginWindow::new(&*globalscope, self); self.set_window_proxy(&*window.upcast(), &XORIGIN_PROXY_HANDLER); self.currently_active.set(None); } diff --git a/components/script/dom/dissimilaroriginwindow.rs b/components/script/dom/dissimilaroriginwindow.rs index 96171ef3bf1..0f3cbd06df0 100644 --- a/components/script/dom/dissimilaroriginwindow.rs +++ b/components/script/dom/dissimilaroriginwindow.rs @@ -7,7 +7,6 @@ use dom::bindings::codegen::Bindings::DissimilarOriginWindowBinding::DissimilarO use dom::bindings::error::{Error, ErrorResult}; use dom::bindings::inheritance::Castable; use dom::bindings::js::{JS, MutNullableJS, Root}; -use dom::bindings::reflector::DomObject; use dom::bindings::str::DOMString; use dom::bindings::structuredclone::StructuredCloneData; use dom::browsingcontext::BrowsingContext; @@ -45,19 +44,18 @@ pub struct DissimilarOriginWindow { impl DissimilarOriginWindow { #[allow(unsafe_code)] - pub fn new(browsing_context: &BrowsingContext) -> Root<DissimilarOriginWindow> { - let globalscope = browsing_context.global(); - let cx = globalscope.get_cx(); + pub fn new(global_to_clone_from: &GlobalScope, browsing_context: &BrowsingContext) -> Root<DissimilarOriginWindow> { + let cx = global_to_clone_from.get_cx(); // Any timer events fired on this window are ignored. let (timer_event_chan, _) = ipc::channel().unwrap(); let win = box DissimilarOriginWindow { globalscope: GlobalScope::new_inherited(PipelineId::new(), - globalscope.devtools_chan().cloned(), - globalscope.mem_profiler_chan().clone(), - globalscope.time_profiler_chan().clone(), - globalscope.constellation_chan().clone(), - globalscope.scheduler_chan().clone(), - globalscope.resource_threads().clone(), + global_to_clone_from.devtools_chan().cloned(), + global_to_clone_from.mem_profiler_chan().clone(), + global_to_clone_from.time_profiler_chan().clone(), + global_to_clone_from.constellation_chan().clone(), + global_to_clone_from.scheduler_chan().clone(), + global_to_clone_from.resource_threads().clone(), timer_event_chan), browsing_context: JS::from_ref(browsing_context), location: MutNullableJS::new(None), @@ -84,14 +82,26 @@ impl DissimilarOriginWindowMethods for DissimilarOriginWindow { // https://html.spec.whatwg.org/multipage/#dom-parent fn GetParent(&self) -> Option<Root<BrowsingContext>> { - // TODO: implement window.parent correctly for x-origin windows. + // Steps 1-3. + if self.browsing_context.is_discarded() { + return None; + } + // Step 4. + if let Some(parent) = self.browsing_context.parent() { + return Some(Root::from_ref(parent)); + } + // Step 5. Some(Root::from_ref(&*self.browsing_context)) } // https://html.spec.whatwg.org/multipage/#dom-top fn GetTop(&self) -> Option<Root<BrowsingContext>> { - // TODO: implement window.top correctly for x-origin windows. - Some(Root::from_ref(&*self.browsing_context)) + // Steps 1-3. + if self.browsing_context.is_discarded() { + return None; + } + // Steps 4-5. + Some(Root::from_ref(self.browsing_context.top())) } // https://html.spec.whatwg.org/multipage/#dom-length diff --git a/components/script/dom/window.rs b/components/script/dom/window.rs index 440b188646e..3f89e7adf00 100644 --- a/components/script/dom/window.rs +++ b/components/script/dom/window.rs @@ -42,7 +42,7 @@ use dom::location::Location; use dom::mediaquerylist::{MediaQueryList, WeakMediaQueryListVec}; use dom::messageevent::MessageEvent; use dom::navigator::Navigator; -use dom::node::{Node, NodeDamage, document_from_node, from_untrusted_node_address, window_from_node}; +use dom::node::{Node, NodeDamage, document_from_node, from_untrusted_node_address}; use dom::performance::Performance; use dom::promise::Promise; use dom::screen::Screen; @@ -631,31 +631,35 @@ impl WindowMethods for Window { // https://html.spec.whatwg.org/multipage/#dom-parent fn GetParent(&self) -> Option<Root<BrowsingContext>> { - // Steps 1. and 2. - if self.maybe_browsing_context().map_or(true, |c| c.is_discarded()) { + // Steps 1-3. + let context = match self.maybe_browsing_context() { + Some(context) => context, + None => return None, + }; + if context.is_discarded() { return None; } - match self.parent() { - // Step 4. - Some(parent) => Some(parent.Window()), - // Step 5. - None => Some(self.Window()) + // Step 4. + if let Some(parent) = context.parent() { + return Some(Root::from_ref(parent)); } - } + // Step 5. + Some(context) + } // https://html.spec.whatwg.org/multipage/#dom-top fn GetTop(&self) -> Option<Root<BrowsingContext>> { - // Steps 1. and 2. - if self.maybe_browsing_context().map_or(true, |c| c.is_discarded()) { + // Steps 1-3. + let context = match self.maybe_browsing_context() { + Some(context) => context, + None => return None, + }; + if context.is_discarded() { return None; } - // Step 5. - let mut window = Root::from_ref(self); - while let Some(parent) = window.parent() { - window = parent; - } - Some(window.Window()) - } + // Steps 4-5. + Some(Root::from_ref(context.top())) + } // https://dvcs.w3.org/hg/webperf/raw-file/tip/specs/ // NavigationTiming/Overview.html#sec-window.performance-attribute @@ -1657,16 +1661,6 @@ impl Window { } } - // https://html.spec.whatwg.org/multipage/#parent-browsing-context - pub fn parent(&self) -> Option<Root<Window>> { - if self.is_top_level() { - return None; - } - - self.browsing_context().frame_element() - .map(|frame_element| window_from_node(frame_element)) - } - /// Returns whether this window is mozbrowser. pub fn is_mozbrowser(&self) -> bool { PREFS.is_mozbrowser_enabled() && self.parent_info().is_none() diff --git a/components/script/script_thread.rs b/components/script/script_thread.rs index 0e8e4ceadca..ac96836d92a 100644 --- a/components/script/script_thread.rs +++ b/components/script/script_thread.rs @@ -1650,6 +1650,77 @@ impl ScriptThread { } } + fn ask_constellation_for_frame_id(&self, pipeline_id: PipelineId) -> Option<FrameId> { + let (result_sender, result_receiver) = ipc::channel().unwrap(); + let msg = ConstellationMsg::GetFrameId(pipeline_id, result_sender); + self.constellation_chan.send(msg).expect("Failed to send to constellation."); + result_receiver.recv().expect("Failed to get frame id from constellation.") + } + + fn ask_constellation_for_parent_info(&self, pipeline_id: PipelineId) -> Option<(PipelineId, FrameType)> { + let (result_sender, result_receiver) = ipc::channel().unwrap(); + let msg = ConstellationMsg::GetParentInfo(pipeline_id, result_sender); + self.constellation_chan.send(msg).expect("Failed to send to constellation."); + result_receiver.recv().expect("Failed to get frame id from constellation.") + } + + // Get the browsing context for a pipeline that may exist in another + // script thread. If the browsing context already exists in the + // `browsing_contexts` map, we return it, otherwise we recursively + // get the browsing context for the parent if there is one, + // construct a new dissimilar-origin browsing context, add it + // to the `browsing_contexts` map, and return it. + fn remote_browsing_context(&self, + global_to_clone: &GlobalScope, + pipeline_id: PipelineId) + -> Option<Root<BrowsingContext>> + { + let frame_id = match self.ask_constellation_for_frame_id(pipeline_id) { + Some(frame_id) => frame_id, + None => return None, + }; + if let Some(browsing_context) = self.browsing_contexts.borrow().get(&frame_id) { + return Some(Root::from_ref(browsing_context)); + } + let parent = match self.ask_constellation_for_parent_info(pipeline_id) { + Some((parent_id, FrameType::IFrame)) => self.remote_browsing_context(global_to_clone, parent_id), + _ => None, + }; + let browsing_context = BrowsingContext::new_dissimilar_origin(global_to_clone, frame_id, parent.r()); + self.browsing_contexts.borrow_mut().insert(frame_id, JS::from_ref(&*browsing_context)); + Some(browsing_context) + } + + // Get the browsing context for a pipeline that exists in this + // script thread. If the browsing context already exists in the + // `browsing_contexts` map, we return it, otherwise we recursively + // get the browsing context for the parent if there is one, + // construct a new similar-origin browsing context, add it + // to the `browsing_contexts` map, and return it. + fn local_browsing_context(&self, + window: &Window, + frame_id: FrameId, + parent_info: Option<(PipelineId, FrameType)>) + -> Root<BrowsingContext> + { + if let Some(browsing_context) = self.browsing_contexts.borrow().get(&frame_id) { + browsing_context.set_currently_active(&*window); + return Root::from_ref(browsing_context); + } + let iframe = match parent_info { + Some((parent_id, FrameType::IFrame)) => self.documents.borrow().find_iframe(parent_id, frame_id), + _ => None, + }; + let parent = match (parent_info, iframe.as_ref()) { + (_, Some(iframe)) => Some(window_from_node(&**iframe).browsing_context()), + (Some((parent_id, FrameType::IFrame)), _) => self.remote_browsing_context(window.upcast(), parent_id), + _ => None, + }; + let browsing_context = BrowsingContext::new(&window, frame_id, iframe.r().map(Castable::upcast), parent.r()); + self.browsing_contexts.borrow_mut().insert(frame_id, JS::from_ref(&*browsing_context)); + browsing_context + } + /// The entry point to document loading. Defines bindings, sets up the window and document /// objects, parses HTML and CSS, and kicks off initial layout. fn load(&self, metadata: Metadata, incomplete: InProgressLoad) -> Root<ServoParser> { @@ -1667,17 +1738,6 @@ impl ScriptThread { } debug!("ScriptThread: loading {} on pipeline {:?}", incomplete.url, incomplete.pipeline_id); - let frame_element = incomplete.parent_info.and_then(|(parent_id, _)| - // In the case a parent id exists but the matching context - // cannot be found, this means the context exists in a different - // script thread (due to origin) so it shouldn't be returned. - // TODO: window.parent will continue to return self in that - // case, which is wrong. We should be returning an object that - // denies access to most properties (per - // https://github.com/servo/servo/issues/3939#issuecomment-62287025). - self.documents.borrow().find_iframe(parent_id, incomplete.frame_id) - ); - let MainThreadScriptChan(ref sender) = self.chan; let DOMManipulationTaskSource(ref dom_sender) = self.dom_manipulation_task_source; let UserInteractionTaskSource(ref user_sender) = self.user_interaction_task_source; @@ -1711,20 +1771,10 @@ impl ScriptThread { incomplete.parent_info, incomplete.window_size, self.webvr_thread.clone()); - let frame_element = frame_element.r().map(Castable::upcast); - match self.browsing_contexts.borrow_mut().entry(incomplete.frame_id) { - hash_map::Entry::Vacant(entry) => { - let browsing_context = BrowsingContext::new(&window, incomplete.frame_id, frame_element); - entry.insert(JS::from_ref(&*browsing_context)); - window.init_browsing_context(&browsing_context); - }, - hash_map::Entry::Occupied(entry) => { - let browsing_context = entry.get(); - browsing_context.set_currently_active(&*window); - window.init_browsing_context(browsing_context); - }, - } + // Initialize the browsing context for the window. + let browsing_context = self.local_browsing_context(&window, incomplete.frame_id, incomplete.parent_info); + window.init_browsing_context(&browsing_context); let last_modified = metadata.headers.as_ref().and_then(|headers| { headers.get().map(|&LastModified(HttpDate(ref tm))| dom_last_modified(tm)) diff --git a/components/script_traits/script_msg.rs b/components/script_traits/script_msg.rs index 2fd70174368..3e61fa8ae62 100644 --- a/components/script_traits/script_msg.rs +++ b/components/script_traits/script_msg.rs @@ -18,7 +18,7 @@ use euclid::point::Point2D; use euclid::size::{Size2D, TypedSize2D}; use gfx_traits::ScrollRootId; use ipc_channel::ipc::IpcSender; -use msg::constellation_msg::{FrameId, PipelineId, TraversalDirection}; +use msg::constellation_msg::{FrameId, FrameType, PipelineId, TraversalDirection}; use msg::constellation_msg::{Key, KeyModifiers, KeyState}; use net_traits::CoreResourceMsg; use net_traits::storage_thread::StorageType; @@ -86,6 +86,10 @@ pub enum ScriptMsg { ForwardEvent(PipelineId, CompositorEvent), /// Requests that the constellation retrieve the current contents of the clipboard GetClipboardContents(IpcSender<String>), + /// Get the frame id for a given pipeline. + GetFrameId(PipelineId, IpcSender<Option<FrameId>>), + /// Get the parent info for a given pipeline. + GetParentInfo(PipelineId, IpcSender<Option<(PipelineId, FrameType)>>), /// <head> tag finished parsing HeadParsed, /// All pending loads are complete, and the `load` event for this pipeline diff --git a/tests/wpt/metadata/html/browsers/browsing-the-web/navigating-across-documents/navigation_unload_data_url.html.ini b/tests/wpt/metadata/html/browsers/browsing-the-web/navigating-across-documents/navigation_unload_data_url.html.ini deleted file mode 100644 index 147039e5d3e..00000000000 --- a/tests/wpt/metadata/html/browsers/browsing-the-web/navigating-across-documents/navigation_unload_data_url.html.ini +++ /dev/null @@ -1,6 +0,0 @@ -[navigation_unload_data_url.html] - type: testharness - expected: TIMEOUT - [Same-origin navigation started from unload handler] - expected: TIMEOUT - diff --git a/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini b/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini index 33bef187cf3..114eb9738ea 100644 --- a/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini +++ b/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini @@ -1,6 +1,5 @@ [origin-of-data-document.html] type: testharness - expected: TIMEOUT [The origin of a 'data:' document in a frame is opaque.] - expected: TIMEOUT + expected: FAIL diff --git a/tests/wpt/mozilla/meta/mozilla/cross-origin-objects/cross-origin-objects.html.ini b/tests/wpt/mozilla/meta/mozilla/cross-origin-objects/cross-origin-objects.html.ini deleted file mode 100644 index f6b85f3148c..00000000000 --- a/tests/wpt/mozilla/meta/mozilla/cross-origin-objects/cross-origin-objects.html.ini +++ /dev/null @@ -1,5 +0,0 @@ -[cross-origin-objects.html] - type: testharness - [Parentage of cross-origin windows] - expected: FAIL - |