aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlan Jeffrey <ajeffrey@mozilla.com>2017-03-01 12:00:33 -0600
committerAlan Jeffrey <ajeffrey@mozilla.com>2017-03-17 10:53:20 -0500
commit6bcb5f68be752d5439a4e5a899c5a72016b626df (patch)
tree24e8b34f3c78173465098e083a9982becf332756
parent0b590aeed73df3c1f1891fbb276010b29a8d7051 (diff)
downloadservo-6bcb5f68be752d5439a4e5a899c5a72016b626df.tar.gz
servo-6bcb5f68be752d5439a4e5a899c5a72016b626df.zip
Implement dissimilar-origin window.parent and window.top.
-rw-r--r--components/constellation/constellation.rs13
-rw-r--r--components/script/dom/browsingcontext.rs77
-rw-r--r--components/script/dom/dissimilaroriginwindow.rs36
-rw-r--r--components/script/dom/window.rs50
-rw-r--r--components/script/script_thread.rs98
-rw-r--r--components/script_traits/script_msg.rs6
-rw-r--r--tests/wpt/metadata/html/browsers/browsing-the-web/navigating-across-documents/navigation_unload_data_url.html.ini6
-rw-r--r--tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini3
-rw-r--r--tests/wpt/mozilla/meta/mozilla/cross-origin-objects/cross-origin-objects.html.ini5
9 files changed, 207 insertions, 87 deletions
diff --git a/components/constellation/constellation.rs b/components/constellation/constellation.rs
index 124731f4bf8..0682cbe526b 100644
--- a/components/constellation/constellation.rs
+++ b/components/constellation/constellation.rs
@@ -1092,7 +1092,18 @@ impl<Message, LTF, STF> Constellation<Message, LTF, STF>
FromScriptMsg::TouchEventProcessed(result) => {
self.compositor_proxy.send(ToCompositorMsg::TouchEventProcessed(result))
}
-
+ FromScriptMsg::GetFrameId(pipeline_id, sender) => {
+ let result = self.pipelines.get(&pipeline_id).map(|pipeline| pipeline.frame_id);
+ if let Err(e) = sender.send(result) {
+ warn!("Sending reply to get frame id failed ({:?}).", e);
+ }
+ }
+ FromScriptMsg::GetParentInfo(pipeline_id, sender) => {
+ let result = self.pipelines.get(&pipeline_id).and_then(|pipeline| pipeline.parent_info);
+ if let Err(e) = sender.send(result) {
+ warn!("Sending reply to get parent info failed ({:?}).", e);
+ }
+ }
FromScriptMsg::RegisterServiceWorker(scope_things, scope) => {
debug!("constellation got store registration scope message");
self.handle_register_serviceworker(scope_things, scope);
diff --git a/components/script/dom/browsingcontext.rs b/components/script/dom/browsingcontext.rs
index 6363e08095f..b5e66b0fd7b 100644
--- a/components/script/dom/browsingcontext.rs
+++ b/components/script/dom/browsingcontext.rs
@@ -63,25 +63,35 @@ pub struct BrowsingContext {
/// The containing iframe element, if this is a same-origin iframe
frame_element: Option<JS<Element>>,
+
+ /// The parent browsing context, if this is a nested browsing context
+ parent: Option<JS<BrowsingContext>>,
}
impl BrowsingContext {
pub fn new_inherited(frame_id: FrameId,
- currently_active: PipelineId,
- frame_element: Option<&Element>)
+ currently_active: Option<PipelineId>,
+ frame_element: Option<&Element>,
+ parent: Option<&BrowsingContext>)
-> BrowsingContext
{
BrowsingContext {
reflector: Reflector::new(),
frame_id: frame_id,
- currently_active: Cell::new(Some(currently_active)),
+ currently_active: Cell::new(currently_active),
discarded: Cell::new(false),
frame_element: frame_element.map(JS::from_ref),
+ parent: parent.map(JS::from_ref),
}
}
#[allow(unsafe_code)]
- pub fn new(window: &Window, frame_id: FrameId, frame_element: Option<&Element>) -> Root<BrowsingContext> {
+ pub fn new(window: &Window,
+ frame_id: FrameId,
+ frame_element: Option<&Element>,
+ parent: Option<&BrowsingContext>)
+ -> Root<BrowsingContext>
+ {
unsafe {
let WindowProxyHandler(handler) = window.windowproxy_handler();
assert!(!handler.is_null());
@@ -97,8 +107,48 @@ impl BrowsingContext {
assert!(!window_proxy.is_null());
// Create a new browsing context.
- let currently_active = window.global().pipeline_id();
- let mut browsing_context = box BrowsingContext::new_inherited(frame_id, currently_active, frame_element);
+ let current = Some(window.global().pipeline_id());
+ let mut browsing_context = box BrowsingContext::new_inherited(frame_id, current, frame_element, parent);
+
+ // The window proxy owns the browsing context.
+ // When we finalize the window proxy, it drops the browsing context it owns.
+ SetProxyExtra(window_proxy.get(), 0, &PrivateValue(&*browsing_context as *const _ as *const _));
+
+ // Notify the JS engine about the new window proxy binding.
+ SetWindowProxy(cx, window_jsobject, window_proxy.handle());
+
+ // Set the reflector.
+ debug!("Initializing reflector of {:p} to {:p}.", browsing_context, window_proxy.get());
+ browsing_context.reflector.set_jsobject(window_proxy.get());
+ Root::from_ref(&*Box::into_raw(browsing_context))
+ }
+ }
+
+ #[allow(unsafe_code)]
+ pub fn new_dissimilar_origin(global_to_clone_from: &GlobalScope,
+ frame_id: FrameId,
+ parent: Option<&BrowsingContext>)
+ -> Root<BrowsingContext>
+ {
+ unsafe {
+ let handler = CreateWrapperProxyHandler(&XORIGIN_PROXY_HANDLER);
+ assert!(!handler.is_null());
+
+ let cx = global_to_clone_from.get_cx();
+
+ // Create a new browsing context.
+ let mut browsing_context = box BrowsingContext::new_inherited(frame_id, None, None, parent);
+
+ // Create a new dissimilar-origin window.
+ let window = DissimilarOriginWindow::new(global_to_clone_from, &*browsing_context);
+ let window_jsobject = window.reflector().get_jsobject();
+ assert!(!window_jsobject.get().is_null());
+ assert!(((*get_object_class(window_jsobject.get())).flags & JSCLASS_IS_GLOBAL) != 0);
+ let _ac = JSAutoCompartment::new(cx, window_jsobject.get());
+
+ // Create a new window proxy.
+ rooted!(in(cx) let window_proxy = NewWindowProxy(cx, window_jsobject, handler));
+ assert!(!window_proxy.is_null());
// The window proxy owns the browsing context.
// When we finalize the window proxy, it drops the browsing context it owns.
@@ -130,6 +180,18 @@ impl BrowsingContext {
self.frame_element.r()
}
+ pub fn parent(&self) -> Option<&BrowsingContext> {
+ self.parent.r()
+ }
+
+ pub fn top(&self) -> &BrowsingContext {
+ let mut result = self;
+ while let Some(parent) = result.parent() {
+ result = parent;
+ }
+ result
+ }
+
#[allow(unsafe_code)]
/// Change the Window that this browsing context's WindowProxy resolves to.
// TODO: support setting the window proxy to a dummy value,
@@ -181,7 +243,8 @@ impl BrowsingContext {
}
pub fn unset_currently_active(&self) {
- let window = DissimilarOriginWindow::new(self);
+ let globalscope = self.global();
+ let window = DissimilarOriginWindow::new(&*globalscope, self);
self.set_window_proxy(&*window.upcast(), &XORIGIN_PROXY_HANDLER);
self.currently_active.set(None);
}
diff --git a/components/script/dom/dissimilaroriginwindow.rs b/components/script/dom/dissimilaroriginwindow.rs
index 96171ef3bf1..0f3cbd06df0 100644
--- a/components/script/dom/dissimilaroriginwindow.rs
+++ b/components/script/dom/dissimilaroriginwindow.rs
@@ -7,7 +7,6 @@ use dom::bindings::codegen::Bindings::DissimilarOriginWindowBinding::DissimilarO
use dom::bindings::error::{Error, ErrorResult};
use dom::bindings::inheritance::Castable;
use dom::bindings::js::{JS, MutNullableJS, Root};
-use dom::bindings::reflector::DomObject;
use dom::bindings::str::DOMString;
use dom::bindings::structuredclone::StructuredCloneData;
use dom::browsingcontext::BrowsingContext;
@@ -45,19 +44,18 @@ pub struct DissimilarOriginWindow {
impl DissimilarOriginWindow {
#[allow(unsafe_code)]
- pub fn new(browsing_context: &BrowsingContext) -> Root<DissimilarOriginWindow> {
- let globalscope = browsing_context.global();
- let cx = globalscope.get_cx();
+ pub fn new(global_to_clone_from: &GlobalScope, browsing_context: &BrowsingContext) -> Root<DissimilarOriginWindow> {
+ let cx = global_to_clone_from.get_cx();
// Any timer events fired on this window are ignored.
let (timer_event_chan, _) = ipc::channel().unwrap();
let win = box DissimilarOriginWindow {
globalscope: GlobalScope::new_inherited(PipelineId::new(),
- globalscope.devtools_chan().cloned(),
- globalscope.mem_profiler_chan().clone(),
- globalscope.time_profiler_chan().clone(),
- globalscope.constellation_chan().clone(),
- globalscope.scheduler_chan().clone(),
- globalscope.resource_threads().clone(),
+ global_to_clone_from.devtools_chan().cloned(),
+ global_to_clone_from.mem_profiler_chan().clone(),
+ global_to_clone_from.time_profiler_chan().clone(),
+ global_to_clone_from.constellation_chan().clone(),
+ global_to_clone_from.scheduler_chan().clone(),
+ global_to_clone_from.resource_threads().clone(),
timer_event_chan),
browsing_context: JS::from_ref(browsing_context),
location: MutNullableJS::new(None),
@@ -84,14 +82,26 @@ impl DissimilarOriginWindowMethods for DissimilarOriginWindow {
// https://html.spec.whatwg.org/multipage/#dom-parent
fn GetParent(&self) -> Option<Root<BrowsingContext>> {
- // TODO: implement window.parent correctly for x-origin windows.
+ // Steps 1-3.
+ if self.browsing_context.is_discarded() {
+ return None;
+ }
+ // Step 4.
+ if let Some(parent) = self.browsing_context.parent() {
+ return Some(Root::from_ref(parent));
+ }
+ // Step 5.
Some(Root::from_ref(&*self.browsing_context))
}
// https://html.spec.whatwg.org/multipage/#dom-top
fn GetTop(&self) -> Option<Root<BrowsingContext>> {
- // TODO: implement window.top correctly for x-origin windows.
- Some(Root::from_ref(&*self.browsing_context))
+ // Steps 1-3.
+ if self.browsing_context.is_discarded() {
+ return None;
+ }
+ // Steps 4-5.
+ Some(Root::from_ref(self.browsing_context.top()))
}
// https://html.spec.whatwg.org/multipage/#dom-length
diff --git a/components/script/dom/window.rs b/components/script/dom/window.rs
index 440b188646e..3f89e7adf00 100644
--- a/components/script/dom/window.rs
+++ b/components/script/dom/window.rs
@@ -42,7 +42,7 @@ use dom::location::Location;
use dom::mediaquerylist::{MediaQueryList, WeakMediaQueryListVec};
use dom::messageevent::MessageEvent;
use dom::navigator::Navigator;
-use dom::node::{Node, NodeDamage, document_from_node, from_untrusted_node_address, window_from_node};
+use dom::node::{Node, NodeDamage, document_from_node, from_untrusted_node_address};
use dom::performance::Performance;
use dom::promise::Promise;
use dom::screen::Screen;
@@ -631,31 +631,35 @@ impl WindowMethods for Window {
// https://html.spec.whatwg.org/multipage/#dom-parent
fn GetParent(&self) -> Option<Root<BrowsingContext>> {
- // Steps 1. and 2.
- if self.maybe_browsing_context().map_or(true, |c| c.is_discarded()) {
+ // Steps 1-3.
+ let context = match self.maybe_browsing_context() {
+ Some(context) => context,
+ None => return None,
+ };
+ if context.is_discarded() {
return None;
}
- match self.parent() {
- // Step 4.
- Some(parent) => Some(parent.Window()),
- // Step 5.
- None => Some(self.Window())
+ // Step 4.
+ if let Some(parent) = context.parent() {
+ return Some(Root::from_ref(parent));
}
- }
+ // Step 5.
+ Some(context)
+ }
// https://html.spec.whatwg.org/multipage/#dom-top
fn GetTop(&self) -> Option<Root<BrowsingContext>> {
- // Steps 1. and 2.
- if self.maybe_browsing_context().map_or(true, |c| c.is_discarded()) {
+ // Steps 1-3.
+ let context = match self.maybe_browsing_context() {
+ Some(context) => context,
+ None => return None,
+ };
+ if context.is_discarded() {
return None;
}
- // Step 5.
- let mut window = Root::from_ref(self);
- while let Some(parent) = window.parent() {
- window = parent;
- }
- Some(window.Window())
- }
+ // Steps 4-5.
+ Some(Root::from_ref(context.top()))
+ }
// https://dvcs.w3.org/hg/webperf/raw-file/tip/specs/
// NavigationTiming/Overview.html#sec-window.performance-attribute
@@ -1657,16 +1661,6 @@ impl Window {
}
}
- // https://html.spec.whatwg.org/multipage/#parent-browsing-context
- pub fn parent(&self) -> Option<Root<Window>> {
- if self.is_top_level() {
- return None;
- }
-
- self.browsing_context().frame_element()
- .map(|frame_element| window_from_node(frame_element))
- }
-
/// Returns whether this window is mozbrowser.
pub fn is_mozbrowser(&self) -> bool {
PREFS.is_mozbrowser_enabled() && self.parent_info().is_none()
diff --git a/components/script/script_thread.rs b/components/script/script_thread.rs
index 0e8e4ceadca..ac96836d92a 100644
--- a/components/script/script_thread.rs
+++ b/components/script/script_thread.rs
@@ -1650,6 +1650,77 @@ impl ScriptThread {
}
}
+ fn ask_constellation_for_frame_id(&self, pipeline_id: PipelineId) -> Option<FrameId> {
+ let (result_sender, result_receiver) = ipc::channel().unwrap();
+ let msg = ConstellationMsg::GetFrameId(pipeline_id, result_sender);
+ self.constellation_chan.send(msg).expect("Failed to send to constellation.");
+ result_receiver.recv().expect("Failed to get frame id from constellation.")
+ }
+
+ fn ask_constellation_for_parent_info(&self, pipeline_id: PipelineId) -> Option<(PipelineId, FrameType)> {
+ let (result_sender, result_receiver) = ipc::channel().unwrap();
+ let msg = ConstellationMsg::GetParentInfo(pipeline_id, result_sender);
+ self.constellation_chan.send(msg).expect("Failed to send to constellation.");
+ result_receiver.recv().expect("Failed to get frame id from constellation.")
+ }
+
+ // Get the browsing context for a pipeline that may exist in another
+ // script thread. If the browsing context already exists in the
+ // `browsing_contexts` map, we return it, otherwise we recursively
+ // get the browsing context for the parent if there is one,
+ // construct a new dissimilar-origin browsing context, add it
+ // to the `browsing_contexts` map, and return it.
+ fn remote_browsing_context(&self,
+ global_to_clone: &GlobalScope,
+ pipeline_id: PipelineId)
+ -> Option<Root<BrowsingContext>>
+ {
+ let frame_id = match self.ask_constellation_for_frame_id(pipeline_id) {
+ Some(frame_id) => frame_id,
+ None => return None,
+ };
+ if let Some(browsing_context) = self.browsing_contexts.borrow().get(&frame_id) {
+ return Some(Root::from_ref(browsing_context));
+ }
+ let parent = match self.ask_constellation_for_parent_info(pipeline_id) {
+ Some((parent_id, FrameType::IFrame)) => self.remote_browsing_context(global_to_clone, parent_id),
+ _ => None,
+ };
+ let browsing_context = BrowsingContext::new_dissimilar_origin(global_to_clone, frame_id, parent.r());
+ self.browsing_contexts.borrow_mut().insert(frame_id, JS::from_ref(&*browsing_context));
+ Some(browsing_context)
+ }
+
+ // Get the browsing context for a pipeline that exists in this
+ // script thread. If the browsing context already exists in the
+ // `browsing_contexts` map, we return it, otherwise we recursively
+ // get the browsing context for the parent if there is one,
+ // construct a new similar-origin browsing context, add it
+ // to the `browsing_contexts` map, and return it.
+ fn local_browsing_context(&self,
+ window: &Window,
+ frame_id: FrameId,
+ parent_info: Option<(PipelineId, FrameType)>)
+ -> Root<BrowsingContext>
+ {
+ if let Some(browsing_context) = self.browsing_contexts.borrow().get(&frame_id) {
+ browsing_context.set_currently_active(&*window);
+ return Root::from_ref(browsing_context);
+ }
+ let iframe = match parent_info {
+ Some((parent_id, FrameType::IFrame)) => self.documents.borrow().find_iframe(parent_id, frame_id),
+ _ => None,
+ };
+ let parent = match (parent_info, iframe.as_ref()) {
+ (_, Some(iframe)) => Some(window_from_node(&**iframe).browsing_context()),
+ (Some((parent_id, FrameType::IFrame)), _) => self.remote_browsing_context(window.upcast(), parent_id),
+ _ => None,
+ };
+ let browsing_context = BrowsingContext::new(&window, frame_id, iframe.r().map(Castable::upcast), parent.r());
+ self.browsing_contexts.borrow_mut().insert(frame_id, JS::from_ref(&*browsing_context));
+ browsing_context
+ }
+
/// The entry point to document loading. Defines bindings, sets up the window and document
/// objects, parses HTML and CSS, and kicks off initial layout.
fn load(&self, metadata: Metadata, incomplete: InProgressLoad) -> Root<ServoParser> {
@@ -1667,17 +1738,6 @@ impl ScriptThread {
}
debug!("ScriptThread: loading {} on pipeline {:?}", incomplete.url, incomplete.pipeline_id);
- let frame_element = incomplete.parent_info.and_then(|(parent_id, _)|
- // In the case a parent id exists but the matching context
- // cannot be found, this means the context exists in a different
- // script thread (due to origin) so it shouldn't be returned.
- // TODO: window.parent will continue to return self in that
- // case, which is wrong. We should be returning an object that
- // denies access to most properties (per
- // https://github.com/servo/servo/issues/3939#issuecomment-62287025).
- self.documents.borrow().find_iframe(parent_id, incomplete.frame_id)
- );
-
let MainThreadScriptChan(ref sender) = self.chan;
let DOMManipulationTaskSource(ref dom_sender) = self.dom_manipulation_task_source;
let UserInteractionTaskSource(ref user_sender) = self.user_interaction_task_source;
@@ -1711,20 +1771,10 @@ impl ScriptThread {
incomplete.parent_info,
incomplete.window_size,
self.webvr_thread.clone());
- let frame_element = frame_element.r().map(Castable::upcast);
- match self.browsing_contexts.borrow_mut().entry(incomplete.frame_id) {
- hash_map::Entry::Vacant(entry) => {
- let browsing_context = BrowsingContext::new(&window, incomplete.frame_id, frame_element);
- entry.insert(JS::from_ref(&*browsing_context));
- window.init_browsing_context(&browsing_context);
- },
- hash_map::Entry::Occupied(entry) => {
- let browsing_context = entry.get();
- browsing_context.set_currently_active(&*window);
- window.init_browsing_context(browsing_context);
- },
- }
+ // Initialize the browsing context for the window.
+ let browsing_context = self.local_browsing_context(&window, incomplete.frame_id, incomplete.parent_info);
+ window.init_browsing_context(&browsing_context);
let last_modified = metadata.headers.as_ref().and_then(|headers| {
headers.get().map(|&LastModified(HttpDate(ref tm))| dom_last_modified(tm))
diff --git a/components/script_traits/script_msg.rs b/components/script_traits/script_msg.rs
index 2fd70174368..3e61fa8ae62 100644
--- a/components/script_traits/script_msg.rs
+++ b/components/script_traits/script_msg.rs
@@ -18,7 +18,7 @@ use euclid::point::Point2D;
use euclid::size::{Size2D, TypedSize2D};
use gfx_traits::ScrollRootId;
use ipc_channel::ipc::IpcSender;
-use msg::constellation_msg::{FrameId, PipelineId, TraversalDirection};
+use msg::constellation_msg::{FrameId, FrameType, PipelineId, TraversalDirection};
use msg::constellation_msg::{Key, KeyModifiers, KeyState};
use net_traits::CoreResourceMsg;
use net_traits::storage_thread::StorageType;
@@ -86,6 +86,10 @@ pub enum ScriptMsg {
ForwardEvent(PipelineId, CompositorEvent),
/// Requests that the constellation retrieve the current contents of the clipboard
GetClipboardContents(IpcSender<String>),
+ /// Get the frame id for a given pipeline.
+ GetFrameId(PipelineId, IpcSender<Option<FrameId>>),
+ /// Get the parent info for a given pipeline.
+ GetParentInfo(PipelineId, IpcSender<Option<(PipelineId, FrameType)>>),
/// <head> tag finished parsing
HeadParsed,
/// All pending loads are complete, and the `load` event for this pipeline
diff --git a/tests/wpt/metadata/html/browsers/browsing-the-web/navigating-across-documents/navigation_unload_data_url.html.ini b/tests/wpt/metadata/html/browsers/browsing-the-web/navigating-across-documents/navigation_unload_data_url.html.ini
deleted file mode 100644
index 147039e5d3e..00000000000
--- a/tests/wpt/metadata/html/browsers/browsing-the-web/navigating-across-documents/navigation_unload_data_url.html.ini
+++ /dev/null
@@ -1,6 +0,0 @@
-[navigation_unload_data_url.html]
- type: testharness
- expected: TIMEOUT
- [Same-origin navigation started from unload handler]
- expected: TIMEOUT
-
diff --git a/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini b/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini
index 33bef187cf3..114eb9738ea 100644
--- a/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini
+++ b/tests/wpt/metadata/html/browsers/origin/origin-of-data-document.html.ini
@@ -1,6 +1,5 @@
[origin-of-data-document.html]
type: testharness
- expected: TIMEOUT
[The origin of a 'data:' document in a frame is opaque.]
- expected: TIMEOUT
+ expected: FAIL
diff --git a/tests/wpt/mozilla/meta/mozilla/cross-origin-objects/cross-origin-objects.html.ini b/tests/wpt/mozilla/meta/mozilla/cross-origin-objects/cross-origin-objects.html.ini
deleted file mode 100644
index f6b85f3148c..00000000000
--- a/tests/wpt/mozilla/meta/mozilla/cross-origin-objects/cross-origin-objects.html.ini
+++ /dev/null
@@ -1,5 +0,0 @@
-[cross-origin-objects.html]
- type: testharness
- [Parentage of cross-origin windows]
- expected: FAIL
-