/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ use document_loader::{LoadBlocker, LoadType}; use dom::attr::Attr; use dom::bindings::cell::DomRefCell; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementErrorEventDetail; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementIconChangeEventDetail; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementLocationChangeEventDetail; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementOpenTabEventDetail; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementOpenWindowEventDetail; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementSecurityChangeDetail; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserElementVisibilityChangeEventDetail; use dom::bindings::codegen::Bindings::BrowserElementBinding::BrowserShowModalPromptEventDetail; use dom::bindings::codegen::Bindings::HTMLIFrameElementBinding; use dom::bindings::codegen::Bindings::HTMLIFrameElementBinding::HTMLIFrameElementMethods; use dom::bindings::codegen::Bindings::WindowBinding::WindowBinding::WindowMethods; use dom::bindings::conversions::ToJSValConvertible; use dom::bindings::error::{Error, ErrorResult, Fallible}; use dom::bindings::inheritance::Castable; use dom::bindings::refcounted::Trusted; use dom::bindings::reflector::DomObject; use dom::bindings::root::{LayoutDom, DomRoot, MutNullableDom}; use dom::bindings::str::DOMString; use dom::customevent::CustomEvent; use dom::document::Document; use dom::domtokenlist::DOMTokenList; use dom::element::{AttributeMutation, Element, RawLayoutElementHelpers}; use dom::event::Event; use dom::eventtarget::EventTarget; use dom::globalscope::GlobalScope; use dom::htmlelement::HTMLElement; use dom::node::{Node, NodeDamage, UnbindContext, document_from_node, window_from_node}; use dom::virtualmethods::VirtualMethods; use dom::window::{ReflowReason, Window}; use dom::windowproxy::WindowProxy; use dom_struct::dom_struct; use html5ever::{LocalName, Prefix}; use ipc_channel::ipc; use js::jsapi::{JSAutoCompartment, JSContext, MutableHandleValue}; use js::jsval::{NullValue, UndefinedValue}; use msg::constellation_msg::{FrameType, BrowsingContextId, PipelineId, TopLevelBrowsingContextId, TraversalDirection}; use net_traits::response::HttpsState; use script_layout_interface::message::ReflowGoal; use script_thread::ScriptThread; use script_traits::{IFrameLoadInfo, IFrameLoadInfoWithData, JsEvalResult, LoadData, UpdatePipelineIdReason}; use script_traits::{MozBrowserEvent, NewLayoutInfo, ScriptMsg}; use script_traits::IFrameSandboxState::{IFrameSandboxed, IFrameUnsandboxed}; use servo_atoms::Atom; use servo_config::prefs::PREFS; use servo_config::servo_version; use servo_url::ServoUrl; use std::cell::Cell; use style::attr::{AttrValue, LengthOrPercentageOrAuto}; use task_source::TaskSource; bitflags! { #[derive(JSTraceable, MallocSizeOf)] flags SandboxAllowance: u8 { const ALLOW_NOTHING = 0x00, const ALLOW_SAME_ORIGIN = 0x01, const ALLOW_TOP_NAVIGATION = 0x02, const ALLOW_FORMS = 0x04, const ALLOW_SCRIPTS = 0x08, const ALLOW_POINTER_LOCK = 0x10, const ALLOW_POPUPS = 0x20 } } #[derive(PartialEq)] pub enum NavigationType { InitialAboutBlank, Regular, } #[derive(PartialEq)] enum ProcessingMode { FirstTime, NotFirstTime, } #[dom_struct] pub struct HTMLIFrameElement { htmlelement: HTMLElement, top_level_browsing_context_id: Cell>, browsing_context_id: Cell>, pipeline_id: Cell>, pending_pipeline_id: Cell>, sandbox: MutNullableDom, sandbox_allowance: Cell>, load_blocker: DomRefCell>, visibility: Cell, } impl HTMLIFrameElement { pub fn is_sandboxed(&self) -> bool { self.sandbox_allowance.get().is_some() } /// , /// step 1. fn get_url(&self) -> ServoUrl { let element = self.upcast::(); element.get_attribute(&ns!(), &local_name!("src")).and_then(|src| { let url = src.value(); if url.is_empty() { None } else { document_from_node(self).base_url().join(&url).ok() } }).unwrap_or_else(|| ServoUrl::parse("about:blank").unwrap()) } pub fn navigate_or_reload_child_browsing_context(&self, mut load_data: Option, nav_type: NavigationType, replace: bool) { let sandboxed = if self.is_sandboxed() { IFrameSandboxed } else { IFrameUnsandboxed }; let browsing_context_id = match self.browsing_context_id() { None => return warn!("Navigating unattached iframe."), Some(id) => id, }; let top_level_browsing_context_id = match self.top_level_browsing_context_id() { None => return warn!("Navigating unattached iframe."), Some(id) => id, }; let document = document_from_node(self); let mut load_blocker = self.load_blocker.borrow_mut(); // Any oustanding load is finished from the point of view of the blocked // document; the new navigation will continue blocking it. LoadBlocker::terminate(&mut load_blocker); if let Some(ref mut load_data) = load_data { let is_javascript = load_data.url.scheme() == "javascript"; if is_javascript { let window_proxy = self.GetContentWindow(); if let Some(window_proxy) = window_proxy { ScriptThread::eval_js_url(&window_proxy.global(), load_data); } } } //TODO(#9592): Deal with the case where an iframe is being reloaded so url is None. // The iframe should always have access to the nested context's active // document URL through the browsing context. if let Some(ref load_data) = load_data { match load_data.js_eval_result { Some(JsEvalResult::NoContent) => (), _ => { *load_blocker = Some(LoadBlocker::new(&*document, LoadType::Subframe(load_data.url.clone()))); } }; } let window = window_from_node(self); let old_pipeline_id = self.pipeline_id(); let new_pipeline_id = PipelineId::new(); self.pending_pipeline_id.set(Some(new_pipeline_id)); let private_iframe = self.privatebrowsing(); let frame_type = if self.Mozbrowser() { FrameType::MozBrowserIFrame } else { FrameType::IFrame }; let global_scope = window.upcast::(); let load_info = IFrameLoadInfo { parent_pipeline_id: global_scope.pipeline_id(), browsing_context_id: browsing_context_id, top_level_browsing_context_id: top_level_browsing_context_id, new_pipeline_id: new_pipeline_id, is_private: private_iframe, frame_type: frame_type, replace: replace, }; match nav_type { NavigationType::InitialAboutBlank => { let (pipeline_sender, pipeline_receiver) = ipc::channel().unwrap(); global_scope .script_to_constellation_chan() .send(ScriptMsg::ScriptNewIFrame(load_info, pipeline_sender)) .unwrap(); let new_layout_info = NewLayoutInfo { parent_info: Some((global_scope.pipeline_id(), frame_type)), new_pipeline_id: new_pipeline_id, browsing_context_id: browsing_context_id, top_level_browsing_context_id: top_level_browsing_context_id, load_data: load_data.unwrap(), pipeline_port: pipeline_receiver, content_process_shutdown_chan: None, window_size: None, layout_threads: PREFS.get("layout.threads").as_u64().expect("count") as usize, }; self.pipeline_id.set(Some(new_pipeline_id)); ScriptThread::process_attach_layout(new_layout_info, document.origin().clone()); }, NavigationType::Regular => { let load_info = IFrameLoadInfoWithData { info: load_info, load_data: load_data, old_pipeline_id: old_pipeline_id, sandbox: sandboxed, }; global_scope .script_to_constellation_chan() .send(ScriptMsg::ScriptLoadedURLInIFrame(load_info)) .unwrap(); } } if PREFS.is_mozbrowser_enabled() { // https://developer.mozilla.org/en-US/docs/Web/Events/mozbrowserloadstart self.dispatch_mozbrowser_event(MozBrowserEvent::LoadStart); } } /// fn process_the_iframe_attributes(&self, mode: ProcessingMode) { // TODO: srcdoc let window = window_from_node(self); // https://github.com/whatwg/html/issues/490 if mode == ProcessingMode::FirstTime && !self.upcast::().has_attribute(&local_name!("src")) { let this = Trusted::new(self); let pipeline_id = self.pipeline_id().unwrap(); // FIXME(nox): Why are errors silenced here? let _ = window.dom_manipulation_task_source().queue( task!(iframe_load_event_steps: move || { this.root().iframe_load_event_steps(pipeline_id); }), window.upcast(), ); return; } let url = self.get_url(); // TODO: check ancestor browsing contexts for same URL let creator_pipeline_id = if url.as_str() == "about:blank" { Some(window.upcast::().pipeline_id()) } else { None }; let document = document_from_node(self); let load_data = LoadData::new(url, creator_pipeline_id, document.get_referrer_policy(), Some(document.url())); self.navigate_or_reload_child_browsing_context(Some(load_data), NavigationType::Regular, false); } #[allow(unsafe_code)] pub fn dispatch_mozbrowser_event(&self, event: MozBrowserEvent) { assert!(PREFS.is_mozbrowser_enabled()); if self.Mozbrowser() { let window = window_from_node(self); let custom_event = build_mozbrowser_custom_event(&window, event); custom_event.upcast::().fire(self.upcast()); } } fn create_nested_browsing_context(&self) { // Synchronously create a new context and navigate it to about:blank. let url = ServoUrl::parse("about:blank").unwrap(); let document = document_from_node(self); let window = window_from_node(self); let pipeline_id = Some(window.upcast::().pipeline_id()); let load_data = LoadData::new(url, pipeline_id, document.get_referrer_policy(), Some(document.url().clone())); let (browsing_context_id, top_level_browsing_context_id) = if self.Mozbrowser() { let top_level_browsing_context_id = TopLevelBrowsingContextId::new(); (BrowsingContextId::from(top_level_browsing_context_id), top_level_browsing_context_id) } else { (BrowsingContextId::new(), window.window_proxy().top_level_browsing_context_id()) }; self.pipeline_id.set(None); self.pending_pipeline_id.set(None); self.top_level_browsing_context_id.set(Some(top_level_browsing_context_id)); self.browsing_context_id.set(Some(browsing_context_id)); self.navigate_or_reload_child_browsing_context(Some(load_data), NavigationType::InitialAboutBlank, false); } fn destroy_nested_browsing_context(&self) { self.pipeline_id.set(None); self.pending_pipeline_id.set(None); self.top_level_browsing_context_id.set(None); self.browsing_context_id.set(None); } pub fn update_pipeline_id(&self, new_pipeline_id: PipelineId, reason: UpdatePipelineIdReason) { if self.pending_pipeline_id.get() != Some(new_pipeline_id) && reason == UpdatePipelineIdReason::Navigation { return; } self.pipeline_id.set(Some(new_pipeline_id)); // Only terminate the load blocker if the pipeline id was updated due to a traversal. // The load blocker will be terminated for a navigation in iframe_load_event_steps. if reason == UpdatePipelineIdReason::Traversal { let mut blocker = self.load_blocker.borrow_mut(); LoadBlocker::terminate(&mut blocker); } self.upcast::().dirty(NodeDamage::OtherNodeDamage); let window = window_from_node(self); window.reflow(ReflowGoal::Full, ReflowReason::FramedContentChanged); } fn new_inherited(local_name: LocalName, prefix: Option, document: &Document) -> HTMLIFrameElement { HTMLIFrameElement { htmlelement: HTMLElement::new_inherited(local_name, prefix, document), browsing_context_id: Cell::new(None), top_level_browsing_context_id: Cell::new(None), pipeline_id: Cell::new(None), pending_pipeline_id: Cell::new(None), sandbox: Default::default(), sandbox_allowance: Cell::new(None), load_blocker: DomRefCell::new(None), visibility: Cell::new(true), } } #[allow(unrooted_must_root)] pub fn new(local_name: LocalName, prefix: Option, document: &Document) -> DomRoot { Node::reflect_node(Box::new(HTMLIFrameElement::new_inherited(local_name, prefix, document)), document, HTMLIFrameElementBinding::Wrap) } #[inline] pub fn pipeline_id(&self) -> Option { self.pipeline_id.get() } #[inline] pub fn browsing_context_id(&self) -> Option { self.browsing_context_id.get() } #[inline] pub fn top_level_browsing_context_id(&self) -> Option { self.top_level_browsing_context_id.get() } pub fn change_visibility_status(&self, visibility: bool) { if self.visibility.get() != visibility { self.visibility.set(visibility); // Visibility changes are only exposed to Mozbrowser iframes if self.Mozbrowser() { self.dispatch_mozbrowser_event(MozBrowserEvent::VisibilityChange(visibility)); } } } pub fn set_visible(&self, visible: bool) { let msg = ScriptMsg::SetVisible(visible); let window = window_from_node(self); window.upcast::().script_to_constellation_chan().send(msg).unwrap(); } /// https://html.spec.whatwg.org/multipage/#iframe-load-event-steps steps 1-4 pub fn iframe_load_event_steps(&self, loaded_pipeline: PipelineId) { // TODO(#9592): assert that the load blocker is present at all times when we // can guarantee that it's created for the case of iframe.reload(). if Some(loaded_pipeline) != self.pending_pipeline_id.get() { return; } // TODO A cross-origin child document would not be easily accessible // from this script thread. It's unclear how to implement // steps 2, 3, and 5 efficiently in this case. // TODO Step 2 - check child document `mute iframe load` flag // TODO Step 3 - set child document `mut iframe load` flag // Step 4 self.upcast::().fire_event(atom!("load")); let mut blocker = self.load_blocker.borrow_mut(); LoadBlocker::terminate(&mut blocker); // TODO Step 5 - unset child document `mut iframe load` flag let window = window_from_node(self); window.reflow(ReflowGoal::Full, ReflowReason::IFrameLoadEvent); } /// Check whether the iframe has the mozprivatebrowsing attribute set pub fn privatebrowsing(&self) -> bool { if self.Mozbrowser() { let element = self.upcast::(); element.has_attribute(&LocalName::from("mozprivatebrowsing")) } else { false } } } pub trait HTMLIFrameElementLayoutMethods { fn pipeline_id(&self) -> Option; fn browsing_context_id(&self) -> Option; fn get_width(&self) -> LengthOrPercentageOrAuto; fn get_height(&self) -> LengthOrPercentageOrAuto; } impl HTMLIFrameElementLayoutMethods for LayoutDom { #[inline] #[allow(unsafe_code)] fn pipeline_id(&self) -> Option { unsafe { (*self.unsafe_get()).pipeline_id.get() } } #[inline] #[allow(unsafe_code)] fn browsing_context_id(&self) -> Option { unsafe { (*self.unsafe_get()).browsing_context_id.get() } } #[allow(unsafe_code)] fn get_width(&self) -> LengthOrPercentageOrAuto { unsafe { (*self.upcast::().unsafe_get()) .get_attr_for_layout(&ns!(), &local_name!("width")) .map(AttrValue::as_dimension) .cloned() .unwrap_or(LengthOrPercentageOrAuto::Auto) } } #[allow(unsafe_code)] fn get_height(&self) -> LengthOrPercentageOrAuto { unsafe { (*self.upcast::().unsafe_get()) .get_attr_for_layout(&ns!(), &local_name!("height")) .map(AttrValue::as_dimension) .cloned() .unwrap_or(LengthOrPercentageOrAuto::Auto) } } } #[allow(unsafe_code)] pub fn build_mozbrowser_custom_event(window: &Window, event: MozBrowserEvent) -> DomRoot { // TODO(gw): Support mozbrowser event types that have detail which is not a string. // See https://developer.mozilla.org/en-US/docs/Web/API/Using_the_Browser_API // for a list of mozbrowser events. let cx = window.get_cx(); let _ac = JSAutoCompartment::new(cx, window.reflector().get_jsobject().get()); rooted!(in(cx) let mut detail = UndefinedValue()); let event_name = Atom::from(event.name()); unsafe { build_mozbrowser_event_detail(event, cx, detail.handle_mut()); } CustomEvent::new(window.upcast(), event_name, true, true, detail.handle()) } #[allow(unsafe_code)] unsafe fn build_mozbrowser_event_detail(event: MozBrowserEvent, cx: *mut JSContext, rval: MutableHandleValue) { match event { MozBrowserEvent::AsyncScroll | MozBrowserEvent::Close | MozBrowserEvent::ContextMenu | MozBrowserEvent::LoadEnd | MozBrowserEvent::LoadStart | MozBrowserEvent::Connected | MozBrowserEvent::OpenSearch | MozBrowserEvent::UsernameAndPasswordRequired => { rval.set(NullValue()); } MozBrowserEvent::Error(error_type, description, report) => { BrowserElementErrorEventDetail { type_: Some(DOMString::from(error_type.name())), description: Some(DOMString::from(description)), report: Some(DOMString::from(report)), version: Some(DOMString::from_string(servo_version())), }.to_jsval(cx, rval); }, MozBrowserEvent::SecurityChange(https_state) => { BrowserElementSecurityChangeDetail { // https://developer.mozilla.org/en-US/docs/Web/Events/mozbrowsersecuritychange state: Some(DOMString::from(match https_state { HttpsState::Modern => "secure", HttpsState::Deprecated => "broken", HttpsState::None => "insecure", }.to_owned())), // FIXME - Not supported yet: trackingContent: None, mixedContent: None, trackingState: None, extendedValidation: None, mixedState: None, }.to_jsval(cx, rval); } MozBrowserEvent::TitleChange(ref string) => { string.to_jsval(cx, rval); } MozBrowserEvent::LocationChange(url, can_go_back, can_go_forward) => { BrowserElementLocationChangeEventDetail { url: Some(DOMString::from(url)), canGoBack: Some(can_go_back), canGoForward: Some(can_go_forward), }.to_jsval(cx, rval); } MozBrowserEvent::OpenTab(url) => { BrowserElementOpenTabEventDetail { url: Some(DOMString::from(url)), }.to_jsval(cx, rval); } MozBrowserEvent::OpenWindow(url, target, features) => { BrowserElementOpenWindowEventDetail { url: Some(DOMString::from(url)), target: target.map(DOMString::from), features: features.map(DOMString::from), }.to_jsval(cx, rval); } MozBrowserEvent::IconChange(rel, href, sizes) => { BrowserElementIconChangeEventDetail { rel: Some(DOMString::from(rel)), href: Some(DOMString::from(href)), sizes: Some(DOMString::from(sizes)), }.to_jsval(cx, rval); } MozBrowserEvent::ShowModalPrompt(prompt_type, title, message, return_value) => { BrowserShowModalPromptEventDetail { promptType: Some(DOMString::from(prompt_type)), title: Some(DOMString::from(title)), message: Some(DOMString::from(message)), returnValue: Some(DOMString::from(return_value)), }.to_jsval(cx, rval) } MozBrowserEvent::VisibilityChange(visibility) => { BrowserElementVisibilityChangeEventDetail { visible: Some(visibility), }.to_jsval(cx, rval); } } } pub fn Navigate(iframe: &HTMLIFrameElement, direction: TraversalDirection) -> ErrorResult { if iframe.Mozbrowser() { if let Some(_) = iframe.top_level_browsing_context_id() { let window = window_from_node(iframe); let msg = ScriptMsg::TraverseHistory(direction); window.upcast::().script_to_constellation_chan().send(msg).unwrap(); return Ok(()); } } debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top", "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)")); Err(Error::NotSupported) } impl HTMLIFrameElementMethods for HTMLIFrameElement { // https://html.spec.whatwg.org/multipage/#dom-iframe-src make_url_getter!(Src, "src"); // https://html.spec.whatwg.org/multipage/#dom-iframe-src make_setter!(SetSrc, "src"); // https://html.spec.whatwg.org/multipage/#dom-iframe-sandbox fn Sandbox(&self) -> DomRoot { self.sandbox.or_init(|| DOMTokenList::new(self.upcast::(), &local_name!("sandbox"))) } // https://html.spec.whatwg.org/multipage/#dom-iframe-contentwindow fn GetContentWindow(&self) -> Option> { self.browsing_context_id.get() .and_then(|browsing_context_id| ScriptThread::find_window_proxy(browsing_context_id)) } // https://html.spec.whatwg.org/multipage/#dom-iframe-contentdocument // https://html.spec.whatwg.org/multipage/#concept-bcc-content-document fn GetContentDocument(&self) -> Option> { // Step 1. let pipeline_id = self.pipeline_id.get()?; // Step 2-3. // Note that this lookup will fail if the document is dissimilar-origin, // so we should return None in that case. let document = ScriptThread::find_document(pipeline_id)?; // Step 4. let current = GlobalScope::current().expect("No current global object").as_window().Document(); if !current.origin().same_origin_domain(document.origin()) { return None; } // Step 5. Some(document) } // Experimental mozbrowser implementation is based on the webidl // present in the gecko source tree, and the documentation here: // https://developer.mozilla.org/en-US/docs/Web/API/Using_the_Browser_API // https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-mozbrowser fn Mozbrowser(&self) -> bool { if window_from_node(self).is_mozbrowser() { let element = self.upcast::(); element.has_attribute(&local_name!("mozbrowser")) } else { false } } // https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-mozbrowser fn SetMozbrowser(&self, value: bool) { let element = self.upcast::(); element.set_bool_attribute(&local_name!("mozbrowser"), value); } // https://html.spec.whatwg.org/multipage/#attr-iframe-allowfullscreen make_bool_getter!(AllowFullscreen, "allowfullscreen"); // https://html.spec.whatwg.org/multipage/#attr-iframe-allowfullscreen make_bool_setter!(SetAllowFullscreen, "allowfullscreen"); // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/goBack fn GoBack(&self) -> ErrorResult { Navigate(self, TraversalDirection::Back(1)) } // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/goForward fn GoForward(&self) -> ErrorResult { Navigate(self, TraversalDirection::Forward(1)) } // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/reload fn Reload(&self, _hard_reload: bool) -> ErrorResult { if self.Mozbrowser() { if self.upcast::().is_in_doc_with_browsing_context() { self.navigate_or_reload_child_browsing_context(None, NavigationType::Regular, true); } Ok(()) } else { debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top", "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)")); Err(Error::NotSupported) } } // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/setVisible fn SetVisible(&self, visible: bool) -> ErrorResult { if self.Mozbrowser() { self.set_visible(visible); Ok(()) } else { debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top", "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)")); Err(Error::NotSupported) } } // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/getVisible fn GetVisible(&self) -> Fallible { if self.Mozbrowser() { Ok(self.visibility.get()) } else { debug!(concat!("this frame is not mozbrowser: mozbrowser attribute missing, or not a top", "level window, or mozbrowser preference not set (use --pref dom.mozbrowser.enabled)")); Err(Error::NotSupported) } } // https://developer.mozilla.org/en-US/docs/Web/API/HTMLIFrameElement/stop fn Stop(&self) -> ErrorResult { Err(Error::NotSupported) } // https://html.spec.whatwg.org/multipage/#dom-dim-width make_getter!(Width, "width"); // https://html.spec.whatwg.org/multipage/#dom-dim-width make_dimension_setter!(SetWidth, "width"); // https://html.spec.whatwg.org/multipage/#dom-dim-height make_getter!(Height, "height"); // https://html.spec.whatwg.org/multipage/#dom-dim-height make_dimension_setter!(SetHeight, "height"); // https://html.spec.whatwg.org/multipage/#other-elements,-attributes-and-apis:attr-iframe-frameborder make_getter!(FrameBorder, "frameborder"); // https://html.spec.whatwg.org/multipage/#other-elements,-attributes-and-apis:attr-iframe-frameborder make_setter!(SetFrameBorder, "frameborder"); // check-tidy: no specs after this line fn SetMozprivatebrowsing(&self, value: bool) { let element = self.upcast::(); element.set_bool_attribute(&LocalName::from("mozprivatebrowsing"), value); } fn Mozprivatebrowsing(&self) -> bool { if window_from_node(self).is_mozbrowser() { let element = self.upcast::(); element.has_attribute(&LocalName::from("mozprivatebrowsing")) } else { false } } } impl VirtualMethods for HTMLIFrameElement { fn super_type(&self) -> Option<&VirtualMethods> { Some(self.upcast::() as &VirtualMethods) } fn attribute_mutated(&self, attr: &Attr, mutation: AttributeMutation) { self.super_type().unwrap().attribute_mutated(attr, mutation); match attr.local_name() { &local_name!("sandbox") => { self.sandbox_allowance.set(mutation.new_value(attr).map(|value| { let mut modes = ALLOW_NOTHING; for token in value.as_tokens() { modes |= match &*token.to_ascii_lowercase() { "allow-same-origin" => ALLOW_SAME_ORIGIN, "allow-forms" => ALLOW_FORMS, "allow-pointer-lock" => ALLOW_POINTER_LOCK, "allow-popups" => ALLOW_POPUPS, "allow-scripts" => ALLOW_SCRIPTS, "allow-top-navigation" => ALLOW_TOP_NAVIGATION, _ => ALLOW_NOTHING }; } modes })); }, &local_name!("src") => { // https://html.spec.whatwg.org/multipage/#the-iframe-element // "Similarly, whenever an iframe element with a non-null nested browsing context // but with no srcdoc attribute specified has its src attribute set, changed, or removed, // the user agent must process the iframe attributes," // but we can't check that directly, since the child browsing context // may be in a different script thread. Instread, we check to see if the parent // is in a document tree and has a browsing context, which is what causes // the child browsing context to be created. if self.upcast::().is_in_doc_with_browsing_context() { debug!("iframe src set while in browsing context."); self.process_the_iframe_attributes(ProcessingMode::NotFirstTime); } }, _ => {}, } } fn parse_plain_attribute(&self, name: &LocalName, value: DOMString) -> AttrValue { match name { &local_name!("sandbox") => AttrValue::from_serialized_tokenlist(value.into()), &local_name!("width") => AttrValue::from_dimension(value.into()), &local_name!("height") => AttrValue::from_dimension(value.into()), _ => self.super_type().unwrap().parse_plain_attribute(name, value), } } fn bind_to_tree(&self, tree_in_doc: bool) { if let Some(ref s) = self.super_type() { s.bind_to_tree(tree_in_doc); } // https://html.spec.whatwg.org/multipage/#the-iframe-element // "When an iframe element is inserted into a document that has // a browsing context, the user agent must create a new // browsing context, set the element's nested browsing context // to the newly-created browsing context, and then process the // iframe attributes for the "first time"." if self.upcast::().is_in_doc_with_browsing_context() { debug!("iframe bound to browsing context."); debug_assert!(tree_in_doc, "is_in_doc_with_bc, but not tree_in_doc"); self.create_nested_browsing_context(); self.process_the_iframe_attributes(ProcessingMode::FirstTime); } } fn unbind_from_tree(&self, context: &UnbindContext) { self.super_type().unwrap().unbind_from_tree(context); let mut blocker = self.load_blocker.borrow_mut(); LoadBlocker::terminate(&mut blocker); // https://html.spec.whatwg.org/multipage/#a-browsing-context-is-discarded let window = window_from_node(self); let (sender, receiver) = ipc::channel().unwrap(); // Ask the constellation to remove the iframe, and tell us the // pipeline ids of the closed pipelines. let browsing_context_id = match self.browsing_context_id() { None => return warn!("Unbinding already unbound iframe."), Some(id) => id, }; debug!("Unbinding frame {}.", browsing_context_id); let msg = ScriptMsg::RemoveIFrame(browsing_context_id, sender); window.upcast::().script_to_constellation_chan().send(msg).unwrap(); let exited_pipeline_ids = receiver.recv().unwrap(); // The spec for discarding is synchronous, // so we need to discard the browsing contexts now, rather than // when the `PipelineExit` message arrives. for exited_pipeline_id in exited_pipeline_ids { if let Some(exited_document) = ScriptThread::find_document(exited_pipeline_id) { debug!("Discarding browsing context for pipeline {}", exited_pipeline_id); exited_document.window().window_proxy().discard_browsing_context(); for exited_iframe in exited_document.iter_iframes() { debug!("Discarding nested browsing context"); exited_iframe.destroy_nested_browsing_context(); } } } // Resetting the pipeline_id to None is required here so that // if this iframe is subsequently re-added to the document // the load doesn't think that it's a navigation, but instead // a new iframe. Without this, the constellation gets very // confused. self.destroy_nested_browsing_context(); } }