blob: 064d2a4ef69eaeb48a31a737ec32fc185b44d4bd [file] [log] [blame]
/*
* Copyright (C) 2006, 2007, 2008, 2010, 2013 Apple Inc. All rights reserved.
* Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies)
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "DOMWindow.h"
#include "BackForwardController.h"
#include "BarProp.h"
#include "BeforeUnloadEvent.h"
#include "CSSComputedStyleDeclaration.h"
#include "CSSRule.h"
#include "CSSRuleList.h"
#include "Chrome.h"
#include "ChromeClient.h"
#include "Console.h"
#include "Crypto.h"
#include "DOMApplicationCache.h"
#include "DOMSelection.h"
#include "DOMSettableTokenList.h"
#include "DOMStringList.h"
#include "DOMTimer.h"
#include "DOMTokenList.h"
#include "DOMURL.h"
#include "DOMWindowCSS.h"
#include "DOMWindowExtension.h"
#include "DOMWindowNotifications.h"
#include "DeviceMotionController.h"
#include "DeviceOrientationController.h"
#include "Document.h"
#include "DocumentLoader.h"
#include "Editor.h"
#include "Element.h"
#include "EventException.h"
#include "EventHandler.h"
#include "EventListener.h"
#include "EventNames.h"
#include "ExceptionCode.h"
#include "ExceptionCodePlaceholder.h"
#include "FloatRect.h"
#include "FocusController.h"
#include "FrameLoadRequest.h"
#include "FrameLoader.h"
#include "FrameLoaderClient.h"
#include "FrameTree.h"
#include "FrameView.h"
#include "HTMLFrameOwnerElement.h"
#include "History.h"
#include "InspectorInstrumentation.h"
#include "URL.h"
#include "Location.h"
#include "MainFrame.h"
#include "MediaQueryList.h"
#include "MediaQueryMatcher.h"
#include "MessageEvent.h"
#include "Navigator.h"
#include "Page.h"
#include "PageConsole.h"
#include "PageGroup.h"
#include "PageTransitionEvent.h"
#include "Performance.h"
#include "PlatformScreen.h"
#include "RuntimeEnabledFeatures.h"
#include "ScheduledAction.h"
#include "Screen.h"
#include "ScriptCallStack.h"
#include "ScriptCallStackFactory.h"
#include "ScriptController.h"
#include "SecurityOrigin.h"
#include "SecurityPolicy.h"
#include "SerializedScriptValue.h"
#include "Settings.h"
#include "Storage.h"
#include "StorageArea.h"
#include "StorageNamespace.h"
#include "StyleMedia.h"
#include "StyleResolver.h"
#include "SuddenTermination.h"
#include "WebKitPoint.h"
#include "WindowFeatures.h"
#include "WindowFocusAllowedIndicator.h"
#include <algorithm>
#include <wtf/CurrentTime.h>
#include <wtf/MainThread.h>
#include <wtf/MathExtras.h>
#include <wtf/Ref.h>
#include <wtf/text/Base64.h>
#include <wtf/text/WTFString.h>
#if ENABLE(PROXIMITY_EVENTS)
#include "DeviceProximityController.h"
#endif
#if ENABLE(REQUEST_ANIMATION_FRAME)
#include "RequestAnimationFrameCallback.h"
#endif
namespace WebCore {
class PostMessageTimer : public TimerBase {
public:
PostMessageTimer(DOMWindow* window, PassRefPtr<SerializedScriptValue> message, const String& sourceOrigin, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortChannelArray> channels, SecurityOrigin* targetOrigin, PassRefPtr<ScriptCallStack> stackTrace)
: m_window(window)
, m_message(message)
, m_origin(sourceOrigin)
, m_source(source)
, m_channels(channels)
, m_targetOrigin(targetOrigin)
, m_stackTrace(stackTrace)
{
}
PassRefPtr<MessageEvent> event(ScriptExecutionContext* context)
{
OwnPtr<MessagePortArray> messagePorts = MessagePort::entanglePorts(*context, m_channels.release());
return MessageEvent::create(messagePorts.release(), m_message, m_origin, String(), m_source);
}
SecurityOrigin* targetOrigin() const { return m_targetOrigin.get(); }
ScriptCallStack* stackTrace() const { return m_stackTrace.get(); }
private:
virtual void fired()
{
m_window->postMessageTimerFired(adoptPtr(this));
// This object is deleted now.
}
RefPtr<DOMWindow> m_window;
RefPtr<SerializedScriptValue> m_message;
String m_origin;
RefPtr<DOMWindow> m_source;
OwnPtr<MessagePortChannelArray> m_channels;
RefPtr<SecurityOrigin> m_targetOrigin;
RefPtr<ScriptCallStack> m_stackTrace;
};
typedef HashCountedSet<DOMWindow*> DOMWindowSet;
static DOMWindowSet& windowsWithUnloadEventListeners()
{
DEFINE_STATIC_LOCAL(DOMWindowSet, windowsWithUnloadEventListeners, ());
return windowsWithUnloadEventListeners;
}
static DOMWindowSet& windowsWithBeforeUnloadEventListeners()
{
DEFINE_STATIC_LOCAL(DOMWindowSet, windowsWithBeforeUnloadEventListeners, ());
return windowsWithBeforeUnloadEventListeners;
}
static void addUnloadEventListener(DOMWindow* domWindow)
{
if (windowsWithUnloadEventListeners().add(domWindow).isNewEntry)
domWindow->disableSuddenTermination();
}
static void removeUnloadEventListener(DOMWindow* domWindow)
{
if (windowsWithUnloadEventListeners().remove(domWindow))
domWindow->enableSuddenTermination();
}
static void removeAllUnloadEventListeners(DOMWindow* domWindow)
{
if (windowsWithUnloadEventListeners().removeAll(domWindow))
domWindow->enableSuddenTermination();
}
static void addBeforeUnloadEventListener(DOMWindow* domWindow)
{
if (windowsWithBeforeUnloadEventListeners().add(domWindow).isNewEntry)
domWindow->disableSuddenTermination();
}
static void removeBeforeUnloadEventListener(DOMWindow* domWindow)
{
if (windowsWithBeforeUnloadEventListeners().remove(domWindow))
domWindow->enableSuddenTermination();
}
static void removeAllBeforeUnloadEventListeners(DOMWindow* domWindow)
{
if (windowsWithBeforeUnloadEventListeners().removeAll(domWindow))
domWindow->enableSuddenTermination();
}
static bool allowsBeforeUnloadListeners(DOMWindow* window)
{
ASSERT_ARG(window, window);
Frame* frame = window->frame();
if (!frame)
return false;
if (!frame->page())
return false;
return frame->isMainFrame();
}
bool DOMWindow::dispatchAllPendingBeforeUnloadEvents()
{
DOMWindowSet& set = windowsWithBeforeUnloadEventListeners();
if (set.isEmpty())
return true;
static bool alreadyDispatched = false;
ASSERT(!alreadyDispatched);
if (alreadyDispatched)
return true;
Vector<Ref<DOMWindow>> windows;
windows.reserveInitialCapacity(set.size());
for (auto it = set.begin(), end = set.end(); it != end; ++it)
windows.uncheckedAppend(*it->key);
for (unsigned i = 0; i < windows.size(); ++i) {
DOMWindow& window = windows[i].get();
if (!set.contains(&window))
continue;
Frame* frame = window.frame();
if (!frame)
continue;
if (!frame->loader().shouldClose())
return false;
window.enableSuddenTermination();
}
alreadyDispatched = true;
return true;
}
unsigned DOMWindow::pendingUnloadEventListeners() const
{
return windowsWithUnloadEventListeners().count(const_cast<DOMWindow*>(this));
}
void DOMWindow::dispatchAllPendingUnloadEvents()
{
DOMWindowSet& set = windowsWithUnloadEventListeners();
if (set.isEmpty())
return;
static bool alreadyDispatched = false;
ASSERT(!alreadyDispatched);
if (alreadyDispatched)
return;
Vector<Ref<DOMWindow>> windows;
windows.reserveInitialCapacity(set.size());
for (auto it = set.begin(), end = set.end(); it != end; ++it)
windows.uncheckedAppend(*it->key);
for (unsigned i = 0; i < windows.size(); ++i) {
DOMWindow& window = windows[i].get();
if (!set.contains(&window))
continue;
window.dispatchEvent(PageTransitionEvent::create(eventNames().pagehideEvent, false), window.document());
window.dispatchEvent(Event::create(eventNames().unloadEvent, false, false), window.document());
window.enableSuddenTermination();
}
alreadyDispatched = true;
}
// This function:
// 1) Validates the pending changes are not changing any value to NaN; in that case keep original value.
// 2) Constrains the window rect to the minimum window size and no bigger than the float rect's dimensions.
// 3) Constrains the window rect to within the top and left boundaries of the available screen rect.
// 4) Constrains the window rect to within the bottom and right boundaries of the available screen rect.
// 5) Translate the window rect coordinates to be within the coordinate space of the screen.
FloatRect DOMWindow::adjustWindowRect(Page* page, const FloatRect& pendingChanges)
{
ASSERT(page);
FloatRect screen = screenAvailableRect(page->mainFrame().view());
FloatRect window = page->chrome().windowRect();
// Make sure we're in a valid state before adjusting dimensions.
ASSERT(std::isfinite(screen.x()));
ASSERT(std::isfinite(screen.y()));
ASSERT(std::isfinite(screen.width()));
ASSERT(std::isfinite(screen.height()));
ASSERT(std::isfinite(window.x()));
ASSERT(std::isfinite(window.y()));
ASSERT(std::isfinite(window.width()));
ASSERT(std::isfinite(window.height()));
// Update window values if new requested values are not NaN.
if (!std::isnan(pendingChanges.x()))
window.setX(pendingChanges.x());
if (!std::isnan(pendingChanges.y()))
window.setY(pendingChanges.y());
if (!std::isnan(pendingChanges.width()))
window.setWidth(pendingChanges.width());
if (!std::isnan(pendingChanges.height()))
window.setHeight(pendingChanges.height());
FloatSize minimumSize = page->chrome().client().minimumWindowSize();
window.setWidth(std::min(std::max(minimumSize.width(), window.width()), screen.width()));
window.setHeight(std::min(std::max(minimumSize.height(), window.height()), screen.height()));
// Constrain the window position within the valid screen area.
window.setX(std::max(screen.x(), std::min(window.x(), screen.maxX() - window.width())));
window.setY(std::max(screen.y(), std::min(window.y(), screen.maxY() - window.height())));
return window;
}
bool DOMWindow::allowPopUp(Frame* firstFrame)
{
ASSERT(firstFrame);
if (ScriptController::processingUserGesture())
return true;
return firstFrame->settings().javaScriptCanOpenWindowsAutomatically();
}
bool DOMWindow::allowPopUp()
{
return m_frame && allowPopUp(m_frame);
}
bool DOMWindow::canShowModalDialog(const Frame* frame)
{
if (!frame)
return false;
Page* page = frame->page();
if (!page)
return false;
return page->chrome().canRunModal();
}
bool DOMWindow::canShowModalDialogNow(const Frame* frame)
{
if (!frame)
return false;
Page* page = frame->page();
if (!page)
return false;
return page->chrome().canRunModalNow();
}
DOMWindow::DOMWindow(Document* document)
: ContextDestructionObserver(document)
, FrameDestructionObserver(document->frame())
, m_shouldPrintWhenFinishedLoading(false)
, m_suspendedForPageCache(false)
{
ASSERT(frame());
ASSERT(DOMWindow::document());
}
void DOMWindow::didSecureTransitionTo(Document* document)
{
observeContext(document);
}
DOMWindow::~DOMWindow()
{
#ifndef NDEBUG
if (!m_suspendedForPageCache) {
ASSERT(!m_screen);
ASSERT(!m_history);
ASSERT(!m_crypto);
ASSERT(!m_locationbar);
ASSERT(!m_menubar);
ASSERT(!m_personalbar);
ASSERT(!m_scrollbars);
ASSERT(!m_statusbar);
ASSERT(!m_toolbar);
ASSERT(!m_console);
ASSERT(!m_navigator);
#if ENABLE(WEB_TIMING)
ASSERT(!m_performance);
#endif
ASSERT(!m_location);
ASSERT(!m_media);
ASSERT(!m_sessionStorage);
ASSERT(!m_localStorage);
ASSERT(!m_applicationCache);
}
#endif
if (m_suspendedForPageCache)
willDestroyCachedFrame();
else
willDestroyDocumentInFrame();
// As the ASSERTs above indicate, this reset should only be necessary if this DOMWindow is suspended for the page cache.
// But we don't want to risk any of these objects hanging around after we've been destroyed.
resetDOMWindowProperties();
removeAllUnloadEventListeners(this);
removeAllBeforeUnloadEventListeners(this);
}
DOMWindow* DOMWindow::toDOMWindow()
{
return this;
}
PassRefPtr<MediaQueryList> DOMWindow::matchMedia(const String& media)
{
return document() ? document()->mediaQueryMatcher().matchMedia(media) : 0;
}
Page* DOMWindow::page()
{
return frame() ? frame()->page() : 0;
}
void DOMWindow::frameDestroyed()
{
willDestroyDocumentInFrame();
FrameDestructionObserver::frameDestroyed();
resetDOMWindowProperties();
}
void DOMWindow::willDetachPage()
{
InspectorInstrumentation::frameWindowDiscarded(m_frame, this);
}
void DOMWindow::willDestroyCachedFrame()
{
// It is necessary to copy m_properties to a separate vector because the DOMWindowProperties may
// unregister themselves from the DOMWindow as a result of the call to willDestroyGlobalObjectInCachedFrame.
Vector<DOMWindowProperty*> properties;
copyToVector(m_properties, properties);
for (size_t i = 0; i < properties.size(); ++i)
properties[i]->willDestroyGlobalObjectInCachedFrame();
}
void DOMWindow::willDestroyDocumentInFrame()
{
// It is necessary to copy m_properties to a separate vector because the DOMWindowProperties may
// unregister themselves from the DOMWindow as a result of the call to willDestroyGlobalObjectInFrame.
Vector<DOMWindowProperty*> properties;
copyToVector(m_properties, properties);
for (size_t i = 0; i < properties.size(); ++i)
properties[i]->willDestroyGlobalObjectInFrame();
}
void DOMWindow::willDetachDocumentFromFrame()
{
// It is necessary to copy m_properties to a separate vector because the DOMWindowProperties may
// unregister themselves from the DOMWindow as a result of the call to willDetachGlobalObjectFromFrame.
Vector<DOMWindowProperty*> properties;
copyToVector(m_properties, properties);
for (size_t i = 0; i < properties.size(); ++i)
properties[i]->willDetachGlobalObjectFromFrame();
}
void DOMWindow::registerProperty(DOMWindowProperty* property)
{
m_properties.add(property);
}
void DOMWindow::unregisterProperty(DOMWindowProperty* property)
{
m_properties.remove(property);
}
void DOMWindow::resetUnlessSuspendedForPageCache()
{
if (m_suspendedForPageCache)
return;
willDestroyDocumentInFrame();
resetDOMWindowProperties();
}
void DOMWindow::suspendForPageCache()
{
disconnectDOMWindowProperties();
m_suspendedForPageCache = true;
}
void DOMWindow::resumeFromPageCache()
{
reconnectDOMWindowProperties();
m_suspendedForPageCache = false;
}
void DOMWindow::disconnectDOMWindowProperties()
{
// It is necessary to copy m_properties to a separate vector because the DOMWindowProperties may
// unregister themselves from the DOMWindow as a result of the call to disconnectFrameForPageCache.
Vector<DOMWindowProperty*> properties;
copyToVector(m_properties, properties);
for (size_t i = 0; i < properties.size(); ++i)
properties[i]->disconnectFrameForPageCache();
}
void DOMWindow::reconnectDOMWindowProperties()
{
ASSERT(m_suspendedForPageCache);
// It is necessary to copy m_properties to a separate vector because the DOMWindowProperties may
// unregister themselves from the DOMWindow as a result of the call to reconnectFromPageCache.
Vector<DOMWindowProperty*> properties;
copyToVector(m_properties, properties);
for (size_t i = 0; i < properties.size(); ++i)
properties[i]->reconnectFrameFromPageCache(m_frame);
}
void DOMWindow::resetDOMWindowProperties()
{
m_properties.clear();
m_screen = 0;
m_history = 0;
m_crypto = 0;
m_locationbar = 0;
m_menubar = 0;
m_personalbar = 0;
m_scrollbars = 0;
m_statusbar = 0;
m_toolbar = 0;
m_console = 0;
m_navigator = 0;
#if ENABLE(WEB_TIMING)
m_performance = 0;
#endif
m_location = 0;
m_media = 0;
m_sessionStorage = 0;
m_localStorage = 0;
m_applicationCache = 0;
}
bool DOMWindow::isCurrentlyDisplayedInFrame() const
{
return m_frame && m_frame->document()->domWindow() == this;
}
#if ENABLE(ORIENTATION_EVENTS)
int DOMWindow::orientation() const
{
if (!m_frame)
return 0;
return m_frame->orientation();
}
#endif
Screen* DOMWindow::screen() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_screen)
m_screen = Screen::create(m_frame);
return m_screen.get();
}
History* DOMWindow::history() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_history)
m_history = History::create(m_frame);
return m_history.get();
}
Crypto* DOMWindow::crypto() const
{
// FIXME: Why is crypto not available when the window is not currently displayed in a frame?
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_crypto)
m_crypto = Crypto::create(*document());
return m_crypto.get();
}
BarProp* DOMWindow::locationbar() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_locationbar)
m_locationbar = BarProp::create(m_frame, BarProp::Locationbar);
return m_locationbar.get();
}
BarProp* DOMWindow::menubar() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_menubar)
m_menubar = BarProp::create(m_frame, BarProp::Menubar);
return m_menubar.get();
}
BarProp* DOMWindow::personalbar() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_personalbar)
m_personalbar = BarProp::create(m_frame, BarProp::Personalbar);
return m_personalbar.get();
}
BarProp* DOMWindow::scrollbars() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_scrollbars)
m_scrollbars = BarProp::create(m_frame, BarProp::Scrollbars);
return m_scrollbars.get();
}
BarProp* DOMWindow::statusbar() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_statusbar)
m_statusbar = BarProp::create(m_frame, BarProp::Statusbar);
return m_statusbar.get();
}
BarProp* DOMWindow::toolbar() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_toolbar)
m_toolbar = BarProp::create(m_frame, BarProp::Toolbar);
return m_toolbar.get();
}
Console* DOMWindow::console() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_console)
m_console = Console::create(m_frame);
return m_console.get();
}
PageConsole* DOMWindow::pageConsole() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
return m_frame->page() ? &m_frame->page()->console() : 0;
}
DOMApplicationCache* DOMWindow::applicationCache() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_applicationCache)
m_applicationCache = DOMApplicationCache::create(m_frame);
return m_applicationCache.get();
}
Navigator* DOMWindow::navigator() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_navigator)
m_navigator = Navigator::create(m_frame);
return m_navigator.get();
}
#if ENABLE(WEB_TIMING)
Performance* DOMWindow::performance() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_performance)
m_performance = Performance::create(m_frame);
return m_performance.get();
}
#endif
Location* DOMWindow::location() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_location)
m_location = Location::create(m_frame);
return m_location.get();
}
Storage* DOMWindow::sessionStorage(ExceptionCode& ec) const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
Document* document = this->document();
if (!document)
return 0;
if (!document->securityOrigin()->canAccessSessionStorage(document->topOrigin())) {
ec = SECURITY_ERR;
return 0;
}
if (m_sessionStorage) {
if (!m_sessionStorage->area().canAccessStorage(m_frame)) {
ec = SECURITY_ERR;
return 0;
}
return m_sessionStorage.get();
}
Page* page = document->page();
if (!page)
return 0;
RefPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin());
if (!storageArea->canAccessStorage(m_frame)) {
ec = SECURITY_ERR;
return 0;
}
m_sessionStorage = Storage::create(m_frame, storageArea.release());
return m_sessionStorage.get();
}
Storage* DOMWindow::localStorage(ExceptionCode& ec) const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
Document* document = this->document();
if (!document)
return 0;
if (!document->securityOrigin()->canAccessLocalStorage(0)) {
ec = SECURITY_ERR;
return 0;
}
if (m_localStorage) {
if (!m_localStorage->area().canAccessStorage(m_frame)) {
ec = SECURITY_ERR;
return 0;
}
return m_localStorage.get();
}
Page* page = document->page();
if (!page)
return 0;
if (!page->settings().localStorageEnabled())
return 0;
RefPtr<StorageArea> storageArea;
if (!document->securityOrigin()->canAccessLocalStorage(document->topOrigin()))
storageArea = page->group().transientLocalStorage(document->topOrigin())->storageArea(document->securityOrigin());
else
storageArea = page->group().localStorage()->storageArea(document->securityOrigin());
if (!storageArea->canAccessStorage(m_frame)) {
ec = SECURITY_ERR;
return 0;
}
m_localStorage = Storage::create(m_frame, storageArea.release());
return m_localStorage.get();
}
void DOMWindow::postMessage(PassRefPtr<SerializedScriptValue> message, MessagePort* port, const String& targetOrigin, DOMWindow& source, ExceptionCode& ec)
{
MessagePortArray ports;
if (port)
ports.append(port);
postMessage(message, &ports, targetOrigin, source, ec);
}
void DOMWindow::postMessage(PassRefPtr<SerializedScriptValue> message, const MessagePortArray* ports, const String& targetOrigin, DOMWindow& source, ExceptionCode& ec)
{
if (!isCurrentlyDisplayedInFrame())
return;
Document* sourceDocument = source.document();
// Compute the target origin. We need to do this synchronously in order
// to generate the SYNTAX_ERR exception correctly.
RefPtr<SecurityOrigin> target;
if (targetOrigin == "/") {
if (!sourceDocument)
return;
target = sourceDocument->securityOrigin();
} else if (targetOrigin != "*") {
target = SecurityOrigin::createFromString(targetOrigin);
// It doesn't make sense target a postMessage at a unique origin
// because there's no way to represent a unique origin in a string.
if (target->isUnique()) {
ec = SYNTAX_ERR;
return;
}
}
OwnPtr<MessagePortChannelArray> channels = MessagePort::disentanglePorts(ports, ec);
if (ec)
return;
// Capture the source of the message. We need to do this synchronously
// in order to capture the source of the message correctly.
if (!sourceDocument)
return;
String sourceOrigin = sourceDocument->securityOrigin()->toString();
// Capture stack trace only when inspector front-end is loaded as it may be time consuming.
RefPtr<ScriptCallStack> stackTrace;
if (InspectorInstrumentation::consoleAgentEnabled(sourceDocument))
stackTrace = createScriptCallStack(ScriptCallStack::maxCallStackSizeToCapture, true);
// Schedule the message.
PostMessageTimer* timer = new PostMessageTimer(this, message, sourceOrigin, &source, channels.release(), target.get(), stackTrace.release());
timer->startOneShot(0);
}
void DOMWindow::postMessageTimerFired(PassOwnPtr<PostMessageTimer> t)
{
OwnPtr<PostMessageTimer> timer(t);
if (!document() || !isCurrentlyDisplayedInFrame())
return;
dispatchMessageEventWithOriginCheck(timer->targetOrigin(), timer->event(document()), timer->stackTrace());
}
void DOMWindow::dispatchMessageEventWithOriginCheck(SecurityOrigin* intendedTargetOrigin, PassRefPtr<Event> event, PassRefPtr<ScriptCallStack> stackTrace)
{
if (intendedTargetOrigin) {
// Check target origin now since the target document may have changed since the timer was scheduled.
if (!intendedTargetOrigin->isSameSchemeHostPort(document()->securityOrigin())) {
String message = "Unable to post message to " + intendedTargetOrigin->toString() +
". Recipient has origin " + document()->securityOrigin()->toString() + ".\n";
pageConsole()->addMessage(SecurityMessageSource, ErrorMessageLevel, message, stackTrace);
return;
}
}
dispatchEvent(event);
}
DOMSelection* DOMWindow::getSelection()
{
if (!isCurrentlyDisplayedInFrame() || !m_frame)
return 0;
return m_frame->document()->getSelection();
}
Element* DOMWindow::frameElement() const
{
if (!m_frame)
return 0;
return m_frame->ownerElement();
}
void DOMWindow::focus(ScriptExecutionContext* context)
{
if (!m_frame)
return;
Page* page = m_frame->page();
if (!page)
return;
bool allowFocus = WindowFocusAllowedIndicator::windowFocusAllowed() || !m_frame->settings().windowFocusRestricted();
if (context) {
ASSERT(isMainThread());
Document* activeDocument = toDocument(context);
if (opener() && opener() != this && activeDocument->domWindow() == opener())
allowFocus = true;
}
// If we're a top level window, bring the window to the front.
if (m_frame->isMainFrame() && allowFocus)
page->chrome().focus();
if (!m_frame)
return;
// Clear the current frame's focused node if a new frame is about to be focused.
Frame* focusedFrame = page->focusController().focusedFrame();
if (focusedFrame && focusedFrame != m_frame)
focusedFrame->document()->setFocusedElement(0);
m_frame->eventHandler().focusDocumentView();
}
void DOMWindow::blur()
{
if (!m_frame)
return;
Page* page = m_frame->page();
if (!page)
return;
if (m_frame->settings().windowFocusRestricted())
return;
if (!m_frame->isMainFrame())
return;
page->chrome().unfocus();
}
void DOMWindow::close(ScriptExecutionContext* context)
{
if (!m_frame)
return;
Page* page = m_frame->page();
if (!page)
return;
if (!m_frame->isMainFrame())
return;
if (context) {
ASSERT(isMainThread());
Document* activeDocument = toDocument(context);
if (!activeDocument)
return;
if (!activeDocument->canNavigate(m_frame))
return;
}
bool allowScriptsToCloseWindows = m_frame->settings().allowScriptsToCloseWindows();
if (!(page->openedByDOM() || page->backForward().count() <= 1 || allowScriptsToCloseWindows)) {
pageConsole()->addMessage(JSMessageSource, WarningMessageLevel, ASCIILiteral("Can't close the window since it was not opened by JavaScript"));
return;
}
if (!m_frame->loader().shouldClose())
return;
page->chrome().closeWindowSoon();
}
void DOMWindow::print()
{
if (!m_frame)
return;
Page* page = m_frame->page();
if (!page)
return;
// Pages are not allowed to bring up a modal print dialog during BeforeUnload dispatch.
if (page->isAnyFrameHandlingBeforeUnloadEvent()) {
printErrorMessage("Use of window.print is not allowed during beforeunload event dispatch.");
return;
}
if (m_frame->loader().activeDocumentLoader()->isLoading()) {
m_shouldPrintWhenFinishedLoading = true;
return;
}
m_shouldPrintWhenFinishedLoading = false;
page->chrome().print(m_frame);
}
void DOMWindow::stop()
{
if (!m_frame)
return;
// We must check whether the load is complete asynchronously, because we might still be parsing
// the document until the callstack unwinds.
m_frame->loader().stopForUserCancel(true);
}
void DOMWindow::alert(const String& message)
{
if (!m_frame)
return;
// Pages are not allowed to cause modal alerts during BeforeUnload dispatch.
if (page() && page()->isAnyFrameHandlingBeforeUnloadEvent()) {
printErrorMessage("Use of window.alert is not allowed during beforeunload event dispatch.");
return;
}
m_frame->document()->updateStyleIfNeeded();
Page* page = m_frame->page();
if (!page)
return;
page->chrome().runJavaScriptAlert(m_frame, message);
}
bool DOMWindow::confirm(const String& message)
{
if (!m_frame)
return false;
// Pages are not allowed to cause modal alerts during BeforeUnload dispatch.
if (page() && page()->isAnyFrameHandlingBeforeUnloadEvent()) {
printErrorMessage("Use of window.confirm is not allowed during beforeunload event dispatch.");
return false;
}
m_frame->document()->updateStyleIfNeeded();
Page* page = m_frame->page();
if (!page)
return false;
return page->chrome().runJavaScriptConfirm(m_frame, message);
}
String DOMWindow::prompt(const String& message, const String& defaultValue)
{
if (!m_frame)
return String();
// Pages are not allowed to cause modal alerts during BeforeUnload dispatch.
if (page() && page()->isAnyFrameHandlingBeforeUnloadEvent()) {
printErrorMessage("Use of window.prompt is not allowed during beforeunload event dispatch.");
return String();
}
m_frame->document()->updateStyleIfNeeded();
Page* page = m_frame->page();
if (!page)
return String();
String returnValue;
if (page->chrome().runJavaScriptPrompt(m_frame, message, defaultValue, returnValue))
return returnValue;
return String();
}
String DOMWindow::btoa(const String& stringToEncode, ExceptionCode& ec)
{
if (stringToEncode.isNull())
return String();
if (!stringToEncode.containsOnlyLatin1()) {
ec = INVALID_CHARACTER_ERR;
return String();
}
return base64Encode(stringToEncode.latin1());
}
String DOMWindow::atob(const String& encodedString, ExceptionCode& ec)
{
if (encodedString.isNull())
return String();
if (!encodedString.containsOnlyLatin1()) {
ec = INVALID_CHARACTER_ERR;
return String();
}
Vector<char> out;
if (!base64Decode(encodedString, out, Base64FailOnInvalidCharacterOrExcessPadding)) {
ec = INVALID_CHARACTER_ERR;
return String();
}
return String(out.data(), out.size());
}
bool DOMWindow::find(const String& string, bool caseSensitive, bool backwards, bool wrap, bool /*wholeWord*/, bool /*searchInFrames*/, bool /*showDialog*/) const
{
if (!isCurrentlyDisplayedInFrame())
return false;
// FIXME (13016): Support wholeWord, searchInFrames and showDialog.
FindOptions options = (backwards ? Backwards : 0) | (caseSensitive ? 0 : CaseInsensitive) | (wrap ? WrapAround : 0);
return m_frame->editor().findString(string, options);
}
bool DOMWindow::offscreenBuffering() const
{
return true;
}
int DOMWindow::outerHeight() const
{
if (!m_frame)
return 0;
Page* page = m_frame->page();
if (!page)
return 0;
return static_cast<int>(page->chrome().windowRect().height());
}
int DOMWindow::outerWidth() const
{
if (!m_frame)
return 0;
Page* page = m_frame->page();
if (!page)
return 0;
return static_cast<int>(page->chrome().windowRect().width());
}
int DOMWindow::innerHeight() const
{
if (!m_frame)
return 0;
FrameView* view = m_frame->view();
if (!view)
return 0;
// If the device height is overridden, do not include the horizontal scrollbar into the innerHeight (since it is absent on the real device).
bool includeScrollbars = !InspectorInstrumentation::shouldApplyScreenHeightOverride(m_frame);
return view->mapFromLayoutToCSSUnits(static_cast<int>(view->visibleContentRect(includeScrollbars ? ScrollableArea::IncludeScrollbars : ScrollableArea::ExcludeScrollbars).height()));
}
int DOMWindow::innerWidth() const
{
if (!m_frame)
return 0;
FrameView* view = m_frame->view();
if (!view)
return 0;
// If the device width is overridden, do not include the vertical scrollbar into the innerWidth (since it is absent on the real device).
bool includeScrollbars = !InspectorInstrumentation::shouldApplyScreenWidthOverride(m_frame);
return view->mapFromLayoutToCSSUnits(static_cast<int>(view->visibleContentRect(includeScrollbars ? ScrollableArea::IncludeScrollbars : ScrollableArea::ExcludeScrollbars).width()));
}
int DOMWindow::screenX() const
{
if (!m_frame)
return 0;
Page* page = m_frame->page();
if (!page)
return 0;
return static_cast<int>(page->chrome().windowRect().x());
}
int DOMWindow::screenY() const
{
if (!m_frame)
return 0;
Page* page = m_frame->page();
if (!page)
return 0;
return static_cast<int>(page->chrome().windowRect().y());
}
int DOMWindow::scrollX() const
{
if (!m_frame)
return 0;
FrameView* view = m_frame->view();
if (!view)
return 0;
if (!view->scrollX())
return 0;
m_frame->document()->updateLayoutIgnorePendingStylesheets();
return view->mapFromLayoutToCSSUnits(view->scrollX());
}
int DOMWindow::scrollY() const
{
if (!m_frame)
return 0;
FrameView* view = m_frame->view();
if (!view)
return 0;
if (!view->scrollY())
return 0;
m_frame->document()->updateLayoutIgnorePendingStylesheets();
return view->mapFromLayoutToCSSUnits(view->scrollY());
}
bool DOMWindow::closed() const
{
return !m_frame;
}
unsigned DOMWindow::length() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
return m_frame->tree().scopedChildCount();
}
String DOMWindow::name() const
{
if (!m_frame)
return String();
return m_frame->tree().name();
}
void DOMWindow::setName(const String& string)
{
if (!m_frame)
return;
m_frame->tree().setName(string);
}
void DOMWindow::setStatus(const String& string)
{
m_status = string;
if (!m_frame)
return;
Page* page = m_frame->page();
if (!page)
return;
ASSERT(m_frame->document()); // Client calls shouldn't be made when the frame is in inconsistent state.
page->chrome().setStatusbarText(m_frame, m_status);
}
void DOMWindow::setDefaultStatus(const String& string)
{
m_defaultStatus = string;
if (!m_frame)
return;
Page* page = m_frame->page();
if (!page)
return;
ASSERT(m_frame->document()); // Client calls shouldn't be made when the frame is in inconsistent state.
page->chrome().setStatusbarText(m_frame, m_defaultStatus);
}
DOMWindow* DOMWindow::self() const
{
if (!m_frame)
return 0;
return m_frame->document()->domWindow();
}
DOMWindow* DOMWindow::opener() const
{
if (!m_frame)
return 0;
Frame* opener = m_frame->loader().opener();
if (!opener)
return 0;
return opener->document()->domWindow();
}
DOMWindow* DOMWindow::parent() const
{
if (!m_frame)
return 0;
Frame* parent = m_frame->tree().parent();
if (parent)
return parent->document()->domWindow();
return m_frame->document()->domWindow();
}
DOMWindow* DOMWindow::top() const
{
if (!m_frame)
return 0;
Page* page = m_frame->page();
if (!page)
return 0;
return m_frame->tree().top().document()->domWindow();
}
Document* DOMWindow::document() const
{
ScriptExecutionContext* context = ContextDestructionObserver::scriptExecutionContext();
return toDocument(context);
}
PassRefPtr<StyleMedia> DOMWindow::styleMedia() const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
if (!m_media)
m_media = StyleMedia::create(m_frame);
return m_media.get();
}
PassRefPtr<CSSStyleDeclaration> DOMWindow::getComputedStyle(Element* elt, const String& pseudoElt) const
{
if (!elt)
return 0;
return CSSComputedStyleDeclaration::create(elt, false, pseudoElt);
}
PassRefPtr<CSSRuleList> DOMWindow::getMatchedCSSRules(Element* element, const String& pseudoElement, bool authorOnly) const
{
if (!isCurrentlyDisplayedInFrame())
return 0;
unsigned colonStart = pseudoElement[0] == ':' ? (pseudoElement[1] == ':' ? 2 : 1) : 0;
CSSSelector::PseudoType pseudoType = CSSSelector::parsePseudoType(AtomicString(pseudoElement.substring(colonStart)));
if (pseudoType == CSSSelector::PseudoUnknown && !pseudoElement.isEmpty())
return 0;
unsigned rulesToInclude = StyleResolver::AuthorCSSRules;
if (!authorOnly)
rulesToInclude |= StyleResolver::UAAndUserCSSRules;
if (m_frame->settings().crossOriginCheckInGetMatchedCSSRulesDisabled())
rulesToInclude |= StyleResolver::CrossOriginCSSRules;
PseudoId pseudoId = CSSSelector::pseudoId(pseudoType);
Vector<RefPtr<StyleRuleBase>> matchedRules = m_frame->document()->ensureStyleResolver().pseudoStyleRulesForElement(element, pseudoId, rulesToInclude);
if (matchedRules.isEmpty())
return 0;
RefPtr<StaticCSSRuleList> ruleList = StaticCSSRuleList::create();
for (unsigned i = 0; i < matchedRules.size(); ++i)
ruleList->rules().append(matchedRules[i]->createCSSOMWrapper());
return ruleList.release();
}
PassRefPtr<WebKitPoint> DOMWindow::webkitConvertPointFromNodeToPage(Node* node, const WebKitPoint* p) const
{
if (!node || !p)
return 0;
if (!document())
return 0;
document()->updateLayoutIgnorePendingStylesheets();
FloatPoint pagePoint(p->x(), p->y());
pagePoint = node->convertToPage(pagePoint);
return WebKitPoint::create(pagePoint.x(), pagePoint.y());
}
PassRefPtr<WebKitPoint> DOMWindow::webkitConvertPointFromPageToNode(Node* node, const WebKitPoint* p) const
{
if (!node || !p)
return 0;
if (!document())
return 0;
document()->updateLayoutIgnorePendingStylesheets();
FloatPoint nodePoint(p->x(), p->y());
nodePoint = node->convertFromPage(nodePoint);
return WebKitPoint::create(nodePoint.x(), nodePoint.y());
}
double DOMWindow::devicePixelRatio() const
{
if (!m_frame)
return 0.0;
Page* page = m_frame->page();
if (!page)
return 0.0;
return page->deviceScaleFactor();
}
void DOMWindow::scrollBy(int x, int y) const
{
if (!isCurrentlyDisplayedInFrame())
return;
document()->updateLayoutIgnorePendingStylesheets();
FrameView* view = m_frame->view();
if (!view)
return;
IntSize scaledOffset(view->mapFromCSSToLayoutUnits(x), view->mapFromCSSToLayoutUnits(y));
view->scrollBy(scaledOffset);
}
void DOMWindow::scrollTo(int x, int y) const
{
if (!isCurrentlyDisplayedInFrame())
return;
document()->updateLayoutIgnorePendingStylesheets();
RefPtr<FrameView> view = m_frame->view();
if (!view)
return;
IntPoint layoutPos(view->mapFromCSSToLayoutUnits(x), view->mapFromCSSToLayoutUnits(y));
view->setScrollPosition(layoutPos);
}
bool DOMWindow::allowedToChangeWindowGeometry() const
{
if (!m_frame)
return false;
if (!m_frame->page())
return false;
if (!m_frame->isMainFrame())
return false;
// Prevent web content from tricking the user into initiating a drag.
if (m_frame->eventHandler().mousePressed())
return false;
return true;
}
void DOMWindow::moveBy(float x, float y) const
{
if (!allowedToChangeWindowGeometry())
return;
Page* page = m_frame->page();
FloatRect fr = page->chrome().windowRect();
FloatRect update = fr;
update.move(x, y);
// Security check (the spec talks about UniversalBrowserWrite to disable this check...)
page->chrome().setWindowRect(adjustWindowRect(page, update));
}
void DOMWindow::moveTo(float x, float y) const
{
if (!allowedToChangeWindowGeometry())
return;
Page* page = m_frame->page();
FloatRect fr = page->chrome().windowRect();
FloatRect sr = screenAvailableRect(page->mainFrame().view());
fr.setLocation(sr.location());
FloatRect update = fr;
update.move(x, y);
// Security check (the spec talks about UniversalBrowserWrite to disable this check...)
page->chrome().setWindowRect(adjustWindowRect(page, update));
}
void DOMWindow::resizeBy(float x, float y) const
{
if (!allowedToChangeWindowGeometry())
return;
Page* page = m_frame->page();
FloatRect fr = page->chrome().windowRect();
FloatSize dest = fr.size() + FloatSize(x, y);
FloatRect update(fr.location(), dest);
page->chrome().setWindowRect(adjustWindowRect(page, update));
}
void DOMWindow::resizeTo(float width, float height) const
{
if (!allowedToChangeWindowGeometry())
return;
Page* page = m_frame->page();
FloatRect fr = page->chrome().windowRect();
FloatSize dest = FloatSize(width, height);
FloatRect update(fr.location(), dest);
page->chrome().setWindowRect(adjustWindowRect(page, update));
}
int DOMWindow::setTimeout(PassOwnPtr<ScheduledAction> action, int timeout, ExceptionCode& ec)
{
ScriptExecutionContext* context = scriptExecutionContext();
if (!context) {
ec = INVALID_ACCESS_ERR;
return -1;
}
return DOMTimer::install(context, action, timeout, true);
}
void DOMWindow::clearTimeout(int timeoutId)
{
ScriptExecutionContext* context = scriptExecutionContext();
if (!context)
return;
DOMTimer::removeById(context, timeoutId);
}
int DOMWindow::setInterval(PassOwnPtr<ScheduledAction> action, int timeout, ExceptionCode& ec)
{
ScriptExecutionContext* context = scriptExecutionContext();
if (!context) {
ec = INVALID_ACCESS_ERR;
return -1;
}
return DOMTimer::install(context, action, timeout, false);
}
void DOMWindow::clearInterval(int timeoutId)
{
ScriptExecutionContext* context = scriptExecutionContext();
if (!context)
return;
DOMTimer::removeById(context, timeoutId);
}
#if ENABLE(REQUEST_ANIMATION_FRAME)
int DOMWindow::requestAnimationFrame(PassRefPtr<RequestAnimationFrameCallback> callback)
{
callback->m_useLegacyTimeBase = false;
if (Document* d = document())
return d->requestAnimationFrame(callback);
return 0;
}
int DOMWindow::webkitRequestAnimationFrame(PassRefPtr<RequestAnimationFrameCallback> callback)
{
callback->m_useLegacyTimeBase = true;
if (Document* d = document())
return d->requestAnimationFrame(callback);
return 0;
}
void DOMWindow::cancelAnimationFrame(int id)
{
if (Document* d = document())
d->cancelAnimationFrame(id);
}
#endif
#if ENABLE(CSS3_CONDITIONAL_RULES)
DOMWindowCSS* DOMWindow::css()
{
if (!m_css)
m_css = DOMWindowCSS::create();
return m_css.get();
}
#endif
static void didAddStorageEventListener(DOMWindow* window)
{
// Creating these WebCore::Storage objects informs the system that we'd like to receive
// notifications about storage events that might be triggered in other processes. Rather
// than subscribe to these notifications explicitly, we subscribe to them implicitly to
// simplify the work done by the system.
window->localStorage(IGNORE_EXCEPTION);
window->sessionStorage(IGNORE_EXCEPTION);
}
bool DOMWindow::addEventListener(const AtomicString& eventType, PassRefPtr<EventListener> listener, bool useCapture)
{
if (!EventTarget::addEventListener(eventType, listener, useCapture))
return false;
if (Document* document = this->document()) {
document->addListenerTypeIfNeeded(eventType);
if (eventType == eventNames().wheelEvent || eventType == eventNames().mousewheelEvent)
document->didAddWheelEventHandler();
else if (eventNames().isTouchEventType(eventType))
document->didAddTouchEventHandler(document);
else if (eventType == eventNames().storageEvent)
didAddStorageEventListener(this);
}
if (eventType == eventNames().unloadEvent)
addUnloadEventListener(this);
else if (eventType == eventNames().beforeunloadEvent && allowsBeforeUnloadListeners(this))
addBeforeUnloadEventListener(this);
#if ENABLE(DEVICE_ORIENTATION)
else if (eventType == eventNames().devicemotionEvent && RuntimeEnabledFeatures::sharedFeatures().deviceMotionEnabled()) {
if (DeviceMotionController* controller = DeviceMotionController::from(page()))
controller->addDeviceEventListener(this);
} else if (eventType == eventNames().deviceorientationEvent && RuntimeEnabledFeatures::sharedFeatures().deviceOrientationEnabled()) {
if (DeviceOrientationController* controller = DeviceOrientationController::from(page()))
controller->addDeviceEventListener(this);
}
#endif
#if ENABLE(PROXIMITY_EVENTS)
else if (eventType == eventNames().webkitdeviceproximityEvent) {
if (DeviceProximityController* controller = DeviceProximityController::from(page()))
controller->addDeviceEventListener(this);
}
#endif
return true;
}
bool DOMWindow::removeEventListener(const AtomicString& eventType, EventListener* listener, bool useCapture)
{
if (!EventTarget::removeEventListener(eventType, listener, useCapture))
return false;
if (Document* document = this->document()) {
if (eventType == eventNames().wheelEvent || eventType == eventNames().mousewheelEvent)
document->didRemoveWheelEventHandler();
else if (eventNames().isTouchEventType(eventType))
document->didRemoveTouchEventHandler(document);
}
if (eventType == eventNames().unloadEvent)
removeUnloadEventListener(this);
else if (eventType == eventNames().beforeunloadEvent && allowsBeforeUnloadListeners(this))
removeBeforeUnloadEventListener(this);
#if ENABLE(DEVICE_ORIENTATION)
else if (eventType == eventNames().devicemotionEvent) {
if (DeviceMotionController* controller = DeviceMotionController::from(page()))
controller->removeDeviceEventListener(this);
} else if (eventType == eventNames().deviceorientationEvent) {
if (DeviceOrientationController* controller = DeviceOrientationController::from(page()))
controller->removeDeviceEventListener(this);
}
#endif
#if ENABLE(PROXIMITY_EVENTS)
else if (eventType == eventNames().webkitdeviceproximityEvent) {
if (DeviceProximityController* controller = DeviceProximityController::from(page()))
controller->removeDeviceEventListener(this);
}
#endif
return true;
}
void DOMWindow::dispatchLoadEvent()
{
RefPtr<Event> loadEvent(Event::create(eventNames().loadEvent, false, false));
if (m_frame && m_frame->loader().documentLoader() && !m_frame->loader().documentLoader()->timing()->loadEventStart()) {
// The DocumentLoader (and thus its DocumentLoadTiming) might get destroyed while dispatching
// the event, so protect it to prevent writing the end time into freed memory.
RefPtr<DocumentLoader> documentLoader = m_frame->loader().documentLoader();
DocumentLoadTiming* timing = documentLoader->timing();
timing->markLoadEventStart();
dispatchEvent(loadEvent, document());
timing->markLoadEventEnd();
} else
dispatchEvent(loadEvent, document());
// For load events, send a separate load event to the enclosing frame only.
// This is a DOM extension and is independent of bubbling/capturing rules of
// the DOM.
Element* ownerElement = m_frame ? m_frame->ownerElement() : 0;
if (ownerElement)
ownerElement->dispatchEvent(Event::create(eventNames().loadEvent, false, false));
InspectorInstrumentation::loadEventFired(frame());
}
bool DOMWindow::dispatchEvent(PassRefPtr<Event> prpEvent, PassRefPtr<EventTarget> prpTarget)
{
Ref<EventTarget> protect(*this);
RefPtr<Event> event = prpEvent;
event->setTarget(prpTarget ? prpTarget : this);
event->setCurrentTarget(this);
event->setEventPhase(Event::AT_TARGET);
InspectorInstrumentationCookie cookie = InspectorInstrumentation::willDispatchEventOnWindow(frame(), *event, this);
bool result = fireEventListeners(event.get());
InspectorInstrumentation::didDispatchEventOnWindow(cookie);
return result;
}
void DOMWindow::removeAllEventListeners()
{
EventTarget::removeAllEventListeners();
#if ENABLE(DEVICE_ORIENTATION)
if (DeviceMotionController* controller = DeviceMotionController::from(page()))
controller->removeAllDeviceEventListeners(this);
if (DeviceOrientationController* controller = DeviceOrientationController::from(page()))
controller->removeAllDeviceEventListeners(this);
#endif
#if ENABLE(TOUCH_EVENTS)
if (Document* document = this->document())
document->didRemoveEventTargetNode(document);
#endif
#if ENABLE(PROXIMITY_EVENTS)
if (DeviceProximityController* controller = DeviceProximityController::from(page()))
controller->removeAllDeviceEventListeners(this);
#endif
removeAllUnloadEventListeners(this);
removeAllBeforeUnloadEventListeners(this);
}
void DOMWindow::captureEvents()
{
// Not implemented.
}
void DOMWindow::releaseEvents()
{
// Not implemented.
}
void DOMWindow::finishedLoading()
{
if (m_shouldPrintWhenFinishedLoading) {
m_shouldPrintWhenFinishedLoading = false;
print();
}
}
void DOMWindow::setLocation(const String& urlString, DOMWindow& activeWindow, DOMWindow& firstWindow, SetLocationLocking locking)
{
if (!isCurrentlyDisplayedInFrame())
return;
Document* activeDocument = activeWindow.document();
if (!activeDocument)
return;
if (!activeDocument->canNavigate(m_frame))
return;
Frame* firstFrame = firstWindow.frame();
if (!firstFrame)
return;
URL completedURL = firstFrame->document()->completeURL(urlString);
if (completedURL.isNull())
return;
if (isInsecureScriptAccess(activeWindow, completedURL))
return;
// We want a new history item if we are processing a user gesture.
m_frame->navigationScheduler().scheduleLocationChange(activeDocument->securityOrigin(),
// FIXME: What if activeDocument()->frame() is 0?
completedURL, activeDocument->frame()->loader().outgoingReferrer(),
locking != LockHistoryBasedOnGestureState || !ScriptController::processingUserGesture(),
locking != LockHistoryBasedOnGestureState);
}
void DOMWindow::printErrorMessage(const String& message)
{
if (message.isEmpty())
return;
pageConsole()->addMessage(JSMessageSource, ErrorMessageLevel, message);
}
String DOMWindow::crossDomainAccessErrorMessage(const DOMWindow& activeWindow)
{
const URL& activeWindowURL = activeWindow.document()->url();
if (activeWindowURL.isNull())
return String();
ASSERT(!activeWindow.document()->securityOrigin()->canAccess(document()->securityOrigin()));
// FIXME: This message, and other console messages, have extra newlines. Should remove them.
SecurityOrigin* activeOrigin = activeWindow.document()->securityOrigin();
SecurityOrigin* targetOrigin = document()->securityOrigin();
String message = "Blocked a frame with origin \"" + activeOrigin->toString() + "\" from accessing a frame with origin \"" + targetOrigin->toString() + "\". ";
// Sandbox errors: Use the origin of the frames' location, rather than their actual origin (since we know that at least one will be "null").
URL activeURL = activeWindow.document()->url();
URL targetURL = document()->url();
if (document()->isSandboxed(SandboxOrigin) || activeWindow.document()->isSandboxed(SandboxOrigin)) {
message = "Blocked a frame at \"" + SecurityOrigin::create(activeURL)->toString() + "\" from accessing a frame at \"" + SecurityOrigin::create(targetURL)->toString() + "\". ";
if (document()->isSandboxed(SandboxOrigin) && activeWindow.document()->isSandboxed(SandboxOrigin))
return "Sandbox access violation: " + message + " Both frames are sandboxed and lack the \"allow-same-origin\" flag.";
if (document()->isSandboxed(SandboxOrigin))
return "Sandbox access violation: " + message + " The frame being accessed is sandboxed and lacks the \"allow-same-origin\" flag.";
return "Sandbox access violation: " + message + " The frame requesting access is sandboxed and lacks the \"allow-same-origin\" flag.";
}
// Protocol errors: Use the URL's protocol rather than the origin's protocol so that we get a useful message for non-heirarchal URLs like 'data:'.
if (targetOrigin->protocol() != activeOrigin->protocol())
return message + " The frame requesting access has a protocol of \"" + activeURL.protocol() + "\", the frame being accessed has a protocol of \"" + targetURL.protocol() + "\". Protocols must match.\n";
// 'document.domain' errors.
if (targetOrigin->domainWasSetInDOM() && activeOrigin->domainWasSetInDOM())
return message + "The frame requesting access set \"document.domain\" to \"" + activeOrigin->domain() + "\", the frame being accessed set it to \"" + targetOrigin->domain() + "\". Both must set \"document.domain\" to the same value to allow access.";
if (activeOrigin->domainWasSetInDOM())
return message + "The frame requesting access set \"document.domain\" to \"" + activeOrigin->domain() + "\", but the frame being accessed did not. Both must set \"document.domain\" to the same value to allow access.";
if (targetOrigin->domainWasSetInDOM())
return message + "The frame being accessed set \"document.domain\" to \"" + targetOrigin->domain() + "\", but the frame requesting access did not. Both must set \"document.domain\" to the same value to allow access.";
// Default.
return message + "Protocols, domains, and ports must match.";
}
bool DOMWindow::isInsecureScriptAccess(DOMWindow& activeWindow, const String& urlString)
{
if (!protocolIsJavaScript(urlString))
return false;
// If this DOMWindow isn't currently active in the Frame, then there's no
// way we should allow the access.
// FIXME: Remove this check if we're able to disconnect DOMWindow from
// Frame on navigation: https://bugs.webkit.org/show_bug.cgi?id=62054
if (isCurrentlyDisplayedInFrame()) {
// FIXME: Is there some way to eliminate the need for a separate "activeWindow == this" check?
if (&activeWindow == this)
return false;
// FIXME: The name canAccess seems to be a roundabout way to ask "can execute script".
// Can we name the SecurityOrigin function better to make this more clear?
if (activeWindow.document()->securityOrigin()->canAccess(document()->securityOrigin()))
return false;
}
printErrorMessage(crossDomainAccessErrorMessage(activeWindow));
return true;
}
PassRefPtr<Frame> DOMWindow::createWindow(const String& urlString, const AtomicString& frameName, const WindowFeatures& windowFeatures,
DOMWindow& activeWindow, Frame* firstFrame, Frame* openerFrame, PrepareDialogFunction function, void* functionContext)
{
Frame* activeFrame = activeWindow.frame();
URL completedURL = urlString.isEmpty() ? URL(ParsedURLString, emptyString()) : firstFrame->document()->completeURL(urlString);
if (!completedURL.isEmpty() && !completedURL.isValid()) {
// Don't expose client code to invalid URLs.
activeWindow.printErrorMessage("Unable to open a window with invalid URL '" + completedURL.string() + "'.\n");
return 0;
}
// For whatever reason, Firefox uses the first frame to determine the outgoingReferrer. We replicate that behavior here.
String referrer = SecurityPolicy::generateReferrerHeader(firstFrame->document()->referrerPolicy(), completedURL, firstFrame->loader().outgoingReferrer());
ResourceRequest request(completedURL, referrer);
FrameLoader::addHTTPOriginIfNeeded(request, firstFrame->loader().outgoingOrigin());
FrameLoadRequest frameRequest(activeWindow.document()->securityOrigin(), request, frameName);
// We pass the opener frame for the lookupFrame in case the active frame is different from
// the opener frame, and the name references a frame relative to the opener frame.
bool created;
RefPtr<Frame> newFrame = WebCore::createWindow(activeFrame, openerFrame, frameRequest, windowFeatures, created);
if (!newFrame)
return 0;
newFrame->loader().setOpener(openerFrame);
newFrame->page()->setOpenedByDOM();
if (newFrame->document()->domWindow()->isInsecureScriptAccess(activeWindow, completedURL))
return newFrame.release();
if (function)
function(newFrame->document()->domWindow(), functionContext);
if (created)
newFrame->loader().changeLocation(activeWindow.document()->securityOrigin(), completedURL, referrer, false, false);
else if (!urlString.isEmpty()) {
bool lockHistory = !ScriptController::processingUserGesture();
newFrame->navigationScheduler().scheduleLocationChange(activeWindow.document()->securityOrigin(), completedURL.string(), referrer, lockHistory, false);
}
// Navigating the new frame could result in it being detached from its page by a navigation policy delegate.
if (!newFrame->page())
return 0;
return newFrame.release();
}
#if defined(_MSC_VER) && _MSC_VER <= 1700
// Work around a compiler bug in Visual Studio:
PassRefPtr<DOMWindow> DOMWindow::open(const String& urlString, const AtomicString& frameName, const String& windowFeaturesString,
DOMWindow* activeWindow, DOMWindow* firstWindow)
{
return open(urlString, frameName, windowFeaturesString, *activeWindow, *firstWindow);
}
#endif
PassRefPtr<DOMWindow> DOMWindow::open(const String& urlString, const AtomicString& frameName, const String& windowFeaturesString,
DOMWindow& activeWindow, DOMWindow& firstWindow)
{
if (!isCurrentlyDisplayedInFrame())
return 0;
Document* activeDocument = activeWindow.document();
if (!activeDocument)
return 0;
Frame* firstFrame = firstWindow.frame();
if (!firstFrame)
return 0;
if (!firstWindow.allowPopUp()) {
// Because FrameTree::find() returns true for empty strings, we must check for empty frame names.
// Otherwise, illegitimate window.open() calls with no name will pass right through the popup blocker.
if (frameName.isEmpty() || !m_frame->tree().find(frameName))
return 0;
}
// Get the target frame for the special cases of _top and _parent.
// In those cases, we schedule a location change right now and return early.
Frame* targetFrame = 0;
if (frameName == "_top")
targetFrame = &m_frame->tree().top();
else if (frameName == "_parent") {
if (Frame* parent = m_frame->tree().parent())
targetFrame = parent;
else
targetFrame = m_frame;
}
if (targetFrame) {
if (!activeDocument->canNavigate(targetFrame))
return 0;
URL completedURL = firstFrame->document()->completeURL(urlString);
if (targetFrame->document()->domWindow()->isInsecureScriptAccess(activeWindow, completedURL))
return targetFrame->document()->domWindow();
if (urlString.isEmpty())
return targetFrame->document()->domWindow();
// For whatever reason, Firefox uses the first window rather than the active window to
// determine the outgoing referrer. We replicate that behavior here.
bool lockHistory = !ScriptController::processingUserGesture();
targetFrame->navigationScheduler().scheduleLocationChange(
activeDocument->securityOrigin(),
completedURL,
firstFrame->loader().outgoingReferrer(),
lockHistory,
false);
return targetFrame->document()->domWindow();
}
WindowFeatures windowFeatures(windowFeaturesString);
RefPtr<Frame> result = createWindow(urlString, frameName, windowFeatures, activeWindow, firstFrame, m_frame);
return result ? result->document()->domWindow() : 0;
}
void DOMWindow::showModalDialog(const String& urlString, const String& dialogFeaturesString,
DOMWindow& activeWindow, DOMWindow& firstWindow, PrepareDialogFunction function, void* functionContext)
{
if (!isCurrentlyDisplayedInFrame())
return;
Frame* activeFrame = activeWindow.frame();
if (!activeFrame)
return;
Frame* firstFrame = firstWindow.frame();
if (!firstFrame)
return;
// Pages are not allowed to cause modal alerts during BeforeUnload dispatch.
if (page() && page()->isAnyFrameHandlingBeforeUnloadEvent()) {
printErrorMessage("Use of window.showModalDialog is not allowed during beforeunload event dispatch.");
return;
}
if (!canShowModalDialogNow(m_frame) || !firstWindow.allowPopUp())
return;
WindowFeatures windowFeatures(dialogFeaturesString, screenAvailableRect(m_frame->view()));
RefPtr<Frame> dialogFrame = createWindow(urlString, emptyAtom, windowFeatures,
activeWindow, firstFrame, m_frame, function, functionContext);
if (!dialogFrame)
return;
dialogFrame->page()->chrome().runModal();
}
void DOMWindow::enableSuddenTermination()
{
if (Page* page = this->page())
page->chrome().enableSuddenTermination();
}
void DOMWindow::disableSuddenTermination()
{
if (Page* page = this->page())
page->chrome().disableSuddenTermination();
}
} // namespace WebCore