diff options
author | Matt A. Tobin <email@mattatobin.com> | 2018-02-02 03:32:58 -0500 |
---|---|---|
committer | Matt A. Tobin <email@mattatobin.com> | 2018-02-02 03:32:58 -0500 |
commit | e72ef92b5bdc43cd2584198e2e54e951b70299e8 (patch) | |
tree | 01ceb4a897c33eca9e7ccf2bc3aefbe530169fe5 /application/basilisk/modules/E10SUtils.jsm | |
parent | 0d19b77d3eaa5b8d837bf52c19759e68e42a1c4c (diff) | |
download | UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar.gz UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar.lz UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar.xz UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.zip |
Add Basilisk
Diffstat (limited to 'application/basilisk/modules/E10SUtils.jsm')
-rw-r--r-- | application/basilisk/modules/E10SUtils.jsm | 206 |
1 files changed, 206 insertions, 0 deletions
diff --git a/application/basilisk/modules/E10SUtils.jsm b/application/basilisk/modules/E10SUtils.jsm new file mode 100644 index 000000000..99a5f1774 --- /dev/null +++ b/application/basilisk/modules/E10SUtils.jsm @@ -0,0 +1,206 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +"use strict"; + +this.EXPORTED_SYMBOLS = ["E10SUtils"]; + +const {interfaces: Ci, utils: Cu, classes: Cc} = Components; + +Cu.import("resource://gre/modules/Services.jsm"); +Cu.import("resource://gre/modules/XPCOMUtils.jsm"); + +XPCOMUtils.defineLazyPreferenceGetter(this, "useRemoteWebExtensions", + "extensions.webextensions.remote", false); +XPCOMUtils.defineLazyModuleGetter(this, "Utils", + "resource://gre/modules/sessionstore/Utils.jsm"); + +function getAboutModule(aURL) { + // Needs to match NS_GetAboutModuleName + let moduleName = aURL.path.replace(/[#?].*/, "").toLowerCase(); + let contract = "@mozilla.org/network/protocol/about;1?what=" + moduleName; + try { + return Cc[contract].getService(Ci.nsIAboutModule); + } catch (e) { + // Either the about module isn't defined or it is broken. In either case + // ignore it. + return null; + } +} + +const NOT_REMOTE = null; + +// These must match any similar ones in ContentParent.h. +const WEB_REMOTE_TYPE = "web"; +const FILE_REMOTE_TYPE = "file"; +const EXTENSION_REMOTE_TYPE = "extension"; +const DEFAULT_REMOTE_TYPE = WEB_REMOTE_TYPE; + +function validatedWebRemoteType(aPreferredRemoteType) { + return aPreferredRemoteType && aPreferredRemoteType.startsWith(WEB_REMOTE_TYPE) + ? aPreferredRemoteType : WEB_REMOTE_TYPE; +} + +this.E10SUtils = { + DEFAULT_REMOTE_TYPE, + NOT_REMOTE, + WEB_REMOTE_TYPE, + FILE_REMOTE_TYPE, + EXTENSION_REMOTE_TYPE, + + canLoadURIInProcess(aURL, aProcess) { + let remoteType = aProcess == Ci.nsIXULRuntime.PROCESS_TYPE_CONTENT + ? DEFAULT_REMOTE_TYPE : NOT_REMOTE; + return remoteType == this.getRemoteTypeForURI(aURL, true, remoteType); + }, + + getRemoteTypeForURI(aURL, aMultiProcess, + aPreferredRemoteType = DEFAULT_REMOTE_TYPE) { + if (!aMultiProcess) { + return NOT_REMOTE; + } + + // loadURI in browser.xml treats null as about:blank + if (!aURL) { + aURL = "about:blank"; + } + + // Javascript urls can load in any process, they apply to the current document + if (aURL.startsWith("javascript:")) { + return aPreferredRemoteType; + } + + // We need data: URIs to load in any remote process, because some of our + // tests rely on this. + if (aURL.startsWith("data:")) { + return aPreferredRemoteType == NOT_REMOTE ? DEFAULT_REMOTE_TYPE + : aPreferredRemoteType; + } + + if (aURL.startsWith("file:")) { + return Services.prefs.getBoolPref("browser.tabs.remote.separateFileUriProcess") + ? FILE_REMOTE_TYPE : DEFAULT_REMOTE_TYPE; + } + + if (aURL.startsWith("about:")) { + // We need to special case about:blank because it needs to load in any. + if (aURL == "about:blank") { + return aPreferredRemoteType; + } + + let url = Services.io.newURI(aURL); + let module = getAboutModule(url); + // If the module doesn't exist then an error page will be loading, that + // should be ok to load in any process + if (!module) { + return aPreferredRemoteType; + } + + let flags = module.getURIFlags(url); + if (flags & Ci.nsIAboutModule.URI_MUST_LOAD_IN_CHILD) { + return DEFAULT_REMOTE_TYPE; + } + + if (flags & Ci.nsIAboutModule.URI_CAN_LOAD_IN_CHILD && + aPreferredRemoteType != NOT_REMOTE) { + return DEFAULT_REMOTE_TYPE; + } + + return NOT_REMOTE; + } + + if (aURL.startsWith("chrome:")) { + let url; + try { + // This can fail for invalid Chrome URIs, in which case we will end up + // not loading anything anyway. + url = Services.io.newURI(aURL); + } catch (ex) { + return aPreferredRemoteType; + } + + let chromeReg = Cc["@mozilla.org/chrome/chrome-registry;1"]. + getService(Ci.nsIXULChromeRegistry); + if (chromeReg.mustLoadURLRemotely(url)) { + return DEFAULT_REMOTE_TYPE; + } + + if (chromeReg.canLoadURLRemotely(url) && + aPreferredRemoteType != NOT_REMOTE) { + return DEFAULT_REMOTE_TYPE; + } + + return NOT_REMOTE; + } + + if (aURL.startsWith("moz-extension:")) { + return useRemoteWebExtensions ? EXTENSION_REMOTE_TYPE : NOT_REMOTE; + } + + if (aURL.startsWith("view-source:")) { + return this.getRemoteTypeForURI(aURL.substr("view-source:".length), + aMultiProcess, aPreferredRemoteType); + } + + return validatedWebRemoteType(aPreferredRemoteType); + }, + + shouldLoadURIInThisProcess(aURI) { + let remoteType = Services.appinfo.remoteType; + return remoteType == this.getRemoteTypeForURI(aURI.spec, true, remoteType); + }, + + shouldLoadURI(aDocShell, aURI, aReferrer, aHasPostData) { + // Inner frames should always load in the current process + if (aDocShell.QueryInterface(Ci.nsIDocShellTreeItem).sameTypeParent) + return true; + + // If we are in a Large-Allocation process, and it wouldn't be content visible + // to change processes, we want to load into a new process so that we can throw + // this one out. We don't want to move into a new process if we have post data, + // because we would accidentally throw out that data. + if (!aHasPostData && + aDocShell.inLargeAllocProcess && + !aDocShell.awaitingLargeAlloc && + aDocShell.isOnlyToplevelInTabGroup) { + return false; + } + + // If the URI can be loaded in the current process then continue + return this.shouldLoadURIInThisProcess(aURI); + }, + + redirectLoad(aDocShell, aURI, aReferrer, aTriggeringPrincipal, aFreshProcess, aFlags) { + // Retarget the load to the correct process + let messageManager = aDocShell.QueryInterface(Ci.nsIInterfaceRequestor) + .getInterface(Ci.nsIContentFrameMessageManager); + let sessionHistory = aDocShell.getInterface(Ci.nsIWebNavigation).sessionHistory; + + messageManager.sendAsyncMessage("Browser:LoadURI", { + loadOptions: { + uri: aURI.spec, + flags: aFlags || Ci.nsIWebNavigation.LOAD_FLAGS_NONE, + referrer: aReferrer ? aReferrer.spec : null, + triggeringPrincipal: aTriggeringPrincipal + ? Utils.serializePrincipal(aTriggeringPrincipal) + : null, + reloadInFreshProcess: !!aFreshProcess, + }, + historyIndex: sessionHistory.requestedIndex, + }); + return false; + }, + + wrapHandlingUserInput(aWindow, aIsHandling, aCallback) { + var handlingUserInput; + try { + handlingUserInput = aWindow.QueryInterface(Ci.nsIInterfaceRequestor) + .getInterface(Ci.nsIDOMWindowUtils) + .setHandlingUserInput(aIsHandling); + aCallback(); + } finally { + handlingUserInput.destruct(); + } + }, +}; |