1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128
|
/*
* Copyright (C) 2022 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "WebRemoteFrameClient.h"
#include "MessageSenderInlines.h"
#include "WebPage.h"
#include "WebPageProxyMessages.h"
#include <WebCore/FrameLoadRequest.h>
#include <WebCore/FrameTree.h>
#include <WebCore/HitTestResult.h>
#include <WebCore/PolicyChecker.h>
#include <WebCore/RemoteFrame.h>
namespace WebKit {
using namespace WebCore;
WebRemoteFrameClient::WebRemoteFrameClient(Ref<WebFrame>&& frame, ScopeExit<Function<void()>>&& frameInvalidator)
: WebFrameLoaderClient(WTFMove(frame))
, m_frameInvalidator(WTFMove(frameInvalidator))
{
}
WebRemoteFrameClient::~WebRemoteFrameClient() = default;
void WebRemoteFrameClient::frameDetached()
{
RefPtr coreFrame = m_frame->coreRemoteFrame();
if (!coreFrame) {
ASSERT_NOT_REACHED();
return;
}
if (RefPtr parent = coreFrame->tree().parent()) {
coreFrame->tree().detachFromParent();
parent->tree().removeChild(*coreFrame);
}
m_frame->invalidate();
}
void WebRemoteFrameClient::sizeDidChange(IntSize size)
{
m_frame->updateRemoteFrameSize(size);
}
void WebRemoteFrameClient::postMessageToRemote(FrameIdentifier source, const String& sourceOrigin, FrameIdentifier target, std::optional<SecurityOriginData> targetOrigin, const MessageWithMessagePorts& message)
{
if (auto* page = m_frame->page())
page->send(Messages::WebPageProxy::PostMessageToRemote(source, sourceOrigin, target, targetOrigin, message));
}
void WebRemoteFrameClient::changeLocation(FrameLoadRequest&& request)
{
// FIXME: FrameLoadRequest and NavigationAction can probably be refactored to share more. <rdar://116202911>
NavigationAction action(request.requester(), request.resourceRequest(), request.initiatedByMainFrame(), request.isRequestFromClientOrUserInput());
// FIXME: action.request and request are probably duplicate information. <rdar://116203126>
// FIXME: Get more parameters correct and add tests for each one. <rdar://116203354>
dispatchDecidePolicyForNavigationAction(action, action.originalRequest(), ResourceResponse(), nullptr, { }, { }, { }, { }, { }, PolicyDecisionMode::Asynchronous, [protectedFrame = Ref { m_frame }, request = WTFMove(request)] (PolicyAction policyAction) mutable {
// WebPage::loadRequest will make this load happen if needed.
// FIXME: What if PolicyAction::Ignore is sent. Is everything in the right state? We probably need to make sure the load event still happens on the parent frame. <rdar://116203453>
});
}
String WebRemoteFrameClient::renderTreeAsText(size_t baseIndent, OptionSet<RenderAsTextFlag> behavior)
{
RefPtr page = m_frame->page();
if (!page)
return "Test Error - Missing page"_s;
auto sendResult = page->sendSync(Messages::WebPageProxy::RenderTreeAsText(m_frame->frameID(), baseIndent, behavior));
if (!sendResult.succeeded())
return "Test Error - sending WebPageProxy::RenderTreeAsText failed"_s;
auto [result] = sendResult.takeReply();
return result;
}
void WebRemoteFrameClient::broadcastFrameRemovalToOtherProcesses()
{
WebFrameLoaderClient::broadcastFrameRemovalToOtherProcesses();
}
void WebRemoteFrameClient::closePage()
{
if (auto* page = m_frame->page())
page->sendClose();
}
void WebRemoteFrameClient::focus()
{
if (auto* page = m_frame->page())
page->send(Messages::WebPageProxy::FocusRemoteFrame(m_frame->frameID()));
}
void WebRemoteFrameClient::unfocus()
{
if (auto* page = m_frame->page())
page->send(Messages::WebPageProxy::SetFocus(false));
}
void WebRemoteFrameClient::dispatchDecidePolicyForNavigationAction(const NavigationAction& navigationAction, const ResourceRequest& request, const ResourceResponse& redirectResponse,
FormState* formState, const String& clientRedirectSourceForHistory, uint64_t navigationID, std::optional<HitTestResult>&& hitTestResult, bool hasOpener, SandboxFlags sandboxFlags, PolicyDecisionMode policyDecisionMode, FramePolicyFunction&& function)
{
WebFrameLoaderClient::dispatchDecidePolicyForNavigationAction(navigationAction, request, redirectResponse, formState, clientRedirectSourceForHistory, navigationID, WTFMove(hitTestResult), hasOpener, sandboxFlags, policyDecisionMode, WTFMove(function));
}
}
|