summaryrefslogtreecommitdiffstats
path: root/dom/html/HTMLIFrameElement.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
commit36d22d82aa202bb199967e9512281e9a53db42c9 (patch)
tree105e8c98ddea1c1e4784a60a5a6410fa416be2de /dom/html/HTMLIFrameElement.cpp
parentInitial commit. (diff)
downloadfirefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz
firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip
Adding upstream version 115.7.0esr.upstream/115.7.0esrupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/html/HTMLIFrameElement.cpp')
-rw-r--r--dom/html/HTMLIFrameElement.cpp293
1 files changed, 293 insertions, 0 deletions
diff --git a/dom/html/HTMLIFrameElement.cpp b/dom/html/HTMLIFrameElement.cpp
new file mode 100644
index 0000000000..3e99ed425e
--- /dev/null
+++ b/dom/html/HTMLIFrameElement.cpp
@@ -0,0 +1,293 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "mozilla/dom/HTMLIFrameElement.h"
+#include "mozilla/dom/ContentChild.h"
+#include "mozilla/dom/Document.h"
+#include "mozilla/dom/HTMLIFrameElementBinding.h"
+#include "mozilla/dom/FeaturePolicy.h"
+#include "mozilla/MappedDeclarations.h"
+#include "mozilla/NullPrincipal.h"
+#include "mozilla/StaticPrefs_dom.h"
+#include "nsMappedAttributes.h"
+#include "nsAttrValueInlines.h"
+#include "nsError.h"
+#include "nsStyleConsts.h"
+#include "nsContentUtils.h"
+#include "nsSandboxFlags.h"
+#include "nsNetUtil.h"
+
+NS_IMPL_NS_NEW_HTML_ELEMENT_CHECK_PARSER(IFrame)
+
+namespace mozilla::dom {
+
+NS_IMPL_CYCLE_COLLECTION_CLASS(HTMLIFrameElement)
+
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN_INHERITED(HTMLIFrameElement,
+ nsGenericHTMLFrameElement)
+ NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mFeaturePolicy)
+ NS_IMPL_CYCLE_COLLECTION_TRAVERSE(mSandbox)
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
+
+NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN_INHERITED(HTMLIFrameElement,
+ nsGenericHTMLFrameElement)
+ NS_IMPL_CYCLE_COLLECTION_UNLINK(mFeaturePolicy)
+ NS_IMPL_CYCLE_COLLECTION_UNLINK(mSandbox)
+NS_IMPL_CYCLE_COLLECTION_UNLINK_END
+
+NS_IMPL_ADDREF_INHERITED(HTMLIFrameElement, nsGenericHTMLFrameElement)
+NS_IMPL_RELEASE_INHERITED(HTMLIFrameElement, nsGenericHTMLFrameElement)
+
+NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(HTMLIFrameElement)
+NS_INTERFACE_MAP_END_INHERITING(nsGenericHTMLFrameElement)
+
+// static
+const DOMTokenListSupportedToken HTMLIFrameElement::sSupportedSandboxTokens[] =
+ {
+#define SANDBOX_KEYWORD(string, atom, flags) string,
+#include "IframeSandboxKeywordList.h"
+#undef SANDBOX_KEYWORD
+ nullptr};
+
+HTMLIFrameElement::HTMLIFrameElement(
+ already_AddRefed<mozilla::dom::NodeInfo>&& aNodeInfo,
+ FromParser aFromParser)
+ : nsGenericHTMLFrameElement(std::move(aNodeInfo), aFromParser) {
+ // We always need a featurePolicy, even if not exposed.
+ mFeaturePolicy = new mozilla::dom::FeaturePolicy(this);
+ nsCOMPtr<nsIPrincipal> origin = GetFeaturePolicyDefaultOrigin();
+ MOZ_ASSERT(origin);
+ mFeaturePolicy->SetDefaultOrigin(origin);
+}
+
+HTMLIFrameElement::~HTMLIFrameElement() = default;
+
+NS_IMPL_ELEMENT_CLONE(HTMLIFrameElement)
+
+void HTMLIFrameElement::BindToBrowsingContext(BrowsingContext*) {
+ RefreshFeaturePolicy(true /* parse the feature policy attribute */);
+}
+
+bool HTMLIFrameElement::ParseAttribute(int32_t aNamespaceID, nsAtom* aAttribute,
+ const nsAString& aValue,
+ nsIPrincipal* aMaybeScriptedPrincipal,
+ nsAttrValue& aResult) {
+ if (aNamespaceID == kNameSpaceID_None) {
+ if (aAttribute == nsGkAtoms::marginwidth) {
+ return aResult.ParseNonNegativeIntValue(aValue);
+ }
+ if (aAttribute == nsGkAtoms::marginheight) {
+ return aResult.ParseNonNegativeIntValue(aValue);
+ }
+ if (aAttribute == nsGkAtoms::width) {
+ return aResult.ParseHTMLDimension(aValue);
+ }
+ if (aAttribute == nsGkAtoms::height) {
+ return aResult.ParseHTMLDimension(aValue);
+ }
+ if (aAttribute == nsGkAtoms::frameborder) {
+ return ParseFrameborderValue(aValue, aResult);
+ }
+ if (aAttribute == nsGkAtoms::scrolling) {
+ return ParseScrollingValue(aValue, aResult);
+ }
+ if (aAttribute == nsGkAtoms::align) {
+ return ParseAlignValue(aValue, aResult);
+ }
+ if (aAttribute == nsGkAtoms::sandbox) {
+ aResult.ParseAtomArray(aValue);
+ return true;
+ }
+ }
+
+ return nsGenericHTMLFrameElement::ParseAttribute(
+ aNamespaceID, aAttribute, aValue, aMaybeScriptedPrincipal, aResult);
+}
+
+void HTMLIFrameElement::MapAttributesIntoRule(
+ const nsMappedAttributes* aAttributes, MappedDeclarations& aDecls) {
+ // frameborder: 0 | 1 (| NO | YES in quirks mode)
+ // If frameborder is 0 or No, set border to 0
+ // else leave it as the value set in html.css
+ const nsAttrValue* value = aAttributes->GetAttr(nsGkAtoms::frameborder);
+ if (value && value->Type() == nsAttrValue::eEnum) {
+ auto frameborder = static_cast<FrameBorderProperty>(value->GetEnumValue());
+ if (FrameBorderProperty::No == frameborder ||
+ FrameBorderProperty::Zero == frameborder) {
+ aDecls.SetPixelValueIfUnset(eCSSProperty_border_top_width, 0.0f);
+ aDecls.SetPixelValueIfUnset(eCSSProperty_border_right_width, 0.0f);
+ aDecls.SetPixelValueIfUnset(eCSSProperty_border_bottom_width, 0.0f);
+ aDecls.SetPixelValueIfUnset(eCSSProperty_border_left_width, 0.0f);
+ }
+ }
+
+ nsGenericHTMLElement::MapImageSizeAttributesInto(aAttributes, aDecls);
+ nsGenericHTMLElement::MapImageAlignAttributeInto(aAttributes, aDecls);
+ nsGenericHTMLElement::MapCommonAttributesInto(aAttributes, aDecls);
+}
+
+NS_IMETHODIMP_(bool)
+HTMLIFrameElement::IsAttributeMapped(const nsAtom* aAttribute) const {
+ static const MappedAttributeEntry attributes[] = {
+ {nsGkAtoms::width},
+ {nsGkAtoms::height},
+ {nsGkAtoms::frameborder},
+ {nullptr},
+ };
+
+ static const MappedAttributeEntry* const map[] = {
+ attributes,
+ sImageAlignAttributeMap,
+ sCommonAttributeMap,
+ };
+
+ return FindAttributeDependence(aAttribute, map);
+}
+
+nsMapRuleToAttributesFunc HTMLIFrameElement::GetAttributeMappingFunction()
+ const {
+ return &MapAttributesIntoRule;
+}
+
+void HTMLIFrameElement::AfterSetAttr(int32_t aNameSpaceID, nsAtom* aName,
+ const nsAttrValue* aValue,
+ const nsAttrValue* aOldValue,
+ nsIPrincipal* aMaybeScriptedPrincipal,
+ bool aNotify) {
+ AfterMaybeChangeAttr(aNameSpaceID, aName, aNotify);
+
+ if (aNameSpaceID == kNameSpaceID_None) {
+ if (aName == nsGkAtoms::sandbox) {
+ if (mFrameLoader) {
+ // If we have an nsFrameLoader, apply the new sandbox flags.
+ // Since this is called after the setter, the sandbox flags have
+ // alreay been updated.
+ mFrameLoader->ApplySandboxFlags(GetSandboxFlags());
+ }
+ }
+
+ if (aName == nsGkAtoms::allow || aName == nsGkAtoms::src ||
+ aName == nsGkAtoms::srcdoc || aName == nsGkAtoms::sandbox) {
+ RefreshFeaturePolicy(true /* parse the feature policy attribute */);
+ } else if (aName == nsGkAtoms::allowfullscreen) {
+ RefreshFeaturePolicy(false /* parse the feature policy attribute */);
+ }
+ }
+ return nsGenericHTMLFrameElement::AfterSetAttr(
+ aNameSpaceID, aName, aValue, aOldValue, aMaybeScriptedPrincipal, aNotify);
+}
+
+void HTMLIFrameElement::OnAttrSetButNotChanged(
+ int32_t aNamespaceID, nsAtom* aName, const nsAttrValueOrString& aValue,
+ bool aNotify) {
+ AfterMaybeChangeAttr(aNamespaceID, aName, aNotify);
+
+ return nsGenericHTMLFrameElement::OnAttrSetButNotChanged(aNamespaceID, aName,
+ aValue, aNotify);
+}
+
+void HTMLIFrameElement::AfterMaybeChangeAttr(int32_t aNamespaceID,
+ nsAtom* aName, bool aNotify) {
+ if (aNamespaceID == kNameSpaceID_None) {
+ if (aName == nsGkAtoms::srcdoc) {
+ // Don't propagate errors from LoadSrc. The attribute was successfully
+ // set/unset, that's what we should reflect.
+ LoadSrc();
+ }
+ }
+}
+
+uint32_t HTMLIFrameElement::GetSandboxFlags() const {
+ const nsAttrValue* sandboxAttr = GetParsedAttr(nsGkAtoms::sandbox);
+ // No sandbox attribute, no sandbox flags.
+ if (!sandboxAttr) {
+ return SANDBOXED_NONE;
+ }
+ return nsContentUtils::ParseSandboxAttributeToFlags(sandboxAttr);
+}
+
+JSObject* HTMLIFrameElement::WrapNode(JSContext* aCx,
+ JS::Handle<JSObject*> aGivenProto) {
+ return HTMLIFrameElement_Binding::Wrap(aCx, this, aGivenProto);
+}
+
+mozilla::dom::FeaturePolicy* HTMLIFrameElement::FeaturePolicy() const {
+ return mFeaturePolicy;
+}
+
+void HTMLIFrameElement::MaybeStoreCrossOriginFeaturePolicy() {
+ if (!mFrameLoader) {
+ return;
+ }
+
+ // If the browsingContext is not ready (because docshell is dead), don't try
+ // to create one.
+ if (!mFrameLoader->IsRemoteFrame() && !mFrameLoader->GetExistingDocShell()) {
+ return;
+ }
+
+ RefPtr<BrowsingContext> browsingContext = mFrameLoader->GetBrowsingContext();
+
+ if (!browsingContext || !browsingContext->IsContentSubframe()) {
+ return;
+ }
+
+ if (ContentChild* cc = ContentChild::GetSingleton()) {
+ Unused << cc->SendSetContainerFeaturePolicy(browsingContext,
+ mFeaturePolicy);
+ }
+}
+
+already_AddRefed<nsIPrincipal>
+HTMLIFrameElement::GetFeaturePolicyDefaultOrigin() const {
+ nsCOMPtr<nsIPrincipal> principal;
+
+ if (HasAttr(kNameSpaceID_None, nsGkAtoms::srcdoc)) {
+ principal = NodePrincipal();
+ return principal.forget();
+ }
+
+ nsCOMPtr<nsIURI> nodeURI;
+ if (GetURIAttr(nsGkAtoms::src, nullptr, getter_AddRefs(nodeURI)) && nodeURI) {
+ principal = BasePrincipal::CreateContentPrincipal(
+ nodeURI, BasePrincipal::Cast(NodePrincipal())->OriginAttributesRef());
+ }
+
+ if (!principal) {
+ principal = NodePrincipal();
+ }
+
+ return principal.forget();
+}
+
+void HTMLIFrameElement::RefreshFeaturePolicy(bool aParseAllowAttribute) {
+ if (aParseAllowAttribute) {
+ mFeaturePolicy->ResetDeclaredPolicy();
+
+ // The origin can change if 'src' and 'srcdoc' attributes change.
+ nsCOMPtr<nsIPrincipal> origin = GetFeaturePolicyDefaultOrigin();
+ MOZ_ASSERT(origin);
+ mFeaturePolicy->SetDefaultOrigin(origin);
+
+ nsAutoString allow;
+ GetAttr(nsGkAtoms::allow, allow);
+
+ if (!allow.IsEmpty()) {
+ // Set or reset the FeaturePolicy directives.
+ mFeaturePolicy->SetDeclaredPolicy(OwnerDoc(), allow, NodePrincipal(),
+ origin);
+ }
+ }
+
+ if (AllowFullscreen()) {
+ mFeaturePolicy->MaybeSetAllowedPolicy(u"fullscreen"_ns);
+ }
+
+ mFeaturePolicy->InheritPolicy(OwnerDoc()->FeaturePolicy());
+ MaybeStoreCrossOriginFeaturePolicy();
+}
+
+} // namespace mozilla::dom