summaryrefslogtreecommitdiff
path: root/Userland/Libraries/LibWeb
diff options
context:
space:
mode:
authorAliaksandr Kalenik <kalenik.aliaksandr@gmail.com>2023-04-23 19:31:46 +0300
committerAndreas Kling <kling@serenityos.org>2023-04-24 07:57:15 +0200
commit3b00636288e1ce0dec849266f2ab3db8e2a6a3cf (patch)
tree4bd2d25c861fde6369942987cf80c3948c590a2d /Userland/Libraries/LibWeb
parent6871fbce9f93a7b4bb9f6e3e553aa1befbafe855 (diff)
downloadserenity-3b00636288e1ce0dec849266f2ab3db8e2a6a3cf.zip
LibWeb: Implement "create a new browsing context and document"
Co-authored-by: Andreas Kling <kling@serenityos.org>
Diffstat (limited to 'Userland/Libraries/LibWeb')
-rw-r--r--Userland/Libraries/LibWeb/DOM/Document.cpp2
-rw-r--r--Userland/Libraries/LibWeb/DOM/Document.h2
-rw-r--r--Userland/Libraries/LibWeb/HTML/BrowsingContext.cpp186
-rw-r--r--Userland/Libraries/LibWeb/HTML/BrowsingContext.h10
4 files changed, 196 insertions, 4 deletions
diff --git a/Userland/Libraries/LibWeb/DOM/Document.cpp b/Userland/Libraries/LibWeb/DOM/Document.cpp
index 146dc230b3..8d270c21e2 100644
--- a/Userland/Libraries/LibWeb/DOM/Document.cpp
+++ b/Userland/Libraries/LibWeb/DOM/Document.cpp
@@ -2094,7 +2094,7 @@ void Document::check_favicon_after_loading_link_resource()
dbgln_if(SPAM_DEBUG, "No favicon found to be used");
}
-void Document::set_window(Badge<HTML::BrowsingContext>, HTML::Window& window)
+void Document::set_window(HTML::Window& window)
{
m_window = &window;
}
diff --git a/Userland/Libraries/LibWeb/DOM/Document.h b/Userland/Libraries/LibWeb/DOM/Document.h
index 08dda4e7bc..6af28868cf 100644
--- a/Userland/Libraries/LibWeb/DOM/Document.h
+++ b/Userland/Libraries/LibWeb/DOM/Document.h
@@ -300,7 +300,7 @@ public:
HTML::Window& window() const { return const_cast<HTML::Window&>(*m_window); }
- void set_window(Badge<HTML::BrowsingContext>, HTML::Window&);
+ void set_window(HTML::Window&);
WebIDL::ExceptionOr<void> write(Vector<DeprecatedString> const& strings);
WebIDL::ExceptionOr<void> writeln(Vector<DeprecatedString> const& strings);
diff --git a/Userland/Libraries/LibWeb/HTML/BrowsingContext.cpp b/Userland/Libraries/LibWeb/HTML/BrowsingContext.cpp
index c42fdfa3b1..874fce80b6 100644
--- a/Userland/Libraries/LibWeb/HTML/BrowsingContext.cpp
+++ b/Userland/Libraries/LibWeb/HTML/BrowsingContext.cpp
@@ -206,7 +206,7 @@ JS::NonnullGCPtr<BrowsingContext> BrowsingContext::create_a_new_browsing_context
auto document = DOM::Document::create(window->realm()).release_value_but_fixme_should_propagate_errors();
// Non-standard
- document->set_window({}, *window);
+ document->set_window(*window);
window->set_associated_document(*document);
document->set_quirks_mode(DOM::QuirksMode::Yes);
@@ -256,6 +256,183 @@ JS::NonnullGCPtr<BrowsingContext> BrowsingContext::create_a_new_browsing_context
return *browsing_context;
}
+// https://html.spec.whatwg.org/multipage/document-sequences.html#creating-a-new-auxiliary-browsing-context
+WebIDL::ExceptionOr<BrowsingContext::BrowsingContextAndDocument> BrowsingContext::create_a_new_auxiliary_browsing_context_and_document(Page& page, JS::NonnullGCPtr<HTML::BrowsingContext> opener)
+{
+ // 1. Let openerTopLevelBrowsingContext be opener's top-level traversable's active browsing context.
+ auto opener_top_level_browsing_context = opener->top_level_traversable()->active_browsing_context();
+
+ // 2. Let group be openerTopLevelBrowsingContext's group.
+ auto group = opener_top_level_browsing_context->group();
+
+ // 3. Assert: group is non-null, as navigating invokes this directly.
+ VERIFY(group);
+
+ // 4. Set browsingContext and document be the result of creating a new browsing context and document with opener's active document, null, and group.
+ auto [browsing_context, document] = TRY(create_a_new_browsing_context_and_document(page, opener->active_document(), nullptr, *group));
+
+ // FIXME: 5. Set browsingContext's is auxiliary to true.
+
+ // 6. Append browsingContext to group.
+ group->append(browsing_context);
+
+ // 7. Set browsingContext's opener browsing context to opener.
+ browsing_context->set_opener_browsing_context(opener);
+
+ // FIXME: 8. Set browsingContext's virtual browsing context group ID to openerTopLevelBrowsingContext's virtual browsing context group ID.
+
+ // FIXME: 9. Set browsingContext's opener origin at creation to opener's active document's origin.
+
+ // 10. Return browsingContext and document.
+ return BrowsingContext::BrowsingContextAndDocument { browsing_context, document };
+}
+
+// https://html.spec.whatwg.org/multipage/document-sequences.html#creating-a-new-browsing-context
+WebIDL::ExceptionOr<BrowsingContext::BrowsingContextAndDocument> BrowsingContext::create_a_new_browsing_context_and_document(Page& page, JS::GCPtr<DOM::Document> creator, JS::GCPtr<DOM::Element> embedder, JS::NonnullGCPtr<BrowsingContextGroup> group)
+{
+ auto& vm = group->vm();
+
+ // 1. Let browsingContext be a new browsing context.
+ JS::NonnullGCPtr<BrowsingContext> browsing_context = *vm.heap().allocate_without_realm<BrowsingContext>(page, nullptr);
+
+ // 2. Let unsafeContextCreationTime be the unsafe shared current time.
+ [[maybe_unused]] auto unsafe_context_creation_time = HighResolutionTime::unsafe_shared_current_time();
+
+ // 3. Let creatorOrigin be null.
+ Optional<Origin> creator_origin = {};
+
+ // 4. If creator is non-null, then:
+ if (creator) {
+ // 1. Set creatorOrigin to creator's origin.
+ creator_origin = creator->origin();
+
+ // FIXME: 2. Set browsingContext's creator base URL to an algorithm which returns creator's base URL.
+
+ // FIXME: 3. Set browsingContext's virtual browsing context group ID to creator's browsing context's top-level browsing context's virtual browsing context group ID.
+ }
+
+ // FIXME: 5. Let sandboxFlags be the result of determining the creation sandboxing flags given browsingContext and embedder.
+ SandboxingFlagSet sandbox_flags;
+
+ // 6. Let origin be the result of determining the origin given about:blank, sandboxFlags, creatorOrigin, and null.
+ auto origin = determine_the_origin(AK::URL("about:blank"sv), sandbox_flags, creator_origin, {});
+
+ // FIXME: 7. Let permissionsPolicy be the result of creating a permissions policy given browsingContext and origin. [PERMISSIONSPOLICY]
+
+ // FIXME: 8. Let agent be the result of obtaining a similar-origin window agent given origin, group, and false.
+
+ JS::GCPtr<Window> window;
+
+ // 9. Let realm execution context be the result of creating a new JavaScript realm given agent and the following customizations:
+ auto realm_execution_context = Bindings::create_a_new_javascript_realm(
+ Bindings::main_thread_vm(),
+ [&](JS::Realm& realm) -> JS::Object* {
+ auto window_proxy = realm.heap().allocate<WindowProxy>(realm, realm);
+ browsing_context->set_window_proxy(window_proxy.release_allocated_value_but_fixme_should_propagate_errors());
+
+ // - For the global object, create a new Window object.
+ window = Window::create(realm).release_value_but_fixme_should_propagate_errors();
+ return window.ptr();
+ },
+ [&](JS::Realm&) -> JS::Object* {
+ // - For the global this binding, use browsingContext's WindowProxy object.
+ return browsing_context->window_proxy();
+ });
+
+ // 10. Let topLevelCreationURL be about:blank if embedder is null; otherwise embedder's relevant settings object's top-level creation URL.
+ auto top_level_creation_url = !embedder ? AK::URL("about:blank") : relevant_settings_object(*embedder).top_level_creation_url;
+
+ // 11. Let topLevelOrigin be origin if embedder is null; otherwise embedder's relevant settings object's top-level origin.
+ auto top_level_origin = !embedder ? origin : relevant_settings_object(*embedder).origin();
+
+ // 12. Set up a window environment settings object with about:blank, realm execution context, null, topLevelCreationURL, and topLevelOrigin.
+ TRY(WindowEnvironmentSettingsObject::setup(
+ AK::URL("about:blank"),
+ move(realm_execution_context),
+ {},
+ top_level_creation_url,
+ top_level_origin));
+
+ // 13. Let loadTimingInfo be a new document load timing info with its navigation start time set to the result of calling
+ // coarsen time with unsafeContextCreationTime and the new environment settings object's cross-origin isolated capability.
+ auto load_timing_info = DOM::DocumentLoadTimingInfo();
+ load_timing_info.navigation_start_time = HighResolutionTime::coarsen_time(
+ unsafe_context_creation_time,
+ verify_cast<WindowEnvironmentSettingsObject>(Bindings::host_defined_environment_settings_object(window->realm())).cross_origin_isolated_capability() == CanUseCrossOriginIsolatedAPIs::Yes);
+
+ // 14. Let document be a new Document, with:
+ auto document = TRY(DOM::Document::create(window->realm()));
+
+ // Non-standard
+ document->set_window(*window);
+ window->set_associated_document(*document);
+
+ // type: "html"
+ document->set_document_type(DOM::Document::Type::HTML);
+
+ // content type: "text/html"
+ document->set_content_type("text/html");
+
+ // mode: "quirks"
+ document->set_quirks_mode(DOM::QuirksMode::Yes);
+
+ // origin: origin
+ document->set_origin(origin);
+
+ // browsing context: browsingContext
+ document->set_browsing_context(browsing_context);
+
+ // FIXME: permissions policy: permissionsPolicy
+
+ // FIXME: active sandboxing flag set: sandboxFlags
+
+ // load timing info: loadTimingInfo
+ document->set_load_timing_info(load_timing_info);
+
+ // is initial about:blank: true
+ document->set_is_initial_about_blank(true);
+
+ // 15. If creator is non-null, then:
+ if (creator) {
+ // 1. Set document's referrer to the serialization of creator's URL.
+ document->set_referrer(creator->url().serialize());
+
+ // FIXME: 2. Set document's policy container to a clone of creator's policy container.
+
+ // 3. If creator's origin is same origin with creator's relevant settings object's top-level origin,
+ if (creator->origin().is_same_origin(creator->relevant_settings_object().top_level_origin)) {
+ // then set document's cross-origin opener policy to creator's browsing context's top-level browsing context's active document's cross-origin opener policy.
+ VERIFY(creator->browsing_context());
+ VERIFY(creator->browsing_context()->top_level_browsing_context().active_document());
+ document->set_cross_origin_opener_policy(creator->browsing_context()->top_level_browsing_context().active_document()->cross_origin_opener_policy());
+ }
+ }
+
+ // 16. Assert: document's URL and document's relevant settings object's creation URL are about:blank.
+ VERIFY(document->url() == "about:blank"sv);
+ VERIFY(document->relevant_settings_object().creation_url == "about:blank"sv);
+
+ // 17. Mark document as ready for post-load tasks.
+ document->set_ready_for_post_load_tasks(true);
+
+ // 18. Ensure that document has a single child html node, which itself has two empty child nodes: a head element, and a body element.
+ auto html_node = TRY(DOM::create_element(document, HTML::TagNames::html, Namespace::HTML));
+ auto head_element = TRY(DOM::create_element(document, HTML::TagNames::head, Namespace::HTML));
+ TRY(html_node->append_child(head_element));
+ auto body_element = TRY(DOM::create_element(document, HTML::TagNames::body, Namespace::HTML));
+ TRY(html_node->append_child(body_element));
+ TRY(document->append_child(html_node));
+
+ // 19. Make active document.
+ document->make_active();
+
+ // 20. Completely finish loading document.
+ document->completely_finish_loading();
+
+ // 21. Return browsingContext and document.
+ return BrowsingContext::BrowsingContextAndDocument { browsing_context, document };
+}
+
BrowsingContext::BrowsingContext(Page& page, HTML::NavigableContainer* container)
: m_page(page)
, m_loader(*this)
@@ -344,7 +521,7 @@ void BrowsingContext::set_active_document(JS::NonnullGCPtr<DOM::Document> docume
document->set_visibility_state({}, top_level_browsing_context().system_visibility_state());
// 3. Set browsingContext's active window to window.
- m_window_proxy->set_window({}, window);
+ m_window_proxy->set_window(window);
// 4. Set window's associated Document to document.
window.set_associated_document(document);
@@ -856,6 +1033,11 @@ HTML::WindowProxy const* BrowsingContext::window_proxy() const
return m_window_proxy.ptr();
}
+void BrowsingContext::set_window_proxy(JS::GCPtr<WindowProxy> window_proxy)
+{
+ m_window_proxy = move(window_proxy);
+}
+
void BrowsingContext::scroll_offset_did_change()
{
// https://w3c.github.io/csswg-drafts/cssom-view-1/#scrolling-events
diff --git a/Userland/Libraries/LibWeb/HTML/BrowsingContext.h b/Userland/Libraries/LibWeb/HTML/BrowsingContext.h
index b65a0e45b1..d043fa6982 100644
--- a/Userland/Libraries/LibWeb/HTML/BrowsingContext.h
+++ b/Userland/Libraries/LibWeb/HTML/BrowsingContext.h
@@ -40,6 +40,14 @@ public:
static JS::NonnullGCPtr<BrowsingContext> create_a_new_browsing_context(Page&, JS::GCPtr<DOM::Document> creator, JS::GCPtr<DOM::Element> embedder, BrowsingContextGroup&);
static JS::NonnullGCPtr<BrowsingContext> create_a_new_top_level_browsing_context(Page&);
+ struct BrowsingContextAndDocument {
+ JS::NonnullGCPtr<BrowsingContext> browsing_context;
+ JS::NonnullGCPtr<DOM::Document> document;
+ };
+
+ static WebIDL::ExceptionOr<BrowsingContextAndDocument> create_a_new_browsing_context_and_document(Page& page, JS::GCPtr<DOM::Document> creator, JS::GCPtr<DOM::Element> embedder, JS::NonnullGCPtr<BrowsingContextGroup> group);
+ static WebIDL::ExceptionOr<BrowsingContextAndDocument> create_a_new_auxiliary_browsing_context_and_document(Page& page, JS::NonnullGCPtr<HTML::BrowsingContext> opener);
+
virtual ~BrowsingContext() override;
JS::NonnullGCPtr<HTML::TraversableNavigable> top_level_traversable() const;
@@ -129,6 +137,8 @@ public:
virtual HTML::WindowProxy* window_proxy() override;
virtual HTML::WindowProxy const* window_proxy() const override;
+ void set_window_proxy(JS::GCPtr<WindowProxy>);
+
HTML::Window* active_window();
HTML::Window const* active_window() const;