This source file includes following definitions.
- m_callStack
- m_activeDOMObjectsAreStopped
- hasPendingActivity
- suspendActiveDOMObjects
- resumeActiveDOMObjects
- stopActiveDOMObjects
- activeDOMObjectCount
- suspendScheduledTasks
- resumeScheduledTasks
- suspendActiveDOMObjectIfNeeded
- shouldSanitizeScriptError
- reportException
- addConsoleMessage
- addConsoleMessage
- dispatchErrorEvent
- circularSequentialID
- installNewTimeout
- removeTimeoutByID
- publicURLManager
- didChangeTimerAlignmentInterval
- securityOrigin
- contentSecurityPolicy
- url
- completeURL
- disableEval
- executingWindow
- userAgent
- timerAlignmentInterval
- postTask
- postTask
- createLifecycleNotifier
- lifecycleNotifier
- isIteratingOverObservers
- enforceSandboxFlags
#include "config.h"
#include "core/dom/ExecutionContext.h"
#include "core/dom/AddConsoleMessageTask.h"
#include "core/dom/ContextLifecycleNotifier.h"
#include "core/dom/ExecutionContextTask.h"
#include "core/events/EventTarget.h"
#include "core/html/PublicURLManager.h"
#include "core/inspector/InspectorInstrumentation.h"
#include "core/inspector/ScriptCallStack.h"
#include "core/workers/WorkerGlobalScope.h"
#include "core/workers/WorkerThread.h"
#include "wtf/MainThread.h"
namespace WebCore {
class ExecutionContext::PendingException {
WTF_MAKE_NONCOPYABLE(PendingException);
public:
PendingException(const String& errorMessage, int lineNumber, int columnNumber, const String& sourceURL, PassRefPtr<ScriptCallStack> callStack)
: m_errorMessage(errorMessage)
, m_lineNumber(lineNumber)
, m_columnNumber(columnNumber)
, m_sourceURL(sourceURL)
, m_callStack(callStack)
{
}
String m_errorMessage;
int m_lineNumber;
int m_columnNumber;
String m_sourceURL;
RefPtr<ScriptCallStack> m_callStack;
};
ExecutionContext::ExecutionContext()
: m_client(0)
, m_sandboxFlags(SandboxNone)
, m_circularSequentialID(0)
, m_inDispatchErrorEvent(false)
, m_activeDOMObjectsAreSuspended(false)
, m_activeDOMObjectsAreStopped(false)
{
}
ExecutionContext::~ExecutionContext()
{
}
bool ExecutionContext::hasPendingActivity()
{
return lifecycleNotifier().hasPendingActivity();
}
void ExecutionContext::suspendActiveDOMObjects()
{
lifecycleNotifier().notifySuspendingActiveDOMObjects();
m_activeDOMObjectsAreSuspended = true;
}
void ExecutionContext::resumeActiveDOMObjects()
{
m_activeDOMObjectsAreSuspended = false;
lifecycleNotifier().notifyResumingActiveDOMObjects();
}
void ExecutionContext::stopActiveDOMObjects()
{
m_activeDOMObjectsAreStopped = true;
lifecycleNotifier().notifyStoppingActiveDOMObjects();
}
unsigned ExecutionContext::activeDOMObjectCount()
{
return lifecycleNotifier().activeDOMObjects().size();
}
void ExecutionContext::suspendScheduledTasks()
{
suspendActiveDOMObjects();
if (m_client)
m_client->tasksWereSuspended();
}
void ExecutionContext::resumeScheduledTasks()
{
resumeActiveDOMObjects();
if (m_client)
m_client->tasksWereResumed();
}
void ExecutionContext::suspendActiveDOMObjectIfNeeded(ActiveDOMObject* object)
{
ASSERT(lifecycleNotifier().contains(object));
if (m_activeDOMObjectsAreSuspended)
object->suspend();
}
bool ExecutionContext::shouldSanitizeScriptError(const String& sourceURL, AccessControlStatus corsStatus)
{
return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin);
}
void ExecutionContext::reportException(PassRefPtrWillBeRawPtr<ErrorEvent> event, PassRefPtr<ScriptCallStack> callStack, AccessControlStatus corsStatus)
{
RefPtrWillBeRawPtr<ErrorEvent> errorEvent = event;
if (m_inDispatchErrorEvent) {
if (!m_pendingExceptions)
m_pendingExceptions = adoptPtr(new Vector<OwnPtr<PendingException> >());
m_pendingExceptions->append(adoptPtr(new PendingException(errorEvent->messageForConsole(), errorEvent->lineno(), errorEvent->colno(), errorEvent->filename(), callStack)));
return;
}
if (!dispatchErrorEvent(errorEvent, corsStatus) && m_client)
m_client->logExceptionToConsole(errorEvent->messageForConsole(), errorEvent->filename(), errorEvent->lineno(), errorEvent->colno(), callStack);
if (!m_pendingExceptions)
return;
for (size_t i = 0; i < m_pendingExceptions->size(); i++) {
PendingException* e = m_pendingExceptions->at(i).get();
if (m_client)
m_client->logExceptionToConsole(e->m_errorMessage, e->m_sourceURL, e->m_lineNumber, e->m_columnNumber, e->m_callStack);
}
m_pendingExceptions.clear();
}
void ExecutionContext::addConsoleMessage(MessageSource source, MessageLevel level, const String& message, const String& sourceURL, unsigned lineNumber)
{
if (!m_client)
return;
m_client->addMessage(source, level, message, sourceURL, lineNumber, 0);
}
void ExecutionContext::addConsoleMessage(MessageSource source, MessageLevel level, const String& message, ScriptState* state)
{
if (!m_client)
return;
m_client->addMessage(source, level, message, String(), 0, state);
}
bool ExecutionContext::dispatchErrorEvent(PassRefPtrWillBeRawPtr<ErrorEvent> event, AccessControlStatus corsStatus)
{
if (!m_client)
return false;
EventTarget* target = m_client->errorEventTarget();
if (!target)
return false;
RefPtrWillBeRawPtr<ErrorEvent> errorEvent = event;
if (shouldSanitizeScriptError(errorEvent->filename(), corsStatus))
errorEvent = ErrorEvent::createSanitizedError(errorEvent->world());
ASSERT(!m_inDispatchErrorEvent);
m_inDispatchErrorEvent = true;
target->dispatchEvent(errorEvent);
m_inDispatchErrorEvent = false;
return errorEvent->defaultPrevented();
}
int ExecutionContext::circularSequentialID()
{
++m_circularSequentialID;
if (m_circularSequentialID <= 0)
m_circularSequentialID = 1;
return m_circularSequentialID;
}
int ExecutionContext::installNewTimeout(PassOwnPtr<ScheduledAction> action, int timeout, bool singleShot)
{
int timeoutID;
while (true) {
timeoutID = circularSequentialID();
if (!m_timeouts.contains(timeoutID))
break;
}
TimeoutMap::AddResult result = m_timeouts.add(timeoutID, DOMTimer::create(this, action, timeout, singleShot, timeoutID));
ASSERT(result.isNewEntry);
DOMTimer* timer = result.storedValue->value.get();
timer->suspendIfNeeded();
return timer->timeoutID();
}
void ExecutionContext::removeTimeoutByID(int timeoutID)
{
if (timeoutID <= 0)
return;
m_timeouts.remove(timeoutID);
}
PublicURLManager& ExecutionContext::publicURLManager()
{
if (!m_publicURLManager)
m_publicURLManager = PublicURLManager::create(this);
return *m_publicURLManager;
}
void ExecutionContext::didChangeTimerAlignmentInterval()
{
for (TimeoutMap::iterator iter = m_timeouts.begin(); iter != m_timeouts.end(); ++iter)
iter->value->didChangeAlignmentInterval();
}
SecurityOrigin* ExecutionContext::securityOrigin() const
{
RELEASE_ASSERT(m_client);
return m_client->securityContext().securityOrigin();
}
ContentSecurityPolicy* ExecutionContext::contentSecurityPolicy() const
{
RELEASE_ASSERT(m_client);
return m_client->securityContext().contentSecurityPolicy();
}
const KURL& ExecutionContext::url() const
{
if (!m_client) {
DEFINE_STATIC_LOCAL(KURL, emptyURL, ());
return emptyURL;
}
return m_client->virtualURL();
}
KURL ExecutionContext::completeURL(const String& url) const
{
if (!m_client) {
DEFINE_STATIC_LOCAL(KURL, emptyURL, ());
return emptyURL;
}
return m_client->virtualCompleteURL(url);
}
void ExecutionContext::disableEval(const String& errorMessage)
{
if (!m_client)
return;
return m_client->disableEval(errorMessage);
}
DOMWindow* ExecutionContext::executingWindow() const
{
RELEASE_ASSERT(m_client);
return m_client->executingWindow();
}
String ExecutionContext::userAgent(const KURL& url) const
{
if (!m_client)
return String();
return m_client->userAgent(url);
}
double ExecutionContext::timerAlignmentInterval() const
{
if (!m_client)
return DOMTimer::visiblePageAlignmentInterval();
return m_client->timerAlignmentInterval();
}
void ExecutionContext::postTask(PassOwnPtr<ExecutionContextTask> task)
{
if (!m_client)
return;
m_client->postTask(task);
}
void ExecutionContext::postTask(const Closure& closure)
{
if (!m_client)
return;
m_client->postTask(CallClosureTask::create(closure));
}
PassOwnPtr<LifecycleNotifier<ExecutionContext> > ExecutionContext::createLifecycleNotifier()
{
return ContextLifecycleNotifier::create(this);
}
ContextLifecycleNotifier& ExecutionContext::lifecycleNotifier()
{
return static_cast<ContextLifecycleNotifier&>(LifecycleContext<ExecutionContext>::lifecycleNotifier());
}
bool ExecutionContext::isIteratingOverObservers() const
{
return m_lifecycleNotifier && m_lifecycleNotifier->isIteratingOverObservers();
}
void ExecutionContext::enforceSandboxFlags(SandboxFlags mask)
{
m_sandboxFlags |= mask;
RELEASE_ASSERT(m_client);
if (isSandboxed(SandboxOrigin) && m_client->securityContext().securityOrigin() && !m_client->securityContext().securityOrigin()->isUnique()) {
m_client->securityContext().setSecurityOrigin(SecurityOrigin::createUnique());
m_client->didUpdateSecurityOrigin();
}
}
}