Index: third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
diff --git a/third_party/WebKit/Source/core/dom/ScriptLoader.cpp b/third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
index 77cc040f3400f0f5af8bc9f49e42ae0b41fe73e9..00410e997593f30420d1c6e72f03fee8a8695671 100644 |
--- a/third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
+++ b/third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
@@ -26,6 +26,7 @@ |
#include "bindings/core/v8/ScriptController.h" |
#include "bindings/core/v8/ScriptSourceCode.h" |
+#include "bindings/core/v8/V8Binding.h" |
#include "core/HTMLNames.h" |
#include "core/SVGNames.h" |
#include "core/dom/ClassicPendingScript.h" |
@@ -33,6 +34,8 @@ |
#include "core/dom/Document.h" |
#include "core/dom/DocumentParserTiming.h" |
#include "core/dom/IgnoreDestructiveWriteCountIncrementer.h" |
+#include "core/dom/Modulator.h" |
+#include "core/dom/ModulePendingScript.h" |
#include "core/dom/Script.h" |
#include "core/dom/ScriptElementBase.h" |
#include "core/dom/ScriptRunner.h" |
@@ -45,6 +48,8 @@ |
#include "core/html/CrossOriginAttribute.h" |
#include "core/html/imports/HTMLImport.h" |
#include "core/html/parser/HTMLParserIdioms.h" |
+#include "core/loader/modulescript/ModuleScriptFetchRequest.h" |
+#include "core/loader/resource/ScriptResource.h" |
#include "platform/WebFrameScheduler.h" |
#include "platform/loader/fetch/AccessControlStatus.h" |
#include "platform/loader/fetch/FetchParameters.h" |
@@ -106,6 +111,7 @@ DEFINE_TRACE(ScriptLoader) { |
visitor->Trace(element_); |
visitor->Trace(resource_); |
visitor->Trace(pending_script_); |
+ visitor->Trace(module_tree_client_); |
PendingScriptClient::Trace(visitor); |
} |
@@ -235,6 +241,14 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
if (!IsScriptTypeSupported(support_legacy_types)) |
return false; |
+ // TODO(hiroshige): Make the determination of script type spec-comformant. |
+ if (RuntimeEnabledFeatures::moduleScriptsEnabled() && |
+ element_->TypeAttributeValue() == "module") { |
+ script_type_ = ScriptType::kModule; |
+ } else { |
+ script_type_ = ScriptType::kClassic; |
+ } |
+ |
// 7. "If was-parser-inserted is true, |
// then flag the element as "parser-inserted" again, |
// and set the element's "non-blocking" flag to false." |
@@ -295,6 +309,14 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
return false; |
} |
+ // Inline module script is not yet supported. |
+ if (GetScriptType() == ScriptType::kModule && !module_tree_client_) { |
+ fprintf(stderr, |
+ "Inline module script is not yet supported (Document URL: %s)\n", |
+ element_document.Url().GetString().Utf8().Data()); |
+ CHECK(false); |
+ } |
+ |
// 22. "If the element does not have a src content attribute, |
// run these substeps:" |
@@ -321,8 +343,9 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
// Since the asynchronous, low priority fetch for doc.written blocked |
// script is not for execution, return early from here. Watch for its |
// completion to be able to remove it from the memory cache. |
- if (document_write_intervention_ == |
- DocumentWriteIntervention::kFetchDocWrittenScriptDeferIdle) { |
+ if (GetScriptType() == ScriptType::kClassic && |
+ document_write_intervention_ == |
+ DocumentWriteIntervention::kFetchDocWrittenScriptDeferIdle) { |
pending_script_ = CreatePendingScript(); |
pending_script_->WatchForLoad(this); |
return true; |
@@ -343,9 +366,14 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
// the element has a src attribute, and the element has a defer attribute, |
// and the element has been flagged as "parser-inserted", |
// and the element does not have an async attribute" |
- // TODO(hiroshige): Check the script's type and implement "module" case. |
- if (element_->HasSourceAttribute() && element_->DeferAttributeValue() && |
- parser_inserted_ && !element_->AsyncAttributeValue()) { |
+ // - "If the script's type is "module", |
+ // and the element has been flagged as "parser-inserted", |
+ // and the element does not have an async attribute" |
+ if ((GetScriptType() == ScriptType::kClassic && |
+ element_->HasSourceAttribute() && element_->DeferAttributeValue() && |
+ parser_inserted_ && !element_->AsyncAttributeValue()) || |
+ (GetScriptType() == ScriptType::kModule && parser_inserted_ && |
+ !element_->AsyncAttributeValue())) { |
// This clause is implemented by the caller-side of prepareScript(): |
// - HTMLParserScriptRunner::requestDeferredScript(), and |
// - TODO(hiroshige): Investigate XMLDocumentParser::endElementNs() |
@@ -361,7 +389,8 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
// and the element has been flagged as "parser-inserted", |
// and the element does not have an async attribute" |
// TODO(hiroshige): Check the script's type. |
- if (element_->HasSourceAttribute() && parser_inserted_ && |
+ if (GetScriptType() == ScriptType::kClassic && |
+ element_->HasSourceAttribute() && parser_inserted_ && |
!element_->AsyncAttributeValue()) { |
// This clause is implemented by the caller-side of prepareScript(): |
// - HTMLParserScriptRunner::requestParsingBlockingScript() |
@@ -385,7 +414,11 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
// Part of the condition check is done in |
// HTMLParserScriptRunner::processScriptElementInternal(). |
// TODO(hiroshige): Clean up the split condition check. |
- if (!element_->HasSourceAttribute() && parser_inserted_ && |
+ // We check that the type is "classic" here, because according to the spec |
+ // a "module" script doesn't reach the 5th Clause because the 4th Clause |
+ // catches all "module" scripts. |
+ if (GetScriptType() == ScriptType::kClassic && |
+ !element_->HasSourceAttribute() && parser_inserted_ && |
!element_document.IsScriptExecutionReady()) { |
// The former part of this clause is |
// implemented by the caller-side of prepareScript(): |
@@ -403,16 +436,22 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
// and the element has a src attribute, |
// and the element does not have an async attribute, |
// and the element does not have the "non-blocking" flag set" |
+ // - "If the script's type is "module", |
+ // and the element does not have an async attribute, |
+ // and the element does not have the "non-blocking" flag set" |
// TODO(hiroshige): Check the script's type and implement "module" case. |
- if (element_->HasSourceAttribute() && !element_->AsyncAttributeValue() && |
- !non_blocking_) { |
+ if ((GetScriptType() == ScriptType::kClassic && |
+ element_->HasSourceAttribute() && !element_->AsyncAttributeValue() && |
+ !non_blocking_) || |
+ (GetScriptType() == ScriptType::kModule && |
+ !element_->AsyncAttributeValue() && !non_blocking_)) { |
// "Add the element to the end of the list of scripts that will execute |
// in order as soon as possible associated with the node document of the |
// script element at the time the prepare a script algorithm started." |
pending_script_ = CreatePendingScript(); |
async_exec_type_ = ScriptRunner::kInOrder; |
// TODO(hiroshige): Here |contextDocument| is used as "node document" |
- // while Step 14 uses |elementDocument| as "node document". Fix this. |
+ // while Step 14 uses |element_document| as "node document". Fix this. |
context_document->GetScriptRunner()->QueueScriptForExecution( |
this, async_exec_type_); |
// Note that watchForLoad can immediately call pendingScriptFinished. |
@@ -426,8 +465,10 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
// 4th Clause: |
// - "If the script's type is "classic", and the element has a src attribute" |
- // TODO(hiroshige): Check the script's type and implement "module" case. |
- if (element_->HasSourceAttribute()) { |
+ // - "If the script's type is "module"" |
+ if ((GetScriptType() == ScriptType::kClassic && |
+ element_->HasSourceAttribute()) || |
+ GetScriptType() == ScriptType::kModule) { |
// "The element must be added to the set of scripts that will execute |
// as soon as possible of the node document of the script element at the |
// time the prepare a script algorithm started." |
@@ -435,8 +476,9 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
async_exec_type_ = ScriptRunner::kAsync; |
pending_script_->StartStreamingIfPossible(&element_->GetDocument(), |
ScriptStreamer::kAsync); |
+ |
// TODO(hiroshige): Here |contextDocument| is used as "node document" |
- // while Step 14 uses |elementDocument| as "node document". Fix this. |
+ // while Step 14 uses |element_document| as "node document". Fix this. |
context_document->GetScriptRunner()->QueueScriptForExecution( |
this, async_exec_type_); |
// Note that watchForLoad can immediately call pendingScriptFinished. |
@@ -458,6 +500,8 @@ bool ScriptLoader::PrepareScript(const TextPosition& script_start_position, |
// This clause is executed only if the script's type is "classic" |
// and the element doesn't have a src attribute. |
+ DCHECK_EQ(GetScriptType(), ScriptType::kClassic); |
+ DCHECK(!is_external_script_); |
// Reset line numbering for nested writes. |
TextPosition position = element_document.IsInDocumentWrite() |
@@ -485,76 +529,117 @@ bool ScriptLoader::FetchScript(const String& source_url, |
return false; |
DCHECK(!resource_); |
+ DCHECK(!module_tree_client_); |
+ |
// 21. "If the element has a src content attribute, run these substeps:" |
if (!StripLeadingAndTrailingHTMLSpaces(source_url).IsEmpty()) { |
// 21.4. "Parse src relative to the element's node document." |
- ResourceRequest resource_request(element_document->CompleteURL(source_url)); |
- |
- // [Intervention] |
- if (document_write_intervention_ == |
- DocumentWriteIntervention::kFetchDocWrittenScriptDeferIdle) { |
- resource_request.SetHTTPHeaderField( |
- "Intervention", |
- "<https://www.chromestatus.com/feature/5718547946799104>"); |
- } |
- |
- FetchParameters params(resource_request, element_->InitiatorName()); |
+ KURL url = element_document->CompleteURL(source_url); |
// 15. "Let CORS setting be the current state of the element's |
// crossorigin content attribute." |
CrossOriginAttributeValue cross_origin = |
GetCrossOriginAttributeValue(element_->CrossOriginAttributeValue()); |
- // 16. "Let module script credentials mode be determined by switching |
- // on CORS setting:" |
- // TODO(hiroshige): Implement this step for "module". |
- |
- // 21.6, "classic": "Fetch a classic script given ... CORS setting |
- // ... and encoding." |
- if (cross_origin != kCrossOriginAttributeNotSet) { |
- params.SetCrossOriginAccessControl(element_document->GetSecurityOrigin(), |
- cross_origin); |
- } |
- |
- params.SetCharset(encoding); |
- |
// 17. "If the script element has a nonce attribute, |
// then let cryptographic nonce be that attribute's value. |
// Otherwise, let cryptographic nonce be the empty string." |
+ String nonce; |
if (element_->IsNonceableElement()) |
- params.SetContentSecurityPolicyNonce(element_->nonce()); |
+ nonce = element_->nonce(); |
// 19. "Let parser state be "parser-inserted" |
// if the script element has been flagged as "parser-inserted", |
// and "not parser-inserted" otherwise." |
- params.SetParserDisposition(IsParserInserted() ? kParserInserted |
- : kNotParserInserted); |
- |
- params.SetDefer(defer); |
- |
- // 18. "If the script element has an integrity attribute, |
- // then let integrity metadata be that attribute's value. |
- // Otherwise, let integrity metadata be the empty string." |
- String integrity_attr = element_->IntegrityAttributeValue(); |
- if (!integrity_attr.IsEmpty()) { |
- IntegrityMetadataSet metadata_set; |
- SubresourceIntegrity::ParseIntegrityAttribute( |
- integrity_attr, metadata_set, element_document); |
- params.SetIntegrityMetadata(metadata_set); |
- } |
+ ParserDisposition parser_state = |
+ IsParserInserted() ? kParserInserted : kNotParserInserted; |
// 21.6. "Switch on the script's type:" |
- |
- // - "classic": |
- // "Fetch a classic script given url, settings, cryptographic nonce, |
- // integrity metadata, parser state, CORS setting, and encoding." |
- resource_ = ScriptResource::Fetch(params, element_document->Fetcher()); |
- |
- // - "module": |
- // "Fetch a module script graph given url, settings, "script", |
- // cryptographic nonce, parser state, and |
- // module script credentials mode." |
- // TODO(kouhei, hiroshige): Implement this. |
+ if (RuntimeEnabledFeatures::moduleScriptsEnabled() && |
+ GetScriptType() == ScriptType::kModule) { |
+ // - "module": |
+ |
+ // 16. "Let module script credentials mode be determined by switching |
+ // on CORS setting:" |
+ // FOXME |
+ WebURLRequest::FetchCredentialsMode credentials_mode = |
+ WebURLRequest::kFetchCredentialsModeOmit; |
+ switch (cross_origin) { |
+ case kCrossOriginAttributeNotSet: |
+ credentials_mode = WebURLRequest::kFetchCredentialsModeOmit; |
+ break; |
+ case kCrossOriginAttributeAnonymous: |
+ credentials_mode = WebURLRequest::kFetchCredentialsModeSameOrigin; |
+ break; |
+ case kCrossOriginAttributeUseCredentials: |
+ credentials_mode = WebURLRequest::kFetchCredentialsModeInclude; |
+ break; |
+ } |
+ |
+ // Step 18 is skipped because "integrity metadata" is not used |
+ // for module scripts. |
+ |
+ // TODO(hiroshige): (How) should we reflect |defer|? |
+ |
+ // "Fetch a module script graph given url, settings, "script", |
+ // cryptographic nonce, parser state, and |
+ // module script credentials mode." |
+ ModuleScriptFetchRequest module_request(url, nonce, parser_state, |
+ credentials_mode); |
+ module_tree_client_ = ModulePendingScriptTreeClient::Create(); |
+ Modulator::From(ToScriptStateForMainWorld(element_document->GetFrame())) |
+ ->FetchTree(module_request, module_tree_client_); |
+ } else { |
+ // - "classic": |
+ |
+ // Step 16 is skipped because "module script credentials" is not used |
+ // for classic scripts. |
+ |
+ // 18. "If the script element has an integrity attribute, |
+ // then let integrity metadata be that attribute's value. |
+ // Otherwise, let integrity metadata be the empty string." |
+ String integrity_attr = element_->IntegrityAttributeValue(); |
+ |
+ // "Fetch a classic script given url, settings, ..." |
+ ResourceRequest resource_request(url); |
+ |
+ // [Intervention] |
+ if (document_write_intervention_ == |
+ DocumentWriteIntervention::kFetchDocWrittenScriptDeferIdle) { |
+ resource_request.SetHTTPHeaderField( |
+ "Intervention", |
+ "<https://www.chromestatus.com/feature/5718547946799104>"); |
+ } |
+ |
+ FetchParameters params(resource_request, element_->InitiatorName()); |
+ |
+ // "... cryptographic nonce, ..." |
+ params.SetContentSecurityPolicyNonce(nonce); |
+ |
+ // "... integrity metadata, ..." |
+ if (!integrity_attr.IsEmpty()) { |
+ IntegrityMetadataSet metadata_set; |
+ SubresourceIntegrity::ParseIntegrityAttribute( |
+ integrity_attr, metadata_set, element_document); |
+ params.SetIntegrityMetadata(metadata_set); |
+ } |
+ |
+ // "... parser state, ..." |
+ params.SetParserDisposition(parser_state); |
+ |
+ // "... CORS setting, ..." |
+ if (cross_origin != kCrossOriginAttributeNotSet) { |
+ params.SetCrossOriginAccessControl( |
+ element_document->GetSecurityOrigin(), cross_origin); |
+ } |
+ |
+ // "... and encoding." |
+ params.SetCharset(encoding); |
+ |
+ params.SetDefer(defer); |
+ |
+ resource_ = ScriptResource::Fetch(params, element_document->Fetcher()); |
+ } |
// "When the chosen algorithm asynchronously completes, set |
// the script's script to the result. At that time, the script is ready." |
@@ -569,7 +654,7 @@ bool ScriptLoader::FetchScript(const String& source_url, |
is_external_script_ = true; |
} |
- if (!resource_) { |
+ if (GetScriptType() == ScriptType::kClassic && !resource_) { |
// 21.2. "If src is the empty string, queue a task to |
// fire an event named error at the element, and abort these steps." |
// 21.5. "If the previous step failed, queue a task to |
@@ -580,7 +665,8 @@ bool ScriptLoader::FetchScript(const String& source_url, |
} |
// [Intervention] |
- if (created_during_document_write_ && |
+ if (GetScriptType() == ScriptType::kClassic && |
+ created_during_document_write_ && |
resource_->GetResourceRequest().GetCachePolicy() == |
WebCachePolicy::kReturnCacheDataDontLoad) { |
document_write_intervention_ = |
@@ -591,8 +677,16 @@ bool ScriptLoader::FetchScript(const String& source_url, |
} |
PendingScript* ScriptLoader::CreatePendingScript() { |
- CHECK(resource_); |
- return ClassicPendingScript::Create(element_, resource_); |
+ switch (GetScriptType()) { |
+ case ScriptType::kClassic: |
+ CHECK(resource_); |
+ return ClassicPendingScript::Create(element_, resource_); |
+ case ScriptType::kModule: |
+ CHECK(module_tree_client_); |
+ return ModulePendingScript::Create(element_, module_tree_client_); |
+ } |
+ NOTREACHED(); |
+ return nullptr; |
} |
bool ScriptLoader::ExecuteScript(const Script* script) { |
@@ -619,6 +713,7 @@ bool ScriptLoader::ExecuteScript(const Script* script) { |
// TODO(hiroshige): Move event dispatching code to doExecuteScript(). |
bool ScriptLoader::DoExecuteScript(const Script* script) { |
DCHECK(already_started_); |
+ CHECK_EQ(script->GetScriptType(), GetScriptType()); |
if (script->IsEmpty()) |
return true; |
@@ -654,6 +749,8 @@ bool ScriptLoader::DoExecuteScript(const Script* script) { |
context_document, element_->GetDocument().GetSecurityOrigin())) |
return false; |
} |
+ // FOXME: In module cases, AccessControlStatus is not set or used here. |
+ // Instead, it is used when module script is fetched (and compiled). |
const bool is_imported_script = context_document != element_document; |
@@ -664,7 +761,11 @@ bool ScriptLoader::DoExecuteScript(const Script* script) { |
// TODO(hiroshige): Implement "module" case. |
IgnoreDestructiveWriteCountIncrementer |
ignore_destructive_write_count_incrementer( |
- is_external_script_ || is_imported_script ? context_document : 0); |
+ is_external_script_ || |
+ script->GetScriptType() == ScriptType::kModule || |
+ is_imported_script |
+ ? context_document |
+ : 0); |
// 4. "Let old script element be the value to which the script element's |
// node document's currentScript object was most recently set." |
@@ -675,18 +776,24 @@ bool ScriptLoader::DoExecuteScript(const Script* script) { |
// 1. "If the script element's root is not a shadow root, |
// then set the script element's node document's currentScript |
// attribute to the script element. Otherwise, set it to null." |
- context_document->PushCurrentScript(element_.Get()); |
+ // - "module": |
+ // 1. "Set the script element's node document's currentScript attribute |
+ // to null." |
+ ScriptElementBase* current_script = nullptr; |
+ if (script->GetScriptType() == ScriptType::kClassic) |
+ current_script = element_; |
+ context_document->PushCurrentScript(current_script); |
+ // - "classic": |
// 2. "Run the classic script given by the script's script." |
// Note: This is where the script is compiled and actually executed. |
- script->RunScript(frame, element_->GetDocument().GetSecurityOrigin()); |
- |
// - "module": |
- // TODO(hiroshige): Implement this. |
+ // 2. "Run the module script given by the script's script." |
+ script->RunScript(frame, element_->GetDocument().GetSecurityOrigin()); |
// 6. "Set the script element's node document's currentScript attribute |
// to old script element." |
- context_document->PopCurrentScript(element_.Get()); |
+ context_document->PopCurrentScript(current_script); |
return true; |
@@ -701,22 +808,24 @@ void ScriptLoader::Execute() { |
DCHECK(pending_script_->IsExternal()); |
bool error_occurred = false; |
Script* script = pending_script_->GetSource(KURL(), error_occurred); |
- const bool wasCanceled = pending_script_->WasCanceled(); |
+ const bool was_canceled = pending_script_->WasCanceled(); |
DetachPendingScript(); |
if (error_occurred) { |
DispatchErrorEvent(); |
- } else if (!wasCanceled) { |
+ } else if (!was_canceled) { |
if (ExecuteScript(script)) |
DispatchLoadEvent(); |
else |
DispatchErrorEvent(); |
} |
resource_ = nullptr; |
+ module_tree_client_ = nullptr; |
} |
void ScriptLoader::PendingScriptFinished(PendingScript* pending_script) { |
DCHECK(!will_be_parser_executed_); |
DCHECK_EQ(pending_script_, pending_script); |
+ DCHECK_EQ(pending_script_->GetScriptType(), GetScriptType()); |
// We do not need this script in the memory cache. The primary goals of |
// sending this fetch request are to let the third party server know |