script/dom/html/
htmliframeelement.rs

1/* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at https://mozilla.org/MPL/2.0/. */
4
5use std::cell::Cell;
6use std::rc::Rc;
7
8use content_security_policy::sandboxing_directive::{
9    SandboxingFlagSet, parse_a_sandboxing_directive,
10};
11use dom_struct::dom_struct;
12use embedder_traits::ViewportDetails;
13use html5ever::{LocalName, Prefix, local_name, ns};
14use js::context::JSContext;
15use js::rust::HandleObject;
16use net_traits::ReferrerPolicy;
17use net_traits::request::Destination;
18use profile_traits::ipc as ProfiledIpc;
19use script_traits::{NewPipelineInfo, UpdatePipelineIdReason};
20use servo_base::id::{BrowsingContextId, PipelineId, WebViewId};
21use servo_constellation_traits::{
22    IFrameLoadInfo, IFrameLoadInfoWithData, LoadData, LoadOrigin, NavigationHistoryBehavior,
23    ScriptToConstellationMessage, TargetSnapshotParams,
24};
25use servo_url::ServoUrl;
26use style::attr::{AttrValue, LengthOrPercentageOrAuto};
27use stylo_atoms::Atom;
28
29use crate::document_loader::{LoadBlocker, LoadType};
30use crate::dom::attr::Attr;
31use crate::dom::bindings::cell::DomRefCell;
32use crate::dom::bindings::codegen::Bindings::HTMLIFrameElementBinding::HTMLIFrameElementMethods;
33use crate::dom::bindings::codegen::Bindings::WindowBinding::Window_Binding::WindowMethods;
34use crate::dom::bindings::codegen::UnionTypes::TrustedHTMLOrString;
35use crate::dom::bindings::error::Fallible;
36use crate::dom::bindings::inheritance::Castable;
37use crate::dom::bindings::refcounted::Trusted;
38use crate::dom::bindings::reflector::DomGlobal;
39use crate::dom::bindings::root::{DomRoot, LayoutDom, MutNullableDom};
40use crate::dom::bindings::str::{DOMString, USVString};
41use crate::dom::document::Document;
42use crate::dom::domtokenlist::DOMTokenList;
43use crate::dom::element::{AttributeMutation, Element, reflect_referrer_policy_attribute};
44use crate::dom::eventtarget::EventTarget;
45use crate::dom::globalscope::GlobalScope;
46use crate::dom::html::htmlelement::HTMLElement;
47use crate::dom::node::{BindContext, Node, NodeDamage, NodeTraits, UnbindContext};
48use crate::dom::performance::performanceresourcetiming::InitiatorType;
49use crate::dom::trustedtypes::trustedhtml::TrustedHTML;
50use crate::dom::virtualmethods::VirtualMethods;
51use crate::dom::windowproxy::WindowProxy;
52use crate::navigation::{
53    determine_creation_sandboxing_flags, determine_iframe_element_referrer_policy,
54};
55use crate::network_listener::ResourceTimingListener;
56use crate::script_runtime::CanGc;
57use crate::script_thread::{ScriptThread, with_script_thread};
58use crate::script_window_proxies::ScriptWindowProxies;
59
60#[derive(PartialEq)]
61enum PipelineType {
62    InitialAboutBlank,
63    Navigation,
64}
65
66#[derive(Clone, Copy, PartialEq)]
67pub(crate) enum ProcessingMode {
68    FirstTime,
69    NotFirstTime,
70}
71
72/// <https://html.spec.whatwg.org/multipage/#lazy-load-resumption-steps>
73#[derive(Clone, Copy, Default, MallocSizeOf, PartialEq)]
74enum LazyLoadResumptionSteps {
75    #[default]
76    None,
77    SrcDoc,
78}
79
80#[dom_struct]
81pub(crate) struct HTMLIFrameElement {
82    htmlelement: HTMLElement,
83    #[no_trace]
84    webview_id: Cell<Option<WebViewId>>,
85    #[no_trace]
86    browsing_context_id: Cell<Option<BrowsingContextId>>,
87    #[no_trace]
88    pipeline_id: Cell<Option<PipelineId>>,
89    #[no_trace]
90    pending_pipeline_id: Cell<Option<PipelineId>>,
91    #[no_trace]
92    about_blank_pipeline_id: Cell<Option<PipelineId>>,
93    sandbox: MutNullableDom<DOMTokenList>,
94    #[no_trace]
95    sandboxing_flag_set: Cell<Option<SandboxingFlagSet>>,
96    load_blocker: DomRefCell<Option<LoadBlocker>>,
97    throttled: Cell<bool>,
98    #[conditional_malloc_size_of]
99    script_window_proxies: Rc<ScriptWindowProxies>,
100    /// <https://html.spec.whatwg.org/multipage/#current-navigation-was-lazy-loaded>
101    current_navigation_was_lazy_loaded: Cell<bool>,
102    /// <https://html.spec.whatwg.org/multipage/#lazy-load-resumption-steps>
103    #[no_trace]
104    lazy_load_resumption_steps: Cell<LazyLoadResumptionSteps>,
105    /// Keeping track of whether the iframe will be navigated
106    /// outside of the processing of it's attribute(for example: form navigation).
107    /// This is necessary to prevent the iframe load event steps
108    /// from asynchronously running for the initial blank document
109    /// while script at this point(when the flag is set)
110    /// expects those to run only for the navigated documented.
111    pending_navigation: Cell<bool>,
112    /// Whether a load event was synchronously fired, for example when
113    /// an empty iframe is attached. In that case, we shouldn't fire a
114    /// subsequent asynchronous load event.
115    already_fired_synchronous_load_event: Cell<bool>,
116}
117
118impl HTMLIFrameElement {
119    /// <https://html.spec.whatwg.org/multipage/#shared-attribute-processing-steps-for-iframe-and-frame-elements>,
120    fn shared_attribute_processing_steps_for_iframe_and_frame_elements(
121        &self,
122        _mode: ProcessingMode,
123    ) -> Option<ServoUrl> {
124        let element = self.upcast::<Element>();
125        // Step 2. If element has a src attribute specified, and its value is not the empty string, then:
126        let url = element
127            .get_attribute(&local_name!("src"))
128            .and_then(|src| {
129                let url = src.value();
130                if url.is_empty() {
131                    None
132                } else {
133                    // Step 2.1. Let maybeURL be the result of encoding-parsing a URL given that attribute's value,
134                    // relative to element's node document.
135                    // Step 2.2. If maybeURL is not failure, then set url to maybeURL.
136                    self.owner_document().encoding_parse_a_url(&url).ok()
137                }
138            })
139            // Step 1. Let url be the URL record about:blank.
140            .unwrap_or_else(|| ServoUrl::parse("about:blank").unwrap());
141        // Step 3. If the inclusive ancestor navigables of element's node navigable contains
142        // a navigable whose active document's URL equals url with exclude fragments set to true, then return null.
143        // TODO
144
145        // Step 4. If url matches about:blank and initialInsertion is true, then perform the URL and history update steps
146        // given element's content navigable's active document and url.
147        // TODO
148
149        // Step 5. Return url.
150        Some(url)
151    }
152
153    pub(crate) fn navigate_or_reload_child_browsing_context(
154        &self,
155        load_data: LoadData,
156        history_handling: NavigationHistoryBehavior,
157        mode: ProcessingMode,
158        target_snapshot_params: TargetSnapshotParams,
159        cx: &mut JSContext,
160    ) {
161        // In case we fired a synchronous load event, but navigate away
162        // in the event listener of that event, then we should still
163        // fire a second asynchronous load event when that navigation
164        // finishes. Therefore, on any navigation (but not the initial
165        // about blank), we should always set this to false, regardless
166        // of whether we synchronously fired a load in the same microtask.
167        self.already_fired_synchronous_load_event.set(false);
168
169        self.start_new_pipeline(
170            load_data,
171            PipelineType::Navigation,
172            history_handling,
173            mode,
174            target_snapshot_params,
175            cx,
176        );
177    }
178
179    fn start_new_pipeline(
180        &self,
181        mut load_data: LoadData,
182        pipeline_type: PipelineType,
183        history_handling: NavigationHistoryBehavior,
184        mode: ProcessingMode,
185        target_snapshot_params: TargetSnapshotParams,
186        cx: &mut JSContext,
187    ) {
188        let document = self.owner_document();
189
190        {
191            let load_blocker = &self.load_blocker;
192            // Any oustanding load is finished from the point of view of the blocked
193            // document; the new navigation will continue blocking it.
194            LoadBlocker::terminate(load_blocker, cx);
195
196            *load_blocker.borrow_mut() = Some(LoadBlocker::new(
197                &document,
198                LoadType::Subframe(load_data.url.clone()),
199            ));
200        }
201
202        if load_data.url.scheme() != "javascript" {
203            self.continue_navigation(
204                load_data,
205                pipeline_type,
206                history_handling,
207                target_snapshot_params,
208            );
209            return;
210        }
211
212        // TODO(jdm): The spec uses the navigate algorithm here, but
213        //   our iframe navigation is not yet unified enough to follow that.
214        //   Eventually we should remove the task and invoke ScriptThread::navigate instead.
215        let iframe = Trusted::new(self);
216        let doc = Trusted::new(&*document);
217        document
218            .global()
219            .task_manager()
220            .networking_task_source()
221            .queue(task!(navigate_to_javascript: move |cx| {
222                let this = iframe.root();
223                let window_proxy = this.GetContentWindow();
224                if let Some(window_proxy) = window_proxy {
225                    // If this method returns false we are not creating a new
226                    // document and the frame can be considered loaded.
227                    if !ScriptThread::navigate_to_javascript_url(
228                        cx,
229                        &this.owner_global(),
230                        &window_proxy.global(),
231                        &mut load_data,
232                        Some(this.upcast()),
233                        Some(mode == ProcessingMode::FirstTime),
234                    ) {
235                        LoadBlocker::terminate(&this.load_blocker, cx);
236                        return;
237                    }
238                    load_data.about_base_url = doc.root().about_base_url();
239                }
240                this.continue_navigation(load_data, pipeline_type, history_handling, target_snapshot_params);
241            }));
242    }
243
244    fn continue_navigation(
245        &self,
246        load_data: LoadData,
247        pipeline_type: PipelineType,
248        history_handling: NavigationHistoryBehavior,
249        target_snapshot_params: TargetSnapshotParams,
250    ) {
251        let browsing_context_id = match self.browsing_context_id() {
252            None => return warn!("Attempted to start a new pipeline on an unattached iframe."),
253            Some(id) => id,
254        };
255
256        let webview_id = match self.webview_id() {
257            None => return warn!("Attempted to start a new pipeline on an unattached iframe."),
258            Some(id) => id,
259        };
260
261        let window = self.owner_window();
262        let old_pipeline_id = self.pipeline_id();
263        let new_pipeline_id = PipelineId::new();
264        self.pending_pipeline_id.set(Some(new_pipeline_id));
265
266        let load_info = IFrameLoadInfo {
267            parent_pipeline_id: window.pipeline_id(),
268            browsing_context_id,
269            webview_id,
270            new_pipeline_id,
271            is_private: false, // FIXME
272            inherited_secure_context: load_data.inherited_secure_context,
273            history_handling,
274            target_snapshot_params,
275        };
276
277        let viewport_details = window
278            .get_iframe_viewport_details_if_known(browsing_context_id)
279            .unwrap_or_else(|| ViewportDetails {
280                hidpi_scale_factor: window.device_pixel_ratio(),
281                ..Default::default()
282            });
283
284        match pipeline_type {
285            PipelineType::InitialAboutBlank => {
286                self.about_blank_pipeline_id.set(Some(new_pipeline_id));
287
288                let load_info = IFrameLoadInfoWithData {
289                    info: load_info,
290                    load_data: load_data.clone(),
291                    old_pipeline_id,
292                    viewport_details,
293                    theme: window.theme(),
294                };
295                window
296                    .as_global_scope()
297                    .script_to_constellation_chan()
298                    .send(ScriptToConstellationMessage::ScriptNewIFrame(load_info))
299                    .unwrap();
300
301                let new_pipeline_info = NewPipelineInfo {
302                    parent_info: Some(window.pipeline_id()),
303                    new_pipeline_id,
304                    browsing_context_id,
305                    webview_id,
306                    opener: None,
307                    load_data,
308                    viewport_details,
309                    user_content_manager_id: None,
310                    theme: window.theme(),
311                    target_snapshot_params,
312                };
313
314                self.pipeline_id.set(Some(new_pipeline_id));
315                with_script_thread(|script_thread| {
316                    script_thread.spawn_pipeline(new_pipeline_info);
317                });
318            },
319            PipelineType::Navigation => {
320                let load_info = IFrameLoadInfoWithData {
321                    info: load_info,
322                    load_data,
323                    old_pipeline_id,
324                    viewport_details,
325                    theme: window.theme(),
326                };
327                window
328                    .as_global_scope()
329                    .script_to_constellation_chan()
330                    .send(ScriptToConstellationMessage::ScriptLoadedURLInIFrame(
331                        load_info,
332                    ))
333                    .unwrap();
334            },
335        }
336    }
337
338    /// When an iframe is first inserted into the document,
339    /// an "about:blank" document is created,
340    /// and synchronously processed by the script thread.
341    /// This initial synchronous load should have no noticeable effect in script.
342    /// See the note in `iframe_load_event_steps`.
343    pub(crate) fn is_initial_blank_document(&self) -> bool {
344        self.pending_pipeline_id.get() == self.about_blank_pipeline_id.get()
345    }
346
347    /// <https://html.spec.whatwg.org/multipage/#navigate-an-iframe-or-frame>
348    fn navigate_an_iframe_or_frame(
349        &self,
350        cx: &mut JSContext,
351        load_data: LoadData,
352        mode: ProcessingMode,
353    ) {
354        // Step 2. If element's content navigable's active document is not completely loaded,
355        // then set historyHandling to "replace".
356        let history_handling = if !self
357            .GetContentDocument()
358            .is_some_and(|doc| doc.completely_loaded())
359        {
360            NavigationHistoryBehavior::Replace
361        } else {
362            // Step 1. Let historyHandling be "auto".
363            NavigationHistoryBehavior::Auto
364        };
365        // Step 3. If element is an iframe, then set element's pending resource-timing start time
366        // to the current high resolution time given element's node document's relevant global object.
367        // TODO
368
369        // Step 4. Navigate element's content navigable to url using element's node document,
370        // with historyHandling set to historyHandling, referrerPolicy set to referrerPolicy,
371        // documentResource set to srcdocString, and initialInsertion set to initialInsertion.
372        let target_snapshot_params = snapshot_self(self);
373        self.navigate_or_reload_child_browsing_context(
374            load_data,
375            history_handling,
376            mode,
377            target_snapshot_params,
378            cx,
379        );
380    }
381
382    /// <https://html.spec.whatwg.org/multipage/#will-lazy-load-element-steps>
383    fn will_lazy_load_element_steps(&self) -> bool {
384        // Step 1. If scripting is disabled for element, then return false.
385        if !self.owner_document().scripting_enabled() {
386            return false;
387        }
388        // Step 2. If element's lazy loading attribute is in the Lazy state, then return true.
389        // Step 3. Return false.
390        self.Loading() == "lazy"
391    }
392
393    /// Step 1.3. of <https://html.spec.whatwg.org/multipage/#process-the-iframe-attributes>
394    fn navigate_to_the_srcdoc_resource(&self, mode: ProcessingMode, cx: &mut JSContext) {
395        // Step 1.3. Navigate to the srcdoc resource: Navigate an iframe or frame given element,
396        // about:srcdoc, the empty string, and the value of element's srcdoc attribute.
397        let url = ServoUrl::parse("about:srcdoc").unwrap();
398        let document = self.owner_document();
399        let window = self.owner_window();
400        let pipeline_id = Some(window.pipeline_id());
401        let mut load_data = LoadData::new(
402            LoadOrigin::Script(document.origin().snapshot()),
403            url,
404            Some(document.base_url()),
405            pipeline_id,
406            window.as_global_scope().get_referrer(),
407            document.get_referrer_policy(),
408            Some(window.as_global_scope().is_secure_context()),
409            Some(document.insecure_requests_policy()),
410            document.has_trustworthy_ancestor_or_current_origin(),
411            self.sandboxing_flag_set(),
412        );
413        load_data.destination = Destination::IFrame;
414        load_data.policy_container = Some(window.as_global_scope().policy_container());
415        load_data.srcdoc = String::from(
416            self.upcast::<Element>()
417                .get_string_attribute(&local_name!("srcdoc")),
418        );
419
420        self.navigate_an_iframe_or_frame(cx, load_data, mode);
421    }
422
423    /// <https://html.spec.whatwg.org/multipage/#the-iframe-element:potentially-delays-the-load-event>
424    fn mark_navigation_as_lazy_loaded(&self, cx: &mut JSContext) {
425        // > An iframe element whose current navigation was lazy loaded boolean is false potentially delays the load event.
426        self.current_navigation_was_lazy_loaded.set(true);
427        let blocker = &self.load_blocker;
428        LoadBlocker::terminate(blocker, cx);
429    }
430
431    /// <https://html.spec.whatwg.org/multipage/#process-the-iframe-attributes>
432    fn process_the_iframe_attributes(&self, mode: ProcessingMode, cx: &mut JSContext) {
433        let element = self.upcast::<Element>();
434
435        // Step 1. If `element`'s `srcdoc` attribute is specified, then:
436        //
437        // Note that this also includes the empty string
438        if element.has_attribute(&local_name!("srcdoc")) {
439            // Step 1.1. Set element's current navigation was lazy loaded boolean to false.
440            self.current_navigation_was_lazy_loaded.set(false);
441            // Step 1.2. If the will lazy load element steps given element return true, then:
442            if self.will_lazy_load_element_steps() {
443                // Step 1.2.1. Set element's lazy load resumption steps to the rest of this algorithm
444                // starting with the step labeled navigate to the srcdoc resource.
445                self.lazy_load_resumption_steps
446                    .set(LazyLoadResumptionSteps::SrcDoc);
447                // Step 1.2.2. Set element's current navigation was lazy loaded boolean to true.
448                self.mark_navigation_as_lazy_loaded(cx);
449                // Step 1.2.3. Start intersection-observing a lazy loading element for element.
450                // TODO
451                // Step 1.2.4. Return.
452                return;
453            }
454            // Step 1.3. Navigate to the srcdoc resource: Navigate an iframe or frame given element,
455            // about:srcdoc, the empty string, and the value of element's srcdoc attribute.
456            self.navigate_to_the_srcdoc_resource(mode, cx);
457            return;
458        }
459
460        let window = self.owner_window();
461
462        // https://html.spec.whatwg.org/multipage/#attr-iframe-name
463        // Note: the spec says to set the name 'when the nested browsing context is created'.
464        // The current implementation sets the name on the window,
465        // when the iframe attributes are first processed.
466        if mode == ProcessingMode::FirstTime {
467            if let Some(window) = self.GetContentWindow() {
468                window.set_name(
469                    element
470                        .get_name()
471                        .map_or(DOMString::from(""), |n| DOMString::from(&*n)),
472                );
473            }
474        }
475
476        // Step 2.1. Let url be the result of running the shared attribute processing steps
477        // for iframe and frame elements given element and initialInsertion.
478        let Some(url) = self.shared_attribute_processing_steps_for_iframe_and_frame_elements(mode)
479        else {
480            // Step 2.2. If url is null, then return.
481            return;
482        };
483
484        // Step 2.3. If url matches about:blank and initialInsertion is true, then:
485        if url.matches_about_blank() && mode == ProcessingMode::FirstTime {
486            // We should **not** send a load event in `iframe_load_event_steps`.
487            self.already_fired_synchronous_load_event.set(true);
488            // Step 2.3.1. Run the iframe load event steps given element.
489            self.run_iframe_load_event_steps(cx);
490            // Step 2.3.2. Return.
491            return;
492        }
493
494        // Step 2.4: Let referrerPolicy be the current state of element's referrerpolicy content
495        // attribute.
496        let document = self.owner_document();
497        let referrer_policy_token = self.ReferrerPolicy();
498
499        // Note: despite not being explicitly stated in the spec steps, this falls back to
500        // document's referrer policy here because it satisfies the expectations that when unset,
501        // the iframe should inherit the referrer policy of its parent
502        let referrer_policy = match ReferrerPolicy::from(&*referrer_policy_token.str()) {
503            ReferrerPolicy::EmptyString => document.get_referrer_policy(),
504            policy => policy,
505        };
506
507        // TODO(#25748):
508        // By spec, we return early if there's an ancestor browsing context
509        // "whose active document's url, ignoring fragments, is equal".
510        // However, asking about ancestor browsing contexts is more nuanced than
511        // it sounds and not implemented here.
512        // Within a single origin, we can do it by walking window proxies,
513        // and this check covers only that single-origin case, protecting
514        // against simple typo self-includes but nothing more elaborate.
515        let mut ancestor = window.GetParent();
516        while let Some(a) = ancestor {
517            if let Some(ancestor_url) = a.document().map(|d| d.url()) {
518                if ancestor_url.scheme() == url.scheme() &&
519                    ancestor_url.username() == url.username() &&
520                    ancestor_url.password() == url.password() &&
521                    ancestor_url.host() == url.host() &&
522                    ancestor_url.port() == url.port() &&
523                    ancestor_url.path() == url.path() &&
524                    ancestor_url.query() == url.query()
525                {
526                    return;
527                }
528            }
529            ancestor = a.parent().map(DomRoot::from_ref);
530        }
531
532        let (creator_pipeline_id, about_base_url) = if url.matches_about_blank() {
533            (Some(window.pipeline_id()), Some(document.base_url()))
534        } else {
535            (None, document.about_base_url())
536        };
537
538        let propagate_encoding_to_child_document = url.origin().same_origin(window.origin());
539        let mut load_data = LoadData::new(
540            LoadOrigin::Script(document.origin().snapshot()),
541            url,
542            about_base_url,
543            creator_pipeline_id,
544            window.as_global_scope().get_referrer(),
545            referrer_policy,
546            Some(window.as_global_scope().is_secure_context()),
547            Some(document.insecure_requests_policy()),
548            document.has_trustworthy_ancestor_or_current_origin(),
549            self.sandboxing_flag_set(),
550        );
551        load_data.destination = Destination::IFrame;
552        load_data.policy_container = Some(window.as_global_scope().policy_container());
553        if propagate_encoding_to_child_document {
554            load_data.container_document_encoding = Some(document.encoding());
555        }
556
557        let pipeline_id = self.pipeline_id();
558        // If the initial `about:blank` page is the current page, load with replacement enabled,
559        // see https://html.spec.whatwg.org/multipage/#the-iframe-element:about:blank-3
560        let is_about_blank =
561            pipeline_id.is_some() && pipeline_id == self.about_blank_pipeline_id.get();
562
563        let history_handling = if is_about_blank {
564            NavigationHistoryBehavior::Replace
565        } else {
566            NavigationHistoryBehavior::Push
567        };
568
569        let target_snapshot_params = snapshot_self(self);
570        self.navigate_or_reload_child_browsing_context(
571            load_data,
572            history_handling,
573            mode,
574            target_snapshot_params,
575            cx,
576        );
577    }
578
579    /// <https://html.spec.whatwg.org/multipage/#create-a-new-child-navigable>
580    /// Synchronously create a new browsing context(This is not a navigation).
581    /// The pipeline started here should remain unnoticeable to script, but this is not easy
582    /// to refactor because it appears other features have come to rely on the current behavior.
583    /// For now only the iframe load event steps are skipped in some cases for this initial document,
584    /// and we still fire load and pageshow events as part of `maybe_queue_document_completion`.
585    /// Also, some controversy spec-wise remains: <https://github.com/whatwg/html/issues/4965>
586    fn create_nested_browsing_context(&self, cx: &mut JSContext) {
587        let url = ServoUrl::parse("about:blank").unwrap();
588        let document = self.owner_document();
589        let window = self.owner_window();
590        let pipeline_id = Some(window.pipeline_id());
591        let mut load_data = LoadData::new(
592            LoadOrigin::Script(document.origin().snapshot()),
593            url,
594            Some(document.base_url()),
595            pipeline_id,
596            window.as_global_scope().get_referrer(),
597            document.get_referrer_policy(),
598            Some(window.as_global_scope().is_secure_context()),
599            Some(document.insecure_requests_policy()),
600            document.has_trustworthy_ancestor_or_current_origin(),
601            self.sandboxing_flag_set(),
602        );
603        load_data.destination = Destination::IFrame;
604        load_data.policy_container = Some(window.as_global_scope().policy_container());
605
606        let browsing_context_id = BrowsingContextId::new();
607        let webview_id = window.window_proxy().webview_id();
608        self.pipeline_id.set(None);
609        self.pending_pipeline_id.set(None);
610        self.webview_id.set(Some(webview_id));
611        self.browsing_context_id.set(Some(browsing_context_id));
612        self.start_new_pipeline(
613            load_data,
614            PipelineType::InitialAboutBlank,
615            NavigationHistoryBehavior::Push,
616            ProcessingMode::FirstTime,
617            snapshot_self(self),
618            cx,
619        );
620    }
621
622    fn destroy_nested_browsing_context(&self) {
623        self.pipeline_id.set(None);
624        self.pending_pipeline_id.set(None);
625        self.about_blank_pipeline_id.set(None);
626        self.webview_id.set(None);
627        if let Some(browsing_context_id) = self.browsing_context_id.take() {
628            self.script_window_proxies.remove(browsing_context_id)
629        }
630    }
631
632    /// Returns true if the contained pipeline was updated, false otherwise.
633    /// This can occur if the iframe's nested browsing context has changed
634    /// since the asynchronous update was started.
635    pub(crate) fn update_pipeline_id(
636        &self,
637        new_pipeline_id: PipelineId,
638        reason: UpdatePipelineIdReason,
639        cx: &mut JSContext,
640    ) -> bool {
641        // For all updates except the one for the initial blank document,
642        // we need to set the flag back to false because the navigation is complete,
643        // because the goal is to, when a navigation is pending, to skip the async load
644        // steps of the initial blank document.
645        if !self.is_initial_blank_document() {
646            self.pending_navigation.set(false);
647        }
648        if self.pending_pipeline_id.get() != Some(new_pipeline_id) &&
649            reason == UpdatePipelineIdReason::Navigation
650        {
651            return false;
652        }
653
654        self.pipeline_id.set(Some(new_pipeline_id));
655
656        // Only terminate the load blocker if the pipeline id was updated due to a traversal.
657        // The load blocker will be terminated for a navigation in iframe_load_event_steps.
658        if reason == UpdatePipelineIdReason::Traversal {
659            let blocker = &self.load_blocker;
660            LoadBlocker::terminate(blocker, cx);
661        }
662
663        self.upcast::<Node>().dirty(NodeDamage::Other);
664        true
665    }
666
667    fn new_inherited(
668        local_name: LocalName,
669        prefix: Option<Prefix>,
670        document: &Document,
671    ) -> HTMLIFrameElement {
672        HTMLIFrameElement {
673            htmlelement: HTMLElement::new_inherited(local_name, prefix, document),
674            browsing_context_id: Cell::new(None),
675            webview_id: Cell::new(None),
676            pipeline_id: Cell::new(None),
677            pending_pipeline_id: Cell::new(None),
678            about_blank_pipeline_id: Cell::new(None),
679            sandbox: Default::default(),
680            sandboxing_flag_set: Cell::new(None),
681            load_blocker: DomRefCell::new(None),
682            throttled: Cell::new(false),
683            script_window_proxies: ScriptThread::window_proxies(),
684            current_navigation_was_lazy_loaded: Default::default(),
685            lazy_load_resumption_steps: Default::default(),
686            pending_navigation: Default::default(),
687            already_fired_synchronous_load_event: Default::default(),
688        }
689    }
690
691    pub(crate) fn new(
692        cx: &mut JSContext,
693        local_name: LocalName,
694        prefix: Option<Prefix>,
695        document: &Document,
696        proto: Option<HandleObject>,
697    ) -> DomRoot<HTMLIFrameElement> {
698        Node::reflect_node_with_proto(
699            cx,
700            Box::new(HTMLIFrameElement::new_inherited(
701                local_name, prefix, document,
702            )),
703            document,
704            proto,
705        )
706    }
707
708    #[inline]
709    pub(crate) fn pipeline_id(&self) -> Option<PipelineId> {
710        self.pipeline_id.get()
711    }
712
713    #[inline]
714    pub(crate) fn browsing_context_id(&self) -> Option<BrowsingContextId> {
715        self.browsing_context_id.get()
716    }
717
718    #[inline]
719    pub(crate) fn webview_id(&self) -> Option<WebViewId> {
720        self.webview_id.get()
721    }
722
723    #[inline]
724    pub(crate) fn sandboxing_flag_set(&self) -> SandboxingFlagSet {
725        self.sandboxing_flag_set
726            .get()
727            .unwrap_or_else(SandboxingFlagSet::empty)
728    }
729
730    pub(crate) fn set_throttled(&self, throttled: bool) {
731        if self.throttled.get() != throttled {
732            self.throttled.set(throttled);
733        }
734    }
735
736    /// Note a pending navigation.
737    /// This is used to ignore the async load event steps for
738    /// the initial blank document if those haven't run yet.
739    pub(crate) fn note_pending_navigation(&self) {
740        self.pending_navigation.set(true);
741    }
742
743    /// <https://html.spec.whatwg.org/multipage/#iframe-load-event-steps>
744    pub(crate) fn iframe_load_event_steps(&self, loaded_pipeline: PipelineId, cx: &mut JSContext) {
745        // TODO(#9592): assert that the load blocker is present at all times when we
746        //              can guarantee that it's created for the case of iframe.reload().
747        if Some(loaded_pipeline) != self.pending_pipeline_id.get() {
748            return;
749        }
750
751        // TODO 1. Assert: element's content navigable is not null.
752
753        // TODO 2-4 Mark resource timing.
754
755        // TODO 5 Set childDocument's iframe load in progress flag.
756
757        // Note: in the spec, these steps are either run synchronously as part of
758        // "If url matches about:blank and initialInsertion is true, then:"
759        // in `process the iframe attributes`,
760        // or asynchronously when navigation completes.
761        //
762        // In our current implementation,
763        // we arrive here always asynchronously in the following two cases:
764        // 1. as part of loading the initial blank document
765        //    created in `create_nested_browsing_context`
766        // 2. optionally, as part of loading a second document created as
767        //    as part of the first processing of the iframe attributes.
768        //
769        // To preserve the logic of the spec--firing the load event once--in the context of
770        // our current implementation, we must not fire the load event
771        // for the initial blank document if we know that a navigation is ongoing,
772        // which can be deducted from `pending_navigation` or the presence of an src.
773        //
774        // Additionally, to prevent a race condition with navigations,
775        // in all cases, skip the load event if there is a pending navigation.
776        // See #40348
777        //
778        // TODO: run these step synchronously as part of processing the iframe attributes.
779        let should_fire_event = if self.is_initial_blank_document() {
780            // If this is the initial blank doc:
781            // do not fire if there is a pending navigation,
782            // or if the iframe has an src.
783            !self.pending_navigation.get() &&
784                !self.upcast::<Element>().has_attribute(&local_name!("src"))
785        } else {
786            // If this is not the initial blank doc:
787            // do not fire if there is a pending navigation.
788            !self.pending_navigation.get()
789        };
790
791        // If we already fired a synchronous load event, we shouldn't fire another
792        // one in this method.
793        let should_fire_event =
794            !self.already_fired_synchronous_load_event.replace(false) && should_fire_event;
795        if should_fire_event {
796            self.run_iframe_load_event_steps(cx);
797        } else {
798            debug!(
799                "suppressing load event for iframe, loaded {:?}",
800                loaded_pipeline
801            );
802        }
803    }
804
805    /// <https://html.spec.whatwg.org/multipage/#iframe-load-event-steps>
806    pub(crate) fn run_iframe_load_event_steps(&self, cx: &mut JSContext) {
807        // TODO 1. Assert: element's content navigable is not null.
808
809        // TODO 2-4 Mark resource timing.
810
811        // TODO 5 Set childDocument's iframe load in progress flag.
812
813        // Step 6. Fire an event named load at element.
814        self.upcast::<EventTarget>().fire_event(cx, atom!("load"));
815
816        let blocker = &self.load_blocker;
817        LoadBlocker::terminate(blocker, cx);
818
819        // TODO Step 7 - unset child document `mute iframe load` flag
820    }
821
822    /// Parse the `sandbox` attribute value given the [`Attr`]. This sets the `sandboxing_flag_set`
823    /// property or clears it is the value isn't specified. Notably, an unspecified sandboxing
824    /// attribute (no sandboxing) is different from an empty one (full sandboxing).
825    fn parse_sandbox_attribute(&self) {
826        let attribute = self
827            .upcast::<Element>()
828            .get_attribute(&local_name!("sandbox"));
829        self.sandboxing_flag_set
830            .set(attribute.map(|attribute_value| {
831                let tokens: Vec<_> = attribute_value
832                    .value()
833                    .as_tokens()
834                    .iter()
835                    .map(|atom| atom.to_string().to_ascii_lowercase())
836                    .collect();
837                parse_a_sandboxing_directive(&tokens)
838            }));
839    }
840
841    /// Step 4.2. of <https://html.spec.whatwg.org/multipage/#destroy-a-document-and-its-descendants>
842    pub(crate) fn destroy_document_and_its_descendants(&self, cx: &mut JSContext) {
843        let Some(pipeline_id) = self.pipeline_id.get() else {
844            return;
845        };
846        // Step 4.2. Destroy a document and its descendants given childNavigable's active document and incrementDestroyed.
847        if let Some(exited_document) = ScriptThread::find_document(pipeline_id) {
848            exited_document.destroy_document_and_its_descendants(cx);
849        }
850        self.destroy_nested_browsing_context();
851    }
852
853    /// <https://html.spec.whatwg.org/multipage/#destroy-a-child-navigable>
854    fn destroy_child_navigable(&self, cx: &mut JSContext) {
855        let blocker = &self.load_blocker;
856        LoadBlocker::terminate(blocker, cx);
857
858        // Step 1. Let navigable be container's content navigable.
859        let Some(browsing_context_id) = self.browsing_context_id() else {
860            // Step 2. If navigable is null, then return.
861            return;
862        };
863        // Store now so that we can destroy the context and delete the
864        // document later
865        let pipeline_id = self.pipeline_id.get();
866
867        // Step 3. Set container's content navigable to null.
868        //
869        // Resetting the pipeline_id to None is required here so that
870        // if this iframe is subsequently re-added to the document
871        // the load doesn't think that it's a navigation, but instead
872        // a new iframe. Without this, the constellation gets very
873        // confused.
874        self.destroy_nested_browsing_context();
875
876        // Step 4. Inform the navigation API about child navigable destruction given navigable.
877        // TODO
878
879        // Step 5. Destroy a document and its descendants given navigable's active document.
880        let (sender, receiver) =
881            ProfiledIpc::channel(self.global().time_profiler_chan().clone()).unwrap();
882        let msg = ScriptToConstellationMessage::RemoveIFrame(browsing_context_id, sender);
883        self.owner_window()
884            .as_global_scope()
885            .script_to_constellation_chan()
886            .send(msg)
887            .unwrap();
888        let _exited_pipeline_ids = receiver.recv().unwrap();
889        let Some(pipeline_id) = pipeline_id else {
890            return;
891        };
892        if let Some(exited_document) = ScriptThread::find_document(pipeline_id) {
893            exited_document.destroy_document_and_its_descendants(cx);
894        }
895
896        // Step 6. Let parentDocState be container's node navigable's active session history entry's document state.
897        // TODO
898
899        // Step 7. Remove the nested history from parentDocState's nested histories whose id equals navigable's id.
900        // TODO
901
902        // Step 8. Let traversable be container's node navigable's traversable navigable.
903        // TODO
904
905        // Step 9. Append the following session history traversal steps to traversable:
906        // TODO
907
908        // Step 10. Invoke WebDriver BiDi navigable destroyed with navigable.
909        // TODO
910    }
911}
912
913impl LayoutDom<'_, HTMLIFrameElement> {
914    #[inline]
915    pub(crate) fn pipeline_id(self) -> Option<PipelineId> {
916        (self.unsafe_get()).pipeline_id.get()
917    }
918
919    #[inline]
920    pub(crate) fn browsing_context_id(self) -> Option<BrowsingContextId> {
921        (self.unsafe_get()).browsing_context_id.get()
922    }
923
924    pub(crate) fn get_width(self) -> LengthOrPercentageOrAuto {
925        self.upcast::<Element>()
926            .get_attr_for_layout(&ns!(), &local_name!("width"))
927            .map(AttrValue::as_dimension)
928            .cloned()
929            .unwrap_or(LengthOrPercentageOrAuto::Auto)
930    }
931
932    pub(crate) fn get_height(self) -> LengthOrPercentageOrAuto {
933        self.upcast::<Element>()
934            .get_attr_for_layout(&ns!(), &local_name!("height"))
935            .map(AttrValue::as_dimension)
936            .cloned()
937            .unwrap_or(LengthOrPercentageOrAuto::Auto)
938    }
939}
940
941impl HTMLIFrameElementMethods<crate::DomTypeHolder> for HTMLIFrameElement {
942    // https://html.spec.whatwg.org/multipage/#dom-iframe-src
943    make_url_getter!(Src, "src");
944
945    // https://html.spec.whatwg.org/multipage/#dom-iframe-src
946    make_url_setter!(cx, SetSrc, "src");
947
948    /// <https://html.spec.whatwg.org/multipage/#dom-iframe-srcdoc>
949    fn Srcdoc(&self) -> TrustedHTMLOrString {
950        let element = self.upcast::<Element>();
951        element.get_trusted_html_attribute(&local_name!("srcdoc"))
952    }
953
954    /// <https://html.spec.whatwg.org/multipage/#dom-iframe-srcdoc>
955    fn SetSrcdoc(&self, cx: &mut JSContext, value: TrustedHTMLOrString) -> Fallible<()> {
956        // Step 1: Let compliantString be the result of invoking the
957        // Get Trusted Type compliant string algorithm with TrustedHTML,
958        // this's relevant global object, the given value, "HTMLIFrameElement srcdoc", and "script".
959        let element = self.upcast::<Element>();
960        let value = TrustedHTML::get_trusted_type_compliant_string(
961            cx,
962            &element.owner_global(),
963            value,
964            "HTMLIFrameElement srcdoc",
965        )?;
966        // Step 2: Set an attribute value given this, srcdoc's local name, and compliantString.
967        element.set_attribute(
968            &local_name!("srcdoc"),
969            AttrValue::String(value.str().to_owned()),
970            CanGc::from_cx(cx),
971        );
972        Ok(())
973    }
974
975    /// <https://html.spec.whatwg.org/multipage/#dom-iframe-sandbox>
976    ///
977    /// The supported tokens for sandbox's DOMTokenList are the allowed values defined in the
978    /// sandbox attribute and supported by the user agent. These range of possible values is
979    /// defined here: <https://html.spec.whatwg.org/multipage/#attr-iframe-sandbox>
980    fn Sandbox(&self, cx: &mut JSContext) -> DomRoot<DOMTokenList> {
981        self.sandbox.or_init(|| {
982            DOMTokenList::new(
983                self.upcast::<Element>(),
984                &local_name!("sandbox"),
985                Some(vec![
986                    Atom::from("allow-downloads"),
987                    Atom::from("allow-forms"),
988                    Atom::from("allow-modals"),
989                    Atom::from("allow-orientation-lock"),
990                    Atom::from("allow-pointer-lock"),
991                    Atom::from("allow-popups"),
992                    Atom::from("allow-popups-to-escape-sandbox"),
993                    Atom::from("allow-presentation"),
994                    Atom::from("allow-same-origin"),
995                    Atom::from("allow-scripts"),
996                    Atom::from("allow-top-navigation"),
997                    Atom::from("allow-top-navigation-by-user-activation"),
998                    Atom::from("allow-top-navigation-to-custom-protocols"),
999                ]),
1000                CanGc::from_cx(cx),
1001            )
1002        })
1003    }
1004
1005    /// <https://html.spec.whatwg.org/multipage/#dom-iframe-contentwindow>
1006    fn GetContentWindow(&self) -> Option<DomRoot<WindowProxy>> {
1007        self.browsing_context_id
1008            .get()
1009            .and_then(|id| self.script_window_proxies.find_window_proxy(id))
1010    }
1011
1012    /// <https://html.spec.whatwg.org/multipage/#concept-bcc-content-document>
1013    fn GetContentDocument(&self) -> Option<DomRoot<Document>> {
1014        // Step 1. If container's content navigable is null, then return null.
1015        let pipeline_id = self.pipeline_id.get()?;
1016
1017        // Step 2. Let document be container's content navigable's active document.
1018        // Note that this lookup will fail if the document is dissimilar-origin,
1019        // so we should return None in that case.
1020        let document = ScriptThread::find_document(pipeline_id)?;
1021        // Step 3. If document's origin and container's node document's origin are not same origin-domain, then return null.
1022        if !self
1023            .owner_document()
1024            .origin()
1025            .same_origin_domain(&document.origin())
1026        {
1027            return None;
1028        }
1029        // Step 4. Return document.
1030        Some(document)
1031    }
1032
1033    /// <https://html.spec.whatwg.org/multipage/#attr-iframe-referrerpolicy>
1034    fn ReferrerPolicy(&self) -> DOMString {
1035        reflect_referrer_policy_attribute(self.upcast::<Element>())
1036    }
1037
1038    // https://html.spec.whatwg.org/multipage/#attr-iframe-referrerpolicy
1039    make_setter!(cx, SetReferrerPolicy, "referrerpolicy");
1040
1041    // https://html.spec.whatwg.org/multipage/#attr-iframe-allowfullscreen
1042    make_bool_getter!(AllowFullscreen, "allowfullscreen");
1043    // https://html.spec.whatwg.org/multipage/#attr-iframe-allowfullscreen
1044    make_bool_setter!(cx, SetAllowFullscreen, "allowfullscreen");
1045
1046    // <https://html.spec.whatwg.org/multipage/#dom-dim-width>
1047    make_getter!(Width, "width");
1048    // <https://html.spec.whatwg.org/multipage/#dom-dim-width>
1049    make_dimension_setter!(SetWidth, "width");
1050
1051    // <https://html.spec.whatwg.org/multipage/#dom-dim-height>
1052    make_getter!(Height, "height");
1053    // <https://html.spec.whatwg.org/multipage/#dom-dim-height>
1054    make_dimension_setter!(SetHeight, "height");
1055
1056    // https://html.spec.whatwg.org/multipage/#other-elements,-attributes-and-apis:attr-iframe-frameborder
1057    make_getter!(FrameBorder, "frameborder");
1058    // https://html.spec.whatwg.org/multipage/#other-elements,-attributes-and-apis:attr-iframe-frameborder
1059    make_setter!(cx, SetFrameBorder, "frameborder");
1060
1061    // https://html.spec.whatwg.org/multipage/#dom-iframe-name
1062    // A child browsing context checks the name of its iframe only at the time
1063    // it is created; subsequent name sets have no special effect.
1064    make_atomic_setter!(cx, SetName, "name");
1065
1066    // https://html.spec.whatwg.org/multipage/#dom-iframe-name
1067    // This is specified as reflecting the name content attribute of the
1068    // element, not the name of the child browsing context.
1069    make_getter!(Name, "name");
1070
1071    // https://html.spec.whatwg.org/multipage/#attr-iframe-loading
1072    // > The loading attribute is a lazy loading attribute. Its purpose is to indicate the policy for loading iframe elements that are outside the viewport.
1073    make_enumerated_getter!(
1074        Loading,
1075        "loading",
1076        "lazy" | "eager",
1077        // https://html.spec.whatwg.org/multipage/#lazy-loading-attribute
1078        // > The attribute's missing value default and invalid value default are both the Eager state.
1079        missing => "eager",
1080        invalid => "eager"
1081    );
1082
1083    // https://html.spec.whatwg.org/multipage/#attr-iframe-loading
1084    make_setter!(cx, SetLoading, "loading");
1085
1086    // https://html.spec.whatwg.org/multipage/#dom-iframe-longdesc
1087    make_url_getter!(LongDesc, "longdesc");
1088
1089    // https://html.spec.whatwg.org/multipage/#dom-iframe-longdesc
1090    make_url_setter!(cx, SetLongDesc, "longdesc");
1091}
1092
1093impl VirtualMethods for HTMLIFrameElement {
1094    fn super_type(&self) -> Option<&dyn VirtualMethods> {
1095        Some(self.upcast::<HTMLElement>() as &dyn VirtualMethods)
1096    }
1097
1098    fn attribute_mutated(&self, cx: &mut JSContext, attr: &Attr, mutation: AttributeMutation) {
1099        self.super_type()
1100            .unwrap()
1101            .attribute_mutated(cx, attr, mutation);
1102        match *attr.local_name() {
1103            // From <https://html.spec.whatwg.org/multipage/#attr-iframe-sandbox>:
1104            //
1105            // > When an iframe element's sandbox attribute is set or changed while
1106            // > it has a non-null content navigable, the user agent must parse the
1107            // > sandboxing directive given the attribute's value and the iframe
1108            // > element's iframe sandboxing flag set.
1109            //
1110            // > When an iframe element's sandbox attribute is removed while it has
1111            // > a non-null content navigable, the user agent must empty the iframe
1112            // > element's iframe sandboxing flag set.
1113            local_name!("sandbox") if self.browsing_context_id.get().is_some() => {
1114                self.parse_sandbox_attribute();
1115            },
1116            local_name!("srcdoc") => {
1117                // https://html.spec.whatwg.org/multipage/#the-iframe-element:the-iframe-element-9
1118                // "Whenever an iframe element with a non-null nested browsing context has its
1119                // srcdoc attribute set, changed, or removed, the user agent must process the
1120                // iframe attributes."
1121                // but we can't check that directly, since the child browsing context
1122                // may be in a different script thread. Instead, we check to see if the parent
1123                // is in a document tree and has a browsing context, which is what causes
1124                // the child browsing context to be created.
1125
1126                // trigger the processing of iframe attributes whenever "srcdoc" attribute is set, changed or removed
1127                if self.upcast::<Node>().is_connected_with_browsing_context() {
1128                    debug!("iframe srcdoc modified while in browsing context.");
1129                    self.process_the_iframe_attributes(ProcessingMode::NotFirstTime, cx);
1130                }
1131            },
1132            local_name!("src") => {
1133                // https://html.spec.whatwg.org/multipage/#the-iframe-element
1134                // "Similarly, whenever an iframe element with a non-null nested browsing context
1135                // but with no srcdoc attribute specified has its src attribute set, changed, or removed,
1136                // the user agent must process the iframe attributes,"
1137                // but we can't check that directly, since the child browsing context
1138                // may be in a different script thread. Instead, we check to see if the parent
1139                // is in a document tree and has a browsing context, which is what causes
1140                // the child browsing context to be created.
1141                if self.upcast::<Node>().is_connected_with_browsing_context() {
1142                    debug!("iframe src set while in browsing context.");
1143                    self.process_the_iframe_attributes(ProcessingMode::NotFirstTime, cx);
1144                }
1145            },
1146            local_name!("loading") => {
1147                // https://html.spec.whatwg.org/multipage/#attr-iframe-loading
1148                // > When the loading attribute's state is changed to the Eager state, the user agent must run these steps:
1149                if !mutation.is_removal() && &**attr.value() == "lazy" {
1150                    return;
1151                }
1152
1153                // Step 1. Let resumptionSteps be the iframe element's lazy load resumption steps.
1154                // Step 3. Set the iframe's lazy load resumption steps to null.
1155                let previous_resumption_steps = self
1156                    .lazy_load_resumption_steps
1157                    .replace(LazyLoadResumptionSteps::None);
1158                match previous_resumption_steps {
1159                    // Step 2. If resumptionSteps is null, then return.
1160                    LazyLoadResumptionSteps::None => (),
1161                    LazyLoadResumptionSteps::SrcDoc => {
1162                        // Step 4. Invoke resumptionSteps.
1163                        self.navigate_to_the_srcdoc_resource(ProcessingMode::NotFirstTime, cx);
1164                    },
1165                }
1166            },
1167            _ => {},
1168        }
1169    }
1170
1171    fn attribute_affects_presentational_hints(&self, attr: &Attr) -> bool {
1172        match attr.local_name() {
1173            &local_name!("width") | &local_name!("height") => true,
1174            _ => self
1175                .super_type()
1176                .unwrap()
1177                .attribute_affects_presentational_hints(attr),
1178        }
1179    }
1180
1181    fn parse_plain_attribute(&self, name: &LocalName, value: DOMString) -> AttrValue {
1182        match *name {
1183            local_name!("sandbox") => AttrValue::from_serialized_tokenlist(value.into()),
1184            local_name!("width") => AttrValue::from_dimension(value.into()),
1185            local_name!("height") => AttrValue::from_dimension(value.into()),
1186            _ => self
1187                .super_type()
1188                .unwrap()
1189                .parse_plain_attribute(name, value),
1190        }
1191    }
1192
1193    /// <https://html.spec.whatwg.org/multipage/#the-iframe-element:html-element-post-connection-steps>
1194    fn post_connection_steps(&self, cx: &mut JSContext) {
1195        if let Some(s) = self.super_type() {
1196            s.post_connection_steps(cx);
1197        }
1198
1199        // This isn't mentioned any longer in the specification, but still seems important. This is
1200        // likely due to the fact that we have deviated a great deal with it comes to navigables
1201        // and browsing contexts.
1202        if !self.upcast::<Node>().is_connected_with_browsing_context() {
1203            return;
1204        }
1205
1206        debug!("<iframe> running post connection steps");
1207
1208        // Step 1. Create a new child navigable for insertedNode.
1209        self.create_nested_browsing_context(cx);
1210
1211        // Step 2: If insertedNode has a sandbox attribute, then parse the sandboxing directive
1212        // given the attribute's value and insertedNode's iframe sandboxing flag set.
1213        self.parse_sandbox_attribute();
1214
1215        // Step 3. Process the iframe attributes for insertedNode, with initialInsertion set to true.
1216        self.process_the_iframe_attributes(ProcessingMode::FirstTime, cx);
1217    }
1218
1219    fn bind_to_tree(&self, cx: &mut JSContext, context: &BindContext) {
1220        if let Some(s) = self.super_type() {
1221            s.bind_to_tree(cx, context);
1222        }
1223        self.owner_document().invalidate_iframes_collection();
1224    }
1225
1226    /// <https://html.spec.whatwg.org/multipage/#the-iframe-element:html-element-removing-steps>
1227    fn unbind_from_tree(&self, cx: &mut JSContext, context: &UnbindContext) {
1228        self.super_type().unwrap().unbind_from_tree(cx, context);
1229
1230        // The iframe HTML element removing steps, given removedNode, are to destroy a child navigable given removedNode
1231        self.destroy_child_navigable(cx);
1232
1233        self.owner_document().invalidate_iframes_collection();
1234    }
1235}
1236
1237/// IframeContext is a wrapper around [`HTMLIFrameElement`] that implements the [`ResourceTimingListener`] trait.
1238/// Note: this implementation of `resource_timing_global` returns the parent document's global scope, not the iframe's global scope.
1239pub(crate) struct IframeContext<'a> {
1240    // The iframe element that this context is associated with.
1241    element: &'a HTMLIFrameElement,
1242    // The URL of the iframe document.
1243    url: ServoUrl,
1244}
1245
1246impl<'a> IframeContext<'a> {
1247    /// Creates a new IframeContext from a reference to an HTMLIFrameElement.
1248    pub fn new(element: &'a HTMLIFrameElement) -> Self {
1249        Self {
1250            element,
1251            url: element
1252                .shared_attribute_processing_steps_for_iframe_and_frame_elements(
1253                    ProcessingMode::NotFirstTime,
1254                )
1255                .expect("Must always have a URL when navigating"),
1256        }
1257    }
1258}
1259
1260impl<'a> ResourceTimingListener for IframeContext<'a> {
1261    fn resource_timing_information(&self) -> (InitiatorType, ServoUrl) {
1262        (
1263            InitiatorType::LocalName("iframe".to_string()),
1264            self.url.clone(),
1265        )
1266    }
1267
1268    fn resource_timing_global(&self) -> DomRoot<GlobalScope> {
1269        self.element.upcast::<Node>().owner_doc().global()
1270    }
1271}
1272
1273fn snapshot_self(iframe: &HTMLIFrameElement) -> TargetSnapshotParams {
1274    let child_navigable = iframe.GetContentWindow();
1275    TargetSnapshotParams {
1276        sandboxing_flags: determine_creation_sandboxing_flags(
1277            child_navigable.as_deref(),
1278            Some(iframe.upcast()),
1279        ),
1280        iframe_element_referrer_policy: determine_iframe_element_referrer_policy(Some(
1281            iframe.upcast(),
1282        )),
1283    }
1284}