Changeset 231367 in webkit
- Timestamp:
- May 4, 2018 11:44:47 AM (6 years ago)
- Location:
- trunk
- Files:
-
- 2 deleted
- 24 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/LayoutTests/ChangeLog
r231364 r231367 1 2018-05-04 Chris Dumez <cdumez@apple.com> 2 3 Unreviewed, rolling out r231331. 4 5 Caused a few tests to assert 6 7 Reverted changeset: 8 9 "Stop using an iframe's id as fallback if its name attribute 10 is not set" 11 https://bugs.webkit.org/show_bug.cgi?id=11388 12 https://trac.webkit.org/changeset/231331 13 1 14 2018-05-04 Ryan Haddad <ryanhaddad@apple.com> 2 15 -
trunk/LayoutTests/fast/dom/Geolocation/srcdoc-getCurrentPosition-expected.txt
r231331 r231367 4 4 5 5 -------- 6 Frame: ' <!--framePath //<!--frame0-->-->'6 Frame: 'frame' 7 7 -------- 8 8 FAIL should have invoked error callback, but invoked success callback. -
trunk/LayoutTests/fast/dom/Geolocation/srcdoc-watchPosition-expected.txt
r231331 r231367 4 4 5 5 -------- 6 Frame: ' <!--framePath //<!--frame0-->-->'6 Frame: 'frame' 7 7 -------- 8 8 FAIL should have invoked error callback, but invoked success callback. -
trunk/LayoutTests/fast/dom/HTMLAnchorElement/anchor-in-noscroll-iframe-crash.html
r231331 r231367 15 15 16 16 function setupTopLevel() { 17 var scrollTarget = iframeTarget.contentDocument.getElementById('might_scroll');17 var scrollTarget = window.frames['target'].document.getElementById('might_scroll'); 18 18 19 iframeTarget.contentWindow.registerAction(function () {19 window.frames['target'].window.registerAction(function () { 20 20 iframeTarget.remove(); 21 21 setTimeout(finish, 0); 22 22 }); 23 23 24 iframeTarget.contentWindow.run();24 window.frames['target'].window.run(); 25 25 } 26 26 </script> -
trunk/LayoutTests/fast/dom/Window/window-special-properties-expected.txt
r231331 r231367 43 43 Iframe by name (unique): single WINDOW 44 44 Iframe by name (multiple): single WINDOW 45 Iframe by id (unique): single IFRAME(id)46 Iframe by id (multiple): collection(2) IFRAME(id) IFRAME(id)45 Iframe by id (unique): single WINDOW 46 Iframe by id (multiple): single WINDOW 47 47 Iframe by id/name mixed: single WINDOW 48 48 … … 54 54 Span by id/name mixed: collection(2) SPAN(id) SPAN(id) 55 55 56 Mixed by id: collection(7) IMG(id) FORM(id) APPLET(id) EMBED(id) OBJECT(id) IFRAME(id) SPAN(id)56 Mixed by id: single WINDOW 57 57 Mixed by name: single WINDOW 58 58 Mixed by id (no iframe): collection(6) IMG(id) FORM(id) APPLET(id) EMBED(id) OBJECT(id) SPAN(id) -
trunk/LayoutTests/fast/frames/iframe-no-name-expected.txt
r231331 r231367 4 4 5 5 6 PASS frames[0].name is " "6 PASS frames[0].name is "id" 7 7 PASS frames[1].name is "name" 8 8 PASS frames[2].name is "name" -
trunk/LayoutTests/fast/frames/iframe-no-name.html
r231331 r231367 12 12 <script> 13 13 description("Checks that the id of an iframe does not set the contentWindow's name if the iframe's name is not set."); 14 shouldBeEqualToString("frames[0].name", " ");14 shouldBeEqualToString("frames[0].name", "id"); 15 15 shouldBeEqualToString("frames[1].name", "name"); 16 16 shouldBeEqualToString("frames[2].name", "name"); -
trunk/LayoutTests/fast/layers/prevent-hit-test-during-layout.html
r231331 r231367 34 34 35 35 function runTest() { 36 fixedDiv = fixedFrame.contentDocument.getElementById('fixedDiv');36 fixedDiv = window.frames['fixedFrame'].document.getElementById('fixedDiv'); 37 37 target = document.getElementById('target'); 38 38 -
trunk/LayoutTests/fast/xmlhttprequest/xmlhttprequest-no-file-access-expected.txt
r231331 r231367 17 17 18 18 -------- 19 Frame: ' <!--framePath //<!--frame0-->/<!--frame0-->-->'19 Frame: 'f' 20 20 -------- 21 21 Successful write into iframe -
trunk/LayoutTests/http/tests/loading/basic-auth-load-URL-with-consecutive-slashes-expected.txt
r231331 r231367 1 1 main frame - didStartProvisionalLoadForFrame 2 2 main frame - didCommitLoadForFrame 3 frame " <!--framePath //<!--frame0-->-->" - didStartProvisionalLoadForFrame3 frame "frame" - didStartProvisionalLoadForFrame 4 4 main frame - didFinishDocumentLoadForFrame 5 5 http://127.0.0.1:8000/loading/resources/basic-auth-testing.php?username=webkit&password=rocks - didReceiveAuthenticationChallenge - Responding with webkit:rocks 6 frame " <!--framePath //<!--frame0-->-->" - didCommitLoadForFrame7 frame " <!--framePath //<!--frame0-->-->" - didFinishDocumentLoadForFrame8 frame " <!--framePath //<!--frame0-->-->" - willPerformClientRedirectToURL: http://127.0.0.1:8000/a//b/non-existent-file.html9 frame " <!--framePath //<!--frame0-->-->" - didHandleOnloadEventsForFrame6 frame "frame" - didCommitLoadForFrame 7 frame "frame" - didFinishDocumentLoadForFrame 8 frame "frame" - willPerformClientRedirectToURL: http://127.0.0.1:8000/a//b/non-existent-file.html 9 frame "frame" - didHandleOnloadEventsForFrame 10 10 main frame - didHandleOnloadEventsForFrame 11 frame " <!--framePath //<!--frame0-->-->" - didFinishLoadForFrame11 frame "frame" - didFinishLoadForFrame 12 12 main frame - didFinishLoadForFrame 13 frame " <!--framePath //<!--frame0-->-->" - didStartProvisionalLoadForFrame14 frame " <!--framePath //<!--frame0-->-->" - didCancelClientRedirectForFrame15 frame " <!--framePath //<!--frame0-->-->" - didCommitLoadForFrame16 frame " <!--framePath //<!--frame0-->-->" - didReceiveTitle: 404 Not Found17 frame " <!--framePath //<!--frame0-->-->" - didFinishDocumentLoadForFrame18 frame " <!--framePath //<!--frame0-->-->" - didFailLoadWithError13 frame "frame" - didStartProvisionalLoadForFrame 14 frame "frame" - didCancelClientRedirectForFrame 15 frame "frame" - didCommitLoadForFrame 16 frame "frame" - didReceiveTitle: 404 Not Found 17 frame "frame" - didFinishDocumentLoadForFrame 18 frame "frame" - didFailLoadWithError 19 19 PASS did not cause assertion failure. -
trunk/LayoutTests/http/tests/quicklook/csp-header-ignored-expected.txt
r231331 r231367 5 5 6 6 -------- 7 Frame: ' <!--framePath //<!--frame0-->-->'7 Frame: 'frame' 8 8 -------- 9 9 PASS -
trunk/LayoutTests/http/tests/security/clipboard/copy-paste-html-cross-origin-iframe-across-origin.html
r231331 r231367 34 34 getSelection().removeAllRanges(); 35 35 setTimeout(() => { 36 destinationFrame. contentWindow.postMessage({type: 'paste'}, '*');36 destinationFrame.postMessage({type: 'paste'}, '*'); 37 37 }, 0); 38 38 } -
trunk/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-blank-url-programmatically-add-external-script-expected.txt
r231331 r231367 3 3 4 4 -------- 5 Frame: ' <!--framePath //<!--frame0-->-->'5 Frame: 'frame' 6 6 -------- 7 7 -
trunk/LayoutTests/http/tests/security/cross-origin-reified-window-property-access.html
r231331 r231367 27 27 function runTest() 28 28 { 29 crossOriginWindow = crossOriginFrame. contentWindow;30 sameOriginWindow = sameOriginFrame. contentWindow;29 crossOriginWindow = crossOriginFrame.window; 30 sameOriginWindow = sameOriginFrame.window; 31 31 32 32 shouldThrowOrReturnUndefined('crossOriginWindow.document'); -
trunk/LayoutTests/http/tests/storageAccess/request-and-grant-storage-access-cross-origin-sandboxed-iframe-from-prevalent-domain-with-non-recent-user-interaction-and-try-access-from-right-frame-expected.txt
r231331 r231367 11 11 12 12 -------- 13 Frame: ' <!--framePath //<!--frame0-->-->'13 Frame: 'TheIframeThatRequestsStorageAccess' 14 14 -------- 15 15 After the top frame navigates the sub frame, the sub frame should no longer have access to first-party cookies. -
trunk/LayoutTests/http/tests/storageAccess/request-and-grant-storage-access-cross-origin-sandboxed-iframe-from-prevalent-domain-with-non-recent-user-interaction-but-try-access-from-wrong-frame-expected.txt
r231331 r231367 11 11 12 12 -------- 13 Frame: ' <!--framePath //<!--frame0-->-->'13 Frame: 'theIframe' 14 14 -------- 15 15 -
trunk/LayoutTests/http/tests/webrtc/filtering-ice-candidate-same-origin-frame.html
r231331 r231367 16 16 if (event.data === "getUserMedia done") { 17 17 didGetUserMedia = true; 18 frame1. contentWindow.postMessage("check filtering", "*");18 frame1.postMessage("check filtering", "*"); 19 19 return; 20 20 } -
trunk/LayoutTests/http/wpt/beacon/keepalive-after-navigation-expected.txt
r231331 r231367 1 frame " <!--framePath //<!--frame0-->-->" - has 1 onunload handler(s)1 frame "testFrame" - has 1 onunload handler(s) 2 2 3 3 PASS Test that beacon sent from unload event handler is properly received -
trunk/LayoutTests/http/wpt/cache-storage/cache-remove-twice.html
r231331 r231367 25 25 return new Promise((resolve, reject) => { 26 26 window.addEventListener("message", test.step_func((event) => { 27 return Promise.all([self.caches.open(cacheName), cacheFrame. contentWindow.caches.open(cacheName) ]).then(() => {28 return Promise.all([self.caches.delete(cacheName), cacheFrame. contentWindow.caches.delete(cacheName)]);27 return Promise.all([self.caches.open(cacheName), cacheFrame.window.caches.open(cacheName) ]).then(() => { 28 return Promise.all([self.caches.delete(cacheName), cacheFrame.window.caches.delete(cacheName)]); 29 29 }).then(resolve, reject); 30 30 })); -
trunk/LayoutTests/platform/ios/http/tests/quicklook/csp-header-ignored-expected.txt
r231331 r231367 4 4 5 5 -------- 6 Frame: ' <!--framePath //<!--frame0-->-->'6 Frame: 'frame' 7 7 -------- 8 8 PASS -
trunk/LayoutTests/platform/wk2/http/tests/loading/basic-auth-load-URL-with-consecutive-slashes-expected.txt
r231331 r231367 2 2 main frame - didCommitLoadForFrame 3 3 main frame - didFinishDocumentLoadForFrame 4 frame " <!--framePath //<!--frame0-->-->" - didStartProvisionalLoadForFrame4 frame "frame" - didStartProvisionalLoadForFrame 5 5 127.0.0.1:8000 - didReceiveAuthenticationChallenge - Responding with webkit:rocks 6 frame " <!--framePath //<!--frame0-->-->" - didCommitLoadForFrame7 frame " <!--framePath //<!--frame0-->-->" - didFinishDocumentLoadForFrame8 frame " <!--framePath //<!--frame0-->-->" - willPerformClientRedirectToURL: http://127.0.0.1:8000/a//b/non-existent-file.html9 frame " <!--framePath //<!--frame0-->-->" - didHandleOnloadEventsForFrame6 frame "frame" - didCommitLoadForFrame 7 frame "frame" - didFinishDocumentLoadForFrame 8 frame "frame" - willPerformClientRedirectToURL: http://127.0.0.1:8000/a//b/non-existent-file.html 9 frame "frame" - didHandleOnloadEventsForFrame 10 10 main frame - didHandleOnloadEventsForFrame 11 frame " <!--framePath //<!--frame0-->-->" - didFinishLoadForFrame11 frame "frame" - didFinishLoadForFrame 12 12 main frame - didFinishLoadForFrame 13 frame " <!--framePath //<!--frame0-->-->" - didStartProvisionalLoadForFrame14 frame " <!--framePath //<!--frame0-->-->" - didCancelClientRedirectForFrame15 frame " <!--framePath //<!--frame0-->-->" - didCommitLoadForFrame16 frame " <!--framePath //<!--frame0-->-->" - didReceiveTitle: 404 Not Found17 frame " <!--framePath //<!--frame0-->-->" - didFinishDocumentLoadForFrame18 frame " <!--framePath //<!--frame0-->-->" - didFailLoadWithError13 frame "frame" - didStartProvisionalLoadForFrame 14 frame "frame" - didCancelClientRedirectForFrame 15 frame "frame" - didCommitLoadForFrame 16 frame "frame" - didReceiveTitle: 404 Not Found 17 frame "frame" - didFinishDocumentLoadForFrame 18 frame "frame" - didFailLoadWithError 19 19 PASS did not cause assertion failure. -
trunk/Source/WebCore/ChangeLog
r231366 r231367 1 2018-05-04 Chris Dumez <cdumez@apple.com> 2 3 Unreviewed, rolling out r231331. 4 5 Caused a few tests to assert 6 7 Reverted changeset: 8 9 "Stop using an iframe's id as fallback if its name attribute 10 is not set" 11 https://bugs.webkit.org/show_bug.cgi?id=11388 12 https://trac.webkit.org/changeset/231331 13 1 14 2018-05-04 Youenn Fablet <youenn@apple.com> 2 15 -
trunk/Source/WebCore/html/HTMLFrameElementBase.cpp
r231331 r231367 97 97 return; 98 98 99 parentFrame->loader().subframeLoader().requestFrame(*this, m_URL, getNameAttribute(), lockHistory, lockBackForwardList);99 parentFrame->loader().subframeLoader().requestFrame(*this, m_URL, m_frameName, lockHistory, lockBackForwardList); 100 100 } 101 101 … … 106 106 else if (name == srcAttr && !hasAttributeWithoutSynchronization(srcdocAttr)) 107 107 setLocation(stripLeadingAndTrailingHTMLSpaces(value)); 108 else if (name == marginwidthAttr) { 108 else if (name == idAttr) { 109 HTMLFrameOwnerElement::parseAttribute(name, value); 110 // Falling back to using the 'id' attribute is not standard but some content relies on this behavior. 111 if (!hasAttributeWithoutSynchronization(nameAttr)) 112 m_frameName = value; 113 } else if (name == nameAttr) { 114 m_frameName = value; 115 // FIXME: If we are already attached, this doesn't actually change the frame's name. 116 // FIXME: If we are already attached, this doesn't check for frame name 117 // conflicts and generate a unique frame name. 118 } else if (name == marginwidthAttr) { 109 119 m_marginWidth = value.toInt(); 110 120 // FIXME: If we are already attached, this has no effect. … … 123 133 } 124 134 135 void HTMLFrameElementBase::setNameAndOpenURL() 136 { 137 m_frameName = getNameAttribute(); 138 // Falling back to using the 'id' attribute is not standard but some content relies on this behavior. 139 if (m_frameName.isNull()) 140 m_frameName = getIdAttribute(); 141 openURL(); 142 } 143 125 144 Node::InsertedIntoAncestorResult HTMLFrameElementBase::insertedIntoAncestor(InsertionType insertionType, ContainerNode& parentOfInsertedTree) 126 145 { … … 145 164 if (!renderer()) 146 165 invalidateStyleAndRenderersForSubtree(); 147 openURL();166 setNameAndOpenURL(); 148 167 } 149 168 -
trunk/Source/WebCore/html/HTMLFrameElementBase.h
r231331 r231367 71 71 bool isFrameElementBase() const final { return true; } 72 72 73 void setNameAndOpenURL(); 73 74 void openURL(LockHistory = LockHistory::Yes, LockBackForwardList = LockBackForwardList::Yes); 74 75 75 76 AtomicString m_URL; 77 AtomicString m_frameName; 76 78 77 79 ScrollbarMode m_scrolling;
Note: See TracChangeset
for help on using the changeset viewer.