2020-01-20 17:58:52 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#ifndef mozilla_dom_WindowContext_h
|
|
|
|
#define mozilla_dom_WindowContext_h
|
|
|
|
|
2020-06-12 19:31:49 +03:00
|
|
|
#include "mozilla/PermissionDelegateHandler.h"
|
2020-04-24 21:33:04 +03:00
|
|
|
#include "mozilla/Span.h"
|
2020-08-13 02:47:09 +03:00
|
|
|
#include "mozilla/dom/BrowsingContext.h"
|
2020-02-21 02:30:33 +03:00
|
|
|
#include "mozilla/dom/MaybeDiscarded.h"
|
2020-01-20 17:58:52 +03:00
|
|
|
#include "mozilla/dom/SyncedContext.h"
|
2020-08-17 14:02:34 +03:00
|
|
|
#include "mozilla/dom/UserActivation.h"
|
2020-07-22 18:12:10 +03:00
|
|
|
#include "nsILoadInfo.h"
|
|
|
|
#include "nsWrapperCache.h"
|
|
|
|
|
|
|
|
class nsIGlobalObject;
|
2020-01-20 17:58:52 +03:00
|
|
|
|
2020-08-08 01:02:02 +03:00
|
|
|
class nsGlobalWindowInner;
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
namespace mozilla {
|
2020-07-22 18:12:10 +03:00
|
|
|
class LogModule;
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
namespace dom {
|
|
|
|
|
2020-04-22 22:32:52 +03:00
|
|
|
class WindowGlobalParent;
|
2020-05-08 23:44:12 +03:00
|
|
|
class WindowGlobalInit;
|
2020-05-27 03:27:30 +03:00
|
|
|
class BrowsingContextGroup;
|
2020-04-22 22:32:52 +03:00
|
|
|
|
2020-03-30 17:12:08 +03:00
|
|
|
#define MOZ_EACH_WC_FIELD(FIELD) \
|
2020-06-09 17:48:38 +03:00
|
|
|
/* Whether the SHEntry associated with the current top-level \
|
|
|
|
* window has already seen user interaction. \
|
|
|
|
* As such, this will be reset to false when a new SHEntry is \
|
|
|
|
* created without changing the WC (e.g. when using pushState or \
|
|
|
|
* sub-frame navigation) \
|
|
|
|
* This flag is set for optimization purposes, to avoid \
|
|
|
|
* having to get the top SHEntry and update it on every \
|
|
|
|
* user interaction. \
|
|
|
|
* This is only meaningful on the top-level WC. */ \
|
|
|
|
FIELD(SHEntryHasUserInteraction, bool) \
|
2020-05-08 23:10:56 +03:00
|
|
|
FIELD(CookieBehavior, Maybe<uint32_t>) \
|
|
|
|
FIELD(IsOnContentBlockingAllowList, bool) \
|
2020-04-23 17:24:56 +03:00
|
|
|
/* Whether the given window hierarchy is third party. See \
|
|
|
|
* ThirdPartyUtil::IsThirdPartyWindow for details */ \
|
|
|
|
FIELD(IsThirdPartyWindow, bool) \
|
|
|
|
/* Whether this window's channel has been marked as a third-party \
|
|
|
|
* tracking resource */ \
|
2020-05-07 10:22:17 +03:00
|
|
|
FIELD(IsThirdPartyTrackingResourceWindow, bool) \
|
2020-05-14 00:52:39 +03:00
|
|
|
FIELD(IsSecureContext, bool) \
|
2020-09-22 20:41:34 +03:00
|
|
|
FIELD(IsOriginalFrameSource, bool) \
|
2020-06-16 12:05:54 +03:00
|
|
|
/* Mixed-Content: If the corresponding documentURI is https, \
|
|
|
|
* then this flag is true. */ \
|
|
|
|
FIELD(IsSecure, bool) \
|
2020-05-07 10:22:17 +03:00
|
|
|
/* Whether the user has overriden the mixed content blocker to allow \
|
|
|
|
* mixed content loads to happen */ \
|
2020-05-11 21:41:16 +03:00
|
|
|
FIELD(AllowMixedContent, bool) \
|
2020-09-22 01:40:51 +03:00
|
|
|
/* Whether this window has registered a "beforeunload" event \
|
|
|
|
* handler */ \
|
|
|
|
FIELD(HasBeforeUnload, bool) \
|
2020-08-17 14:02:34 +03:00
|
|
|
/* Controls whether the WindowContext is currently considered to be \
|
|
|
|
* activated by a gesture */ \
|
|
|
|
FIELD(UserActivationState, UserActivation::State) \
|
2020-05-16 00:18:07 +03:00
|
|
|
FIELD(EmbedderPolicy, nsILoadInfo::CrossOriginEmbedderPolicy) \
|
2020-09-25 00:41:10 +03:00
|
|
|
/* True if this document tree contained at least a HTMLMediaElement. \
|
|
|
|
* This should only be set on top level context. */ \
|
|
|
|
FIELD(DocTreeHadMedia, bool) \
|
2020-06-12 19:31:49 +03:00
|
|
|
FIELD(AutoplayPermission, uint32_t) \
|
2020-07-30 15:26:24 +03:00
|
|
|
FIELD(ShortcutsPermission, uint32_t) \
|
2020-08-27 17:11:05 +03:00
|
|
|
/* Store the Id of the browsing context where active media session \
|
|
|
|
* exists on the top level window context */ \
|
|
|
|
FIELD(ActiveMediaSessionContextId, Maybe<uint64_t>) \
|
2020-08-12 18:38:12 +03:00
|
|
|
/* ALLOW_ACTION if it is allowed to open popups for the sub-tree \
|
|
|
|
* starting and including the current WindowContext */ \
|
|
|
|
FIELD(PopupPermission, uint32_t) \
|
2020-06-12 19:31:49 +03:00
|
|
|
FIELD(DelegatedPermissions, \
|
|
|
|
PermissionDelegateHandler::DelegatedPermissionList) \
|
|
|
|
FIELD(DelegatedExactHostMatchPermissions, \
|
2020-07-14 14:22:20 +03:00
|
|
|
PermissionDelegateHandler::DelegatedPermissionList) \
|
|
|
|
FIELD(HasReportedShadowDOMUsage, bool)
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
class WindowContext : public nsISupports, public nsWrapperCache {
|
|
|
|
MOZ_DECL_SYNCED_CONTEXT(WindowContext, MOZ_EACH_WC_FIELD)
|
|
|
|
|
|
|
|
NS_DECL_CYCLE_COLLECTING_ISUPPORTS
|
|
|
|
NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS(WindowContext)
|
|
|
|
|
|
|
|
public:
|
|
|
|
static already_AddRefed<WindowContext> GetById(uint64_t aInnerWindowId);
|
|
|
|
static LogModule* GetLog();
|
|
|
|
|
|
|
|
BrowsingContext* GetBrowsingContext() const { return mBrowsingContext; }
|
|
|
|
BrowsingContextGroup* Group() const;
|
2020-02-21 02:30:33 +03:00
|
|
|
uint64_t Id() const { return InnerWindowId(); }
|
2020-01-20 17:58:52 +03:00
|
|
|
uint64_t InnerWindowId() const { return mInnerWindowId; }
|
2020-05-08 23:44:12 +03:00
|
|
|
uint64_t OuterWindowId() const { return mOuterWindowId; }
|
2020-01-20 17:58:52 +03:00
|
|
|
bool IsDiscarded() const { return mIsDiscarded; }
|
|
|
|
|
2020-04-24 21:33:04 +03:00
|
|
|
bool IsCached() const;
|
|
|
|
|
2020-08-08 01:02:02 +03:00
|
|
|
bool IsInProcess() const { return mInProcess; }
|
|
|
|
|
2020-09-22 01:40:51 +03:00
|
|
|
bool HasBeforeUnload() const { return GetHasBeforeUnload(); }
|
|
|
|
|
2020-08-08 01:02:02 +03:00
|
|
|
nsGlobalWindowInner* GetInnerWindow() const;
|
2020-08-10 02:50:35 +03:00
|
|
|
Document* GetDocument() const;
|
Bug 1668156 - Fix some IntersectionObserver edge cases, and enable the assertion for good. r=hiro
This patch fixes two issues, described below:
First, the GetTopLevelDocument function was looking at the browsing
context tree. It should look at the window context tree, as looking at
the browsing context tree means that if you're in a discarded or
about-to-get-discarded document, you can end up with a document from a
different tree. Computing intersections between those of course makes no
sense and triggers the assertion we're enabling.
Second, this patch fixes an issue when you have fission enabled, and a
setup such as:
A1 -> B1 -> A2
If you try to use IntersectionObserver from A2 with the implicit root,
we'd end up with:
* rootRect: A1's root scrollport rect (this is fine, because it's only
used to compute the root margin and bounds and so on, not
to compute geometry).
* rootFrame: A1's root scroll frame (this is _not_ fine, see below).
Then, we'd try to map rects from A2's target to A1's viewport, and we
can't really do that sensibly with the existing nsLayoutUtils functions,
because we're not accounting for all the OOP iframe transforms that may
be going on. This also triggers the assertion that this patch enables in
same-origin-grand-child-iframe.sub.html.
To fix it, for the A2 case, use the same code that we have for other OOP
iframes. The test tweaks fails with fission enabled without the patch
(because we don't account for the OOP iframe clip).
Differential Revision: https://phabricator.services.mozilla.com/D92089
2020-10-02 01:41:55 +03:00
|
|
|
Document* GetExtantDoc() const;
|
2020-05-08 04:38:02 +03:00
|
|
|
|
2020-05-04 17:26:34 +03:00
|
|
|
// Get the parent WindowContext of this WindowContext, taking the BFCache into
|
|
|
|
// account. This will not cross chrome/content <browser> boundaries.
|
|
|
|
WindowContext* GetParentWindowContext();
|
|
|
|
WindowContext* TopWindowContext();
|
|
|
|
|
2020-08-13 10:16:11 +03:00
|
|
|
bool IsTop() const;
|
2020-08-12 18:38:12 +03:00
|
|
|
|
2020-04-24 21:33:04 +03:00
|
|
|
Span<RefPtr<BrowsingContext>> Children() { return mChildren; }
|
|
|
|
|
2020-02-21 02:30:33 +03:00
|
|
|
// Cast this object to it's parent-process canonical form.
|
|
|
|
WindowGlobalParent* Canonical();
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
nsIGlobalObject* GetParentObject() const;
|
|
|
|
JSObject* WrapObject(JSContext* cx,
|
|
|
|
JS::Handle<JSObject*> aGivenProto) override;
|
|
|
|
|
|
|
|
void Discard();
|
|
|
|
|
|
|
|
struct IPCInitializer {
|
|
|
|
uint64_t mInnerWindowId;
|
2020-05-08 23:44:12 +03:00
|
|
|
uint64_t mOuterWindowId;
|
2020-01-20 17:58:52 +03:00
|
|
|
uint64_t mBrowsingContextId;
|
|
|
|
|
2020-07-22 17:07:26 +03:00
|
|
|
FieldValues mFields;
|
2020-01-20 17:58:52 +03:00
|
|
|
};
|
2020-05-08 23:44:12 +03:00
|
|
|
IPCInitializer GetIPCInitializer();
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
static void CreateFromIPC(IPCInitializer&& aInit);
|
|
|
|
|
2020-10-06 03:34:55 +03:00
|
|
|
// Add new security state flags.
|
|
|
|
// These should be some of the nsIWebProgressListener 'HTTPS_ONLY_MODE' or
|
|
|
|
// 'MIXED' state flags, and should only be called on the top window context.
|
|
|
|
void AddSecurityState(uint32_t aStateFlags);
|
2020-05-27 03:28:59 +03:00
|
|
|
|
2020-08-17 14:02:34 +03:00
|
|
|
// This function would be called when its corresponding window is activated
|
|
|
|
// by user gesture.
|
|
|
|
void NotifyUserGestureActivation();
|
|
|
|
|
|
|
|
// This function would be called when we want to reset the user gesture
|
|
|
|
// activation flag.
|
|
|
|
void NotifyResetUserGestureActivation();
|
|
|
|
|
|
|
|
// Return true if its corresponding window has been activated by user
|
|
|
|
// gesture.
|
|
|
|
bool HasBeenUserGestureActivated();
|
|
|
|
|
|
|
|
// Return true if its corresponding window has transient user gesture
|
|
|
|
// activation and the transient user gesture activation haven't yet timed
|
|
|
|
// out.
|
|
|
|
bool HasValidTransientUserGestureActivation();
|
|
|
|
|
|
|
|
// Return true if the corresponding window has valid transient user gesture
|
|
|
|
// activation and the transient user gesture activation had been consumed
|
|
|
|
// successfully.
|
|
|
|
bool ConsumeTransientUserGestureActivation();
|
|
|
|
|
2020-08-12 18:38:12 +03:00
|
|
|
bool CanShowPopup();
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
protected:
|
|
|
|
WindowContext(BrowsingContext* aBrowsingContext, uint64_t aInnerWindowId,
|
2020-07-22 17:07:26 +03:00
|
|
|
uint64_t aOuterWindowId, bool aInProcess,
|
|
|
|
FieldValues&& aFields);
|
2020-01-20 17:58:52 +03:00
|
|
|
virtual ~WindowContext();
|
|
|
|
|
2020-05-08 23:44:12 +03:00
|
|
|
virtual void Init();
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
private:
|
2020-04-24 21:33:04 +03:00
|
|
|
friend class BrowsingContext;
|
2020-05-08 23:44:12 +03:00
|
|
|
friend class WindowGlobalChild;
|
2020-05-11 21:41:16 +03:00
|
|
|
friend class WindowGlobalActor;
|
2020-04-24 21:33:04 +03:00
|
|
|
|
|
|
|
void AppendChildBrowsingContext(BrowsingContext* aBrowsingContext);
|
|
|
|
void RemoveChildBrowsingContext(BrowsingContext* aBrowsingContext);
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
// Send a given `BaseTransaction` object to the correct remote.
|
|
|
|
void SendCommitTransaction(ContentParent* aParent,
|
|
|
|
const BaseTransaction& aTxn, uint64_t aEpoch);
|
|
|
|
void SendCommitTransaction(ContentChild* aChild, const BaseTransaction& aTxn,
|
|
|
|
uint64_t aEpoch);
|
|
|
|
|
2020-05-08 04:38:02 +03:00
|
|
|
bool CheckOnlyOwningProcessCanSet(ContentParent* aSource);
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
// Overload `CanSet` to get notifications for a particular field being set.
|
2020-06-16 12:05:54 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_IsSecure>, const bool& aIsSecure,
|
|
|
|
ContentParent* aSource);
|
2020-05-07 10:22:17 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_AllowMixedContent>, const bool& aAllowMixedContent,
|
|
|
|
ContentParent* aSource);
|
|
|
|
|
2020-09-22 01:40:51 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_HasBeforeUnload>, const bool& aHasBeforeUnload,
|
|
|
|
ContentParent* aSource);
|
|
|
|
|
2020-05-08 23:10:56 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_CookieBehavior>, const Maybe<uint32_t>& aValue,
|
2020-05-08 04:38:02 +03:00
|
|
|
ContentParent* aSource);
|
2020-05-08 23:10:56 +03:00
|
|
|
|
|
|
|
bool CanSet(FieldIndex<IDX_IsOnContentBlockingAllowList>, const bool& aValue,
|
|
|
|
ContentParent* aSource);
|
|
|
|
|
2020-05-11 21:41:16 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_EmbedderPolicy>, const bool& aValue,
|
|
|
|
ContentParent* aSource) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-04-23 17:24:56 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_IsThirdPartyWindow>,
|
|
|
|
const bool& IsThirdPartyWindow, ContentParent* aSource);
|
|
|
|
bool CanSet(FieldIndex<IDX_IsThirdPartyTrackingResourceWindow>,
|
|
|
|
const bool& aIsThirdPartyTrackingResourceWindow,
|
|
|
|
ContentParent* aSource);
|
2020-05-14 00:52:39 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_IsSecureContext>, const bool& aIsSecureContext,
|
|
|
|
ContentParent* aSource);
|
2020-09-22 20:41:34 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_IsOriginalFrameSource>,
|
|
|
|
const bool& aIsOriginalFrameSource, ContentParent* aSource);
|
2020-09-25 00:41:10 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_DocTreeHadMedia>, const bool& aValue,
|
2020-07-16 22:53:49 +03:00
|
|
|
ContentParent* aSource);
|
2020-05-16 00:18:07 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_AutoplayPermission>, const uint32_t& aValue,
|
|
|
|
ContentParent* aSource);
|
2020-07-30 15:26:24 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_ShortcutsPermission>, const uint32_t& aValue,
|
|
|
|
ContentParent* aSource);
|
2020-08-27 17:11:05 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_ActiveMediaSessionContextId>,
|
|
|
|
const Maybe<uint64_t>& aValue, ContentParent* aSource);
|
2020-08-12 18:38:12 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_PopupPermission>, const uint32_t&,
|
|
|
|
ContentParent* aSource);
|
2020-06-09 17:48:38 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_SHEntryHasUserInteraction>,
|
|
|
|
const bool& aSHEntryHasUserInteraction, ContentParent* aSource) {
|
|
|
|
return true;
|
|
|
|
}
|
2020-06-12 19:31:49 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_DelegatedPermissions>,
|
|
|
|
const PermissionDelegateHandler::DelegatedPermissionList& aValue,
|
|
|
|
ContentParent* aSource);
|
|
|
|
bool CanSet(FieldIndex<IDX_DelegatedExactHostMatchPermissions>,
|
|
|
|
const PermissionDelegateHandler::DelegatedPermissionList& aValue,
|
|
|
|
ContentParent* aSource);
|
2020-08-17 14:02:34 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_UserActivationState>,
|
|
|
|
const UserActivation::State& aUserActivationState,
|
|
|
|
ContentParent* aSource) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-07-14 14:22:20 +03:00
|
|
|
bool CanSet(FieldIndex<IDX_HasReportedShadowDOMUsage>, const bool& aValue,
|
|
|
|
ContentParent* aSource) {
|
|
|
|
return true;
|
|
|
|
}
|
2020-08-12 18:38:12 +03:00
|
|
|
|
2020-07-14 14:22:20 +03:00
|
|
|
void DidSet(FieldIndex<IDX_HasReportedShadowDOMUsage>, bool aOldValue);
|
|
|
|
|
2020-04-20 23:09:32 +03:00
|
|
|
// Overload `DidSet` to get notifications for a particular field being set.
|
2020-04-20 23:25:22 +03:00
|
|
|
//
|
|
|
|
// You can also overload the variant that gets the old value if you need it.
|
2020-04-20 23:09:32 +03:00
|
|
|
template <size_t I>
|
|
|
|
void DidSet(FieldIndex<I>) {}
|
2020-04-20 23:25:22 +03:00
|
|
|
template <size_t I, typename T>
|
|
|
|
void DidSet(FieldIndex<I>, T&& aOldValue) {}
|
2020-08-17 14:02:34 +03:00
|
|
|
void DidSet(FieldIndex<IDX_UserActivationState>);
|
2020-01-20 17:58:52 +03:00
|
|
|
|
2020-09-16 01:13:22 +03:00
|
|
|
const uint64_t mInnerWindowId;
|
|
|
|
const uint64_t mOuterWindowId;
|
2020-01-20 17:58:52 +03:00
|
|
|
RefPtr<BrowsingContext> mBrowsingContext;
|
|
|
|
|
2020-04-24 21:33:04 +03:00
|
|
|
// --- NEVER CHANGE `mChildren` DIRECTLY! ---
|
|
|
|
// Changes to this list need to be synchronized to the list within our
|
|
|
|
// `mBrowsingContext`, and should only be performed through the
|
|
|
|
// `AppendChildBrowsingContext` and `RemoveChildBrowsingContext` methods.
|
|
|
|
nsTArray<RefPtr<BrowsingContext>> mChildren;
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
bool mIsDiscarded = false;
|
2020-05-08 04:38:02 +03:00
|
|
|
bool mInProcess = false;
|
2020-08-17 14:02:34 +03:00
|
|
|
|
|
|
|
// The start time of user gesture, this is only available if the window
|
|
|
|
// context is in process.
|
|
|
|
TimeStamp mUserGestureStart;
|
2020-01-20 17:58:52 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
using WindowContextTransaction = WindowContext::BaseTransaction;
|
|
|
|
using WindowContextInitializer = WindowContext::IPCInitializer;
|
2020-02-21 02:30:33 +03:00
|
|
|
using MaybeDiscardedWindowContext = MaybeDiscarded<WindowContext>;
|
2020-01-20 17:58:52 +03:00
|
|
|
|
|
|
|
// Don't specialize the `Transaction` object for every translation unit it's
|
|
|
|
// used in. This should help keep code size down.
|
|
|
|
extern template class syncedcontext::Transaction<WindowContext>;
|
|
|
|
|
|
|
|
} // namespace dom
|
|
|
|
|
|
|
|
namespace ipc {
|
2020-02-21 02:30:33 +03:00
|
|
|
template <>
|
|
|
|
struct IPDLParamTraits<dom::MaybeDiscarded<dom::WindowContext>> {
|
|
|
|
static void Write(IPC::Message* aMsg, IProtocol* aActor,
|
|
|
|
const dom::MaybeDiscarded<dom::WindowContext>& aParam);
|
|
|
|
static bool Read(const IPC::Message* aMsg, PickleIterator* aIter,
|
|
|
|
IProtocol* aActor,
|
|
|
|
dom::MaybeDiscarded<dom::WindowContext>* aResult);
|
|
|
|
};
|
|
|
|
|
2020-01-20 17:58:52 +03:00
|
|
|
template <>
|
|
|
|
struct IPDLParamTraits<dom::WindowContext::IPCInitializer> {
|
|
|
|
static void Write(IPC::Message* aMessage, IProtocol* aActor,
|
|
|
|
const dom::WindowContext::IPCInitializer& aInitializer);
|
|
|
|
|
|
|
|
static bool Read(const IPC::Message* aMessage, PickleIterator* aIterator,
|
|
|
|
IProtocol* aActor,
|
|
|
|
dom::WindowContext::IPCInitializer* aInitializer);
|
|
|
|
};
|
|
|
|
} // namespace ipc
|
|
|
|
} // namespace mozilla
|
|
|
|
|
|
|
|
#endif // !defined(mozilla_dom_WindowContext_h)
|