2016-10-29 01:57:50 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
2016-10-07 00:23:08 +03:00
|
|
|
#include "mozilla/dom/DocGroup.h"
|
2018-03-20 22:07:41 +03:00
|
|
|
#include "mozilla/dom/DOMTypes.h"
|
2020-03-26 03:36:24 +03:00
|
|
|
#include "mozilla/dom/JSExecutionManager.h"
|
2019-04-12 01:15:07 +03:00
|
|
|
#include "mozilla/AbstractThread.h"
|
2018-11-20 01:51:12 +03:00
|
|
|
#include "mozilla/PerformanceUtils.h"
|
2020-04-07 18:17:47 +03:00
|
|
|
#include "mozilla/SchedulerGroup.h"
|
2019-06-11 23:43:40 +03:00
|
|
|
#include "mozilla/ThrottledEventQueue.h"
|
2019-07-26 04:10:23 +03:00
|
|
|
#include "mozilla/StaticPrefs_dom.h"
|
2016-10-07 00:23:08 +03:00
|
|
|
#include "mozilla/Telemetry.h"
|
2017-12-19 18:14:55 +03:00
|
|
|
#include "nsDOMMutationObserver.h"
|
2019-04-12 01:15:07 +03:00
|
|
|
#include "nsProxyRelease.h"
|
2018-03-20 22:07:41 +03:00
|
|
|
#if defined(XP_WIN)
|
|
|
|
# include <processthreadsapi.h> // for GetCurrentProcessId()
|
|
|
|
#else
|
|
|
|
# include <unistd.h> // for getpid()
|
|
|
|
#endif // defined(XP_WIN)
|
2016-10-07 00:23:08 +03:00
|
|
|
|
2020-04-07 18:17:47 +03:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
#define NS_LABELLINGEVENTTARGET_IID \
|
|
|
|
{ \
|
|
|
|
0x6087fa50, 0xe387, 0x45c8, { \
|
|
|
|
0xab, 0x72, 0xd2, 0x1f, 0x69, 0xee, 0xd3, 0x15 \
|
|
|
|
} \
|
|
|
|
}
|
|
|
|
|
|
|
|
// LabellingEventTarget labels all dispatches with the DocGroup that
|
|
|
|
// created it.
|
|
|
|
class LabellingEventTarget final : public nsISerialEventTarget {
|
|
|
|
// This creates a cycle with DocGroup. Therefore, when DocGroup
|
|
|
|
// looses its last Document, the DocGroup of the
|
|
|
|
// LabellingEventTarget needs to be cleared.
|
|
|
|
RefPtr<mozilla::dom::DocGroup> mDocGroup;
|
|
|
|
|
|
|
|
public:
|
|
|
|
NS_DECLARE_STATIC_IID_ACCESSOR(NS_LABELLINGEVENTTARGET_IID)
|
|
|
|
|
|
|
|
explicit LabellingEventTarget(mozilla::dom::DocGroup* aDocGroup)
|
|
|
|
: mDocGroup(aDocGroup) {}
|
|
|
|
|
|
|
|
NS_DECL_THREADSAFE_ISUPPORTS
|
|
|
|
NS_DECL_NSIEVENTTARGET_FULL
|
|
|
|
|
|
|
|
private:
|
|
|
|
~LabellingEventTarget() = default;
|
|
|
|
};
|
|
|
|
|
|
|
|
NS_DEFINE_STATIC_IID_ACCESSOR(LabellingEventTarget, NS_LABELLINGEVENTTARGET_IID)
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LabellingEventTarget::DispatchFromScript(nsIRunnable* aRunnable,
|
|
|
|
uint32_t aFlags) {
|
|
|
|
return Dispatch(do_AddRef(aRunnable), aFlags);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LabellingEventTarget::Dispatch(already_AddRefed<nsIRunnable> aRunnable,
|
|
|
|
uint32_t aFlags) {
|
|
|
|
if (NS_WARN_IF(aFlags != NS_DISPATCH_NORMAL)) {
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return mozilla::SchedulerGroup::DispatchWithDocGroup(
|
|
|
|
mozilla::TaskCategory::Other, std::move(aRunnable), mDocGroup);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LabellingEventTarget::DelayedDispatch(already_AddRefed<nsIRunnable>, uint32_t) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LabellingEventTarget::IsOnCurrentThread(bool* aIsOnCurrentThread) {
|
|
|
|
*aIsOnCurrentThread = NS_IsMainThread();
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP_(bool)
|
|
|
|
LabellingEventTarget::IsOnCurrentThreadInfallible() {
|
|
|
|
return NS_IsMainThread();
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(LabellingEventTarget, LabellingEventTarget, nsIEventTarget,
|
|
|
|
nsISerialEventTarget)
|
|
|
|
|
2016-10-07 00:23:08 +03:00
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
|
2017-12-19 18:14:55 +03:00
|
|
|
AutoTArray<RefPtr<DocGroup>, 2>* DocGroup::sPendingDocGroups = nullptr;
|
|
|
|
|
2020-04-07 18:17:47 +03:00
|
|
|
/* static */
|
|
|
|
already_AddRefed<DocGroup> DocGroup::Create(
|
|
|
|
BrowsingContextGroup* aBrowsingContextGroup, const nsACString& aKey) {
|
|
|
|
RefPtr<DocGroup> docGroup = new DocGroup(aBrowsingContextGroup, aKey);
|
|
|
|
docGroup->mEventTarget = new LabellingEventTarget(docGroup);
|
|
|
|
return docGroup.forget();
|
|
|
|
}
|
|
|
|
|
2019-02-26 01:05:29 +03:00
|
|
|
/* static */
|
|
|
|
nsresult DocGroup::GetKey(nsIPrincipal* aPrincipal, nsACString& aKey) {
|
2017-01-27 19:09:20 +03:00
|
|
|
// Use GetBaseDomain() to handle things like file URIs, IP address URIs,
|
|
|
|
// etc. correctly.
|
|
|
|
nsresult rv = aPrincipal->GetBaseDomain(aKey);
|
2017-01-17 03:10:27 +03:00
|
|
|
if (NS_FAILED(rv)) {
|
2017-01-27 19:09:20 +03:00
|
|
|
// We don't really know what to do here. But we should be conservative,
|
|
|
|
// otherwise it would be possible to reorder two events incorrectly in the
|
|
|
|
// future if we interrupt at the DocGroup level, so to be safe, use an
|
|
|
|
// empty string to classify all such documents as belonging to the same
|
|
|
|
// DocGroup.
|
2017-01-17 03:10:27 +03:00
|
|
|
aKey.Truncate();
|
|
|
|
}
|
|
|
|
|
2017-01-27 19:09:20 +03:00
|
|
|
return rv;
|
2016-10-07 00:23:08 +03:00
|
|
|
}
|
|
|
|
|
2020-03-26 03:36:24 +03:00
|
|
|
void DocGroup::SetExecutionManager(JSExecutionManager* aManager) {
|
|
|
|
mExecutionManager = aManager;
|
|
|
|
}
|
|
|
|
|
2020-04-07 18:17:47 +03:00
|
|
|
void DocGroup::AddDocument(Document* aDocument) {
|
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
MOZ_ASSERT(!mDocuments.Contains(aDocument));
|
|
|
|
MOZ_ASSERT(mBrowsingContextGroup);
|
|
|
|
mDocuments.AppendElement(aDocument);
|
|
|
|
}
|
|
|
|
|
2019-01-02 16:05:23 +03:00
|
|
|
void DocGroup::RemoveDocument(Document* aDocument) {
|
2017-03-29 21:37:38 +03:00
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
2016-10-07 00:23:08 +03:00
|
|
|
MOZ_ASSERT(mDocuments.Contains(aDocument));
|
|
|
|
mDocuments.RemoveElement(aDocument);
|
2020-04-07 18:17:47 +03:00
|
|
|
|
|
|
|
if (mDocuments.IsEmpty()) {
|
|
|
|
mBrowsingContextGroup = nullptr;
|
|
|
|
// This clears the cycle DocGroup has with LabellingEventTarget.
|
2020-04-16 17:14:43 +03:00
|
|
|
mEventTarget = nullptr;
|
|
|
|
mAbstractThread = nullptr;
|
2020-04-07 18:17:47 +03:00
|
|
|
}
|
2016-10-07 00:23:08 +03:00
|
|
|
}
|
|
|
|
|
2020-04-07 18:17:47 +03:00
|
|
|
DocGroup::DocGroup(BrowsingContextGroup* aBrowsingContextGroup,
|
|
|
|
const nsACString& aKey)
|
|
|
|
: mKey(aKey),
|
|
|
|
mBrowsingContextGroup(aBrowsingContextGroup),
|
|
|
|
mAgentClusterId(nsContentUtils::GenerateUUID()) {
|
|
|
|
// This method does not add itself to
|
|
|
|
// mBrowsingContextGroup->mDocGroups as the caller does it for us.
|
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
2020-03-17 17:52:37 +03:00
|
|
|
if (StaticPrefs::dom_arena_allocator_enabled_AtStartup()) {
|
|
|
|
mArena = new mozilla::dom::DOMArena();
|
|
|
|
}
|
|
|
|
|
2019-05-10 02:12:12 +03:00
|
|
|
mPerformanceCounter =
|
|
|
|
new mozilla::PerformanceCounter(NS_LITERAL_CSTRING("DocGroup:") + aKey);
|
2016-10-07 00:23:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
DocGroup::~DocGroup() {
|
2020-04-07 18:17:47 +03:00
|
|
|
MOZ_RELEASE_ASSERT(mDocuments.IsEmpty());
|
|
|
|
MOZ_RELEASE_ASSERT(!mBrowsingContextGroup);
|
|
|
|
|
2017-04-05 07:04:00 +03:00
|
|
|
if (!NS_IsMainThread()) {
|
|
|
|
nsIEventTarget* target = EventTargetFor(TaskCategory::Other);
|
2017-06-14 04:27:17 +03:00
|
|
|
NS_ProxyRelease("DocGroup::mReactionsStack", target,
|
|
|
|
mReactionsStack.forget());
|
2017-04-05 07:04:00 +03:00
|
|
|
}
|
|
|
|
|
2019-06-11 23:43:40 +03:00
|
|
|
if (mIframePostMessageQueue) {
|
|
|
|
FlushIframePostMessageQueue();
|
|
|
|
}
|
2016-10-07 00:23:08 +03:00
|
|
|
}
|
|
|
|
|
2018-03-20 22:07:41 +03:00
|
|
|
RefPtr<PerformanceInfoPromise> DocGroup::ReportPerformanceInfo() {
|
|
|
|
AssertIsOnMainThread();
|
2018-04-24 23:03:06 +03:00
|
|
|
MOZ_ASSERT(mPerformanceCounter);
|
2018-03-20 22:07:41 +03:00
|
|
|
#if defined(XP_WIN)
|
|
|
|
uint32_t pid = GetCurrentProcessId();
|
|
|
|
#else
|
|
|
|
uint32_t pid = getpid();
|
|
|
|
#endif
|
2018-07-13 12:57:59 +03:00
|
|
|
uint64_t windowID = 0;
|
2018-03-20 22:07:41 +03:00
|
|
|
uint16_t count = 0;
|
|
|
|
uint64_t duration = 0;
|
2018-07-10 10:58:48 +03:00
|
|
|
bool isTopLevel = false;
|
|
|
|
nsCString host;
|
2018-11-20 01:51:12 +03:00
|
|
|
nsCOMPtr<nsPIDOMWindowOuter> top;
|
|
|
|
RefPtr<AbstractThread> mainThread;
|
2018-03-20 22:07:41 +03:00
|
|
|
|
2018-07-10 10:58:48 +03:00
|
|
|
// iterating on documents until we find the top window
|
2018-03-20 22:07:41 +03:00
|
|
|
for (const auto& document : *this) {
|
2019-01-02 16:05:23 +03:00
|
|
|
nsCOMPtr<Document> doc = document;
|
2018-03-20 22:07:41 +03:00
|
|
|
MOZ_ASSERT(doc);
|
2018-07-13 12:57:59 +03:00
|
|
|
nsCOMPtr<nsIURI> docURI = doc->GetDocumentURI();
|
|
|
|
if (!docURI) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
docURI->GetHost(host);
|
|
|
|
// If the host is empty, using the url
|
|
|
|
if (host.IsEmpty()) {
|
|
|
|
host = docURI->GetSpecOrDefault();
|
|
|
|
}
|
2018-07-10 10:58:48 +03:00
|
|
|
// looking for the top level document URI
|
2018-07-13 12:57:59 +03:00
|
|
|
nsPIDOMWindowOuter* win = doc->GetWindow();
|
2018-07-10 10:58:48 +03:00
|
|
|
if (!win) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-07-26 19:48:31 +03:00
|
|
|
top = win->GetInProcessTop();
|
2018-07-10 10:58:48 +03:00
|
|
|
if (!top) {
|
|
|
|
continue;
|
|
|
|
}
|
2018-07-13 12:57:59 +03:00
|
|
|
windowID = top->WindowID();
|
2019-04-11 17:14:15 +03:00
|
|
|
isTopLevel = win->IsTopLevelWindow();
|
2018-11-20 01:51:12 +03:00
|
|
|
mainThread = AbstractMainThreadFor(TaskCategory::Performance);
|
2018-07-10 10:58:48 +03:00
|
|
|
break;
|
2018-03-20 22:07:41 +03:00
|
|
|
}
|
|
|
|
|
2018-07-13 12:57:59 +03:00
|
|
|
MOZ_ASSERT(!host.IsEmpty());
|
2018-03-20 22:07:41 +03:00
|
|
|
duration = mPerformanceCounter->GetExecutionDuration();
|
|
|
|
FallibleTArray<CategoryDispatch> items;
|
|
|
|
|
|
|
|
// now that we have the host and window ids, let's look at the perf counters
|
|
|
|
for (uint32_t index = 0; index < (uint32_t)TaskCategory::Count; index++) {
|
|
|
|
TaskCategory category = static_cast<TaskCategory>(index);
|
|
|
|
count = mPerformanceCounter->GetDispatchCount(DispatchCategory(category));
|
|
|
|
CategoryDispatch item = CategoryDispatch(index, count);
|
|
|
|
if (!items.AppendElement(item, fallible)) {
|
|
|
|
NS_ERROR("Could not complete the operation");
|
2018-07-27 12:44:22 +03:00
|
|
|
break;
|
2018-03-20 22:07:41 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-20 01:51:12 +03:00
|
|
|
if (!isTopLevel) {
|
|
|
|
return PerformanceInfoPromise::CreateAndResolve(
|
|
|
|
PerformanceInfo(host, pid, windowID, duration,
|
|
|
|
mPerformanceCounter->GetID(), false, isTopLevel,
|
|
|
|
PerformanceMemoryInfo(), // Empty memory info
|
|
|
|
items),
|
|
|
|
__func__);
|
|
|
|
}
|
|
|
|
|
|
|
|
MOZ_ASSERT(mainThread);
|
|
|
|
RefPtr<DocGroup> self = this;
|
|
|
|
|
|
|
|
return CollectMemoryInfo(top, mainThread)
|
|
|
|
->Then(
|
|
|
|
mainThread, __func__,
|
|
|
|
[self, host, pid, windowID, duration, isTopLevel,
|
|
|
|
items](const PerformanceMemoryInfo& aMemoryInfo) {
|
|
|
|
PerformanceInfo info =
|
|
|
|
PerformanceInfo(host, pid, windowID, duration,
|
|
|
|
self->mPerformanceCounter->GetID(), false,
|
|
|
|
isTopLevel, aMemoryInfo, items);
|
2019-04-06 00:41:42 +03:00
|
|
|
|
2018-11-20 01:51:12 +03:00
|
|
|
return PerformanceInfoPromise::CreateAndResolve(std::move(info),
|
|
|
|
__func__);
|
|
|
|
},
|
|
|
|
[self](const nsresult rv) {
|
|
|
|
return PerformanceInfoPromise::CreateAndReject(rv, __func__);
|
|
|
|
});
|
2018-03-20 22:07:41 +03:00
|
|
|
}
|
|
|
|
|
2017-07-26 11:13:35 +03:00
|
|
|
nsresult DocGroup::Dispatch(TaskCategory aCategory,
|
2016-10-29 01:25:08 +03:00
|
|
|
already_AddRefed<nsIRunnable>&& aRunnable) {
|
2018-04-24 23:03:06 +03:00
|
|
|
if (mPerformanceCounter) {
|
|
|
|
mPerformanceCounter->IncrementDispatchCounter(DispatchCategory(aCategory));
|
|
|
|
}
|
2020-04-07 18:17:47 +03:00
|
|
|
return SchedulerGroup::DispatchWithDocGroup(aCategory, std::move(aRunnable),
|
|
|
|
this);
|
2016-11-23 08:14:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
nsISerialEventTarget* DocGroup::EventTargetFor(TaskCategory aCategory) const {
|
2020-04-07 18:17:47 +03:00
|
|
|
MOZ_ASSERT(!mDocuments.IsEmpty());
|
|
|
|
// Here we have the same event target for every TaskCategory. The
|
|
|
|
// reason for that is that currently TaskCategory isn't used, and
|
|
|
|
// it's unsure if it ever will be (See Bug 1624819).
|
2020-04-16 17:14:43 +03:00
|
|
|
if (mEventTarget) {
|
|
|
|
return mEventTarget;
|
|
|
|
}
|
|
|
|
|
|
|
|
return GetMainThreadSerialEventTarget();
|
2016-10-29 01:25:08 +03:00
|
|
|
}
|
|
|
|
|
2017-04-04 02:28:58 +03:00
|
|
|
AbstractThread* DocGroup::AbstractMainThreadFor(TaskCategory aCategory) {
|
2016-12-01 13:33:05 +03:00
|
|
|
MOZ_RELEASE_ASSERT(NS_IsMainThread());
|
2020-04-07 18:17:47 +03:00
|
|
|
MOZ_ASSERT(!mDocuments.IsEmpty());
|
2020-04-16 17:14:43 +03:00
|
|
|
|
|
|
|
if (!mEventTarget) {
|
|
|
|
return AbstractThread::MainThread();
|
|
|
|
}
|
|
|
|
|
2020-04-07 18:17:47 +03:00
|
|
|
// Here we have the same thread for every TaskCategory. The reason
|
|
|
|
// for that is that currently TaskCategory isn't used, and it's
|
|
|
|
// unsure if it ever will be (See Bug 1624819).
|
|
|
|
if (!mAbstractThread) {
|
|
|
|
mAbstractThread = AbstractThread::CreateEventTargetWrapper(
|
|
|
|
mEventTarget,
|
|
|
|
/* aRequireTailDispatch = */ true);
|
|
|
|
}
|
2016-12-01 13:33:05 +03:00
|
|
|
|
2020-04-07 18:17:47 +03:00
|
|
|
return mAbstractThread;
|
|
|
|
}
|
2017-02-02 00:38:33 +03:00
|
|
|
|
2018-05-07 20:09:19 +03:00
|
|
|
void DocGroup::SignalSlotChange(HTMLSlotElement& aSlot) {
|
|
|
|
MOZ_ASSERT(!mSignalSlotList.Contains(&aSlot));
|
|
|
|
mSignalSlotList.AppendElement(&aSlot);
|
2017-12-19 18:14:55 +03:00
|
|
|
|
|
|
|
if (!sPendingDocGroups) {
|
|
|
|
// Queue a mutation observer compound microtask.
|
|
|
|
nsDOMMutationObserver::QueueMutationObserverMicroTask();
|
|
|
|
sPendingDocGroups = new AutoTArray<RefPtr<DocGroup>, 2>;
|
|
|
|
}
|
|
|
|
|
|
|
|
sPendingDocGroups->AppendElement(this);
|
|
|
|
}
|
|
|
|
|
2019-06-11 23:43:40 +03:00
|
|
|
bool DocGroup::TryToLoadIframesInBackground() {
|
2019-07-06 11:18:28 +03:00
|
|
|
return StaticPrefs::dom_separate_event_queue_for_post_message_enabled() &&
|
|
|
|
StaticPrefs::dom_cross_origin_iframes_loaded_in_background();
|
2019-06-11 23:43:40 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
nsresult DocGroup::QueueIframePostMessages(
|
2019-07-06 11:18:28 +03:00
|
|
|
already_AddRefed<nsIRunnable>&& aRunnable, uint64_t aWindowId) {
|
2019-06-11 23:43:40 +03:00
|
|
|
if (DocGroup::TryToLoadIframesInBackground()) {
|
|
|
|
if (!mIframePostMessageQueue) {
|
|
|
|
nsCOMPtr<nsISerialEventTarget> target = GetMainThreadSerialEventTarget();
|
|
|
|
mIframePostMessageQueue = ThrottledEventQueue::Create(
|
|
|
|
target, "Background Loading Iframe PostMessage Queue",
|
|
|
|
nsIRunnablePriority::PRIORITY_DEFERRED_TIMERS);
|
|
|
|
nsresult rv = mIframePostMessageQueue->SetIsPaused(true);
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(rv);
|
|
|
|
}
|
|
|
|
|
2020-04-07 18:17:47 +03:00
|
|
|
// Ensure the queue is disabled. Unlike the postMessageEvent queue
|
|
|
|
// in BrowsingContextGroup, this postMessage queue should always
|
|
|
|
// be paused, because if we leave it open, the postMessage may get
|
|
|
|
// dispatched to an unloaded iframe
|
2019-06-11 23:43:40 +03:00
|
|
|
MOZ_ASSERT(mIframePostMessageQueue);
|
|
|
|
MOZ_ASSERT(mIframePostMessageQueue->IsPaused());
|
|
|
|
|
|
|
|
mIframesUsedPostMessageQueue.PutEntry(aWindowId);
|
|
|
|
|
2019-07-06 11:18:28 +03:00
|
|
|
mIframePostMessageQueue->Dispatch(std::move(aRunnable), NS_DISPATCH_NORMAL);
|
2019-06-11 23:43:40 +03:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
void DocGroup::TryFlushIframePostMessages(uint64_t aWindowId) {
|
|
|
|
if (DocGroup::TryToLoadIframesInBackground()) {
|
|
|
|
mIframesUsedPostMessageQueue.RemoveEntry(aWindowId);
|
2019-07-06 11:18:28 +03:00
|
|
|
if (mIframePostMessageQueue && mIframesUsedPostMessageQueue.IsEmpty()) {
|
2019-06-11 23:43:40 +03:00
|
|
|
MOZ_ASSERT(mIframePostMessageQueue->IsPaused());
|
|
|
|
nsresult rv = mIframePostMessageQueue->SetIsPaused(true);
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(rv);
|
|
|
|
FlushIframePostMessageQueue();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void DocGroup::FlushIframePostMessageQueue() {
|
|
|
|
nsCOMPtr<nsIRunnable> event;
|
|
|
|
while ((event = mIframePostMessageQueue->GetEvent())) {
|
|
|
|
Dispatch(TaskCategory::Other, event.forget());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-07 20:09:19 +03:00
|
|
|
void DocGroup::MoveSignalSlotListTo(nsTArray<RefPtr<HTMLSlotElement>>& aDest) {
|
|
|
|
aDest.SetCapacity(aDest.Length() + mSignalSlotList.Length());
|
|
|
|
for (RefPtr<HTMLSlotElement>& slot : mSignalSlotList) {
|
|
|
|
slot->RemovedFromSignalSlotList();
|
2018-05-30 22:15:35 +03:00
|
|
|
aDest.AppendElement(std::move(slot));
|
2018-05-07 20:09:19 +03:00
|
|
|
}
|
|
|
|
mSignalSlotList.Clear();
|
|
|
|
}
|
|
|
|
|
2018-05-30 05:48:00 +03:00
|
|
|
bool DocGroup::IsActive() const {
|
2019-01-02 16:05:23 +03:00
|
|
|
for (Document* doc : mDocuments) {
|
2018-05-30 05:48:00 +03:00
|
|
|
if (doc->IsCurrentActiveDocument()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-10-07 00:23:08 +03:00
|
|
|
} // namespace dom
|
|
|
|
} // namespace mozilla
|