1. Introduction
This specification describes a content embedding API that satisfies some
critical use cases for IWAs that iframe
does not support. This embedding
environment should allow embedding all content without express permission from
the embedded site, including content which iframe
cannot embed, and provide
embedding sites more control over that embedded content.
Since this is a particularly powerful API, its use and availability makes an app a target of various types of hacking. As a result, this API is limited to use in Isolated Web Applications (IWAs) which have addtional safeguards in place to protect users and developers. IWAs are not a normal web application and can exist only at a special 'isolated-app:' scheme. This means by design that this API will not be available to normal web pages.
Note: This API is not intended to be a replacement or substitute for iframe
.
All iframe
use cases are still valid and should continue to use iframe
,
including IWAs where possible.
2. The Fenced Frame specification
For convenience, the Controlled Frame specification assumes that the Fenced Frame specification is in place. There are concepts introduced in the Fenced Frame specification, such as nested top-level traversables, that are broadly useful to refer to in the context of Controlled Frame.
The Fenced Frame specification achieves defining these concepts via monkey patching some specifications, such as HTML. We will also require monkey patching specifications for some parts of this Controlled Frame specification.
3. The controlledframe
element
- Categories:
- Flow content.
- Phrasing content.
- Embedded content.
- Interactive content.
- Palpable content.
- Phrasing content.
- Contexts in which this element can be used:
- Where embedded content is expected.
- Content model:
- Nothing.
- Content attributes:
- Global attributes
— Content source URL to embedsrc
— Partition name to hold data related to this contentpartition
- Accessibility considerations:
-
Screen readers should be able to traverse into the embedded content similar to how a reader can traverse into iframes and other related embedded content.
- DOM interface:
-
[
Exposed =Window ,IsolatedContext ]interface
:HTMLControlledFrameElement HTMLElement { [HTMLConstructor ]constructor (); [CEReactions ]attribute USVString
;src attribute DOMString
;partition readonly attribute WindowProxy ?
;contentWindow readonly attribute ContextMenus
;contextMenus readonly attribute WebRequest
; // Navigation methods.request Promise <undefined >back ();boolean canGoBack ();boolean canGoForward ();Promise <undefined >forward ();Promise <undefined >go (long
);relativeIndex undefined reload ();undefined stop (); // Scripting methods.Promise <undefined >addContentScripts (sequence <ContentScriptDetails >
);contentScriptList Promise <any >executeScript (optional InjectDetails
= {});details Promise <undefined >insertCSS (optional InjectDetails
= {});details Promise <undefined >removeContentScripts (sequence <DOMString >?
); // Configuration methods.scriptNameList Promise <undefined >clearData (optional ClearDataOptions
= {},options optional ClearDataTypeSet
= {});types Promise <boolean >getAudioState ();Promise <long >getZoom ();Promise <boolean >isAudioMuted ();undefined setAudioMuted (boolean
);mute Promise <undefined >setZoom (long
); // Capture methods.zoomFactor Promise <undefined >captureVisibleRegion (optional ImageDetails
= {});options undefined print (); // Events:attribute EventHandler
;onconsolemessage attribute EventHandler
;oncontentload attribute EventHandler
;ondialog attribute EventHandler
;onloadabort attribute EventHandler
;onloadcommit attribute EventHandler
;onloadstart attribute EventHandler
;onloadstop attribute EventHandler
;onnewwindow attribute EventHandler
;onpermissionrequest attribute EventHandler
;onsizechanged attribute EventHandler
; };onzoomchange
The controlledframe
element represents its embedded navigable.
Descendents of controlledframe
elements represent nothing.
The Controlled Frame element is exposed to any Document
with the
"controlled-frame
" policy-controlled feature whose environment settings object is an isolated context.
The IDL attributes src
and partition
must reflect the respective content
attributes of the same name.
Each controlledframe
has an embedded navigable,
which is either a traversable navigable with a non-null embedderParent,
or null. It is initially null.
Note: The embedded navigable appears as a top-level traversable with a null parent. Content within the embedded navigable cannot detect that it is embedded.
Each controlledframe
has a content script map,
which is a map whose keys are strings and whose values are content script configs.
controlledframe
element element is inserted into a document whose browsing context is non-null, run the following steps:
-
If element’s
src
is not empty, then:-
Initialize a controlledframe given element.
-
controlledframe
element element is removed from a document,
run the following steps:
-
TODO: destroy element’s embedded navigable.
controlledframe
element element, run the
following steps:
-
Assert that element’s embedded navigable is null.
-
Let group be a new browsing context group.
-
Let document be the second return value of creating a new browsing context and document given element’s node document, element, and group.
-
Let documentState be a new document state, whose document is document.
-
Let traversable be a new traversable navigable.
-
Initialize the navigable traversable given documentState.
-
Set traversable’s embedderParent to element.
-
Set element’s embedded navigable to traversable.
-
Let initialHistoryEntry be traversable’s active session history entry.
-
Set initialHistoryEntry’s step to 0.
-
Append initialHistoryEntry to traversable’s session history entries.
These steps are needed to initialize
History
.length
in the new navigable. This is an existing issue in the HTML Standard. -
Set element’s
contentWindow
to document’sWindowProxy
. -
Navigate a controlledframe given element and element’s
src
.
controlledframe
element element given a USVString
urlString, run the following steps:
-
If urlString is not an absolute-URL string, return.
-
Let url be the result of running the URL parser given urlString.
-
Let historyHandling be "
auto
". -
If element’s embedded navigable’s active document is not completely loaded, then set historyHandling to "
replace
". -
Navigate element’s embedded navigable to url using element’s node document, with a
NavigationHistoryBehavior
of historyHandling.
HTMLControlledFrameElement()
constructor steps are:
-
Set the eventName and webRequest fields of webRequest[
onBeforeRequest
] to"beforeRequest"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onBeforeSendHeaders
] to"beforeSendHeaders"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onSendHeaders
] to"sendHeaders"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onHeadersReceived
] to"headersReceived"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onAuthRequired
] to"authRequired"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onBeforeRedirect
] to"beforeRedirect"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onResponseStarted
] to"responseStarted"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onCompleted
] to"completed"
and webRequest respectively. -
Set the eventName and webRequest fields of webRequest[
onErrorOccurred
] to"errorOccurred"
and webRequest respectively.
3.1. Attributes
The partition
attribute takes an identifier
specifying where data related to the Controlled Frame’s instance should be
stored. The identifier is composed of a string of alphanumeric characters.
All data for the embedded navigable will be stored in a storage shelf keyed by this partition string along with the origin that created the data.
By default, all data stored will be held in an in-memory storage partition so
that when the last Controlled Frame element with a given partition
value is destroyed, the data is also
destroyed. While the data is held in this partition, no data from the
Controlled Frame’s embedded navigable will persist.
If the partition attribute identifier contains the prefix "persist:", the user agent will use a disk-based storage environment rather than an in-memory storage partition. Embedded content should not be able to detect whether its storage is in-memory or persistent.
If multiple Controlled Frames share the same partition identifier, all of their embedded navigable instances will share the same storage partition.
Note: The [STORAGE] specification is monkey patched below to partition
storage based on the value of the partition
attribute.
partition
IDL attribute setter steps are:
-
If this’s embedded navigable is not null, then:
-
Do not change the value of
partition
.
The src
attribute reflects the Controlled
Frame’s embedded navigable’s current session history entry’s URL.
src
IDL attribute setter steps are:
-
If this is not in a document tree, then return.
-
If this’s embedded navigable is null, then:
-
Initialize a controlledframe given this.
-
-
Otherwise:
-
Navigate a controlledframe given this and this’s
src
.
-
3.2. Navigation methods
back
()-
Goes back one step in the overall session history entries list for the traversable navigable in the Controlled Frame.
If there is no previous page, does nothing.
canGoBack
()-
Returns true if the current current session history entry is not the first one in the navigation history entry list. This means that there is a previous session history entry for this navigable.
forward
()-
Goes forward one step in the overall session history entries list for the traversable navigable in the Controlled Frame.
If there is no next page, does nothing.
go
()-
Reloads the current page.
go
(relativeIndex)-
Goes back or forward relativeIndex number of steps in the overall session history entries list for the current traversable navigable.
A zero relative index will reload the current page.
If the relative index is out of range, does nothing.
reload
()-
Reloads the current page.
stop
()-
Cancels the document load.
controlledframe
controlledframe and an integer stepDelta, run the
following steps:
-
Let resultPromise be a new promise.
-
Return resultPromise and run the remaining steps in parallel.
-
If controlledframe’s embedded navigable is null, then resolve resultPromise with false.
-
Let currentStep be controlledframe’s embedded navigable’s current session history step.
-
Let step be the sum of currentStep and stepDelta.
-
If step is negative, then resolve resultPromise with false.
-
If step is greater than or equal to the size of the controlledframe’s embedded navigable’s session history entries, then resolve resultPromise with false.
-
Let result be the result of applying the traverse history step given step, controlledframe’s embedded navigable, and a user navigation involvement of "browser UI".
-
If result is not equal to "
applied
", resolve resultPromise with false. -
Otherwise, resolve resultPromise with true.
canGoBack()
method steps are:
We can’t actually synchronously access the embedded navigable’s history state. In the future we should update this method to return a Promise.
-
If this’s embedded navigable is null, then return false.
-
If this’s embedded navigable’s current session history step is greater than 0, return true.
-
Return false.
canGoForward()
method steps are:
-
If this’s embedded navigable is null, then return false.
-
Let step be this’s embedded navigable’s current session history step.
-
Let steps be the result of getting all used history steps given this’s embedded navigable.
-
If step+1 is less than the size of steps, then return true.
-
Return false.
back()
method steps are:
-
Return the result of traversing an embedded navigable’s history given this and -1.
forward()
method steps
are:
-
Return the result of traversing an embedded navigable’s history given this and 1.
go(relativeIndex)
method steps are:
-
Return the result of traversing an embedded navigable’s history given this and relativeIndex.
reload()
steps are:
-
If this’s embedded navigable is null, return.
-
Reload this’s embedded navigable given a user navigation involvement of "browser UI".
stop()
steps are:
-
If this’s embedded navigable is null, return.
3.3. Scripting methods
// One of |code| or |file| must be specified but not both.dictionary {
InjectDetails DOMString ;
code DOMString ; };
file dictionary {
InjectionItems DOMString ;
code sequence <DOMString >; };
files enum {
RunAt ,
"document-start" ,
"document-end" , };
"document-idle" dictionary {
ContentScriptDetails required DOMString ;
name InjectionItems ;
js InjectionItems ;
css required sequence <DOMString >;
matches sequence <DOMString >;
excludeMatches boolean ;
allFrames boolean ;
matchAboutBlank RunAt ; };
runAt
A content script config is a struct with the following items:
- pendingFetchCount
-
a
long
representing the number of pending script/style fetches. - js
-
a list of strings containing JavaScript that will be injected into a document.
- css
-
a list of strings containing CSS that will be injected into a document.
- matches
-
a list of strings containing patterns. Content will be injected into pages whose URL matches one of these patterns.
- excludeMatches
-
a list of strings containing patterns. Content will not be injected into pages whose URL matches one of these patterns.
- allFrames
-
a boolean indicating whether content should be injected into all frames in a page, or just the top-level frame.
- matchAboutBlank
-
a boolean indicating whether content should be injected into about:blank pages.
- runAt
-
a
RunAt
indicating when JavaScript content should be executed in a document’s lifecycle.
controlledframe
controlledframe, a DOMString
urlString, a boolean isCss, a long
index, and an algorithm completionSteps, run the following steps:
-
If urlString is not an valid URL string, then:
-
Run completionSteps given 0 and false.
-
Return.
-
-
Let request be a new request with the following fields:
- URL
-
The result of running the URL parser given urlString and controlledframe’s node document’s document base URL
- method
-
"
GET
" - destination
-
"
style
" if isCss is true, "script
" otherwise - client
-
controlledframe’s node document’s relevant settings object
- mode
-
"
cors
"
-
Fetch request, with processResponseConsumeBody set to the following steps given a response response and a null, failure, or byte sequence contents:
-
If response’s status is not 200, or contents is null or failure, then run completionSteps given 0 and false.
-
Otherwise, run completionSteps given index and contents.
-
ContentScriptDetails
given a controlledframe
controlledframe and a ContentScriptDetails
details, run the following steps:
-
Let result be a new promise.
-
If details["
js
"] and details["css
"] are both defined, or both undefined, then reject result with aTypeError
and abort these steps. -
If details["
matches
"] is empty, then reject result with aTypeError
and abort these steps. -
Return result and run the remaining steps in parallel.
-
Let config be a new content script config with the following values:
- pendingFetchCount
-
0
- matches
-
details["
matches
"] - excludeMatches
-
details["
excludeMatches
"] if defined, otherwise an empty list - allFrames
-
details["
allFrames
"] if defined, otherwise false - matchAboutBlank
-
details["
matchAboutBlank
"] if defined, otherwise false - runAt
-
details["
runAt
"] if defined, otherwisedocument-idle
-
Let isCss be a boolean equal to true if details["
css
"] is defined, false otherwise. -
Let completionSteps be the following algorithm, which takes a
long
index and a string or boolean source:-
If source is not a string, then reject result with a
TypeError
and abort these steps. -
If isCss, then:
-
Set config’s css[index] to source.
-
-
Otherwise:
-
Set config’s js[index] to source.
-
-
Decrement config’s pendingFetchCount.
-
If config’s pendingFetchCount is greater than 0, then return.
-
Set controlledframe’s content script map[details[
name
]] to config. -
Resolve result.
-
-
Let injectionItems be details["
css
"] if isCss is true, details["js
"] otherwise. -
If injectionItems["
code
"] and injectionItems["files
"] are both defined, or both undefined, reject result with aTypeError
and abort these steps. -
If injectionItems["
code
"] is defined, then:-
Run completionSteps given 0 and injectionItems ["
code
"].
-
-
Otherwise:
-
If injectionItems["
files
"] is empty, then reject result with aTypeError
and abort these steps. -
For each urlString of injectionItems ["
files
"]:-
Run fetch an injection item given controlledframe, urlString, isCss, config’s pendingFetchCount, and completionSteps.
-
Increment config’s pendingFetchCount.
-
-
-
If isTopLevel is false, and config’s allFrames is false, then return false.
-
If the result of serializing url with exclude fragment equal to true is equal to "about:blank", and config’s matchAboutBlank is false, then return false.
-
Let urlString be the result of serializing url.
-
Let match be false.
-
For each pattern of config’s matches:
-
If urlString matches a URL pattern pattern, then set match to true.
-
-
For each pattern of config’s excludeMatches:
-
If urlString matches a URL pattern pattern, then set match to false.
-
-
Return match.
Document
document, and a RunAt
currentPhase, run the following steps:
-
Let embeddedNavigable be document’s node navigable’s traversable navigable.
-
If embeddedNavigable is null or its embedderParent is null, then return.
-
Let controlledframe be embeddedNavigable’s embedderParent.
-
Let url be document’s URL.
-
Let isTopLevel be true if document’s node navigable’s parent is null, false otherwise.
-
For each config of controlledframe’s content script map:
-
If the result of determining whether a content script config applies to a document given config, url, and isTopLevel equals false, then continue.
-
If currentPhase is equal to
document-start
and config’s css is not empty, then:-
For each styleSource of config’s css:
-
Run inject a stylesheet into a document given document and styleSource.
-
-
-
Otherwise, if currentPhase equals config’s runAt, then:
-
For each scriptSource of config’s js:
-
Run inject a script into a document given document and scriptSource.
-
-
-
Document
document and a string styleSource, run the following steps:
-
Let styleSheet be a new CSS style sheet object.
-
Synchronously replace the rules of a CSSStyleSheet given styleSheet and styleSource.
-
Add a CSS style sheet given document and styleSheet.
The following algorithm executes script in a Document’s environment, but that isn’t the desired behavior. The goal, which cannot be specced with the current HTML specification infrastructure, is for this algorithm to execute script in an environment that is isolated from the Document’s environment with a different global object, but with shared access to the DOM. This execution environment is called an Isolated World in Blink, which uses it to execute content scripts in extensions. See this diagram for additional details about their execution model. Gecko uses a similar approach called Xray vision. This algorithm should eventually describe a speccable implementation of this isolation that can be implemented by all browsers.
Document
document and a string scriptSource, run the following steps:
-
Let script be the result of creating a classic script given scriptSource, document’s relevant settings object, document’s URL, and the default script fetch options.
-
Return the result of running a classic script given script.
addContentScripts(contentScriptList)
method steps are:
removeContentScripts(scriptNameList)
method steps are:
-
Let result be a new promise.
-
Return result and run the remaining steps in parallel.
-
If scriptNameList is undefined, then:
-
Otherwise, for each name of scriptNameList:
-
Remove this’s content script map[name].
-
-
Resolve result.
executeScript(optional details)
method steps are:
-
Let result be a new promise.
-
Return result and run the remaining steps in parallel.
-
If this’s embedded navigable is null, reject result with a
TypeError
and abort these steps. -
If details["
code
"] and details"[file
"] are either both defined or both undefined, reject result with aTypeError
and abort these steps. -
Let executionSteps be the following algorithm that takes a
long
and a string or boolean scriptString:-
If scriptString is not a string, then reject result with a
TypeError
and abort these steps. -
Let document be this’s embedded navigable’s active document.
-
Let status be the result of injecting a script into a document given document and scriptString.
-
If status is a normal completion, then:
-
Resolve result with status.
[[Value]]
.
-
-
Otherwise:
-
Reject result with status.
[[Value]]
.
-
-
-
If details["
code
"] is defined, then run executionSteps given 0 and details["code
"]. -
Otherwise, fetch an injection item given this, details["
file
"], false, 0, and executionSteps.
insertCSS(optional details)
method steps are:
-
Let result be a new promise.
-
Return promise and run the remaining steps in parallel.
-
If this’s embedded navigable is null, reject promise with a
TypeError
and abort these steps. -
If details["
code
"] and details["file
"] are either both defined or both undefined, reject result with aTypeError
and abort these steps. -
Let executionSteps be the following algorithm that takes a
long
and a string or boolean styleString:-
If styleString is not a string, then reject result with a
TypeError
and abort these steps. -
Let document be this’s embedded navigable’s active document.
-
Inject a stylesheet into a document given document and styleString.
-
Resolve promise.
-
-
If details["
code
"] is defined, then run executionSteps given 0 and details["code
"]. -
Otherwise, fetch an injection item given this, details["
file
"], false, 0, and executionSteps.
3.4. Configuration methods
dictionary {
ClearDataOptions long ; };
since dictionary {
ClearDataTypeSet boolean ;
appcache boolean ;
cache boolean ;
cookies boolean ;
fileSystems boolean ;
indexedDB boolean ;
localStorage boolean ;
persistentCookies boolean ;
sessionCookies boolean ; };
webSQL
clearData(optional options, optional types)
method steps are:
-
Let resultPromise be a new promise.
-
Return resultPromise and run the remaining steps in parallel.
-
Let clearSince be 0. This will represent to clear all items.
-
If options["since"] is set:
-
Let clearSince be options["since"].
-
-
If types["appcache"] is set:
-
Clear the partition’s appcache items with a matching clearSince.
-
-
If types["cache"] is set:
-
Clear the partition’s cache items with a matching clearSince.
-
-
If types["cookies"] is set:
-
Clear the partition’s cookie items with a matching clearSince.
-
-
If types["fileSystems"] is set:
-
Clear the partition’s fileSystem items with a matching clearSince.
-
-
If types["indexedDB"] is set:
-
Clear the partition’s indexedDB items with a matching clearSince.
-
-
If types["localStorage"] is set:
-
Clear the partition’s localStorage items with a matching clearSince.
-
-
If types["persistentCookies"] is set:
-
Clear the partition’s persistentCookies items with a matching clearSince.
-
-
If types["sessionCookies"] is set:
-
Clear the partition’s sessionCookies items with a matching clearSince.
-
-
If types["webSQL"] is set:
-
Clear the partition’s webSQL items with a matching clearSince.
-
-
Then, resolve resultPromise.
getAudioState()
method steps are:
-
Let resultPromise be a new promise.
-
Return resultPromise and run the remaining steps in parallel.
-
If this’s embedded navigable is null, then reject resultPromise with a
TypeError
and abort these steps. -
Let muteState be the current audio mute state of embedded content.
-
Then, resolve resultPromise with muteState.
getZoom()
method steps are:
-
Let resultPromise be a new promise.
-
Return resultPromise and run the remaining steps in parallel.
-
If this’s embedded navigable is null, then reject resultPromise with a
TypeError
and abort these steps. -
Let zoomFactor be the current zoom setting for the embedded content.
-
Then, resolve resultPromise with zoomFactor.
isAudioMuted()
method steps are:
-
Let resultPromise be a new promise.
-
Return resultPromise and run the remaining steps in parallel.
-
If this’s embedded navigable is null, then reject resultPromise with a
TypeError
and abort these steps. -
Let muteState be the current audio mute state for embedded content.
-
Then, resolve resultPromise with muteState.
setAudioMuted(mute)
method steps are:
-
If this’s embedded navigable is null, then throw a
TypeError
. -
Change the audio mute state for embedded content to match mute state.
setZoom(zoomFactor)
method steps are:
-
Let resultPromise be a new promise.
-
Return resultPromise and run the remaining steps in parallel.
-
If this’s embedded navigable is null, then reject resultPromise with a
TypeError
and abort these steps. -
Change the zoom for the embedded content to be zoomFactor.
-
Then, resolve resultPromise.
3.5. Capture methods
// One of |code| or |file| must be specified but not both.dictionary {
ImageDetails DOMString ;
format DOMString ; };
quality
captureVisibleRegion(optional options)
method steps are:
-
Let resultPromise be a new promise.
-
Return resultPromise and run the remaining steps in parallel.
-
If this’s embedded navigable is null, then reject resultPromise with a
TypeError
and abort these steps. -
Let optionsFormat be "JPEG" by default.
-
Let optionsQuality be 100 by default.
-
If options has field "format":
-
Let optionsFormat be options["format"].
-
-
If optionsFormat is an unrecognized format, reject resultPromise with a
TypeError
and abort these steps. -
If options has field "quality":
-
Let optionsQuality be options["quality"].
-
-
If optionsQuality is not an integer and is not between 0 and 100 inclusive, reject resultPromise with a
TypeError
and abort these steps. -
Create an image in format
optionsFormat
at qualityoptionsQuality
showing the visible region of embedded content. -
Then, resolve resultPromise containing the image data.
print()
method steps are:
-
If this’s embedded navigable is null, then throw a
TypeError
. -
Initiate the browser print page feature for embedded content.
3.6. Events
HTMLControlledFrameElement
implements EventTarget
and supports the following event handlers (and their corresponding event handler event types).
Event handlers | Event handler event types |
---|---|
onconsolemessage
| consolemessage |
oncontentload
| contentload |
ondialog
| dialog |
onloadabort
| loadabort |
onloadcommit
| loadcommit |
onloadstart
| loadstart |
onloadstop
| loadstop |
onnewwindow
| newwindow |
onpermissionrequest
| permissionrequest |
onsizechanged
| sizechanged |
onzoomchange
| zoomchange |
The interactive events:
The UI-change events:
The navigation events:
3.6.1. consolemessage
[Exposed =Window ,IsolatedContext ]interface {
ConsoleMessage readonly attribute long ;
level readonly attribute DOMString ; }; [
message Exposed =Window ,IsolatedContext ]interface :
ConsoleMessageEvent Event {(
constructor DOMString ,
type optional ConsoleMessageEventInit = {});
eventInitDict readonly attribute ConsoleMessage ; };
consoleMessage dictionary :
ConsoleMessageEventInit EventInit {ConsoleMessage ?; };
consoleMessage
To fire a ConsoleMessageEvent
e given controlledframe
element target and the Printer(logLevel, args[, options]) method arguments.
-
Let consoleMessage be a new ConsoleMessage object.
-
Set the following fields of consoleMessage:
level
-
logLevel.
message
-
The result of implementation-defined formatting to args.
-
Set e’s
consoleMessage
to consoleMessage. -
Dispatch e at target.
TODO: monkey patch console Printer.
3.6.2. dialog
[Exposed =Window ,IsolatedContext ]interface {
DialogController undefined (
okay optional DOMString );
response undefined (); }; [
cancel Exposed =Window ,IsolatedContext ]interface {
DialogMessage readonly attribute DOMString ;
messageType readonly attribute DOMString ;
messageText readonly attribute DialogController ; }; [
dialogController Exposed =Window ,IsolatedContext ]interface :
DialogEvent Event {(
constructor DOMString ,
type optional DialogEventInit = {});
eventInitDict readonly attribute DialogMessage ; };
dialogMessage dictionary :
DialogEventInit EventInit {DialogMessage ?; };
dialogMessage
To fire a DialogEvent
e given controlledframe
element target, simple-dialogs type dialogType, and message message.
-
Let dialogMessage be a new DialogMessage object.
-
Set the following fields of dialogMessage:
messageType
-
dialogType, one of "alert", "confirm", or "prompt".
messageText
-
message.
-
Set e’s
dialogMessage
to dialogMessage. -
Dispatch e at target.
TODO: monkey patch simple-dialogs.
3.6.3. newwindow
[Exposed =Window ,IsolatedContext ]interface {
NewWindowController undefined (
attach HTMLControlledFrameElement );
controlledFrame undefined (); }; [
discard Exposed =Window ,IsolatedContext ]interface {
NewWindow readonly attribute NewWindowController ;
window readonly attribute USVString ;
targetUrl readonly attribute DOMString ;
initialWidth readonly attribute DOMString ;
initialHeight readonly attribute DOMString ;
name readonly attribute DOMString ; }; [
windowOpenDisposition Exposed =Window ,IsolatedContext ]interface :
NewWindowEvent Event {(
constructor DOMString ,
type optional NewWindowEventInit = {});
eventInitDict readonly attribute NewWindow ; };
newWindow dictionary :
NewWindowEventInit EventInit {NewWindow ?; };
newWindow
TODO:.
3.6.4. permissionrequest
[Exposed =Window ,IsolatedContext ]interface {
PermissionRequestControllerBase undefined ();
allow undefined (); }; [
cancel Exposed =Window ,IsolatedContext ]interface {
PermissionRequest readonly attribute DOMString ;
permission readonly attribute PermissionRequestControllerBase ; }; [
request Exposed =Window ,IsolatedContext ]interface :
PermissionRequestEvent Event {(
constructor DOMString ,
type optional PermissionRequestEventInit = {});
eventInitDict readonly attribute PermissionRequest ; };
permissionRequest dictionary :
PermissionRequestEventInit EventInit {PermissionRequest ?; };
permissionRequest
TODO: Different child interfaces of PermissionRequestControllerBase for different permissions
3.6.5. sizechanged
[Exposed =Window ,IsolatedContext ]interface {
SizeChange readonly attribute long ;
oldWidth readonly attribute long ;
oldHeight readonly attribute long ;
newWidth readonly attribute long ; }; [
newHeight Exposed =Window ,IsolatedContext ]interface :
SizeChangedEvent Event {(
constructor DOMString ,
type optional SizeChangedEventInit = {});
eventInitDict readonly attribute SizeChange ; };
sizeChange dictionary :
SizeChangedEventInit EventInit {SizeChange ?; };
sizeChange
TODO:
3.6.6. zoomchange
[Exposed =Window ,IsolatedContext ]interface {
ZoomChange readonly attribute float ;
oldZoomFactor readonly attribute float ; }; [
newZoomFactor Exposed =Window ,IsolatedContext ]interface :
ZoomChangeEvent Event {(
constructor DOMString ,
type optional ZoomChangeEventInit = {});
eventInitDict readonly attribute ZoomChange ; };
zoomChange dictionary :
ZoomChangeEventInit EventInit {ZoomChange ?; };
zoomChange
TODO:
3.6.7. contentload
[Exposed =Window ,IsolatedContext ]interface :
ContentLoadEvent Event {(
constructor DOMString ,
type optional ContentLoadEventInit = {}); };
eventInitDict dictionary :
ContentLoadEventInit EventInit { };
TODO:
3.6.8. loadabort
[Exposed =Window ,IsolatedContext ]interface {
LoadInfo readonly attribute USVString ;
url readonly attribute boolean ; }; [
isTopLevel Exposed =Window ,IsolatedContext ]interface :
LoadAbortInfo LoadInfo {readonly attribute long ;
code readonly attribute DOMString ; }; [
reason Exposed =Window ,IsolatedContext ]interface :
LoadAbortEvent Event {(
constructor DOMString ,
type optional LoadAbortEventInit = {});
eventInitDict readonly attribute LoadAbortInfo ; };
loadAbortInfo dictionary :
LoadAbortEventInit EventInit {LoadAbortInfo ?; };
loadAbortInfo
TODO:
3.6.9. loadcommit
[Exposed =Window ,IsolatedContext ]interface :
LoadCommitEvent Event {(
constructor DOMString ,
type optional LoadCommitEventInit = {});
eventInitDict readonly attribute LoadInfo ; };
loadInfo dictionary :
LoadCommitEventInit EventInit {LoadInfo ?; };
loadInfo
TODO:
3.6.10. loadstart
[Exposed =Window ,IsolatedContext ]interface :
LoadStartEvent Event {(
constructor DOMString ,
type optional LoadStartEventInit = {});
eventInitDict readonly attribute LoadInfo ; };
loadInfo dictionary :
LoadStartEventInit EventInit {LoadInfo ?; };
loadInfo
TODO:
3.6.11. loadstop
[Exposed =Window ,IsolatedContext ]interface :
LoadStopEvent Event {(
constructor DOMString ,
type optional LoadStopEventInit = {}); };
eventInitDict dictionary :
LoadStopEventInit EventInit { };
TODO:
3.7. Integration with other specifications
This specification will make some modifications to specifications to accommodate the needs of Controlled Frame.
3.7.1. Monkey Patches
3.7.1.1. [HTML]
Each navigable has:
-
A frameId integer, initially 0.
-
A next frameId integer, initially 1.
-
An embedderParent, an
HTMLControlledFrameElement
or null.
The initialize the navigable algorithm given a navigable navigable and an optional navigable-or-null parent (default null) is monkey patched as follows:
-
Set navigable’s parent to parent.
-
If parent is not null (navigable is not a top-level traversable), then:
- Let topLevelTraversable be the top-level traversable that navigable is a descendant of.
- Set navigable’s frameId to topLevelTraversable’s next frameId.
- Increment topLevelTraversable’s next frameId.
TODO: Monkeypatch in calls to the inject content scripts into a document algorithm.
3.7.1.2. [FETCH]
The determine the network partition key algorithm is monkey extended to require double-keying on network requests originating from a Controlled Frame’s embedded navigable.
-
Let topLevelSite be the result of obtaining a site, given topLevelOrigin.
-
Let secondKey be null or an implementation-defined value.
- Let embedderParent be the result of getting an environment’s embedderParent given environment.
-
If embedderParent is not null, then set secondKey to embedderParent’s
partition
. -
Return (topLevelSite, secondKey).
3.7.1.3. [STORAGE]
The obtain a storage key for non-storage purposes algorithm is extended to
require double-keying on all storage belonging to a controlledframe
’s embedded navigable.
-
Let origin be environment’s origin if environment is an environment settings object; otherwise environment’s creation URL’s origin.
- Let embedderParent be the result of getting an environment’s embedderParent given environment.
-
If embedderParent is not null, then return a tuple consisting
of embedderParent’s
partition
and origin. -
Return a tuple consisting of origin.
-
If environment is an environment settings object whose global object is a
Window
object, then:This algorithm doesn’t work for Shared or Service Workers because embedderParent is only defined on a navigable, and it’s not always possible to go from a non-
Window
environment to a navigable.-
Let navigable be environment’s global object’s navigable.
-
Let top be the top-level traversable of navigable.
-
If top’s embedderParent is not null, then return top’s embedderParent.
-
-
Return null.
4. Web Request API
This API is based on the WebRequest API, which is available through the <webview> element in Chrome Apps. It is exposed to Controlled Frame with minimum modification to make efficient use of prior art. As a result, this API does not fully adhere to Web Platform best practices, particularly around naming conventions and event handling. If there is future cross-browser interest in Controlled Frame, this API should be revisited to align better with other Web APIs.
enum {
ResourceType ,
"main_frame" ,
"sub_frame" ,
"stylesheet" ,
"script" ,
"image" ,
"font" ,
"object" ,
"xmlhttprequest" ,
"ping" ,
"csp_report" ,
"media" ,
"websocket" ,
"webbundle" , };
"other" callback interface {
WebRequestEventListener BlockingResponse ?(
handleEvent WebRequestEventDetails ); };
details dictionary {
RequestFilter sequence <ResourceType >;
types sequence <USVString >; };
urls enum {
ExtraInfoSpec ,
"asyncBlocking" ,
"blocking" ,
"extraHeaders" ,
"requestHeaders" , }; [
"responseHeaders" Exposed =Window ,IsolatedContext ]interface {
WebRequestEvent undefined addListener (WebRequestEventListener ,
listener optional RequestFilter = {},
filter optional sequence <ExtraInfoSpec >);
extraInfoSpec boolean hasListener (WebRequestEventListener );
listener boolean hasListeners ();undefined removeListener (WebRequestEventListener ); };
listener dictionary {
WebRequestAuthCredentials required DOMString ;
username required DOMString ; };
password dictionary {
BlockingResponse WebRequestAuthCredentials ;
authCredentials boolean ;
cancel USVString ;
redirectUrl sequence <HttpHeader >;
requestHeaders sequence <HttpHeader >; };
responseHeaders enum {
DocumentLifecycle ,
"prerender" ,
"active" ,
"cached" , };
"pending_deletion" enum {
FrameType ,
"outermost_frame" ,
"fenced_frame" , };
"sub_frame" dictionary {
WebRequestEventDetails DOMString ;
documentId DocumentLifecycle ;
documentLifecycle required long ;
frameId FrameType ;
frameType USVString ;
initiator required DOMString ;
method DOMString ;
parentDocumentId required long ;
parentFrameId required DOMString ;
requestId required long ;
timeStamp required ResourceType ;
type required USVString ; };
url dictionary {
UploadData ArrayBuffer ;
bytes DOMString ; };
file dictionary {
RequestBody DOMString ;
error any ;
formData sequence <UploadData >; };
raw dictionary :
WebRequestBeforeRequestDetails WebRequestEventDetails {RequestBody ; };
requestBody dictionary {
HttpHeader required DOMString ;
name DOMString ;
value sequence <byte >; };
binaryValue dictionary :
WebRequestBeforeSendHeadersDetails WebRequestEventDetails {sequence <HttpHeader >; };
requestHeaders dictionary :
WebRequestSendHeadersDetails WebRequestEventDetails {sequence <HttpHeader >; };
requestHeaders dictionary :
WebRequestResponseEventDetails WebRequestEventDetails {required long ;
statusCode required DOMString ;
statusLine sequence <HttpHeader >; };
responseHeaders dictionary :
WebRequestHeadersReceivedDetails WebRequestResponseEventDetails {};dictionary {
AuthChallenger DOMString ;
host long ; };
port dictionary :
WebRequestAuthRequiredDetails WebRequestResponseEventDetails {required AuthChallenger ;
challenger required boolean ;
isProxy required DOMString ;
scheme DOMString ; };
realm dictionary :
WebRequestResponseWithIpEventDetails WebRequestResponseEventDetails {required boolean ;
fromCache DOMString ; };
ip dictionary :
WebRequestBeforeRedirectDetails WebRequestResponseWithIpEventDetails {required USVString ; };
redirectUrl dictionary :
WebRequestResponseStartedDetails WebRequestResponseWithIpEventDetails {};dictionary :
WebRequestCompletedDetails WebRequestResponseWithIpEventDetails {};dictionary :
WebRequestErrorOccurredDetails WebRequestEventDetails {required DOMString ;
error required boolean ;
fromCache DOMString ; };
ip callback =
HandlerBehaviorChangedCallback undefined (); [Exposed =Window ,IsolatedContext ]interface {
WebRequest readonly attribute WebRequestEvent ;
onBeforeRequest readonly attribute WebRequestEvent ;
onBeforeSendHeaders readonly attribute WebRequestEvent ;
onSendHeaders readonly attribute WebRequestEvent ;
onHeadersReceived readonly attribute WebRequestEvent ;
onAuthRequired readonly attribute WebRequestEvent ;
onBeforeRedirect readonly attribute WebRequestEvent ;
onResponseStarted readonly attribute WebRequestEvent ;
onCompleted readonly attribute WebRequestEvent ;
onErrorOccurred undefined handlerBehaviorChanged (optional HandlerBehaviorChangedCallback ); };
callback
Each WebRequest
has a handler map, which is a map whose keys are strings and whose values are lists of WebRequest handler configs.
Each WebRequestEvent
has:
-
An eventName, a string.
-
A webRequest, a
WebRequest
instance that it is a member of.
addListener(listener, filter, extraInfoSpec)
method steps are:
-
Call
removeListener
with listener. -
Let handlerConfig be a new WebRequest handler config with the following items:
-
Let specSet be a set containing the items in extraInfoSpec.
-
If eventName equals "beforeRequest", then:
-
If specSet is not a subset of the set « "blocking", "requestBody", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "blocking", then set handlerConfig’s blocking to true.
-
If specSet contains "requestBody", then set handlerConfig’s requestsBody to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "beforeSendHeaders", then:
-
If specSet is not a subset of the set « "blocking", "requestHeaders", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "blocking", then set handlerConfig’s blocking to true.
-
If specSet contains "requestHeaders", then set handlerConfig’s requestsHeaders to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "sendHeaders", then:
-
If specSet is not a subset of the set « "requestHeaders", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "requestHeaders", then set handlerConfig’s requestsHeaders to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "headersReceived", then:
-
If specSet is not a subset of the set « "blocking", "responseHeaders", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "blocking", then set handlerConfig’s blocking to true.
-
If specSet contains "responseHeaders", then set handlerConfig’s requestsHeaders to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "authRequired", then:
-
If specSet is not a subset of the set « "asyncBlocking", "blocking", "responseHeaders", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "asyncBlocking", then set handlerConfig asyncBlocking to true.
-
If specSet contains "blocking", then set handlerConfig’s blocking to true.
-
If specSet contains "responseHeaders", then set handlerConfig’s requestsHeaders to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "beforeRedirect", then:
-
If specSet is not a subset of the set « "responseHeaders", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "responseHeaders", then set handlerConfig’s requestsHeaders to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "responseStarted", then:
-
If specSet is not a subset of the set « "responseHeaders", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "responseHeaders", then set handlerConfig’s requestsHeaders to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "completed", then:
-
If specSet is not a subset of the set « "responseHeaders", "extraHeaders" », then throw a
TypeError
. -
If specSet contains "responseHeaders", then set handlerConfig’s requestsHeaders to true.
-
If specSet contains "extraHeaders", then set handlerConfig’s requestsAllHeaders to true.
-
-
Otherwise, if eventName equals "errorOccurred", then:
-
Let handlerMap be the handler map of this’s webRequest.
-
Append handlerConfig to handlerMap[eventName].
hasListener(listener)
method steps are:
-
Let handlerMap be the handler map of this’s webRequest.
-
For each handlerConfig in handlerMap[event name]:
-
If handlerConfig’s handler equals listener, return true.
-
-
Return false.
hasListeners()
method steps are:
-
Let handlerMap be the handler map of this’s webRequest.
-
If handlerMap[event name] is empty, return false, otherwise return true.
removeListener(listener)
method steps are:
-
Let handlerMap be the handler map of this’s webRequest.
-
Let handlerConfigs be handlerMap[event name].
-
Remove all items from handlerConfigs whose handler equals listener.
handlerBehaviorChanged(callback)
method steps are:
-
In parallel, clear the HTTP cache associated with the partition used by environments embedded within this HTMLControlledFrameElement.
Note: The behavior of event handlers registered through the WebRequest API will be reflected in the HTTP cache, which will no longer be valid if the behavior of the event handlers changed. The purpose of this method is to invalidate any cache entries that were affected by WebRequest event handlers.
-
Invoke callback when the HTTP cache has been cleared.
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "beforeRequest", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestEventDetails object given request.
-
If request’s body is not null, then:
-
Let requestBody be a new
RequestBody
. -
Let body be request’s body.
TODO: serialize stream if present.
-
Switch on body’s source:
- byte sequence
-
Append a new
UploadData
withbytes
equal to the serialized body’s source to requestBody’sraw
. Blob
-
Append a new
UploadData
withbytes
equal to the serialized body’s source to requestBody’sraw
. FormData
-
-
Let formData be a new
object
. -
For each entry in body’s source’s entry list:
-
Switch on entry[1]:
-
-
Set details’s
formData
to formData.
-
-
Set details’s
requestBody
to requestBody.
-
-
If handler’s blocking flag is true, then:
-
Call handler[handler] given details in parallel.
-
Return null.
-
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "beforeSendHeaders", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestEventDetails object given request.
-
If handler’s requestsHeaders is true, then set details’s
requestHeaders
to the result of calling convert a header list to an HttpHeader sequence given request’s header list, handler’s requestsAllHeaders, and isRequest equal to true. -
If handler’s blocking flag is true, then:
-
Call handler[handler] given details in parallel.
-
Return null.
-
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "sendHeaders", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestEventDetails object given request.
-
If handler’s requestsHeaders is true, then set details’s
requestHeaders
to the result of calling convert a header list to an HttpHeader sequence given request’s header list, handler’s requestsAllHeaders, and isRequest equal to true. -
Call handler[handler] given details in parallel.
-
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "headersReceived", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestResponseEventDetails object given request and response.
-
If handler’s requestsHeaders is true, then set details’s
responseHeaders
to the result of calling convert a header list to an HttpHeader sequence given response’s header list, handler’s requestsAllHeaders, and isRequest equal to false. -
If handler’s blocking flag is true, then:
-
Call handler[handler] given details in parallel.
-
Return null.
-
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "authRequired", and request.
-
Let challenger be an
AuthChallenger
withhost
andport
equal to the host and port of response’s URL. -
If response’s status is 401, then:
-
Otherwise:
-
If scheme is null, then return.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestResponseEventDetails object given request and response.
-
If handler’s requestsHeaders is true, then set details’s
responseHeaders
to the result of calling convert a header list to an HttpHeader sequence given response’s header list, handler’s requestsAllHeaders, and isRequest equal to false.-
Set details
challenger
,isProxy
,scheme
, andrealm
fields equal to challenger, isProxy, scheme, and realm respectively.
-
-
If handler’s blocking flag is true, then:
-
Let result be the result of calling handler[handler] given details.
-
Return the result of calling process an authRequired response given result.
-
-
Otherwise, if handler’s asyncBlocking flat is true, then:
-
Let result be null.
-
Let callback be a function that takes a
BlockingResponse
blockingResponse argument and when executed calls process an authRequired response with blockingResponse and sets result equal to its return value. -
Let result be the result of calling handler[handler] given details and callback.
-
Pause these steps until callback has been invoked.
-
Return result.
-
-
Call handler[handler] given details in parallel.
-
Return null.
-
BlockingResponse
blockingResponse, run the following steps:
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "beforeRedirect", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestResponseWithIpEventDetails object given request and response.
-
If handler’s requestsHeaders is true, then set details’s
responseHeaders
to the result of calling convert a header list to an HttpHeader sequence given response’s header list, handler’s requestsAllHeaders, and isRequest equal to false. -
Let internalResponse be response, if response is not a filtered response; otherwise response’s internal response.
-
Set details’s
redirectUrl
to internalResponse’s location URL given request’s current URL’s fragment. -
Call handler[handler] given details in parallel.
-
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "responseStarted", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestResponseWithIpEventDetails object given request and response.
-
If handler’s requestsHeaders is true, then set details’s
responseHeaders
to the result of calling convert a header list to an HttpHeader sequence given response’s header list, handler’s requestsAllHeaders, and isRequest equal to false. -
Call handler[handler] given details in parallel.
-
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "completed", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestResponseWithIpEventDetails object given request and response.
-
If handler’s requestsHeaders is true, then set details’s
responseHeaders
to the result of calling convert a header list to an HttpHeader sequence given response’s header list, handler’s requestsAllHeaders, and isRequest equal to false. -
Call handler[handler] given details in parallel.
-
-
Let handlers be the result of calling lookup registered WebRequest handler configs given "errorOccurred", and request.
-
For each handler in handlers:
-
Let details be the result of calling create a WebRequestResponseWithIpEventDetails object given request and response.
-
If handler’s requestsHeaders is true, then set details’s
responseHeaders
to the result of calling convert a header list to an HttpHeader sequence given response’s header list, handler’s requestsAllHeaders, and isRequest equal to false. -
Set handler’s
error
field to an implementation-defined error message describing the error in response. -
Call handler[handler] given details in parallel.
-
WebRequestEventDetails
object given a request request, run the following steps:
-
Let environmentSettingsObject be request’s client.
-
Let crossOriginIsolatedCapability be environmentSettingsObject’s cross-origin isolated capability, or false if environmentSettingsObject is null.
-
Let details be a new
WebRequestEventDetails
with the following fields:timeStamp
-
The coarsened shared current time given crossOriginIsolatedCapability.
url
-
The last element of request’s URL list.
method
-
request’s method.
initiator
-
The serialization of an origin given request’s origin.
Note: An opaque origin will result in
initiator
being set to the string "null". type
-
The result of calling get a request’s ResourceType given request.
requestId
-
request’s requestId.
frameId
-
-1
parentFrameId
-
-1
-
If environmentSettingsObject’s global object is a
Window
object, then:-
Let window be environmentSettingsObject’s global object.
-
Update the following fields of details:
documentId
-
environmentSettingsObject’s id.
documentLifecycle
-
It’s unclear if
DocumentLifecycle
values map to existing concepts. frameId
frameType
-
"fenced_frame"
if window’sfence
is non-null,"outermost_frame"
if window’stop
equals window,"sub_frame"
otherwise.
-
If window’s
parent
is not equal to window, then update the following values of details:parentDocumentId
-
The id of window’s
parent
’s active document’s relevant global object. parentFrameId
-
-
Return details.
WebRequestResponseEventDetails
object given a request request, a response response, a boolean requestsHeaders, and a boolean requestsAllHeaders,
run the following steps:
-
Let details be the result of creating a WebRequestEventDetails object given request.
-
Update the following fields in details:
statusCode
-
response’s status.
statusLine
-
response’s status message.
-
If requestsHeaders is true, then set details’s
responseHeaders
to the result of calling convert a header list to an HttpHeader sequence given response’s header list, requestsAllHeaders, and isRequest equal to false. -
Return details.
WebRequestResponseWithIpEventDetails
object given a request request, a response response,
a boolean requestsHeaders, and a boolean requestsAllHeaders,
run the following steps:
-
Let details be the result of creating a WebRequestResponseEventDetails object given request, response, requestsHeaders, and requestsAllHeaders.
-
If response’s cache state is "local", then set details’s
fromCache
to true. -
Set details’s
ip
to the ip address from which response was received if the request involved a network request.The [FETCH] spec currently doesn’t specify storing the remote IP address used when sending request.
-
Return details.
HttpHeader
sequence given
a header list fetchHeaders, a boolean requestsAllHeaders, and
a boolean isRequest, run the following steps:
-
Let headers be a an empty list of
HttpHeader
objects. -
For each fetchHeader in fetchHeaders:
-
If each of the following conditions are true, then continue:
-
isRequest is true
-
requestsAllHeaders is false
-
fetchHeader[0] is not a CORS-safelisted request-header
-
-
If each of the following conditions are true, then continue:
-
isRequest is false
-
requestsAllHeaders is false
-
fetchHeader[0] is not a CORS-safelisted response-header name
-
-
Let header be a new
HttpHeader
. -
Set header["
name
"] to the isomorphic decoding of fetchHeader[0]. -
Let value be the isomorphic decoding of fetchHeader[1] .
-
If value is a scalar value string, then set header ["
value
"] to value. -
Otherwise, set header["
binaryValue
"] to fetchHeader[1]. -
Append header to headers.
-
-
Return headers.
HttpHeader
sequence to a header list given
a HttpHeader
headers, run the following steps:
-
Let headerList be a an empty header list.
-
For each header in headers:
-
If any of the following conditions are true, throw a
TypeError
: -
Let value be header["value"] if it exists, or the isomorphic decoding of header["binaryValue"] otherwise.
-
Append a new tuple with values « header["name"], value » to headerList.
-
-
Return headerList.
ResourceType
given a request request, run the following steps:
-
Return request’s initiator type.
TODO: initiator type doesn’t exactly map to
ResourceType
. Define this mapping.
- status
-
301
- header list
-
« ("Location", redirectUrl) »
4.1. WebRequest handler config
A WebRequest handler config is a struct with the following items:
- handler
- filter
- requestsBody
-
a boolean
- requestsHeaders
-
a boolean
- requestsAllHeaders
-
a boolean
- blocking
-
a boolean
- asyncBlocking
-
a boolean
-
url url pattern TODO: Spec this, ideally referring to a not-yet-defined Match pattern spec.
-
Let client be request’s client.
-
If client is null, return an empty list.
-
If client’s corresponding global object is not a
Window
, return an empty list. -
Let navigable be the navigable that client’s global object is within.
-
If navigable’s embedderParent is null, return an empty list.
-
Let controlledFrame be the
HTMLControlledFrameElement
corresponding to navigable’s embedderParent. -
Let valid handlers be an empty list.
-
Let handlerMap be controlledFrame’s
request
’s handler map. -
For each handlerConfig in handlerMap[event name]:
-
Let filter be handlerConfig’s filter
-
Let types be filter[
types
]. -
If types is not empty and types does not contain the result of calling get a request’s ResourceType given request, then continue.
-
Let urls be filter[
urls
]. -
Let is valid url be true if urls is empty, false otherwise.
-
For each url pattern in urls:
-
If request’s URL matches a URL pattern given url pattern, set is valid url to true.
-
-
Append handlerConfig to valid handlers.
-
-
Return valid handlers.
4.2. Monkey Patches
4.2.1. Fetch
A request has an associated requestId, which is an opaque string, randomly assigned at the request’s creation.
The main fetch algorithm is monkey patched as follows:
-
Let request be fetchParams’s request.
-
Let response be null.
- Let webRequestResult be the result of calling process beforeRequest events given request.
-
If webRequestResult is not null, then:
-
If webRequestResult["
cancel
"] is true, then set response to a network error. -
Otherwise, if webRequestResult ["
redirectUrl
"] is not an empty string, then set response to the result of creating a redirect response given webRequestResult["redirectUrl
"].
-
If webRequestResult["
The fetch response handover algorithm is monkey patched as follows:
- If response is not a network error, then call process responseStarted events given fetchParams’s request and response.
-
Let timingInfo be fetchParams’s timing info.
⋮
-
If fetchParams’s process response consume body is non-null, then:
…
- If response is not a network error, then call process completed events given fetchParams’s request and response.
- Otherwise, call process errorOccurred events given fetchParams’s request and response.
The HTTP-network-or-cache fetch algorithm is monkey patched as follows:
-
Let the revalidatingFlag be unset.
- Set webRequestResult to the result of calling process beforeSendHeaders events given request.
-
If webRequestResult is not null, then:
-
If webRequestResult["
cancel
"] is true, then set response to a network error. -
Otherwise, if webRequestResult ["
requestHeaders
"] is a non-empty list, then set request’s header list to the result of converting an HttpHeader sequence to a header list given webRequestResult ["requestHeaders
"].
-
If webRequestResult["
-
If response is not null,
run these steps, but abort when fetchParams is canceled:
⋮
-
If aborted, then return the appropriate network error for fetchParams.
-
If response is null, then:
-
If httpRequest’s cache mode is "
only-if-cached
", then return a network error. - Call process sendHeaders events given request.
-
Let forwardResponse be the result of running HTTP-network fetch given httpFetchParams, includeCredentials, and isNewConnectionFetch.
- Let webRequestResult be the result of calling process headersReceived events given request and forwardResponse if forwardResponse is not a network error, null otherwise.
-
If webRequestResult is not null, then:
-
If webRequestResult["
cancel
"] is true, then set response to a network error. -
Otherwise, if webRequestResult ["
redirectUrl
"] is not an empty string, then set forwardResponse to the result of creating a redirect response given webRequestResult["redirectUrl
"]. -
Otherwise, if webRequestResult ["
responseHeaders
"] is a non-empty list, then set forwardResponse’s header list to the result of converting an HttpHeader sequence to a header list given webRequestResult ["responseHeaders
"].
-
If webRequestResult["
-
⋮
-
If response’s status is 401, httpRequest’s response tainting is not "cors", includeCredentials is true, and request’s window is an environment settings object, then:
⋮
-
If request’s use-URL-credentials flag is unset or isAuthenticationFetch is true, then:
-
If fetchParams is canceled, then return the appropriate network error for fetchParams.
-
Let username and password be null.
- Let webRequestResult be the result of calling process authRequired events given request and response.
-
If webRequestResult is not null, then:
-
If webRequestResult["
cancel
"] is true, then set response to a network error. -
Otherwise, if webRequestResult["
authCredentials
"] is anobject
, then:-
Set username to webRequestResult["
authCredentials
"]["username
"]. -
Set password to webRequestResult["
authCredentials
"]["password
"].
-
-
If webRequestResult["
- If username and password are null, then set them to the result of prompting the end user for a username and password, respectively, in request’s window.
-
-
-
If response’s status is 407, then:
- Let webRequestResult be the result of calling process authRequired events given request and response.
-
If webRequestResult is not null, then:
-
If webRequestResult["
cancel
"] is true, then set response to a network error. -
Otherwise, if webRequestResult["
authCredentials
"] is anobject
, then:-
Store webRequestResult["
authCredentials
"] as a proxy-authentication entry.
-
-
If webRequestResult["
- Otherwise, prompt the end user as appropriate ...
The HTTP-redirect fetch algorithm is monkey patched as follows:
- Call process beforeRedirect events given request and response.
-
Let request be fetchParams’s request.
5. Context Menus API
This API is based on the ContextMenus API, which is available through the <webview> element in Chrome Apps. It is exposed to Controlled Frame with minimum modification to make efficient use of prior art. As a result, this API does not fully adhere to Web Platform best practices, particularly around naming conventions and event handling. If there is future cross-browser interest in Controlled Frame, this API should be revisited to align better with other Web APIs.
enum {
ContextType ,
"all" ,
"page" ,
"frame" ,
"selection" ,
"link" ,
"editable" ,
"image" ,
"video" , };
"audio" enum {
ItemType ,
"normal" ,
"checkbox" ,
"radio" , };
"separator" dictionary {
OnClickData boolean ;
checked required boolean ;
editable long ;
frameId USVString ;
frameUrl USVString ;
linkUrl DOMString ;
mediaType required (DOMString or long );
menuItemId USVString ; (
pageUrl DOMString or long );
parentMenuId DOMString ;
selectionText USVString ;
srcUrl boolean ; };
wasChecked callback =
ContextMenusCallback undefined (optional OnClickData ); [
info Exposed =Window ,IsolatedContext ]interface {
ContextMenusEvent undefined addListener (ContextMenusCallback );
callback undefined removeListener (ContextMenusCallback );
callback boolean hasListener (ContextMenusCallback );
callback boolean hasListeners ();undefined dispatch (any ); }; [
data Exposed =Window ,IsolatedContext ]interface :
OnClickedEvent ContextMenusEvent {}; [Exposed =Window ,IsolatedContext ]interface :
OnShowEvent ContextMenusEvent {};dictionary {
ContextMenusProperties boolean ;
checked sequence <ContextType >;
context sequence <USVString >;
documentUrlPatterns boolean ; (
enabled DOMString or long );
parentId sequence <USVString >;
targetUrlPatterns DOMString ;
title ItemType ;
type ContextMenusCallback ; };
onclick dictionary :
ContextMenusCreateProperties ContextMenusProperties {required DOMString ; }; [
id Exposed =Window ,IsolatedContext ]interface {
ContextMenus attribute OnClickedEvent ;
onClicked attribute OnShowEvent ;
onShow Promise <undefined >create (ContextMenusCreateProperties );
properties Promise <undefined >remove (DOMString );
id Promise <undefined >removeAll ();Promise <undefined >update (DOMString ,
id optional ContextMenusProperties = {}); };
properties
Each controlledframe
has a contextMenus
member, which is a ContextMenus
that manages a context menu map whose keys are strings and whose values are ContextMenusProperties
.
Note: Each entry of the context menu map represents a context menu item. These items can show up when the user opens the context menu on the embedded document.
The create(properties)
method steps are:
-
Let p be a new promise.
-
Run the following steps in parallel:
-
Let contextMenusMap be this’s context menu map.
-
Let id be the properties["
menuItemId
"]. -
If contextMenusMap[id] exists, reject p with a
TypeError
and abort these steps. -
Set contextMenusMap[id] to properties.
-
Resolve p with undefined.
-
The remove(id)
method steps are:
-
Let p be a new promise.
-
Run the following steps in parallel:
-
Let contextMenusMap be this’s context menu map.
-
Remove contextMenusMap[id].
-
Resolve p with undefined.
-
The removeAll()
method steps are:
-
Let p be a new promise.
-
Run the following steps in parallel:
-
Let contextMenusMap be this’s context menu map.
-
Clear contextMenusMap.
-
Resolve p with undefined.
-
The update(id, properties)
method steps are:
-
Let p be a new promise.
-
Run the following steps in parallel:
The values of the context menu map, which are ContextMenusProperties
objects, control the conditions under which the context menu items are displayed, as well as the features and behaviors of the items.
This section is non-normative.
ContextMenusProperties
has the following fields:
context
-
A list of different
ContextType
, used to control the conditions under which the context menu item is displayed. documentUrlPatterns
-
A list of strings that are match patterns, used to control the conditions under which the context menu item is displayed.
targetUrlPatterns
-
A list of strings that are match patterns, used to control the conditions under which the context menu item is displayed.
parentId
-
The ID of the parent context menu item. The context menu item may appear under a sub-menu of the parent.
title
-
The title of the menu item.
type
-
The type of the menu item.
onclick
-
A
ContextMenusCallback
that is invoked when the context menu item is clicked. checked
-
Whether the context menu item is initially checked, if the
type
ischeckbox
. enabled
-
Whether the context menu item is enabled.
When a context menu is opened at HTMLElement
element inside the embedded document, to return a boolean value for whether the context menu item associated with a ContextMenusProperties
properties will be shown:
-
Let documentUrl be the URL of the document that element belongs to.
-
Let targetUrl be an empty string.
-
If element is an instance of
HTMLImageElement
, then set targetUrl to thesrc
attribute of element. -
If element is an instance of
HTMLVideoElement
, then set targetUrl to thesrc
attribute of element. -
If element is an instance of
HTMLAudioElement
, then set targetUrl to thesrc
attribute of element. -
If element is an instance of
HTMLAnchorElement
, then set targetUrl to the href attribute of element.
-
-
If properties["
context
"] is not empty:-
Let result be a boolean value that is initially false.
-
For each context in properties["
context
"]:-
If element matches context, set result to true and break;
There is no standardized specifications for matching a
HTMLElement
against aContextType
. -
-
If result is false, return false.
-
-
If properties["
documentUrlPatterns
"] is not empty:-
Let result be a boolean value that is initially false.
-
For each urlPattern in properties["
documentUrlPatterns
"]:-
If documentUrl matches a URL pattern, given urlPattern, set result to true and break;
-
-
If result is false, return false.
-
-
If properties["
targetUrlPatterns
"] is not empty:-
Let result be a boolean value that is initially false.
-
For each urlPattern in properties["
targetUrlPatterns
"]:-
If targetUrl matches a URL pattern, given urlPattern, set result to true and break;
-
-
If result is false, return false.
-
Note: Different user agents may implement additional conditions.
-
Return true.
ContextMenusEvent
represents a target to which an event can be dispatched when a context menu interaction has occured.
Each ContextMenusEvent
has an event listener list which is a list of ContextMenusCallbacks. It is initially an empty list.
The addListener(callback)
method steps are:
-
Let callbackList be the event listener list of the
ContextMenusEvent
. -
If callbackList[callback] exists, return.
-
Append callback to callbackList.
The removeListener(callback)
method steps are:
-
Let callbackList be the event listener list of the
ContextMenusEvent
. -
If callbackList[callback] exists, remove callback from callbackList.
The hasListener(callback)
method steps are:
-
Let callbackList be the event listener list of the
ContextMenusEvent
. -
If callbackList[callback] exists, return true.
-
Otherwise, return false.
The hasListeners()
method steps are:
-
Let callbackList be the event listener list of the
ContextMenusEvent
. -
If callbackList is empty, return false.
-
Otherwise, return true.
The dispatch(data)
method steps are:
-
Let callbackList be the event listener list of the
ContextMenusEvent
. -
For each callback in callbackList:
-
Invoke callback with data.
-
ContextMenus
has the attribute onShow
, which is a ContextMenusEvent
that is associated with contextmenu events.
To dispatched an onShow
event:
-
Invoke
onShow
’sdispatch(data)
with no argument.
ContextMenus
has the attribute onClicked
, which is a ContextMenusEvent
that is associated with click events on a context menu item.
To dispatch an onClicked
event, given element as the HTMLElement
inside the embedded document where the context menu is opened at, id as the key of the context menu map’s entry that is associated with the context menu item.
-
Let info be a new
OnClickData
.-
Update the following fields of info:
editable
-
Whether element is editable. what is "editable"?
frameId
-
The frameId of the navigable container from which the contextmenu event is dispatched.
frameUrl
-
The URL of the navigable container from which the contextmenu event is dispatched.
menuItemId
-
id.
pageUrl
-
The URL of the embedded navigable.
-
Update the following optional fields of info:
Note: Different user agents may set these fields differently.
checked
-
Whether the context menu item is checked.
linkUrl
-
If element is an instance of
HTMLAnchorElement
, element’s href attribute. mediaType
-
One of "image", "video", or "audio", if any, based on element.
parentMenuId
-
The ID of the parent, if a parent exists.
selectionText
-
The text for the context selection, if any.
srcUrl
-
The "src" attribute of element, if it exists.
wasChecked
-
The state of a checkbox or radio item before it was clicked.
-
-
Invoke
onShow
’sdispatch(data)
with info. -
Let properties be the result of getting the value of the entry in context menu map given the key id.
-
If the
onclick
field of properties is not null, invokeonclick
with info.
6. Usage Overview
Lorem ipsum. Insert basic info and example here.
7. Motivating Applications
This section is non-normative.
7.1. Latency-sensitive applications in virtualized sessions
In virtualized environments, users typically have a local thin client that renders a full virtual desktop. The actual desktop execution environment will be running on a remote virtualization server. If the user’s browser navigates to a latency-sensitive application (such as a video app), the rendered content will have additional latency ("lag") that makes the experience difficult or impossible for the user. This also applies for applications that record the user, such as video conferencing applications. In these latency-sensitive applications, the virtual desktop application can render the latency-sensitive content locally and overlay it on top of the rendered remote content to reduce this latency. This use case is also known as "browser content redirection."
7.2. Embedding third party web content without restriction
In a kiosk environment, applications must load content from third parties and
display that content on screens within their applications. A teacher may trigger
the navigation event, or it may be configured by an administrator such as a
shopping mall manager. The content may prohibit embedding by iframe
through
the use of X-Frame-Options and CSP. An controlled frame, however, should be able
to load all content, even content that prohibits embedding by iframe
.
7.3. Remote display and manipulation of web content
In a kiosk environment, applications must ensure that content continues to display on screens and may need to interrupt content with their own supplied behaviors. This behavior should work without local attendance by an administrator, and ideally can be managed remotely over the network. If content were to crash, for example, these applications should observe and respond to the crash by reloading the content in a fresh embedded view.
7.4. Clearing user content after each session
In some environments, someone only uses a single device for a brief time to complete their task, like ordering in a restaurant. When their task is complete, the embedder application should be able to clear all of the local user data associated with the task and then restart the embedded instance.
7.5. Monitor for idle sessions
While users interact with embedded content, the user may not explicitly end their session. This content may assume the user is present when they have actually finished or departed without completing the task. Embedder applications want to detect when users idle over their case’s threshold and begin a fresh session.
7.6. Arbitrarily blocking navigations
While displaying embedded web content that’s not authored by the embedder, pages may link to third party web content that’s disallowed. Allowing the embedder to edit elements in embedded content through arbitrary script injection into the web content can ensure navigation cannot occur to blocked pages. The embedder can also use the Controlled Frame API to capture navigation events and ensure that only pages to approved sites can be loaded within that controlled frame.
8. Security, Privacy, and Accessibility Considerations
This section is non-normative.
8.1. Security
Controlled Frame is based upon [Isolated-Web-Apps] (IWA) and integrates with core security specs
Since Controlled Frame is a particularly powerful API, using it or even having it available makes an app a target of various types of hacking. As a result, this API is limited to use in IWA which have additional safeguards in place to protect application developers and users. The Isolated Web App explainer has this to say:
"A user agent may also force an application to adopt this threat model if the developer needs access to APIs which would make the application an appealing target for XSS or server-side attacks."
Controlled Frame makes just such an appealing target, and to expose this with caution we’re opting into IWA to guard against certain attacks. Generally, IWAs provide strong security assurances that each of the resources in an application are secure both at rest and in-transit. You can read more about IWAs security and permissions in the IWA explainer and the IWAs [High-Watermark-Permissions] explainer.
Controlled Frame integrates with [Permissions-Policy] and [Permissions]. You can read more about Permissions Policy § 12. Privacy and Security and Permissions § E Security considerations (note the entry is currently sparse).
Attacking web sites could display content that doesn’t otherwise allow itself to be embedded and trick users on non-IWAs.
Planned mitigation:
-
Controlled Frame will only be available within IWAs
An IWA may embed another IWA (or itself) via Controlled Frame to manipulate our IWA policies somehow (e.g. an Controlled Frame embedded IWA may detect it’s being embedded due to the absence of the "controlled-frame" policy-controlled feature).
Planned mitigation:
-
Controlled Frame can only point to "https" schemes, excluding the "isolated-app" scheme used for IWAs
Controlled Frame could gain access to the powerful <controlledframe> element.
An IWA that’s not expected to use Controlled Frame may attempt to embed content.
Planned mitigation:
-
IWA APIs can never be delegated to cross-origin, so it will not be possible for any nested top-level navigable to access an IWA.
-
Secondly, only embedder applications and their same-origin IWA child navigables that have been granted the "controlled-frame" policy-controlled feature will have the Controlled Frame element available.
-
Same-origin child navigables without the "controlled-frame" policy-controlled feature will not be provided a Controlled Frame element. Their inner same-origin nested navigables will always not have it available.
An IWA may attempt to embed content from non-https schemes, such as 'http:' or 'isolated-app:'
Planned mitigation:
-
Controlled Frame will only work when the navigable’s "src" URL has an 'https:' scheme.
Malicious Controlled Frame could access the embedder’s running process (eg. Spectre attack)
Planned mitigation:
-
Controlled Frame will be executed in a separate process from the embedder’s process
Controlled Frame for a given "https origin" could interact or interfere with the user’s own storage data for that https origin
Planned mitigation:
-
We’re adding a Partition concept. Every Partition is a tuple of StorageKey and a separate object key.
-
Let there be a default partition with key=0 that stores "non-IWA" window and tab usage.
-
Controlled Frame will always store data in a certain StorageKey which is apart from the default partition.
-
Data written to by a given "https origin" while the user accesses that origin via an IWA Controlled Frame will be isolated from the default partition.
-
All usage will be separated between IWA and each partition will be fully isolated from each other and from default usage outside of IWA.
Malicious Controlled Frame could overwrite embedder’s stored data
-
The embedder and embedded storage user agent could overlap, and possibly multiple same-site IWA child navigables could be affected by activity in the Controlled Frame
-
if storage user agents were shared between the embedder and embedded sites, clearing data for either one could negatively impact the other
Planned mitigation:
-
IWA and Controlled Frame will always have separate storage user agents
-
A Controlled Frame should not have read or write access to other storage user agents besides its own
Malicious Controlled Frame may detect it is embedded and attempt to attack the embedder application
Planned mitigation:
-
The user agent will match the browser.
-
The Controlled Frame storage user agent will be separate from the IWA and the default storage user agents.
-
The Controlled Frame process will be separate from the IWA and the default renderer and browser processes.
-
The Controlled Frame environment will appear to be the top-most navigable:
-
window should match window.parent and window.top
-
List of policy-controlled features and their disable/enable status should match the default for a navigable
-
Ideas:
-
Investigate for potential interactions around filesystem, quota storage, and localStorage APIs
User may not be able to verify the origin of the page being viewed in the Controlled Frame
Ideas:
-
Expose the origin to the user somehow, such as adding UI at the top of a Controlled Frame that displays the origin?
-
Have the IWA specify in the manifest the origins that they expect to access?
Controlled Frame may exploit vulnerabilities in out-of-date browser engine
Already addressed with:
-
Existing browser engine auto-update mechanisms
8.2. Privacy
Controlled Frame integrates with Permissions Policy and Permissions. You can read more about Permissions Policy § 12. Privacy and Security. You can read more about Permissions § E Security considerations.
For Controlled Frame specifically, we’ve identified the following privacy considerations:
-
Users' browsing within Controlled Frame will be visible to the IWA
-
IWAs can access and exfiltrate the Controlled Frame’s session cookies (this only applies to the Controlled Frame’s session since they use a separate storage partition from the IWA and the third party origin when browsed in a tab)
-
User activity in Controlled Frame can be observed by the IWA (e.g. keyboard events can be monitored, password entry can be sniffed)
-
User file upload to Controlled Frame can be hijacked
-
User data held in the Controlled Frame’s remote server could be accessed by code implanted by the IWA
-
Users that wish to clear their session history must also do so via the IWA, which will then need to clear the associated storage user agents
-
This would be necessary since embedded storage user agents are separate from the non-embedded storage user agents for any given https origin
-
-
We plan to investigate browser UX to allow users to clear the Controlled Frame storage user agents, the following cases will be considered:
-
If a user wants to clear site data for an IWA, the associated embedded storage user agents will also be cleared
-
This is because if the IWA’s data is cleared, the app will no longer have any context for the associated embedded storage user agents and therefore will no longer be used or useful to the user or organization
-
As a result, we expect that clearing an IWA’s site data will require clearing all of the associated embedded storage user agents
-
-
A user may want to clear all site data for a given "https origin", even if that origin is stored within an IWA’s embedded storage user agent
-
We may choose to provide the ability to clear all IWA site data for that "https origin" even if that site data is held within an embedded storage user agent
-
If we chose to clear the "https origin" data, IWAs would need to prepare for the possibility that embedded storage user agents may be removed outside of their control, and this may be disruptive to the IWA and introduce complexity of implementation
-
Supporting this in the browser user agent exposes browser vendors, developers, and users to additional complexity, so we may choose not to support this approach and instead leave this up to IWA developers to implement
-
As a counter example to supporting clearing a single given "https origin"'s embedded storage user agent, consider that to our knowledge no operating system behaves that way
-
i.e. there’s no central "clear browsing data" option which clears storage for all installed browser engines, each application’s storage is treated as its own to manage
-
-
-
User wants to clear the site data for a given IWA’s Controlled Frame-embedded storage user agent for a given "https origin"
-
User wants to clear the site data for a given IWA’s Controlled Frame-embedded storage user agents for all "https origins"
-
-
An IWA will need the ability to clear the storage user agent’s Controlled Frame-embedded storage user agent for a given "https origin"
8.3. Accessibility
For Controlled Frame, we’ve identified the following accessibility considerations:
-
Browser user agents' accessibility tools and APIs should have visibility into Controlled Frame
-
IWAs should expect to provide their own accessibility tools for Controlled Frame content in order to properly integrate accessibility features for some use cases (such as "browser content redirection")
9. Acknowledgements
The following people contributed to the development of this document.