forked from mirrors/gecko-dev
This removes six separate warnings when building servo. One of the warnings was an unused mut, and the other were various dead code warnings <!-- Please describe your changes on the following line: --> --- <!-- Thank you for contributing to Servo! Please replace each `[ ]` by `[X]` when the step is complete, and replace `__` with appropriate data: --> - [X] `./mach build -d` does not report any errors - [X] `./mach test-tidy` does not report any errors - [X] These changes fix #16584 (github issue number if applicable). <!-- Either: --> - [ ] There are tests for these changes OR - [X] These changes do not require tests because they address warnings from the build process <!-- Also, please make sure that "Allow edits from maintainers" checkbox is checked, so that we can help you if you get stuck somewhere along the way.--> <!-- Pull requests that do not address these steps are welcome, but they will require additional verification as part of the review process. --> Source-Repo: https://github.com/servo/servo Source-Revision: f3c1bbe0700806ef2def3b0c5ce0dde4eba107ea --HG-- extra : subtree_source : https%3A//hg.mozilla.org/projects/converted-servo-linear extra : subtree_revision : 6f8c8212a51601e9dba5e8f8a345ba5ae89db147
87 lines
3.1 KiB
Rust
87 lines
3.1 KiB
Rust
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
use dom::bindings::codegen::Bindings::DissimilarOriginLocationBinding;
|
|
use dom::bindings::codegen::Bindings::DissimilarOriginLocationBinding::DissimilarOriginLocationMethods;
|
|
use dom::bindings::error::{Error, ErrorResult, Fallible};
|
|
use dom::bindings::js::{JS, Root};
|
|
use dom::bindings::reflector::Reflector;
|
|
use dom::bindings::reflector::reflect_dom_object;
|
|
use dom::bindings::str::DOMString;
|
|
use dom::bindings::str::USVString;
|
|
use dom::dissimilaroriginwindow::DissimilarOriginWindow;
|
|
use dom_struct::dom_struct;
|
|
use servo_url::MutableOrigin;
|
|
|
|
/// Represents a dissimilar-origin `Location` that exists in another script thread.
|
|
///
|
|
/// Since the `Location` is in a different script thread, we cannot access it
|
|
/// directly, but some of its accessors (for example setting `location.href`)
|
|
/// still need to function.
|
|
|
|
#[dom_struct]
|
|
pub struct DissimilarOriginLocation {
|
|
/// The reflector. Once we have XOWs, this will have a cross-origin
|
|
/// wrapper placed around it.
|
|
reflector: Reflector,
|
|
|
|
/// The window associated with this location.
|
|
window: JS<DissimilarOriginWindow>,
|
|
}
|
|
|
|
impl DissimilarOriginLocation {
|
|
#[allow(unrooted_must_root)]
|
|
fn new_inherited(window: &DissimilarOriginWindow) -> DissimilarOriginLocation {
|
|
DissimilarOriginLocation {
|
|
reflector: Reflector::new(),
|
|
window: JS::from_ref(window),
|
|
}
|
|
}
|
|
|
|
pub fn new(window: &DissimilarOriginWindow) -> Root<DissimilarOriginLocation> {
|
|
reflect_dom_object(box DissimilarOriginLocation::new_inherited(window),
|
|
window,
|
|
DissimilarOriginLocationBinding::Wrap)
|
|
}
|
|
|
|
#[allow(dead_code)]
|
|
pub fn origin(&self) -> &MutableOrigin {
|
|
self.window.origin()
|
|
}
|
|
}
|
|
|
|
impl DissimilarOriginLocationMethods for DissimilarOriginLocation {
|
|
// https://html.spec.whatwg.org/multipage/#dom-location-href
|
|
fn GetHref(&self) -> Fallible<USVString> {
|
|
Err(Error::Security)
|
|
}
|
|
|
|
// https://html.spec.whatwg.org/multipage/#dom-location-href
|
|
fn SetHref(&self, _: USVString) -> ErrorResult {
|
|
// TODO: setting href on a cross-origin window should succeed?
|
|
Err(Error::Security)
|
|
}
|
|
|
|
// https://html.spec.whatwg.org/multipage/#dom-location-assign
|
|
fn Assign(&self, _: USVString) -> Fallible<()> {
|
|
// TODO: setting href on a cross-origin window should succeed?
|
|
Err(Error::Security)
|
|
}
|
|
|
|
// https://html.spec.whatwg.org/multipage/#dom-location-replace
|
|
fn Replace(&self, _: USVString) -> Fallible<()> {
|
|
// TODO: replacing href on a cross-origin window should succeed?
|
|
Err(Error::Security)
|
|
}
|
|
|
|
// https://html.spec.whatwg.org/multipage/#dom-location-reload
|
|
fn Reload(&self) -> Fallible<()> {
|
|
Err(Error::Security)
|
|
}
|
|
|
|
// https://html.spec.whatwg.org/multipage/#dom-location-href
|
|
fn Stringifier(&self) -> Fallible<DOMString> {
|
|
Err(Error::Security)
|
|
}
|
|
}
|