CSC/ECE 517 Spring 2016 OSS M1606

From Expertiza_Wiki
Revision as of 05:25, 22 March 2016 by Mverma4 (talk | contribs) (CSC/ECE 517 Fall 2016/ OSS M1606)
Jump to navigation Jump to search

M1606: Implementing HTTP authorization UI and persistent sessions

Web pages make use of sessions all the time. These are required to persist throughout the life of the user's interaction with the web site or web application.

The above is supported by Servo as of today. However it doesn't support the persistence of data upon the closing and reopening of the web browser. With this project we aim to create the necessary infrastructure to support this.

Introduction

Servo

Servo is a web browser layout engine written in Rust and is currently being developed by Mozilla Research. The aim of the project is not to create a full browser but is rather to create a highly parallel environment that allows for many components be handled by fine-grained, isolated tasks. Servo is built on top of Rust to provide a secure and reliable foundation and is focused on creating a reliable and fast browser engine.

Rust

Rust is a multi-paradigm, compiled programming language that is a good language for creating highly safe systems. Rust and Servo have a symbiotic relationship as the development of servo has influenced the design of the language. Rust is a modern, fast, memory safe and multithreaded programming language that focuses on speed and safety for developing reliable and efficient systems. It eliminates all data races by having numerous compile-time safety checks that adds no runtime overhead.

Scope

The scope of the project is limited to the steps mentioned below:

1) Compile Servo and ensure that it runs on tests/html/about-mozilla.html.

2) Add a new command line flag --profile-dir [path] that stores an optional directory path in the Opts struct in opts.rs, creating the directory if it does not exist.

3) Create Rust FFI bindings for the tinyfiledialogs library to allow calling the C methods from Servo.

4) In resource_thread.rs, define an HTTP authorization cache storage (username, password, URL) and instantiate it like the cookie_storage member (inside an Arc<Rwlock<>> value, to enable sharing it between threads).

5) In modify_request_headers in http_loader.rs, implement the remaining pieces of step 12 of the appropriate specification using this new authorization cache.

Implementation