Граф коммитов

145 Коммитов

Автор SHA1 Сообщение Дата
Xidorn Quan b83b9e7406 Bug 991899 part 1 - Add unprefixed API for PointerLock. r=smaug
MozReview-Commit-ID: 3af2D9IWI1Q

--HG--
extra : source : 527777bea747fb8ab363960e41b0a1ddb26d7749
2016-07-28 17:15:21 +10:00
Xidorn Quan 31f5ebf083 Bug 1287706 part 1 - Make CallbackObjectHolder movable (and actually move-only). r=smaug
So that we can avoid unnecessary refcount changes.

MozReview-Commit-ID: 4Mk9SJTj6AS

--HG--
extra : source : c35643f76ef33b6cdce115c8de0dfae8abccd644
2016-07-28 12:00:06 +10:00
Iris Hsiao caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley 567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book 25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley 01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book 0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley 547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Jocelyn Liu 9420e6fa26 Bug 1276579: Add 'options' argument into |document.createElement[NS]()| methods and remove overloaded |createElement[NS]()| methods. r=smaug,wchen
MozReview-Commit-ID: FWd6g33SSiR

--HG--
extra : rebase_source : 1b62a987d66952ea420e10e8350399cd26b5511d
2016-06-06 18:43:39 +08:00
Cameron McCormack acd21d26c0 Bug 1285474: Decide style system backend type for documents earlier. r=bholley
MozReview-Commit-ID: 7A4t3957CWe
2016-07-12 00:33:57 -07:00
Emilio Cobos Álvarez 5990bbc7d5 Bug 1285474: stylo: Add nsINode method for knowing if the current document is using Servo's style back-end. r=bholley
MozReview-Commit-ID: 3sRE7BZj1tu
2016-07-12 00:33:57 -07:00
Xidorn Quan dc193d9f49 Bug 1283526 part 1 - Revert behavior of allowfullscreen attribute for non-sandboxed iframe. r=smaug
MozReview-Commit-ID: BayA4tQBsfC

--HG--
extra : rebase_source : 17818546cd0c1ec971412346d6e32d537442dd26
2016-07-04 10:19:35 +10:00
Thomas Wisniewski 30e61f3146 Bug 918773 - set responseXML.referrer to the empty string. r=jst
--HG--
extra : rebase_source : e537ea45eb0ce380059830d615c35f5ab76e37e3
2016-06-30 14:01:25 -04:00
Paul Roberts 6707fd2982 Bug 671389 - Export document sandbox flags to chrome JS. r=smaug
--HG--
extra : rebase_source : 91463b43748b72283644d25b56242c244cc2a6bf
2016-06-19 12:34:08 -07:00
Bob Owen 7c3321c672 Bug 1277475 Part 1: Add a chrome and XBL accessor for the sandboxed scripts flag to Document WEBIDL. r=bz
This also incldues changes to use the new function instead of getting and checking the sandbox flags in most places.

MozReview-Commit-ID: Cv0vJCdLH4D
2016-06-09 11:22:22 +01:00
Jonathan Watt 6be4402448 Bug 1273850 - Add lots of documentation to explain the scenarios that cause nsFrameLoader::Create to return null. r=smaug
MozReview-Commit-ID: 6UZyql1qHg0

--HG--
extra : rebase_source : 353bffea8919d02d3ba5f2f93c84a95fd0784caa
2016-05-17 14:18:22 +01:00
Xidorn Quan 51e715f73c Bug 1270648 part 4 - Make fullscreen enabled flag not be affected after document is loaded. r=smaug
MozReview-Commit-ID: L2dMAUr63qv

--HG--
extra : source : 363d7ac04cbf98fa67cad3214ac62330c2652fa8
2016-05-18 09:08:12 +10:00
Jonathan Watt bdfb04809e Bug 1270174 - Scope SVG ID references in content inserted via Document.insertAnonymousContent() to the inserted element. r=smaug 2016-05-09 18:33:19 +01:00
Xidorn Quan efc89967ed Bug 1269157 - Add Document.fullscreen attribute. r=smaug
MozReview-Commit-ID: 7mMjGoc7cvA

--HG--
extra : source : 0a5755272461d84a6a8082ca706d10b1ece84bc6
2016-05-12 10:28:56 +10:00
Cameron McCormack 2617364266 Bug 1268390 - Part 1: Factor out most of nsStyleSet::AddDocStyleSheet for re-use. r=bholley 2016-04-29 14:01:44 +10:00
Christoph Kerschbaumer 232720eac5 Bug 1263286 - Move base-uri CSP check into SetBaseURIUsingFirstBaseWithHref. r=bz 2016-04-26 11:48:29 +02:00
Ben Kelly e07a0186e8 Bug 1265795 P1 Uncontrolled service workers when global is removed from document. r=bz 2016-04-21 16:10:40 -07:00
Kartikaya Gupta 8f157afb9e Bug 1256727 - Don't allow paint-skipping on pages with scroll-linked effects. r=mstange
MozReview-Commit-ID: I05EXDWOt6b
2016-03-17 15:43:17 -04:00
Franziskus Kiefer bf87c6c564 Bug 1252829 - CSP Telemetry. r=ckerschb, p=bsmedberg
MozReview-Commit-ID: CiNAxh2ZrHB

--HG--
extra : transplant_source : %B8%00%E0%83%1B%29%BDI%DE%09%CDPN%AE%7B9Tk%8B%99
2016-03-02 13:00:09 +01:00
Christoph Kerschbaumer 39f2d53360 Bug 1122236 - CSP: Implement block-all-mixed-content (r=tanvi,kate,mrbkap) 2016-01-13 20:58:16 -08:00
Daniel Holbert e23c4f231b Bug 1247478: Rename FirstAdditionalAuthorSheet() to GetFirstAdditionalAuthorSheet(), since it can return null. r=heycam 2016-02-29 15:09:13 -08:00
Daniel Holbert 61ab7f2b20 Bug 1246464: Add 'const' to some stylesheet args in nsDocument methods. r=heycam 2016-02-29 13:24:25 -08:00
Franziskus Kiefer 56bdfe820a Bug 1244116 - Telemetry for mixed content requests by plugins. r=smaug, p=ally
MozReview-Commit-ID: F9rOb1SdPnL

--HG--
extra : rebase_source : 0b2aa83761880fb6e5a18c3a80ac86fe5ca16923
2016-02-16 15:46:36 +01:00
Cameron McCormack 0ecd5593cc Bug 1244074 - Part 4: Use StyleSheetHandle instead of concrete style sheet class in most places. r=dholbert 2016-02-24 18:01:12 +11:00
Cameron McCormack 7c95c39734 Bug 1244068 - Part 4: Use StyleSetHandle instead of concrete style set class in most places. r=dholbert 2016-02-24 18:01:11 +11:00
Xidorn Quan cf344838d0 Bug 1248505 - Remove nsDocument::IsFullScreenDoc and its uses. r=smaug
MozReview-Commit-ID: DfPI5U531ad

--HG--
extra : source : bcfb7b8155c7460b861ef3e11d92900ecb6c5029
2016-02-24 08:40:08 +08:00
Gijs Kruitbosch 8e0830e21c Bug 1220160 - part 1: add chromeonly getter for documenturi that returns the original document when on an error page, r=bz
MozReview-Commit-ID: KaOc0WBxcIS

--HG--
extra : rebase_source : 4e37d4244e39b012e8c1eab989bf1c5d2ceef994
2016-02-15 23:46:49 +00:00
Xidorn Quan 52ccd4a553 Bug 743198 part 4 - Rename LogFullScreenDenied to nsIDocument::DispatchFullscreenError, and reuse it in Element::RequestFullscreen. r=smaug
--HG--
extra : source : 3896197f9747aab588f6226efce4d67998619407
2016-02-17 08:47:11 +08:00
Xidorn Quan 61f1684757 Bug 743198 part 2 - Add unprefixed Fullscreen API to Document and Element. r=smaug
--HG--
extra : source : aaf4d12b511ba25ba93e6135cb849a3264435f7c
2016-02-17 08:47:11 +08:00
Xidorn Quan 49647faf41 Bug 743198 part 1 - Drop [Throws] of document.mozFullScreenElement. r=smaug
This method actually never throws. IsFullScreenDoc() simply checks
whether GetFullScreenElement() returns nullptr, which means if that
method returns true, the "!el" check would never fail.

--HG--
extra : source : f32a1aeb6835fd4b4c47ef3abe6b9d7366ae4f07
2016-02-17 08:47:11 +08:00
Kyle Huey 9d72cec3c2 Bug 1245950: Privately inherit from legacy interfaces nsIDOMWindow/nsIDOMWindowInternal. r=smaug
If you still need to get to these from C++ for some reason, you need to go through QueryInterface.

--HG--
extra : rebase_source : 3f0a71db0fb1dc48411aee19734446ea4f6e2e82
2016-02-05 10:12:25 -08:00
Birunthan Mohanathas d7371d07d0 Bug 1235261 - Part 1: Rename nsAutoTArray to AutoTArray. r=froydnj 2016-02-02 17:36:30 +02:00
Kyle Machulis 739327e165 Bug 1164427 - Implement elementsFromPoint; r=roc r=khuey 2016-02-01 14:33:51 -08:00
Phil Ringnalda d381b4bca6 Back out 7 changesets (bug 1235261) for cpptest failures in TestTArray
CLOSED TREE

Backed out changeset d66c3f19a210 (bug 1235261)
Backed out changeset 467d945426bb (bug 1235261)
Backed out changeset 32b61df13142 (bug 1235261)
Backed out changeset c50bb8ed4196 (bug 1235261)
Backed out changeset 0ff0fa6fe81f (bug 1235261)
Backed out changeset df70e89669da (bug 1235261)
Backed out changeset 064969357fc9 (bug 1235261)
2016-01-31 10:10:57 -08:00
Birunthan Mohanathas 373593275e Bug 1235261 - Part 1: Rename nsAutoTArray to AutoTArray. r=froydnj 2016-01-31 17:12:12 +02:00
Kyle Huey 91efc5a86c Bug 1241764: Replace nsPIDOMWindow with nsPIDOMWindowInner/Outer. r=mrbkap,smaug 2016-01-30 09:05:36 -08:00
Olli Pettay baf69da299 Bug 1153322 - Implement Document.scrollingElement, r=bz
--HG--
extra : rebase_source : 733ede0178b80b518e488bf9768e57498080f0b2
2016-01-27 02:44:05 +02:00
Christoph Kerschbaumer 071f422450 Bug 1233098 - Refactor CSP upgrade insecure requests flag within loadInfo (r=sicking) 2016-01-14 12:38:15 -08:00
Boris Zbarsky 071f157aa8 Bug 1238804. Make <base> actually work in a srcdoc document. r=smaug 2016-01-13 21:36:24 -05:00
Nigel Babu 7089beabc7 Backed out changeset f51b921e1ccf (bug 1233098) for browser-chrome bustage
--HG--
extra : commitid : ytS8fc4lFu
2016-01-14 08:04:37 +05:30
Christoph Kerschbaumer c42851930c Bug 1233098 - Refactor CSP upgrade insecure requests flag within loadInfo (r=sicking) 2016-01-13 15:51:43 -08:00
Hiroyuki Ikezoe df09492fe4 Bug 1212720 - Part 1: Implement Document.getAnimations(). r=heycam, r=smaug 2016-01-06 14:21:00 -05:00
Kearwood (Kip) Gilbert 0c83ce5c05 Bug 1182048 - Part 2: Implement e10s support for WebVR,r=vlad 2015-09-17 14:23:13 -07:00