Граф коммитов

166 Коммитов

Автор SHA1 Сообщение Дата
Andrea Marchesini 0d3521f59a Bug 1306241 - Use NeedsSubjectPrincipal in dom/html/* - part 1, r=ehsan 2016-10-03 10:34:14 +02:00
Cameron McCormack 75460a4e5e Bug 1293786 - Part 2: Move rootElement from the now-removed SVGDocument to Document. r=longsonr,smaug
MozReview-Commit-ID: 4y82o5MP6TU
2016-09-29 09:32:43 +08:00
Phil Ringnalda 40fd25db11 Backed out 3 changesets (bug 1293786) for wpt unexpected passes and fails
Backed out changeset f8911c81ee9a (bug 1293786)
Backed out changeset 8cba8a0a730c (bug 1293786)
Backed out changeset 5c60775f445e (bug 1293786)
2016-09-28 20:39:16 -07:00
Cameron McCormack 21163fba88 Bug 1293786 - Part 2: Move rootElement from the now-removed SVGDocument to Document. r=longsonr,smaug
MozReview-Commit-ID: 4y82o5MP6TU
2016-09-29 09:32:43 +08:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Olli Pettay bddafc48dd Bug 1305309, backout Bug 1214805, r=backout
--HG--
extra : rebase_source : d86f67ef53b26027d739725829a2ee736d71221e
2016-09-27 01:03:24 +03:00
Xidorn Quan 2f49a48a09 Bug 1304302 part 10 - Replace all uses of StyleSheetHandle. r=heycam
This commit is generated by the following commands with some minor
manual adjustment:

find . \( -name '*.h' -or -name '*.cpp' \) -not -path './layout/style/StyleSheet*' -exec sed -i -b \
  -e '/^\(#include\|using\)/s/StyleSheetHandle/StyleSheet/g' \
  -e 's/\(mozilla::\)\?StyleSheetHandle::RefPtr/RefPtr<\1StyleSheet>/g' \
  -e 's/StyleSheetHandle()/nullptr/g' \
  -e 's/->AsStyleSheet()//g' \
  -e 's/StyleSheetHandle/StyleSheet*/g' {} +
sed -i -b 's/sheet->AsVoidPtr()/sheet.get()/' layout/style/Loader.cpp
sed -i -b 's/AsHandle()/this/' layout/style/StyleSheet.cpp

MozReview-Commit-ID: 7abdvlKHukd

--HG--
extra : source : e5682242db07203b5a91810fe1e243c955310588
2016-09-26 22:03:25 +10:00
Thomas Wisniewski 3c6249dd4b Bug 884693 - Do not log console warnings for XHR parse failures if HTTP status is 204 or 304. r=smaug 2016-09-21 13:48:05 -04:00
Iris Hsiao a2a48a3de7 Backed out changeset 6fb622c938de (bug 884693) for crashed @mozilla::dom::XMLHttpRequestMainThread
CLOSED TREE
2016-09-21 13:00:50 +08:00
Thomas Wisniewski d65949bf5c Bug 884693 - Do not log console warnings for XHR parse failures if HTTP status is 204 or 304. r=smaug 2016-09-19 19:36:03 -04:00
Andrea Marchesini 72d886f7a3 Bug 1301249 - nsIDocument::GetDocumentURI() should be fallible, r=smaug 2016-09-20 14:03:05 +02:00
Andrea Marchesini 56c54a3930 Bug 1302987 - Rename nsLocation to mozilla::dom::Location, r=smaug
--HG--
rename : dom/base/nsLocation.cpp => dom/base/Location.cpp
rename : dom/base/nsLocation.h => dom/base/Location.h
2016-09-16 09:18:18 +02:00
Thomas Wisniewski e6afa43d92 Bug 812701 - Drop the prefixed version of the Visibility API. r=bz
--HG--
extra : rebase_source : 2d989414b2ccbb9c712e711c8373bdca6f87fc4b
2016-09-13 09:56:14 -04:00
Nicholas Nethercote e4eb76b618 Bug 1297300 - Add missing checks to GetSpec() calls in dom/base/. r=bz.
--HG--
extra : rebase_source : 55e83aad222825b2dd1399fa42eee6b6c894d0ee
2016-09-08 14:17:58 +10:00
John Dai 3315b2b7eb Bug 1294100 - Part 4: Support DOMString as Argument 2 of Document.createElement. r=bz 2016-09-01 18:06:33 +08:00
John Dai afa50be601 Bug 1294100 - Part 3: Modify Codegen to generate including FakeString's binding files and fix build errors. r=bz
--HG--
rename : dom/bindings/BindingUtils.h => dom/bindings/FakeString.h
2016-09-01 18:10:54 +08:00
John Dai 84e1621068 Bug 1294100 - Part 2: Modify CheckCustomElementName be 'const nsString*' and remove the const_cast. r=bz 2016-09-01 18:08:50 +08:00
Olli Pettay 961aa9b24b Bug 1214805, allow navigating when afterprint event is dispatched, r=bz
--HG--
extra : rebase_source : 67bb9b79332b009756781ae3e58aed91a5bdfbfa
2016-09-03 17:33:30 +03:00
Edgar Chen 67946850ab Bug 1275835 - Part 1: Move custom element codes from nsDocument to CustomElementsRegistry; r=wchen
MozReview-Commit-ID: 9gTSFrYW7o3

--HG--
extra : rebase_source : f123f21aadaa18641ddd7fa7fa67eb27a4152f83
2016-08-30 11:48:53 +08:00
Thomas Wisniewski 756abf6cfa Bug 289714 - Do not write <parsererror> nodes for invalid XML documents in XMLHttpRequests made by web content. r=billm, r=bz
--HG--
extra : rebase_source : 4cc87bbeca140953a90b31e1fd5b32098d37a2de
2016-08-29 16:30:36 -04:00
Dan Glastonbury b194d26e61 Bug 1262053 - part1 : unblock window's media when the page was first visited. r=baku
MozReview-Commit-ID: 5g5cYdgC8sg

--HG--
extra : rebase_source : 5af18ff846f464b1d3d195d7dc2634e03601cfcc
2016-08-29 10:41:02 +08:00
Xidorn Quan b83b9e7406 Bug 991899 part 1 - Add unprefixed API for PointerLock. r=smaug
MozReview-Commit-ID: 3af2D9IWI1Q

--HG--
extra : source : 527777bea747fb8ab363960e41b0a1ddb26d7749
2016-07-28 17:15:21 +10:00
Xidorn Quan 31f5ebf083 Bug 1287706 part 1 - Make CallbackObjectHolder movable (and actually move-only). r=smaug
So that we can avoid unnecessary refcount changes.

MozReview-Commit-ID: 4Mk9SJTj6AS

--HG--
extra : source : c35643f76ef33b6cdce115c8de0dfae8abccd644
2016-07-28 12:00:06 +10:00
Iris Hsiao caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley 567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book 25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley 01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book 0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley 547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Jocelyn Liu 9420e6fa26 Bug 1276579: Add 'options' argument into |document.createElement[NS]()| methods and remove overloaded |createElement[NS]()| methods. r=smaug,wchen
MozReview-Commit-ID: FWd6g33SSiR

--HG--
extra : rebase_source : 1b62a987d66952ea420e10e8350399cd26b5511d
2016-06-06 18:43:39 +08:00
Cameron McCormack acd21d26c0 Bug 1285474: Decide style system backend type for documents earlier. r=bholley
MozReview-Commit-ID: 7A4t3957CWe
2016-07-12 00:33:57 -07:00
Emilio Cobos Álvarez 5990bbc7d5 Bug 1285474: stylo: Add nsINode method for knowing if the current document is using Servo's style back-end. r=bholley
MozReview-Commit-ID: 3sRE7BZj1tu
2016-07-12 00:33:57 -07:00
Xidorn Quan dc193d9f49 Bug 1283526 part 1 - Revert behavior of allowfullscreen attribute for non-sandboxed iframe. r=smaug
MozReview-Commit-ID: BayA4tQBsfC

--HG--
extra : rebase_source : 17818546cd0c1ec971412346d6e32d537442dd26
2016-07-04 10:19:35 +10:00
Thomas Wisniewski 30e61f3146 Bug 918773 - set responseXML.referrer to the empty string. r=jst
--HG--
extra : rebase_source : e537ea45eb0ce380059830d615c35f5ab76e37e3
2016-06-30 14:01:25 -04:00
Paul Roberts 6707fd2982 Bug 671389 - Export document sandbox flags to chrome JS. r=smaug
--HG--
extra : rebase_source : 91463b43748b72283644d25b56242c244cc2a6bf
2016-06-19 12:34:08 -07:00
Bob Owen 7c3321c672 Bug 1277475 Part 1: Add a chrome and XBL accessor for the sandboxed scripts flag to Document WEBIDL. r=bz
This also incldues changes to use the new function instead of getting and checking the sandbox flags in most places.

MozReview-Commit-ID: Cv0vJCdLH4D
2016-06-09 11:22:22 +01:00
Jonathan Watt 6be4402448 Bug 1273850 - Add lots of documentation to explain the scenarios that cause nsFrameLoader::Create to return null. r=smaug
MozReview-Commit-ID: 6UZyql1qHg0

--HG--
extra : rebase_source : 353bffea8919d02d3ba5f2f93c84a95fd0784caa
2016-05-17 14:18:22 +01:00
Xidorn Quan 51e715f73c Bug 1270648 part 4 - Make fullscreen enabled flag not be affected after document is loaded. r=smaug
MozReview-Commit-ID: L2dMAUr63qv

--HG--
extra : source : 363d7ac04cbf98fa67cad3214ac62330c2652fa8
2016-05-18 09:08:12 +10:00
Jonathan Watt bdfb04809e Bug 1270174 - Scope SVG ID references in content inserted via Document.insertAnonymousContent() to the inserted element. r=smaug 2016-05-09 18:33:19 +01:00
Xidorn Quan efc89967ed Bug 1269157 - Add Document.fullscreen attribute. r=smaug
MozReview-Commit-ID: 7mMjGoc7cvA

--HG--
extra : source : 0a5755272461d84a6a8082ca706d10b1ece84bc6
2016-05-12 10:28:56 +10:00
Cameron McCormack 2617364266 Bug 1268390 - Part 1: Factor out most of nsStyleSet::AddDocStyleSheet for re-use. r=bholley 2016-04-29 14:01:44 +10:00
Christoph Kerschbaumer 232720eac5 Bug 1263286 - Move base-uri CSP check into SetBaseURIUsingFirstBaseWithHref. r=bz 2016-04-26 11:48:29 +02:00
Ben Kelly e07a0186e8 Bug 1265795 P1 Uncontrolled service workers when global is removed from document. r=bz 2016-04-21 16:10:40 -07:00
Kartikaya Gupta 8f157afb9e Bug 1256727 - Don't allow paint-skipping on pages with scroll-linked effects. r=mstange
MozReview-Commit-ID: I05EXDWOt6b
2016-03-17 15:43:17 -04:00
Franziskus Kiefer bf87c6c564 Bug 1252829 - CSP Telemetry. r=ckerschb, p=bsmedberg
MozReview-Commit-ID: CiNAxh2ZrHB

--HG--
extra : transplant_source : %B8%00%E0%83%1B%29%BDI%DE%09%CDPN%AE%7B9Tk%8B%99
2016-03-02 13:00:09 +01:00
Christoph Kerschbaumer 39f2d53360 Bug 1122236 - CSP: Implement block-all-mixed-content (r=tanvi,kate,mrbkap) 2016-01-13 20:58:16 -08:00
Daniel Holbert e23c4f231b Bug 1247478: Rename FirstAdditionalAuthorSheet() to GetFirstAdditionalAuthorSheet(), since it can return null. r=heycam 2016-02-29 15:09:13 -08:00
Daniel Holbert 61ab7f2b20 Bug 1246464: Add 'const' to some stylesheet args in nsDocument methods. r=heycam 2016-02-29 13:24:25 -08:00