Граф коммитов

4494 Коммитов

Автор SHA1 Сообщение Дата
Ehsan Akhgari 4a51ebacfa Bug 1310378 - Remove support for mozwidget; r=baku 2016-10-17 13:15:36 -04:00
Ehsan Akhgari e2fdfd7548 Bug 1310366 - Remove support for app redirects; r=baku 2016-10-17 13:15:36 -04:00
Ehsan Akhgari ceb6c867f9 Bug 1310350 - Fix the return value of nsDocShell::GetInheritPrivateBrowsingId(); r=baku
This function was mistakenly returning mPrivateBrowsingId instead of
mInheritPrivateBrowsingId.  Thankfully this function isn't being used
anywhere yet.
2016-10-17 10:05:12 -04:00
Ehsan Akhgari 87f7da8481 Bug 1310014 - Avoid capturing JS backtraces in TabChild::DidRequestComposite(); r=tromey 2016-10-14 15:33:39 -04:00
Christoph Kerschbaumer a14cba1726 Bug 1303943: Don't inherit principal for external loads and update documentation for principalToInherit. r=bz 2016-10-14 20:08:21 +02:00
Ehsan Akhgari 69dce6c397 Bug 1310101 - Remove nsILoadContext::IsAppOfType; r=baku 2016-10-14 10:45:27 -04:00
Sebastian Hengst 700f9d4edf Backed out changeset 07f70194e136 (bug 1303943) for tests crashing related to sessionhistory. r=backout on a CLOSED TREE 2016-10-14 12:53:09 +02:00
Christoph Kerschbaumer 12c0c49d7e Bug 1303943 - Don't inherit principal for external loads and update documentation for principalToInherit. r=bz 2016-10-13 15:13:40 +02:00
Carsten "Tomcat" Book 1615c5d144 Backed out changeset 9ae5fb774393 (bug 1297338) landed with wrong bug number 2016-10-14 08:44:00 +02:00
Christoph Kerschbaumer f3cb1ffcb6 Bug 1297338 - Don't inherit principal for external loads and update documentation for principalToInherit. r=bz 2016-10-13 15:13:40 +02:00
Mike Conley a99bfe13e7 Bug 1288606 - Fix intermittent orange by making sure a weakly held nsISHistoryListener doesn't get GC'd before the browser_bug670318.js completes. r=jaws
MozReview-Commit-ID: AWvpK6OpmmI

--HG--
extra : rebase_source : 40863e55308f18a6f4172fe74fad323c0ad9cc38
2016-10-11 09:43:57 -04:00
Eric Rahm f52b26bf1d Bug 1308611 - Convert nsISHEntry.refreshURIList to nsIMutableArray. r=bz
|refreshURIList| is converted to a an nsIMutableArray as nsISupportsArray is
deprecated. This attribute is only used internally and does not show up in a
textual search of the plugins repo.

nsIMutableArray is used rather than nsIArray in order to support modifying the
array as current users expect.

MozReview-Commit-ID: F0GYVFZarOQ
2016-10-10 11:36:41 -07:00
Yoshi Huang a43d017190 Bug 1264137 - Part 4: Improve the usefulness of what we pass as requestingContext to nsIContentPolicy for navigations (loads in a docshell). r=bz
For toplevel document loads (TYPE_DOCUMENT) in the content process,
we pass the currently-loaded window, if any.

For toplevel document loads in the chrome process (e.g. tabs in non-e10s mode),
we pass the node which created our docshell, if any.

For all subframe loads, we pass the node that created the docshell,
which is the frameElement of the window in the docshell.
2016-10-07 17:40:21 +08:00
Yoshi Huang 06ba09a073 Bug 1264137 - Part 3: perform ContentPolicy check if the load is happening on this docshell. r=bz, smaug 2016-10-07 17:40:21 +08:00
Yoshi Huang 351ea50d4c Bug 1264137 - Part 2: use isTargetTopLevelDocShell instead. r=bz
In Bug 841850 we added a !isNewDocShell check.
And In Bug 902350 we added a !isTargetTopLevelDocShell check.
We can get rid of isNewDocShell variable and just keep track of
isTargetTopLevelDocShell.
2016-10-07 17:40:21 +08:00
Yoshi Huang a1cdd18cb8 Bug 1264137 - Part 1: rename from loadingPrincipal to requestingPrincipal in nsDocShell::InternalLoad. r=bz
In nsIContentPolicy terminology, it uses 'requestingPrincipal'.
So in nsDocShell::InternalLoad, we rename 'loadingPrincipal' to
'requestingPrincipal', and rename 'context' to 'requestingContext' when
calling nsIContentPolicy.
2016-10-07 17:40:21 +08:00
Christoph Kerschbaumer fcc4788550 Bug 1307720 - Assert that docshell loads of TYPE_SUDOCUMENT always get a valid principal. r=tanvi 2016-10-05 14:24:38 +02:00
Christoph Kerschbaumer 5183f418bc Bug 1305012 - Test downgrading a new channel's principal to NullPrincipal. r=smaug 2016-10-05 21:20:38 +02:00
Samael Wang 104fe2c997 Bug 1300461 - UpdateIndex on LOAD_NORMAL_REPLACE, ReplaceEntry at requestedIndex when available. r=smaug
--HG--
extra : rebase_source : 9bb3c7488a1785ee5c4106b8e024555f31b3220c
2016-09-30 11:55:10 +08:00
Blake Kaplan fb560b4220 Bug 1304531 - Remove CPOW usage from browser_ua_emulation.js. r=Felipe
MozReview-Commit-ID: 4RnoWuVogCT

--HG--
extra : rebase_source : d096117b65edf49a51d4fa6230cf8d61b6852b83
2016-09-20 17:19:34 -07:00
Blake Kaplan 7afea958da Bug 1304531 - Remove CPOW usage from browser_timelineMarkers-01.js. r=Felipe
MozReview-Commit-ID: Ec3py9hntta

--HG--
extra : rebase_source : a2e505f9297eede9495672bfe27943b7ca768622
2016-09-20 17:07:39 -07:00
Blake Kaplan 98dc405cb8 Bug 1304531 - Remove CPOW usage from browser_bug655273.js. r=Felipe
MozReview-Commit-ID: G27FHSB1SxF

--HG--
extra : rebase_source : ff36435f10832a7dfde60b8f1fb11b92e3dfc4cd
2016-09-20 16:58:08 -07:00
Gijs Kruitbosch 9e706873c7 Bug 1295002 - don't accept nested view-source: references in nsDefaultURIFixup, r=smaug
This seems like much the simplest way to prevent the recursion. Other alternatives
include some kind of member var to track state (which wouldn't be threadsafe, though
I don't know that that really matters for this component) or adding a field on
nsIDefaultURIFixupInfo, which seems ugly. This is a bit hacky, but it seems to work.

MozReview-Commit-ID: 7CCVvENSRVD

--HG--
extra : rebase_source : b42552de2607ba4830757adcd6be6df2b27c76ee
2016-10-02 22:54:20 +01:00
Nathan Froyd 750375642d Bug 1305422 - part 14 - don't call size_forward in nsDefaultURIFixup.cpp; r=bkelly 2016-09-29 22:33:57 -04:00
James Andreou a47ce92ac2 Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans 2016-09-27 16:56:44 -04:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Christoph Kerschbaumer bc9a70d964 Bug 1297338 - Introduce concept of principalToInherit to docshell and scriptSecurityManager. r=bz 2016-09-20 08:36:25 +02:00
Bill McCloskey 50c44c717c Bug 1279086 - Allow painting for tab switch when JS is running (r=dvander,mconley,mrbkap) 2016-09-16 20:35:11 -07:00
Kris Maglione afd82f6743 Bug 1294199: Part 1 - Add a docShell flag to allow legacy panels to skip inheriting origin attributes. r=ehsan
MozReview-Commit-ID: 1c6V0kv9E38

--HG--
extra : rebase_source : 9a9ab21a41a8a235378ff7a21dccbf9de37a5499
2016-09-15 13:47:55 -07:00
Eric Rahm e6256c9f1a Bug 1299642 - Fix docshell errors when breaking chrome -> chrome leaks. r=ted
It appears the lambda function passed to waitForFocus goes out of
scope when the window is closed. Just pass in SimpleTest.finish
directly instead.
2016-09-15 16:43:38 -07:00
Blake Kaplan 8aeb3f91d9 Bug 623436 - Deal a little better with replacing inexistant session history entries. r=smaug
--HG--
extra : source : 20c734f8107e43e15ae11abae1d6a6e985510d93
2016-09-08 15:34:31 -07:00
Carsten "Tomcat" Book 656d6db419 Merge mozilla-central to mozilla-inbound 2016-09-07 17:21:27 +02:00
Carsten "Tomcat" Book 1c61ba654e merge mozilla-inbound to mozilla-central a=merge 2016-09-07 17:20:12 +02:00
Michael Layzell e583117bfa Bug 1018486 - Part 5: Changes in docshell/ and uriloader/, r=bz
MozReview-Commit-ID: GiyHWL3aaOv
2016-09-07 10:50:41 -04:00
Matteo Ferretti 46b536cd2f Bug 1299154 - added Set/GetOverrideDPPX to restorefromHistory; r=mstange
MozReview-Commit-ID: AsyAcG3Igbn
2016-09-07 10:21:51 +02:00
Xidorn Quan fcb403fc25 Bug 1299795 - Disable fullscreen for sidebar. r=smaug
MozReview-Commit-ID: G09fKdufKW3

--HG--
extra : source : d9b03fdeb466e280d6ba392d98c3aec3f281db4d
2016-09-07 09:13:14 +08:00
Yoshi Huang 10b437080c Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug 2016-09-06 10:25:58 +08:00
Sebastian Hengst c9519f7c29 Backed out changeset b9afda2804fd (bug 1260931) 2016-09-05 21:15:29 +02:00
Yoshi Huang 6cca1d0c54 Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug 2016-09-06 01:50:30 +08:00
Sebastian Hengst df3ad10e28 Backed out changeset 10da0eca7bbb (bug 1260931) 2016-09-02 15:33:51 +02:00
Sebastian Hengst 31c5f85098 Backed out 5 changesets (bug 1260931)
Backed out changeset 86e1a437021b (bug 1260931)
Backed out changeset be65e87da9e3 (bug 1260931)
Backed out changeset 39cff1d988fd (bug 1260931)
Backed out changeset 2fa7c4d8a5bc (bug 1260931)
Backed out changeset 075d612841fb (bug 1260931)
2016-09-02 14:55:59 +02:00
Sebastian Hengst 5bbaac898b Backed out changeset 10da0eca7bbb (bug 1260931) 2016-09-02 14:38:42 +02:00
Yoshi Huang 88b9430165 Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug 2016-09-02 15:04:40 +08:00
Nicholas Nethercote b71747b2ac Bug 1299727 - Rename NS_WARN_IF_FALSE as NS_WARNING_ASSERTION. r=erahm.
The new name makes the sense of the condition much clearer. E.g. compare:

  NS_WARN_IF_FALSE(!rv.Failed());

with:

  NS_WARNING_ASSERTION(!rv.Failed());

The new name also makes it clearer that it only has effect in debug builds,
because that's standard for assertions.

--HG--
extra : rebase_source : 886e57a9e433e0cb6ed635cc075b34b7ebf81853
2016-09-01 15:01:16 +10:00
Nicholas Nethercote c94421bf7c Bug 1297961 (part 2) - Use nsIURI::GetSpecOrDefault() for comparisons to fixed URIs. r=hurley.
--HG--
extra : rebase_source : c742ded3ca4ff6ddf745cf8d720261624f172027
2016-08-26 16:02:32 +10:00
Nicholas Nethercote 742fc7eb48 Bug 1297961 (part 1) - Introduce nsURI::GetSpecOrDefault(). r=hurley.
This function is an infallible alternative to nsIURI::GetSpec(). It's useful
when it's appropriate to handle a GetSpec() failure with a failure string, e.g.
for log/warning/error messages. It allows code like this:

  nsAutoCString spec;
  uri->GetSpec(spec);
  printf("uri: %s", spec.get());

to be changed to this:

  printf("uri: %s", uri->GetSpecOrDefault().get());

This introduces a slight behavioural change. Previously, if GetSpec() failed,
an empty string would be used here. Now, "[nsIURI::GetSpec failed]" will be
produced instead. In most cases this failure string will make for a clearer
log/warning/error message than the empty string.
* * *
Bug 1297961 (part 1b) - More GetSpecOrDefault() additions. r=hurley.

I will fold this into part 1 before landing.

--HG--
extra : rebase_source : ddc19a5624354ac098be019ca13cc24b99b80ddc
2016-08-26 16:02:31 +10:00
Andrew McCreight eba50c94d8 Bug 1298456 - Make historyframes.html and test_bug590573.html use generators. r=smaug
MozReview-Commit-ID: 1Fi2UnUC36g

--HG--
extra : rebase_source : 8f4fe3e5a577bfec73e088da471f63404293621c
2016-08-24 14:13:45 -07:00
Matteo Ferretti c0ce371e10 Bug 1241867 - override the DPR without affecting the rendering; r=dbaron
- added overrideDPPX to nsIContentViewer
- made CSSStyleSheet and GlobalWindow using the overrideDPPX value
- added unit test with frame check

MozReview-Commit-ID: AOWpGs4vb9H

--HG--
extra : rebase_source : 45d9ae2c9b7aad835b5602e805ec7260c69c05b8
2016-08-25 13:15:19 +02:00
Wei-Cheng Pan 9a0fc7767f Bug 1293212 - Add MOZ_MUST_USE to prevent potential bugs. r=smaug
MozReview-Commit-ID: EuyeBkDlk2G

--HG--
extra : rebase_source : de8d5a95f74b757b7441cdc1e0f2dadb3a77ac6e
2016-08-08 18:16:15 +08:00
James Andreou 4c787b8989 Bug 1282882 - Remove LoadContextInfo and LoadContext private browsing flags; r=jdm,mayhemer 2016-08-26 13:06:48 -04:00