Граф коммитов

313 Коммитов

Автор SHA1 Сообщение Дата
Bill McCloskey 225fab4ac5 Bug 1337537 - Avoid SystemGroup assertion during WebAudio test (r=ehsan)
MozReview-Commit-ID: 9GbXnkF4fvZ
2017-02-13 17:03:05 -08:00
Bill McCloskey 46be3abeb0 Bug 1337577 - Ensure that console listeners never touch web content, including in tests (r=mccr8)
MozReview-Commit-ID: 7UVaNUyj5yq
2017-02-13 17:03:01 -08:00
Andrea Marchesini 8cf1cb8c2f Bug 1335536 - File.createFromNsIFile and File.createFromFileName should be async - part 1 - tests, r=smaug 2017-02-08 10:18:32 +01:00
Andrew Sutherland 8e593b76bd Bug 1319531 - Ensure all streams provided by DatabaseFile can be read without generating NS_BASE_STREAM_WOULD_BLOCK errors. r=janv
IndexedDB database operations are written such that they must execute
synchronously.  For this reason, the add/put operation reads/writes its
Blobs to disk in a synchronous fashion.  However, with the introduction
of SendStream-backed Blobs for large (>1 MiB) blobs whose contents are
streamed to the parent replacing nsStringInputStream-backed Blobs
(whose contents were sent up in a single IPC message that might exceed
the size limit and cause a crash), this has no longer been a safe
assumption.  However, the problems weren't immediately obvious because
most pre-WASM Blobs are smaller than the 1MiB threshold and even when
they exceeded the size, their memory-backed contents could rapidly be
sent to the parent via IPC, making NS_BASE_STREAM_WOULD_BLOCK errors
rare/hard to reproduce.  (rr and its enforced single-threading is a
good way to reproduce, however.  Also, see the testing patch on the
bug that introduces artificial delays into SendStream.)

Included SpecialPowersObserver.jsm minor changes to "CreateFiles":
- appendRelativePath is used instead of appendPath because appendPath
  only allows a single path component to be appended.  In other words,
  file creation is limited to files at the root of the profile
  directory using appendPath, which is needlessly limiting.
- outStream is now closed even if no data is provided.  This is
  essential on windows where file deletion only occurs when all handles
  are closed.  Without this fix, "RemoveFiles" side-effect of deleting
  the created files might not take effect until garbage collection runs
  and collects the outStream.
2017-01-30 01:07:27 -05:00
Kris Maglione a8bcea0d5d Bug 1332874: Check that extra windows and tabs are closed after each mochitest. r=aswan
MozReview-Commit-ID: GjJxHVnLJi1

--HG--
extra : rebase_source : 695612f3d73e2feb71b44d3702c583cd3be11626
2017-01-21 15:19:33 -08:00
Florian Quèze 85611a7b6d Bug 1331081 - script generated patch to omit addEventListener/removeEventListener's third parameter when it's false, r=jaws.
--HG--
extra : rebase_source : a22344ee1569f58f1f0a01017bfe0d46a6a14602
2017-01-17 11:50:25 +01:00
Florian Quèze 1e42cad36c Bug 1330464 - script-generated removal of additional parameters that don't exist in the interface, r=jaws. 2017-01-13 20:21:53 +01:00
Florian Quèze fc6379e827 Bug 1329182 - remove trailing newURI null parameters in the rest of the tree, r=jaws. 2017-01-09 20:27:26 +01:00
Kris Maglione b4d3f79ec3 Bug 1325158: Part 4 - Fix cases where extension startup listener is not removed. r=aswan
MozReview-Commit-ID: FIhGYSDoOhW

--HG--
extra : rebase_source : baa8c9f409da54c06cea5fac4dfa6462e2a06697
2016-12-24 18:48:56 -08:00
Ehsan Akhgari 5cc591dc59 Bug 1318209 - Remove mozIApplication; r=baku 2016-11-17 10:12:43 -05:00
Ehsan Akhgari 1488007b30 Bug 1318206 - Remove some unused code for clearing app data; r=baku,mcmanus 2016-11-17 08:30:21 -05:00
Andrea Marchesini 2aba798852 Bug 1303518 - Remove the chrome only constructor for File, r=qdot 2016-11-11 18:56:44 +01:00
Aryeh Gregor 3d45bab5bb Bug 1271119 - Add SpecialPowers.doCommand() and .setCommandNode(); r=mrbkap
This is needed to port various editor tests from chrome to plain
mochitests.

MozReview-Commit-ID: BXNe0EiqVgV
2016-08-30 18:00:07 +03:00
Ehsan Akhgari 9de6bbbaec Bug 1261019 - Part 3: Remove Navigator.mozApps and code depending on it; r=myk,jryans,fabrice,mcmanus,peterv 2016-10-13 13:18:41 -04:00
Yoshi Huang 2a51f65d99 Bug 1237152 - rename clear-origin-data to clear-origin-attributes-data, r=smaug
find \( -name '*.cpp' -o -name '*.h' -o -name '*.js' -o -name '*.jsm' -o -name '*.idl' -o -name '*.html' \) \
-a -type f -exec sed -i 's/clear-origin-data/clear-origin-attributes-data/g' {} \;
2016-10-07 17:45:10 +08:00
Kris Maglione a74fb197ac Bug 1278687: Multiplex extension message listeners for use in chrome tests. r=aswan
MozReview-Commit-ID: 3V5FqnBQy1j

--HG--
extra : rebase_source : 9743bc9c3a476707e7fe58838ee39d6137e74915
2016-10-03 20:44:28 +01:00
Kris Maglione 7fe3c9e28a Bug 1306037: Support options_ui in embedded WebExtensions. r=aswan
MozReview-Commit-ID: KZVPz52qrTS

--HG--
extra : rebase_source : 302bdead12c6bf36e30ed3782c6cb4526f1ef1c7
2016-09-28 23:11:35 +01:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Masayuki Nakano c29d9ac401 Bug 972110 Rewrite editor/libeditor/test_bug674770-1.html without setTimeout() for avoiding intermittent failure r=smaug
We can assume that if middle button's click event on a link isn't consumed by any event handlers including system event group's, it will cause open new tab.  With this assumption, we can avoid using setTimeout which causes random orange.

However, unfortunately, in e10s mode, the default is NOT consumed at window in bubbling phase but consumed at that time. So, when not working the link is expected, we cannot check Event.defaultPrevented.  But fortunately, we can check if the page is loaded after that.

Note that for testing this, the test needs to check if an event handler which is either in default group or system group consumed a click event.  However, this runs as mochitest-plain.  Therefore, Event.defaultPrevented returns false if the event is consumed only in the system group's event listener.  For avoiding this issue, this patch adds defaultPreventedInAnyGroups() into SpecialPowers.  In SpecialPowers, Event.defaultPrevented is accessed from chrome context.  Therefore, we can get the result what this test needs.

MozReview-Commit-ID: Cfn4lFR1dfI

--HG--
extra : rebase_source : 51feb768bd38f62cc19c2f4aecaaea0135190599
2016-09-22 10:54:51 +09:00
Matteo Ferretti c0ce371e10 Bug 1241867 - override the DPR without affecting the rendering; r=dbaron
- added overrideDPPX to nsIContentViewer
- made CSSStyleSheet and GlobalWindow using the overrideDPPX value
- added unit test with frame check

MozReview-Commit-ID: AOWpGs4vb9H

--HG--
extra : rebase_source : 45d9ae2c9b7aad835b5602e805ec7260c69c05b8
2016-08-25 13:15:19 +02:00
Aryeh Gregor f3e54042f1 Bug 1271115 - Merge ChromeUtils.js into EventUtils.js; r=jmaher
This allows plain mochitests to use the functions as well, which is
necessary to get them to work with e10s.

MozReview-Commit-ID: J4um2mliJcZ
2016-08-25 16:57:09 +03:00
Rob Wu d96579c768 Bug 1288276 - Add chromeScript.awaitOneMessage to SpecialPowers r=billm
MozReview-Commit-ID: DcqnN3TosM8

--HG--
extra : rebase_source : 578e6437ef32830fdd3a1081947ca8081d1e3497
2016-08-07 19:09:03 -07:00
Andrew Swan b904b2d437 Bug 1286908 Remove id allocation from SpecialPowers loadExtension() r=kmag
Prior to this change, SpecialPowers used the extension id to identiy
extension instances in inter-process messaging.  This required that
an id be allocated from the content process side when loadExtension()
was called, but that made it impossible to test code that exercises the
code path in the AddonManager that allocates ids for extensions that do
not include an id in the manifest (it also made the loadExtension() api
clunky).

With this change, SpecialPowers allocates an internal identifier for
messaging, but this identifier is separate from extension ids.
Confusingly, we still store the actual extension id in an id property
on the object returned by loadExtension(), but there are enough tests
that reference this that it would be unnecessarily disruptive to get
rid of it so it stays for now...

MozReview-Commit-ID: G6xk1mBJJL8

--HG--
extra : rebase_source : a0891e5ba308972c35813f55274badf9edde62f7
extra : source : e8818ef3c28489e196d1db92cabf224861b693c9
2016-08-02 16:04:37 -07:00
Carsten "Tomcat" Book 0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley 547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Carsten "Tomcat" Book 8b6316ec5f Merge mozilla-central to mozilla-inbound 2016-07-22 11:59:06 +02:00
Andrew McCreight 623b56a3f1 Bug 1287143 - Remove the window argument to SpecialPowers.exactGC(). r=jmaher
Cu.forceCC() is the same as DOMWindowUtils.cycleCollect(), but does
not require a window.
2016-07-19 13:13:00 +08:00
Tom Tromey 5538d692d3 Bug 1286877 - do not set c-basic-offset for python-mode; r=gps
This removes the unnecessary setting of c-basic-offset from all
python-mode files.

This was automatically generated using

    perl -pi -e 's/; *c-basic-offset: *[0-9]+//'

... on the affected files.

The bulk of these files are moz.build files but there a few others as
well.

MozReview-Commit-ID: 2pPf3DEiZqx

--HG--
extra : rebase_source : 0a7dcac80b924174a2c429b093791148ea6ac204
2016-07-14 10:16:42 -06:00
Brian Grinstead 1adf4b4140 Bug 1278368 - Remove the error console. r=dolske
MozReview-Commit-ID: AIw6zqVjJFx

--HG--
extra : transplant_source : V%9C%F2%B6L%1D%22%D8%85%9Ep%AA%2B%CD%19%23%D2c%96%EE
2016-06-23 17:46:58 -07:00
Jan Varga 64b62c9b07 Bug 1195930 - Part 1: Re-enable tests for clearing origin data; r=asuth 2016-06-05 21:41:48 +02:00
Andrea Marchesini 3ad65f3a92 Bug 1258489 - Implement HTMLInputElement.webkitdirectory, r=smaug 2016-06-01 12:29:00 +02:00
Wes Kocher e089e1ab3e Backed out changeset 17e20404362d (bug 1258489) 2016-05-23 12:46:05 -07:00
Andrea Marchesini 6586afe162 Bug 1258489 - Implement HTMLInputElement.webkitdirectory, r=smaug 2016-05-23 17:02:18 +02:00
Matthew Noorenberghe 98916e4224 Bug 1197310 - Return a promise from pushPrefEnv/popPrefEnv/flushPrefEnv. r=jmaher
MozReview-Commit-ID: HQxXeo37XS5
2016-05-17 14:14:53 -07:00
Junior Hsu 6d15e2b50b Bug 1260076 - [Mochitest] implement SpecialPowers.loadPrivilegedScript, r=bholley 2016-04-20 19:47:00 +02:00
Ehsan Akhgari 0e87b6fb88 Bug 1258872 - Port test_mutationobserver_anonymous.html to mochitest-plain so that it can be turned on in e10s mode; r=mrbkap 2016-03-23 11:54:08 -04:00
Ehsan Akhgari d05c992346 Bug 1258815 - Port some tests that depend on the parser utils object to mochitest-plain so that they can be turned on in e10s mode; r=mrbkap 2016-03-22 19:12:41 -04:00
Ehsan Akhgari 6536312ed8 Bug 1258534 - Port test_bug599295.html to mochitest-plain so that it can be turned on in e10s mode; r=mrbkap 2016-03-22 09:57:58 -04:00
Gijs Kruitbosch 18ed8df63e Bug 1254091 - part 2: fix focus messaging from SpecialPowers to refer to the right window, r=enndeakin
MozReview-Commit-ID: DMnK23GoerQ

--HG--
extra : rebase_source : f9af09ead0cd5a52034e483386ba1b6c7db6f5a7
2016-03-18 18:29:27 +00:00
Ehsan Akhgari e6b62e1073 Bug 1257630 - Port test_chrome_constructor.html to mochitest-plain so that it can be turned on in e10s mode; r=mrbkap 2016-03-17 15:54:38 -04:00
Ehsan Akhgari 511ccff106 Bug 1257327 - Port test_allowMedia.html to mochitest-plain so that it can be turned on in e10s mode; r=mrbkap 2016-03-16 18:50:53 -04:00
Marco Castelluccio 2fb9c40ec1 Bug 1250453 - Remove DOMApplicationRegistry.allAppsLaunchable property and related testing API. r=myk 2016-03-14 16:29:11 +00:00
Andrew McCreight e527e48266 Bug 1255173 - Fix onZoomReset() in test_wheel_default_action.html to work with e10s. r=masayuki, r=jmaher
"test.events.async.enabled" must be set to true so we generate key
events in the parent process, which is what triggers the zoom reset.

In addition, some SpecialPowers infrastructure must be set up to
listen for "browser-fullZoom:zoomReset" in the parent and send it to
an observer in the child.

--HG--
extra : rebase_source : 05072529e645b4b8fbd97e2d3ff6dec51a913f40
2016-03-09 16:28:00 -05:00
Carsten "Tomcat" Book 25fbf67b66 Backed out changeset 878c54ec3954 (bug 1250453) 2016-03-10 14:45:59 +01:00
Marco Castelluccio 1902f1c620 Bug 1250453 - Remove DOMApplicationRegistry.allAppsLaunchable property and related testing API. r=myk 2016-03-10 11:12:38 +00:00
Matthew Noorenberghe b539cc9f1b Bug 1251139 - Support running a function in the parent with loadChromeScript. r=jmaher
MozReview-Commit-ID: 3t7g2bjaFmA

--HG--
rename : testing/mochitest/tests/Harness_sanity/test_SpecialPowersLoadChromeScript.html => testing/mochitest/tests/Harness_sanity/test_SpecialPowersLoadChromeScript_function.html
2016-03-09 12:11:44 -08:00
Ryan VanderMeulen 599f2304e0 Merge m-c to inbound. a=merge 2016-03-05 19:30:51 -05:00
Doug Turner a98f782612 Bug 1252750 - Part 1: Create a helper function on SpecialPowersAPI which creates a nested event queue and spins it for a bit. r=mrbkap
--HG--
extra : rebase_source : bdf09f33e7cedbc3ee25f6162ca3cc895633fb73
2016-03-05 00:05:00 -05:00
Hiroyuki Ikezoe 199a3521ec Bug 1153128 - Add sendSyncMessage to SpecialPowers.loadChromeScript. r=jmaher
MozReview-Commit-ID: AsbBiOkhhLo

--HG--
extra : rebase_source : 435440d581de51ff986fde9cd5b0d6e0cc3e5388
2016-02-24 21:43:23 -08:00
Kris Maglione fbcae3eafe Bug 1253148: [webext] Cleanup running extensions on test failure. r=billm
MozReview-Commit-ID: HTFZk6y6ZEp

--HG--
extra : rebase_source : 476d51fba97989b8bcbcdb6720d53f1820db8fc9
2016-03-02 20:58:28 -08:00