Граф коммитов

186 Коммитов

Автор SHA1 Сообщение Дата
Emilio Cobos Álvarez 8c271ab910 Bug 1322094: Fixes for Stylo's binding generation in master bindgen. r=heycam
MozReview-Commit-ID: FSp9XfwX3FJ

--HG--
extra : rebase_source : eb3c72021b80bef78c3b6da62d6c8d38e5fe455a
2016-12-05 03:39:24 +01:00
Ehsan Akhgari 3cade99c10 Bug 1321868 - Add an API to nsIDocument to determine whether a script is on the tracking protection list; r=bkelly
In order to be able to put timeouts in the correct bucket as soon as
they are scheduled, we need to be able to synchronously tell whether a
timeout is coming from a script that is on the tracking protection list.
But the URL Classifier API which we use for this task is asynchronous.
Because of this, and to avoid unnecessary IPC from the content to the
parent process every time we need to know where a script came from, we
cache this information in nsIDocument.  The hash table mTrackingScripts
will have one entry per script loaded in the document which is on the
tracking protection list.

For performance reasons, we coalesce querying whether a script source
URL is on the tracking protection list with the load of the script from
the network.  In most cases we'll have the response from the URL
Classifier service before the script load is finished, but on the off
chance that the load finishes first, we wait before finishing the script
load to get the response from the URL Classifier service.
2016-12-02 15:37:11 -05:00
Bill McCloskey 24bf9358ca Bug 1320753 - Refactor for new event target idea (r=ehsan)
MozReview-Commit-ID: AyhemNqBedb
2016-11-30 18:01:59 -08:00
Bill McCloskey 017013d42a Bug 1305926 - Custom event targets for Dispatcher API (r=ehsan)
MozReview-Commit-ID: 9FXq1BRXwku
2016-11-17 17:01:02 -08:00
Bill McCloskey 66add2ca93 Bug 1305926 - Dispatcher API for assigning DocGroups to runnables (r=ehsan)
MozReview-Commit-ID: 8qO95a6z1Ut
2016-11-17 17:01:00 -08:00
Boris Zbarsky c892e11e49 Bug 1318117. Stop using IsCallerChrome in pointerlock API, fullscreen API, and documentURI getter. r=ehsan 2016-11-17 13:49:27 -05:00
Matt Woodrow 9775890c70 Bug 1315581 - Notify MediaFormatReader when the compositor gets recreated. r=jya,smaug,jw_wang 2016-11-08 15:23:12 +13:00
Frederik Braun 61b919525e Bug 1312272 - Marquee event handlers to adhere CSP. r=smaug
MozReview-Commit-ID: 6MxGnFAIhMP

--HG--
extra : histedit_source : 592bae3f50983d107169811411ab444d5efa3f22
2016-11-04 22:54:59 -04:00
Tobias Schneider 5b2ef3c1db Bug 1243846 - Implement Intersection Observer API. r=mrbkap, r=mstange 2016-10-28 10:24:00 -04:00
Wes Kocher dcffb6b66c Backout revision 111c1227f51e (bug 1243846) for test_intersectionobservers.html failures on android a=backout CLOSED TREE
--HG--
extra : histedit_source : deadf3597a7fdb80b5836c4588516dfb4a06445b%2C5de29fcbccbf12173908822681f6f789186bd3bf
2016-10-27 14:16:10 -07:00
Michael Layzell f9eea2d135 Bug 1303196 - Part 2: Connect the DocGroup and TabGroup objects to nsGlobalWindow and nsDocument, ensuring that Opener is set early enough that it is correct, r=smaug
MozReview-Commit-ID: 3rZfLw3dXkF
2016-10-27 15:53:35 -04:00
Tobias Schneider aa61833e3d Bug 1243846 - Implement Intersection Observer API. r=mrbkap, r=mstange
--HG--
extra : rebase_source : de93bbd5bdecddc2cbf30b57de0fabfe1e4806c3
2016-10-26 22:04:00 -04:00
Sebastian Hengst 3110d249d5 Backed out changeset c55a20f1422b (bug 1243846) for failing modified test test_intersectionobservers.html. r=backout 2016-10-26 18:49:08 +02:00
Tobias Schneider e7229ba450 Bug 1243846 - Implement Intersection Observer API. r=mrbkap, r=mstange
--HG--
extra : rebase_source : fed18f84d17be6f8d1a6196d3a0b6c66f005fa8b
extra : histedit_source : 2d2579bba67ba6bb1857ecbf92a1ab4a21e0d81e
2016-10-12 20:15:16 -07:00
Ehsan Akhgari 1978fee9f2 Bug 1310385 - Remove support for UndoManager; r=smaug
There hasn't been any traction on this feature, and we keep
paying the maintenance and code size and memory usage penalty
of having this implementation.

We can revive this from VCS history in the future if we decide
to start working on it again.  In the mean time, it's better
to remove it.
2016-10-17 10:06:11 -04:00
John Dai 48b937b61e Bug 1309140 - Rename CustomElementsRegistry to CustomElementRegistry. r=wchen, r=smaug
MozReview-Commit-ID: 3gYTaRVcV0y

--HG--
rename : dom/base/CustomElementsRegistry.cpp => dom/base/CustomElementRegistry.cpp
rename : dom/base/CustomElementsRegistry.h => dom/base/CustomElementRegistry.h
rename : dom/webidl/CustomElementsRegistry.webidl => dom/webidl/CustomElementRegistry.webidl
2016-10-12 15:26:02 +08:00
Andrea Marchesini 9215b7b957 Bug 1307122 - Introducing a timeout for sync XHR when unload events are dispatched, r=smaug 2016-10-16 08:46:10 +02:00
Cameron McCormack 58c32a9088 Bug 1309082 - Part 1: Extract image tracking from nsDocument into a separate, refcounted object. r=bholley
This is refcounted as we'll need to hold strong references to the ImageTracker
from style structs that load images.

MozReview-Commit-ID: 994gE9tOjAn

--HG--
extra : rebase_source : 2d50059e51b42251c89a92a954cef7b49720ceba
2016-10-13 15:04:15 +08:00
Boris Zbarsky 3f10f5ed57 Bug 1308287 part 1. Change [NeedsSubjectPrincipal] to only do the Maybe thing for interfaces that can be exposed to workers. r=baku
The idea is to not make consumers think about whether the principal exists or
not when the caller knows for sure that it does.

The substantive changes are in dom/bindings, nsHTMLDocument::SetDesignMode, and
around the CanUseStorage bits.  Everything else is pretty mechanical.
2016-10-10 21:07:48 -04:00
Brian Birtles b813bcffe5 Bug 1302973 - Store timelines on document; r=smaug
MozReview-Commit-ID: KHtAq0VgPZW

--HG--
extra : rebase_source : 7daa2a4202f489308981e9cff02e2d7f3bf92c1e
2016-10-09 22:36:56 +09:00
Andrea Marchesini 0d3521f59a Bug 1306241 - Use NeedsSubjectPrincipal in dom/html/* - part 1, r=ehsan 2016-10-03 10:34:14 +02:00
Cameron McCormack 75460a4e5e Bug 1293786 - Part 2: Move rootElement from the now-removed SVGDocument to Document. r=longsonr,smaug
MozReview-Commit-ID: 4y82o5MP6TU
2016-09-29 09:32:43 +08:00
Phil Ringnalda 40fd25db11 Backed out 3 changesets (bug 1293786) for wpt unexpected passes and fails
Backed out changeset f8911c81ee9a (bug 1293786)
Backed out changeset 8cba8a0a730c (bug 1293786)
Backed out changeset 5c60775f445e (bug 1293786)
2016-09-28 20:39:16 -07:00
Cameron McCormack 21163fba88 Bug 1293786 - Part 2: Move rootElement from the now-removed SVGDocument to Document. r=longsonr,smaug
MozReview-Commit-ID: 4y82o5MP6TU
2016-09-29 09:32:43 +08:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Olli Pettay bddafc48dd Bug 1305309, backout Bug 1214805, r=backout
--HG--
extra : rebase_source : d86f67ef53b26027d739725829a2ee736d71221e
2016-09-27 01:03:24 +03:00
Xidorn Quan 2f49a48a09 Bug 1304302 part 10 - Replace all uses of StyleSheetHandle. r=heycam
This commit is generated by the following commands with some minor
manual adjustment:

find . \( -name '*.h' -or -name '*.cpp' \) -not -path './layout/style/StyleSheet*' -exec sed -i -b \
  -e '/^\(#include\|using\)/s/StyleSheetHandle/StyleSheet/g' \
  -e 's/\(mozilla::\)\?StyleSheetHandle::RefPtr/RefPtr<\1StyleSheet>/g' \
  -e 's/StyleSheetHandle()/nullptr/g' \
  -e 's/->AsStyleSheet()//g' \
  -e 's/StyleSheetHandle/StyleSheet*/g' {} +
sed -i -b 's/sheet->AsVoidPtr()/sheet.get()/' layout/style/Loader.cpp
sed -i -b 's/AsHandle()/this/' layout/style/StyleSheet.cpp

MozReview-Commit-ID: 7abdvlKHukd

--HG--
extra : source : e5682242db07203b5a91810fe1e243c955310588
2016-09-26 22:03:25 +10:00
Thomas Wisniewski 3c6249dd4b Bug 884693 - Do not log console warnings for XHR parse failures if HTTP status is 204 or 304. r=smaug 2016-09-21 13:48:05 -04:00
Iris Hsiao a2a48a3de7 Backed out changeset 6fb622c938de (bug 884693) for crashed @mozilla::dom::XMLHttpRequestMainThread
CLOSED TREE
2016-09-21 13:00:50 +08:00
Thomas Wisniewski d65949bf5c Bug 884693 - Do not log console warnings for XHR parse failures if HTTP status is 204 or 304. r=smaug 2016-09-19 19:36:03 -04:00
Andrea Marchesini 72d886f7a3 Bug 1301249 - nsIDocument::GetDocumentURI() should be fallible, r=smaug 2016-09-20 14:03:05 +02:00
Andrea Marchesini 56c54a3930 Bug 1302987 - Rename nsLocation to mozilla::dom::Location, r=smaug
--HG--
rename : dom/base/nsLocation.cpp => dom/base/Location.cpp
rename : dom/base/nsLocation.h => dom/base/Location.h
2016-09-16 09:18:18 +02:00
Thomas Wisniewski e6afa43d92 Bug 812701 - Drop the prefixed version of the Visibility API. r=bz
--HG--
extra : rebase_source : 2d989414b2ccbb9c712e711c8373bdca6f87fc4b
2016-09-13 09:56:14 -04:00
Nicholas Nethercote e4eb76b618 Bug 1297300 - Add missing checks to GetSpec() calls in dom/base/. r=bz.
--HG--
extra : rebase_source : 55e83aad222825b2dd1399fa42eee6b6c894d0ee
2016-09-08 14:17:58 +10:00
John Dai 3315b2b7eb Bug 1294100 - Part 4: Support DOMString as Argument 2 of Document.createElement. r=bz 2016-09-01 18:06:33 +08:00
John Dai afa50be601 Bug 1294100 - Part 3: Modify Codegen to generate including FakeString's binding files and fix build errors. r=bz
--HG--
rename : dom/bindings/BindingUtils.h => dom/bindings/FakeString.h
2016-09-01 18:10:54 +08:00
John Dai 84e1621068 Bug 1294100 - Part 2: Modify CheckCustomElementName be 'const nsString*' and remove the const_cast. r=bz 2016-09-01 18:08:50 +08:00
Olli Pettay 961aa9b24b Bug 1214805, allow navigating when afterprint event is dispatched, r=bz
--HG--
extra : rebase_source : 67bb9b79332b009756781ae3e58aed91a5bdfbfa
2016-09-03 17:33:30 +03:00
Edgar Chen 67946850ab Bug 1275835 - Part 1: Move custom element codes from nsDocument to CustomElementsRegistry; r=wchen
MozReview-Commit-ID: 9gTSFrYW7o3

--HG--
extra : rebase_source : f123f21aadaa18641ddd7fa7fa67eb27a4152f83
2016-08-30 11:48:53 +08:00
Thomas Wisniewski 756abf6cfa Bug 289714 - Do not write <parsererror> nodes for invalid XML documents in XMLHttpRequests made by web content. r=billm, r=bz
--HG--
extra : rebase_source : 4cc87bbeca140953a90b31e1fd5b32098d37a2de
2016-08-29 16:30:36 -04:00
Dan Glastonbury b194d26e61 Bug 1262053 - part1 : unblock window's media when the page was first visited. r=baku
MozReview-Commit-ID: 5g5cYdgC8sg

--HG--
extra : rebase_source : 5af18ff846f464b1d3d195d7dc2634e03601cfcc
2016-08-29 10:41:02 +08:00
Xidorn Quan b83b9e7406 Bug 991899 part 1 - Add unprefixed API for PointerLock. r=smaug
MozReview-Commit-ID: 3af2D9IWI1Q

--HG--
extra : source : 527777bea747fb8ab363960e41b0a1ddb26d7749
2016-07-28 17:15:21 +10:00
Xidorn Quan 31f5ebf083 Bug 1287706 part 1 - Make CallbackObjectHolder movable (and actually move-only). r=smaug
So that we can avoid unnecessary refcount changes.

MozReview-Commit-ID: 4Mk9SJTj6AS

--HG--
extra : source : c35643f76ef33b6cdce115c8de0dfae8abccd644
2016-07-28 12:00:06 +10:00
Iris Hsiao caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley 567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book 25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley 01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book 0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00