Граф коммитов

711894 Коммитов

Автор SHA1 Сообщение Дата
Mihai Alexandru Michis b0a610bce5 Backed out 3 changesets (bug 1640091) for causing xpcshell failures in nsCOMPtr.h
CLOSED TREE

Backed out changeset 03c4c517ee37 (bug 1640091)
Backed out changeset a1d86c177d79 (bug 1640091)
Backed out changeset f481d4ec255a (bug 1640091)
2020-06-08 12:51:42 +03:00
Bogdan Tara d68a202c49 Backed out 9 changesets (bug 1638711) for test_block_toplevel_data_navigation.html failures CLOSED TREE
Backed out changeset b137e5dfcc57 (bug 1638711)
Backed out changeset 3529cf4e69b6 (bug 1638711)
Backed out changeset 417df721766f (bug 1638711)
Backed out changeset 5b312893e8e2 (bug 1638711)
Backed out changeset d6d396498f5e (bug 1638711)
Backed out changeset 77f6f2396343 (bug 1638711)
Backed out changeset c1d12e04bc27 (bug 1638711)
Backed out changeset 6e702b519ef0 (bug 1638711)
Backed out changeset 9e5a049b57ed (bug 1638711)
2020-06-08 12:36:09 +03:00
Simon Giesecke 0011473324 Bug 1644079 - Fix invalid array index access in ia2Accessible::get_selectionRanges. r=MarcoZ
Since loops that modify the array are error-prone, this is changed to use
nsTArray::RemoveElementsBy instead.

Differential Revision: https://phabricator.services.mozilla.com/D78641
2020-06-08 09:14:56 +00:00
Emilio Cobos Álvarez 5f15c64dda Bug 1642224 - Make sheet loads always have a sensible triggering principal. r=ckerschb
I'm going to need to always have a principal at hand for bug 1599160,
and this helps with that.

This fixes the assumptions in the comment here:

  https://searchfox.org/mozilla-central/rev/5e4d4827aa005d031580d2d17a01bae1af138b2e/layout/style/Loader.cpp#1408-1411

Which are not always true I think.

In particular, we may not always do a non-system load without an
associated DOM node. For link headers, we use the document loader, but
there's no DOM node to get a hand to. In those cases, before this patch
we're currently loading using the system principal, which seems wrong.

Differential Revision: https://phabricator.services.mozilla.com/D77614
2020-06-08 09:11:26 +00:00
Simon Giesecke ebbc7ae838 Bug 1642989 - Use RemoveLastElements instead of RemoveElementsAt where possible. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D78049
2020-06-08 08:50:15 +00:00
Simon Giesecke f5561f73b7 Bug 1642988 - Add RemoveLastElements function. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D78048
2020-06-08 08:49:13 +00:00
Simon Giesecke 13502cf27c Bug 1642991 - Use RemoveElementsBy where easily possible. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D78055
2020-06-08 09:01:48 +00:00
Mihai Alexandru Michis 51f5a7ede6 Backed out changeset a4d1e2c3ba9e (bug 1639153) for causing bustages in WasmFrameIter.cpp
CLOSED TREE
2020-06-08 12:07:09 +03:00
Dmitry Bezhetskov 0356cded2f Bug 1639153 - change call_indirect signature check to happen after frame is pushed r=lth,wingo
Move call_indirect's signature check after pushing the frame. We are going to start to implement trampolines as inline code in call_indirect and so, we will push frame and only then tail call to one of the function entries.

Differential Revision: https://phabricator.services.mozilla.com/D75924
2020-06-08 08:27:32 +00:00
Matt Woodrow 73198a7be9 Bug 1638711 - Mark WPTs that incorrectly expect synchronous security checks as failing. r=asuth
Depends on D77954

Differential Revision: https://phabricator.services.mozilla.com/D77955
2020-06-03 21:39:54 +00:00
Matt Woodrow 52d72e0243 Bug 1638711 - Report correct error code in DocumentLoadListener if AsyncOpen fails. r=jya,necko-reviewers,valentin
Depends on D77171

Differential Revision: https://phabricator.services.mozilla.com/D77954
2020-06-08 07:29:58 +00:00
Matt Woodrow 13ce354803 Bug 1638711 - Call DisplayLoadError for NS_ERROR_DOM_BAD_URI during EndPageLoad, since we would also have done this for the same error during AsyncOpen. r=nika,ckerschb
Previously we called DisplayLoadError with NS_ERROR_DOM_BASE_URI for errors detected during AsyncOpen, but not for asynchronous errors, and this patch queue changed when some security errors happen to be asynchronous.

GeckoView has tests that require DisplayLoadError to be called (which allows for a custom error page to be loaded). Unfortunately, doing so breaks existing gecko tests, since the method of detecting a blocked load fails when GeckoView loads a custom error page.

Differential Revision: https://phabricator.services.mozilla.com/D77171
2020-06-08 08:07:20 +00:00
Matt Woodrow c7903214dd Bug 1638711 - Mark WPT as passing. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75726
2020-06-02 23:05:23 +00:00
Matt Woodrow 4ab22a6779 Bug 1638711 - Convert tests that try to install a content policy for Document loads to use SpecialPowers.loadChromeScript to do so in the parent process. r=kmag,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D76616
2020-06-02 23:05:21 +00:00
Matt Woodrow da103bf71e Bug 1638711 - Fix test_CSP to detect CSP events from the parent process. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75723
2020-06-02 23:04:15 +00:00
Matt Woodrow 42d2c9c863 Bug 1638711 - Allow test_frameNavigation to use the error event to detect when a load was blocked. r=ckerschb
The current state is that we fire error events for content blocking if the error happens synchronously and src was set when the iframe was in-document, or if the error happens asynchronously (from the parent process).
This test is currently setting src before appending the iframe to the document, and thus was expecting no error event to be fired. We have other content security tests that do rely on the error event being fired.

Since we're doing security checks in the parent, the error event now fires, and this changes the test to report success in that case.

Differential Revision: https://phabricator.services.mozilla.com/D75722
2020-06-02 23:04:05 +00:00
Matt Woodrow 2bc02b9b7a Bug 1638711 - Update WindowGlobalParent's copy of ClientInfo when we mutate it on the window. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D75721
2020-06-02 23:03:52 +00:00
Matt Woodrow 7148736309 Bug 1638711 - Do document security checks in parent process. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-06-02 23:03:40 +00:00
Lars T Hansen e34701fc0d Bug 1641140 - Implement the .bitmask instructions. r=jseward
For general background see the bug's description.  This patch
implements the iNxM.bitmask instructions for x86+x64 in baseline+ion,
and adds some simple test cases.

Differential Revision: https://phabricator.services.mozilla.com/D77784
2020-06-08 08:02:37 +00:00
Lars T Hansen 0cda75506a Bug 1642589 - Pull in new wat crate. r=rhunt
Differential Revision: https://phabricator.services.mozilla.com/D78226
2020-06-08 08:01:13 +00:00
Lars T Hansen db2f9302ac Bug 1642909 - Do not scalarize i64x2.mul on x64/x86. r=jseward
This is mostly code removal: we remove the platform-specific lowering
and code generation for scalarized i64x2.mul.  In its place we use
Andrew Brown's code for a platform-agnostic SIMD implementation, this
fits in very neatly in the existing code generation pipeline.

Differential Revision: https://phabricator.services.mozilla.com/D78015
2020-06-08 07:57:41 +00:00
Mark Banner 326908e0f8 Bug 1643679 - Remove unused items around 'searchplugins' directory as that is no longer used. r=daleharvey
Differential Revision: https://phabricator.services.mozilla.com/D78511
2020-06-08 07:52:48 +00:00
chocos d54fbc708f Bug 1622678 - Remove dom/browser-element to make it flake8 compliant.r=sylvestre
Differential Revision: https://phabricator.services.mozilla.com/D78616
2020-06-08 07:50:18 +00:00
Julian Descottes d094d39cb7 Bug 1643269 - Wait for TABS update in browser_aboutdebugging_tab_zombietab r=daisuke
Differential Revision: https://phabricator.services.mozilla.com/D78476
2020-06-08 07:23:12 +00:00
Cameron McCormack 2b522290ef Bug 1634393 - Resolve <textPath> href local references against document URL, not base URL. r=longsonr
Differential Revision: https://phabricator.services.mozilla.com/D78627
2020-06-08 06:06:26 +00:00
Christoph Kerschbaumer fbce1c6145 Bug 1633338: Use IsPotentiallyTrustworthy to indicate top level window is secure for mixed content blocker. r=baku
Differential Revision: https://phabricator.services.mozilla.com/D75939
2020-06-08 07:05:16 +00:00
Valentin Gosu b970921b67 Bug 1640091 - Make sure DNS requests originating from PAC scripts use TRR_DISABLED_MODE r=kershaw,necko-reviewers
I also considered setting a flag if a PAC query originates from a
TRR service channel but that doesn't work because of this:
1. We try to load test.com -> PAC script
2. We try to load TRR channel -> PAC script with DISABLE_TRR flag
3. PAC thread is still blocked on resolving test.com - we exit early
   regardless of flag

Differential Revision: https://phabricator.services.mozilla.com/D78526
2020-06-08 06:57:31 +00:00
Valentin Gosu 42d7490489 Bug 1640091 - Make sure we TRRServiceChannel::mProxyRequest is initialized and used r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78525
2020-06-08 06:57:23 +00:00
Valentin Gosu b0af883a42 Bug 1640091 - Add test for using PAC script with TRR r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78524
2020-06-08 06:57:15 +00:00
Andreea Pavel eb72b7bc89 Bug 1642084 - disable browser_undo_close_tabs.js on multiple platforms r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D78593
2020-06-07 09:27:14 +00:00
Nicolas Chevobbe 35b97af64a Bug 1641590 - Fix reps css.
c5677f25eba5 only modified the generated CSS file, not the original one.

Differential Revision: https://phabricator.services.mozilla.com/D78632
2020-06-08 06:45:14 +00:00
Bogdan Tara ed2d35e67b Backed out changeset 578160fb0ac3 (bug 1639153) for WasmFrameIter.cpp related bustage CLOSED TREE 2020-06-08 09:46:52 +03:00
Dmitry Bezhetskov 5ed26e86b3 Bug 1639153 - change call_indirect signature check to happen after frame is pushed r=lth,wingo
Move call_indirect's signature check after pushing the frame. We are going to start to implement trampolines as inline code in call_indirect and so, we will push frame and only then tail call to one of the function entries.

Differential Revision: https://phabricator.services.mozilla.com/D75924
2020-06-08 05:31:50 +00:00
Timothy Nikkel a1a2512d01 Bug 1632268. Take into account resolution when position select drop downs and form autocomplete. r=botond
One note about this solution: it includes the apz callback transform for the root scroll frame of the root content document, but no other apz callback transform that might be on an ancestor of the select element.

Differential Revision: https://phabricator.services.mozilla.com/D78026
2020-06-08 05:45:47 +00:00
Timothy Nikkel 779fc72cff Bug 1632268. Add browser chrome test for select dropdown position with pinch (apz) zooming. r=botond
Differential Revision: https://phabricator.services.mozilla.com/D78025
2020-06-08 05:45:34 +00:00
James Teh b1c5fca60f Bug 1547657: Null check frame in HyperTextAccessible::TextBounds. r=MarcoZ
Differential Revision: https://phabricator.services.mozilla.com/D78631
2020-06-08 05:11:23 +00:00
James Teh 58a574a9c2 Bug 1642568: accessible/tests/mochitest/role/test_aria.html: Wait for a11y load when opening the chrome window. r=MarcoZ
Even though we previously waited for the DOM load event, the a11y tree probably wasn't ready yet.

Differential Revision: https://phabricator.services.mozilla.com/D78630
2020-06-08 05:06:39 +00:00
Narcis Beleuzu c4c6cd3a30 Backed out changeset c324ff9bf17e (bug 1643504) for breaking Docker Images. CLOSED TREE 2020-06-08 02:01:41 +03:00
Mike Hommey 75e08f6365 Bug 1643504 - Upgrade release-notify-started tasks to Debian buster. r=Callek
Differential Revision: https://phabricator.services.mozilla.com/D78430
2020-06-07 22:29:17 +00:00
Mike Hommey 266e2a5a8c Bug 1643504 - Build wine on Debian buster. r=nalexander
Differential Revision: https://phabricator.services.mozilla.com/D78428
2020-06-07 22:29:15 +00:00
Mike Hommey 2acf07e0d0 Bug 1643504 - Upgrade Windows searchfox task to Debian buster. r=kats
Differential Revision: https://phabricator.services.mozilla.com/D78431
2020-06-07 22:29:07 +00:00
Mike Hommey 65b8d3beb1 Bug 1643504 - Upgrade the Linux64 generate-profile task to Debian buster. r=firefox-build-system-reviewers,rstewart
Differential Revision: https://phabricator.services.mozilla.com/D78427
2020-06-07 22:29:05 +00:00
Mike Hommey 33f75a13db Bug 1643504 - Upgrade Windows cross builds to Debian buster. r=firefox-build-system-reviewers,rstewart
Differential Revision: https://phabricator.services.mozilla.com/D78426
2020-06-07 22:29:02 +00:00
Mike Hommey 80c76c5881 Bug 1643504 - Upgrade Linux plain builds to Debian buster. r=firefox-build-system-reviewers,rstewart
Differential Revision: https://phabricator.services.mozilla.com/D78425
2020-06-07 22:29:00 +00:00
Mike Hommey a79f981981 Bug 1643504 - Upgrade mingw build docker image to Debian buster. r=firefox-build-system-reviewers,rstewart
Differential Revision: https://phabricator.services.mozilla.com/D78424
2020-06-07 22:28:58 +00:00
Mike Hommey bcf92befab Bug 1643504 - Upgrade partner repack docker image to Debian buster. r=bhearsum
Differential Revision: https://phabricator.services.mozilla.com/D78423
2020-06-07 22:28:55 +00:00
Mike Hommey 4e9162942f Bug 1643504 - Upgrade custom-v8 docker image to Debian buster. r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D78420
2020-06-07 22:28:58 +00:00
Mike Hommey 563675005b Bug 1643504 - Upgrade android build docker images to Debian buster. r=nalexander
Differential Revision: https://phabricator.services.mozilla.com/D78418
2020-06-07 22:28:57 +00:00
Masayuki Nakano 72a41b4a70 Bug 1636855 - Disallow to paste longer text than `maxlength` value except in Nightly channel and early Beta r=emilio
Fix of bug 1320229 allowed to paste longer text than `maxlength` attribute of
`<input>` and `<textarea>` because it was thought that the longer text causes
"too long" invalidate state, makes users notified and prevent to submit
form data.

However, according to Bug 1636855 comment 7 (*1), it breaks a major enterprise
web app, SAP, at least because it sends form data without checking validity of
each form data and discards invalid data on server side silently.

According to bug 1636855 comment 24 (*2), one of new behavior's fault is
on Gecko side too.  The style of `<input>` element or `<textarea>` element
which has too long text after pasting is changed when it loses focus.
Therefore, users can post the data before they know pasted data is too
long if sending the form data with `Enter` key or something immediately
after pasting (i.e., without moving focus) web apps handle it by themselves.

On the other hand, the original bug report, bug 1320229, should be solved in
the future especially in password field because users may register password
which is cut by `maxlength` silently and they don't use builtin password
manager, only the pasted password is saved, and then, they won't be able to
login as the account.  This is really long standing issue of the web forms.
An article (*3) warned this to web developers in 2011.  Therefore, we should
keep going advance for solving this issue at least in Nightly channel to get
more feedback from testers and web developers.

1 https://bugzilla.mozilla.org/show_bug.cgi?id=1636855#c7
2 https://bugzilla.mozilla.org/show_bug.cgi?id=1636855#c24
3 https://www.christophermanning.org/writing/dont-use-maxlength-on-password-inputs

Differential Revision: https://phabricator.services.mozilla.com/D78613
2020-06-07 21:29:48 +00:00
Andrei Oprea 2897696021 Bug 1643758 - Land strings for What's New Panel content in Firefox 78 r=flod,fluent-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78550
2020-06-05 18:31:36 +00:00