Commit graph

2207 commits

Author SHA1 Message Date
Michael Layzell
d53091c307 Bug 1314792 - Extract process changing logic into nsContentUtils::GetDocShellProcessLock, r=bkelly
MozReview-Commit-ID: FI0pIvHPN0h
2016-11-04 13:40:55 -04:00
Ting-Yu Lin
904617e77f Bug 1310509 - Call NotifyAsyncPanZoomStarted/Stopped on document containing current scrolling content. r=kats
We now call NotifyAsyncPanZoomStarted/Stopped precisely on the document
which is being transformed, so we no longer need to notify the child
docshells which was added in Bug 1088559.

Remove the |nsIDocument| argument for ProcessAPZStateChange(), which is not
used anymore.

mActiveAPZTransforms added in bug 1142926 is removed because AccessibleCaret
is the only consumer for AsyncPanZoomStarted/Stopped, and it now defaults to
always show while scrolling, i.e.
"layout.accessiblecaret.always_show_when_scrolling" defaults to true. And I
cannot reproduce the bug even if I turn off the preference.

MozReview-Commit-ID: DiEk2gCIHn2
2016-11-04 22:27:02 +08:00
Michael Layzell
0ae1d338c3 Bug 1313739 - Move TabGroup into its own file, seperate from DocGroup, r=bkelly
MozReview-Commit-ID: AndPWOBpkox
2016-10-31 13:40:36 -04:00
Michael Layzell
c72ea0d3f1 Bug 1310778 - Move TabGroup and GetDocGroup accessors onto nsPIDOMWindow{Inner,Outer}, r=smaug
MozReview-Commit-ID: Hl0QVktr0Lw
2016-10-28 15:38:28 -04:00
Michael Layzell
76969f2737 Bug 1310345 - Change FindChildWithName and related methods to take nsAString& instead of char16_t*, r=bz
MozReview-Commit-ID: 4aQwYX9ObcN
2016-10-27 15:53:35 -04:00
Michael Layzell
029a7def5d Bug 1303196 - Part 3: Update the named window resolution logic to be scoped to TabGroup instead of being process-global, r=bz
MozReview-Commit-ID: FaGoj6wmEuG
2016-10-27 15:53:35 -04:00
Michael Layzell
f9eea2d135 Bug 1303196 - Part 2: Connect the DocGroup and TabGroup objects to nsGlobalWindow and nsDocument, ensuring that Opener is set early enough that it is correct, r=smaug
MozReview-Commit-ID: 3rZfLw3dXkF
2016-10-27 15:53:35 -04:00
Ben Kelly
0983850a63 Bug 1303167 P6 Rename new suspend and freeze methods to final names. r=smaug 2016-10-26 10:20:16 -07:00
Ben Kelly
bf0ca72f77 Bug 1303167 P2 Use new window suspend and freeze methods. r=smaug
* * *
Bug 1303167 P2 interdiff 0001 Review feedback
2016-10-26 10:20:15 -07:00
Ehsan Akhgari
98fb5e2107 Bug 1312527 - Promote docshell private browsing assertions to diagnostic asserts; r=baku
This will allow us to catch these assertions failing in non-debug
builds on our pre-release channels.
2016-10-25 09:28:40 -04:00
Boris Zbarsky
34454ebcd3 Bug 1222516 part 4. Implement support for rel=noopener on links. r=mconley 2016-10-20 16:52:39 -04:00
Boris Zbarsky
d53cc929eb Bug 1222516 part 3. Rejigger our rel="noreferrer" support to avoid setting an opener altogether instead of setting one and then nulling it out. r=mconley 2016-10-20 16:52:38 -04:00
Ehsan Akhgari
4a51ebacfa Bug 1310378 - Remove support for mozwidget; r=baku 2016-10-17 13:15:36 -04:00
Ehsan Akhgari
e2fdfd7548 Bug 1310366 - Remove support for app redirects; r=baku 2016-10-17 13:15:36 -04:00
Ehsan Akhgari
ceb6c867f9 Bug 1310350 - Fix the return value of nsDocShell::GetInheritPrivateBrowsingId(); r=baku
This function was mistakenly returning mPrivateBrowsingId instead of
mInheritPrivateBrowsingId.  Thankfully this function isn't being used
anywhere yet.
2016-10-17 10:05:12 -04:00
Christoph Kerschbaumer
a14cba1726 Bug 1303943: Don't inherit principal for external loads and update documentation for principalToInherit. r=bz 2016-10-14 20:08:21 +02:00
Ehsan Akhgari
69dce6c397 Bug 1310101 - Remove nsILoadContext::IsAppOfType; r=baku 2016-10-14 10:45:27 -04:00
Sebastian Hengst
700f9d4edf Backed out changeset 07f70194e136 (bug 1303943) for tests crashing related to sessionhistory. r=backout on a CLOSED TREE 2016-10-14 12:53:09 +02:00
Christoph Kerschbaumer
12c0c49d7e Bug 1303943 - Don't inherit principal for external loads and update documentation for principalToInherit. r=bz 2016-10-13 15:13:40 +02:00
Carsten "Tomcat" Book
1615c5d144 Backed out changeset 9ae5fb774393 (bug 1297338) landed with wrong bug number 2016-10-14 08:44:00 +02:00
Christoph Kerschbaumer
f3cb1ffcb6 Bug 1297338 - Don't inherit principal for external loads and update documentation for principalToInherit. r=bz 2016-10-13 15:13:40 +02:00
Eric Rahm
f52b26bf1d Bug 1308611 - Convert nsISHEntry.refreshURIList to nsIMutableArray. r=bz
|refreshURIList| is converted to a an nsIMutableArray as nsISupportsArray is
deprecated. This attribute is only used internally and does not show up in a
textual search of the plugins repo.

nsIMutableArray is used rather than nsIArray in order to support modifying the
array as current users expect.

MozReview-Commit-ID: F0GYVFZarOQ
2016-10-10 11:36:41 -07:00
Yoshi Huang
a43d017190 Bug 1264137 - Part 4: Improve the usefulness of what we pass as requestingContext to nsIContentPolicy for navigations (loads in a docshell). r=bz
For toplevel document loads (TYPE_DOCUMENT) in the content process,
we pass the currently-loaded window, if any.

For toplevel document loads in the chrome process (e.g. tabs in non-e10s mode),
we pass the node which created our docshell, if any.

For all subframe loads, we pass the node that created the docshell,
which is the frameElement of the window in the docshell.
2016-10-07 17:40:21 +08:00
Yoshi Huang
06ba09a073 Bug 1264137 - Part 3: perform ContentPolicy check if the load is happening on this docshell. r=bz, smaug 2016-10-07 17:40:21 +08:00
Yoshi Huang
351ea50d4c Bug 1264137 - Part 2: use isTargetTopLevelDocShell instead. r=bz
In Bug 841850 we added a !isNewDocShell check.
And In Bug 902350 we added a !isTargetTopLevelDocShell check.
We can get rid of isNewDocShell variable and just keep track of
isTargetTopLevelDocShell.
2016-10-07 17:40:21 +08:00
Yoshi Huang
a1cdd18cb8 Bug 1264137 - Part 1: rename from loadingPrincipal to requestingPrincipal in nsDocShell::InternalLoad. r=bz
In nsIContentPolicy terminology, it uses 'requestingPrincipal'.
So in nsDocShell::InternalLoad, we rename 'loadingPrincipal' to
'requestingPrincipal', and rename 'context' to 'requestingContext' when
calling nsIContentPolicy.
2016-10-07 17:40:21 +08:00
Christoph Kerschbaumer
fcc4788550 Bug 1307720 - Assert that docshell loads of TYPE_SUDOCUMENT always get a valid principal. r=tanvi 2016-10-05 14:24:38 +02:00
Samael Wang
104fe2c997 Bug 1300461 - UpdateIndex on LOAD_NORMAL_REPLACE, ReplaceEntry at requestedIndex when available. r=smaug
--HG--
extra : rebase_source : 9bb3c7488a1785ee5c4106b8e024555f31b3220c
2016-09-30 11:55:10 +08:00
James Andreou
a47ce92ac2 Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans 2016-09-27 16:56:44 -04:00
Kate McKinley
c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Christoph Kerschbaumer
bc9a70d964 Bug 1297338 - Introduce concept of principalToInherit to docshell and scriptSecurityManager. r=bz 2016-09-20 08:36:25 +02:00
Bill McCloskey
50c44c717c Bug 1279086 - Allow painting for tab switch when JS is running (r=dvander,mconley,mrbkap) 2016-09-16 20:35:11 -07:00
Kris Maglione
afd82f6743 Bug 1294199: Part 1 - Add a docShell flag to allow legacy panels to skip inheriting origin attributes. r=ehsan
MozReview-Commit-ID: 1c6V0kv9E38

--HG--
extra : rebase_source : 9a9ab21a41a8a235378ff7a21dccbf9de37a5499
2016-09-15 13:47:55 -07:00
Blake Kaplan
8aeb3f91d9 Bug 623436 - Deal a little better with replacing inexistant session history entries. r=smaug
--HG--
extra : source : 20c734f8107e43e15ae11abae1d6a6e985510d93
2016-09-08 15:34:31 -07:00
Carsten "Tomcat" Book
656d6db419 Merge mozilla-central to mozilla-inbound 2016-09-07 17:21:27 +02:00
Carsten "Tomcat" Book
1c61ba654e merge mozilla-inbound to mozilla-central a=merge 2016-09-07 17:20:12 +02:00
Michael Layzell
e583117bfa Bug 1018486 - Part 5: Changes in docshell/ and uriloader/, r=bz
MozReview-Commit-ID: GiyHWL3aaOv
2016-09-07 10:50:41 -04:00
Matteo Ferretti
46b536cd2f Bug 1299154 - added Set/GetOverrideDPPX to restorefromHistory; r=mstange
MozReview-Commit-ID: AsyAcG3Igbn
2016-09-07 10:21:51 +02:00
Xidorn Quan
fcb403fc25 Bug 1299795 - Disable fullscreen for sidebar. r=smaug
MozReview-Commit-ID: G09fKdufKW3

--HG--
extra : source : d9b03fdeb466e280d6ba392d98c3aec3f281db4d
2016-09-07 09:13:14 +08:00
Yoshi Huang
10b437080c Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug 2016-09-06 10:25:58 +08:00
Sebastian Hengst
c9519f7c29 Backed out changeset b9afda2804fd (bug 1260931) 2016-09-05 21:15:29 +02:00
Yoshi Huang
6cca1d0c54 Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug 2016-09-06 01:50:30 +08:00
Sebastian Hengst
df3ad10e28 Backed out changeset 10da0eca7bbb (bug 1260931) 2016-09-02 15:33:51 +02:00
Sebastian Hengst
31c5f85098 Backed out 5 changesets (bug 1260931)
Backed out changeset 86e1a437021b (bug 1260931)
Backed out changeset be65e87da9e3 (bug 1260931)
Backed out changeset 39cff1d988fd (bug 1260931)
Backed out changeset 2fa7c4d8a5bc (bug 1260931)
Backed out changeset 075d612841fb (bug 1260931)
2016-09-02 14:55:59 +02:00
Sebastian Hengst
5bbaac898b Backed out changeset 10da0eca7bbb (bug 1260931) 2016-09-02 14:38:42 +02:00
Yoshi Huang
88b9430165 Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug 2016-09-02 15:04:40 +08:00
Nicholas Nethercote
b71747b2ac Bug 1299727 - Rename NS_WARN_IF_FALSE as NS_WARNING_ASSERTION. r=erahm.
The new name makes the sense of the condition much clearer. E.g. compare:

  NS_WARN_IF_FALSE(!rv.Failed());

with:

  NS_WARNING_ASSERTION(!rv.Failed());

The new name also makes it clearer that it only has effect in debug builds,
because that's standard for assertions.

--HG--
extra : rebase_source : 886e57a9e433e0cb6ed635cc075b34b7ebf81853
2016-09-01 15:01:16 +10:00
Nicholas Nethercote
c94421bf7c Bug 1297961 (part 2) - Use nsIURI::GetSpecOrDefault() for comparisons to fixed URIs. r=hurley.
--HG--
extra : rebase_source : c742ded3ca4ff6ddf745cf8d720261624f172027
2016-08-26 16:02:32 +10:00
Nicholas Nethercote
742fc7eb48 Bug 1297961 (part 1) - Introduce nsURI::GetSpecOrDefault(). r=hurley.
This function is an infallible alternative to nsIURI::GetSpec(). It's useful
when it's appropriate to handle a GetSpec() failure with a failure string, e.g.
for log/warning/error messages. It allows code like this:

  nsAutoCString spec;
  uri->GetSpec(spec);
  printf("uri: %s", spec.get());

to be changed to this:

  printf("uri: %s", uri->GetSpecOrDefault().get());

This introduces a slight behavioural change. Previously, if GetSpec() failed,
an empty string would be used here. Now, "[nsIURI::GetSpec failed]" will be
produced instead. In most cases this failure string will make for a clearer
log/warning/error message than the empty string.
* * *
Bug 1297961 (part 1b) - More GetSpecOrDefault() additions. r=hurley.

I will fold this into part 1 before landing.

--HG--
extra : rebase_source : ddc19a5624354ac098be019ca13cc24b99b80ddc
2016-08-26 16:02:31 +10:00
Wei-Cheng Pan
9a0fc7767f Bug 1293212 - Add MOZ_MUST_USE to prevent potential bugs. r=smaug
MozReview-Commit-ID: EuyeBkDlk2G

--HG--
extra : rebase_source : de8d5a95f74b757b7441cdc1e0f2dadb3a77ac6e
2016-08-08 18:16:15 +08:00
Kan-Ru Chen
b6d880aca1 Bug 1297276 - Rename mfbt/unused.h to mfbt/Unused.h for consistency. r=froydnj
The patch is generated from following command:

  rgrep -l unused.h|xargs sed -i -e s,mozilla/unused.h,mozilla/Unused.h,

MozReview-Commit-ID: AtLcWApZfES


--HG--
rename : mfbt/unused.h => mfbt/Unused.h
2016-08-24 14:47:04 +08:00
Ryan VanderMeulen
a99793373f Merge m-c to inbound. a=merge 2016-08-22 09:43:40 -04:00
Xidorn Quan
33700e24af Bug 1296625 - Replace query to ui.use_activity_cursor pref with a cached bool value. r=smaug
MozReview-Commit-ID: GeTr29JG4qy

--HG--
extra : rebase_source : 2a74d2ca0ffe8fee23230334e01b483cc3abc8f2
2016-08-20 00:43:01 +10:00
Fernando Jimenez
16126fcd4e Bug 1252570 - Remove mozPay. r=ehsan,mfinkle,fabrice
MozReview-Commit-ID: C50fvuNJoGq
2016-08-22 10:42:22 +02:00
Nicholas Nethercote
67af4817e9 Bug 1293596 (part 2) - Rework nsIWidget bounds getters. r=mstange.
This patch makes GetBounds(), GetScreenBounds() and GetClientBounds() more
obviously infallible, like existing functions such as GetNaturalBounds() and
GetClientSize(). This results in clearer behaviour in nsCocoaWindow.mm if
Objective C exceptions occur. Along the way, the patch removes some useless
failure checks for these functions.

The patch also removes the NS_IMETHOD from GetRestoredBounds and makes that
function MOZ_MUST_USE.
2016-08-19 09:03:04 +10:00
dimi
9f35496517 Bug 1269253 - Blank error page in iframe with insecure connection. r=smaug
MozReview-Commit-ID: 8WCI8cgRZIo

--HG--
extra : rebase_source : fda416da14b9d60937cd5d86976b443d92d1e0bb
2016-08-16 09:47:14 +08:00
Nicholas Nethercote
3b0485fcdb Bug 1294645 - Don't use NS_CALLBACK for callbacks in nsI{Input,Output,UnicharInput},Stream.idl. r=froydnj.
Slightly less than half (93 / 210) of the NS_METHOD instances in the codebase
are because of the use of NS_CALLBACK in
nsI{Input,Output,UnicharInput},Stream.idl. The use of __stdcall on Win32 isn't
important for these callbacks because they are only used as arguments to
[noscript] methods.

This patch converts them to vanilla |nsresult| functions. It increases the size
of xul.dll by about ~600 bytes, which is about 0.001%.

--HG--
extra : rebase_source : c15d85298e0975fd030cd8f8f8e54501f453959b
2016-08-12 17:36:22 +10:00
Wes Kocher
e9097643d5 Merge inbound to central, a=merge 2016-08-12 13:44:29 -07:00
Nicholas Nethercote
bab6d17ebf Bug 1293117 (part 4) - Change many NS_IMETHODIMP occurrences to NS_IMETHOD. r=froydnj.
This patch makes the following changes on many in-class methods.

- NS_IMETHODIMP F() override;      --> NS_IMETHOD F() override;
- NS_IMETHODIMP F() override {...} --> NS_IMETHOD F() override {...}
- NS_IMETHODIMP F() final;         --> NS_IMETHOD F() final;
- NS_IMETHODIMP F() final {...}    --> NS_IMETHOD F() final {...}

Using NS_IMETHOD is the preferred way of marking in-class virtual methods.
Although these transformations add an explicit |virtual|, they are safe --
there's an implicit |virtual| anyway because |override| and |final| only work
with virtual methods.

--HG--
extra : rebase_source : 386ee4e4ea2ecd8d5001efabc3ac87b4d6c0659f
2016-08-08 10:54:47 +10:00
James Andreou
3585e16752 Bug 1283281 - Remove PB Flag from DOMStorage. r=jdm 2016-06-29 14:01:00 +02:00
Nicholas Nethercote
e7f10a07fd Bug 1293603 (part 2) - Make Run() declarations consistent. r=erahm.
This patch makes most Run() declarations in subclasses of nsIRunnable have the
same form: |NS_IMETHOD Run() override|.

As a result of these changes, I had to add |override| to a couple of other
functions to satisfy clang's -Winconsistent-missing-override warning.

--HG--
extra : rebase_source : 815d0018b0b13329bb5698c410f500dddcc3ee12
2016-08-08 12:18:10 +10:00
Andrew McCreight
18b7a1fc2f Bug 1293666 - Add initializer_list ctor to AutoTArray. r=froydnj
MozReview-Commit-ID: 8ORBttWN2Rj

--HG--
extra : rebase_source : 9ad6ae8aff9cbc81c773297d0bb2f7478fb3516e
2016-08-09 07:21:26 -07:00
Yoshi Huang
f9754e4544 Bug 1264231 - Part 1: inherit OA from docshell. r=sicking 2016-08-05 19:44:57 +08:00
Christoph Kerschbaumer
caedb13ef1 Bug 1286472: Replace owner with triggeringPrincipal within docshell. r=bz 2016-07-28 09:20:41 +02:00
Iris Hsiao
caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley
c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao
a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley
567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Christoph Kerschbaumer
d872b01ebc Bug 1181370: Update CheckURL to set the incumbent document's principal as the triggeringPrincipal. r=bz 2016-07-26 12:46:01 +02:00
Carsten "Tomcat" Book
25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley
01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book
0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley
547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Chris Peterson
b175c9fdd5 Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo 2016-07-20 22:03:25 -07:00
Kartikaya Gupta
eb68bbaaa8 Bug 970346 - Add a DocShell attribute to override the default touch event options to a tab. r=bz
MozReview-Commit-ID: 4BdhwQRBavd
2016-07-18 10:26:38 -04:00
Nicholas Nethercote
2ebfc5116b Bug 1197973 - Use MOZ_MUST_USE in AutoJSAPI. r=bz. 2016-07-14 13:18:11 +10:00
Xidorn Quan
63da0d4ab2 Bug 1286719 - Turn bool flags in nsDocShell into bit fields. r=bz
Two bools are not converted because they are used with AutoRestore.

MozReview-Commit-ID: AjU61eiMtlQ

--HG--
extra : rebase_source : d1706adc6f14a1a93d1461dd22df0a95043fcca4
2016-07-14 10:47:39 +10:00
Yoshi Huang
e24cc195d9 Bug 1274893 - remove -forbid- list from SafeBrowsing. r=francois 2016-07-11 16:11:32 +08:00
Xidorn Quan
a90f7b0ea8 Bug 1283526 part 2 - Remove fullscreen sandbox flag. r=smaug
MozReview-Commit-ID: 5qH4gZxvNQz

--HG--
extra : rebase_source : fdc1fea2996b259a65c3068cd10fffccf6c5ebdb
2016-07-05 09:46:55 +10:00
Xidorn Quan
dc193d9f49 Bug 1283526 part 1 - Revert behavior of allowfullscreen attribute for non-sandboxed iframe. r=smaug
MozReview-Commit-ID: BayA4tQBsfC

--HG--
extra : rebase_source : 17818546cd0c1ec971412346d6e32d537442dd26
2016-07-04 10:19:35 +10:00
Masatoshi Kimura
e4ae8f8bff Bug 1282038 - Allow allowfullscreen for rewritten YouTube Flash embeds. r=qdot,jst
MozReview-Commit-ID: I8y0gMA5BxE

--HG--
rename : dom/base/test/test_youtube_flash_embed.html => dom/base/test/file_youtube_flash_embed.html
2016-06-24 19:12:53 +09:00
Carsten "Tomcat" Book
c1cb5a12bd Backed out changeset 00312b136937 (bug 968273) for causing regressions 2016-06-28 10:03:25 +02:00
Xidorn Quan
0c0d683ac3 Bug 1279613 - Apply fullscreen enabled flag to about:blank as well. r=smaug
MozReview-Commit-ID: JL3ZIdXpLiX

--HG--
extra : source : 10b1a71568775ba904a916c2cce603337367c582
2016-06-20 07:16:00 +10:00
Andrea Marchesini
dd368c9569 Bug 1279194 - Get rid of nsDOMPerformanceNavigationType, r=smaug 2016-06-10 16:29:46 +02:00
James Andreou
9c2978f1c0 Bug 1278664 - Chrome docshells can't have private browsing OriginAttribute. r=smaug 2016-06-09 07:48:00 +02:00
Andrea Marchesini
1264ad2da5 Bug 1278845 - Move PerformanceNavigation to separate files, r=smaug 2016-06-09 12:44:54 +02:00
Andrea Marchesini
dd6cbdac21 Bug 1271516 - Introducing nsIWebNavigation.setOriginAttributesBeforeLoading, r=smaug 2016-06-07 19:59:22 +02:00
James Andreou
14c6b15018 Bug 1277357 - Remove nsDocShell:SetUsePrivateBrowsing cpp consumers and some JS consumers r=jdm 2016-06-06 07:42:00 +02:00
Phil Ringnalda
035f8773be Back out 32d16086e85e (bug 1271516) for frequent ChromeUtils::IsOriginAttributesEqual assertin failures
CLOSED TREE
2016-06-06 21:07:42 -07:00
Andrea Marchesini
943c6e667c Bug 1271516 - Introducing nsIWebNavigation.setOriginAttributesBeforeLoading, r=smaug 2016-06-07 00:47:13 +02:00
Dragana Damjanovic
87fd6ae3a9 Bug 968273 - On reload load from the original uri, so that all redirects are reloader.r=mayhemer 2016-06-01 11:57:52 +02:00
Carsten "Tomcat" Book
71eb3110f9 merge mozilla-inbound to mozilla-central a=merge 2016-06-03 12:00:06 +02:00
dimi
8d44df2c72 Bug 1258033 - Part 1: Add IsTrackingProtectionOn for nsILoadContext. r=smaug
MozReview-Commit-ID: 2eQzO6KDLyX

--HG--
extra : rebase_source : 1f5c1c7b250336ff4ecf1e5b3949a532b7bb9144
2016-06-02 10:12:39 +08:00
Mats Palmgren
4e63c1e0cf Bug 881832 - Make inner document reflow asynchronous. r=tnikkel 2016-05-12 12:07:45 +12:00
Patrick McManus
c0638a1abc Bug 1274729 - corrupted content string management r=dragana 2016-05-23 10:12:31 -04:00
Phil Ringnalda
6bb0bc4494 Back out 6 changesets (bug 881832) for failures in test_Debugger.Source.prototype.element.html
CLOSED TREE

Backed out changeset fac50ce10b07 (bug 881832)
Backed out changeset 32e01c144cd4 (bug 881832)
Backed out changeset 779f5336b81e (bug 881832)
Backed out changeset 95efd250e29f (bug 881832)
Backed out changeset 7fe79f07189f (bug 881832)
Backed out changeset 8ee1824f2a57 (bug 881832)
2016-05-23 18:34:49 -07:00
Makoto Kato
da66cc7e43 Bug 1177943 - Part 4. Implement remote nsICommandWithParams. r=smaug
MozReview-Commit-ID: LbokIF1rWZX
2016-04-20 19:12:27 +09:00
Mats Palmgren
fdb3066641 Bug 881832 - Make inner document reflow asynchronous. r=tnikkel 2016-05-12 12:07:45 +12:00
Samael Wang
d6e0c31eda Bug 1271240 - Part 1: Support prerender flag in e10s and implement makePrerenderedBrowserActive(). r=smaug
MozReview-Commit-ID: 73E2kmqxRwm

--HG--
extra : rebase_source : 35441f58e15013b00a0774f764378fd5e0143add
2016-05-20 11:36:27 +08:00
Gijs Kruitbosch
23ed0206bf Bug 1273255 - Don't try alternate URIs at the end of pageload if the channel was redirected: we don't want to be applying that sort of fixup to the redirect target URI. r=smaug 2016-05-19 22:29:04 +01:00