Commit Graph

3798 Commits

Author SHA1 Message Date
Andrew Osmond
7c0050f3a5 Bug 1684991 - Start the RDD process early. r=media-playback-reviewers,alwu
This patch makes it so that we launch the RDD process relatively early
in the Firefox startup. This will improve the latency when we began
playback for the first video.

Differential Revision: https://phabricator.services.mozilla.com/D229427
2024-11-19 02:31:01 +00:00
Paul Zuehlcke
617efd9bd8 Bug 1926591 - PreferencesCleaner support for OriginAttributesPattern. r=mak
Differential Revision: https://phabricator.services.mozilla.com/D221783
2024-11-18 11:40:02 +00:00
Frédéric Wang
05c1c6f8d4 Bug 1909168 - Add fast paths for sink checks when trusted types are not used. r=smaug
This introduces a boolean on nsCSPPolicy / nsIContentSecurityPolicy /
Document that is initially false and only set to true after a
REQUIRE_TRUSTED_TYPES_FOR_DIRECTIVE directive is associated to the
object. This provides fast check and early return when such a directive
is absent:

- TrustedTypeUtils's GetTrustedTypesCompliantString(), currently used by
  Element::SetInnertHTML() and Element::InsertAdjacentHTML().

- nsCSPPolicy::AreTrustedTypesForSinkGroupRequired() currently used by
  ShouldSinkTypeMismatchViolationBeBlockedByCSP() and
  DoesSinkTypeRequireTrustedTypes().

This also makes nsCSPPolicy::hasDirective() fast for
nsIContentSecurityPolicy::REQUIRE_TRUSTED_TYPES_FOR_DIRECTIVE.

Differential Revision: https://phabricator.services.mozilla.com/D226882
2024-11-02 08:09:35 +00:00
Makoto Kato
dc8f6495f8 Bug 1725806 - Part 3. Autocorrect support in InputContext. r=masayuki
Add autocorrect flag to `InputContext` to handle this by widget.

Since autocorrect is on-by-default, `mAutocorrect` is true by constructor.

But, I would like off-by-default in Chrome. Since Chrome UI may not want to
enable autocorrect by default such as bug 1881783.

Differential Revision: https://phabricator.services.mozilla.com/D221571
2024-10-28 17:06:49 +00:00
Andrew Sutherland
a212459d62 Bug 1544232 - Limit lifetime extension of SWs by SWs to the sender's lifetime. r=edenchuang
This patch introduces an explicit concept of lifetimes with mechanisms
in place so that actions taken by Clients (windows or non-ServiceWorker
orkers) will extend the lifetime of a ServiceWorker, but a ServiceWorker
cannot extend the life of another ServiceWorker.

The areas of concern are:
- ServiceWorker.postMessage: With ServiceWorkers exposed on workers and
  the ability to access other registrations via ServiceWorkerContainer
  being exposed, ServiceWorkers can message other ServiceWorkers.  It's
  essential that they never be allowed to give a ServiceWorker a
  lifetime longer than their own.
- ServiceWorkerRegistration.update(): Requesting an update of a
  registration should not allow any installed/updated ServiceWorker to
  have a lifetime longer than the ServiceWorker creating the request.
- ServiceWorkerContainer.register(): Requesting the installation of a
  new ServiceWorker should likewise constrain the lifetime of the newly
  installed ServiceWorker.

Note that in cases where we would potentially spawn a ServiceWorker,
whether it be in response to postMessage or as part of an install or
update, a key criteria is whether the lifetime extends far enough into
the future for us to believe the ServiceWorker can accomplish anything.
Currently we have a constant of 5 seconds against a normal full
lifetime of 30 seconds (before 30 second grace period).  So once a SW
has < 5 seconds of lifetime left, it won't be able to spawn a SW.  Note
that in the case of install/update, we do not prevent the creation of
the job at this time, instead the job will fail during the check script
evaluation step as failure to spawn the ServiceWorker is equivalent to
a script load failure.

A somewhat ugly part of this implementation is that because Bug 1853706
is not yet implemented, our actors that are fundamentally associated
with a global don't have an inherent understanding of their relationship
to that global.  So we approximate that by:
- For postMessage, we always have a ServiceWorkerDescriptor if we are
  being messaged by a ServiceWorker, allowing us direct lookup.
- ServiceWorkerRegistration.update(): In a previous patch in the stack
  we had ServiceWorkerRegistrationProxy latch the ClientInfo of its
  owning global when it was created.  Note that in the case of a
  ServiceWorker's own registration, this will be created at startup
  before the worker hits the execution ready state.
  - Note that because we have at most one live
    ServiceWorkerRegistration per global at a time, and the
    registration is fundamentally associated with the
    ServiceWorkerGlobalScope, that registration and its proxy will
    remain alive for the duration of the global.
- ServiceWorkerContainer.register(): We already were sending the client
  info along with the register call (as well as all other calls on the
  container).

Looking up the ServiceWorker from its client is not something that was
really intended.  This is further complicated by ServiceWorkerManager
being authoritative for ServiceWorkers on the parent process main thread
whereas the ClientManagerService is authoritative on PBackground and
actor-centric, making sketchy multi-threaded maps not really an option.

Looking up the ServiceWorker from a ServiceWorkerDescriptor is intended,
but the primary intent in those cases is so that the recipient of such a
descriptor can easily create a ServiceWorker instance that is
live-updating (by way of its owning ServiceWorkerRegistration; we don't
have IPC actors directly for ServiceWorkers, just the registration).
Adding the descriptor to clients until Bug 1853706 is implemented would
be an exceedingly ugly workaround because it would greatly complicate
the existing plumbing code, and a lot of the code is confusing enough
as-is.

This patch initially adopted an approach of encoding the scope of a
ServiceWorker as its client URL, but it turns out web extension
ServiceWorker support (reasonably) assumed the URL would be the script
URL so the original behavior was restored and when performing our
lookup we just check all registrations associated with the given
origin.  This is okay because register and update calls are inherently
expensive, rare operations and the overhead of the additional checks is
marginal.  Additionally, we can remove this logic once Bug 1853706 is
implemented.

As part of that initial scope tunneling was that, as noted above, we
do sample the ClientInfo for a ServiceWorker's own registration before
the worker is execution-ready.  And prior to this patch, we only would
populate the URL during execution-ready because for most globals, we
can't possibly know the URL when the ClientSource is created.  However,
for ServiceWorkers we can.  Because we also want to know what the id of
the ServiceWorker client would be, we also change the creation of the
ServiceWorker ClientSource so that it uses a ClientInfo created by the
authoritative ServiceWorkerPrivate in its Initialize method.

A minor retained hack is that because the worker scriptloader propagates
its CSP structure onto its ClientInfo (but not its ClientSource, which
feels weird, but makes sense) and that does get sent via register(), we
do also need to normalize the ClientInfo in the parent when we do
equality checking to have it ignore the CSP.

Differential Revision: https://phabricator.services.mozilla.com/D180915
2024-10-24 03:02:42 +00:00
Paul Zuehlcke
4ec61c27cb Bug 1921207 - PushNotificationsCleaner support for OriginAttributesPattern. r=anti-tracking-reviewers,geckoview-reviewers,saschanaz,owlish,timhuang
Differential Revision: https://phabricator.services.mozilla.com/D221336
2024-09-30 12:33:06 +00:00
Mirko Brodesser
03bb30c275 Bug 1907928: part 3) Implement reporting violations for sink type mismatches for Element.insertAdjacentHTML. r=tschuster,smaug,peterv
Differential Revision: https://phabricator.services.mozilla.com/D217442
2024-09-02 13:58:25 +00:00
Timothy Nikkel
7a3f01bbd3 Bug 1912570. Record/warn in reftests/crashtests if compositor is paused or window is fully occluded. r=jwatt
Differential Revision: https://phabricator.services.mozilla.com/D219005
2024-08-23 09:39:55 +00:00
Sean Feng
1b47ab6415 Bug 1863246 - Make the page that enters BFCache not asking the parent process to update the active browsing context r=peterv,dom-core
Currently, when a page enters BFCache, it updates the parent process
for the active BC; however, the page that is about to show will do the
same. These two operations are triggered in different processes with
different active id, they are racy and problematic.

This patch fixes the above issue by not updating the parent process
when a page enters BFCache.

This only applies to BFCacheInParent is enabled.

Differential Revision: https://phabricator.services.mozilla.com/D215818
2024-08-14 19:48:17 +00:00
Emilio Cobos Álvarez
198c331213 Bug 1910698 - Add a struct to represent JS caller location and more general warning source location. r=smaug,necko-reviewers,anti-tracking-reviewers,dom-storage-reviewers,pbz,kershaw,janv
Use it liberally across the tree. This could be cleaned up even more in the future.

Differential Revision: https://phabricator.services.mozilla.com/D218114
2024-08-01 17:12:48 +00:00
Makoto Kato
6b14dceb59 Bug 1149826 - Part 1. Add eContentCommandReplaceText. r=masayuki
When using autocorrect, we should use `insertReplacementText` according
to https://github.com/w3c/input-events/issues/152. So I would like to
add eContentCommandReplaceText command for this.

Also, this command has an option that is source string text. When
processing text subsitution, parent process doesn't know whether
target replaced text is modified. So I add this option for check.

Differential Revision: https://phabricator.services.mozilla.com/D213511
2024-07-26 06:38:52 +00:00
freyalaluna
da762ea8c3 Bug 1391243 - Implementing Report-To Directive r=sefeng,farre
Updated Content Security Policy reporting to align with current W3C reporting standards. Reporting now supports
the usage of the report-to directive, which utilizes a client's response header field to determine where a report
should be sent upon a content security policy violation occurring. Unlike the previous report-uri directive, which
parsed endpoint URIs directly from the response header, report-to utilizes endpoint groups to store the URIs
that will receive the report. This patch handles the reception of a CSP violation, creation of a report from said
violation, and report delivery, while the parsing of the endpoint URIs are handled by D193461. While the deprecated
report-uri directive remains supported, it is now only used for reporting if a client does not specify a report-
to header.

Differential Revision: https://phabricator.services.mozilla.com/D197480
2024-07-23 20:53:53 +00:00
Tooru Fujisawa
62fb8d5585 Bug 1896709 - Part 15: Add nsIDOMWindowUtils.clearSharedScriptCache. r=nbp
Differential Revision: https://phabricator.services.mozilla.com/D215884
2024-07-18 21:58:15 +00:00
Norisz Fay
4f9e791bda Backed out 17 changesets (bug 1896709) for causing build bustage and mochitest failures CLOSED TREE
Backed out changeset 046f0f522ce7 (bug 1896709)
Backed out changeset 0271e50308e6 (bug 1896709)
Backed out changeset 26fac760de19 (bug 1896709)
Backed out changeset 6fa3424dfc40 (bug 1896709)
Backed out changeset b7bcb9904435 (bug 1896709)
Backed out changeset c6878c5fdde4 (bug 1896709)
Backed out changeset 8ca8a4082e44 (bug 1896709)
Backed out changeset 20ff83806cc6 (bug 1896709)
Backed out changeset 6c9338852a19 (bug 1896709)
Backed out changeset e8615b5d82ab (bug 1896709)
Backed out changeset 842f2047a4bd (bug 1896709)
Backed out changeset 54eea04a7342 (bug 1896709)
Backed out changeset 220b544127cb (bug 1896709)
Backed out changeset 52ce0ebfb29a (bug 1896709)
Backed out changeset 34fc79dc1ad7 (bug 1896709)
Backed out changeset 50b0f6a23e3c (bug 1896709)
Backed out changeset 89c4c6bb465a (bug 1896709)
2024-07-18 14:48:46 +03:00
Tooru Fujisawa
b255ab35f3 Bug 1896709 - Part 15: Add nsIDOMWindowUtils.clearSharedScriptCache. r=nbp
Differential Revision: https://phabricator.services.mozilla.com/D215884
2024-07-18 09:15:29 +00:00
Tooru Fujisawa
a2325ca474 Bug 1081542 - Part 1: Add nsIBrowserDOMWindow.OPEN_NEWTAB_FOREGROUND. r=smaug,geckoview-reviewers,Gijs,amejiamarmol,tabbrowser-reviewers,dao
Given meta/ctrl key should use browser.tabs.loadInBackground pref instead of
browser.tabs.loadDivertedInBackground pref, the existing
nsIBrowserDOMWindow.OPEN_NEWTAB behavior doesn't match the requirement.

Add dedicate flag for "open in foreground tab" to make it controllable from
nsWindowWatcher::IsWindowOpenLocationModified.

Differential Revision: https://phabricator.services.mozilla.com/D201929
2024-07-10 06:16:52 +00:00
Kagami Sascha Rosylight
2b3fcd9099 Bug 1892537 - Add test with sendTouchEventAsPen r=edgar
Differential Revision: https://phabricator.services.mozilla.com/D215639
2024-07-04 08:57:41 +00:00
David P
a0c0e8a5ee Bug 1893119: Part 6 - Make JS clients of nsIDragService::GetCurrentSession use a (implicit) window r=webdriver-reviewers,places-reviewers,gstoll,edgar,whimboo,mak
GetCurrentSession now needs to know the widget to return the drag
session in content processes.  It now uses an explicitly provided
window or the entry global JS context (that must be a window).

This also adds GetDragSession to DOMWindowUtils, and fixes some small
bugs in EventUtils.

Differential Revision: https://phabricator.services.mozilla.com/D211064
2024-07-04 07:48:05 +00:00
Mirko Brodesser
ca74397e2f Bug 1901510: part 4) Implement reporting CSP violations for the "trusted-types" directive for Windows (not Workers). r=tschuster
For an additional test see part 5.

Differential Revision: https://phabricator.services.mozilla.com/D214398
2024-07-03 12:10:44 +00:00
Nika Layzell
8872fb09c8 Bug 1728331 - Part 2: Remove JS process selectors, r=smaug
This shouldn't change behaviour, as the default JS MinTabSelector's behaviour
should roughly match the C++ one. The selector will be updated in a later
patch.

A new pref has been added to disable content process re-use which to replace
the test-only use-case for replacing the process selector.

Differential Revision: https://phabricator.services.mozilla.com/D213336
2024-06-24 23:19:28 +00:00
Aron Cseh
a18d79db16 Backed out 9 changesets (bug 1901851, bug 1728331) for causing remote worker crashes. a=backout
Backed out changeset 30bbda0eb197 (bug 1728331)
Backed out changeset dabd7d6836c8 (bug 1728331)
Backed out changeset 9e04f49c926e (bug 1728331)
Backed out changeset 779ac735736c (bug 1728331)
Backed out changeset 1d413fe340a0 (bug 1728331)
Backed out changeset 15608efcbeb6 (bug 1901851)
Backed out changeset f711bbec11b2 (bug 1901851)
Backed out changeset 8bb1d267d08f (bug 1901851)
Backed out changeset b29282956a04 (bug 1901851)
2024-06-22 00:52:24 +03:00
Nika Layzell
e1e4f5aaf7 Bug 1728331 - Part 2: Remove JS process selectors, r=smaug
This shouldn't change behaviour, as the default JS MinTabSelector's behaviour
should roughly match the C++ one. The selector will be updated in a later
patch.

A new pref has been added to disable content process re-use which to replace
the test-only use-case for replacing the process selector.

Differential Revision: https://phabricator.services.mozilla.com/D213336
2024-06-20 19:24:50 +00:00
Cristian Tuns
535119812a Backed out 8 changesets (bug 1901851, bug 1728331) for causing bc failures in browser_docshell_type_editor.js CLOSED TREE
Backed out changeset 2cf5cad90099 (bug 1728331)
Backed out changeset d920c2d72d00 (bug 1728331)
Backed out changeset 9e5bd0186aa6 (bug 1728331)
Backed out changeset 45735575df21 (bug 1728331)
Backed out changeset fbafea1663e3 (bug 1901851)
Backed out changeset 30bdf88d3bb7 (bug 1901851)
Backed out changeset 1d994915bd71 (bug 1901851)
Backed out changeset 0b3249432b9c (bug 1901851)
2024-06-19 20:51:53 -04:00
Nika Layzell
89a780c5a2 Bug 1728331 - Part 2: Remove JS process selectors, r=smaug
This shouldn't change behaviour, as the default JS MinTabSelector's behaviour
should roughly match the C++ one. The selector will be updated in a later
patch.

A new pref has been added to disable content process re-use which to replace
the test-only use-case for replacing the process selector.

Differential Revision: https://phabricator.services.mozilla.com/D213336
2024-06-19 20:14:49 +00:00
Hiroyuki Ikezoe
2bf18ccc89 Bug 1885106 - Implement LayoutUtils.rectToTopLevelWidgetRect. r=layout-reviewers,emilio
Differential Revision: https://phabricator.services.mozilla.com/D211131
2024-06-18 22:00:49 +00:00
Neil Deakin
1d9100c912 Bug 1899559, remove unusued addManuallyManagedState and removeManuallyManagedState, r=dom-core,peterv
Differential Revision: https://phabricator.services.mozilla.com/D212000
2024-06-10 23:57:47 +00:00
Masayuki Nakano
afaf41dcef Bug 1879765 - part 2: Make BrowserChild store the last code value of consumed eKeyDown event r=smaug
The builtin legacy IME of Windows to type a Unicode with typing a code point
causes consumed `eKeyDown` events while typing the code point, i.e., without
`eKeyPress` (FYI: The consumed state is not exposed to the web, it's used only
in chrome UI for the compatibility with Chrome).  Then, `BrowserChild` store
whether the last `eKeyDown` was consumed or not to prevent the following
`eKeyPress`.  Finally, a `eKeyPress` event is fired to input the Unicode
character after `eKeyUp` for `Alt`.  The stored value is set to new value only
when another `eKeyDown` event is sent from the parent process.  Therefore,
the last digit inputting `eKeyDown` causes `BrowserChild` thinking the last
`eKeyDown` is consumed so that the last `eKeyPress` is not dispatched.

This patch makes `BrowserChild` to store the `code` value of the last consumed
`eKeyDown` and check the `code` value to consider whether coming `eKeyPress`
should be or not be dispatched to `PresShell` and the DOM.

Differential Revision: https://phabricator.services.mozilla.com/D207957
2024-05-16 02:36:03 +00:00
tannal
73b0dd4e16 Bug 1892347 - Remove nsIDOMWindowUtils.isPartOfOpaqueLayer r=gregp,tnikkel
Differential Revision: https://phabricator.services.mozilla.com/D210426
2024-05-15 18:15:19 +00:00
Tamas Szentpeteri
ae9ca6edc4 Backed out 2 changesets (bug 1879765) for causing failures on test_nsITextInputProcessor.xhtml. CLOSED TREE
Backed out changeset 6214b15c2021 (bug 1879765)
Backed out changeset 87e77d284071 (bug 1879765)
2024-05-15 15:15:50 +03:00
Masayuki Nakano
06ef42c72c Bug 1879765 - part 2: Make BrowserChild store the last code value of consumed eKeyDown event r=smaug
The builtin legacy IME of Windows to type a Unicode with typing a code point
causes consumed `eKeyDown` events while typing the code point, i.e., without
`eKeyPress` (FYI: The consumed state is not exposed to the web, it's used only
in chrome UI for the compatibility with Chrome).  Then, `BrowserChild` store
whether the last `eKeyDown` was consumed or not to prevent the following
`eKeyPress`.  Finally, a `eKeyPress` event is fired to input the Unicode
character after `eKeyUp` for `Alt`.  The stored value is set to new value only
when another `eKeyDown` event is sent from the parent process.  Therefore,
the last digit inputting `eKeyDown` causes `BrowserChild` thinking the last
`eKeyDown` is consumed so that the last `eKeyPress` is not dispatched.

This patch makes `BrowserChild` to store the `code` value of the last consumed
`eKeyDown` and check the `code` value to consider whether coming `eKeyPress`
should be or not be dispatched to `PresShell` and the DOM.

Differential Revision: https://phabricator.services.mozilla.com/D207957
2024-05-15 05:42:33 +00:00
Emilio Cobos Álvarez
b9a2da5878 Bug 1896586 - Remove FlushType::Display check from PresShell::NeedFlush. r=smaug
PresShell doesn't do anything different if it gets called with
FlushType::Display vs FlushType::Layout. It should be fine to just pass
FlushType::Layout where appropriate and remove the redundant check.

Differential Revision: https://phabricator.services.mozilla.com/D210274
2024-05-14 21:17:17 +00:00
Kagami Sascha Rosylight
b8f9ad47b9 Bug 1894039 - Part 1: Use BindingUtils functions for enums r=asuth
This unfortunately adds some ASCII-to-UTF16 conversion because:

1. Enums use nsLiteralCString internally
2. nsAlertsService expects nsString. (macOS and Windows expects UTF16 while libnotify expects UTF8)
3. ServiceWorker events currently expect nsString. Fixing this requires touching quite some files and I filed bug 1894240 for that.

Differential Revision: https://phabricator.services.mozilla.com/D208920
2024-05-14 14:13:28 +00:00
Harveer Singh
5b16e91377 Bug 1882176: PBM notifications support.r=saschanaz,asuth,geckoview-reviewers,owlish
Differential Revision: https://phabricator.services.mozilla.com/D207551
2024-05-06 23:53:27 +00:00
Emilio Cobos Álvarez
ff51820a4d Bug 1895208 - Use shifts to define nsIFocusManager flags. r=smaug
This makes it easier to know which bits are free and which aren't.

Differential Revision: https://phabricator.services.mozilla.com/D209526
2024-05-06 18:37:14 +00:00
endington543
551603dbab Bug 1892348 - Remove nsIDOMWindowUtils.numberOfAssignedPaintedLayers() r=tnikkel
Differential Revision: https://phabricator.services.mozilla.com/D208817
2024-04-29 12:18:41 +00:00
Mirko Brodesser
cc5ebcbf26 Bug 1890277: part 4) Add CSPParser support for the trusted-types directive, guarded behind the Trusted Types pref. r=tschuster,webidl,smaug
Differential Revision: https://phabricator.services.mozilla.com/D207274
2024-04-26 07:38:21 +00:00
Aron Cseh
59b8174a0c Backed out 2 changesets (bug 1890277) for causing mochitest failures on browser_misused_characters_in_strings.js CLOSED TREE
Backed out changeset 2a4787f8a69b (bug 1890277)
Backed out changeset 0f7758a42dbd (bug 1890277)
2024-04-25 18:03:40 +03:00
Mirko Brodesser
2125d87536 Bug 1890277: part 4) Add CSPParser support for the trusted-types directive, guarded behind the Trusted Types pref. r=tschuster,webidl,smaug
Differential Revision: https://phabricator.services.mozilla.com/D207274
2024-04-25 13:59:56 +00:00
Mirko Brodesser
252e9c836f Bug 1890277: part 2) Add require-trusted-types-for directive to CSP parser, guarded behind the Trusted Types pref. r=tschuster,webidl,smaug
Differential Revision: https://phabricator.services.mozilla.com/D206998
2024-04-18 07:51:14 +00:00
Tamas Szentpeteri
5f48b45c29 Backed out 2 changesets (bug 1890277) for causing mochitest failures in csp.properties. CLOSED TREE
Backed out changeset 0434b6d79459 (bug 1890277)
Backed out changeset 2e4a028c156f (bug 1890277)
2024-04-17 18:19:33 +03:00
Mirko Brodesser
db3ca28481 Bug 1890277: part 2) Add require-trusted-types-for directive to CSP parser, guarded behind the Trusted Types pref. r=tschuster,webidl,smaug
Differential Revision: https://phabricator.services.mozilla.com/D206998
2024-04-17 12:24:18 +00:00
Tamas Szentpeteri
e697d81f93 Backed out 2 changesets (bug 1890277) for causing build bustages in nsCSPParser.cpp and mochitest failures in csp.properties. CLOSED TREE
Backed out changeset a2f1117a5422 (bug 1890277)
Backed out changeset 2ac938a72185 (bug 1890277)
2024-04-17 13:46:54 +03:00
Mirko Brodesser
9181aa119b Bug 1890277: part 2) Add require-trusted-types-for directive to CSP parser, guarded behind the Trusted Types pref. r=tschuster,webidl,smaug
Differential Revision: https://phabricator.services.mozilla.com/D206998
2024-04-17 09:39:54 +00:00
Kagami Sascha Rosylight
579b6d7d51 Bug 1889483 - Migrate push files to the new renamed DOM: Push Subscriptions r=zeid,webidl,smaug DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D206627
2024-04-04 21:29:53 +00:00
Nika Layzell
a48079cd72 Bug 1881863 - Part 1: Standardize on boolean over bool in xpidl, r=xpcom-reviewers,necko-reviewers,valentin,extension-reviewers,application-update-reviewers,media-playback-reviewers,credential-management-reviewers,search-reviewers,anti-tracking-reviewers,places-reviewers,nalexander,emilio,zombie,sgalich,karlt,lina,Standard8
Previously the `boolean` type was also declared using a `bool` typedef in
xpidl, meaning that both were used in various places. This patch standardizes
on the built-in `boolean` type, removing the typedef.

Differential Revision: https://phabricator.services.mozilla.com/D206382
2024-04-04 18:45:21 +00:00
Emilio Cobos Álvarez
e4ddf24147 Bug 1887719 - More consistently use UTF8String/nsCString for URLs. r=necko-reviewers,webidl,anti-tracking-reviewers,places-reviewers,jari,kershaw,janv,smaug,hsivonen
Sorry for the massive patch but I found it hard to split without
introducing a bunch of copies around...

This mostly makes necko and DOM agree on which strings to use, which
should result on less copies and conversions.

Differential Revision: https://phabricator.services.mozilla.com/D205601
2024-04-04 11:49:57 +00:00
Cristian Tuns
6169ac57de Backed out 8 changesets (bug 1081542) for causing Bug 1885050
Backed out changeset 38614c34e575 (bug 1081542)
Backed out changeset 7571e95ed78c (bug 1081542)
Backed out changeset 29f139450ccc (bug 1081542)
Backed out changeset 058d5712354b (bug 1081542)
Backed out changeset 7f46e8820023 (bug 1081542)
Backed out changeset d29d7e9c38bd (bug 1081542)
Backed out changeset 0a6b3d90e636 (bug 1081542)
Backed out changeset 27dae926668f (bug 1081542)
2024-03-13 06:15:27 -04:00
Artur Iunusov
2ecb71c61d Bug 1770944 - Remove nsIDOMMozBrowserFrame. r=smaug
Depends on D170397

Differential Revision: https://phabricator.services.mozilla.com/D175898
2024-03-07 13:04:21 +00:00
Artur Iunusov
3a0843a675 Bug 1770944 - Remove nsIMozBrowserFrame. r=smaug
Depends on D155254

Differential Revision: https://phabricator.services.mozilla.com/D170397
2024-03-07 13:04:21 +00:00
Gregory Pappas
ea69b62538 Bug 1883217 - Remove unused defines in IDL files r=webdriver-reviewers,necko-reviewers,credential-management-reviewers,places-reviewers,dom-core,Standard8,valentin,mccr8,sgalich
Differential Revision: https://phabricator.services.mozilla.com/D203347
2024-03-06 19:04:25 +00:00