Commit Graph

3550 Commits

Author SHA1 Message Date
Alexandre Lissy
0af5b943b6 Bug 1284674 - Remove NUWA r=cyu
MozReview-Commit-ID: GyMRNzOBKw6

--HG--
extra : rebase_source : 293af1cd55f2035ce6a99f4ebf144059c32a2b8f
2016-08-02 14:54:00 +02:00
Carsten "Tomcat" Book
cc6b6404c0 Merge mozilla-central to fx-team 2016-08-02 17:13:42 +02:00
Hector Zhao
4a0bfda8d9 Bug 664717 - Part 2: Pass requestingPrincipal to parent process with nsITransferable. r=smaug
MozReview-Commit-ID: B0k10UplydR

--HG--
extra : transplant_source : %D5h%03%7F%D9F%90%E6q%C8%9D%142b%9C%5E%F4%D1%E8%B3
2016-06-30 15:12:56 +08:00
Kartikaya Gupta
85fd233d34 Bug 1250024 - Fix touch-tap event coordinate transformations when a fullzoom is applied. r=botond
There were a couple of problems when delivering tap gestures to content with
full zoom applied. One was that the ConverToGecko function converted the coords
into "CSS pixel" space by using the web content's CSS-to-LD scale, but also
applied that on the translation from the chrome area. Moving that conversion
to later in the process (after the coords got passed through TabParent::
AdjustTapToChildWidget) corrected that issue.

The other problem was that bits of code in APZEventState and APZCCallbackHelper
were using the widget->GetDefaultScale() value as the CSS-to-LD scale, but that
omitted the full zoom value. Getting the CSS-to-LD scale from the presShell and
propagating that through corrected that issue.

MozReview-Commit-ID: KdrkdEZslHo
2016-07-29 14:44:29 -04:00
Olli Pettay
17d576d0b3 Bug 1289254 - Support dnd for webkitdirectory, r=baku
--HG--
extra : rebase_source : dafc058127ea6ededb6df0ec7bcf6f9fbff36202
2016-07-29 14:41:38 +03:00
Cervantes Yu
77dc3c4848 Bug 1281223 - Debug instrumentation for catching accidental destruction of the ContentChild instance. r=billm
MozReview-Commit-ID: 5LozIBYXLeO

--HG--
extra : rebase_source : 1ddb8af09653225a164acb3b8e7dc4700d74a915
2016-07-29 15:13:10 +08:00
Carsten "Tomcat" Book
e8726fe213 Backed out changeset d45c9f5c4bc8 (bug 1281223) for bustage on a CLOSED TREE 2016-07-28 13:35:02 +02:00
Cervantes Yu
b7b5f41252 Bug 1281223 - Debug instrumentation for capturing accidental destruction of the ContentChild instance. r=billm
MozReview-Commit-ID: 5LozIBYXLeO

--HG--
extra : rebase_source : 512e6cde2a66fb12db9fe7a8abc099672e0f5dfe
2016-07-28 19:17:04 +08:00
Christoph Kerschbaumer
caedb13ef1 Bug 1286472: Replace owner with triggeringPrincipal within docshell. r=bz 2016-07-28 09:20:41 +02:00
Eric Rahm
b6659dcf84 Bug 1289614 - Remove warnings from TabChild::{SetFocus,Blur}. r=smaug 2016-07-27 10:44:25 -07:00
Iris Hsiao
caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley
c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao
a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Ben Tian
be60817f4b Bug 1262930 - Skip ShouldShowFocusRing check during TabChild::Init() if no inner window is available. r=khuey 2016-07-29 10:28:50 +08:00
Gabor Krizsanits
8de309e78f Bug 1234583 -Expose OS Pid in nsITabParent. r=billm 2016-08-01 12:26:48 +02:00
Kate McKinley
567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book
25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Haik Aftandilian
8f7ffc84b7 Bug 1274540 - Record sandboxing status in crash reports; r=gcp
Adds content sandbox metadata to parent and child crash reports:
Includes the value of pref security.sandbox.content.level,
whether or not the system is capable of sandboxing, if the
sandbox was successfully turned on, and (on Linux systems)
the sandbox capabilities flags.

New crash report keys:
"ContentSandboxLevel" in parent and content
"ContentSandboxCapable" in parent
"ContentSandboxEnabled" in content
"ContentSandboxCapabilities" in content on Linux
2016-07-25 13:21:00 +02:00
Kate McKinley
01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Kartikaya Gupta
166816e4b0 Bug 1287576 - Update the touch-behavior notification code to behave like the set-target-apzc notification code. r=botond
In particular, this change uses the root frame of the touch target document,
so that the correct presShell resolution is used when doing the touch-action
hit test.

MozReview-Commit-ID: 2bra6PIRqkR
2016-07-25 20:35:03 -04:00
Carsten "Tomcat" Book
a3904e8a8a Merge mozilla-central to mozilla-inbound 2016-07-25 15:59:01 +02:00
Carsten "Tomcat" Book
b9a6c687fa merge mozilla-inbound to mozilla-central a=merge 2016-07-25 15:50:41 +02:00
Neil Deakin
67b5c571bd Bug 1275932, use AutoHandlingUserInputStatePusher to indicate that a real input is happening when refiring key event in the parent process, r=masayuki 2016-07-25 09:08:49 -04:00
Chris Pearce
d183d8433b Bug 1288976 - Use gmp-changed rather than gmp-path-added to retry MediaKeys requests. r=gerald
We're already routing the "gmp-changed" observer service notification over from
the chrome process to the content process, and it fires at pretty much the same
time as the "gmp-path-added" notification (and a few more) so we can just switch
to have the MediaKeySystemAccessManager listen on that notification instead, and
we'll be e10s compatible.




MozReview-Commit-ID: EowFDfdWgAJ

--HG--
extra : rebase_source : ad01990278cf9005f6676ef0b7fa0acbf69249eb
2016-07-25 10:18:34 +12:00
Carsten "Tomcat" Book
0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley
547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Wei-Cheng Pan
fd87664d8e Bug 1264566 - Part 2: Refactor all usage of FileDescriptor. r=valentin
Callers should use a UniquePtr to hold the platform handle.

MozReview-Commit-ID: 6BWnyAf4b3a

--HG--
extra : transplant_source : %26%CA%0D%28%08%9BT%97Z%A1%3Dq%CD%21%A1_%EFE%83%0E
extra : histedit_source : 77f8ed3d0fdec6cce0c95469130ade0fb547bb91
2016-05-27 16:12:51 +08:00
Andrea Marchesini
60ab8339e0 Bug 1288736 - Add some missing rv.SuppressException(), r=smaug 2016-07-22 16:50:10 +02:00
Andrea Marchesini
3e647537b4 Bug 1288694 - Wrong use of ErrorResult in dom/ipc/FilePickerParent, r=smaug 2016-07-22 13:01:41 +02:00
Carsten "Tomcat" Book
336105a0de merge mozilla-inbound to mozilla-central a=merge 2016-07-22 11:58:02 +02:00
Carsten "Tomcat" Book
c7846e126c Backed out changeset 16aa7041c009 (bug 1287107) for causing xpcshell and mac tests 2016-07-22 11:30:23 +02:00
Mike Conley
276c6f9b96 Bug 1261842 - Add methods to nsIDocShellTreeOwner for sizing the primary content. r=smaug
MozReview-Commit-ID: CqiRTVd444n

--HG--
extra : rebase_source : 629e52028e556298145597d6efff02b7973727c4
extra : source : 711951be3db684d594704ddf4df44fffcc514794
2016-07-14 16:31:41 -04:00
Mike Conley
0a04ce8604 Bug 1261842 - ContentParent::RecvCreateWindow should always set an nsresult outparam. r=smaug
MozReview-Commit-ID: 79FYAMBIDef

--HG--
extra : rebase_source : d773574c50780bbe14639fb197f9148855c25892
extra : source : e2472a4cc209e0be8a083dd254965598d41f53c6
2016-05-24 15:41:35 -04:00
Mike Conley
3216b9ba06 Bug 1261842 - Stop sending the window name to ContentParent when opening a new window. r=smaug
By the time that the parent is being asked to create a new window, the name
really doesn't matter anymore.

MozReview-Commit-ID: 4IKrEEylaLY

--HG--
extra : rebase_source : bcb7e316534c522a5ff8d7be336c940eccffbe3e
extra : source : e91913cd64b8bebe80c661935adee644f24c6055
2016-06-08 15:31:01 -04:00
Mike Conley
688f1f9516 Bug 1261842 - Factor out logic for creating windows for content processes from nsWindowWatcher::OpenWindowInternal. r=smaug
MozReview-Commit-ID: 1dhGthT8bmu

--HG--
extra : rebase_source : 34d321ebd3c27f414c63c72908c72d23aabb5396
extra : source : 0f8b603781817f58c4664a33429325bc316598e9
2016-07-05 12:00:07 -04:00
Jim Chen
ce45a595ab Bug 1287946 - Update existing code to use mozilla::java; r=me 2016-07-21 13:49:04 -04:00
Fabrice Desré
f5b619fb28 Bug 1287107 - Making transition alive with gaia as chrome:// r=bholley,fabrice
MozReview-Commit-ID: 9uVUrmuVFXQ

--HG--
extra : rebase_source : d0c19fcda5c72ecdce3b0d0bbbafa5a7954d7a4c
2016-03-03 09:58:47 -08:00
Tom Tromey
5538d692d3 Bug 1286877 - do not set c-basic-offset for python-mode; r=gps
This removes the unnecessary setting of c-basic-offset from all
python-mode files.

This was automatically generated using

    perl -pi -e 's/; *c-basic-offset: *[0-9]+//'

... on the affected files.

The bulk of these files are moz.build files but there a few others as
well.

MozReview-Commit-ID: 2pPf3DEiZqx

--HG--
extra : rebase_source : 0a7dcac80b924174a2c429b093791148ea6ac204
2016-07-14 10:16:42 -06:00
Carsten "Tomcat" Book
4a64baa9d4 merge mozilla-inbound to mozilla-central a=merge 2016-07-21 16:24:36 +02:00
Andrea Marchesini
b400357525 Bug 1280105 - TabChild should not use CHROME_PRIVATE_WINDOW flag to set privateBrowsing, r=smaug 2016-07-21 13:26:57 +02:00
Chris Peterson
b175c9fdd5 Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo 2016-07-20 22:03:25 -07:00
David Anderson
38864a48be Open content VRManagers using endpoints. (bug 1287597 part 1, r=billm) 2016-07-21 00:14:59 -07:00
Carsten "Tomcat" Book
e8bc59a87a Backed out changeset 684888aeee81 (bug 1287946) 2016-07-21 08:07:12 +02:00
Jim Chen
78f67d1f6f Bug 1287946 - Update existing code to use mozilla::java; r=me 2016-07-21 00:42:26 -04:00
Aaron Klotz
cdbff654d0 Bug 1277075: Modify parent and child process startup to use mscom::MainThreadRuntime; r=jimm
MozReview-Commit-ID: DpRPrxtgMoO

--HG--
extra : rebase_source : 1fa666a88f90540da1a2d9d52e85031b3eb52e0e
2016-06-04 01:42:40 -06:00
David Anderson
6aca1d9865 Use Endpoints for content-process ImageBridges. (bug 1287366 part 2, r=billm)
--HG--
extra : rebase_source : 388c44e8df0ff45eb32e12d2b98c654cb0592bf0
2016-07-20 00:18:30 -07:00
David Anderson
fe699affc1 Remove CompositorLRU and associated code. (bug 1287362, r=mattwoodrow) 2016-07-19 21:12:54 -07:00
Wes Kocher
d95537ea88 Backed out changeset ca723ddedfe5 (bug 1262930) for being the likely cause of android m(3) crashes CLOSED TREE 2016-07-20 11:56:59 -07:00
Ben Tian
42107aad39 Bug 1262930 - Remove "no inner window" warning during TabChild::Init() by skipping ShouldShowFocusRing check. r=khuey 2016-07-20 11:47:27 +08:00
Fabrice Desré
7846da76d6 Bug 1287107 - Making transition alive with gaia as chrome:// r=bholley,fabrice
MozReview-Commit-ID: 9uVUrmuVFXQ

--HG--
extra : rebase_source : 20f6f0235667530c21aca4889b5d33e39c2d1a48
2016-03-03 09:58:47 -08:00