Commit Graph

3162 Commits

Author SHA1 Message Date
Sebastian Streich
6733f1311c Bug 1558394 - Block downloads in sandboxed iframes r=ckerschb,smaug
Differential Revision: https://phabricator.services.mozilla.com/D67351
2020-05-15 14:03:43 +00:00
Bogdan Tara
edcb53f163 Backed out 2 changesets (bug 1558394) for nsDocShellLoadState related bustage CLOSED TREE
Backed out changeset 5889105bd089 (bug 1558394)
Backed out changeset 80a0ea17c9f8 (bug 1558394)
2020-05-14 15:17:32 +03:00
Honza Bambas
3195caba81 Bug 1637888 - Add a null-check for Document passed to PreloaderBase::NotifyRestart as it is a valid case to happen, r=emilio
Differential Revision: https://phabricator.services.mozilla.com/D75282
2020-05-14 11:24:03 +00:00
Sebastian Streich
bb85ae41b1 Bug 1558394 - Block downloads in sandboxed iframes r=ckerschb,smaug
Differential Revision: https://phabricator.services.mozilla.com/D67351
2020-05-14 10:05:55 +00:00
Gijs Kruitbosch
da06939745 Bug 1196151 - avoid loading mailto: and other standard schemes into frames, r=nika
Differential Revision: https://phabricator.services.mozilla.com/D74560
2020-05-11 17:48:50 +00:00
Gijs Kruitbosch
228e52aebe Bug 1196151 - use BrowsingContext for external helper app handling of protocols, r=mattwoodrow
Differential Revision: https://phabricator.services.mozilla.com/D74434
2020-05-11 13:13:03 +00:00
Geoff Brown
12eb1c9908 Bug 1637367 - Improve GRE_HOME setting in remote xpcshell tests; r=bc
Previously this would typically set GRE_HOME to /data/data/org.mozilla.geckoview.test,
even though org.mozilla.geckoview.test is not normally installed when running
xpcshell tests -- a non-existent directory in a privileged location!
The new location, remoteBinDir, is typically /data/local/xpcb, the location of the
xpcshell executable.

Differential Revision: https://phabricator.services.mozilla.com/D74938
2020-05-12 21:03:59 +00:00
ssengupta
cf852bbfb9 Bug 1635399 - Function PrincipalInfoToPrincipal now returns Result<nsCOMPtr<nsIPrincipal>, nsresult> r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D73868
2020-05-12 19:02:05 +00:00
Honza Bambas
82d44154a6 Bug 1636106 - Do not cancel a preload channel and do not remove a preload from Document`s preloads when last <link preload> node referencing it is removed from the DOM tree or otherwise updated making it abandon the preload, r=emilio
Differential Revision: https://phabricator.services.mozilla.com/D74480
2020-05-12 12:15:57 +00:00
Geoff Lankow
0688ffdef2 Bug 1618535 - Add missing #include "nsIDocShell.h" to unbreak the Thunderbird build r=baku
Differential Revision: https://phabricator.services.mozilla.com/D74753
2020-05-12 07:11:11 +00:00
Honza Bambas
bc388980de Bug 1618322 - Merge network.preload.experimental pref to network.preload, r=dragana
Depends on D70235

Differential Revision: https://phabricator.services.mozilla.com/D70526
2020-05-11 14:15:30 +00:00
Honza Bambas
ec52ba8274 Bug 1618536 - Preload for fonts, r=heycam,hsivonen
Depends on D72118

Differential Revision: https://phabricator.services.mozilla.com/D70235
2020-05-11 14:14:32 +00:00
Honza Bambas
9e027ce534 Bug 1618535 - Implement preloading for as="fetch" type r=kershaw,baku
Depends on D69860

Differential Revision: https://phabricator.services.mozilla.com/D69628
2020-05-11 14:12:33 +00:00
Edgar Chen
3f250fba44 Bug 1618295 - Make imgRequestProxy implement and use PreloaderBase to support the preload as speculative load feature; r=tnikkel,smaug,mayhemer
Depends on D72083

Differential Revision: https://phabricator.services.mozilla.com/D69860
2020-05-11 14:43:05 +00:00
Honza Bambas
ba512a53f7 Bug 1618293 - Make css::Loader derive and use PreloaderBase to support new preload as speculative load feature, r=smaug
Depends on D67481

Differential Revision: https://phabricator.services.mozilla.com/D68786
2020-05-11 14:08:08 +00:00
Honza Bambas
3af63237fe Bug 1618292 - Make ScriptLoadRequest derive and use PreloaderBase to support new preload as speculative load feature, r=smaug
Depends on D67483

Differential Revision: https://phabricator.services.mozilla.com/D67481
2020-05-11 14:07:24 +00:00
Honza Bambas
2d65fbb465 Bug 1618298 - Update PreloadService to provide APIs to integrate with link DOM element, r=smaug
Depends on D67480

Differential Revision: https://phabricator.services.mozilla.com/D67482
2020-05-11 14:05:22 +00:00
Honza Bambas
0f372316ea Bug 1618289 - Have PreloadService hanging off dom::Document, r=smaug
Depends on D67479

Differential Revision: https://phabricator.services.mozilla.com/D67480
2020-05-11 14:04:36 +00:00
Honza Bambas
27c56fea74 Bug 1618287 - PreloaderBase class, r=smaug
Depends on D71800

Differential Revision: https://phabricator.services.mozilla.com/D67479
2020-05-11 14:20:39 +00:00
Gijs Kruitbosch
6c3c9b5bf3 Bug 1633790 - allow PDF.js use when we've misled the user into misconfiguring PDF handlers, r=jaws,mattwoodrow
Prior to this patch, PDF.js tracks both its own 'disabled' pref (which is used
by enterprise policy) and whether it is the default handler per the handler
service - but it tracks both in one bool, which determines whether its
streamconverter registers.

Really, what we want is to never use PDF.js if it's preffed off.

However, if there is some other default, it should be acceptable to use PDF.js
in some circumstances, like for <embed> or <object>s where otherwise we
would show no content at all.

Even for toplevel PDFs, if the user has configured Firefox to open PDFs in
an external helper app which is Firefox (which is currently an easy mistake
to make in the unknownContentType dialog), or has it set to the OS default,
but has changed their OS default to Firefox, we really still want to open
those PDFs with PDF.js.

This patch fixes all of this by splitting out the pref tracking from the
handler state tracking. Only the pref will completely disable PDF.js.

Then, in the streamconverter code, we check whether PDF.js should be used for
PDFs, and if there's a misconfiguration that we can correct. This code is
invoked from the parent process when we load PDFs in frames or toplevel
documents, and will prevent us from invoking PDF.js in the child if the user
would prefer that not to happen.

As a driveby, this cleans up how we track the pref inside PDF.js, and how we
get notified of changes to the handler - we were missing changes made in the
unknown content type dialog, so it seemed worth making it generic.

Differential Revision: https://phabricator.services.mozilla.com/D73510
2020-05-06 20:28:36 +00:00
Gijs Kruitbosch
4a9c79e6ab Bug 1633790 - add an API on nsIMIMEInfo that exposes whether we're the OS default handler, r=jaws
Differential Revision: https://phabricator.services.mozilla.com/D73508
2020-05-06 20:25:29 +00:00
Gijs Kruitbosch
ad6d0f5943 Bug 1633790 - remove unused method arguments in the external helper app service, r=jaws
This also renames `saveToDisk` to the more accurate `promptForSaveDestination`
given that it doesn't actually do the saving itself.

Differential Revision: https://phabricator.services.mozilla.com/D73507
2020-05-06 20:32:09 +00:00
Ian Moody
011b59d595 Bug 1536556 - Replace raw thrown Cr.ERRORs with Components.Exception. r=mossop,remote-protocol-reviewers,marionette-reviewers,whimboo,necko-reviewers,geckoview-reviewers,valentin,agi
Raw Cr.ERROR don't get stack information, same as throwing JS literals instead
of `new Error()`s.

This was done automatically with a new eslint rule that will be introduced in
the next commit.  One instance of a raw Cr.ERROR was not replaced since it is
used in a test that specifically checks the preservation of raw Cr values in
XPCJS.  The rule will be disabled for that instance.

Differential Revision: https://phabricator.services.mozilla.com/D28073
2020-05-05 17:41:36 +00:00
Jon Bauman
2db43533f3 Bug 1625363 - AVIF (AV1 Image File Format): experimental support. r=aosmond,necko-reviewers,valentin
There are many limitations currently, but this prototype should successfully
render most basic AVIF images. Known limitations:

- No support for any derived image items (crop, rotate, etc.)
- No support for alpha planes
- No support for ICC profiles (bug 1634741)
- The primary image item must be an av01 (no grid support)
- HDR images aren't tone-mapped

Differential Revision: https://phabricator.services.mozilla.com/D68498
2020-05-01 22:56:04 +00:00
Simon Giesecke
3e08d0afd5 Bug 1626570 - Improve handling of copying arrays in uriloader/. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D72322
2020-04-30 09:38:40 +00:00
Razvan Maries
668381a470 Backed out changeset 8cb47e0e268d (bug 1625363) for causing gtest failures at ImageDecoders.AVIFSingleChunk. CLOSED TREE 2020-04-30 08:26:53 +03:00
Jon Bauman
601b2f5365 Bug 1625363 - AVIF (AV1 Image File Format): experimental support. r=aosmond,necko-reviewers,valentin
There are many limitations currently, but this prototype should successfully
render most basic AVIF images. Known limitations:

- No support for any derived image items (crop, rotate, etc.)
- No support for alpha planes
- The primary image item must be an av01 (no grid support)
- HDR images aren't tone-mapped

Differential Revision: https://phabricator.services.mozilla.com/D68498
2020-04-30 01:31:17 +00:00
Bogdan Tara
606f9e2e6c Backed out changeset 9804951497f9 (bug 1625363) for bustages complaining about nsAVIFDecoder.cpp CLOSED TREE 2020-04-29 19:46:12 +03:00
Jon Bauman
1c60246bba Bug 1625363 - AVIF (AV1 Image File Format): experimental support. r=aosmond,necko-reviewers,valentin
There are many limitations currently, but this prototype should successfully
render most basic AVIF images. Known limitations:

- No support for any derived image items (crop, rotate, etc.)
- No support for alpha planes
- The primary image item must be an av01 (no grid support)
- HDR images aren't tone-mapped

Differential Revision: https://phabricator.services.mozilla.com/D68498
2020-04-29 16:30:54 +00:00
sagudev
94a5c2f430 Bug 1319881 - Remove UsingNeckoIPCSecurity r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D72534
2020-04-29 12:00:01 +00:00
Jean-Yves Avenard
a50346320b Bug 1630211 - P3. Use new domWindowOpenedAndLoaded where we can. r=Gijs
Remove duplicated code; and properly wait for the window to be loaded where needed.

Differential Revision: https://phabricator.services.mozilla.com/D72879
2020-04-29 11:12:53 +00:00
Matt Woodrow
98e4b6eb1f Bug 1602318 - Expose LoadContext on BrowsingContext webidl. r=nika,kmag,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D71135
2020-04-26 00:53:01 +00:00
Cosmin Sabou
0f970fbb19 Backed out 20 changesets (bug 1602318) for causing multiple types of failures. CLOSED TREE
Backed out changeset f71e3eff7a8c (bug 1602318)
Backed out changeset 0e0bdebf223b (bug 1602318)
Backed out changeset 44e82f4339a1 (bug 1602318)
Backed out changeset 5f341ebd8591 (bug 1602318)
Backed out changeset 088ea9d20617 (bug 1602318)
Backed out changeset 5de6321939f2 (bug 1602318)
Backed out changeset f5742e84912b (bug 1602318)
Backed out changeset 13bec3079540 (bug 1602318)
Backed out changeset 6c24ba022911 (bug 1602318)
Backed out changeset 5d0fc0102a7f (bug 1602318)
Backed out changeset fc4efd11e643 (bug 1602318)
Backed out changeset 028bd63e710d (bug 1602318)
Backed out changeset 21ad350f9617 (bug 1602318)
Backed out changeset 8f27319f2c34 (bug 1602318)
Backed out changeset db2832973382 (bug 1602318)
Backed out changeset 1756c7584491 (bug 1602318)
Backed out changeset 983e5a9abe02 (bug 1602318)
Backed out changeset a1b9429b3298 (bug 1602318)
Backed out changeset 7d1c0d968a09 (bug 1602318)
Backed out changeset a3b056ec6be3 (bug 1602318)
2020-04-24 11:15:12 +03:00
Matt Woodrow
89ca645d61 Bug 1602318 - Expose LoadContext on BrowsingContext webidl. r=nika,kmag,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D71135
2020-04-24 06:59:29 +00:00
Noemi Erli
c0bd1834c8 Backed out 19 changesets (bug 1602318) for causing multiple failures
Backed out changeset 4b3345b2e33b (bug 1602318)
Backed out changeset 7240b27afe28 (bug 1602318)
Backed out changeset a7091729d8c9 (bug 1602318)
Backed out changeset e496ab6c0857 (bug 1602318)
Backed out changeset 184da6309f0c (bug 1602318)
Backed out changeset 79b540f8619d (bug 1602318)
Backed out changeset b298015ee960 (bug 1602318)
Backed out changeset 6d0783cd5e01 (bug 1602318)
Backed out changeset cbc308486b17 (bug 1602318)
Backed out changeset 94142944fb54 (bug 1602318)
Backed out changeset 7c1eeb299b78 (bug 1602318)
Backed out changeset 0fc27502503a (bug 1602318)
Backed out changeset 0fc27c2e09d9 (bug 1602318)
Backed out changeset b5e2aa4741b2 (bug 1602318)
Backed out changeset 57d568114c5a (bug 1602318)
Backed out changeset 8f7360d827dc (bug 1602318)
Backed out changeset 78930a97c2df (bug 1602318)
Backed out changeset 8015780587cd (bug 1602318)
Backed out changeset bc9da03cb3a3 (bug 1602318)
2020-04-21 03:46:41 +03:00
Matt Woodrow
53eab85c6d Bug 1602318 - Expose LoadContext on BrowsingContext webidl. r=nika,kmag
Differential Revision: https://phabricator.services.mozilla.com/D71135
2020-04-20 23:04:09 +00:00
Sebastian Streich
5cc49156fd Bug 1626960 - Remove nsIPrincipal GetURI call in nsOfflineCacheUpdateService.cpp r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D69387
2020-04-20 09:43:29 +00:00
Kagami Sascha Rosylight
e92d0e2a79 Bug 1597267 - Remove dom.registerProtocolHandler.insecure.enabled r=annevk,emilio
Differential Revision: https://phabricator.services.mozilla.com/D69400
2020-04-17 12:06:19 +00:00
Chris Peterson
4a38e89842 Bug 1628961 - Replace "clang-format off" with semicolon workaround for clang-format bug 1629756. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D71138
2020-04-16 09:49:35 +00:00
Matt Woodrow
a27cfc760b Bug 1627971 - Add option to MaybeFireEmbedderLoadEvents to also fire the error event to the embedder element. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D70585

--HG--
extra : moz-landing-system : lando
2020-04-15 22:30:13 +00:00
Gijs Kruitbosch
bfae59a15d Bug 1526890 - enforce default handlers use https, r=mak
Differential Revision: https://phabricator.services.mozilla.com/D70613

--HG--
extra : moz-landing-system : lando
2020-04-15 14:49:15 +00:00
Chris Peterson
72e3388f74 Bug 1628961 - Replace MOZ_MUST_USE with [[nodiscard]] in docshell and uriloader. r=smaug
Also move MOZ_MUST_USE before function declarations' specifiers and return type. While clang and gcc's __attribute__((warn_unused_result)) can appear before, between, or after function specifiers and return types, the [[nodiscard]] attribute must precede the function specifiers.

I also needed to wrap the nsDocLoader::RemoveChildLoader() function declaration with // clang-format off and // clang-format on. clang-format insists on indenting the function declaration because it is confused by the NS_DECL_ macros without trailing semicolons before the [[nodiscard]] attribute.

Differential Revision: https://phabricator.services.mozilla.com/D70478

--HG--
extra : moz-landing-system : lando
2020-04-14 06:41:42 +00:00
Dylan Roeh
9541273b5d Bug 1619798 - Move GeckoView onLoadRequest calls to DocumentLoadListener.cpp r=snorp,mattwoodrow
Differential Revision: https://phabricator.services.mozilla.com/D69594

--HG--
extra : moz-landing-system : lando
2020-04-10 16:38:48 +00:00
Emilio Cobos Álvarez
4b9fdf3d73 Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
Mostly a matter of:

  rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'

And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).

Differential Revision: https://phabricator.services.mozilla.com/D69828

--HG--
extra : moz-landing-system : lando
2020-04-06 18:57:36 +00:00
Cosmin Sabou
d557e2ed22 Backed out 3 changesets (bug 1627707) for build bustages @ mozilla::net::LoadInfo.
Backed out changeset 65d6a90651ce (bug 1627707)
Backed out changeset 378ec30d9979 (bug 1627707)
Backed out changeset 058a19e11b06 (bug 1627707)
2020-04-06 20:07:04 +03:00
Emilio Cobos Álvarez
97872f2fee Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
Mostly a matter of:

  rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'

And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).

Differential Revision: https://phabricator.services.mozilla.com/D69828

--HG--
extra : moz-landing-system : lando
2020-04-06 16:00:43 +00:00
Eric Rahm
a45bbf7d67 Bug 1626451 - Remove nsAutoPtr usage from uriloader/. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D69122

--HG--
extra : moz-landing-system : lando
2020-04-03 21:05:39 +00:00
Kagami Sascha Rosylight
1e6ce8af9b Bug 1597268 - Remove Navigator#registerContentHandler r=annevk,smaug
Differential Revision: https://phabricator.services.mozilla.com/D69191

--HG--
extra : moz-landing-system : lando
2020-04-01 21:20:50 +00:00
Bogdan Tara
452c92d58b Backed out changeset e348ec7e3a2b (bug 1597268) for causing mass bustages CLOSED TREE 2020-04-01 22:27:41 +03:00
Kagami Sascha Rosylight
d336f88d29 Bug 1597268 - Remove Navigator#registerContentHandler r=annevk,smaug
Differential Revision: https://phabricator.services.mozilla.com/D69191

--HG--
extra : moz-landing-system : lando
2020-04-01 18:41:49 +00:00