Commit Graph

3500 Commits

Author SHA1 Message Date
Nicholas Nethercote
3b0485fcdb Bug 1294645 - Don't use NS_CALLBACK for callbacks in nsI{Input,Output,UnicharInput},Stream.idl. r=froydnj.
Slightly less than half (93 / 210) of the NS_METHOD instances in the codebase
are because of the use of NS_CALLBACK in
nsI{Input,Output,UnicharInput},Stream.idl. The use of __stdcall on Win32 isn't
important for these callbacks because they are only used as arguments to
[noscript] methods.

This patch converts them to vanilla |nsresult| functions. It increases the size
of xul.dll by about ~600 bytes, which is about 0.001%.

--HG--
extra : rebase_source : c15d85298e0975fd030cd8f8f8e54501f453959b
2016-08-12 17:36:22 +10:00
Wes Kocher
e9097643d5 Merge inbound to central, a=merge 2016-08-12 13:44:29 -07:00
Nicholas Nethercote
bab6d17ebf Bug 1293117 (part 4) - Change many NS_IMETHODIMP occurrences to NS_IMETHOD. r=froydnj.
This patch makes the following changes on many in-class methods.

- NS_IMETHODIMP F() override;      --> NS_IMETHOD F() override;
- NS_IMETHODIMP F() override {...} --> NS_IMETHOD F() override {...}
- NS_IMETHODIMP F() final;         --> NS_IMETHOD F() final;
- NS_IMETHODIMP F() final {...}    --> NS_IMETHOD F() final {...}

Using NS_IMETHOD is the preferred way of marking in-class virtual methods.
Although these transformations add an explicit |virtual|, they are safe --
there's an implicit |virtual| anyway because |override| and |final| only work
with virtual methods.

--HG--
extra : rebase_source : 386ee4e4ea2ecd8d5001efabc3ac87b4d6c0659f
2016-08-08 10:54:47 +10:00
Michael Layzell
eea03e9e4d Bug 1293364 - Refactor out duplicate typedefs in xpidl, r=mayhemer
MozReview-Commit-ID: 6lJxrqqBTk8
2016-08-10 11:11:42 -04:00
James Andreou
3585e16752 Bug 1283281 - Remove PB Flag from DOMStorage. r=jdm 2016-06-29 14:01:00 +02:00
Nicholas Nethercote
e7f10a07fd Bug 1293603 (part 2) - Make Run() declarations consistent. r=erahm.
This patch makes most Run() declarations in subclasses of nsIRunnable have the
same form: |NS_IMETHOD Run() override|.

As a result of these changes, I had to add |override| to a couple of other
functions to satisfy clang's -Winconsistent-missing-override warning.

--HG--
extra : rebase_source : 815d0018b0b13329bb5698c410f500dddcc3ee12
2016-08-08 12:18:10 +10:00
Jan Varga
410139beb7 Bug 1280216 - Remove nsIAboutModule::GetIndexedDBOriginPostfix(); r=bz 2016-08-09 20:47:29 +02:00
Andrew McCreight
18b7a1fc2f Bug 1293666 - Add initializer_list ctor to AutoTArray. r=froydnj
MozReview-Commit-ID: 8ORBttWN2Rj

--HG--
extra : rebase_source : 9ad6ae8aff9cbc81c773297d0bb2f7478fb3516e
2016-08-09 07:21:26 -07:00
Yoshi Huang
f9754e4544 Bug 1264231 - Part 1: inherit OA from docshell. r=sicking 2016-08-05 19:44:57 +08:00
Christoph Kerschbaumer
caedb13ef1 Bug 1286472: Replace owner with triggeringPrincipal within docshell. r=bz 2016-07-28 09:20:41 +02:00
Iris Hsiao
caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley
c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao
a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley
567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Christoph Kerschbaumer
d872b01ebc Bug 1181370: Update CheckURL to set the incumbent document's principal as the triggeringPrincipal. r=bz 2016-07-26 12:46:01 +02:00
Carsten "Tomcat" Book
25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley
01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Mike Conley
276c6f9b96 Bug 1261842 - Add methods to nsIDocShellTreeOwner for sizing the primary content. r=smaug
MozReview-Commit-ID: CqiRTVd444n

--HG--
extra : rebase_source : 629e52028e556298145597d6efff02b7973727c4
extra : source : 711951be3db684d594704ddf4df44fffcc514794
2016-07-14 16:31:41 -04:00
Tom Tromey
5538d692d3 Bug 1286877 - do not set c-basic-offset for python-mode; r=gps
This removes the unnecessary setting of c-basic-offset from all
python-mode files.

This was automatically generated using

    perl -pi -e 's/; *c-basic-offset: *[0-9]+//'

... on the affected files.

The bulk of these files are moz.build files but there a few others as
well.

MozReview-Commit-ID: 2pPf3DEiZqx

--HG--
extra : rebase_source : 0a7dcac80b924174a2c429b093791148ea6ac204
2016-07-14 10:16:42 -06:00
Chris Peterson
b175c9fdd5 Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo 2016-07-20 22:03:25 -07:00
Carsten "Tomcat" Book
d8b9227dbe Backed out 25 changesets (bug 1261842, bug 1278985) breaking firefox-ui tests
Backed out changeset bb6c6889b802 (bug 1261842)
Backed out changeset c14ccfac7b4b (bug 1261842)
Backed out changeset d6ffc9db5346 (bug 1261842)
Backed out changeset 2a1acfd17baf (bug 1261842)
Backed out changeset 968e7b3b73fb (bug 1261842)
Backed out changeset 8d708922e47a (bug 1261842)
Backed out changeset 0a08398b5087 (bug 1261842)
Backed out changeset b2e910bb1d72 (bug 1261842)
Backed out changeset f6062f113911 (bug 1261842)
Backed out changeset 07b259eb7121 (bug 1261842)
Backed out changeset 970cbbb3a658 (bug 1261842)
Backed out changeset b6f7395d2bbf (bug 1261842)
Backed out changeset 20eb3987a721 (bug 1261842)
Backed out changeset 6eaa642a93e1 (bug 1261842)
Backed out changeset 855931929739 (bug 1261842)
Backed out changeset 1240345f5624 (bug 1261842)
Backed out changeset ce46ebf231c1 (bug 1261842)
Backed out changeset 8d34b61fbfb3 (bug 1261842)
Backed out changeset 9d8a382c5b1d (bug 1261842)
Backed out changeset e2472a4cc209 (bug 1261842)
Backed out changeset e91913cd64b8 (bug 1261842)
Backed out changeset 4cf843a05a68 (bug 1261842)
Backed out changeset cbdc0deb92bd (bug 1261842)
Backed out changeset a94e6a85c931 (bug 1261842)
Backed out changeset 3b5b92f04ea5 (bug 1278985)
2016-07-19 09:12:58 +02:00
Mike Conley
92e4a54e9b Bug 1261842 - Add methods to nsIDocShellTreeOwner for sizing the primary content. r=smaug
MozReview-Commit-ID: CqiRTVd444n

--HG--
extra : rebase_source : 87322da2ea764cf06885f53a083dfb4f7bcb7c9a
extra : source : 711951be3db684d594704ddf4df44fffcc514794
2016-07-14 16:31:41 -04:00
Kartikaya Gupta
eb68bbaaa8 Bug 970346 - Add a DocShell attribute to override the default touch event options to a tab. r=bz
MozReview-Commit-ID: 4BdhwQRBavd
2016-07-18 10:26:38 -04:00
Nicholas Nethercote
2ebfc5116b Bug 1197973 - Use MOZ_MUST_USE in AutoJSAPI. r=bz. 2016-07-14 13:18:11 +10:00
Xidorn Quan
63da0d4ab2 Bug 1286719 - Turn bool flags in nsDocShell into bit fields. r=bz
Two bools are not converted because they are used with AutoRestore.

MozReview-Commit-ID: AjU61eiMtlQ

--HG--
extra : rebase_source : d1706adc6f14a1a93d1461dd22df0a95043fcca4
2016-07-14 10:47:39 +10:00
Gijs Kruitbosch
072a8b1705 Bug 1273936 - make about:license content-linkable again, r=gijs
MozReview-Commit-ID: HZUrCR1MPHH
2016-05-19 19:27:32 +01:00
Yoshi Huang
e24cc195d9 Bug 1274893 - remove -forbid- list from SafeBrowsing. r=francois 2016-07-11 16:11:32 +08:00
Xidorn Quan
a90f7b0ea8 Bug 1283526 part 2 - Remove fullscreen sandbox flag. r=smaug
MozReview-Commit-ID: 5qH4gZxvNQz

--HG--
extra : rebase_source : fdc1fea2996b259a65c3068cd10fffccf6c5ebdb
2016-07-05 09:46:55 +10:00
Xidorn Quan
dc193d9f49 Bug 1283526 part 1 - Revert behavior of allowfullscreen attribute for non-sandboxed iframe. r=smaug
MozReview-Commit-ID: BayA4tQBsfC

--HG--
extra : rebase_source : 17818546cd0c1ec971412346d6e32d537442dd26
2016-07-04 10:19:35 +10:00
Masatoshi Kimura
e4ae8f8bff Bug 1282038 - Allow allowfullscreen for rewritten YouTube Flash embeds. r=qdot,jst
MozReview-Commit-ID: I8y0gMA5BxE

--HG--
rename : dom/base/test/test_youtube_flash_embed.html => dom/base/test/file_youtube_flash_embed.html
2016-06-24 19:12:53 +09:00
Carsten "Tomcat" Book
c1cb5a12bd Backed out changeset 00312b136937 (bug 968273) for causing regressions 2016-06-28 10:03:25 +02:00
Xidorn Quan
0c0d683ac3 Bug 1279613 - Apply fullscreen enabled flag to about:blank as well. r=smaug
MozReview-Commit-ID: JL3ZIdXpLiX

--HG--
extra : source : 10b1a71568775ba904a916c2cce603337367c582
2016-06-20 07:16:00 +10:00
Andrea Marchesini
dd368c9569 Bug 1279194 - Get rid of nsDOMPerformanceNavigationType, r=smaug 2016-06-10 16:29:46 +02:00
Jonathan Watt
b15368cfcb Bug 1279451 - Remove a lot of unnecessary includes of nsAutoPtr.h. rs=sparky 2016-06-07 21:10:18 +01:00
James Andreou
9c2978f1c0 Bug 1278664 - Chrome docshells can't have private browsing OriginAttribute. r=smaug 2016-06-09 07:48:00 +02:00
Andrea Marchesini
1264ad2da5 Bug 1278845 - Move PerformanceNavigation to separate files, r=smaug 2016-06-09 12:44:54 +02:00
Andrea Marchesini
dd6cbdac21 Bug 1271516 - Introducing nsIWebNavigation.setOriginAttributesBeforeLoading, r=smaug 2016-06-07 19:59:22 +02:00
James Andreou
14c6b15018 Bug 1277357 - Remove nsDocShell:SetUsePrivateBrowsing cpp consumers and some JS consumers r=jdm 2016-06-06 07:42:00 +02:00
Phil Ringnalda
035f8773be Back out 32d16086e85e (bug 1271516) for frequent ChromeUtils::IsOriginAttributesEqual assertin failures
CLOSED TREE
2016-06-06 21:07:42 -07:00
Andrea Marchesini
943c6e667c Bug 1271516 - Introducing nsIWebNavigation.setOriginAttributesBeforeLoading, r=smaug 2016-06-07 00:47:13 +02:00
Dragana Damjanovic
87fd6ae3a9 Bug 968273 - On reload load from the original uri, so that all redirects are reloader.r=mayhemer 2016-06-01 11:57:52 +02:00
Carsten "Tomcat" Book
71eb3110f9 merge mozilla-inbound to mozilla-central a=merge 2016-06-03 12:00:06 +02:00
dimi
8d44df2c72 Bug 1258033 - Part 1: Add IsTrackingProtectionOn for nsILoadContext. r=smaug
MozReview-Commit-ID: 2eQzO6KDLyX

--HG--
extra : rebase_source : 1f5c1c7b250336ff4ecf1e5b3949a532b7bb9144
2016-06-02 10:12:39 +08:00
James Andreou
1d32e86b9c Bug 1269361 - Add mPrivateBrowsingId to OriginAttributes r=ehsan,jdm 2016-06-02 17:03:11 -04:00
Wes Kocher
ae8caa1fe4 Backed out changeset 5f50f2c7e813 (bug 968273) for android mochitest failures in the test this added 2016-05-31 09:59:13 -07:00
Dragana Damjanovic
b5b5c03685 Bug 968273 - On reload load from the original uri, so that all redirects are reloader.r=mayhemer 2016-05-31 03:43:00 +02:00
Bill McCloskey
291c555f34 Bug 1262671 - void** -> PickleIterator (r=froydnj) 2016-05-27 09:57:38 -07:00
Mats Palmgren
4e63c1e0cf Bug 881832 - Make inner document reflow asynchronous. r=tnikkel 2016-05-12 12:07:45 +12:00
Patrick McManus
c0638a1abc Bug 1274729 - corrupted content string management r=dragana 2016-05-23 10:12:31 -04:00
Phil Ringnalda
6bb0bc4494 Back out 6 changesets (bug 881832) for failures in test_Debugger.Source.prototype.element.html
CLOSED TREE

Backed out changeset fac50ce10b07 (bug 881832)
Backed out changeset 32e01c144cd4 (bug 881832)
Backed out changeset 779f5336b81e (bug 881832)
Backed out changeset 95efd250e29f (bug 881832)
Backed out changeset 7fe79f07189f (bug 881832)
Backed out changeset 8ee1824f2a57 (bug 881832)
2016-05-23 18:34:49 -07:00