Commit Graph

452 Commits

Author SHA1 Message Date
John Dai
fbdbcfada9 Bug 1294100 - Part 4: Support DOMString as Argument 2 of Document.createElement. r=bz 2016-09-01 18:06:33 +08:00
John Dai
370abfb260 Bug 1294100 - Part 3: Modify Codegen to generate including FakeString's binding files and fix build errors. r=bz 2016-09-01 18:10:54 +08:00
John Dai
1708e1cd07 Bug 1294100 - Part 2: Modify CheckCustomElementName be 'const nsString*' and remove the const_cast. r=bz 2016-09-01 18:08:50 +08:00
Olli Pettay
81b705d082 Bug 1214805, allow navigating when afterprint event is dispatched, r=bz 2016-09-03 17:33:30 +03:00
Edgar Chen
f37acbbb74 Bug 1275835 - Part 1: Move custom element codes from nsDocument to CustomElementsRegistry; r=wchen
MozReview-Commit-ID: 9gTSFrYW7o3
2016-08-30 11:48:53 +08:00
Thomas Wisniewski
c030c85638 Bug 289714 - Do not write <parsererror> nodes for invalid XML documents in XMLHttpRequests made by web content. r=billm, r=bz 2016-08-29 16:30:36 -04:00
Dan Glastonbury
3a838dfd98 Bug 1262053 - part1 : unblock window's media when the page was first visited. r=baku
MozReview-Commit-ID: 5g5cYdgC8sg
2016-08-29 10:41:02 +08:00
Xidorn Quan
fc4359c93c Bug 991899 part 1 - Add unprefixed API for PointerLock. r=smaug
MozReview-Commit-ID: 3af2D9IWI1Q
2016-07-28 17:15:21 +10:00
Xidorn Quan
4839378866 Bug 1287706 part 1 - Make CallbackObjectHolder movable (and actually move-only). r=smaug
So that we can avoid unnecessary refcount changes.

MozReview-Commit-ID: 4Mk9SJTj6AS
2016-07-28 12:00:06 +10:00
Iris Hsiao
c4499a7d59 Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley
0ec0cc036e Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao
bbd18e9e56 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley
1a5e3b34e1 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book
aa3c9ddbe9 Backed out changeset 1825b8fa636a (bug 1246540) for bustage 2016-07-26 12:52:15 +02:00
Kate McKinley
aa987ec2b1 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book
0601074e2f Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley
4526951d57 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Jocelyn Liu
419a432528 Bug 1276579: Add 'options' argument into |document.createElement[NS]()| methods and remove overloaded |createElement[NS]()| methods. r=smaug,wchen
MozReview-Commit-ID: FWd6g33SSiR
2016-06-06 18:43:39 +08:00
Cameron McCormack
3824a27d80 Bug 1285474: Decide style system backend type for documents earlier. r=bholley
MozReview-Commit-ID: 7A4t3957CWe
2016-07-12 00:33:57 -07:00
Emilio Cobos Álvarez
6fdfeb30ce Bug 1285474: stylo: Add nsINode method for knowing if the current document is using Servo's style back-end. r=bholley
MozReview-Commit-ID: 3sRE7BZj1tu
2016-07-12 00:33:57 -07:00
Xidorn Quan
26868bd866 Bug 1283526 part 1 - Revert behavior of allowfullscreen attribute for non-sandboxed iframe. r=smaug
MozReview-Commit-ID: BayA4tQBsfC
2016-07-04 10:19:35 +10:00
Thomas Wisniewski
2102091a0f Bug 918773 - set responseXML.referrer to the empty string. r=jst 2016-06-30 14:01:25 -04:00
Paul Roberts
70cc007622 Bug 671389 - Export document sandbox flags to chrome JS. r=smaug 2016-06-19 12:34:08 -07:00
Bob Owen
51397657c3 Bug 1277475 Part 1: Add a chrome and XBL accessor for the sandboxed scripts flag to Document WEBIDL. r=bz
This also incldues changes to use the new function instead of getting and checking the sandbox flags in most places.

MozReview-Commit-ID: Cv0vJCdLH4D
2016-06-09 11:22:22 +01:00
Jonathan Watt
1551edf03a Bug 1273850 - Add lots of documentation to explain the scenarios that cause nsFrameLoader::Create to return null. r=smaug
MozReview-Commit-ID: 6UZyql1qHg0
2016-05-17 14:18:22 +01:00
Xidorn Quan
4c579e3342 Bug 1270648 part 4 - Make fullscreen enabled flag not be affected after document is loaded. r=smaug
MozReview-Commit-ID: L2dMAUr63qv
2016-05-18 09:08:12 +10:00
Jonathan Watt
195ce24c93 Bug 1270174 - Scope SVG ID references in content inserted via Document.insertAnonymousContent() to the inserted element. r=smaug 2016-05-09 18:33:19 +01:00
Xidorn Quan
fb19e3539c Bug 1269157 - Add Document.fullscreen attribute. r=smaug
MozReview-Commit-ID: 7mMjGoc7cvA
2016-05-12 10:28:56 +10:00
Cameron McCormack
e2af6e2f55 Bug 1268390 - Part 1: Factor out most of nsStyleSet::AddDocStyleSheet for re-use. r=bholley 2016-04-29 14:01:44 +10:00
Christoph Kerschbaumer
758ca2eb80 Bug 1263286 - Move base-uri CSP check into SetBaseURIUsingFirstBaseWithHref. r=bz 2016-04-26 11:48:29 +02:00
Ben Kelly
e5223d7a0c Bug 1265795 P1 Uncontrolled service workers when global is removed from document. r=bz 2016-04-21 16:10:40 -07:00
Kartikaya Gupta
b67dbe454a Bug 1256727 - Don't allow paint-skipping on pages with scroll-linked effects. r=mstange
MozReview-Commit-ID: I05EXDWOt6b
2016-03-17 15:43:17 -04:00
Franziskus Kiefer
3fb93d6cf2 Bug 1252829 - CSP Telemetry. r=ckerschb, p=bsmedberg
MozReview-Commit-ID: CiNAxh2ZrHB
2016-03-02 13:00:09 +01:00
Christoph Kerschbaumer
c2e478fafa Bug 1122236 - CSP: Implement block-all-mixed-content (r=tanvi,kate,mrbkap) 2016-01-13 20:58:16 -08:00
Daniel Holbert
836101e726 Bug 1247478: Rename FirstAdditionalAuthorSheet() to GetFirstAdditionalAuthorSheet(), since it can return null. r=heycam 2016-02-29 15:09:13 -08:00
Daniel Holbert
0501974dd4 Bug 1246464: Add 'const' to some stylesheet args in nsDocument methods. r=heycam 2016-02-29 13:24:25 -08:00
Franziskus Kiefer
7b12729768 Bug 1244116 - Telemetry for mixed content requests by plugins. r=smaug, p=ally
MozReview-Commit-ID: F9rOb1SdPnL
2016-02-16 15:46:36 +01:00
Cameron McCormack
c0e9a631c2 Bug 1244074 - Part 4: Use StyleSheetHandle instead of concrete style sheet class in most places. r=dholbert 2016-02-24 18:01:12 +11:00
Cameron McCormack
8a879b8032 Bug 1244068 - Part 4: Use StyleSetHandle instead of concrete style set class in most places. r=dholbert 2016-02-24 18:01:11 +11:00
Xidorn Quan
59468828c3 Bug 1248505 - Remove nsDocument::IsFullScreenDoc and its uses. r=smaug
MozReview-Commit-ID: DfPI5U531ad
2016-02-24 08:40:08 +08:00
Gijs Kruitbosch
528edb98b9 Bug 1220160 - part 1: add chromeonly getter for documenturi that returns the original document when on an error page, r=bz
MozReview-Commit-ID: KaOc0WBxcIS
2016-02-15 23:46:49 +00:00
Xidorn Quan
fb34a8467e Bug 743198 part 4 - Rename LogFullScreenDenied to nsIDocument::DispatchFullscreenError, and reuse it in Element::RequestFullscreen. r=smaug 2016-02-17 08:47:11 +08:00
Xidorn Quan
8cad72a020 Bug 743198 part 2 - Add unprefixed Fullscreen API to Document and Element. r=smaug 2016-02-17 08:47:11 +08:00
Xidorn Quan
cf95c9eb88 Bug 743198 part 1 - Drop [Throws] of document.mozFullScreenElement. r=smaug
This method actually never throws. IsFullScreenDoc() simply checks
whether GetFullScreenElement() returns nullptr, which means if that
method returns true, the "!el" check would never fail.
2016-02-17 08:47:11 +08:00
Kyle Huey
f1b7636ca9 Bug 1245950: Privately inherit from legacy interfaces nsIDOMWindow/nsIDOMWindowInternal. r=smaug
If you still need to get to these from C++ for some reason, you need to go through QueryInterface.
2016-02-05 10:12:25 -08:00
Birunthan Mohanathas
bfee0fb40c Bug 1235261 - Part 1: Rename nsAutoTArray to AutoTArray. r=froydnj 2016-02-02 17:36:30 +02:00
Kyle Machulis
854f8e777e Bug 1164427 - Implement elementsFromPoint; r=roc r=khuey 2016-02-01 14:33:51 -08:00
Phil Ringnalda
d871b9515f Back out 7 changesets (bug 1235261) for cpptest failures in TestTArray
CLOSED TREE

Backed out changeset d66c3f19a210 (bug 1235261)
Backed out changeset 467d945426bb (bug 1235261)
Backed out changeset 32b61df13142 (bug 1235261)
Backed out changeset c50bb8ed4196 (bug 1235261)
Backed out changeset 0ff0fa6fe81f (bug 1235261)
Backed out changeset df70e89669da (bug 1235261)
Backed out changeset 064969357fc9 (bug 1235261)
2016-01-31 10:10:57 -08:00
Birunthan Mohanathas
245cd6a02f Bug 1235261 - Part 1: Rename nsAutoTArray to AutoTArray. r=froydnj 2016-01-31 17:12:12 +02:00
Kyle Huey
e95edb30a9 Bug 1241764: Replace nsPIDOMWindow with nsPIDOMWindowInner/Outer. r=mrbkap,smaug 2016-01-30 09:05:36 -08:00