Commit Graph

2098 Commits

Author SHA1 Message Date
Andrew McCreight
9d8b970d73 Bug 1293666 - Add initializer_list ctor to AutoTArray. r=froydnj
MozReview-Commit-ID: 8ORBttWN2Rj
2016-08-09 07:21:26 -07:00
James Andreou
6d5098ad98 Bug 1283281 - Remove PB Flag from DOMStorage. r=jdm 2016-06-29 14:01:00 +02:00
Nicholas Nethercote
1f65390cc9 Bug 1293603 (part 2) - Make Run() declarations consistent. r=erahm.
This patch makes most Run() declarations in subclasses of nsIRunnable have the
same form: |NS_IMETHOD Run() override|.

As a result of these changes, I had to add |override| to a couple of other
functions to satisfy clang's -Winconsistent-missing-override warning.
2016-08-08 12:18:10 +10:00
Yoshi Huang
c9887b26cb Bug 1264231 - Part 1: inherit OA from docshell. r=sicking 2016-08-05 19:44:57 +08:00
Christoph Kerschbaumer
20cc9d7b5d Bug 1286472: Replace owner with triggeringPrincipal within docshell. r=bz 2016-07-28 09:20:41 +02:00
Iris Hsiao
c4499a7d59 Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley
0ec0cc036e Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao
bbd18e9e56 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley
1a5e3b34e1 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Christoph Kerschbaumer
ad67557ef5 Bug 1181370: Update CheckURL to set the incumbent document's principal as the triggeringPrincipal. r=bz 2016-07-26 12:46:01 +02:00
Carsten "Tomcat" Book
aa3c9ddbe9 Backed out changeset 1825b8fa636a (bug 1246540) for bustage 2016-07-26 12:52:15 +02:00
Kate McKinley
aa987ec2b1 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book
0601074e2f Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley
4526951d57 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Chris Peterson
6c0f810682 Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo 2016-07-20 22:03:25 -07:00
Kartikaya Gupta
18753a2323 Bug 970346 - Add a DocShell attribute to override the default touch event options to a tab. r=bz
MozReview-Commit-ID: 4BdhwQRBavd
2016-07-18 10:26:38 -04:00
Nicholas Nethercote
0e059d48ee Bug 1197973 - Use MOZ_MUST_USE in AutoJSAPI. r=bz. 2016-07-14 13:18:11 +10:00
Xidorn Quan
5a7d0f12d1 Bug 1286719 - Turn bool flags in nsDocShell into bit fields. r=bz
Two bools are not converted because they are used with AutoRestore.

MozReview-Commit-ID: AjU61eiMtlQ
2016-07-14 10:47:39 +10:00
Yoshi Huang
b61ea2cdfa Bug 1274893 - remove -forbid- list from SafeBrowsing. r=francois 2016-07-11 16:11:32 +08:00
Xidorn Quan
8fb189fb09 Bug 1283526 part 2 - Remove fullscreen sandbox flag. r=smaug
MozReview-Commit-ID: 5qH4gZxvNQz
2016-07-05 09:46:55 +10:00
Xidorn Quan
26868bd866 Bug 1283526 part 1 - Revert behavior of allowfullscreen attribute for non-sandboxed iframe. r=smaug
MozReview-Commit-ID: BayA4tQBsfC
2016-07-04 10:19:35 +10:00
Masatoshi Kimura
481bbf7d92 Bug 1282038 - Allow allowfullscreen for rewritten YouTube Flash embeds. r=qdot,jst
MozReview-Commit-ID: I8y0gMA5BxE
2016-06-24 19:12:53 +09:00
Carsten "Tomcat" Book
f1e70b513b Backed out changeset 00312b136937 (bug 968273) for causing regressions 2016-06-28 10:03:25 +02:00
Xidorn Quan
fc71251274 Bug 1279613 - Apply fullscreen enabled flag to about:blank as well. r=smaug
MozReview-Commit-ID: JL3ZIdXpLiX
2016-06-20 07:16:00 +10:00
Andrea Marchesini
6360c16cce Bug 1279194 - Get rid of nsDOMPerformanceNavigationType, r=smaug 2016-06-10 16:29:46 +02:00
James Andreou
d847ad06cb Bug 1278664 - Chrome docshells can't have private browsing OriginAttribute. r=smaug 2016-06-09 07:48:00 +02:00
Andrea Marchesini
d125ead0cf Bug 1278845 - Move PerformanceNavigation to separate files, r=smaug 2016-06-09 12:44:54 +02:00
Andrea Marchesini
7f7472a4fd Bug 1271516 - Introducing nsIWebNavigation.setOriginAttributesBeforeLoading, r=smaug 2016-06-07 19:59:22 +02:00
James Andreou
2bc3ca4210 Bug 1277357 - Remove nsDocShell:SetUsePrivateBrowsing cpp consumers and some JS consumers r=jdm 2016-06-06 07:42:00 +02:00
Phil Ringnalda
732de24a7c Back out 32d16086e85e (bug 1271516) for frequent ChromeUtils::IsOriginAttributesEqual assertin failures
CLOSED TREE
2016-06-06 21:07:42 -07:00
Andrea Marchesini
c151ac65b4 Bug 1271516 - Introducing nsIWebNavigation.setOriginAttributesBeforeLoading, r=smaug 2016-06-07 00:47:13 +02:00
Dragana Damjanovic
74f2117281 Bug 968273 - On reload load from the original uri, so that all redirects are reloader.r=mayhemer 2016-06-01 11:57:52 +02:00
Carsten "Tomcat" Book
3d11ccd8c4 merge mozilla-inbound to mozilla-central a=merge 2016-06-03 12:00:06 +02:00
dimi
f5dbedafaa Bug 1258033 - Part 1: Add IsTrackingProtectionOn for nsILoadContext. r=smaug
MozReview-Commit-ID: 2eQzO6KDLyX
2016-06-02 10:12:39 +08:00
Mats Palmgren
058b8e530e Bug 881832 - Make inner document reflow asynchronous. r=tnikkel 2016-05-12 12:07:45 +12:00
Patrick McManus
8f8edfd033 Bug 1274729 - corrupted content string management r=dragana 2016-05-23 10:12:31 -04:00
Phil Ringnalda
903965a65a Back out 6 changesets (bug 881832) for failures in test_Debugger.Source.prototype.element.html
CLOSED TREE

Backed out changeset fac50ce10b07 (bug 881832)
Backed out changeset 32e01c144cd4 (bug 881832)
Backed out changeset 779f5336b81e (bug 881832)
Backed out changeset 95efd250e29f (bug 881832)
Backed out changeset 7fe79f07189f (bug 881832)
Backed out changeset 8ee1824f2a57 (bug 881832)
2016-05-23 18:34:49 -07:00
Makoto Kato
fb19971efb Bug 1177943 - Part 4. Implement remote nsICommandWithParams. r=smaug
MozReview-Commit-ID: LbokIF1rWZX
2016-04-20 19:12:27 +09:00
Mats Palmgren
4185a33eae Bug 881832 - Make inner document reflow asynchronous. r=tnikkel 2016-05-12 12:07:45 +12:00
Samael Wang
b21ecb7802 Bug 1271240 - Part 1: Support prerender flag in e10s and implement makePrerenderedBrowserActive(). r=smaug
MozReview-Commit-ID: 73E2kmqxRwm
2016-05-20 11:36:27 +08:00
Gijs Kruitbosch
14c2f00f1f Bug 1273255 - Don't try alternate URIs at the end of pageload if the channel was redirected: we don't want to be applying that sort of fixup to the redirect target URI. r=smaug 2016-05-19 22:29:04 +01:00
Andrea Marchesini
794c728c57 Bug 1272781 - nsEscape should work with ns(C)Strings and not with char pointers, r=smaug 2016-05-18 18:21:56 +02:00
Xidorn Quan
1a5da08d6a Bug 1270648 part 5 - Setup the sandboxed fullscreen flag and make it work properly. r=smaug
MozReview-Commit-ID: 3EKRbOyXwNi
2016-05-18 09:08:12 +10:00
Xidorn Quan
4c579e3342 Bug 1270648 part 4 - Make fullscreen enabled flag not be affected after document is loaded. r=smaug
MozReview-Commit-ID: L2dMAUr63qv
2016-05-18 09:08:12 +10:00
Trevor Saunders
7c5c42b888 bug 1271436 - add nsIDocShell::GetCommandManager() r=smaug 2016-05-17 18:16:07 -04:00
Trevor Saunders
618b21e04f bug 1271436 - use nsIDocShellTreeItem::GetDocument() more r=smaug 2016-05-17 18:16:07 -04:00
Trevor Saunders
3544821c3d bug 1271436 - use nsIDocShellTreeItem::GetWindow() more r=smaug 2016-05-17 18:16:07 -04:00
James Andreou
ebb9105232 Bug 1269361 - Add mPrivateBrowsingId to OriginAttributes r=ehsan,jdm 2016-06-02 17:03:11 -04:00
Wes Kocher
1280d15682 Backed out changeset 5f50f2c7e813 (bug 968273) for android mochitest failures in the test this added 2016-05-31 09:59:13 -07:00
Dragana Damjanovic
3f9d7c73a8 Bug 968273 - On reload load from the original uri, so that all redirects are reloader.r=mayhemer 2016-05-31 03:43:00 +02:00