Commit Graph

97625 Commits

Author SHA1 Message Date
Ehsan Akhgari
fb92077dcd Remove the trailing semicolon after function definition in order to silence clang warnings; (no bug, DONTBUILD) 2012-06-29 18:59:42 -04:00
Kyle Machulis
f5deac3a33 Bug 769785 - Settings API breaks due to IndexedDB Prefix change; r=khuey 2012-06-29 13:53:41 -07:00
Kyle Huey
b5db0e995f Bug 726378: Followup to fix orange make check. r=me 2012-06-29 11:49:29 -07:00
Kyle Huey
350524f82d Bug 709747: Fix COMPtr logging for .forget(). r=dbaron 2012-06-29 10:10:31 -07:00
Kyle Huey
d3b6b42885 Bug 726378: Unprefix IndexedDB. r=sicking 2012-06-29 09:48:35 -07:00
Jonas Sicking
2911b21101 Bug 755514: Cursor.update support for keypath arrays. r=khuey 2012-06-29 09:48:34 -07:00
Kyle Huey
ee34c30679 Bug 769356: Calling transaction.abort() should leave transaction.error as null, but throwing exceptions should set transaction.error. r=sicking 2012-06-29 09:48:34 -07:00
Kyle Huey
f188d3c9fe Bug 769537: Actually use QuotaExceededError for database creation. r=bent 2012-06-29 09:48:34 -07:00
Kyle Huey
b2c37d1e48 Bug 758497: Mimic [EnforceRange] for cursor.advance until we get new WebIDL bindings. r=sicking 2012-06-29 09:48:34 -07:00
Kyle Huey
d6b1c5293d Bug 762206: Fire an nsScriptErrorEvent at the window to get the proper window.onerror behavior. r=sicking 2012-06-29 09:48:34 -07:00
Kyle Huey
e6cbe8e8cd Bug 755511: Revert all in-memory data when reverting versionchange transactions. r=sicking 2012-06-29 09:48:34 -07:00
Kyle Huey
e7ad7d9314 Bug 755507: Sort objectStoreNames/indexNames. r=sicking 2012-06-29 09:48:34 -07:00
Kyle Huey
7d9c9b0dc3 Bug 755515: Catch exceptions in error handlers. r=sicking 2012-06-29 09:48:34 -07:00
Blake Kaplan
ffd0fbeb8b Bug 766497 - Dispatch events for wifi going up and down and handle multiple requests to bring it up and down at the same time. r=gal DONTBUILD (missed this review comment in the original checkin) 2012-06-29 12:32:25 +02:00
Blake Kaplan
88053939b6 Bug 769227 - Wait a little bit before starting wpa_supplicant on the otoro. r=gal DONTBUILD 2012-06-28 14:36:13 +02:00
Blake Kaplan
0a527481b9 Bug 766497 - Dispatch events for wifi going up and down and handle multiple requests to bring it up and down at the same time. r=gal 2012-06-28 12:01:51 +02:00
Ed Morley
657cd0ae2d Merge last PGO-green changeset of mozilla-inbound to mozilla-central 2012-06-29 08:41:44 +01:00
Brian Smith
ec6590bcd5 Backout change to netwerk/test/unit/test_bug651100.js from the patch for Bug 737615, a=bustage
--HG--
extra : rebase_source : 50d718395cafa292025452bb01a94fec9f4ae216
2012-06-28 19:39:48 -07:00
Jason Duell
f3ec1fa6b2 Bug 711793 - Delay websocket reconnection after abnormal termination. r=mcmanus 2012-06-28 17:53:50 -07:00
Jeff Hammel
1f2352b3dc Bug 758925 - Update in-tree virtualenv to 1.7.2. r=ted 2012-06-28 21:34:05 -04:00
Jason Duell
a20dfd8b7d Backout 25663e7d7f56 a=memory leak 2012-06-28 16:37:26 -07:00
Jason Duell
c9fc31d72f Backed out changeset 25663e7d7f56 a=memory leak 2012-06-28 16:36:14 -07:00
Jason Duell
63599909fe Bug 711793 - Delay websocket reconnection after abnormal termination. r=mcmanus 2012-06-28 14:42:21 -07:00
Margaret Leibovic
6cc1a9ed58 Bug 766556 - Cancel text selection on device rotation. r=mfinkle 2012-06-28 17:37:04 -04:00
Margaret Leibovic
830d2b4249 Bug 769038 - Margin on root element causes selection handles to appear at wrong spot. r=mbrubeck 2012-06-28 17:37:01 -04:00
Brian Smith
9b8ec9c7e2 Bug 766683: Export nsNSSShutdown.h from PSM so that other components can use it, r=kaie
--HG--
extra : rebase_source : 40d446da4bf866dc1e4ee45039889fe8e68e8f56
2012-06-28 13:15:13 -07:00
Jonathan Watt
2fff05d6ed Bug 769306 - Move more code from nsSVGOuterSVGFrame::Paint to nsDisplaySVG::Paint. r=dholbert. 2012-06-28 20:51:31 +01:00
Jonathan Watt
513ddf221e Bug 769242 - Rename nsDisplaySVG to nsDisplayOuterSVG in preparation for adding other SVG display list item types. r=dholbert. 2012-06-28 20:51:20 +01:00
Jonathan Watt
a44ff6a481 Bug 769238 - Rename aEffectsFrame to just aFrame in nsSVGIntegrationUtils. r=dholbert. 2012-06-28 20:51:09 +01:00
Brian Smith
f08389ffdb Bug 761228: Fix 304 response handling for custom conditional responses to prevent crash, r=jduell
--HG--
extra : rebase_source : 26494ad6bf23c3290f74fdd6ffc21a1db0b7f429
2012-06-28 12:34:32 -07:00
Ehsan Akhgari
ba5aaa92a6 Bug 769362 - Mark the rest of the relative position change tests as random on Mac; r=bzbarsky 2012-06-28 15:26:36 -04:00
David Mandelin
47bef3464f Bug 746036: stop querying for the current script in GetNameFromBytecode, r=bhackett 2012-06-25 18:04:01 -07:00
Jonathan Watt
18d907d671 Bug 769103 - Get SVG masks working for HTML elements under CSS transforms. r=roc. 2012-06-28 23:59:05 +01:00
Patrick McManus
3472c56b84 bug 767159 remove sync dns from socks proxy r=biesi 2012-06-28 18:24:02 -04:00
Patrick McManus
0a116b0b9e bug 766312 - part 1 - pipeline cancelation could be "undone" r=honzab 2012-06-28 18:06:32 -04:00
Bobby Holley
c866397a9c Bug 754202 - Only push the context of the event target if the listener is scripted. r=smaug 2012-06-28 23:47:56 +02:00
Bobby Holley
984ce48fa6 Bug 754202 - Use the safe JSContext rather than the current JSContext in IndexedDBDatabaseParent::HandleDatabaseEvent. r=bent
It's not used for anything substantial, and it can be (or always is?) called with no JS on the stack.
2012-06-28 23:47:56 +02:00
Bobby Holley
6ea9fc6c38 Bug 754202 - Scope the push of the safe js context such that it doesn't include the call to XHR::Send. r=mrbkap,bent 2012-06-28 23:47:56 +02:00
Bobby Holley
82e093909f Bug 754202 - Check principal in IsCapabilityEnabled when there's no code on the stack. r=mrbkap 2012-06-28 23:47:55 +02:00
Bobby Holley
70050366ad Bug 754202 - Remove NoWaiverWrapper. r=mrbkap
No more principal pushing!
2012-06-28 23:47:55 +02:00
Bobby Holley
fb95f07878 Bug 754202 - Remove mContextPrincipal usage from within nsScriptSecurityManager. r=mrbkap 2012-06-28 23:47:55 +02:00
Bobby Holley
fb16bc5a98 Bug 754202 - Remove context pushing/popping API. r=mrbkap Each one of these uses grabs the principal off of an object for pushing, but also enters the compartment of that object. So we shouldn't need this anymore.
Can I get a 'hell yeah'?
2012-06-28 23:47:55 +02:00
Bobby Holley
3531f53d51 Bug 754202 - Disallow calling EvaluateString{,WithValue} with a principal that doesn't match the global. r=mrbkap 2012-06-28 23:47:55 +02:00
Bobby Holley
e83c215d0b Bug 754202 - Pull subject principals directly off the compartment. r=mrbkap It would be nice to check these principals against the principals acquired using the old mechanism. Unfortunately, they often differ. Because CAPS uses JS stack frames, any time we enter a compartment and do an operation (even throwing an Access-Denied exception) without running any JS code, we'll end up with a different principal.
Our security story is pretty darn tied to compartments at this point, so let's
just pull the trigger.
2012-06-28 23:47:55 +02:00
Bobby Holley
ae62a76b7e Bug 754202 - Pull object principals directly off the compartment and assert that behavior doesn't change. r=bz 2012-06-28 23:47:55 +02:00
Bobby Holley
f8e97f21d8 Bug 754202 - Fix content->chrome postMessage mochitest. r=bz This isn't something we actually support, and were using enablePrivilege to do it before. When we switch this to SpecialPowers wrapping, the sender origin becomes a chrome URL (not very interesting) and the source window becomes null (which we do explicitly in nsGlobalWindow for chrome callers). So those tests stop being useful. 2012-06-28 23:47:55 +02:00
Saurabh Anand
c14a9a087e Bug 722984 - nsBrowserGlue uses global private browsing service to make decisions; r=ehsan 2012-06-29 02:52:41 +05:30
Michal Novotny
8f74a5debf Bug 737615: Replace usage of openCacheEntry with asyncOpenCacheEntry in Necko unit tests, r=bsmith
--HG--
extra : rebase_source : 626a90178480b47f24956a86914fdc3e76cbd20b
2012-06-12 14:23:32 -07:00
Brian Smith
93bc1eddee Bug 764171: Fix crash in nsStorageStream by avoiding pre-buffering for items we will validate, r=honzab
--HG--
extra : rebase_source : e1229663f56643ef25805b26126893df51aaace7
2012-06-28 12:18:25 -07:00
Brian Smith
262448ab75 Bug 760955 - Fix null pointer dereference in mozilla::net::nsHttpChannel::InstallOfflineCacheListener, r=hurley
--HG--
extra : rebase_source : 7cc662e898a48b05836441591b72587d8e988b2f
2012-06-12 14:25:24 -07:00