summaryrefslogtreecommitdiffstats
path: root/modules
Commit message (Collapse)AuthorAgeLines
* Issue #1291 - Part 3: Update fdlibm to Sept 2019 versionwolfbeast2019-11-15-102/+163
|
* Issue #1291 - Part 2: Stop using the lib's sqrt() functionwolfbeast2019-11-15-459/+17
| | | | | Use <cmath>'s functions over fdlibm's for performance reasons. No significant precision loss when doing this.
* Issue #1291 - Part 1: Ensure exp(1) returns e exactly (use a const)wolfbeast2019-11-15-0/+3
|
* Issue #80 - Stop building embedded xz lib unifiedwolfbeast2019-11-15-1/+1
|
* Issue #80 - Stop building woff2 lib unifiedwolfbeast2019-11-15-1/+1
|
* Issue #80 - Stop building brotli lib unifiedwolfbeast2019-11-15-2/+2
|
* Issue #1288 - Part 3: Update woff2 component to 1.0.2wolfbeast2019-11-14-583/+554
|
* Issue #1288 - Part 1a: Update brotli to 1.0.7wolfbeast2019-11-14-11582/+32333
| | | | | This also reorganizes the exports in the build system to use `brotli/` as include directory.
* Issue #618 - Flip on module type scripting.wolfbeast2019-11-10-1/+1
|
* Issue #618 - Misc fixes (merge conflicts)wolfbeast2019-11-10-0/+4
|
* Issue #1275 - Add pref to disable warning prompts for SuperfluousAuthwolfbeast2019-11-07-0/+6
| | | | | | and AutomaticAuth, and default to not prompting. This resolves #1275.
* MoonchildProductions#1251 - Part 27: Fix ifdef style.athenian2002019-10-21-1/+1
| | | | This should do it for all the commits to files I changed, but while I'm in here I could probably go ahead and turn ALL the singular if defined statements into ifdef statements by using grep/find on the tree. On the other hand, perhaps we should do that as a separate issue so that this doesn't become a case of scope creep.
* MoonchildProductions#1251 - Part 15: fdlibm should provide definition for ↵athenian2002019-10-21-2/+6
| | | | | | | | | | | | | | | | u_int32_t and u_int64_t. https://bugzilla.mozilla.org/show_bug.cgi?id=1350355 u_int32_t is not an stdint.h type. Windows already requires this, Solaris needs it too. If someone has a nit with this approach, the alternatives include: 1. Just replacing every instance of u_int32_t with uint32_t. 2. Including <sys/types.h> for Solaris only, which does define this. 3. Changing the original ifdef to be WIN32 || XP_SOLARIS But it really doesn't matter how you solve this problem, all of the approaches are functionally equivalent, and this one has been used in Firefox since version 55. As far as I can tell, all it does is apply a fix that was being done for Windows already to any platform that needs it.
* MoonchildProductions#1251 - Part 7: All the posix_m* memory-related stuff, ↵athenian2002019-10-21-1/+3
| | | | | | | | | | gathered together. https://bugzilla.mozilla.org/show_bug.cgi?id=1158445 https://bugzilla.mozilla.org/show_bug.cgi?id=963983 https://bugzilla.mozilla.org/show_bug.cgi?id=1542758 Solaris madvise and malign don't perfectly map to their POSIX counterparts, and some Linux versions (especially Android) don't define the POSIX counterparts at all, so options are limited. Ideally posix_madvise and posix_malign should be the safer and more portable options for all platforms.
* Issue #1231 - Correct defines for Mac and keep universal prefs generic.wolfbeast2019-10-21-6/+6
|
* Issue #1231 - Stop using ICC profiles on Linux.adeshkp2019-09-24-1/+8
| | | | | General consensus seems to be that color management on Linux desktops is not mature enough to enable by default.
* Issue #999 - Disable native file picker by default.Ascrod2019-08-15-0/+6
|
* Clarify comment with security.fileuri.unique_originwolfbeast2019-07-20-0/+1
|
* Treat all file: URIs as having a unique origin.wolfbeast2019-07-20-0/+3
| | | | | | | | | | | This prevents cross-file access from files loaded into the browser from the local file system, further restricting the origin policy of file: URIs. Added a pref to control this behavior for local file access if required for certain applications, since this change might break using the browser to run applications on the local file system that require access to local files.
* Block http auth prompt for cross-origin image subresources by default.wolfbeast2019-07-15-0/+7
| | | | | | Still allow this to be bypassed with a pref for those really rare corner cases where images are loaded cross-origin by design and the session hasn't been/can't be authenticated ahead of time.
* Add preference to allow the loading of FTP subresources for corner caseswolfbeast2019-07-14-0/+3
|
* Add Atomics.notify instead of Atomics.wake according to revised spec.wolfbeast2019-06-12-5/+0
| | | | | - Keep .wake as an alias until we're certain it can be removed. - Enable SAB memory
* Disallow res external protocol handler.wolfbeast2019-05-28-0/+1
|
* Issue #1102 - Disable <meta http-equiv=set-cookie>Gaming4JC2019-05-24-0/+3
| | | | Create a new pref 'dom.meta-set-cookie.enabled' which is set to 'false', disabling http-equiv meta cookies.
* Unhook Unboxed Objects optionwolfbeast2019-05-13-1/+0
|
* Remove geo-specific search engine default preferences. Tag #245.Ascrod2019-04-20-3/+0
|
* Remove Firefox Accounts service and tie-ins.wolfbeast2019-04-19-3/+0
| | | | See previous commit for removal of browser identity module.
* Remove some BEOS 1st party code leftovers.wolfbeast2019-04-14-2/+0
|
* Remove AIX 1st party code OS checks, part 2wolfbeast2019-04-01-3/+0
| | | | Issue #186
* Bug 1338306 - nsIPrefBranch.get*Pref should support providing a default ↵Florian Quèze2019-03-23-4/+126
| | | | value, r=bsmedberg.
* Pref the use of unboxed plain objects in JS and disable by default.wolfbeast2019-03-21-0/+1
| | | | | This should be all that's needed for #1017, but verification of impact is definitely desired.
* Part 1: network component changes.wolfbeast2019-03-07-1/+4
|
* Move default-enable pref to application.wolfbeast2019-02-28-5/+6
|
* Revert "Port several Skia upstream fixes."wolfbeast2019-02-17-0/+2
| | | | | | This reverts commit 260b06c1c96285459947231a93f08e413be89dd0. This fixes #976
* Port several Skia upstream fixes.wolfbeast2019-02-14-2/+0
|
* Set incremental GC slice to 20 ms durationwolfbeast2019-01-31-1/+1
|
* Properly camelCase dom.intersectionObserver.enabled pref.wolfbeast2019-01-19-1/+1
|
* Revert "Disable IntersectionObserver API because of crashes."wolfbeast2019-01-19-2/+1
| | | | This reverts commit ac1beef5c10a114afe18897d5d3ced24ac378b92.
* Disable IntersectionObserver API because of crashes.wolfbeast2019-01-19-1/+2
| | | | See #934 and #935.
* Add preference for fully disabling HSTS.Ascrod2019-01-16-0/+2
|
* Add performance warnings to Deprecated module.wolfbeast2018-12-24-0/+3
| | | | | | | | | | | Adds a dedicated handler for performance warnings to be logged to consoles if known performance-impacting methods are called. Search service init is changed from a deprecation warning to a performance warning for synchronous init. This also re-enables the warning for the Basilisk & Co. search service initialization which was previously removed in [a930a79] See also the discussion on #916.
* Re-enable intersection observers with WD spec patches.wolfbeast2018-12-22-2/+2
| | | | This resolves #249
* Prevent double free in mar_sign.cwolfbeast2018-12-13-0/+1
|
* Remove DirectShowReader Part 1: Conditional codetrav902018-12-01-3/+0
|
* Update GMP AUS URLwolfbeast2018-11-30-1/+1
|
* Remove VR hardware support.wolfbeast2018-11-26-24/+0
| | | | This resolves #881
* Update reported Firefox version in compatmode.wolfbeast2018-11-07-1/+1
| | | | This resolves #864
* Back out problematic patch causing issue #865.wolfbeast2018-11-06-19/+0
| | | | | This reverts commit f62eee7c510238bf93b6ad43acd8b8a79a44417c. Verified that a hardening patch landed after this already negates what this patch was a stopgap for, so we no longer need it at all.
* #863 part 2: Make opportunistic encryption opt-in for UXPwolfbeast2018-11-05-1/+4
| | | | | This exposes the new pref and also sets the Alt-Svc pref for OE to false. Basilisk gets a default opt-in for both to stay close to Firefox.
* Backout opportunistic encryption changes.wolfbeast2018-11-04-3/+0
| | | | | | Apparently there is some functional and naming confusion here. Backing out to re-land after evaluation and possible changes. Tag #863.